N2000 System User Manual
N2000 System User Manual
N2000 System User Manual
System
V500R003C01
Issue 06
Date 2010-06-21
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Related Version
The following table lists the product version related to this document.
Intended Audience
This guide provides management guides to the following aspects: secure startup and shutdown
of the N2000 DMS, system settings, security management, users, logs, processes and services,
databases, and files and disks. It also provides operation guides to routine maintenance,
emergency maintenance, and troubleshooting.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Contents
C IP Address Migration..............................................................................................................C-1
C.1 IP Address Migration Scenarios....................................................................................................................C-2
C.2 Migrating the IP Address of the Server.........................................................................................................C-2
C.3 Migrating the IP Address of the NMS...........................................................................................................C-3
C.4 Migrating the IP Address Related to NE Software Management..................................................................C-4
C.5 Migrating the IP Addresses Related to the Report Server.............................................................................C-5
C.6 Migrating the IP Address of a Managed Device............................................................................................C-6
Figures
Tables
This describes how to securely start and shut down the N2000 DMS server.
Context
Normally, the Sybase and N2000 DMS services start at the boot of the Solaris OS.
Procedure
Step 1 Use the key delivered with the device to turn the rotary switch (next to the power switch) to
, as shown in Figure 1-1.
NOTE
Here, the Sun Fire V890 is taken as an example. Whether the device has a rotary switch depends on the
actual situation.
Step 3 After the system starts, turn the rotary switch to . In this case, the workstation will not be
forcibly powered off when you touch the power switch by accident.
NOTE
After the Solaris OS starts, the Sybase database and N2000 DMS services automatically start.
# ./showserver
If you find the dataserver and backupserver processes, it indicates that the Sybase service is
started. If not, run the following commands to start the Sybase service manually:
# cd /opt/sybase/ASE-12_5/install
# ./startserver -f ./RUN_N2000DBServer
# ./startserver -f ./RUN_N2000DBServer_back
NOTE
N2000DBServer and N2000DBServer_back are names of the database server and database backup server.
They must be the same as the actual databases.
Step 6 Run the following commands to check whether the N2000 DMS service is running:
# ps -ef|grep mdp
# ps -ef|grep EmfSysMoniDm
If you find the EmfSysMoniDm and mdp processes, it indicates that the N2000 DMS service
is started. If not, run the following commands:
1. # cd /opt/n2000/server/bin
2. # sh startn2000.sh
Step 7 Right-click on the Solaris OS interface, and choose iManager N2000 > N2000 System
Monitor to log in to the N2000 System Monitor client as the admin user. The user name is
admin and the default password is admin.
NOTE
If you log in for the first time, the N2000 DMS prompts you to change the password of the admin user.
Step 8 Check the running statuses of the N2000 DMS service processes.
----End
Prerequisite
To log in to the N2000 DMS client, note that:
l The N2000 DMS server must be in the normal state.
l The N2000 DMS client must communicate well with the N2000 DMS server.
l The IP address of the client must be in the access control list (ACL) set on the server.
l The valid user name and password of the N2000 DMS must be assigned.
Context
l You can log in to the NMS server through the client on the server host or the clients running
in the Windows OS on other computers.
l The default administrator in the N2000 DMS is admin and the default password is
admin. The system forces you to change the password at the first login. To ensure the
security of the N2000 DMS, you need to change the password in time and keep it in mind.
l If you input wrong login password for three times, your account is locked by the N2000
DMS. The admin user can unlock a common user. The N2000 DMS automatically unlocks
the locked user after 30 minutes.
Procedure
Step 1 Start the login interface of the N2000 DMS.
l On Windows, choose Start > Programes > iManager N2000 > N2000 Client, or double-
Client on the shortcut menu, or double-click the shortcut icon on the desktop.
Step 2 In the Server Name drop-down list box, select the desired server.
1. You can also add a server in this way: Click ... next to Server Name. In the Server
Setting dialog box, click Add.
2. In the Add Server dialog box, set the IP address, secondary server IP address, port number,
data transmission mode, and name of the N2000 DMS server, and click OK.
CAUTION
l By default, the N2000 DMS adopts the data transmission mode of Security(SSL).
l The data transmission mode can be set to Common or Security(SSL). The port number
is 9800 in Common mode, while the port number is 9803 in Security(SSL) mode.
l When the client and the server are on the same host, the client can log in to the server
in Common or Security(SSL) mode if the server adopts the Security(SSL) mode; while
the client can log in to the server only in Common mode if the server adopts the
Common mode.
l When the client and the server are on different hosts, the data transmission mode of the
client must be consistent with that of the server.
l If the client is connected to a single server, you need to enter the IP address of the N2000
DMS server in the IP Address text box. You do not need to enter any information in
the Secondary Server IP Address text box.
l If the client is connected to the VCS HA system, you need to enter the system IP address
of the primary server in the IP Address text box and the system IP address of the
secondary server in the Secondary Server IP Address text box.
3. In the Server Setting dialog box, select a record, and click OK.
Step 3 Enter a valid user name and password. Click Login.
After you log in to the N2000 DMS server, the N2000 DMS client obtains the related data from
the N2000 DMS server. After the data loading, the main topological view of the N2000 DMS
client is displayed.
----End
Procedure
Step 1 Choose File > Exit on the menu bar.
Step 2 In the Confirm dialog box, click OK.
If certain operations on the system topology are performed but not saved, the system prompts
you to save the changes.
----End
Context
CAUTION
Do not stop the workstation with the halt command or directly unplug the power supply of the
hardware. Otherwise, the system may fail to recover.
Follow the correct procedure to shut down the N2000 DMS server safely.
Procedure
Step 1 Log in to the Solaris OS as the n2kuser user.
Step 2 Right-click on the Solaris OS interface, and choose iManager N2000 > N2000 System
Monitor to log in to the N2000 System Monitor client as the admin user.
Step 3 Choose System > Stop All NMS Service on the menu bar. In the dialog box, click OK.
Step 4 Run the following command to check whether the N2000 DMS service is stopped:
If you cannot find the EmfSysMoniDm or mdp process, it indicates that the N2000 DMS service
is stopped. Otherwise, run the kill -9 PID command to shut down the relevant processes.
$. /n2kuser/.profile
Step 6 To shut down the Sybase service with the isql tool, run the following commands:
$ cd /opt/sybase/OCS-12_5/bin
2> go
1> shutdown
2> go
Step 7 Run the following command to check whether the Sybase service is stopped:
$ps -ef|grep syb
The following information is displayed.
sybase 1043 1024 0 04:06:02 pts/5 0:00 grep syb
If you cannot find the dataserver and backupserver process, it indicates that the N2000
DMS service is stopped. Otherwise, run the kill -9 PID command to shut down the relevant
processes.
Step 8 Run the following commands to shut down workstation:
$sync;sync;sync;sync;sync;sync
$shutdown -y -g0 -i5
Step 9 After the workstation is shut down, turn the rotary switch to .
----End
This describes how to set the time, Network Time Protocol (NTP) service, and daylight saving
time for the N2000 DMS server, and how to set the time and NTP service for the N2000 DMS
client.
Device A and Device B are connected through the network. Each of them has independent system
time. Now the system time of the two devices needs to be synchronized automatically. Suppose
the following conditions are met:
l The clock of Device A is set to 10:00:00 and that of Device B is set to 11:00:00 before the
system time of Device A and that of Device B are synchronized.
l Device B serves as the NTP time server, that is, Device A synchronizes its time with that
of Device B.
l A data packet takes one second for unidirectional transfer between Device A and Device
B.
If Device A needs to synchronize its time with that of Device B, the following information is
required:
l Offset: time deviation between Device A and Device B.
l Delay: time loss during the time synchronization between Device A and Device B.
When Offset and Delay are known, Device A can calculate the amount of time that needs to be
modified if Device A synchronizes its time with that of Device B. NTP specifies how to calculate
the values of Offset and Delay.
Now Device A has enough information to calculate the two important parameters Offset and
Delay.
l Delay of the period that Device A sends the NTP message and receives the response
message: Delay = (T4-T1) - (T3-T2).
l Time offset between Device A and Device B: Offset = ((T2 - T1) + (T3 - T4))/2.
Based on this information, Device A can set its own clock to synchronize with that of Device
B.
As shown in Figure 2-2, the servers in the NTP hierarchical networking can be configured as
follows:
l NTP servers of the top level: NTP servers of the 0 level that provide time synchronization
service for the next level.
l NTP servers of the medium level: NTP servers of the levels such as the first and second
levels that obtain time from the NTP servers of the upper level and provide the time
synchronization service for the servers of the lower level.
l NTP clients: Obtain time from the NTP servers of the upper level but do not provide the
time synchronization service.
A host can obtain time information from multiple NTP servers and an NTP server can provide
time information for multiple hosts. The hosts of the same level can provide time information
for each other. NTP can provide up to 15 levels of clients.
NOTE
NTP uses the port number 123 and uses UDP for communication. Therefore, ensure that the IP links are
normal between nodes.
Prerequisite
The N2000 DMS and database services must be stoped before you modify the server time zone.
Context
The NE performance data and alarm data cannot be retrieved when the N2000 DMS service is
stopped.
Procedure
Step 1 Run the N2000 DMS environment variables:
# cd $N2000ROOT
# . ./svc_profile.sh
----End
2.2.2 Modifying the Time and Date of the N2000 DMS Server
This section describes how to modify the time and date of the N2000 DMS server.
Prerequisite
Before modifying the server time and data, the N2000 DMS service and database service must
be stopped.
Context
l The server time cannot be modified when the N2000 DMS service is running. Otherwise,
the system timer is affected. Then the tempdb in Sybase cannot be cleared. When the
tempdb is full, the Sybase database cannot work and the N2000 DMS service cannot run.
l The NE performance data and alarm data cannot be retrieved when the N2000 DMS service
is stopped.
l The system date must be a value between 1971 to 2037. Otherwise, exceptions occur in the
N2000 DMS.
l In the case that the N2000 DMS has been running for some time and some performance
data is generated, after the system time is modified, the performance data displayed in the
performance graph becomes uncontinuous.
Procedure
Step 1 Log in to the System Monitor Client as admin.
Step 2 Choose System > Stop All NMS Services. In the displayed Confirm dialog box, click OK.
The In Process... dialog box is displayed. Click OK in the Information dialog box, the System
Monitor Client exits.
Step 3 Run the following command to stop the Sybase database:
# isql -SN2000DBServer -Usa -P<sa password>
1> shutdown SYB_BACKUP
2> go
1> shutdown
2> go
Step 4 Run the date command to set the system date and time.
For example, to set the system date and time to 2005-11-17 16:30:43, run the following
command:
# date 111716302005.43
Mon Nov 17 16:30:43 CST 2005
----End
2.3 Setting the NTP Service for the N2000 DMS Server
This describes the NTP service mechanism, and the methods of setting, starting, and stopping
the NTP service on the N2000 DMS server.
2.3.1 NTP Service Overview
This describes the NTP service mechanism.
Level 0
NTP Server
Level 2 Level 2
NTP Client
NTP Server NTP Server
NTP Client
In the network shown in Figure 2-3, there are three kinds of devices:
l NTP server at the highest level: Level 0 NTP server, providing the time synchronization
service to the servers at the next level.
l NTP server at intermediate levels: The NTP servers at level 1 and level 2 obtain the time
from the servers at the higher levels, and provide time service to the servers at the next
levels.
l NTP client: It only obtains the time, and does not provide time service.
Procedure
Step 1 Run the following command to check the OS time zone:
# echo $TZ
Step 2 Run the following command to check the OS date and time:
# date
----End
Postrequisite
The following errors may occur on the server:
l The time zone is incorrect.
l The date is incorrect.
l The server time is two minutes earlier or later than the local time.
If any of the preceding errors occur, perform the following steps to avoid system exceptions.
1. Stop all the time-based service (Database service and N2000 DMS service).
2. Correct the time zone, date, and time.
NOTE
You can configure the NTP service only after you complete the preceding steps. All the stopped time-
based applications need to be restarted after the configuration.
2.3.3 Setting the N2000 DMS Server to the Secondary Time Server
This task is performed to set the N2000 DMS server to the secondary NTP server. The secondary
NTP server synchronizes the time with that of the upper-level server and provides a standard
time source for a lower-level server.
Prerequisite
The time zone, date, and time of the N2000 DMS server are set correctly.
Procedure
Step 1 Log in to the N2000 DMS server as root.
# cp /etc/inet/ntp.server /etc/inet/ntp.conf
# vi /etc/inet/ntp.conf
Step 4 Add "server XXX.XXX.XXX.XXX" before "server 127.127.1.0 prefer" to specify the IP address
of the upper-level NTP server. Each line maps to an NTP server.
NOTE
"XXX.XXX.XXX.XXX" represents the IP address of the upper-level NTP server. If there are multiple
upper-level NTP servers, write as many rows as necessary. For example:
server XXX.XXX.XXX.XXX prefer
server XXX.XXX.XXX.XXX prefer
Step 7 Save the /etc/inet/ntp.conf file and exit from the vi editor.
----End
Context
The method of setting the N2000 DMS client as the NTP client is similar to that of setting the
N2000 DMS server as the NTP client.
Procedure
Step 1 Log in to the N2000 DMS server as the root.
# cp /etc/inet/ntp.client /etc/inet/ntp.conf
# vi /etc/inet/ntp.conf
Step 4 Disable the multicast client mode. Put a comment (# character without quotes) in front of
multicastclient 224.0.1.1. For example, # multicastclient 224.0.1.1.
Step 5 Save the /etc/inet/ntp.conf file and exit from the vi editor.
----End
Context
l The NTP boot script is in /etc/rc2.d/. After you start Solaris, the NTP service is started
automatically. Therefore, you need not add the NTP boot script manually.
l Check whether the current time zone, date, and time of the N2000 DMS server are correct
before you start the NTP service. If they are incorrect, correct them.
l After you start the NTP service, the NTP client starts to synchronize the time with that of
the NTP server and slowly adjusts the time deviation. As the adjustment is in the millisecond
level, it does not affect the running of the N2000 DMS server.
Procedure
Step 1 Log in to the N2000 DMS server as the root.
Step 2 Check if the time zone, date, and time of the server are correct. If not, adjust them manually.
For details, see section 2.2.2 Modifying the Time and Date of the N2000 DMS Server.
Step 3 Run the following command to check whether the NTP service is started:
NOTE
If the screen output does not contain /usr/lib/inet/xntpd, it indicates that the NTP service is not
started.
Step 4 If the NTP service process is running, stop it first by running the following command:
l In solaris 10
# svcadm disable svc:/network/ntp:default
l In solaris 8
# /etc/rc2.d/S74xntpd stop
----End
Context
After the NTP service is stopped, the N2000 DMS server fails to synchronize the time with that
of the NTP server. This may result in a time deviation.
Procedure
Step 1 Log in to the N2000 DMS server as the root.
The command can be run only once. This means that the NTP service is not enabled each time the
system is restarted.
l In Solaris 8, run the following command:
# /etc/rc2.d/S74xntpd stop
Step 3 Check whether the NTP service is stopped and run the following command:
----End
Context
l The remote field in the return message of the ntpq -p command is the IP address of the
reference time source. It indicates the status of the reference time source.
l The ntptrace command traces the entire NTP synchronization link from the local machine
to the NTP server at the highest level. For details, run the ntptrace -v command.
l When the NTP server and NTP client are started, it takes five minutes for detection. During
the detection, when the ntpq -p command is run, the remote time source is not displayed
with *. When the ntptrace command is run, Timeout or Not Synchronized is
displayed. Wait for five minutes, and then run the ntpq -p command or ntptrace command.
Procedure
Step 1 In the command line interface, run the ntpq -p command to check the NTP clock source.
Step 2 In the command line interface, run the ntptrace command to check the NTP synchronization
link.
----End
Result
l If the N2000 DMS is the NTP server at the intermediate level, the return result is as follows:
In the return result obtained after the ntpq -p command is run, *10.161.94.212
indicates that the IP address of the NTP server is 10.161.94.212 at level 1. The asterisk
(*) indicates that the status is normal.
The return result obtained after the ntptrace command is run indicates that the server
is at level 2, and the IP address of the server at the upper level is 10.161.94.212 at level
1.
# ntpq -p remote refid st t when
poll reach delay offset jitter
==============================================================================
== *10.161.94.212 .LCL. 1 u 165 512
377 0.406 61.294 0.111 +local(0) Local(0)
3 1 29 64 377 0.000
0.000 0.000 # # ntptrace localhost:stratum 1, offset 0.060665,
sycn distance 0.01015, refid 'LCL'
l If the N2000 DMS is the NTP client at the intermediate level, the return result is as follows:
# ntpq -p remote refid st t
when poll reach delay offset disp
==============================================================================
= *10.161.94.214 10.161.94.212 2 u 58
64 377 0.37 0.217 0.05 # # ntptrace localhost:stratum
3, offset 0.000035, sycn distance 0.08855 10.161.94.214: stratum
2, offset 0.000224, synch distance 0.07860 10.161.94.212: stratum
1, offset 0.060569, synch distance 0.01036, refid 'LCL'
In the return result obtained after the ntpq -p command is run, *10.161.94.214
indicates that the IP address of the NTP server is 10.161.94.214 at level 2. The asterisk
(*) indicates that the status is normal.
The return result obtained after the ntptrace command is run indicates that the server
is at level 3, and the IP address of the server at the upper level is 10.161.94.212 at level
1.
2.4 Setting the Daylight Saving Time for the N2000 DMS
Server
This describes the daylight saving time, rules for viewing the daylight saving time, and the
method of changing the server time zone.
l The local time is the displayed time on the computer. The local time changes according to different
time zones.
l The system clock specifies the Greenwich Mean Time (GMT). The NTP synchronization uses the GMT
and does not affect the local time. Thus, the daylight saving time does not affect the NTP service.
Context
In the Solaris OS, two types of time zone formats exist: the GMT and time zone code. The GMT
format contains only the time difference rather than the daylight saving time rule. The time zone
code format contains both the time difference and daylight saving time rule (depending on the
specific time zone).
For countries or regions that do not use the daylight saving time, the GMT format is
recommended. For countries or regions use the daylight saving time, the time zone code must
be adopted. Otherwise, the automatic change of the daylight saving time is not supported by the
OS.
When the daylight saving time rule of a certain time zone changes, Sun Microsystems Inc may
release a patch for the time zone code. You can install the patch to obtain the latest time zone
code and daylight saving time rule.
Procedure
Step 1 Log in to the Solaris OS as the root user.
Step 3 Run the following command to view the daylight saving time rule of the time zone in the specified
year:
# zdump -vtime zone name | grepspecified year
The format of the returned information is as follows.
Time zone name UTC time = local time isdst=0/1
l If the command does not contain | grepspecific year, the daylight saving rules for all years are displayed.
l The daylight saving time in a time zone may start and end on the fixed dates, or starts from a day in a
certain week of a certain month and ends on a day in a certain week of a certain month. That is, the
week is fixed but the date is not. For example, in the Alaska state of the USA, the daylight saving time
starts on the second Sunday in March, and ends on the first Monday in November.
l Run zdump consecutively to view the daylight saving time of the last year, this year, and next year.
Then, you can know the universal change rule of the daylight saving time.
----End
Example
View the time zone rule of Alaska, USA.
From the display information, you can know that Alaska has daylight saving time. Currently, it
is not in the daylight saving time because isdst=0.
From the first and second lines, you can know that the time changes from Mar 11 02:00:00
2007 to Mar 11 03:00:00 2007, and the daylight saving time starts.
From the third and fourth lines, you can know that the time changes from Nov 4 02:00:00
2007 to Nov 4 01:00:00, and the daylight saving time ends.
Context
l The NE performance data and alarm data cannot be retrieved when the N2000 DMS service
is stopped.
l If you need to change the time zone and time at the same time, you must change the time
zone first.
l The GMT format does not support the daylight saving time. The time zone code format
supports the daylight saving time.
Procedure
Step 1 Log in to the Solaris OS as the root user.
Step 2 Run the following commands to stop the N2000 DMS service:
# cd /opt/n2000/server/bin
# ./stopn2000.sh
NOTE
You can find the time zone information in /usr/share/lib/zoneinfo/src. If you cannot find the time zone code
that matches your locality, you can customize a time zone file. For details, see 2.4.2 Viewing the Daylight
Saving Time Rule of a Time Zone.
Step 6 Restart the N2000 DMS server with the following commands:
# sync;sync;sync;sync;sync;sync
# shutdown -y -g0 -i6
After the computer is restarted, the Sybase database and N2000 DMS services automatically
restart.
----End
2.5 Modifying the Date, Time, and Time Zone of the N2000
DMS Client
This section describes how to modify the date, time, and time zone of the N2000 DMS client.
Context
l Modifying the time of the client is to modify the time of the PC operating system. This
section takes Windows 2000 Professional as an example.
l The system date must be a value between year 1971 to 2037. Otherwise, exceptions may
occur in the N2000 DMS.
Procedure
Step 1 Open Date/Time in the Control Panel.
Item Step
Time zone To modify the time zone, click the Time Zone tab. In the drop-down list box under
the tab, click the drop-down arrow, and then click the time zone to which the PC
operating system belongs.
Hour To modify the hour, double-click the hour, and then increase or decrease the value
in the spin box.
Minute To modify the minute, double-click the minute, and then increase or decrease the
value in the spin box.
Second To modify the second, double-click the second, and then increase or decrease the
value in the spin box.
----End
Prerequisite
l The Windows operating system works properly.
l The clock source of the NTP server works properly.
Context
The configuration procedure is applicable to the Windows 2000 Professional or Windows XP
Professional operating system.
Procedure
Step 1 To set the N2000 DMS client to the NTP client, do as follows:
NOTE
Step 2 Specify the NTP clock source by running the following command:
c:\> net time /setsntp:<NTP Server IP address>
NOTE
The execution result of net time is saved in Windows registry. Therefore, the parameters configured using
net time still works after you restart Windows.
NOTE
To start the W32Time service in Windows, run the net start w32time command. To stop the W32Time
service in Windows, run the net stop w32time command.
----End
This describes how to set N2000 DMS server parameters, including environment variables,
server host names, IP addresses, and routes.
Context
In Solaris, the N2000 DMS environment variables are recorded in the .profile file of the
n2kuser user.
Therefore, there are two conditions:
l Log in to Solaris as n2kuser.
The N2000 DMS environment variables are set automatically and you do not need to set
them manually.
NOTE
The n2kuser user is created automatically only when the N2000 DMS is installed in Solaris.
l Log in to Solaris as a user other than n2kuser.
You need to run the .profile file (a hidden file) under the n2kuser folder to set environment
variables.
Procedure
Step 1 Go to the n2kuser folder:
# cd /n2kuser
Step 2 Run the .profile file under the n2kuser folder:
# . ./.profile
NOTE
l According to the N2000 DMS maintenance policy in Solaris, you are recommended to log in to
Solaris as n2kuser, and then the N2000 DMS is started automatically. The n2kuser user can also
switch to the root user when necessary.
l Only the root user can start the N2000 DMS service manually.
l After setting environment variables, the root user can run startn2000.sh on the console to start the
N2000 DMS. If the environment variables are not set, run startn2000.sh under $N2000ROOT/server/
bin to start the N2000 DMS.
----End
Prerequisite
Before modifying the host name, stop the N2000 DMS service and the Sybase service.
Context
CAUTION
l The host name cannot be modified while the N2000 DMS service is running, otherwise the
N2000 DMS service exit abnormally.
l When the N2000 DMS service is stopped, the performance and alarm data of the NEs may
be lost.
Procedure
Step 1 Log in to the System Monitor Client as admin.
Step 2 Choose System > Stop All NMS Service, in the Confirm dialog box, click OK.
The In Process... dialog box is displayed. After the N2000 DMS service is stopped, the
Information dialog box is displayed. Click OK. The System Monitor Client exits.
Step 3 Log in to the N2000 DMS server as root. Run the following commands to stop the Sybase
service.
# . /n2kuser/.profile
2> go
1> shutdown
2> go
Step 4 Run IP tools to modify the host name in Solaris and the Sybase.
# cd /opt/n2000/server/bin
# ./iptools -H <host-name>
Step 5 Run the following commands to restart the N2000 DMS server.
# sync;sync;sync;sync;sync;sync;
After the operating system is restarted, the Sybase and N2000 DMS services are started
automatically.
----End
Prerequisite
Before modifying the IP address, stop the N2000 DMS service and the Sybase service.
Context
CAUTION
l The IP address cannot be modified while the N2000 DMS service is running, otherwise the
N2000 DMS service exit abnormally.
l When the N2000 DMS service is stopped, the performance and alarm data of the NEs may
be lost.
Procedure
Step 1 Log in to the System Monitor Client as admin.
Step 2 Choose System > Stop All NMS Service, in the Confirm dialog box, click OK.
The In Process... dialog box is displayed. Click OK in the Information dialog box, the System
Monitor Client exit.
Step 3 Log in to the N2000 DMS server as root. Run the following commands to stop the Sybase
service.
# . /n2kuser/.profile
# isql -SN2000DBServer -Usa -P<sa password>
1>shutdown SYB_BACKUP
2>go
1>shutdown
2>go
Step 4 Run the following command to view the current IP address settings of the N2000 DMS server.
# ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
hme0: flags=1000843 mtu 1500 index 2
inet 10.10.10.8 netmask ffffff00 broadcast 10.161.45.255
ether 0:3:ba:12:f9:12
Step 5 Run IP tools to change the IP address settings in Solaris and Sybase.
iptools {-n interface-name -i ip-address -m subnet-mask -G default -gateway -H host-name
-d }
Step 6 Run the following commands to restart the N2000 DMS server.
# sync;sync;sync;sync;sync;sync;
# shutdown -i6 -g0 -y
After the operating system is restarted, the Sybase and N2000 DMS services are restarted
automatically.
----End
Example
For example, if you want to change the IP address of Solaris to 10.10.10.10, the host name to
host, default gateway to 10.10.10.1, and the IP addresses of all the Sybase servers to 10.10.10.10,
run the following commands:
# cd /opt/n2000/server/bin
# iptools -n hme0 -i 10.10.10.10 -m 255.255.255.0 -G 10.10.10.1 -H host -d
Procedure
Step 1 Log in the N2000 DMS server as root.
Step 2 To add, delete, view, or automatically add the N2000 DMS server route:
Operation Command
----End
Prerequisite
You must be the NMS user admin.
Context
l There are two login modes: single-user mode and multi-user mode. In single-user mode,
only the admin user can log in to the N2000 DMS.
l In multiuser mode, the admin user and other users can log in to the N2000 DMS at the
same time. When the mode is changed to single-user mode, other users are forced to log
out of the N2000 DMS, and only the admin user can log in.
Procedure
Step 1 Choose System > NMS Security Settings > Single User Mode.
Step 2 In the Confirm dialog box, click OK.
----End
This describes how to set the login modes, set the maximum number of online users, and monitor
the login statuses of clients.
Prerequisite
l The IP address of the local computer is in the ACL of the server to be logged in.
l The server to be switched to is added in Server Setting.
Procedure
Step 1 Log in to the N2000 DMS client.
Step 2 Choose File > Change Login Server on the main menu.
Step 3 In the Change Login Server dialog box, select the server to be logged in, and then click OK.
NOTE
If the previous user name and password are valid for the changed server, you can automatically log in to
the server; otherwise, the system prompts you that the user name and password are invalid and the login
dialog box is displayed.
----End
Context
l After the N2000 DMS is installed, the default login mode is the multi-user mode.
l It is dangerous to change the login mode to the single-user mode, because the other users
are forced to log out and only the admin user can log in.
l Only the admin user can change the login mode.
Procedure
Step 1 Log in to the N2000 DMS client as the admin user.
Step 2 Choose System > NMS Security Settings > Single User Mode on the menu bar.
----End
Prerequisite
The login user has the rights of the security operator or higher level rights than the security
operator.
Procedure
Step 1 Log in to the N2000 DMS client.
Step 2 Choose System > NMS User Management on the main menu.
Step 3 In Security Object, select the user to be set with the maximum number of online users or the
user group to be set with the maximum number of sessions.
Step 4 On the General tab, select Yes for Unrestricted, and then set the value of Maximum number
of online users.
----End
Prerequisite
The login user has the rights of the security watcher or higher level rights than the security
watcher.
Procedure
Step 1 Log in to the N2000 DMS client.
Step 2 Choose System > NMS User Management on the main menu.
All login users are displayed in the right pane. You can also view whether an account is locked
in Account Lock Status.
Step 4 Optional: If Account Lock Status of a certain user is Locked, do as follows to unlock the user:
1. Select the locked user.
2. Right-click the user and select Unlock.
The Account Lock Status value of the user changes to Unlocked. The user can log in
again.
----End
This describes the policies of the N2000 DMS security management and the methods of setting
the N2000 DMS data transmission security.
SNMP
The Simple Network Management Protocol (SNMP) is widely used for network management.
It has been recognized and become an industrial standard. It aims to ensure that management
information can be transmitted between any two nodes. Based on SNMP, network administrators
can search information at any node in the network, locate faults, plan capacities, and generate
reports.
Compared with SNMPv1 and SNMPv2, SNMPv3 is improved in many aspects, including the
security and the access control. SNMPv3 defines the processing model of the third version SNMP
messages (V3MP), the user-based security model (USM), and the view-based access control
model (VACM).
SSH
The secure shell (SSH) permits a user to log in to the remote device in security, execute
commands, and transmit files. It is the key exchange protocol and the authentication protocol of
the remote device and client.
SSL
The secure sockets layer (SSL) is a security protocol, and provides the security for the
communication of networks (such as the Internet). The SSL prevents application programs from
wire tapping and being tampered during communication.
Install the firewall software, close the ports that are not used, and close the unnecessary
network services.
l OS account security
Change the initial password in time. The password should be complex enough. Change the
password periodically. Delete the unnecessary accounts.
l Application security
Do not install the applications that are not related to the N2000 DMS, such as the game
applications and the personal office applications that are not related to the N2000 DMS.
Right Security
l N2000 DMS user
An N2000 DMS user can log in to the N2000 DMS through the N2000 DMS client. The
unique name and password of the N2000 DMS user decide the operation and management
rights of the user. When the N2000 DMS user is added to a user group, the N2000 DMS
user inherits all the rights of the user group. The administrator of the N2000 DMS is
admin. The N2000 DMS user admin has all operation rights to the N2000 DMS.
l N2000 DMS user group
A set of the N2000 DMS users with the same operation and management rights. When an
N2000 DMS user is added to a N2000 DMS user group, the N2000 DMS user automatically
has all the rights of the N2000 DMS user group.
l Device set
A set of managed devices. Divide the managed devices into different device sets, and you
can assign device management rights conveniently. If a user or user group is assigned the
operation rights to a device set, the user or user group has the operation rights to all the
devices in the device set. Therefore, you need not assign the user or user group the
management rights to individual devices respectively.
l Operation set
A set of operation rights. You can divide the operation rights into different operation sets
according to the operation level or specific requirements. Assign an operation set to a user
or user group, and you can assign the operation rights to the user or user group. In this way,
you can conveniently manage the operation rights.
l Division of authority and division of domain
The divisions of authority and domain are achieved by dividing operations and devices into
different sets. By division of authority, you can divide operation rights into different
functional domains. by division of domain, you can divide the NEs into network domains.
You can set the managed group for an N2000 DMS user to manage the users based on
domains.
Typically, you can assign the rights to an N2000 DMS user in the following ways:
Add the N2000 DMS user to a user group.
Generally, you can add the N2000 DMS user to a user group. Then the N2000 DMS
user automatically inherits all the rights of the user group. In this way, you assign the
rights to the N2000 DMS user.
Adjust the rights.
When the user needs a certain operation right or right on a device, you can assign the
right to the user directly.
Password Security
l Password policy
The password policy defines the requirement on the password complexity. According to
the password policy, all passwords need to meet the requirement on the password
complexity. A reasonable password policy can effectively improve the N2000 DMS
security.
l Weak password dictionary
A weak password dictionary collects the passwords that are easy to crack. When the
password is the same as any of the passwords in the weak password dictionary, the password
is regarded as an invalid one. You need to reset the password. The N2000 DMS weak
password dictionary does not collect the common passwords that are easy to crack. You
can redefine the weak password dictionary according to the actual needs.
N2000 DMS logs include N2000 DMS user logs, dynamic debugging information logs, system
running logs, database logs, and device logs.
l The N2000 DMS supports the graphical interface for querying log information. The
administrator can know the operations of other users on the N2000 DMS.
l The N2000 DMS supports the functions of manually and automatically dumping logs.
Back up the database manually: When necessary, you can back up the database
manually. For example, before you perform a dangerous operation, you need to back
up the database in case that damages occur as the result of data loss.
Back up the data regularly: Set the policies on backing up the database regularly; back
up the database regularly so that you can use the backup data to restore the database
when necessary.
Dump the data: You can export data from a database either in manual mode or automatic
mode and then save the data to other locations.
NOTE
Prerequisite
You must be the NMS user admin.
Context
l If the client and server applications are on the same host and the server uses SSL, then the
client can use Common or SSL mode. If the server uses Common mode, the client can use
Common mode only.
l If the client and server applications are not on the same host, the client can log in to the
server only when it uses the same mode as the server.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Choose System > Communication Mode Settings.
Step 3 In the Communication Mode Settings dialog box, select a communication mode.
NOTE
l Common: The server and the client use a common protocol to communicate.
l Security(SSL): The server and the client use SSL to communicate. All messages between them are
encrypted.
CAUTION
After you change the communication mode, the System Monitor Client and the N2000 DMS
server exit automatically. You need to manually restart the System Monitor Client and the N2000
DMS server. The new communication mode takes effect after you restart the N2000 DMS.
----End
The N2000 DMS is operated and maintained by users. Therefore, assigning user rights correctly
and reasonably is important to the N2000 DMS security.This describes users and rights,
managing the OS and database users, setting the security of N2000 DMS users, processes and
examples of creating users, and changing and monitoring users.
The IP addresses or the network segments for the user ACL cannot exceed the range of the IP
addresses or the network segments for the system ACL.
l Managed domain
A managed domain refers to the physical resources and logical resources managed by the
user or the specific domains managed by the user group.
In the topology view or on the device panel, only the managed objects are displayed. You
can change the managed domain of a user or a user group to change the user rights. The
managed domain is represented as a submap tree (consistent with the physical topology
view).
If the entire submap tree is selected, the parent submap and all the child submaps in the
parent submap can be managed.
If the tree is partially selected, the parent submap can be managed, but some child
submaps under it cannot be managed.
If the tree is not selected, the parent submap cannot be managed, but some child
submaps under it may be manageable.
l Operation rights
Operation rights determine the operations that a user can perform.
l Group-level operations
These are operations performed on user groups. For example, the operations such as setting
the managed domain or operation rights to a user group, creating a user group, or deleting
a user group.
can assign all non-security rights to other user groups. In this case, you cannot assign non-
security rights to your own user group.
l Operation set management policy
Operation set management is not restricted by managed user groups. Only admin can
create, delete, and modify security operation sets. Normal operation sets can be managed
by security administrators, and they are not related to the user groups or users that they
belong to. As a security administrator, if you have the right to manage operation sets, you
can add non-security operation sets.
l Login rights management policy
User login rights are related to security properties. You can set security properties to manage
the login period and the IP address range for login.
6.1.3 OS User
This section describes the OS user types and their rights related to N2000 DMS.
root
The root user is the default system administrator of the solaris operating system.
With the highest right of the operating system, the root user controls all resources, creates other
users, assigns rights to other users, and performs all operations of the operating system. The
root user is responsible for installing or uninstalling the application software of the N2000
DMS server.
n2kuser
During the N2000 DMS installation, the N2000 DMS creates a nmsuser user of the operating
system automatically. The n2kuser user is responsible for setting environment variables of the
N2000 DMS server and starting the N2000 DMS client at the server.
The n2kuser user has all the rights of the directory /n2kuser. The file ./profile in this directory
records environment variables for N2000 DMS running.
sybase
The sybase user is responsible for setting Sybase environment variables, installing, maintaining
and managing the Sybase database.
With all the rights of the directory /opt/sybase, the sybase user can manage the Sybase database,
for example, configuring Sybase environment variables and starting/stopping the Sybase service.
sa
The sa user is the default Sybase system administrator.
N2000user
When you install the N2000 DMS, it creates the database user N2000user automatically. You
use this user to access the Sybase database.
The N2000user user can manage the N2000 DMS database.
The user N2000user manages the N2000 DMS database through the N2000 DMS database
backup tool.
The corba user is created only after you install the northbound interface component.
The N2000 DMS user accounts and their rights are described as follows:
l admin
The admin user has all the operation rights of NMS operation. You use it to manage the
N2000 DMS. The default password is admin. When you for the first time log in to the
N2000 DMS as admin, the system forces you to change the password. By default, only
one admin user is allowed to log in at the same time.
l corba
The third-party NMS uses the corba user to connect to the N2000 DMS. The default
password is corbaagent. Change the password on your first login.
By default, the corba user has no managed domain or operation right. Typically, the
administrator does not need to change the rights of the corba user. You need to modify the
ACL of the corba user before the third-party NMS uses the corba user to connect to the
N2000 DMS.
l Other N2000 DMS users
Other N2000 DMS users are created by the admin user. These N2000 DMS users are
created base on the requirements of management.
For the security purpose, you should change the passwords of sybase regularly.
Procedure
Step 1 Log in as root.
l -c: comment
l -m: create a home path in case of no home path
l -d: home path, namely, the N2000 DMS is located
l -g: user group of the admin user
l -s: shell used by the admin user
----End
Context
l For the security purpose, you should change the passwords of root regularly.
l You need to change the password of use root at least once every six months.
l The password consists of letters and numbers. It must contain at least eight characters.
l If the password is known to an unauthorized person, it is recommended to change it
immediately to ensure the regular management and maintenance of the N2000 DMS.
Procedure
Step 1 Log in the Solaris operating system as the nmsuser.
Step 2 Open a terminal window and switch to the root user. Run the following commands:
$ su
Password:<root password>
Step 3 Run the following command to change the password of the root user:
# passwd root
----End
Context
l For the security purpose, you should change the passwords of n2kuser regularly.
l You need to change the n2kuser password at least once every six months.
l The password consists of letters and numbers. It must contain at least eight characters.
l If the password is known to an unauthorized person, it is recommended to change it
immediately to ensure the regular management and maintenance of the N2000 DMS.
Procedure
Step 1 Log in to the Solaris operating system as the n2kuser user.
Step 2 Open a terminal window and switch to the root user. Run the following commands:
$ su
Password:<root password>
Step 3 Run the following command to change the password of the n2kuser user:
# passwd nmsuser
----End
Context
l You need to change the password of user sybase at least once every six months. The
password consists of letters and numbers. It must contain at least eight characters. If the
password is known to an unauthorized person, it is recommended to change it immediately
to ensure the regular management and maintenance of the N2000 DMS.
l When the N2000 DMS is deployed in a distributed manner, you are recommended to
maintain the database as the sybase user (not the root user).
Procedure
Step 1 Log in to the OS as root.
----End
Prerequisite
When you change the password of the database user by using the DbPwdTool, other
configuration files of the N2000 DMS are modified automatically. Therefore, stop the N2000
DMS server program before you changing the password.
Context
l For the security purpose, you should change the sa user password regularly to insure the
security of the sa user password.
l The password consists of letters and numbers. It must contain at least eight characters.
l If the password is known to an unauthorized person, it is recommended to change it
immediately to ensure the regular management and maintenance of the N2000 DMS.
l This section describes how to change the password of the sa user of the Sybase database
in Solaris. For the password change the sa user of the SQL Server database in Windows,
you can refer to this section as these two operations are similar.
CAUTION
The operation of changing the sa user password is incorrect, which may cause an N2000 DMS
running exception. Please use the provided password changing tool (DbPwdTool)to change the
password.
Procedure
Step 1 Open a terminal window, and run the following commands.
# cd /opt/n2000/server/bin
# . /n2kuser/.profile
# DbPwdTool
----End
Prerequisite
When you change the password of the database user by using the DbPwdTool, other
configuration files of the N2000 DMS are modified automatically. Therefore, stop the N2000
DMS server program before you changing the password.
Context
l The password consists of letters and numbers. It must contain at least eight characters. If
the password is known to an unauthorized person, change it immediately to ensure regular
management and maintenance of the N2000 DMS.
l To avoid improper operations, you should use the password change tool (DbPwdTool) to
change the password of N2000user. Improper operations can cause the N2000 DMS to fail.
l Use the DbPwdTool to change the password in the configuration files on the database server
and N2000 DMS server.
Procedure
Step 1 Open a terminal window, and run the following commands.
# cd /opt/n2000/server/bin
# . /n2kuser/.profile
# DbPwdTool
----End
Prerequisite
You must be the NMS user admin.
Context
l There are two login modes: single-user mode and multi-user mode. In single-user mode,
only the admin user can log in to the N2000 DMS.
l In multiuser mode, the admin user and other users can log in to the N2000 DMS at the
same time. When the mode is changed to single-user mode, other users are forced to log
out of the N2000 DMS, and only the admin user can log in.
Procedure
Step 1 Choose System > NMS Security Settings > Single User Mode.
Step 2 In the Confirm dialog box, click OK.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS Security Settings > Security Policies from the main menu.
Step 2 In the Security Policies dialog box, click the Password Police tab.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS Security Settings > Security Policies.
Step 2 In the Security Policies dialog box, click the Account Policies tab.
Step 3 On the Account Policies tab, set the parameters for the user account policy.
----End
Prerequisite
You must be an NMS user with the security maintainer authority or higher.
Context
l Before setting the ACL, you can log in to the N2000 DMS only as admin.
l When you log in to the N2000 DMS as admin for the first time, you can log in through the
client that is not installed on the same computer as the server. The N2000 DMS adds the
IP address of the client to the ACL automatically.
l The values of the ACL can be IP addresses or network segments. When network segments
are used, the format is A.B.C.D/E. The value E is the mask of the N2000 DMS. For example,
10.10.10.0/24. The value 24 indicates the first 24 bits of the 32-bit binary subnet mask are
1, that is, 255.255.255.0.
Procedure
Step 1 Choose System > NMS Security Settings > ACL.
Select an ACL item and then click Delete. In the Confirm dialog box, click OK.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the General tab. In Account validity (days), modify the value of the validity period or
select Always Valid.
Step 4 Click Apply.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the General tab. In Password Validity (days), modify the value of the validity period or
select Always Valid.
Step 4 Click Apply.
----End
6.4.7 Setting the Period for Disabling an N2000 DMS User Account
You can set the period for disabling an N2000 DMS user account. When a user account is not
used in the period, the account is disabled.
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the General tab. In Disable User Account Unused For (days), set the period or select
Unrestricted.
Step 4 Click Apply.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Context
You do not need to enter the old password when you initialize the password. You only need to
set a new password directly. As an administrator, however, if you want to change your password,
you need to enter the old password. Therefore, administrators cannot initialize their own
passwords.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node. Right-click a user and choose
Set Password.
Step 3 In the Set New Password dialog box, enter the new password twice, and then click OK.
NOTE
If you want to change the current user password, open the Change Password dialog box. In the dialog
box, enter the old password, new password, and confirmation password. Click OK.
----End
After the planning and creation of an equipment set, you can assign the set to a specified user
group. In this way, all users in this user group are authorized to perform the operations on the
equipment within the equipment set. This function helps allocate and manage NM user
authorities uniformly.
6.5.3 Creating an N2000 DMS Operation Set
You can create an operation set to assign it to a specific user group or user. The user group or
user then has the right to perform the operations in the set. Therefore, you can manage the N2000
DMS user rights in a unified manner.
6.5.4 Creating a User Group
This section describes how to create N2000 DMS user groups. For the convenience of
management, you can assign rights to the user group where the users are when you assign rights
to the users.
6.5.5 Assigning a Managed Domain to a User Group
You can assign a managed domain to a user group, and then the user group can manage the
specific objects, such as a specific submap or a specific device set. By default, a user in a user
group inherits all the rights of the user group. You can change the managed domain of a user to
adjust the user rights.
6.5.6 Assigning Operation Rights to a User Group
You can assign operation rights to a user group so that the users in the user group can perform
relevant operations.
6.5.7 Assigning Device Management Rights to a User Group
After you assign rights to a user group to manage a new device, all users in this group can manage
the device.
6.5.8 Creating an N2000 DMS User
This topic describes how to create an N2000 DMS user and how to set the properties for the
user.
6.5.9 Adding an N2000 DMS User to a User Group
This section describes how to add a user to a user group so that the user can inherit the rights of
the user group.
6.5.10 Assigning a Managed Domain to an N2000 DMS User
You can assign a managed domain to a user so that the user can have a managed domain besides
the managed domains of the user group. You can perform this operation when you want to assign
a managed domain to a specific user.
6.5.11 Assigning Operation Rights to an N2000 DMS User
You can assign operation rights to a user so that the user can have the rights besides those of the
user group. You can perform this operation when you want to assign operation rights to a specific
user.
6.5.12 Setting the ACL for N2000 DMS Users
You can set the ACL for all the N2000 DMS users so that the users can log in to the N2000
DMS through only specific IP addresses.
The complete process of creating an N2000 DMS user consists of the following steps:
In actual situations, because the user group is created and operation sets are configured, the
process of creating a user usually covers one or some of the complete process of creating a user.
1 6.5.8 Creating an N2000 DMS Before you operate the N2000 DMS, you
User need to obtain a user account.
2 6.5.9 Adding an N2000 DMS User After a user is added to a user group, the user
to a User Group automatically inherits the rights of the user
group.
Table 6-2 shows the complete process of creating an N2000 DMS user.
6 6.5.8 Creating an N2000 DMS Before you operate the N2000 DMS, you
User need to obtain a user account.
7 6.5.9 Adding an N2000 DMS User When a user is added to a user group, the
to a User Group user automatically inherits the rights of the
group.
9 6.5.11 Assigning Operation Rights After operation rights are assigned to a user,
to an N2000 DMS User the user can perform specific operations.
10 6.5.12 Setting the ACL for N2000 For security purposes, you can set the user
DMS Users to log in to the N2000 DMS from only the
specific IP addresses.
Prerequisite
You must be an NMS user with the security maintainer authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, right-click the Device Sets node and choose New Device
Sets.
Step 3 In the New Device Sets dialog box, set the information on and members of the new device set.
NOTE
To add a member, click and then click Browse topology by group or Browse topology by NE type.
In the displayed list, choose the topology object to be modified.
----End
Prerequisite
You must be an NMS user with the security maintainer authority or higher.
Context
Only admin can create a security operation set.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, right-click the Operation Sets node and choose New
Operation Set.
Step 3 In the New Operation Set dialog box, set the information on the new operation set.
Step 4 Click OK.
----End
Prerequisite
You must be an NMS user with the security maintainer authority or higher.
Context
l You can create a user group only when you have the right to manage all the user groups.
l If a user can manage all the user groups, this user is not displayed in the group administrator
properties.
l You cannot create a user group twice or create a user group named ALL.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, right-click the User Groups node and choose New User
Group.
Step 3 In the New User Group dialog box, enter the information on the new user group.
----End
Prerequisite
l You must be an NMS user with the security operator authority or higher.
l You can set the managed domain of a user group only when you have the right to manage
all the user groups.
Context
l When the managed domain of a submap is assigned to a user group, the users in the group
can manage all the resources under the submap by default.
l You can manage the resources under a submap only when you have the right to the managed
domain of the submap.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the User Groups node, and then select a user
group.
Step 3 Click the Managed Domain tab to view the managed domain of the user group.
Step 4 Click Modify. In the Modify User Group Managed Domain dialog box, modify the state of
the managed domain in the submap navigation tree.
----End
Prerequisite
l You must be an NMS user with the security operator authority or higher.
l You can set a user group only when you can manage all the user groups.
Context
l Only admin can assign security operation rights.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the User Groups node, and then select a user
group.
Step 3 Click the Operation Rights tab to view the operation rights of the user group.
Step 4 Click Add. In the dialog box, add the operation rights.
----End
Prerequisite
The login user has the rights of the security operator or higher level rights than the security
operator.
Procedure
Step 1 Log in to the N2000 DMS client.
Step 2 Choose System > NMS User Management on the main menu.
Step 3 Select the new user group in the Security Object navigation tree.
Step 4 Click the Operation Rights tab.
Step 5 Click Add.
Step 6 In the Add Right dialog box shown in Figure 6-1, select Fixed Network Device
Management for Type and the device to be managed for Subtype. Select operation sets to be
added in the Operation Name list. Click OK.
----End
Prerequisite
You must be an NMS user with the security maintainer authority or higher.
Context
l If you have the right to manage all the user groups, you can create a user that does not
belong to any user group.
l If you have the right to manage the specified user groups, you can create a user belong to
only your managed groups and you must add the user to a group.
l NM SYSTEM is a special user of the N2000 DMS. The operations performed by NM
SYSTEM are triggered by the N2000 DMS automatically. If you create the NM
SYSTEM user on the client, the N2000 DMS prompts that a user with the same name
already exists.
l You cannot create a user twice or create a user named ALL.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, right-click the Users node and choose New User.
Step 3 In the New User dialog box, enter the information on the new user.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Context
Only admin can add a user to a security user group.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the Groups tab.
Step 4 Click Add. In the Add User Groups dialog box, select the user group to be added.
Step 5 Click OK.
NOTE
When a user belongs to multiple user groups, the rights of the user are a union of rights of multiple user
groups.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Context
If a user has the right to set the management domain, then the user can assign all management
domains to managed users, including management domains that the user does not belong to.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node. Select a user.
Step 3 Click the Managed Domain tab to view the managed domain of the user.
Step 4 Click Modify. In the Modify User Managed Domain dialog box, click and then click Browse
topology by group or Browse topology by NE type. In the displayed list, choose the topology
object to be modified.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Context
l Only admin can assign the security operation rights.
l If a user has the security administrator right, this user can assign all operation rights except
(including the operation rights that this user does not have) for the security right for the
managed users.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node. Select a user.
Step 3 Click the Operation Rights tab to view the operation rights of the user.
Step 4 Click Add. In the Add Right dialog box, set the user operation rights.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the ACL Settings tab.
When you set the user ACL, you can select the ACL from only the system ACL. If the ACL to be
set is not in the system ACL, click Set ACL. After adding the system ACL, set the user ACL.
----End
This describes how to modify user group attributes. The user group attributes include basic user
group information such as the maximum number of sessions and group manager, and you can
change them as required.
6.7.8 Modifying the Managed Domain of a User Group
When a managed domain is no longer used, delete it to ensure the network security.
6.7.9 Modifying the Operation Rights of a User Group
You can adjust the operation rights of a user group and assign different rights to the user group.
6.7.10 Changing an N2000 DMS User Password
You need to change the N2000 DMS user password periodically to prevent a password theft.
Prerequisite
You must be an NMS user with the security operator authority or higher.
Context
Only the admin user can modify members of the operation set that contains operation rights of
the security module.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Operation Sets node, and then select an
operation set.
Step 3 Click the Members tab. Modify the properties of an N2000 DMS operation set.
l Add an operation
Click Add. In the Add Operations dialog box, set the operation you want to add. Click
OK.
l Delete an operation
Select the operation right you want to delete, and then click Delete. In the Confirm dialog
box, click OK.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the General tab. In the right list, modify the general properties of the user, and then click
Apply.
Step 4 Click the Groups tab. At the bottom of the list box, click Add. In the Add User Group dialog
box, select a user group, and then click OK.
Step 5 Click the ACL Setting tab, choose Use User ACL. Choose the ACL, and then click Apply.
Step 6 Click the Managed Domain tab. Click Modify. In the Modify User Managed Domain dialog
box, modify the managed domain of the user. Click OK.
Step 7 Click the Operation Rights tab, and then modify the operation rights of the user.
l Add an operation right.
At the bottom of the list box, click Add. In the Add Rights dialog box, select a right you
want to add, and click OK.
l Delete an operation right.
In the right list box, select an operation right you want to delete, and then click Delete.
----End
6.7.3 Changing the User Group That an N2000 DMS User Belongs
To
You can modify the user group of an N2000 DMS user so that the user can have the management
rights and operation rights of the user group.
Prerequisite
You must be an NMS user with the security operator authority or higher.
Context
You cannot set the user group that the admin user belongs to.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the User node, and then select a user.
Step 3 Click the Groups tab.
Step 4 Change the user group to which the NMS user belongs.
l Add the user group to which the NMS user belongs.
Click Add. Choose the user group to be added from the list, and then click OK.
l Delete the user group to which the NMS user belongs.
Choose the user group to be deleted, click Delete, and then click OK in the Confirm dialog
box.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the ACL Settings tab.
NOTE
When you set the user ACL, you can select the ACL from only the system ACL. If the ACL to be
set is not in the system ACL, click Set ACL. After adding the system ACL, set the user ACL.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the Managed Domain tab. Click Modify. In the Modify User Managed Domain dialog
box, modify the status of the management domain in the submap tree.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Context
l Only admin can modify security operation rights.
l Only when you have the right to set the operation rights of users and user groups, you can
assign all the operation rights except the security operation rights to other users, including
the operation rights that you do not have.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node, and then select a user.
Step 3 Click the Operation Rights tab to view the operation rights of the user.
----End
Prerequisite
The login user has the rights of the security operator or higher level rights than the security
operator.
Procedure
Step 1 Log in to the N2000 DMS client.
Step 2 Choose System > NMS User Management on the main menu.
----End
Prerequisite
l You must be an NMS user with the security maintainer authority or higher.
l You can set the managed domain of a user group only when you have the right to manage
all the user groups.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the User Groups node, and then select a user
group.
Step 3 Click the Managed Domain tab to view the current managed domain of the user group.
Step 4 Click Modify. In the Modify User Group Managed Domain dialog box, modify the status of
the managed domain in the submap navigation tree, and then click OK.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the User Groups node, and then select a user
group.
Click Add. In the Add Right dialog box, set the rights you want to add. Click OK.
l Delete operation rights.
Select the operation rights you want to delete, and then click Delete. In the
Confirmation dialog box, click OK.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node. Right-click a user and choose
Set Password.
Step 3 In the Set New Password dialog box, enter the new password twice, and then click OK.
NOTE
If you want to change the current user password, open the Change Password dialog box. In the dialog
box, enter the current password and your new password. Click OK.
----End
Prerequisite
l You must be an NMS user with the security watcher authority or higher.
l The group administrator can view the login information of all the users managed in the
group.
l You can query the information on all the users only when you can manage all the user
groups.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, click the User node and choose Login User.
The login users are displayed on the Login User tab.
----End
Prerequisite
You must be an NMS user with the security watcher authority or higher.
Context
l Any users can monitor only their own operation logs.
l The group administrator can monitor operation logs of the users in the managed group.
l The global group administrator can monitor operation logs of all users.
l The user operations can be monitored only when the monitoring window is displayed.
Procedure
Step 1 Choose System > Monitor User Operations.
Step 2 In the Monitor User Operations dialog box, click Filter. Set User, Client, Result, and
Operation Level.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Context
l You cannot force your own user account or admin to exit.
l The user can force only the managed users to exit.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, click the Users node and choose Login User.
The login user information is displayed on the Login User tab.
----End
Prerequisite
You must be an NM user with the "Security Operator" or higher priority.
Context
l If you log in to the N2000 DMS and enter incorrect passwords for the specified number of
consecutive times, your user account is locked. You can use the same account to log in to
the N2000 DMS again only when your account is unlocked.
l Only the user with the Security Operator rights or higher rights can unlock the managed
users.
l If a locked user is not unlocked manually, the N2000 DMS will unlock the user account
after a specified period of time (the default value is 30 minutes).
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, click the Users node, and then click the All User tab.
The information on all the users is displayed on the All User tab.
----End
Prerequisite
You must be an NMS user with the security watcher authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, click the Users node and choose Login User.
----End
This describes log types in the N2000 DMS and the methods of dumping log data and monitoring
operation logs in real time.
Path
The system logs are saved in $N2000ROOT/server/log, including the log files that are related
to the platform and those generated by the N2000 DMS service processes.
Logs in $N2000ROOT/server/log
l The logs in this path record the message processing and thread status of a process. A log
is generated when the N2000 DMS is started.
l The naming rule for the log file is: Process name_ProcID_YYYYMMDD_HHMMSS.log.
For example, the platform log of the security process is
N2000Secu_p52_20060307_084252.log.
l By default, each process has up to 10 log files, and the maximum size of each log file is 5
MB. When the number of log files exceeds the maximum number, the new log file
overwrites the earliest one automatically.
Format
The format of system logs is as follows:
10:31:22.408000.T950 EmfSysMoni INFO:
CEmfMoniCommonMethod::IsProcActive:
Each system log message consists of the header and the message body.
The header indicates the time, process ID, module name, and log debugging level. The header
and other parts of the message are separated by colons (:). For details, refer to Table 7-1.
Path
l The debugging logs are saved in $N2000ROOT/server/debug.
l The name format of the file is: debugged program name + number + .dbg. The "number"
ranges from 1 to 5, that is, each program has up to five debugging files by default. The five
files are used circularly, and the maximum size of each file is 1 MB by default. When the
fifth file reaches the maximum size, it overwrites the first file automatically.
Format
The format of debugging logs is as follows:
Each dynamic debugging log consists of the header and the message body.
The header consists of four parts: time, debug ID, process ID, and module ID. The header and
other parts of the message are separated by colons (:). For details, refer to Table 7-2.
Parameter Description
Time To identify the time when a debugging record is recorded. The format
is YYYY/MM/DD-HH:MM:SS.
Alarm level flag Grouped into three categories: TRACE-INFO, TRACE-WARN, and
TRACE-ERR, indicating three levels of debugging information.
Prerequisite
You must be an NMS user with the security watcher authority or higher.
Context
l Users can query only their own security logs.
l The group administrator can query security logs of the users in the managed group.
l The global group administrator and admin can query security logs of all users.
Procedure
Step 1 Choose System > Browse Log.
Step 2 In the Log Class navigation tree, select Security Logs. In the right pane, double-click a security
log to view its details.
NOTE
If the user has only the right to browse security logs, the Operation Logs node is not displayed.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually.
Step 3 In the Generation Time of Security Logs group box, set the dump condition.
Step 4 In the Records That Meet The Dump Condition group box, click Query.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 4 In the Enable Dumping Periodically group box, set period dump.
Step 5 In the Dump Settings group box, set the dump path.
----End
Through the auto dump of operation logs, you can periodically dump the operation logs in the
N2000 DMS database. This can avoid that the logs reach the maximum storage capacity of the
database and that the system performance is degraded.
Prerequisite
You must be an NMS user with the security watcher authority or higher.
Context
l If the user has the right to browse operation logs, the user can browse operation logs of all
users.
l The group administrator can query operation logs of the users in the managed group.
l The global group administrator and admin can query operation logs of all users.
Procedure
Step 1 Choose System > Browse Log.
Step 2 In the Log Class navigation tree, select Operation Logs. In the right pane, double-click a log
to view its details.
NOTE
If the user has only the right to browse operation logs, the Security Logs node is not displayed.
l Click Print. In the Range dialog box, set the start row and the end row. Then click OK.
l Click Save As. In the Save As dialog box, set the start row, end row, and file name. Then
click OK to save the logs to your local disk.
l Click Dump. In the Confirm dialog box, click OK. The operation logs are saved to the
server.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually.
Step 3 In the Generation Time of Operation Logs group box, set the dump condition.
Step 4 In the Records That Meet The Dump Condition group box, click Query.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 4 In the Enable Dumping Periodically group box, set period dump.
Step 5 In the Dump Settings group box, set the dump path.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Procedure
Step 1 Choose Fault > Browse Remote Notification Logs.
Step 2 In the Browse Remote Notification Logs window, click Filter. In the Filter dialog box, set
filter conditions, and then click OK.
NOTE
l The Browse Remote Notification Logs window displays only the required remote notification logs
according to the filter conditions.
l In the Filter dialog box, click Reset. The filter conditions before modification are restored.
Step 3 In the Browse Remote Notification Logs window, select a remote notification log. The
Notification Message and Failure Reason fields at the bottom of the window display the
detailed notification message and cause for failure.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Procedure
Step 1 Choose Fault > Browse Remote Notification Logs.
Step 2 In the Browse Remote Notification Logs window, right-click a remote notification log, and
then choose Resend Message.
NOTE
If the remote notification log is sent successfully, the Resend Message button becomes grey.
Step 3 In the Confirm dialog box, confirm whether you want to resend the remote notification message.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Procedure
Step 1 Choose Fault > Browse Remote Notification Logs.
Step 2 In the Browse Remote Notification Logs window, right-click a remote notification log, and
then choose Forward Message.
Step 3 In the Forward Message dialog box, enter email addresses or mobile phone numbers. Click
OK.
----End
Prerequisite
You must be an NMS user with the security maintainer authority or higher.
Context
The log forwarding server forwards only security logs, operation logs, and device logs.
Procedure
Step 1 Choose System > Log Forwarding Server.
Step 3 In the Create Log Forwarding Server dialog box, set the server that receives the logs.
NOTE
Step 4 In the Log Forwarding Server dialog box, choose to perform the following operations:
l Select a record, and then click Modify to modify the server information.
l Select a record, and then click Delete to delete the server information.
l Click Refresh to refresh the server information.
l Click Cancel to exit the Log Forwarding Server dialog box.
----End
This describes how to manage N2000 DMS processes and services. Through this function, you
can manage processes and services through the graphical user interface (GUI).
8.1 Processes and Services
This describes the processes and services of the N2000 DMS. The processes of the N2000
DMS are started in four modes. When the system runs normally, multiple processes are started
on the server. Each process provides a specific service.
8.2 Setting Server Thresholds
When the alarm thresholds are set for the alarm server and a value exceeds the threshold, an
alarm is sent to the N2000 DMS, and you can obtain the exception information of the N2000
DMS server in time.
8.3 Monitoring Process Status
Monitoring process status enables you to view the process information on the server. You can
start, stop, and set the process start mode.
8.4 Monitoring Database Status
This function enables you to view the database name, server name, and database status and
understand the running status of the N2000 DMS server. This function helps you identify and
solve problems in time and ensures that the system runs effectively.
8.5 Monitoring the Status of the N2000 DMS Server Performance
Monitoring the performance status enables you to view the system resource information of the
N2000 DMS server.
8.6 Monitoring Hard Disk Status
This section describes how to monitor the hard disk status of the currently logged-in N2000
DMS server.
8.7 Managing N2000 DMS Processes
The N2000 DMS provides the System Monitor Client (a GUI tool) to manage the processes.
You can use the tool to view process information, start or stop a process. You can also set the
process start mode. This helps you to handle emergency faults.
l Automatic
When the system is started, processes are automatically started. In automatic mode, the
system automatically restarts a process if the process is stopped abnormally.
l Manual
When the system is started, processes must be started manually. In manual mode, the system
does not automatically restart a process when the process is stopped abnormally.
l Disabled
When a process is disabled, the system cannot automatically restart the process and you
cannot manually start the process. After you set the process in disabled start mode to the
automatic start mode or the manual start mode, you can restart the process.
l External
It is the fixed start mode of the database server process. This mode cannot be modified.
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
DmsPerfConf It indicates the It can be started None 8900, 9005, 9443, and
Dm performance optionally. It can 9009
configuration be stopped when
process. the IP network
It manages performance
resources, manager is not
resource running.
groups,
templates,
group
templates,
instances, and
group
instances.
Start Dependen
Process Function Description t Process Occupied Port
Start Dependen
Process Function Description t Process Occupied Port
Context
To set N2000 DMS thresholds, you need to have the rights to set the SysMonitor information.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Choose System > Monitor Settings.
Step 3 Click the Threshold tab to set the thresholds.
----End
Context
In routine maintenance, you need to view the process information only. Do not perform other
operations because N2000 DMS services may be affected in case of misoperations.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Click the Process tab. The details of all processes to be monitored are displayed in a table on
the Process tab.
Step 3 From the list, right-click one or more records, and then choose one of the following actions:
l Refresh: To refresh all the information of the selected process.
l Start Process: To start the selected process.
l Stop Process: To stop the selected process.
l Start mode: To change the start mode of the selected process.
NOTE
There are three start modes:
l Automatic: The process restarts automatically after it exits exceptionally.
l Manual: The process does not restart automatically after it exits exceptionally. You need to restart it
manually.
l Disabled: The process cannot be started through the System Monitor Client.
l Details: To query the process information.
----End
Context
When the database usage exceeds the alarm threshold, the System Monitor sends an alarm to
the N2000 DMS server. Meanwhile, the related record on the System Monitor Client turns red.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Click the Database tab. The managed databases are listed in detail.
Step 3 From the list, right-click one or more records, and then choose one of the following actions:
l Refresh: To refresh the information on the selected databases.
l Expand: To expand the data space or log space of selected databases.
----End
Procedure
Step 1 Log in to the System Monitor Client.
----End
Context
When the hard disk usage exceeds the alarm threshold, the System Monitor sends an alarm to
the N2000 DMS server. Meanwhile, the related record on the System Monitor Client turns red.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Click the Disk tab. The hard disk information is listed in detail.
Step 3 From the list, right-click one or more records and choose Refresh to refresh the hard disk
information.
----End
Context
In daily maintenance, you are recommended to view only the process information. Do not
perform other operations. Improper operations might affect the operation of the N2000 DMS.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Click the Process tab. All monitored processes are listed.
Step 3 From the process list, select one or more processes, and then right-click them to choose:
l Start Process to start the selected processes. If a process is already started, you do not need
to restart it.
l Stop Process to stop the selected processes.
l Start Mode to set the start mode of the selected processes.
NOTE
----End
Context
When you start the N2000 DMS service, you can view the startup status of the services on the
Process tab on the System Monitor Client.
Procedure
Step 1 Log in to the System Monitor Client.
----End
Prerequisite
You must be an NMS user with the security maintainer authority or higher.
Context
l You can sample only the process information, database information, and resource
information.
l If -- appears in the sample file, it indicates that the field is meaningless in current state.
l In the Solaris OS, the sample file is saved to $N2000ROOT/server/log/report. In the
Windows OS, the sample file is saved to %N2000ROOT%\server\log\report.
l The default format of the name of a sampling file is systemresourceyear/month/date/
hour/minute/second,databaseyear/month/date/hour/minute/second,processyear/
month/date/hour/minute/second, such as systemresource20080221095842. You can
change the name of a sampling file as required.
l Sampling files can be saved only in the .csv format.
Procedure
Step 1 Log in to the System Monitor Client.
Step 4 In the Process Manual Sampling dialog box, enter a sampling file name.
----End
Prerequisite
You must be an NMS user with the security maintainer authority or higher.
Context
l Automatic sampling applies to only the information on processes, databases, and system
resources.
l If -- appears in the sample file, it indicates that the field is meaningless in current state.
l The report file name does not contain the extension.
l If the sample data is less than 1 KB (the minimum requirement), automatic sampling stops.
l When reported files reach the maximum capacity, the old sampling information is cleared
so that the new information is saved.
l In the Solaris OS, the sample file is saved to $N2000ROOT/server/log/report. In the
Windows OS, the sample file is saved to %N2000ROOT%\server\log\report.
Procedure
Step 1 Log in to the System Monitor Client.
----End
Context
CAUTION
Stopping the N2000 DMS service causes disconnection from the client. Therefore, the
unreserved data on the client cannot be stored or accessed.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Choose System > Stop All NMS Service.
Step 3 In the Confirm dialog box, click OK. The N2000 DMS service stops in 30 seconds.
----End
This describes the concepts about databases, the methods of viewing N2000 DMS databases and
their status, and the methods of backing up, restoring, expanding, and clearing N2000 DMS
databases. The N2000 DMS databases store all data about the interaction between the N2000
DMS and devices. Based on the databases, You can process and view relevant data on the N2000
DMS.
9.1 Basic Concepts About Databases
This describes the N2000 DMS basic databases, and the methods of dumping and backing up
the databases.
9.2 Starting the Database Backup Tool
Start the database backup tool and configure the database server before you back up the database.
9.3 Setting the Database Server
Set the database server before you backup or restore the specific N2000 DMS database.
9.4 Viewing the Database
This operation allows you to view basic information of an N2000 DMS database, including
database size, used size, and created time.
9.5 Setting the Backup Device
The settings of backup device are related to the configuration of backup file path, tape drive,
and other important configuration. Therefore, set the backup device correctly before you perform
backup.
9.6 Setting the Database Set
Databases are backed up based on database sets. Therefore, before backing up databases, you
need to set database sets.
9.7 Configuring the Timing Backup Policy
You can configure the timing backup period and the start time when you add, modify, or delete
the timing policy process.
9.8 Backing Up the N2000 DMS Database Manually
The database backup tool provides two manual backup modes: backup and bcpout. After you
set the parameters for manually backing up a database, the N2000 DMS starts the database
backup immediately.
l FaultDB
l LogDB
l PerfDB
l SecurityDB
l TopoDB
l GnldevDB
NOTE
master, model and tempdb are the system databases.
FaultDB
Alarm data is stored in FaultDB. It is recommended that the data space is not less than 750 MB
and the log space is not less than 500 MB.
LogDB
The NMS user operation logs and related data are stored in LogDB. It is recommended that the
data space is not less than 150 MB and the log space is not less than 75 MB.
The names and functions of tables in LogDB are as follows:
l tbl_Log: It records operation information about NMS users.
l tbl_LogPara: It records personal setting information about NMS user logs.
l tbl_Syslog: It records the Syslog operation information.
l tbl_SyslogServer: It records running information about the Syslog server.
PerfDB
The real-time performance data is stored in PerfDB. It is recommended that the data space is
not less than 40 MB and the log space is not less than 20 MB.
The names and functions of tables in PerfDB are as follows:
l tbl_PerfTmpl: It records performance template information.
l tbl_PerfIndi: It records performance index information.
l tbl_IndiInTmpl: It records information about performance indexes and templates.
l tbl_MibObj: It records information about the Management Information Base (MIB) nodes
that the performance indexes need to access.
l Other tables: They record internal realization information about performance management.
SecurityDB
The security right data is stored in SecurityDB. It is recommended that the data space is not less
than 80 MB and the log space is not less than 80 MB.
The names and functions of tables in SecurityDB are as follows:
l tbl_User: It records user information.
l tbl_Group: It records user group information.
l tbl_CmdSet: It records operation set information.
l tbl_GrantRight: It records information of assigning rights.
l Other tables: They record internal realization information about security management.
TopoDB
The topology data is stored in TopoDB. It is recommended that the data space is not less than
80 MB and the log space is not less than 50 MB.
The names and functions of tables in TopoDB are as follows:
l tbl_Node: It records the data of topology nodes.
l tbl_Submap: It records the data of topology submaps.
l tbl_Link: It records the data of topology connections.
l Other tables: They record internal realization information about topology management.
GnldevDB
The data of third-party devices is stored in GnldevDB. It is recommended that the data space is
not less than 80 MB and the log space is not less than 40 MB.
The names and functions of tables in GnldevDB are as follows:
l tbl_DevTypeAndNodeTypeTab: It records information about the relationships between
device types and node types.
l tbl_IPIfTab: It records information about the list of device interfaces.
l Other tables: They record internal realization information about third-party device
management.
NOTE
The database backup tool is provided as a stand-alone component. This function is supported only when this
component is selected during the installation of the N2000 DMS.
Dump Export data from the l The purpose is to view the data in the
database into a file for future future.
reference. l The source data is deleted.
l The dumped data cannot be recovered
from the file to the database.
Backup Export data from the l The purpose is to recover the data to
database into a file. When the database in case of a fault.
the source data is damaged, l The source data is not deleted.
you can import the backup
data into the database for l The backup data is recovered to the
recovery purpose. database.
Prerequisite
l The network communication between the database backup tool client and the N2000
DMS server is normal.
l The database backup process is normal.
Context
l During the N2000 DMS installation, the N2000 DMS creates a nmsuser user of the
operating system automatically. The nmsuser is responsible for setting environment
variables of the N2000 DMS server and starting the N2000 DMS client at the server. The
nmsuser has all the rights of the directory /nmsuser. The file ./profile in this directory
records environment variables for N2000 DMS running.
l When you install the N2000 DMS, it creates the database user N2000user automatically.
You use this user to access the Sybase database. The N2000user user can manage the
N2000 DMS database. The user N2000user manages the N2000 DMS database through
the N2000 DMS database backup tool.
Procedure
Step 1 Start the database backup tool client as follows:
l Solaris OS: log in to the Solaris operating system as user n2kuser and enter the CDE. Click
Step 2 Choose System > Add Server. In Adding Server, set the server name and IP address.
Step 4 In the navigation tree on the left, choose the server to log in to.
The Login group box is displayed.
Step 5 In the Password text box, enter the password of the N2000 DMS database user N2000user.
----End
Context
l The server name should be unique on one client. It contains alphanumeric characters,
underscore (_) and hyphen (-). It should not contain special characters.
l To delete the N2000 DMS database server, you need to log in to the N2000 DMS database
backup tool first.
Procedure
Step 1 Start the database backup tool.
----End
Context
When you query the databases, you can view the information on all the databases in All
Databases. When you set a database set, you cannot select the filtered databases such as master
and the databases with their names longer than 32 characters.
Procedure
Step 1 Log in to the database backup tool.
Step 2 Choose View > Database. In the All Databases group box, choose the desired database. In the
Description group box, the details of the database are displayed, including Database Name,
Size, Used Size, and Created Time.
----End
Context
l Parameters backup device name and device type are defined by the system automatically.
No modification is allowed.
l If a tape is the backup device and needs to be initialized, in the Backup Devices group box,
select the tape to be initialized. Click Initialize Tape.
l In the Sybase or SQL Server database, only the initialized tape can be used for backup. In
the Sybase or SQL Server database, the data is backed up onto the tape incrementally. For
example, if the capacity of the tape is 20 GB, 100 MB was used for the first backup. Then
the rest space is used for the second backup, with the previous data reserved.
Procedure
Step 1 Log in to the database backup tool.
Step 2 Choose Configuration > Backup Device to configure the backup device.
Step 3 In Backup Devices, select the backup device you want to change. You can select disk or
tape.
l If you select disk, click Modify. The following parameters are displayed.
Parameter Description
Back up to Target backup path set by the user. The path must be an
absolute path. The default value is the backup path at the
same level with the installation path of the N2000
DMS.
Parameter Description
Current backup path Actual backup path. The default value is the backup path
at the same level with the installation path of the N2000
DMS.
Generally, the value of Current backup path is the same
as that of Back up to.
l When an error occurs in the value of Back up to, the
value of Current backup path is automatically
switched to the default backup path the backup path
at the same level with the installation path of the
N2000 DMS.
l If the value of Back up to is restored, the value of
Current backup path is automatically switched to that
of Back up to.
----End
Result
The information of the backup device is displayed in Description.
Context
l The name of a database can only contain letters, numbers, and underscores. The maximum
length of the name is 32 characters.
l The name of a database set must be unique. It contains only letters, numbers, underscores,
and hyphens, and cannot start with an underscore. The name cannot contain a special
character or start with an underscore. The maximum length of the name is 20 characters.
l When setting a database set, you are not allowed to select the filtered databases such as the
master database and the database with an illegal name.
l The name of a database set is case insensitive.
Procedure
Step 1 Log in to the database backup tool.
Step 2 Choose Configuration > Database Set.
----End
Context
l The name of a timing backup policy must be unique. It consists of letters, numbers,
underscores, and hyphens. It cannot contain special characters, begin with an underscore,
or exceed 20 characters.
l If the specific date is last than the 28th of the month and this month does not have the
specific date, the timing backup fails.
Procedure
Step 1 Log in to the database backup tool.
Step 2 Choose Configuration > Auto Backup Policy.
Step 3 Configure the backup policy.
2. After setting the parameters, click Finish. A prompt is displayed, indicating that the
timing backup policy is added successfully. Click OK. The timing backup policy is
displayed in the All Timing Backup Policies group box.
l Modify a timing backup policy.
1. In All Timing Policies, choose a timing backup policy that need be modified. Click
Modify. In Modify Time Policy, set the backup frequency and backup start time.
2. Click Finish. A prompt is displayed, indicating that the timing backup policy is
modified successfully. After confirmation, the timing backup policy information is
refreshed.
l Delete a timing backup policy.
1. In All Timing Policies, choose a timing backup policy that need be deleted. Click
Delete.
The details related to the timing backup policy are displayed.
2. Click Delete.
A prompt is displayed, indicating that the timing backup policy is deleted successfully.
After confirmation, the timing backup policy is removed from All Timing Backup
Policies.
----End
Prerequisite
l The backup device and database set are configured.
l You have the right to back up the database.
l Only n (by default, n = 4) copies of data are allowed in the same database set. During the
manual backup, if the number of data copies in one database set reaches n, the system
prompts whether to delete the earliest data or not. During the timing backup, the earliest
data is deleted without any prompt. The number n can be configured in the
MaxBackupNumber field of diskbak.cfg which is located in the $N2000ROOT/server/
conf/dbback folder of the Solaris system. After the configuration file is modified, you need
to restart the database backup process so that the modification can take effect.
Context
l backup: To back up the data of the database to a data file.
l bcpout: To back up the data of the database user table to a data file. This method cannot be
used for common database backup.
l Use bcpout method to back up the data of the database set, it cannot contains an empty
users database table.
Procedure
Step 1 Log in to the database backup tool.
Step 2 Choose Operation > Manual Backup.
Step 3 In Select Database Set to Backup, select the required database set, and then click Next.
Step 4 In Select Backup Device, select the destination backup device, and then click Next.
----End
Context
Configure the database set, timing backup policy, and backup device first and then configure
the timing backup task.
Procedure
Step 1 Log in to the database backup tool.
Step 2 Choose Operation > Auto Backup Task.
The timing backup task disappears from All Time Backup Tasks.
----End
Procedure
Step 1 Start the database backup tool and log in to the server to be configured.
Step 2 Choose View > Log on the menu bar, or in the navigation tree, click Log under View.
Step 3 In the Check log dialog box, set the following parameters:
l Log type: Select the type to be viewed from All, Backup, and Restore.
l Time range: Select the time range to be viewed from Recent Day, Recent Week, Recent
Month, Recent Three Months, Recent Six Months,Recent Year, and Recent All.
In the Operation Log dialog box, you can view information about the logs as required.
----End
Context
l When the usage reaches 80% of the database space, the database must be expanded. It is
recommended to expand the database to 1.5 times the original space.
l You cannot expand a system database.
l The expanded data space or log space cannot exceed 500 MB.
l With the help of the GUI, you can expand the database only in the database installation
drive.
Procedure
Step 1 Log in to the N2000 DMS through the System Monitor Client.
Step 3 In the database list, right-click one or more records and choose Expand.
Step 4 In the Database Expansion dialog box, fill in Data Expansion Space(MB) and Log Expansion
Space(MB).
----End
Context
l The following describes the procedure for expanding databases, taking the FaultDB
expansion for example.
l Suppose you need to expand the FaultDB to a new device with 512 MB, and the path is /
new_data/.
Procedure
Step 1 Run the following commands to initialize the device.
NOTE
l You can customize the file names of the disk and database. The unit of the parameters is 2 KB.
l vdevno is the device number. Each database device has a unique device number. You can run the isql>
sp_helpdevice command to query the used vdevno. device_number in the returned message is the device
number.
NOTE
The unit of the parameters are MB.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Context
l Auto dump applies to only history alarms.
l After dump, the source data is deleted from the database immediately.
l By default, the N2000 DMS can store a maximum of 50,000 current alarms, and 1,000,000
history alarms. You can modify the maximum number of the history alarms to the maximum
of 2,000,000.
l By default, auto periodic dump starts between 1:00 and 2:00 in the morning; auto overflow
dump starts automatically in 10 minutes after the number of alarms reaches the maximum.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 2 In the Dump Settings dialog box, in the Dump Settings navigation tree, select Alarm Data.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Context
l After dump, the source data is deleted from the database immediately.
l By default, the N2000 DMS can store a maximum of 120,000 event alarms. You can modify
the maximum number of the event alarms to the maximum of 1,000,000.
l By default, auto periodic dump starts between 1:00 and 2:00 in the morning; auto overflow
dump starts automatically in 10 minutes after the number of alarms reaches the maximum.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 2 In the Dump Settings dialog box, in the Dump Settings navigation tree, select Event Data.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 4 In the Enable Dumping Periodically group box, set period dump.
Step 5 In the Dump Settings group box, set the dump path.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 4 In the Enable Dumping Periodically group box, set period dump.
Step 5 In the Dump Settings group box, set the dump path.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Context
After dump, the source data is deleted from the database immediately.
Procedure
Step 1 Choose System > Database > Dump Manually.
Step 2 In the Manual Dump dialog box, in the Manual Dump navigation tree, select Alarm Data.
The file path is similar to the file path for automatically dumping alarm data, if you want to change this
file path, you need to modify the related parameter in System > Database > Dump Settings.
Step 4 Specify the start time and end time of the alarms.
NOTE
If the start time and end time are not specified, all the history alarms in the database are dumped.
Step 5 Click Query to query the alarms that meet the dump conditions.
If you need not dump files, click Delete Dump File. Once the files are deleted, you cannot restore them.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Context
After dump, the source data is deleted from the database immediately.
Procedure
Step 1 Choose System > Database > Dump Manually.
Step 2 In the Manual Dump dialog box, in the Manual Dump navigation tree, select Event Data.
Step 4 Specify the start time and end time of the events.
NOTE
If you do not set the start time and end time, all the events in the database are dumped.
Step 5 Click Query to query the events that meet the dump conditions.
If you do not need a dump file, click Delete Dump File. Once the file is deleted, you cannot restore it.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually.
Step 3 In the Generation Time of Security Logs group box, set the dump condition.
Step 4 In the Records That Meet The Dump Condition group box, click Query.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > Database > Dump Manually.
Step 3 In the Generation Time of Operation Logs group box, set the dump condition.
Step 4 In the Records That Meet The Dump Condition group box, click Query.
----End
Context
This operation uses few system resource and does not affect the system.
Procedure
Step 1 Log in to the Solaris OS as the n2kuser user.
Step 2 Open a terminal window to switch to the root user.
Run the following commands:
$su
Step 3 Run the following commands to clear the log space of the database:
# isql -SN2000DBServer -Usa -P<sa user password>
2>go
For example, run the following commands to clear the log space of the master database:
1>dump tran master with no_log
2>go
----End
This describes how to manage file systems and disks of the N2000 DMS server and client.
Table 10-1 shows the installation directory structure after the N2000 DMS server is installed.
Path Description
backup folder at the same level with To store the configuration file of the database
$N2000ROOT backup tool.
Path Description
Table 10-2 shows the installation directory structure after the N2000 DMS client is installed.
Path Description
$N2000ROOT/client/dbback To store the library files, the configuration files, and the
help files of the database backup tool.
$N2000ROOT/client/dtd To store the files used to define the format of the XML
configuration file.
$N2000ROOT/client/report The report folder is the default folder for you to save a
file as another file.
$N2000ROOT/client/sysmoni To store the configuration files, log files, and help files
of the System Monitor client.
Procedure
l Using the System Monitor Client
1. Log in to the System Monitor Client.
2. Choose the Disk tab.
The disk usage of the server is displayed.
l Using a Command
1. Log in to the Solaris as root.
2. Run the following command to check the disk usage of the active and standby nodes:
# df -k
----End
Context
Do not delete useful files, especially operating system files. Otherwise, the N2000 DMS server
may not run stably.
Procedure
Step 1 Log in to Solaris as the root user.
Step 2 Delete the outdated and useless files:
l Delete the outdated and useless alarm dump files. The default path is $N2000ROOT/
server/dump.
l Delete the outdated and useless log dump files. The default path is $N2000ROOT/server/
dump.
l Delete the outdated and useless database backup files. The default folder is backup at the
same level with $N2000ROOT.
l Delete the outdated and useless N2000 DMS running logs. The default path is
$N2000ROOT/server/log.
l Delete other outdated and useless files, such as installation files and patch files of earlier
versions.
----End
Context
Before you delete a file, ensure that the file is no more needed. Otherwise, the N2000 DMS
client may not run stably.
Procedure
Step 1 Empty the Trash.
Step 2 Delete the files in %N2000ROOT%\client\log.
Step 3 Delete other useless files.
----End
This describes how to perform routine maintenance. Through routine maintenance, you can
detect and rectify potential faults to ensure the secure, stable, and reliable running of the N2000
DMS.
l Configure a Uninterrupted Power Supply (UPS) on the N2000 DMS workstation to protect
the system against hardware corruption, system crash and data loss due to unexpected power
failure.
l Any time you need to power off the N2000 DMS workstation, follow the sequence: exit
the N2000 DMS, exit the database, and shutdown the workstation. Do not directly run
halt (in Solaris) or switch off the power of the hardware, or irretrievable damages might
occur to the N2000 DMS.
l Ensure that the client and the System Monitor is always running after the operating system
is started so that the status of the N2000 DMS can be monitored.
l Maintain a hierarchy of accounts for the N2000 DMS. Each account is available and
accessible to responsible personnel only.
Context
In routine maintenance, you need to view the process information only. Do not perform other
operations because N2000 DMS services may be affected in case of misoperations.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Click the Process tab. The details of all processes to be monitored are displayed in a table on
the Process tab.
Step 3 From the list, right-click one or more records, and then choose one of the following actions:
l Refresh: To refresh all the information of the selected process.
l Start Process: To start the selected process.
l Stop Process: To stop the selected process.
l Start mode: To change the start mode of the selected process.
NOTE
There are three start modes:
l Automatic: The process restarts automatically after it exits exceptionally.
l Manual: The process does not restart automatically after it exits exceptionally. You need to restart it
manually.
l Disabled: The process cannot be started through the System Monitor Client.
----End
Context
When the database usage exceeds the alarm threshold, the System Monitor sends an alarm to
the N2000 DMS server. Meanwhile, the related record on the System Monitor Client turns red.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Click the Database tab. The managed databases are listed in detail.
Step 3 From the list, right-click one or more records, and then choose one of the following actions:
l Refresh: To refresh the information on the selected databases.
l Expand: To expand the data space or log space of selected databases.
----End
Procedure
Step 1 Log in to the System Monitor Client.
Step 3 From the list, right-click one or more records and choose Refresh to refresh the system resource
information of the N2000 DMS server.
----End
Context
When the hard disk usage exceeds the alarm threshold, the System Monitor sends an alarm to
the N2000 DMS server. Meanwhile, the related record on the System Monitor Client turns red.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Click the Disk tab. The hard disk information is listed in detail.
Step 3 From the list, right-click one or more records and choose Refresh to refresh the hard disk
information.
----End
Prerequisite
You must be an NMS user with the security watcher authority or higher.
Context
l Any users can monitor only their own operation logs.
l The group administrator can monitor operation logs of the users in the managed group.
l The global group administrator can monitor operation logs of all users.
l The user operations can be monitored only when the monitoring window is displayed.
Procedure
Step 1 Choose System > Monitor User Operations.
Step 2 In the Monitor User Operations dialog box, click Filter. Set User, Client, Result, and
Operation Level.
----End
Prerequisite
To perform the browse operation, you must be an NMS user with the fault watcher authority or
higher. To perform the acknowledgement or clearance operation, you must be an NMS user with
the fault operator authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the Filter[Unnamed] dialog box, set the filter conditions. Click OK.
NOTE
l You can also click import, choose the exist filter template to import the filter condition to the Filter
[Unnamed] dialog box.
l If the startup template for browsing the current alarms is set, the Filter[Unnamed] dialog box is not
displayed. Instead, the alarms that meet the filter conditions set in the startup template are displayed
directly.
Step 3 In the query result table, click a field to sort the results.
NOTE
l If you click Alarm Source or Alarm Source Type, the NEs are grouped by NE ID. If you click a
different field, the alarm records are sorted in alphabetical order.
l If you click of a field, the results are sorted by this field in ascending order. If you click , the results
are sorted in descending order. Switch between and to sort the result in ascending or descending
order.
If the alarm is unacknowledged and cleared, it is moved to the history alarm database.
l Choose Clear to clear the alarm.
NOTE
l If the alarm is unacknowledged and uncleared, the alarm status changes to Unack&Cleared after
clearance.
l If the alarm is acknowledged and uncleared, it is moved to the history alarm database.
l Choose Locating to Topo Object to locate the topology object that raises the alarm.
l Choose Save Selected Records to save the selected records to a file.
Step 5 Select Display latest alarms to query new alarms in real time.
NOTE
Step 6 Click the buttons in the lower part of the browse window:
l Click Refresh to synchronize the latest alarms to the NMS interface according to the filter
conditions.
l Click Acknowledge to acknowledge the selected unacknowledged alarms.
l Click Clear to clear the selected uncleared alarms.
l Click Print to print the alarm information.
l Click Save As to save the alarm information as a file. You can also specify the rows to be
saved.
----End
Context
Information about exceptions that affect the OS running does not exist.
Procedure
Step 1 Log in to the Solaris OS as the n2kuser user.
$ su
Step 3 Run the following command to access the directory of the log files:
# cd /var/adm
Step 4 Run the following command to view the OS log files with the file names beginning with
message:
# more messages
----End
Postrequisite
If the exception log information exists, rectify the fault according to the error information in the
log file. You can also contact Huawei technical personnel.
Context
Information about errors that affect the database running is not in the log file.
Procedure
Step 1 Log in to the Solaris OS as the n2kuser user.
Step 2 Open a terminal window to switch to the root user.
Run the following commands:
$ su
Step 4 Run the following commands to view the log files of the primary database and backup database
respectively.
# more N2000DBServer.log
# more N2000DBServer_back.log
----End
Reference Index
Information about errors that affect the database running is not in the log file.
Postrequisite
If the abnormal log information exists, rectify it according to the error information in the log
file. You can also contact Huawei technical personnel.
This describes how to view the N2000 DMS server time through the date command to ensure
the consistency of the system time and the actual time.
11.4.4 Manually Backing Up an N2000 DMS Database
This describes how to manually back up data in an N2000 DMS database. You can perform the
manual backup operation when the load of the N2000 DMS server is low.
11.4.5 Backing Up Databases Periodically
When a periodic backup condition is set in advance, the N2000 DMS will automatically back
up the databases at the specified time.
Context
When the hard disk usage exceeds the alarm threshold, the System Monitor sends an alarm to
the N2000 DMS server. Meanwhile, the related record on the System Monitor Client turns red.
Procedure
Step 1 Log in to the System Monitor Client.
Step 2 Click the Disk tab. The hard disk information is listed in detail.
Step 3 From the list, right-click one or more records and choose Refresh to refresh the hard disk
information.
----End
Procedure
Step 1 Log in to the Solaris OS as the n2kuser user.
Step 2 Open a terminal window to switch to the root user.
Run the following commands:
$ su
----End
Reference Index
In the Solaris OS, no hardware errors exist in the information.
For example, run the iostat -E command to view hard disk information. Check whether Hard
Errors of sd1 is 0. If Hard Errors is 0, the physical status of the hard disk is normal.
sd1 Soft Errors: 0 Hard Errors: 0 Transport Errors: 0 Vendor: SEAGATE Product:
ST373307LSUN72G Revision: 0507 Serial No: 3HZ9JBYN000 07518 Size: 73.40GB
"73400057856 bytes" Media Error: 0 Device Not Ready: 0 No Device: 0 Recoverable: 0
Illegal Request: 0 Predictive Failure Analysis: 0
Exception Handling
If the hard disk fails, refer to the relevant operation guides provided by Sun Microsystems Inc
to replace the disk.
Procedure
Step 1 Log in to the Solaris OS as the n2kuser user.
$ date
----End
Postrequisite
If the server time is incorrect, do as follows:
l Change the server time
l Check and change the running status of the NTP service
Prerequisite
l The related backup device and database set are configured.
l The backup device is configured.
l The value n is set through the MaxBackupNumber field in the diskbak.cfg configuration
file. The diskbak.cfg configuration file is in the $N2000Root/server/conf/dbback path.
Procedure
Step 1 Start the database backup tool and log in to the server to be configured.
Step 3 In the Select Database Set to Backup area, select the database set to be backed up, and then
click Next.
Step 4 Select the backup device, and then click Next.
l If the backup device is disk, click Next to perform Step 5.
l If the backup device is tape, perform Step 6.
NOTE
l backup: In this mode, the data is backed up from the database to a specified file.
l bcpout: In this mode, the data in the database user table is backed up to a specified file. You cannot
select this mode for the general database backup.
----End
Context
You have to configure database set, time backup policy and backup device before you can
configure a periodic backup task.
Procedure
Step 1 Log in to the database backup tool.
Step 2 Choose Operation > Auto Backup Task, and configure the timing backup task by adding or
deleting.
l Add a timing task
1. Click Add, in the Select Database Set, select the desired database set. Click Next.
2. In the Select Time Backup Policy, select the desired backup policy. ClickNext.
3. In the Select Backup Device group box, select the backup device, and then click
Finish.
A dialog box is displayed to prompt that the addition is successful. Click OK. The backup
task is displayed in All Time Backup Tasks.
l Delete a timing task
1. In All Time Backup Tasks, choose the timing backup task to be deleted. Click
Delete.
2. Details on the timing backup task are displayed. Click Delete. A dialog box is
displayed to prompt that the deletion is successful. Click OK.
The timing backup task disappears from All Time Backup Tasks.
----End
Procedure
Step 1 Check whether the server hardware is damaged.
----End
Postrequisite
If the server hardware and peripherals are damaged, contact the manufacturer to repair or replace
the damaged devices.
Procedure
Step 1 Log in to the Solaris OS as the root user.
Step 2 Run the following command to back up the files of the Solaris OS to a tape:
NOTE
In the command, /dev/rmt/0n refers to the backup tape.
l /etc/hosts
l /etc/netmasks
l /etc/nodename
l /etc/hostname.* (The asterisk (*) is the name of the network adapter, such as ce0. You can
view the name through the ifconfig -a command.)
l /etc/net/ticlts/hosts
l /etc/net/ticots/hosts
l /etc/net/ticotsord/hosts
l /etc/profile
l /etc/rc3
l /etc/rc3.d
l /n2kuser
Step 3 Run the following command to back up the files of the Sybase database to a tape:
Step 4 Run the following command to back up the N2000 DMS files to a tape:
----End
Procedure
Step 1 Log in to the N2000 DMS as admin.
Step 3 In the NMS User Management window, delete the rights of the N2000 DMS users.
l Delete discarded user accounts in time. When a device is added, assign proper rights to the
user of this device.
l Assign user rights by user group and operation set. Add users with the same rights to the
same group. To ensure that the NMS runs properly without performances being affected,
avoid assigning rights to users one by one.
----End
Prerequisite
You must be an NMS user with the security operator authority or higher.
Procedure
Step 1 Choose System > NMS User Management.
Step 2 In the Security Object navigation tree, expand the Users node. Right-click a user and choose
Set Password.
Step 3 In the Set New Password dialog box, enter the new password twice, and then click OK.
NOTE
If you want to change the current user password, open the Change Password dialog box. In the dialog
box, enter the current password and your new password. Click OK.
----End
Context
l When you collect alarm statistics, you can set the common statistical conditions provided
by the N2000 DMS as statistical templates. You can also specify a statistical template as
the startup template. But only one statistical template can be specified as the startup
template.
l If you have not specified the startup template, you can choose Fault > Alarm Statistics
on the N2000 DMS client. Then a statistical condition dialog box is displayed.
l If you have specified the startup template, the statistical condition dialog box is not
displayed. The N2000 DMS collects alarm statistics according to the statistical conditions
set in the startup template.
Procedure
Step 1 Choose Fault > Alarm Statistics.
Step 2 In the Statistical Condition[Unnamed] dialog box, set the statistical conditions. Because only
the alarm statistics of the current month are collected, you should choose Month from Row
heading and set the generated time in the Generated Time box. You also can set other statistics
conditions as required. Click OK after setting all the conditions. At that time, the statistics results
are displayed in list form.
NOTE
l If there is a desired template for collecting monthly alarms, you can click Import in the Statistical Condition
[Unnamed] dialog box. In the Import dialog box, select the template and click Import. The statistical
conditions in the template are imported to the Statistical Condition[Unnamed] dialog box. Click OK.
l If you have specified a startup template, the Statistical Condition[Unnamed] dialog box is not displayed.
To collect statistics on monthly alarms, you need to click Statistical Condition for collecting statistics on
monthly alarms in the Alarm Statistics.
Step 3 Click Statistics by Template and select Save As. In the Save As dialog box, enter the template
name. Click OK. The statistical conditions set in the previous step are saved as a template.
When you collect the monthly alarm statistics next time, you can use this template by performing
the import operation.
Step 4 Click Statistics by Template and select Open. In the Open dialog box select the template
created in the previous step. Click Set Startup Template. This template is specified as the
startup template.
When you open the Alarm Statistics window again, the statistical results according to the
statistical conditions set in the startup template is displayed.
----End
Context
The system running logs are stored in the following paths:
Procedure
Step 1 Open log files in the paths that stores the system logs.
If exception information exists in a log, locate the faults according to the relevant prompt
information.
----End
Check the ambient temperature of an equipment room and the fan status according to the
following table.
Table 11-2 Checking the ambient temperature of the equipment room and the fan status
Item Specification
Temperature 15C-35C
Cleanness of the fan frame The fan frame is clean and free of dusts.
Context
Do not delete useful files. In particular, do not delete OS files. Deleting system files may result
in system crash. It is recommended not to delete the files generated in recent three days.
Procedure
Step 1 Log in to the Solaris OS as the n2kuser user.
$ su
Step 3 Delete the alarm files that were automatically dumped and outdated (Default Path:
$N2000ROOT/server/dump).
NOTE
Compare the creation time and the modification time of a file with the current system time. If a file was
created long time ago and has not been used for a long time, the file is outdated.
Step 4 Delete the unnecessary core files and stack files (Default Path: $N2000ROOT/server/conf).
Step 6 Delete the log files that were automatically dumped and outdated (Default Path: $N2000ROOT/
server/dump).
Step 7 Delete the performance data files that were automatically backed up and outdated (Default Path:
$N2000ROOT/server/HisDataBackup).
Step 8 Delete the database files that were automatically backed up and outdated (Default Path:
$N2000ROOT/backup).
Step 9 Delete the DC backup files that are outdated. The default path is the initial FTP server path set
on the N2000 DMS. You can choose System > System Parameters Setting > NMS FTP/TFTP/
SFTP Server Setting on the client to view the initial path.
Step 10 Delete the N2000 DMS running log files that were outdated (The default path is $N2000ROOT/
server/conf/log).
Step 11 Delete other files that were outdated, such as program installation files and patch installation
files of previous versions.
----End
Item Specification
Temperature 15C-35C
Humidity 30%-60%
Regulate the temperature and humidity of the equipment room, improve the tightness of the
doors and windows, and clean the room periodically.
This describes the preparations for emergency maintenance, the operation guide to emergency
maintenance, and the test after maintenance.
Start
Preparations
System Yes
recovery
No
Contact Huawei technical
support
End
CAUTION
Preparations include backing up the Solaris program files, Sybase data files, N2000 DMS
program files, and N2000 DMS data files. You need to routinely back up these files so that you
can restore them when the system collapses. If the files are not backed up before the collapse,
you can only restore the system to the initial condition and the data before the collapse cannot
be restored.
Backup Tapes
Before performing the maintenance, you need to prepare the following backup tapes:
l The latest backup tape of the N2000 DMS data
l The latest backup tape of the N2000 DMS file
l The latest backup tape of the Sybase file
l The latest backup tape of the Solaris system file
NOTE
Generally, all data and files can be backed up to one tape. You can prepare one tape.
Installation Disks
You may reinstall the OS and database when performing the emergency maintenance. Thus, you
need to prepare the following installation disks:
l SUN Solaris 10 (08/07), Multilingual Version, SPARC Platform Edition and Huawei Patch
7.0.3 (DVD)
l Sybase12.5.2 for Solaris(SPARC) installation disk and Sybase Patch EBF13325
l N2000 DMS software (disk)
References
You need to prepare the iManager N2000 DMS Datacomm Network Management System
Installation Guide - Solaris.
12.4.1 Reinstalling OS
This describes how to rectify a fault by reinstalling the OS.
12.4.2 Reinstalling Database
This describes how to rectify a fault by reinstalling the database.
12.4.3 Reinstalling the N2000 DMS Software
This describes how to rectify a fault by reinstalling the N2000 DMS software.
12.4.4 Restoring the Solaris System Files
This describes how to restore the Solaris system files.
12.4.5 Restoring the Sybase Files
This describes how to restore the Sybase files.
12.4.6 Restoring the N2000 DMS Files
This describes how to restore the backup N2000 DMS files to the restored OS.
12.4.7 Restoring the N2000 DMS Data
This describes how to restore the N2000 DMS data.
12.4.1 Reinstalling OS
This describes how to rectify a fault by reinstalling the OS.
Procedure
Step 1 To reinstall OS, refer to the iManager N2000 DMS Datacomm Network Management System
Installation Guide - Solaris.
----End
Prerequisite
Before restoring the N2000 DMS files, stop all N2000 DMS services.
Procedure
Step 1 Log in to the N2000 System Monitor.
Step 2 Choose System > Stop All NMS Service.
Step 3 In the dialog box, click OK.
All N2000 DMS services are shut down.
Step 4 To use the tape drive to restore the N2000 DMS files, run the following command:
# ufsrestore rf /dev/rtm/0n
Step 5 To shut down the Sybase service with the isql tool, run the following commands:
# cd /opt/sybase/OCS-12_5/bin
2> go
1> shutdown
2> go
----End
Procedure
Step 1 Run the following commands to check whether the N2000 DMS service is started:
# ps -ef|grep mdp
# ps -ef|grep EmfSysMoniDm
If the information of the EmfSysMoniDm and mdp processes is displayed, the N2000 DMS
service is started.
Step 2 Log in to the N2000 System Monitor to view the statuses of all N2000 DMS processes.
Step 3 Log in to the N2000 DMS client to view the restoration of the N2000 DMS.
----End
Procedure
Step 1 Run the following commands to check whether the Sybase service is started:
# cd /opt/sybase/ASE-12_5/install
# ./showserver
If the following information is displayed, the server and the backup server of the database are
started normally.
UID PID PPID C STIME TTY TIME CMD root 895 894 0
12:48:41 ? 0:32 /opt/sybase/ASE-12_5/bin/dataserver -d/opt/sybase/data/
master.dat -e/opt/sybase root 901 900 0 12:48:41 ? 0:00 /opt/sybase/
ASE-12_5/bin/backupserver -e/opt/sybase/ASE-12_5/install/N2000DBSer
Step 2 Run the following commands to check whether you can set up the database connection:
# cd /opt/sybase/OCS-12_5/bin
If the following information is displayed, the database server can be connected and the database
is normal.
1>
You can run the quit command to quit the isql program.
----End
Context
After the N2000 DMS server is started, the data is synchronized between the mirrored disk and
the data disk.
Procedure
Step 1 Log in to the Solaris OS as the root user.
Step 2 Run the following commands to check whether the disk mirroring is synchronizing data:
# cd /usr/sbin
The data is being synchronized and the number indicates the progress of the data synchronization.
If no information is displayed, the data synchronization is complete.
----End
You can also obtain the latest technical documents from http://support.huawei.com.
This chapter describes the procedure for handling a fault, information collecting, fault
identifying, fault handling, and suggestions on N2000 DMS troubleshooting.
Flow Chart
Figure 13-1 shows the flow for handling a fault.
Procedure
The fault handling procedure shown in Figure 13-1 is described inTable 13-1.
1 Find out a fault. You need to find out and handle the fault in time to reduce
loss. For details, see 13.3 Discovering a Fault.
2 Check whether the If the fault leads to an N2000 DMS alarm, perform Step 3.
fault leads to an iMAP
alarm.
3 Handle the iMAP If the fault leads to an N2000 DMS alarm, handle the alarm
alarm according to the according to the operation guide. For details, see 13.4
operation guide. Handling the N2000 DMS Alarm. If the fault is not
rectified after the alarm disappears, perform Step 4.
4 Collect fault Check whether the fault is emergent according to the fault
information. information. See 13.5 Collecting Fault Information.
5 Check whether the If the fault is emergent, perform Step 6. Otherwise, perform
fault is emergent. Step 7.
7 Find out the fault Determine the fault cause according to the collected fault
cause. information. See13.6 Determining Fault Causes.
8 Rectify the fault. Rectify the fault by analyzing the fault cause. See13.7
Eliminating a Fault.
9 Check whether the Check whether the fault is rectified completely. See 13.8
fault is rectified. Checking Whether the Fault Is Cleared.
10 Contact the Huawei Contact the Huawei technical support personnel if the fault
technical support persists.
personnel.
11 Record the alarm After the fault is rectified, record the fault handling
maintenance experience in the alarm knowledge base for future
experience. reference. See 13.9 Recording Alarm Maintenance
Experiences.
l Record all the information about a fault. Do not delete any data or log.
l Back up the configuration and the data before you make any change.
l When you rectify a fault of the N2000 DMS, ensure that this does not affect the running
of the NEs.
13.4.1 Port Connection Interrupted Between NMS and Command Line Device
13.4.2 CPU Alarm of the NMS Server
13.4.3 Hard Disk Alarm of the NMS Server
13.4.4 NMS Server Physical Memory Alarm
13.4.5 NMS Server Virtual Memory Alarm
13.4.6 NMS Server Database Data Space Alarm
13.4.7 NMS Server Database Transaction Log Space Alarm
13.4.8 Availability of the NMS Server Service Alarm
13.4.9 Illegal Login Alarm
13.4.10 Trap Receiver Disconnection
13.4.11 NMS NE License Alarm
13.4.12 Avalanche Alarm
13.4.13 The Number of Records in the Database Table Reaches the Threshold
13.4.14 Switch to the Slave Syslog Server
13.4.15 Failed to Connect the Syslog Server
13.4.16 NMS Client Exits Abnormally
13.4.17 Sending the Remote Notification SMS Gateway Message Fails
Attribute
Alarm Severity Alarm Type
Major Running
Possible Causes
l The network is faulty.
l The port connections of the command line device reach the maximum number.
Procedure
Step 1 Check whether the connection between the command line device and the N2000 DMS server is
normal.
Step 2 Check whether the connection number of the port of the device is maximum. If yes, release some
connections.
----End
Attribute
Alarm Severity Alarm Type
Major Running
Possible Causes
l The N2000 DMS operators are performing query operations which require a large number
of data.
l The N2000 DMS service processes are performing busy tasks on the server.
l The memory shortage leads to frequent system dispatch.
l The specified alarm threshold for the usage of the N2000 DMS CPU is too small.
Procedure
Step 1 Close the processes irrelevant to the N2000 DMS.
Step 2 Close some clients that are not used.
Step 3 Pause all operations on the N2000 DMS. Resume after the alarm is cleared.
Step 4 Adjust the alarm threshold for the usage of the N2000 DMS CPU.
----End
Attribute
Alarm Severity Alarm Type
Major Running
Possible Causes
l There is a large number of data and data records.
l The initial disk partition is small. And the N2000 DMS partition is far from being enough.
l The hard disk space is too small to store a large number of data.
Procedure
Step 1 Delete redundant files which are irrelevant to the N2000 DMS. In the Solaris system, run the
rm -rf command to delete files and directories. Do not delete the contents in the N2000 DMS
directory or in the database installation directory.
Step 2 Check whether the dump files in $N2000ROOT/server/dump(Solaris) occupy a large space.
If yes, you can either delete the dump files or back them up in another memory device. The
deletion of the dump file does not impact system running.
Step 3 Enlarge the disk space. If the disk space where the N2000 DMS is located in shortage, consider
enlarging the disk space.
Step 4 Adjust the alarm threshold for the usage of the N2000 DMS disk space.
----End
Description
The memory usage exceeds a threshold. When the usage of the physical memory exceeds a
specified threshold (95% by default), the system monitor server sends alarms to the faulty server.
You can set the threshold in the System > Monitor setting on the system monitor client.
Attribute
Possible Causes
l Physical memory is too small.
l NMS processes occupy large percentage of the system memory.
l The processes irrelevant to the N2000 DMS are started.
l NMS operators are performing the operations which require a large number of data.
l The specified alarm threshold for the usage of the N2000 DMS memory is too small.
Procedure
Step 1 Enlarge the physical memory. In case of memory shortage, the physical memory needs to be
enlarged. You are recommended to enlarge the memory to more than 512 MB.
Step 2 Analyze the processes that occupy large memory. If the memory occupied by a process keeps
increasing, the process may be in error.
NOTE
l On the System Monitor Client, click the Process tab. You can view the memory usage by the N2000
DMS process.
l On Windows, you can view the memory usage on the Process tab of Windows Task Manager.
l On Solaris, you can view the memory usage through the process management application.
Step 4 Pause all N2000 DMS operations. Resume after the alarm is cleared.
Step 5 Adjust the alarm threshold for the usage of the N2000 DMS memory.
----End
Description
When the system monitors that the virtual memory of the operating system is insufficient, it
notifies the alarm module to raise a major alarm.
Attribute
Alarm Severity Alarm Type
Major Running
Possible Causes
l The number of programs running on the server is large.
l Some programs have been running for a long time and cannot release the occupied virtual
memory space in time.
l The size of the virtual memory set for the operating system is small.
Procedure
Step 1 Check the usage of virtual memory and stop unnecessary processes.
Step 2 Check the usage of virtual memory and restart the processes occupying a large virtual memory
space.
----End
Description
If the usage of the data space exceeds the threshold (95% by default), the N2000 DMS raises an
alarm. You can set the threshold by choosing System > Monitor Settings in the System Monitor
Client window.
Attribute
Possible Causes
l Too many alarm data records exist.
l The data space specified when you install the N2000 DMS is too small.
l The specified alarm threshold for the usage of the data space is too small.
Procedure
Step 1 In the System Monitor Client window, on the Database tab, right-click the database that needs
to be expanded to increase the data space. Select Expand from the shortcut menu and enter a
value in MB to specify the expanded space.
Step 2 Adjust the alarm threshold for the usage of the N2000 DMS data space.
----End
Description
The usage of the database log space exceeds the threshold. If the usage of the database log space
exceeds the specified threshold (80% by default), the N2000 DMS raises an alarm. You can set
the threshold by choosing System > Monitor Settings on System Monitor Client.
Attribute
Alarm Severity Alarm Type
Major Running
Possible Causes
l The log space assigned to the database is too small. You can view the size and use rate of
the log space in the current database through the Database tab in the System Monitor
Client window.
l The specified alarm threshold for the usage of the N2000 DMS database log space is too
small.
Procedure
Step 1 To increase the database log space, you can right-click the database whose log space needs to
be expanded on the Database tab in the System Monitor Client window. Select Expand from
the shortcut menu and enter a value in MB to specify the expanded space.
Step 2 Adjust the alarm threshold for the usage of the N2000 DMS database log space.
----End
Attribute
Alarm Severity Alarm Type
Major Running
Possible Causes
l A process exits abnormally.
l A process still fails after the times of automatic restarting reach the maximum.
Procedure
Step 1 Log in to the system monitor client.
Step 2 Click the Process information tab. Find the abnormal process. Right-click the process to restart
it.
----End
Description
If a user tries to log in to the N2000 DMS using an invalid password for three times continuously,
the system security server sends an alarm to the faulty server.
Attribute
Possible Causes
A user tries to log in to the N2000 DMS server using an invalid password for three times
continuously.
Procedure
Step 1 Check whether the user is an illegal user who wants to invade the N2000 DMS.
Step 2 If a legal user forgets the password, ask the user whether to initialize the password.
----End
Description
The alarm module contains two functional sub-modules: Trap receiver and fault process. The
Trap receiver receives SNMP alarms and analyzes them. The fault process handles the alarms
and receives the MML alarms. When an exception occurs in the connection between the Trap
receiver and the fault process, an alarm on Trap receiver disconnection is raised.
Attribute
Alarm Severity Alarm Type
Major Communication
Possible Causes
The Trap receiver process runs abnormally.
Procedure
Step 1 Restart the Trap receiver.
Log in to the N2000 DMS client. Choose Fault > Settings > Trap Receiver. In the Trap
Receiver dialog box, select the Trap receiver and click Restart.
Step 2 Restart the faulty process.
Log in to the System Monitor Client. Click the Process tab. Right-click the faulty process and
select Start Process from the shortcut menu.
----End
Attribute
Alarm Severity Alarm Type
Major Running
Possible Causes
The license usage exceeds the preset threshold.
Procedure
Step 1 On the client, choose System > NE License Alert. In the NE License Alert dialog box, check
the threshold of the NE license alarm. Change the threshold to a reasonable value if the original
one is too small.
Step 2 Check the threshold of the NE license alarm. If it is reasonable, choose Help > About on the
client. In the About dialog box, click the Lincense tab to check the usage of the network element
license. Apply for new license authorization based on the usage.
----End
Description
In the Fault > Settings > Correlation Rule window, click the Alarm/Event Frequecy
Analysis tab. Create a record and set the triggering condition. The NMS alarms that satisfy the
condition are called avalanche alarms.
Attribute
Possible Causes
The current alarm or event reported to the N2000 DMS exceeds the preset threshold.
Procedure
Step 1 View the alarm information.
----End
Description
The usage of some tables in the N2000 DMS server database exceeds the threshold.
Attribute
Alarm Severity Alarm Type
Minor Running
Possible Causes
l The specified threshold is too small.
l The specified database space is too small.
l The amount of the N2000 DMS data is too large due to long time running of the device.
Procedure
Step 1 Increase the threshold of the used database space.
(1) Log in to the N2000 DMS client.
(2) Choose System > Database > Dump Settings. The Dump Settings dialog box is displayed.
(3) In the Overflow Dump group box, increase Record threshold-crossing value(%).
----End
Description
Switch to the slave system log server when connecting the master system log server fails.
Attribute
Alarm Severity Alarm Type
Minor Communication
Possible Causes
The master system log server is not started or the network is faulty.
Procedure
Step 1 Check whether the master system log server works normally. For the details on checking whether
the master system log server is started and whether the master system log server works normally,
see the description of the third party system log server.
Step 2 Use the ping command to check whether the network where the master system log server resides
is connected normally. For example, ping the IP address or host name of the PC where the master
system log server resides.
----End
Description
The N2000 DMS forwards the operation logs to the system log server regularly. When an
exception occurs in the connection between the N2000 DMS server and the master or slave
system log server, the N2000 DMS raises the Failed to connect the syslog server alarm.
Attribute
Alarm Severity Alarm Type
Major Communication
Possible Causes
The master and slave system log servers are not started, or the network is faulty.
Procedure
Step 1 Check whether the master and slave system log servers work normally. For the details on
checking whether the master and slave system log servers are started and whether the servers
work normally, see the description of the third party system log server.
Step 2 Use the ping command to check whether the network where the master and slave system log
servers reside is normally connected. For example, ping the IP address or host name of the PC
where the system log server resides.
----End
Description
The security module forces out the client due to no handshake message being received for a long
time. "NMS client exits abnormally" is an event.
Attribute
Possible Causes
The security module forces out the client due to no handshake message being received for a long
time.
Procedure
Step 1 Check and remove the causes of the exception:
(1) Check whether the Client well connects with the N2000 DMS Server.
(2) Check if the Client is closed abnormally like abnormal turnoff of the computer.
(3) Check whether the Client is forced to exit.
Step 2 Wait some time for logging in to theN2000 DMS Server again.
----End
Attribute
Alarm Severity Alarm Type
Major Running
Possible Causes
l The SMS gateway parameter is incorrect.
l Failed to connect to the SMS gateway.
Procedure
Step 1 View the remote notification log and find out the causes.
(1) Log in to the N2000 DMS client.
(2) Choose Fault > Browse Remote Notification Logs.
(3) In the Browse Remote Notification Logs window, search for the remote notification log
for the failure and find out the cause.
Step 2 Reset the SMS gateway parameter according to the remote notification log, and then test whether
the remote alarm notifications are sent successfully.
(1) Log in to the N2000 DMS client.
(2) Choose Fault > Settings > Remote Notification in the main menu.
(3) In the Remote Notification window, click Communication Settings.
(4) On the SMS tab of the Communication Settings dialog box, choose SMS gateway.
(5) Reset the SMS gateway parameter according to the remote notification log, click Test, and
then enter Mobile phone.
NOTE
The format is country code+mobile phone number. For example, if the country code is 86 (China) and the
mobile phone number is 13900001234, you need to enter 8613900001234.
----End
about the fault. This section describes how to collect fault information, and this helps you to
identify a fault efficiently.
13.5.1 Collecting the Alarm Information
This section describes how to collect the alarm information on the N2000 DMS when a fault
occurs.
13.5.2 Collecting the Log Information
This section describes how to collect the log information when a fault occurs.
13.5.3 Collecting the Version Information
This section describes how to collect the version information when a fault occurs.
13.5.4 Collecting the Core File
This section describes how to collect the core file.
13.5.5 Collecting the Process Running Information
This section describes how to collect the process running information.
Database Log
The logs of the Sybase database are stored in $SYBASE/ASE-*/install/SYB_server.log and
$SYBASE/ASE-*/install/SYB_server_back.log.
NOTE
OS Version
To view the versions of the Solaris OS and its patches, run the following command:
# uname -a
l On Solaris 8
SunOS Server 5.8 Generic_117350-02 sun4u sparc
SUNW, SUN-Blade-2500
Database Version
To view the versions of the Sybase and its patches, run the following commands:
# cd /opt/sybase/OCS-12_5/bin/
2> go
NOTE
If you cannot start the client of the N2000 DMS or the Sysmonitor, do as follows to view the
versions in the directory.
Device Version
If the N2000 DMS fault is related to a device, obtain the device version with one of the following
two methods:
l On the N2000 DMS client, right-click the device and choose the shortcut menu to view
device details or open the device panel. You can also view the host version and the board
version.
l Log in to the device in Telnet mode and run the related commands to view the host version
and the board version.
NOTE
l In the above command, the core file is saved in the /home/corefiles directory. You can specify
another directory according to the actual condition.
l As the core file is large, the specified directory and the $N2000ROOT cannot be placed on the
same partition. If there are two partitions / and /opt, you need to save the core file to the /opt
partition.
l You can also specify a fixed name for the core file. Thus, the latest core file overwrites the old
one, and the occupied space is not enlarged. This method, however, is not recommended because
the information may be lost when the core dump of several processes occurs.
To specify a fixed name, run the following command: coreadm -e global -g /home/corefiles/
coredump.
If core.* files exist in the directory of the core file, it indicates that the core dump occurs.
Save these files for further analysis.
Run the coreadms -d global -d process command to disable the function of automatically
obtaining the core file.
CAUTION
After collecting the core file, disable the function of automatically obtaining the core file.
Otherwise, the disk occupancy is large.
1. After receiving an alarm, follow the operation guides of the troubleshooting manual to
handle the fault.
2. If there is no alarm, handle the fault based on the maintenance experiences and measures
collected in the troubleshooting cases.
3. If you need assistance from on-site engineers, inform them of the fault and guide them in
handling the fault.
4. Check whether the fault is removed. If not, report it to the senior engineer.
Before contacting Huawei technical support engineers, do as follows to rectify the fault fast and
reduce loss:
Huawei technical support engineers may guide you to operate the device, so as to collect the
fault information and eliminate the fault.
Procedure
Step 1 Log in to the N2000 DMS client.
Step 3 Set the alarm filtering conditions in the Filter dialog box, and then click OK.
The queried result is displayed in the Browse window under the tab. If you can find the current
alarms that match the conditions, it indicates that the fault is not cleared; otherwise, the fault is
cleared.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Context
You cannot roll back the operation of clearing an alarm.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the Current Alarms window, right-click an alarm and choose Clear.
----End
Result
l The N2000 DMS changes the status of an alarm to Cleared. The N2000 DMS records when
the alarm is cleared and who performs this task. It also refreshes the information in all
windows on the client and updates the data of the alarm panel and alarm box.
l If an alarm is acknowledged and cleared, it is dumped to the history database.
Procedure
Step 1 Log in to the System Monitor.
Step 2 In the System Monitor window, check whether the performance index (such as, server process
or database) is normal.
----End
Prerequisite
You must be an NMS user with the fault operator authority or higher.
Procedure
Step 1 Choose Fault > Settings > Maintenance Experience.
Step 2 In the Alarm/Event navigation tree, select an alarm, and then click Edit.
Step 3 In the Edit dialog box, enter the experience of handling this alarm.
NOTE
The alarm experience cannot exceed 250 characters.
----End
This describes the common problems and solutions for maintaining the N2000 DMS.
14.1 Solaris OS
This describes common problems in the Solaris OS.
14.2 Sybase Database
This describes common problems of using the Sybase database.
14.3 N2000 DMS Software
This describes common problems of using the N2000 DMS software.
14.4 Security Management
This describes how to process the common problems in user right management and license
management.
14.1 Solaris OS
This describes common problems in the Solaris OS.
14.1.1 How to View the Concrete Version and Date of the Solaris OS
14.1.2 How to Start the Workstation from the CD-ROM
14.1.3 How to Rectify the Fault That the CD-ROM Cannot Be Ejected
14.1.4 How to Transfer Binary Files Through FTP
14.1.5 How to Rectify the Fault That the Executable Right of an Executable File Is Lost
14.1.6 How to Decompress the *.tar.gz File
14.1.7 How to Log in as the root User When Using the Telnet
14.1.8 How to Log in as the root User When Using FTP
14.1.9 How to View the Hardware Configuration of the Server
14.1.10 Starting the N2000 DMS as the root User Failed
14.1.11 Why Does the N2000 DMS Server Process Exit When I Press Ctrl+C
14.1.12 How to Set the ACL for a Server with Multiple Network Adapters
14.1.1 How to View the Concrete Version and Date of the Solaris
OS
Problem Description
When maintaining the Solaris OS, how to view the version and date of the Solaris OS?
Solution
Run the following command to view the version information of the Solaris OS:
# uname -a
Run the following command to view the release date of the Solaris OS:
# more /etc/release
Problem Description
How to start the Sun workstation through the CD-ROM?
Solution
Perform the following operations on the Sun workstation:
Solution
1. Run the following command as the root user:
# /etc/init.d/volmgt stop
2. Press the eject button on the drive panel to take out the disk from the CD-ROM.
3. Run the following command to resume the drive:
# /etc/init.d/volmgt start
Solution
To transfer binary files, such as the N2000 DMS installation file or the database interfaces file,
use the binary codes. Otherwise, the file size may change.
By default, FTP uses ASCII codes to transfer files. To transmit binary contents, you must run
the bin command to change the transmission mode to the binary codes.
Run the following command:
ftp> bin
Solution
Log in to the Solaris OS as the root user to change the right of the file.
The following takes the installation script of the N2000 DMS as an example. To change the right
of the file, run the following command:
# chmod +x setup.sh
To add the executable right to all files in the subdirectory, run chmod -R +x subdirectory
name.
Problem Description
The *.tar.gz file exists in a certain software installation package, and how to decompress the
file?
Solution
The following takes the abc.tar.gz file as an example. Run the following commands to
decompress the file:
# gunzip abc.tar.gz
14.1.7 How to Log in as the root User When Using the Telnet
Problem Description
By default, the root user cannot use the Telnet service after the Solaris OS is installed. How to
use the Telnet service as the root user?
Solution
Make sure that the Telnet service is started in the Solaris OS before login.
1. Log in to the Solaris OS as the root user, and run the following command to edit the /etc/
default/login file:
# vi /etc/default/login
2. Add the number sign (#) in front of CONSOLE=/dev/console to comment out this line.
The following information is displayed:
#CONSOLE=/dev/console
It is recommended to undo the comment operation after using the Telnet service.
Problem Description
The root user cannot log in to the FTP server after the Solaris OS is installed. How to log in to
the FTP server as the root user?
Solution
By default, the root user cannot use the FTP service after the Solaris OS is installed. This ensures
the security of the system.
To use FTP as the root user, do as follows:
1. Log in to the OS as the root user, and run the following command to edit the /etc/ftpd/
ftpusers file:
# vi /etc/ftpd/ftpusers
2. Use the number sign (#) to comment out the root line. Save it and quit.
It is recommended to undo the comment operation after using the FTP service.
Solution
Run the following command to view the hardware configuration:
# prtdiag -v
Bank Table:
-----------------------------------------------------------
Physical Location
ID ControllerID GroupID Size Interleave Way
-----------------------------------------------------------
0 0 0 512MB 0,1,2,3
1 0 1 512MB
2 0 1 512MB
3 0 0 512MB
16 1 0 512MB 0,1,2,3
17 1 1 512MB
18 1 1 512MB
19 1 0 512MB
Temperature sensors:
-----------------------------------------
Location Sensor Status
-----------------------------------------
MB/P0 T_CORE okay
MB/SC okay
PS0 faulty
HDD0 present
HDD1 present
PS1 okay
NOTE
Run the man prtdiag command to view the prtdiag usage.
To view information about the CPU, memory, and hard disk, respectively run the following
commands:
l CPU:
# psrinfo -v
l Memory:
# prtconf | grep Memory
l I/O device:
# iostat -E
Description
The system prompts operation failure when I log in to the Solaris OS as the root user and start
the N2000 DMS.
Analysis
You need to set the environment variables for the N2000 DMS, such as the DLL path and
database variables. Before you start the N2000 DMS, you must run the environment variable
file.
Solution
Execute the following environment variables:
# cd /n2kuser
# . ./.profile
NOTE
Include a dot to the left of profile. The dot (.) is part of the file.
14.1.11 Why Does the N2000 DMS Server Process Exit When I Press
Ctrl+C
Description
In Solaris, manually run the startn2000.sh script to start the N2000 DMS. On the console where
the N2000 DMS is started, all server processes exit when I press Ctrl+C.
Analysis
According to the bash in the Solaris OS, when you press Ctrl+C on the N2000 DMS console,
all processes on the console receive the signal. The N2000 DMS responds as Exit to the signal.
In this case, all N2000 DMS service processes exit when you press Ctrl+C.
Solution
To solve this problem, you need to correctly start the N2000 DMS. Do as follows:
1. Open a console. Run the following command to run the environment variable of the
n2kuser user:
#cd /n2kuser
#. ./.profile
2. Run the following command to run the N2000 DMS system script:
#cd $N2000ROOT/server/bin
#. ./startn2000.sh
3. After starting the script, close the current console to avoid operations on this console.
14.1.12 How to Set the ACL for a Server with Multiple Network
Adapters
Description
You have added the IP address of the first network adapter of a client to the ACL. Sometimes
you cannot access the N2000 DMS server.
Analysis
The server controls the access based on IP addresses. If a client has multiple network adapters,
it uses a random IP address of the network adapters to connect to the server.
If the address does not belong to the first network adapter, the system prompts that the address
is not in the ACL.
Solution
If a server has multiple network adapters, all its IP addresses need to be added to the ACL.
Solution
To check whether the Sybase database is started, do as follows:
1. Log in to the database server as the root user.
2. Run the following commands:
# cd /opt/sybase/ASE-12_5/install
# ./showserver
root 475 473 2 09:51:56 ? 2:57 /opt/sybase/ASE-12_5/bin/
dataserver -sN2000DBServer -d/opt/sybase/data/master.d
root 569 567 0 09:52:56 ? 0:00 /opt/sybase/ASE-12_5/bin/
backupserver -SN2000DBServer_back -e/opt/sybase/ASE-12
If dataserver and backupserver are displayed, the database and backup database
are normally started.
Solution
To start the Sybase database, do as follows:
1. Log in to the database server as the root user.
2. Run the following commands:
# cd /opt/sybase/ASE-12_5/install/
# ./startserver -f ./RUN_N2000DBServer
# ./startserver -f ./RUN_N2000DBServer_back
Problem Description
How to manually stop the Sybase database?
Solution
To stop the Sybase database, do as follows:
Problem Description
Both the 32-bit and 64-bit Sybase databases can be installed in the Solaris 64-bit OS. After the
Sybase database is installed, the bit numbers of the database patch and database need to be the
same. The inconsistent bit numbers may damage the database. Thus, you need to view the bit
number of the database after installing the Sybase database.
Solution
Run the following commands to view the bit number of the database:
# cd /opt/sybase/OCS-12_5/bin/
1>select @@version
2>go
Problem Description
When the software or hardware changes, or the license expires, how to change the license of the
Sybase database?
Solution
1. Log in to the Sybase server as the root user and back up the original license. Run the
following commands:
# cd /opt/sybase/SYSAM-1_0/licenses
# cp license.dat license.dat.bak
2. Run the following commands to register with the new license:
# cd /opt/sybase/SYSAM-1_0/bin
# ./lmgr
Problem Description
How to process the abnormal stop of the backup Sybase database?
Solution
Before starting the Sybase, run the nohup command.
# cd /opt/sybase/ASE-12_5/install
Solution
To collect the deadlock information of the Sybase database, do as follows:
1. Log in to the database server as the root user.
2. Run the following commands:
# cd /opt/sybase/OCS-12_5/bin
# isql -SDBServer -Usa -P<sa password>
1>sp_lock
2>go
NOTE
The preceding information (Non Cursor Lock) indicates no deadlock occurs. The database name is
master, the process ID of the locked table is spid=10 , and the locked table ID is
table_id=464004684.
For further information, perform the following operations:
1>dbcc traceon(3604)
2>go
The execution of the dbcc command is complete. If the error information is printed, contact
the system administrator.
1>use master
2>go
1>select object_name(464004684)
2>go
------------------------------ spt_values
(1 row affected)
1>dbcc sqltext(10)
2>go
The execution of the dbcc command is complete. If the error information is displayed,
contact the system administrator.
NOTE
The previous commands are to view the sessions of table_id=464004684 and spid=10.
Problem Description
How to obtain the version information of the N2000 DMS software?
Analysis
The inconsistent versions of the N2000 DMS client and server may cause problems. You can
view the version numbers to check whether the versions of the client and server are consistent.
Solution
If you can start the client and N2000 System Monitor, view the version information on their
interfaces.
l To view the client version: Choose Help > About, and then click the Component tab.
l To view the server version: Click the Component tab in the N2000 System Monitor.
Description
When the client automatically upgrades, the error prompt of invalid user name or password is
displayed.
Analysis
The configuration parameters of the client automatic upgrade on the server are incorrect.
Solution
1. In the $N2000ROOT/server/conf path, check whether the upgrade server address and user
name in the autoupgrade.cfg file are the same as the parameters on the actual upgrade
server.
2. Set the correct upgrade parameters through the $N2000ROOT/server/bin/
UpgradeParaTool path.
3. Restart the security service on the server.
Description
In the Login dialog box, after you enter the user name and password, click Login. The N2000
DMS client does not respond for a long time.
Analysis
The client is connected to the server after you click Login. The connection may be delayed
because of network transmission.
The default login time-out time is 100 seconds. When the delay time exceeds the time-out time,
a network transmission time-out dialog box may be displayed.
Solution
You can configure the login time-out time according to the actual network connection.
Configure the login time-out time in the securityConfig.xml file in the $N2000ROOT/client/
style/defaultstyle/conf/security path. A typical securityConfig.xml file is shown as follows:
Change the values of the parameters (in bold) and restart the client.
<!--time-out time is expressed in millisecond.-->
<AREADESC areaname="SECURITY_TIME">
<DESC descname="high">
<PARAS>
<PARA name="overtime" value="200000"/>
</PARAS>
</DESC>
<DESC descname="middle">
<PARAS>
<PARA name="overtime" value=/>
</PARAS>
</DESC>
<DESC descname="low">
<PARAS>
<PARA name="overtime" value="100000"/>
</PARAS>
</DESC>
</AREADESC>
Analysis
When the user logs in, the process saves the login information in one file to ensure that the
process is connected to the client after the process is restarted.
If many users cannot log in through the user account, when the user quits the system abnormally,
the process cannot clear the login information and the system considers that the account logs in
to the system.
Solution
1. Stop the security process in the N2000 System Monitor.
2. Delete the userlist.sav file in the $N2000ROOT/server/conf path.
3. Start the security process in the N2000 System Monitor.
Analysis
The user does not have management rights to the devices.
Solution
1. In the Security Management window, select the user in Users.
2. On the Managed Domain tab, assign the device management rights to the user.
3. On the Operation Rights tab, assign operation rights to the user.
Analysis
l The formats of the license file and files in the Solaris OS are different.
l The network adapter does not correctly connected.
l More than one license files exist or the license file is invalid.
Solution
l In the Solaris OS, make sure that the license file is transmitted to the server in ASCII codes.
The license generation tool is the Windows version, and the license file format is different
from the file format in the Solaris OS. A file format is automatically converted when the
file is transmitted to the Solaris server in ASCII codes.
l Make sure that physical connection between the client and server is normal, the network
adapter is normal, and the network cable is correctly connected to the network adapter.
l Make sure that only one license file exists in the $N2000ROOT/server/license path, and
the file is formally released and valid.
In the file system of Solaris, the root directory is usually indicated by /. The system directory
and user directory are available in the root directory. After logging in to the Solaris OS, you can
access the home directory. You can create subdirectories in the home directory.
Table A-2 shows the common commands used to browse and control the directory.
Use To
pwd Command
This topic describes the pwd command used for viewing the current working folder.
Function
View the current working folder.
Example
# pwd
/export/home
cd Command
This topic describes the cd command used for switching the current folder to another folder.
Function
The cd command is used to switch the current folder to another folder. This command applies
to both absolute and relative paths.
Example
l To switch to the home folder, run the following command:
# cd
# cd /
# cd ..
# cd ../..
l To switch to the /export/home folder by the absolute path, run the following command:
# cd /export/home
NOTE
If you run the cd command that is not followed by any parameter, the system is switched back to the home
folder.
mkdir Command
This topic describes the mkdir command used for creating a folder.
Function
The mkdir command is used to create a folder. When the path to the created folder is determined,
absolute and relative paths can be used.
Example
To create a subfolder data in /home1/omc, run the following command:
# mkdir /home1/omc/data
rmdir Command
This topic describes the rmdir command used for deleting an empty folder that is no longer
useful.
Function
The rmdir command is used to delete an empty folder.
CAUTION
l If the folder to be deleted is not empty, you must delete the files in the folder before running
the rmdir command.
l To delete the current folder, you must switch to the upper-level folder.
Example
To delete the data subfolder in the /home1/omc folder, run the following command:
# rmdir /home1/omc/data
ls Command
This topic describes the ls command used for listing the files and subfolders in a specific folder.
Function
The ls command is used to list the files and subfolders in a folder. Run the ls command without
any parameter to list the content of the current folder. Run the ls command with parameters to
list the information about the size, type, and privileges of the file, and the date when the file was
created and modified.
Command Format
ls Option Directory or File
Option Description
Several individual options and a combination of options can be used for the ls command. Place
the prefix - before the options. Table A-3 lists some common options.
Option Description
-a Lists all files including the hidden files, that is, the files starting with a
dot ., for example, the .login file.
-l Lists the detailed information about a file, such as the file type, privileges,
number of links, owner, file group, file size, file name, and the date of the last
modification.
If the file is a sign-linking file, then the -> sign is added at the end of the file name for pointing
to the linked file.
Example
To view the long-form content of the files in the current folder, run the following command:
# ls -l |more
total 11094632
drwxr-xr-x 2 sybase staff 1024 Sep 5 2001 bin
drwxr-xr-x 14 sybase staff 512 Sep 5 2001 charsets
drwxr-xr-x 3 sybase staff 512 Sep 5 2001 collate
drwxr-xr-x 2 sybase staff 512 Sep 5 2001 config
-rw-r--r-- 1 sybase staff 2048000000 Mar 6 09:50 data_dev.dat
drwxr-xr-x 2 sybase staff 512 Sep 5 2001 devlib
drwxr-xr-x 7 sybase staff 512 Sep 5 2001 diag
drwxr-xr-x 2 sybase staff 512 Sep 5 2001 hs_data
drwxr-xr-x 2 sybase staff 512 Sep 5 2001 include
drwxr-xr-x 7 sybase staff 512 Sep 5 2001 init
drwxr-xr-x 3 sybase staff 512 Sep 5 2001 install
-rw-r--r-- 1 sybase staff 268 Sep 5 2001 interf.old
-rw-r--r-- 1 sybase staff 402 Oct 29 15:25 interfaces
drwxr-xr-x 2 sybase staff 1024 Sep 5 2001 lib
drwxr-xr-x 2 sybase staff 512 Sep 5 2001 license
drwxr-xr-x 6 sybase staff 512 Sep 5 2001 locales
-rw-r--r-- 1 sybase staff 2048000000 Mar 6 10:51 log_dev.dat
-rw-r--r-- 1 sybase staff 2048000000 Mar 6 10:36 log_dev1.dat
drwxr-xr-x 5 sybase staff 512 Sep 5 2001 pad
-rw-r--r-- 1 sybase staff 5242880 Feb 19 10:10 phase2.dat
drwxr-xr-x 8 sybase staff 512 Sep 5 2001 sample
--More--
After you run the ls -l command, the result may be displayed in several screens. To view the file
contents, one screen at a time, run one of the following commands:
l # ls -la | more
l $ ls -la>ccc
Save the command output to the ccc file, and then run the following command to view the
output on screen at a time:
# more ccc
After you run the ls -l command, seven columns of information are displayed, which are
described as follows:
l The first column consists of 10 characters. The first character indicates the file type. For
example, the character - refers to a common file and the character d refers to a folder. The
following nine characters are three triplets indicating the access privileges of the file owner.
The first triplet pertains to the owner, the middle triplet pertains to members of the user
group, and the right-most one pertains to other users in the system. For example, the
characters r, w, and x indicate that the user has the privileges to read, write, and execute a
file, whereas the character - indicates that the user does not have any relevant privileges
for the file.
l The second column indicates the number of links of the file.
l The third and fourth columns display information such as the owner of the file, and the user
group to which the file belongs.
l The fifth column shows the size of the file in bytes.
l The sixth column shows the time and date when the file is last modified.
l The seventh column shows the file name.
Use To
cp Command
This topic describes the cp command used for copy the contents of a file to another file.
Function
The cp command is used to copy the contents of a file to another file.
Command Format
cp option source file object file
Option Description
The option -r indicates recursively copying a folder. That is, when copying a folder, copy the
files and subfolders included in the folder, and files and subfolders in the subfolders until the
last level of the folder.
Example
To copy the old_filename file in the current folder to the file new_filename, run the following
command:
# cp old_filename new_filename
mv Command
This topic describes the mv command used for moving and renaming a file.
Function
The mv command is used to move and rename a file.
CAUTION
l After you run the mv command, only the target file instead of the source file exists.
l After you run the cp command, the source file still exists and the target file is generated.
Command Format
mv source file object file
Example
To move the old_filename file in the root directory to the /home1/omc folder, and rename the
source file to new_filename, run the following command:
# mv old_filename /home1/omc/new_filename
rm Command
This topic describes the rm command used for deleting a specific file.
Function
The rm command is used to delete a file.
CAUTION
l In the UNIX system, a file, once deleted, cannot be restored. Therefore, use the -i option
to avoid the deletion of a file by mistake.
l To delete a folder, run either of the following commands: rmdir or rm -r. The difference
between the two commands is: rmdir deletes only empty folders but rm -r deletes any
folder.
Command Format
rm Option file
Option Description
l -i: refers to interactive operations. Your confirmation is required before a command is run.
l -r: recursively deletes a folder. That is, when deleting a folder, delete the files and subfolders
included in the folder, and files and subfolders in the subfolders until the root folder.
Example
To delete the old_filename file in the current folder, run the following command:
# rm -i old_filename
chmod Command
This topic describes the chmod command used for changing the access rights of a directory or
a file.
Function
The chmod command is used to change the access rights of a directory or a file.
Format
chmod option directory or file
Based on different notation methods of the option in the command, two modes are available:
l Symbol mode
chmod objectoperatorrights file
l Digit mode
chmod lmn file
Option Description
l Symbol mode
Table A-5 lists common options in symbol mode of the chmod command.
a All users
- Cancel a right
= Set a right
l Digit mode
The option lmn represents the following digits:
l: the rights of the owner
m: the rights of the users sharing the same group with the owner
n: the rights of other users in the system
The value of each digit is equal to the sum of the values of r (read right), w (write right),
x (execute right), or - (no right) in each group. In each group, r = 4, w = 2, x = 1, and - =
Parameter Description
File: indicates the name of the file whose rights are changed.
Example
l Symbol mode
Authorize the file1 owner with the read, write, and execute rights. Authorize the users
sharing the same group with the file owner with the read and execute rights. Authorize
other users with the read and execute rights. Run the following command:
# chmod u=rwx,go=rx file1
To authorize all the users with the read and write rights, run the following command:
# chmod a=rw file2
l Digit mode
Authorize the file1 owner with the read, write, and execute rights. Authorize the users
sharing the same group with the file owner with the read and execute rights. Authorize
other users with the read and execute rights. Run the following command:
# chmod 755 file1
To authorize all the users with the read and write rights, run the following command:
# chmod 666 file2
NOTE
l To configure the rights of a file for users in a group and other users in the system in symbol mode,
you must authorize these users with the execute right of the directory where a file exists. Run the
following command for the directory that requires you to set rights:
# chmod u=rw,+x .
You can also run the following command:
# chmodu=rwx,go=x .
In this command, the symbol "." indicates the current directory.
l In digit mode, r = 4, w = 2, x = 1, and - = 0. These mappings are set according to the binary mode.
For the three symbols in a group, which represent the read right, the write right, and the execute right,
assign the binary value 1 if a symbol has the corresponding right and assign the binary value 0 if a
symbol does not have the corresponding rights. Take the previous file sdh as an example. The file
rights are represented by the symbols rwxr-xr--. After converting the symbols into a binary value,
you can obtain "111101100". The binary value is divided into three 3-digit groups, with each group
representing a file right. After converting the binary value of each group into a decimal value, you
can obtain three values: 7, 5, and 4.
chown Command
This topic describes the chown command used for changing the owner of a file.
Function
The chown command is used to modify the owner of a file. In most UNIX systems, this command
can be run only by the super user.
Command Format
chown Option owner file
Option Description
l -f: runs the command forcibly without displaying errors
l -R: recursive folder
Parameter Description
l Owner: the modified owner
l File: the file of the owner to be modified
Example
l Assume that there is a user new_owner and a file in the system. Run the following command
to change the owner of the file to new_owner:
# chown new_owner file
l Assume that there is a user test in the system. Change the owner of all files in the /export/
home folder and and the subfolders to test:
# chown -R test /export/home
chgrp Command
This topic describes the chgrp command used for moveing all files from the user group to which
you belong to another user group.
Function
The chgrp command is used to move all files from the user group to which you belong, to another
user group. That is, you belong to at least two user groups at the same time.
Command Format
chgrp Option group file
Option Description
l -f: runs the command forcibly without displaying errors
l -R: recursive folder
Parameter Description
l Group: the modified user group
l File: the file the user group of which is to be modified
Example
To change the user group file to new_group, run the following command:
# chgrp new_group file
CAUTION
The new user group to which a file is moved should be created. Run the groups command to
list the groups to which you belong.
After the owner or group of a folder is changed, the folder does not belong to that user or user
group any more. The attributes of the subfolders and files in the folder, however, are retained.
Run the chown command to modify the owner and the user group of a file at the same time:
# chown omc:staff file1
For example, run the command to modify the owner of file1 to omc and the group to staff.
find Command
This topic describes the find command used for searching for a file that meets the preset
conditions in the specified folders and subfolders.
Function
The find command is used to search for a file that meets the preset conditions in the specified
folders and subfolders. By using this command, you can find the file even if you forget the correct
path of the file.
Command Format
find folder condition
Parameter Description
l Folder: indicates the folder to be searched. You can enter multiple folder names. Separate
the folder names by using spaces.
l Condition: indicates the conditions for file search, such as the file name, owner, and time
of the last modification.
Table A-6 describes the conditions for file search.
Condition Description
Condition Description
-type x Searches for files by file type. The file type x includes:
l d: directory
l f: file
l b: block
l c: character
l p: pipe
-user user Searches all files of user. The value of user can be a
user name or UID.
-group group Searches all files of the user group. The value of group
can be a user group name or GID.
-exec command {}\; Uses the found file as the object of the command to be
run. Put the parameters to be used in the command
execution between { and }.
In the preceding table, +10 stands for more than 10 blocks and -10 for fewer than 10 blocks.
Example
To search for files in the /tmp folder with the file name starting with c, and then print the paths,
run the following command:
To search the file test in the current folder and then print the paths, run the following command:
NOTE
l The search may take several minutes. To save time, you can run this command in the background.
That is, the output for the command is exported to a file for later query. End the command line with
& so that the system runs the command in the background. For example,
# find / -name "abc*" -print > abc.file &
l After the search is complete, run the following command to view the result of the search:
# cat abc.file
l Different users may have different privileges for the same file. Therefore, ordinary users may find
only some files of the system. To list all the files that meet the set conditions, log in as a super user
and search from the root directory.
tar Command
This topic describes the tar command used for combining several files into one archive and save
it to a tape or disk.
Function
The tar command is used to combine several files into one archive and save it to a tape or disk.
When one of the files is required, obtain the file directly from an archive.
Command Format
tar function options modification options file
Option Description
l function options: sets the actions, such as read and write, of the tar command
l modification options: modifies the actions of the tar command
Table A-8 describes the options of the tar command.
Example
l Run the tar command to back up files.
To back up all the files and subfolders in the /export/home folder in the current folder to
the default device and view the file information during the backup, run the following
command:
# tar cv /export/home
In current folder, back up all the files and subfolders in the /export/home folder to the
databak.tar file, and to view the file information during the backup, run the following
command:
# tar cvf databak.tar /export/home
l Use tar to restore files.
To restore the files in the default device to a hard disk, and to view the file information
during the restoration, run the following command:
# tar xv
In current folder, restore the databak.tar file to the /export/home folder, and to view the
file information during the restoration, run the following command:
# tar xvf databak.tar
CAUTION
l Do not enter "-" on the left of the function and modification options in the tar command.
l Run the following tar command to pack several files into a package:
# tar cvf filebak.tar file1 file2 file3
l Run the previous command to pack file1, file2, and file3 into a package named
filebak.tar.
l The names of the disk and tape devices used in file backup and restoration in the tar
command may vary according to the UNIX system. Check carefully before running the
command.
gtar Command
This topic describes the gtar command used for combining multiple files into an archive and
storing it in a tape or disk.
Function
The gtar command can merge multiple files into an archive and store it in tapes or disks. You
can obtain the required files from an archive, if required.
Format
gtar function options modification options file to be backed up or restored
Option Description
l Function option: sets the actions of the gtar command, such as read or write.
l Modification option: modifies the actions of the gtar command.
Table A-9 lists some options.
Modification v Starts the display mode. The gtar command can display all
option names of the processed file. This option is common.
Instance
l Run the gtar command to back up files.
In the current directory, back up all the files and folders in /export/home/sybdev to the
default device. During the backup, the file information is displayed.
# gtar cv /export/home/sybdev
In the current directory, back up all the files and folders in /export/home/sybdev and save
them as databak.tar. During the backup, the file information is displayed.
# gtar cvf databak.tar /export/home/sybdev
l Run the gtar command to restore files.
Restore the files of default devices in the backup files to a hard disk. During the restoration,
the file information is displayed.
# gtar xv
In the current directory, decompress the backup file databak.tar to /export/home/
sybdev. During the restoration, the file information is displayed.
# gtar xvf databak.tar
CAUTION
l There is no - symbol before the function option and modification option of gtar.
l The gtar command can pack multiple files. The command is as follows:
# gtar cvf filebak.tar file1 file2 file3
l This command packs the three files, that is, file1, file2, and file3, into the file named
filebak.tar.
l Under different UNIX systems, when using gtar to back up or restore files, note that names
of the floppy disk and tape are different. Ensure that you use the right names.
compress Command
This topic describes the compress command used for compressing files.
Function
The compress command is used to compress files and save the memory space. The name of the
compressed files ends with .Z. The command for decompressing such files is uncompress.
Command Format
compress file
Example
To compress a file, run the following command:
# compress file
CAUTION
The difference between the tar command and the file compressing commands is as follows:
The tar command packs or combines files and packs many folders or files into a package. To
compress the combined files *.tar, use the compress or pack command.
uncompress Command
This topic describes the uncompress command used for decompressing files.
Function
The uncompress command is used to decompress the compressed files. The command for
compressing files is compress.
Command Format
uncompress compressed file ending with ".Z"
Example
To decompress the file.Z file, run the following command:
# uncompress file.Z
pack Command
This topic describes the pack command used for compressing files and saving memory space.
Function
Run the pack command to compress files. The name of the compressed files ends with .Z. The
space achieved through compression depends on file types. To extract files, use the unpack
command.
Command Format
pack file
Example
To pack a file, run the following command:
# pack file
CAUTION
l Do not run the pack command to compress files of small sizes. To compress such files, use
the pack command with the option -f for forced compression.
# pack -f filename
l The difference between the tar command and the file compression commands is as follows:
The tar command packs or combines files and packs many folders or files into a package.
To compress the combined files *.tar, use the compress or pack command.
unpack Command
This topic describes the unpack command used for extracting files.
Function
The unpack command is used to extract the packed files. To pack files, use the pack command.
Command Format
unpack compressed file ending with ".Z"
Example
To extract the file.Z file, run the following command:
# unpack file.Z
pkgadd Command
This topic describes the pkgadd command used for sending a file package to the system for
execution.
Function
The pkgadd command is used to send a file package to the system for execution. To remove a
package from the system, run the pkgrm command.
Command Format
pkgadd option file package name
Option Description
-d device: to install or copy a package from the device. The device can be an absolute path, the
identifier of a tape, or a disk such as /var/tmp or /floppy/floppy_name, or a device name such
as /floppy/floppy0.
Example
To send a file package in the current folder to the file1 file, run the following command:
# pkgadd -d . file1
The dot in the command indicates that the folder is the current folder.
pkgrm Command
This topic describes the pkgrm command used for removing a package from the system.
Function
The pkgrm command is used to remove a package from the system. To pack and send a package
to the system, use the pkgadd command.
Command Format
pkgrm option file package name
Example
To remove the file1 file, run the following command:
# pkgrm file1
Table A-10 Commands for displaying and browsing the contents of a text file
Use To
echo Command
This topic describes the echo command used for sending a character string to a standard output
device such as the monitor screen.
Function
The echo command is used to send a character string to a standard output device such as the
monitor screen.
Command Format
echo character string option
Option Description
Table A-11 lists five options that are frequently used.
Option Description
Example
# echo $HOME
/export/home
/export/home displayed on the screen is the meaning of the character string "$HOME".
To prevent the system from displaying RETURN, run the following command:
/export/home
Or:
/export/home
NOTE
The options \c, \0n, \t, \n, and \v are displayed in the character string enclosed in quotation marks. The
quotation marks can quote either one option or multiple options.
cat Command
This topic describes the cat command used for viewing the contents of a text file.
Function
The cat command is used to view the contents of a text file.
Command Format
cat option file
Option Description
l -n: number of each line of the displayed text
l -v: to view nonprinting characters rather than TAB and RETURN
Example
To view the contents of the cat_Table.txt file, run the following command:
# cat cat_Table.txt
Name Owner
Object_type
------------------------------ ------------------------------
----------------------
tbl128Addr cat
user table
tbl128IP cat
user table
tbl128Name cat
user table
tblAdapterIP cat
user table
tblAdjCell cat
user table
... ... ...
NOTE
To view several files at the same time, run the following command:
# cat file1 file2 file3
more Command
This topic describes the more command used for displaying the content of a large file in different
pages.
Function
You can use this command to view a file on screen at a time. You can also use this command to
browse the previous screens and to search for character strings.
Command Format
more option file
Option Description
Remember to insert the prefix - before the options when multiple options and combination of
options are used. Table A-12 lists four options that are frequently used.
Option Description
-w Indicates that the system does not exit at the end of the input but waits for the
prompt.
Example
To view the contents of the cat_Table.txt file on screen at a time, run the following command:
# more cat_Table.txt
Name Owner
Object_type
------------------------------ ------------------------------
----------------------
tbl128Addr cat
user table
tbl128IP cat
user table
tbl128Name cat
user table
tblAdapterIP cat
user table
tblAdjCell cat
user table
... ... ...
NOTE
l To view a file on screen at a time, press the following keys to perform relevant operations:
Space key: to view the next screen
Return key: to view the next line
q: to exit
h: to view the online help
b: to switch back to the previous screen
/word: to search the character string "word" backward
l UNIX commands can be used in combinations. For example, add |more after other commands to
view relevant results on several screens.
head Command
This topic describes the function, format, and example of the head command.
Function
The head command is used to view the first few lines of a text file. By default, the first 10 lines
are displayed.
Command Format
head value file
Example
To view the first three lines of the Table.txt file, run the following command:
# head -3 Table.txt
Name Owner
Object_type
------------------------------ ------------------------------
tail Command
This topic describes the tail command used for viewing the last few lines of a text.
Function
The tail command is used to view the last few lines of a text. By default, the last 10 lines are
displayed.
Command Format
tail value file
Example
To view the last ten lines of the cat_Table.txt file, run the following command:
# tail cat_Table.txt
Name Owner
Object_type
------------------------------ ------------------------------
----------------------
tbl128Addr cat
user table
tbl128IP cat
user table
tbl128Name cat
user table
tblAdapterIP cat
user table
tblAdjCell cat
user table
... ... ...
NOTE
A special function of the tail command is to view the latest changes of a log file, because all the latest
changes are added at the end of the log file. The command format is as follows:
# tail -f commdrv.log
The option -f refers to the function of monitoring a file.
clear Command
This topic describes the clear command used for clearing the contents on the screen.
Function
The clear command is used to clear the contents on the screen.
Example
To clear the screen, run the following command:
# clear
grep Command
This topic describes the grep command used for searching for a character string in a text file.
Function
The grep command is used to search for a character string in a text file and to print all the lines
that contain the character string.
Command Format
grep character string file
Example
To search the character string operation in the ifconfig.txt file, run the following command:
# grep operation ifconfig.txt
used to control operation of dhcpagent(1M), the DHCP client
operation, be used to modify the address or characteristics
dhcpagent wakes up to conduct another DHCP operation on the
given, and the operation is one that
requested operation will continue.
To search the character string "The following options are supported" in the ifconfig.txt file, run
the following the command:
# grep "The following options are supported" ifconfig.txt
The following options are supported:
NOTE
The character string "The following options are supported" includes spaces. Remember to enclose the
character string within quotation marks in the command line.
vi Command
This topic describes the vi command used for creating and modifying text files.
Function
As a powerful text editing tool, the vi editor is used to create and modify text files.
The vi editor works in two modes:
l Text input mode: to enter the text
Format
l To start the vi editor, enter the following command:
vi file name
l Table A-13 lists the operations in the text input mode.
A Insert text at the end of the line where the cursor is.
I Insert text before the first nonblank character in the line where the
cursor is.
o Insert a new line below the current one and insert text (open).
O Insert a new line above the current one and insert text.
l Table A-14 lists the operations related to moving the cursor in the text input mode.
Table A-14 Operations related to moving the cursor in the text input mode
Command Function
Line No. G Move the cursor to a specified line. For example, 1G means
that the cursor is moved to the first line.
l Table A-15 lists the operation for exiting the text input mode and switching to the command
mode.
Table A-15 Operation for exiting the text input mode and switching to the command mode
Command Function
ESC Exit the text input mode and switches to the command mode.
l Table A-16 lists the operations related to deleting characters in the command mode.
Command Function
x Delete a character.
dd Delete a line.
Command Function
:q! Exit from the vi editor and discard all the changes.
Only the root user and authorized users can add, modify, or delete users or user groups.
Use To
useradd Command
The useradd command is used to add a user in the UNIX system.
Function
The useradd command is performed to add a user in the UNIX system.
Command Format
useradd option new user name
Option Description
You can combine options of the useradd command. Add the prefix - before these options. Table
A-19 lists the common options.
Example
Create a user named omc1 in the UNIX system. The user omc1 belongs to the staff user group
and the home folder is /home1/omc that is created automatically. In addition, the comment is
Test User and B shell is applied. To create a user named omc1 in the UNIX system, run the
following commands:
# useradd -c "Test User" -d /home1/omc -m -g staff -s /usr/bin/sh omc1
CAUTION
After a user is added, set the password for the added user. For details of setting the password,
refer to A.2.4.4passwd Command. After the password is set, the user can log in as a new user.
userdel Command
This topic describes the userdel command used for deleting a specific user of the UNIX operating
system.
Function
The userdel command is used to delete a user. Some UNIX systems do not allow deleting users
completely. Run the userdel command to revoke the privileges granted to the user.
Command Format
userdel user name
Example
Assume that there is user omc1 in the system. To delete user omc1, run the following command:
# userdel omc1
CAUTION
When a user has logged in, do not run the userdel command to delete the user. If you run the
userdel command, the following error message is displayed:
UX: userdel: ERROR: omc1 is in use. Cannot remove it.
usermod Command
This topic describes the usermod command used for modifying the user login information.
Function
The usermod command is used to modify the user login information.
Command Format
usermod option user name
Option Description
The combined option of the usermod command can be used. Add the prefix - before the options.
Table A-20 lists the common options.
Option Description
Example
To modify the login information about omc1, you need modify the user name to test, user group
to new_group, home folder to /home1, and comment to Tester. Run the following command:
# usermod -c "Test User" -d /home1 -g new_group -l test omc1
CAUTION
With the different operation system, do not run the usermod command to modify a user when
the user has logged in, or you must reboot operation system for some settings when perform the
command.
passwd Command
This topic describes the passwd command used for setting or changing a password for a user.
Function
The passwd command is used to set a password for an added user or to change the user password.
Command Format
passwd user name
Example
Assume that the user omc1 is added. To set the password of omc1, run the following command:
# passwd omc1
New Password:
Re-enter new Password:
passwd: password successfully changed for omc1
NOTE
groupadd Command
This topic describes the groupadd command used for adding a user group in the UNIX system.
Function
The groupadd command is used to add a user group in the UNIX system.
Command Format
groupadd user group name
Example
To add the user group staff1 in the UNIX system, run the following command:
# groupadd staff1
groupdel Command
This topic describes the groupdel command used for deleting a user group in the UNIX system.
Function
The groupdel command is used to delete a user group in the UNIX system.
Command Format
groupdel user group name
Example
To delete the user group staff1, run the following command:
# groupdel staff1
groupmod Command
This topic describes the groupmod command used for modifying the information about a user
group..
Function
The groupmod command is used to modify the information about a user group.
Command Format
groupmod user group name
Parameter Description
-n name: the name of the modified user group
Example
To modify the name of the user group staff1 to staff2, run the following command:
# groupmod -n staff2 staff1
du [option] [directory or file] Display the used disk space of each file
system.
man Command
This topic describes the man command used for viewing the online help about a command.
Function
The man command is used to view the online help about a command.
Command Format
man option command
Example
To view the online help about the pwd command, run the following command:
# man pwd
Reformatting page. Wait... done
NAME
pwd - return working directory name
SYNOPSIS
/usr/bin/pwd
DESCRIPTION
pwd writes an absolute path name of the current working
directory to standard output.
Both the Bourne shell, sh(1), and the Korn shell, ksh(1),
also have a built-in pwd command.
ENVIRONMENT
See environ(5) for descriptions of the following environment
variables that affect the execution of pwd: LC_MESSAGES and
NLSPATH.
EXIT STATUS
--More--(30%)
NOTE
Not all parameters in the man command are command names. For example, the man ascii command
displays all the ASCII characters and their expressions. The man shell_builtins command displays the
built-in command list and the shell using the commands.
df Command
This topic describes the df command used for viewing the free disk space.
Function
The df command is used to view the free disk space. The system administrator runs this command
frequently to check the usage of the disk space to avoid disk failure due to data overflow.
Command Format
df option file system
Option Description
l -l : the local file system
l -k: to view the free disk space (unit: KB)
Example
To check the free disk space, run the following command:
# df -k
Filesystem kbytes used avail capacity Mounted on
/dev/dsk/c0t0d0s0 2053605 997684 994313 51% /
/proc 0 0 0 0% /proc
fd 0 0 0 0% /dev/fd
/dev/dsk/c0t1d0s7 35009161 2562019 32097051 8% /export/home
swap 3431792 6664 3425128 1% /tmp
When you run the df command without any parameters, the free disk space in each mounted
device is displayed.
When the free disk space is reduced to the bottom line, the system administrator must take
immediate measures to locate the faulty file system.
du Command
This topic describes the du command used for viewing the disk space used by a specific folder
or file.
Function
The du command is used to view the disk space used by a specific folder or file.
Command Format
du option folder or file
Option Description
l -a : to view the disk space used by each file
l -s: to view the used total disk space
l -k: to view the result (unit: KB)
Example
l To view the disk space used by the files in the /etc folder, run the following command:
# du -k /etc |more
4 /etc/X11/fs
4 /etc/X11/twm
84 /etc/X11/xdm/pixmaps
157 /etc/X11/xdm
721 /etc/X11/xkb/rules
52 /etc/X11/xkb/types
16 /etc/X11/xkb/semantics
8 /etc/X11/xkb/geometry/ibm_vndr
44 /etc/X11/xkb/geometry/digital_vndr
44 /etc/X11/xkb/geometry/sgi_vndr
285 /etc/X11/xkb/geometry
81 /etc/X11/xkb/compat
28 /etc/X11/xkb/symbols/sun_vndr
16 /etc/X11/xkb/symbols/fujitsu_vndr
84 /etc/X11/xkb/symbols/macintosh_vndr
8 /etc/X11/xkb/symbols/nec_vndr
32 /etc/X11/xkb/symbols/digital_vndr
4 /etc/X11/xkb/symbols/sony_vndr
12 /etc/X11/xkb/symbols/xfree68_vndr
4 /etc/X11/xkb/symbols/hp_vndr
4 /etc/X11/xkb/symbols/sgi_vndr
850 /etc/X11/xkb/symbols
40 /etc/X11/xkb/keymap/sun_vndr
8 /etc/X11/xkb/keymap/digital_vndr
93 /etc/X11/xkb/keymap/sgi_vndr
181 /etc/X11/xkb/keymap
16 /etc/X11/xkb/keycodes/digital_vndr
12 /etc/X11/xkb/keycodes/sgi_vndr
108 /etc/X11/xkb/keycodes
2345 /etc/X11/xkb
4 /etc/X11/xsm
4 /etc/X11/lbxproxy
16 /etc/X11/fvwm2
4 /etc/X11/xserver/C/print/ddx-config/raster
4 /etc/X11/xserver/C/print/ddx-config
12 /etc/X11/xserver/C/print/attributes
245 /etc/X11/xserver/C/print/models/PSdefault/fonts
--More--
l To view the disk space used by all file systems in the current folder and send the results to
the sort command for sorting, run the following command:
# du -s * |sort -rn |more
28672 opt
3757 X11
2522 cups
1282 bootsplash
822 xscreensaver
808 sysconfig
661 services
661 init.d
473 postfix
428 apparmor
416 mono
389 joe
193 profile.d
165 ssl
165 apparmor.d
164 ssh
145 pam.d
145 lvm
112 fonts
109 xinetd.d
--More--
l To list the first ten file systems according to the file size, run the following command:
# du -s * |sort -rn |head -10
28672 opt
3757 X11
2522 cups
1282 bootsplash
822 xscreensaver
808 sysconfig
661 services
661 init.d
473 postfix
428 apparmor
ps Command
This topic describes the ps command used for viewing the status of the processes currently
running in the system.
Function
The ps command is used to view the status of the processes currently running in the system..
Command Format
ps option
Option Description
l -e : to view the status of all the processes that are running in the system
l -l: to view the running processes in a long-form list
l -u user: to view the process status of a specific user
l -f : to view all the status information about the processes that are running in the system
Example
l To view the status of all the running processes controlled by the login device (the terminal),
run the following command:
# ps
PID TTY TIME CMD
13726 pts/5 0:00 ksh
l To view the complete information about the active processes, run the following command:
# ps -f
UID PID PPID C STIME TTY TIME CMD
sybase 13726 13724 0 08:44:35 pts/5 0:00 -ksh
NOTE
l After you run the ps command without any parameters, the screen displays information about all
running processes that are controlled by the login device (terminal).
l After you specify the -f parameter, more information is displayed. The information includes the user
name (UID), process ID (PID), parent process ID (PPID), technical number that indicates the
running time of the process (C), process start time (STIME), name of the terminal that activates the
process (TTY), and the process name (CMD). If TTY displays ?, infer that this process is not associated
with the terminal.
l To view all the processes related to specific characters, for example, the process related to the N2000
DMS, run the grep command with the ps command.
kill Command
This topic describes the kill command used for terminating one or more processes.
Function
The kill command is used to terminate a process.
Command Format
kill option process No.
Option Description
l -l : lists the names of all the signals
l -s signal: sends a signal named signal to the processes
Parameter Description
Process No.: the ID of the process to be terminated, that is, the process ID
Example
l To list all the signal names, run the following command:
# kill -l
1) SIGHUP 2) SIGINT 3) SIGQUIT 4) SIGILL
5) SIGTRAP 6) SIGABRT 7) SIGEMT 8) SIGFPE
9) SIGKILL 10) SIGBUS 11) SIGSEGV 12) SIGSYS
13) SIGPIPE 14) SIGALRM 15) SIGTERM 16) SIGUSR1
17) SIGUSR2 18) SIGCHLD 19) SIGPWR 20) SIGWINCH
21) SIGURG 22) SIGIO 23) SIGSTOP 24) SIGTSTP
25) SIGCONT 26) SIGTTIN 27) SIGTTOU 28) SIGVTALRM
l To terminate the process with PID as 256, run the following command:
# kill -s KILL 256
NOTE
who Command
This topic describes the who command used for reporting the login information about all the
users in the current system.
Function
The who command reports the login information about all the users in the current system.
Command Format
who Option
Option Description
l -b : display the system date and time of the last startup
l -m: display the related information about the users who run the command (the same as the
command who with two parameters am i
Parameter Description
am i: display the login information about the users who run the command
Example
l Display the login information about all the users in the current system:
# who
root pts/3 Feb 4 10:08 (10.129.16.60)
sybase pts/5 Feb 4 08:45 (10.129.28.44)
root pts/6 Feb 4 11:25 (10.129.16.60)
l Display the login information about the users who run the command:
# who am i
sybase pts/5 Feb 4 08:45 (10.129.28.44)
or:
# who -m
sybase pts/5 Feb 4 08:45 (10.129.28.44)
whereis Command
This topic describes the whereis command used for viewing the location of a source file, binary
file, and online help of a command.
Function
The whereis command is used to view the location of a source file, binary file, and online help
of a command.
Command Format
whereis option command
Option Description
l -b : to view the location of the binary file
l -m: to view the location of the help manual
l -s: to view the location of the source file
Parameter Description
command: the command for which the location is to be displayed
Example
l To view the exact location of files of various versions for the ls command, run the following
command:
# whereis ls
ls: /usr/bin/ls /usr/ucb/ls /usr/man/man1/ls.1 /usr/man/man1b/ls.1b
l To view the exact location of the binary file for the ls command, run the following
command:
# whereis -b ls
ls: /usr/bin/ls /usr/ucb/ls
l To view the exact location of the help manual for the ls command, run the following
command:
# whereis -m ls
ls: /usr/man/man1/ls.1 /usr/man/man1b/ls.1b
which Command
This topic describes the which command used for viewing the location where a command is run.
Function
The which command is used to view the location where a command is run. The result may be
an absolute path or alias of the command found in the user environment variant PATH.
Command Format
which command
Example
To view the position where the commands pwd, who, and which are run, run the following
command:
NOTE
If the command to be located does not exist in the file, the following error messages are displayed after
you run the which command:
# which qqqq
no qqqq in /usr/bin /usr/ucb /etc
hostname Command
This topic describes the hostname command used for viewing or setting the host name.
Function
The hostname command is used to view or set the host name.
Command Format
hostname host name
Example
To view the host name, run the following command:
# hostname
NOTE
If you run the hostname command without parameters, the host name of the equipment is displayed. If
you run the hostname command with parameters, the host name is set. Only the super user can run the
hostname command.
uname Command
This topic describes the uname command used for viewing the information about the operating
system.
Function
The uname command is used to view the information about the operating system. If you run this
command without parameters, only the name of the operating system is displayed. If you run
this command with parameters, more details about the operating system are displayed.
Format
uname option
Option Description
The options of the uname command can be combined. Add the prefix - before the options. Table
A-22 lists some frequently used options.
Option Description
Option Description
Example
To view the name, version, and serial number of the operating system on the host, run the
following command:
# uname -svr
ifconfig Command
This topic describes the ifconfig command used for viewing the IP address of the host.
Function
The ifconfig command is used to view the IP address of the host.
Command Format
ifconfig option
Option Description
-a: to view all the address information
Example
To view the IP address of the host, run the following command:
# ifconfig -a
lo0: flags=849<UP,LOOPBACK,RUNNING,MULTICAST> mtu 8232inet 127.0.0.1 netmask
ff000000
hme0: flags=863<UP,BROADCAST,NOTRAILERS,RUNNING,MULTICAST>mtu 1500 inet
129.9.169.143 netmask ffff0000 broadcast 129.9.255.255
hme0:1:flags=863<UP,BROADCAST,NOTRAILERS,RUNNING,MULTICAST> mtu 1500 inet
129.6.253.136 netmask ffff0000 broadcast 129.6.255.255
NOTE
In the previous output, the IP address of the displayed host is 129.9.169.143, and the logical IP address is
129.6.253.136. In the UNIX system, a network adapter can bind several logical IP addresses, which realizes
communications between different network segments.
script Command
This topic describes the script command used for recording in a script file all the screen input
and output that occur from the time when the script command is run to the time when the exit
command is entered.
Function
CAUTION
Close the script file before running the exit command to terminate the recording of the screen
I/O. If you do not close the script file, the script file builds up and hinders the normal operation
of the system.
Record in a script file all the screen input and output that occur from the time when the script
command is run to the time when the exit command is entered. The script command is helpful
for programming and debugging.
Format
script option file
Option Description
-a: appends the screen I/O content to a file. If you do not set this parameter, the screen I/O
overwrites the content of the file.
Parameter Description
file: the file used to save the screen I/O content. If you do not specify the file name, the screen
I/O content is saved to the typescript file.
Example
To save the screen I/O content in the default destination file typescript, run the following
commands:
# script
Script started, file is typescript
# ps
PID TTY TIME CMD
775 pts/8 0:00 ksh
# pwd
/export/home
# date
Mon Feb 4 19:12:14 GMT 2002
# exit
Script done, file is typescript
To view the content of the typescript file, run the following command:
# cat typescript
Script started on Mon Feb 04 19:11:49 2002
$ ps
PID TTY TIME CMD
775 pts/8 0:00 ksh
$ pwd
/export/home
$ date
Mon Feb 4 19:12:14 GMT 2002
$ exit
exit
script done on Mon Feb 04 19:12:24 2002
date Command
This topic describes the date command used for viewing the current date and time of the system.
Function
The data command is used to view the current date and time of the system. The super user can
run the date command to set the system date and time.
Format
date option +format
Option Description
l -u: to use the Greenwich mean time.
l +format: to specify the command output format.
Format Description
Format Description
%H Hour: from 00 to 23
%M Minute: from 00 to 59
%S Second: from 00 to 59
Example
l To view the current date and time of the system, run the following command:
date
Mon Feb 4 20:26:16 GMT 2002
l To view the current system date and time in the Greenwich Mean Time, run the following
command:
date -u
Mon Feb 4 12:27:26 GMT 2002
l To view the current date of the system in the format of month/day/year, run the following
command:
date +%D
02/04/02
bc Command
This topic describes the bc command used for simple calculation.
Function
The bc command is used to perform a simple calculation.
Example
To multiply 4 by 5, run the following command:
# bc
4*5
20
NOTE
To get the result, run the bc command, and then press Enter. Type the formula 4*5, and then press
Enter. The result is displayed on the screen. Press Ctrl+D to exit from the bc program.
prtconf Command
This topic describes the prtconf command used for checking the system configuration.
Function
The prtconf command is used to check the system configuration.
Format
prtconf option device path
Instance
l Check all the configuration information about the system.
# prtconf
System Configuration: Sun Microsystems sun4u
Memory size: 4096 Megabytes
System Peripherals (Software Nodes):
SUNW,Netra-240
scsi_vhci, instance #0
packages (driver not attached)
SUNW,builtin-drivers (driver not attached)
deblocker (driver not attached)
disk-label (driver not attached)
terminal-emulator (driver not attached)
dropins (driver not attached)
kbd-translator (driver not attached)
obp-tftp (driver not attached)
SUNW,i2c-ram-device (driver not attached)
SUNW,fru-device (driver not attached)
SUNW,asr (driver not attached)
ufs-file-system (driver not attached)
chosen (driver not attached)
openprom (driver not attached)
client-services (driver not attached)
options, instance #0
aliases (driver not attached)
memory (driver not attached)
virtual-memory (driver not attached)
SUNW,UltraSPARC-IIIi, instance #0 (driver not attached)
memory-controller, instance #0
SUNW,UltraSPARC-IIIi, instance #1 (driver not attached)
memory-controller, instance #1
pci, instance #0
network, instance #0
network, instance #1
pci, instance #1
isa, instance #0
flashprom (driver not attached)
rtc (driver not attached)
i2c, instance #0
i2c-bridge (driver not attached)
i2c-bridge (driver not attached)
motherboard-fru-prom, instance #0 (driver n
chassis-fru-prom, instance #1 (driver not a
alarm-fru-prom, instance #2 (driver not att
power-supply-fru-prom, instance #3 (driver
power-supply-fru-prom, instance #4 (driver
dimm-spd, instance #5 (driver not attached)
dimm-spd, instance #6 (driver not attached)
dimm-spd, instance #7 (driver not attached)
dimm-spd, instance #8 (driver not attached)
rscrtc (driver not attached)
nvram, instance #9 (driver not attached)
idprom (driver not attached)
gpio, instance #0 (driver not attached)
gpio, instance #1 (driver not attached)
gpio, instance #2 (driver not attached)
prstat Command
This topic describes the prstat command used for viewing the CPU usage.
Function
The CPU usage may be high when a large number of NE alarms are reported in a short period
or when the performance data is high. This command is used to find out the cause of these alarms.
Permitted Users
Users root, omcuser, and dbuser are authorized to run the prstat command.
Example
-bash-3.00$ prstat
finger [user name] @domain name/IP View information about the Solaris user.
address
ping Command
This topic describes the ping command used for checking the connection of networks.
Function
The ping command is used to check the physical connection of the network when the
communication between a user computer and the hosts in the network is interrupted.
Format
ping IP address of a host
Example
Check the physical connection between the current host and the host whose IP address is
129.9.0.1.
# ping 129.9.0.1
129.9.0.1 is alive
The Internet Control Message Protocol (ICMP) is used through the ping command to check the
network connection. An ICMP echo request message is sent to a specific host to request an ICMP
echo response message. If the response message is not received within a specified time, the
Host unreachable message is displayed on the screen.
To analyze the causes, run the ping command to connect to other hosts in the same network
segment. If the ping command is successful, you can infer that the connection is functional. In
this case, check the physical connection and the operational status of the specified host. If the
ping command fails, check whether the physical network connection of the current host is secure
or whether the TCP/IP protocol is set correctly only for Windows 95 users.
telnet Command
This topic describes the telnet command used for logging in to the remote UNIX host from the
local computer.
Function
NOTE
Before running the telnet command, ensure that a local computer is connected to the remote UNIX host
according to the TCP/IP protocol.
Telnet is the software used to log in to remote UNIX hosts through network connection. Telnet
takes the local computer as a simulated terminal of the remote UNIX host and enables you to
log in to the remote server from the local computer. After you log in to the remote UNIX host
successfully through telnet, you become a remote simulated terminal user and you can use the
local computer as a real UNIX terminal. In this case, the resources and functions available and
the operating mode depend on the settings of the remote host and the access privileges of the
login account.
Command Format
telnet IP address or domain name
Parameter Description
l IP address: the IP address of a remote UNIX host
l Domain: the domain name of a remote UNIX host
Example
Run the telnet command on a local computer and log in to a remote UNIX host. Assume that
the IP address of the UNIX host is 129.9.169.143.
On the local computer, choose Start > Run. Enter telnet 129.9.169.143 and click OK. The
Telnet dialog box appears and prompts you to enter the UNIX user name and password.
login: root
Password:root password
NOTE
Enter the password on the right of Password. The entered password is not displayed.
The subsequent steps are the same as those when you operate on the UNIX host.
ftp Command
This topic describes the ftp command used for transfering files between the local computer and
the remote host.
Function
The ftp command is used to transfer files between the local computer and the remote host. You
can transfer one or multiple files at a time between the remote UNIX system and the local
computer.
Format
ftp IP address or domain
Parameter Description
l IP address: the IP address of the remote UNIX host
l Domain name: the domain name of the remote UNIX host
Example
Run the ftp command on the local computer. Assume that the IP address of the remote UNIX
host is 129.9.169.143.
Choose Start > Run on the local computer. In the displayed dialog box, enter ftp
129.9.169.143 and click OK. When the ftp window is displayed, enter the UNIX user name and
password.
Password:password of ftpuser
230 Login successful.
ftp>
NOTE
Enter the ftp command behind the prompt ftp>. Table A-25 describes the ftp commands that
are commonly used.
get file1 file2 Copy the remote file1 to the local file2.
put file1 file2 Copy the remote file1 to the local file2.
l Copy all the files in the path C:\mydoc on the local computer to the /usr/local/tmp folder
on the remote host.
ftp> binary
ftp> lcd c:\mydoc
ftp> cd /usr/local/tmp
ftp> mput *.*
l Copy the .login file in the /usr/home/rms folder on the remote host to the path C:
\mydoc folder on the local computer.
ftp> ascii
ftp> lcd c:\temp\from
ftp> cd /usr/home/rms
ftp> get .login
l Copy all files in the /usr/home/rms folder on the remote computer to the path C:\temp
\from on the local computer in binary format.
ftp> binary
ftp> lcd c:\temp\from
ftp> cd /usr/home/rms
ftp> mget *
l To exit ftp.
ftp> quit
CAUTION
The Telnet and FTP protocols belong to the TCP/IP family. They are the protocols at the
application layer. They work in client/server mode. The telnet/ftp program running on the local
computer is a telnet/ftp client program. The telnet/ftp program connects to the server program
in the remote host through the TCP/IP protocol. Any system installed with the telnet/ftp server-
side software can serve as a remote host. In addition to the default network protocol TCP/IP, the
UNIX system supports the Telnet/FTP protocols. Because a UNIX host is installed with both
the telnet/ftp server software and the client software, the UNIX host can serve as either a telnet/
ftp server or a telnet/ftp client.
finger Command
This topic describes the finger command used for viewing the information about the online users
who are using the UNIX system.
Function
The finger command is used to view the information about online users of the UNIX system.
Command Format
finger user name@host domain|IP address
Parameter Description
l user name: the user that has currently logged in to the local system.
l host domain: the UNIX host domain.
l IP address: the IP address of the UNIX host.
Example
Table A-26 lists some common examples of the finger command.
Example Description
Example Description
netstat Command
This topic describes the netstat command used for displaying the current network status.
Function
The netstat command is used to display the current network status. The netstat command is
powerful but complex in format. This describes common applications of the netstat command.
Command Format
netstat options
Option Description
l For viewing all the sockets and routing tables (netstat -anv)
-a: views all socket information.
-n: views the information by number. If you do not specify this parameter, the
information is displayed by logical name.
-v: views the information about sockets and routing tables of the additional information.
l For viewing the IP address of the network adapter (netstat -i -I interface interval
interval)
-i: views the information about the network interface.
-I interface: specifies an interface, for example, hme0:1
interval: indicates a time interval.
l For viewing the routing table status (netstat -r -anv)
-r: views the information about the routing table.
-anv: refers to For viewing all the sockets and routing tables.
l For viewing the broadcast information (netstat -M -ns)
-M: views broadcast routing tables.
-s: summarizes the status of each protocol.
l For viewing the DHCP status (netstat -D -I interface)
-D: views the DHCP information.
Example
Use the command netstat -rn to view the information about the routing tables:
root@ts-007 # netstat -rn
Routing Table:
Destination Gateway Flags Ref Use Interface
A router can be in any of the following five different flags: U, G, H, D, and M, as described in
Table A-27.
Flag Description
H H indicates a route destined for a host. That is, the destination address is a
complete host address.
If this flag is not set, you can infer that the route leads to a network and that
the destination address is a network address: either a network number or a
network. The part in the address for the host is 0. When you search the routing
table for an IP address, the host address must exactly match the destination
address. The network address, however, is required to match only the network
number and subnet number of the destination address.
The Ref (Reference count) column lists the number of routing progresses. The protocol for
connection, such as TCP, requires a fixed route when a connection is established. If the telnet
connection is established between the host svr4 and the host slip, the Ref is 1. If another telnet
connection is established, its value is changed to 2.
The next column (Use) displays the number of packets sent through a specified route. After you
run the ping command as the unique user of this route, the program sends five groups and the
number of packets is displayed as 5. The last column (Interface) indicates the name of the
local interface.
The second row of the output is a loop-back interface. The interface name is permanent set to
lo0. Flag G is not set because the route is not destined for a gateway. Flag H indicates that the
destination address, 127.0.0.1, is a host address and not a network address. Because flag G is
not set, the route here is a direct route and the gateway column shows the outgoing IP address.
Each host has one or multiple default routes. That is, if a particular route is not found in the table,
the packet is sent to the router. In addition, the current host can access other systems through
the Sun router (and the slip link) on the internet, based on the settings of the routing table. The
flag UG refers to the gateway.
route Command
This topic describes the route command used for changing the maintenance routing table.
Function
The routing table relays IP address between network segments. The route command is used to
modify and maintain the routing table.
Format
route -fnvq command modifiers args
route -fnvq add | change | delete | get host/net destination gateway args
route -n monitor
route -n flush
NOTE
Parameter Description
Options of the route command can be combined. Table A-28 lists some common options.
-commond Refer to the add, chang, flush (clear the gateways in the
routing table), get or monitor.
Example
l Obtain the routing information about network segment 10.
root@ts-007 # route -n get 10.0.0.0
After the gateways in the routing table are cleared, the network segments beyond
10.105.28.202/34 are no longer accessible.
l Add a routing record.
root@ts-007 # route add 129.9.0.0 10.105.28.202
add net 129.9.0.0: gateway 10.105.28.202
NOTE
NOTE
This describes the details of the N2000 DMS services and processes.
B.1 N2000 DMS (iMAP) Processes
This describes the services and processes related to the iMAP platform.
B.2 N2000 DMS Processes
This describes the N2000 DMS services and processes.
B.3 N2000 DMS Services and Ports
This describes the services and ports related to the N2000 DMS.
Component
Core Platform and core platform patch components
Database
None
Program File
Path File
$N2000ROOT/server/bin mdp
Configuration File
None
Log File
Path Name Remarks
Occupied Port
Port 9800 is used in common communication mode, and port 9803 is used in SSL communication
mode.
Dependency Process
None
Function
This process enables you to start, stop, and monitor the processes on the N2000 DMS server. In
addition, this process monitors the running status of the memory, CPU, and database.
Component
Core Platform and core platform patch components
Database
SecurityDB
Program File
Path File
$N2000ROOT/server/bin EmfSysMoniDm
Configuration File
Path File
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
dataserver
Component
Core Platform and core platform patch components
Database
LogDB
Program File
Path File
$N2000ROOT/server/bin EmfSchdSvr
Configuration File
Path File
$N2000ROOT/server/conf emfschdsrv.cfg
$N2000ROOT/server/conf/sysmoni monisvhdsvr.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
mdp
Function
This process enables you to perform user management, user group management, authority
management, and log management.
Component
Core Platform and core platform patch components
Database
SecurityDB and LogDB
Program File
Path File
$N2000ROOT/server/bin EmfSecuDm
Configuration File
Path File
$N2000ROOT/server/conf emfsecu.cfg
$N2000ROOT/server/conf/sysmoni moniemfsecu.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
None
Function
This process enables you to manage the device topology in the network according to the space,
logics, or network deployment.
Component
Core Platform and core platform patch components
Database
TopoDB
Program File
Path File
$N2000ROOT/server/bin EmfTopoDm
Configuration File
Path File
$N2000ROOT/server/conf emftopo.cfg
$N2000ROOT/server/conf/sysmoni moniemftopo.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
EmfSecuDm
Function
This process enables you to receive, query, confirm, save, and dump alarms of the device and
N2000 DMS, and perform correlation analysis.
Component
Core Platform and core platform patch components
Database
FaultDB
Program File
Path File
$N2000ROOT/server/bin EmfFaultDm
Configuration File
Path File
$N2000ROOT/server/conf emffault.cfg
$N2000ROOT/server/conf emffloatip.cfg
$N2000ROOT/server/conf/sysmoni moniemffault.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
EmfTopoDm
Function
This function enables you to synchronize NMS history alarms.
Component
Core Platform and core platform patch components
Database
FaultDB
Program File
Path File
$N2000ROOT/server/bin EmfFaultSynDm
Configuration File
None
Log File
None
Occupied Port
None
Dependency Process
EmfFaultDm
Component
Core Platform and core platform patch components
Database
None
Program File
Path File
$N2000ROOT/server/bin EmfAlarmAgent
Configuration File
Path File
$N2000ROOT/server/conf/sysmoni moniemfalmagent.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
None
Function
After you create a trap receiver and enable it, the NMS creates a EmfTrapReceiver process.
Component
Core Platform and core platform patch components
Database
None
Program File
Path File
$N2000ROOT/server/bin EmfTrapReceiver
Configuration File
None
Log File
Path Name Remarks
Occupied Port
l UDP monitoring port: 162-65535. The default port is 162.
l Service port: 11000-12000. The default port is 11000.
Dependency Process
l EmfFaultDm
l EmfAlarmAgent
Component
Core Platform and core platform patch components
Database
PerfDB
Program File
Path File
$N2000ROOT/server/bin EmfPerfDm
Configuration File
Path File
$N2000ROOT/server/conf emfperf.cfg
$N2000ROOT/server/conf/sysmoni moniemfperf.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
None
Function
This process enables you to manage third-party devices on the N2000 DMS. For example, add
or delete a third-party device.
Component
Core Platform and core platform patch components.
Database
GnldevDB
Program File
Path File
$N2000ROOT/server/bin EmfGnlDevDm
Configuration File
Path File
$N2000ROOT/server/conf emfgnldev.cfg
$N2000ROOT/server/conf/sysmoni moniemfgnldev.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
l EmfSecuDm
l EmfFaultDm
Component
Core Platform and core platform patch components
Database
None
Program File
Path File
$N2000ROOT/server/bin EmfProxyServer
Configuration File
Path File
$N2000ROOT/server/conf emfproxy.cfg
$N2000ROOT/server/conf moniemfproxy.cfg
Log File
Path Name Remarks
Occupied Port
9811
Dependency Process
None
Function
This process performs the transit function. It forwards the SNMP request to the SNMP device
managed by the N2000 DMS and return the response from the SNMP device.
You can stop this process if you do not need SNMP request forwarding.
Component
Northbound Interface (SNMP) Server component
Database
None
Program File
Path File
$N2000ROOT/server/bin ForwardAgent
Configuration File
Path File
$N2000ROOT/server/conf/sysmoni moniforwadagent.cfg
Log File
Path Name Remarks
Occupied Port
9826
Dependency Process
None
Function
This process enables you to back up and recover the N2000 DMS database. The backup is
classified into two types: timing backup and manual backup.
Component
Database Backup Tool component
Database
None
Program File
Path File
$N2000ROOT/server/bin EmfDBBackup
Configuration File
Path File
$N2000ROOT/server/conf dbbaktools.cfg
$N2000ROOT/server/conf/dbback diskbak.cfg
$N2000ROOT/server/conf/sysmoni moniemfdbback.cfg
Log File
Path Name Remarks
Occupied Port
9809
Dependency Process
None
Function
This process enables you to configure and query the debug parameters of the N2000 DMS in
Telnet mode.
Component
Core Platform and core platform patch components
Database
None
Program File
Path File
$N2000ROOT/server/bin EmfExamDm
Configuration File
Path File
$N2000ROOT/server/conf emfexam.cfg
$N2000ROOT/server/conf/sysmoni moniemfexam.cfg
Log File
Path Name Remarks
Occupied Port
9810
Dependency Process
EmfSecuDm
Function
This process enables you to obtain the complete information about the devices managed by the
N2000 DMS, and generate a project document.
Component
Core Platform and core platform patch components
Database
Topo
Program File
Path File
$N2000ROOT/server/bin EmfProjDocDm
Configuration File
Path File
$N2000ROOT/server/conf/sysmoni monigsprojdoc.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
None
Function
This process provides the SNMP proxy that can forward alarms to the upper level NMS or third-
party NMS.
Component
Northbound Interface (SNMP) Server component
Database
None
Program File
Path File
$N2000ROOT/server/bin SNMPAgent
Configuration File
Path File
$N2000ROOT/server/conf snmpagent.cfg
$N2000ROOT/server/sysmoni monisnmpagent.cfg
Log File
Path Name Remarks
Occupied Port
9812
Dependency Process
EmfFaultDm
Function
This process implements the agent function of CORBA. It provides other NMSs with the
interfaces for obtaining the alarm, resource, and topology information.
Component
Northbound Interface Module (CORBA) component
Database
None
Program File
Path File
$N2000ROOT/server/bin iAF_Agent
Configuration File
Path File
$N2000ROOT/server/conf corbaagent.cfg
$N2000ROOT/server/conf inblicenseinfo.cfg
Path File
$N2000ROOT/server/conf/sysmoni monicorbaagent.cfg
Log File
Path File Remarks
Occupied Port
9815
Dependency Process
iagent_nt
Function
This process implements the agent function of SOAP/XML. It provides other NMSs with the
interfaces for obtaining the alarm and topology information.
You can stop this process when no other NMSs need to interconnect to the N2000 DMS through
the SOAP/XML protocol.
Component
Northbound Interface Module (XML) component
Database
None
Program File
Path File
$N2000ROOT/server/bin iAF_XMLAgent
Configuration File
Path File
$N2000ROOT/server/conf/sysmoni monixmlagent.cfg
Log File
Path Name Remarks
Occupied Port
10501
Dependency Process
EmfSecuDm
Component
Northbound Interface Module (CORBA) component
Database
None
Program File
Path File
$N2000ROOT/server/bin iagent_nt
Configuration File
Path File
$N2000ROOT/server/conf notify.cfg
$N2000ROOT/server/conf/sysmoni monicorbanotifyservice.cfg
Log File
None
Occupied Port
10510
Dependency Process
Naming_Service
Component
Northbound Interface Module(CORBA) component
Database
None
Program File
Path File
$N2000ROOT/server/bin Naming_Service
Configuration File
Path File
$N2000ROOT/server/conf/sysmoni monicorbanamingservice.cfg
Log File
None
Occupied Port
9816
Dependency Process
None
Function
This process enables you to forward logs to the system log server.
Component
Core Platform and core platform patch components
Database
None
Program File
Path File
$N2000ROOT/server/bin EmfSyslogAgent
Configuration File
Path File
$N2000ROOT/server/conf emfsyslogagent.cfg
$N2000ROOT/server/conf/sysmoni monisyslogagent.cfg
Log File
Path Name Remarks
Occupied Port
None
Dependency Process
None
Component
DMS Core Package
Database
DmsL2VDB
Program File
Path File
$N2000ROOT/server/bin DmsL2VDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/l2vdm/init nml_l2vdm_init.cfg
Log File
Path: $N2000ROOT/server/log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
l EmfTopoDm
l EmfSecuD
Function
It indicates the system log collector process. It collects the Syslogs of devices.
Component
Device Syslog Management
Database
DmsSysLogDB
Program File
Path File
$N2000ROOT/server/bin DmsSyslogCollector
Configuration File
Path File
Log File
Path: $N2000ROOT/server/log
Naming rule: DmsSyslogControldate_time.log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
514
Dependency Process
None
Component
N2000 DMS Core Package
Database
DmfResDB;DmsResDB
Program File
Path File
$N2000ROOT/server/bin DmfResDm
Configuration File
Path File
$N2000ROOT/server/conf/dmf/resdm/ dmf_res_init_module.xml
init
Log File
Path: $N2000ROOT/server/log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
None
Function
It indicates the drive process of the command line interface.
Component
N2000 DMS Basic Package
Database
DmfResDB
Program File
Path File
$N2000ROOT/server/bin DmfClidrvDm
Configuration File
Path File
$N2000ROOT/server/conf/dmf/clidrvdm/init dmf_clidrv_dm_init.cfg
Log File
Path: $N2000ROOT/server/log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
None
Function
It indicates the data center management process. It manages the device configuration files and
image programs.
Component
N2000 DMS Core Package
Database
DmsEmsDB
Program File
Path File
$N2000ROOT/server/bin DmsDcDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/dcdm/init eml_casdm_init.cfg
$N2000ROOT/server/conf/dms/dcdm/init eml_dcdm_init.cfg
Log File
Path: $N2000ROOT/server/log
Naming rule: DmsDcDmdate_time.log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
EmfSecuDm
Component
N2000 DMS Core Package
Database
IPViewDB
Program File
Path File
$N2000ROOT/server/bin dmsipdm
Configuration File
Path File
$N2000ROOT/server/conf/dms/ipdm/init nml_ipdm_init.cfg
Log File
The path is $N2000ROOT/server/log.
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
l EmfTopoDm
l EmfSecuDm
Function
It indicates the cluster management process. It is a management background used to manage the
clusters.
Component
HGMP Manager
Database
ClstDB
Program File
Path File
$N2000ROOT/server/bin UcmDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/clusterdm/init nml_clusterdm_init.cfg
$N2000ROOT/server/conf/dms/clusterdm/init
Log File
Path: $N2000ROOT/server/log
Naming rule: UcmDmdate_time.log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
l EmfTopoDm
l EmfFaultDm
l EmfSecuDm
Component
N2000 DMS Core Package
Database
DmsEmsDB
Program File
Path File
$N2000ROOT/server/bin DmsMseDm
Configuration File
Path File
$N2000ROOT/server/conf/dmf/msedm/init dmf_mse_dm_init.cfg
$N2000ROOT/server/conf/dmf/msedm/init dmf_mse_init_groupware.xml
$N2000ROOT/server/conf/dmf/msedm/init dmf_mse_init_module.xml
Log File
Path: $N2000ROOT/server/log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
l EmfTopoDm
l EmfSecuDm
Function
It indicates the NE management process of the Quidway devices. It manages the data of the
Quidway devices.
Component
N2000 DMS Core Package
Database
DmsEmsDB
Program File
Path File
$N2000ROOT/server/bin DmsQvxDm
Configuration File
Path File
$N2000ROOT/server/conf/dmf/qvxdm/init dmf_qvx_dm_init.cfg
$N2000ROOT/server/conf/dmf/qvxdm/init dmf_qvx_init_groupware.xml
$N2000ROOT/server/conf/dmf/qvxdm/init dmf_qvx_init_module.xml
Log File
Path: $N2000ROOT/server/log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
l EmfTopoDm
l EmfSecuDm
Dependency Process
EmfTopoDm
Component
N2000 DMS Core Package
Database
DmsRprDB
Program File
Path File
$N2000ROOT/server/bin DmsrprDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/rprdm/init nml_rprdm_init.cfg
Log File
Path: $N2000ROOT/server/log
Naming rule: DmsRPRDmdate_time.log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
l EmfSecuDm
l EmfFaultDm
l EmfTopoDm
Component
Device Syslog Management
Database
DmsSysLogDB
Program File
Path File
$N2000ROOT/server/bin DmsSyslogDm
Configuration File
Path File
Log File
None
Occupied Port
None
Dependency Process
l EmfSecuDm
l EmfTopoDm
l EmfFaultDm
l CollectorDm
Component
N2000 DMS Basic Package
Database
None
Program File
Path File
$N2000ROOT/server/bin NeMplsDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/nemplsdm/ nemplsdm.cfg
init
Log File
None
Occupied Port
None
Dependency Process
None
Component
N2000 DMS Core Package
Database
None
Program File
Path File
$N2000ROOT/server/bin ColAgentDm
$N2000ROOT/server/bin CollectorDm
$N2000ROOT/server/conf/dmf/ dmf_collectormgr_dm_init.cfg
collectormgrdm/init
Configuration File
Path File
$N2000ROOT/server/conf/dmf/collectordm/init dmf_collector_dm_init.cfg
NOTE
This process uses certain fields in the configuration file.
Log File
Path: $N2000ROOT/server/conf/log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
12101
Dependency Process
None
Function
It indicates the collector process. It provides the N2000 DMS data collection function.
Component
N2000 DMS Core Package
Database
CollectorDB
Program File
Path File
$N2000ROOT/server/bin CollectorDm
Configuration File
Path File
$N2000ROOT/server/conf/dmf/collectordm/init dmf_collector_dm_init.cfg
Log File
Path: $N2000ROOT/server/log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
ColAgentDm
Function
It indicates the collector manager process. It provides management to the collector.
Component
N2000 DMS Core Package
Database
GdclDB
Program File
Path File
$N2000ROOT/server/bin CollectorMgrDm
Configuration File
Path File
$N2000ROOT/server/bin CollectorDm
$N2000ROOT/server/conf/dmf/collectormgrdm/init dmf_collectormgr_dm_init.cfg
Log File
Path: $N2000ROOT/server/log
By default, the directory contains a maximum of 10 logs. These logs are used cyclically. The
size of each log is 5 MB.
Occupied Port
None
Dependency Process
l EmfSecuDm
l EmfTopoDm
l EmfFaultDm
Component
N2000 DMS Core Package
Database
GctlDm
Program File
Path File
$N2000ROOT/server/bin GctlDm
Configuration File
Path File
$N2000ROOT/server/conf/dmf/gctldm/init dmf_gctl_dm_init.cfg
Log File
Path: $N2000ROOT/server/log
Naming rule: DmfGctl_PID_date_time.log
By default, the directory contains a maximum of 10 logs. These logs are used cyclically. The
size of each log is 5 MB.
Occupied Port
None
Dependency Process
l EmfSecuDm
l EmfTopoDm
Function
It indicates the link management process. It provides the functions of importing and creating
links.
Component
N2000 DMS Core Package
Database
DmsResDB
Program File
Path File
$N2000ROOT/server/bin DmsLinkMgrDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/linkmgr/init nml_linkmgr_init.cfg
Log File
None
Occupied Port
None
Dependency Process
l EmfSecuDm
l EmfTopoDm
Function
It indicates the performance configuration process. It provides the function of managing the
resources, resource groups, templates, group templates, instances, and group instances.
Component
N2000 DMS Perf Management
Database
DmsPerfDB
Program File
Path File
$N2000ROOT/server/bin DmsPerfConfDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/perfconfdm/init dms_perfconfdm_init.cfg
Log File
Path:$N2000ROOT/server/log
By default, the directory contains a maximum of 10 logs. The size of each log is 5 MB. The
exceeded 10 log files are automatically compressed.
Occupied Port
8900, 9005, 9443, 9009
Dependency Process
None
Function
It indicates the performance probe process. It provides the functions of managing tasks,
collecting data, and processing data.
Component
N2000 DMS Perf Management
Database
DmsPerfProbeDB
Program File
Path File
$N2000ROOT/server/bin DmsPerfProbeDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/perfprobedm/init dms_perfprobedm_init.cfg
Log File
Path:$N2000ROOT/server/log
By default, the directory contains a maximum of 10 logs. The size of each log is 5 MB. The
exceeded 10 log files are automatically compressed.
Occupied Port
7321
Dependency Process
None
Function
It indicates the performance poll process. It provides the functions of managing tasks of resource
groups, obtaining and processing probe data, and dumping history data.
Component
N2000 DMS Perf Management
Database
None
Program File
Path File
$N2000ROOT/server/bin DmsPerfPollDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/perfpolldm/init dms_perfpolldm_init.cfg
Log File
Path:$N2000ROOT/server/log
By default, the directory contains a maximum of 10 logs. The size of each log is 5 MB. The
exceeded 10 log files are automatically compressed.
Occupied Port
None
Dependency Process
None
Function
The process provides the functions of creating, deleting, modifying, and querying test suites,
test cases, and diagnosis policies in the diagnosis feature. The process also support the functions
of network scan, and exporting and dumping history data.
Component
diag
Database
VasDiagDB
Program File
Path File
$N2000ROOT/server/bin VasDiagDm.exe
Configuration File
Path File
$N2000ROOT/server/conf/dms/vas/diag/private vas_diag.cfg
Log File
Path:$N2000ROOT/server/log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
162
Dependency Process
mdp
Function
The process provides the functions of Customer Management, Composite Service, PW Service,
L3 VPN, and VPLS.
Component
Service Core Package
Database
DmsScDB
Program File
Path File
$N2000ROOT/server/bin DmsScDm
Configuration File
Path File
$N2000ROOT/server/conf/dms/sc/common sml_sc_dm_init.cfg
Log File
Path: $N2000ROOT/server/log
Naming rule:base_pID_date_time.log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
162
Dependency Process
EmfSecuDm
B.2.23 SecPolicyMgrDm
Function
It indicates the centralized security policy process of the N2000 DMS. It provides centralized
policy configurations of devices.
Component
SecPolicyMgr
Database
VSMPolicyDB
Program File
Path File
$N2000ROOT/server/bin SecPolicyMgrDm
Configuration File
Path File
$N2000ROOT/server/conf smlsecpolicydm.cfg
Log File
Path: $N2000ROOT/server/log
Naming rule: SmlSecPolicy_P2074_date_time.log
By default, the maximum number of log files is 10 and the maximum size of each log file is 5
MB. When the number of log files reaches the maximum, the log files are automatically
compressed to a .tar.gz file. If a process is restarted, the log files previously generated are
automatically compressed to a .tar.gz file. The maximum number of compressed files is 10. If
the number of compressed files reaches the maximum, the earliest compressed log file is deleted.
The compressed file containing the log file generated at the last startup of the process, however,
is not deleted.
Occupied Port
None
Dependency Process
EmfSecuDm
C IP Address Migration
Prerequisite
The operation personnel can log in to the server as the root user.
Context
Aftr the IP address is changed, you need to restart the system to make the new IP address take
effect.
Procedure
Step 1 Log in to the Solaris OS as the root user.
Step 2 Start the system configuration tool.
Run the following commands:
# cd /export/home/clonetools/SYSCfg
# sh configtool.sh
Step 3
----End
Procedure
Step 1 Log in to the Solaris OS as the root user.
Step 2 Run the following commands to start the IP Tool:
# cd /opt/dmstools/IpTool
# . /n2kuser/.profile
# sh run_IpTool_sol.sh
Step 3 In the dialog box that is displayed, enter New IP Address, N2000 Installation Path, Database
Server IP Address, Database Port, Database User Name, and Database Password.
----End
Procedure
Step 1 Log in to the NMS as the admin user.
Step 2 Select NE Software Management > Options > FTP Settings from the main menu to open the
FTP Settings dialog.
Step 3 On the System Information tab, set the parameters according to the actual conditions.
l If Single NIC Configuration is selected, set the NMS server IP address.
l If the Multiple NIC Configuration is selected, configure the NMS server IP address for
multiple network interface cards.
1. Enter the NMS server IP address in the Server IP Address field.
2. Set the device IP address and the network segment in the NE Network IP/
Segment field to connect the devices in different network.
3. Click Add to add the server IP address to the new network segment.
4. Click Modify to modify the NMS server IP address.
5. Click Delete to delete the existing NMS server IP address.
Step 4 Click OK to configure the system information settings successfully.
----End
Procedure
Step 1 Log in to the Solaris OS as the root user.
Step 2 Run the following commands in the report installation directory.
# cd iWebReportServer/bin
# ./ServiceManager.sh
Step 3 In the iWeb Report Server Manager dialog box, click Security.
Step 4 In the Configure Security Settings dialog box that is displayed, select the iMAP(FN) check
box.
Step 5 Set Security Server IP and Security DB IP to the new IP addresses.
Step 6 Click Test. The Test Results dialog box is displayed.
If the system prompts Destination Reachable, click OK.
Step 7 Log in to the report system as the admin user.
Step 8 Select the Project tab.
Step 9 Select one project file. Select the Data Source tab on the right of the project file.
NOTE
The SystemReports project is the built-in project of the report system. You do not need to set the data
source for it.
Step 12 After the test is successful, click Apply to complete setting of the project file.
----End
Context
l When the alarm and log functions of the NMS are required, you need to migrate the IP
addresses related to managed devices.
l The following takes the change of the original IP address 10.10.10.10 to the new IP address
10.20.20.20 as an example.
Procedure
Step 1 In the topology navigation tree or the topology view, select the NE to be operated and right-click
it. Then select NE Management on the shortcut menu.
Step 2 In the service tree, expand NE Channel Management, and then click Syslog Service.
Step 3 On the Syslog Service tab page, select the entry of whom Log Host IP Address is
10.10.10.10 and right-click it. Then, select Delete on the shortcut menu.
Step 4 Right-click on the Syslog Service tab and select Add on the shortcut menu.
Step 5 In the dialog box that is displayed, set Log Host IP Address to 10.20.20.20, Channel
Number to 0, Log Facility to local0, and Log Language to English.
NOTE
In the actual operation, set Channel Number, Log Facility, and Log Language as required.
----End
This describes how to change a password by using the IP Tool. For example, after the NMS is
uninstalled due to a certain reason, the same NMS is installed but a different N2000user
password is set. After restoring the NMS database data that is backed up, the N2000user
password is still the original password, rather than the password that is set during re-installation.
Then, you can use the IP Tool to change the N2000user password to the password that is set
during re-installation.
Procedure
Step 1 Run the following commands to start the IP Tool:
# cd /opt/dmstools/IpTool
# . /n2kuser/.profile
# sh run_IpTool_sol.sh
Step 2 Click the PWDSync tab and enter the new password of the N2000user user.
Step 3 Click Start Execute.
The dialog box indicating successful operation is displayed.
----End
E Glossary
A
Alarm Level Alarm level is to identify the severity of an alarm or event. It is divided
up into four levels: critical, major, minor, and warning alarm.
Alarm The correlation analysis is a kind of rule-based complete and effective
Correlation analysis about the alarm reported by the device, which helps reduce the
Analysis network storm and helps the maintenance personnel quickly locate the
problems.
C
Collector An important component of the N2000 DMS that is used to collect
device data. It collects device data through continuous polling and stores
the collected data in the database for collectors. The NMS server reads
required data from the collector database. Different devices are
collected by different collectors.
Current Alarm An alarm that is uncleared and unacknowledged, uncleared but
acknowledged, or cleared but unacknowledged
F
Fault A circumstance in which the system cannot function normally due to
some physical or logical factors.
Flash Alarm The same alarm was sent several times within a short period of time and
is promptly recovered.
H
History Alarm An alarm that is cleared and acknowledged.
I
Intermittent When the interval between the reported clearance time of two alarms is
Alarm shorter than the reporting period, the later alarm is called an intermittent
alarm.
L
Link Link is one of the topology objects. It displays the relationship between
the node and the submap. It is displayed as one straight line between the
node and the submap on the topological view.
Locked Status A status in which the instanced cannot be operated.
O
Operation Set A collection of operations. Classifying operations into operation sets
helps to manage user operation rights. Operations performed by
different users have different impacts on system security. Operations
with similar impacts are classified into an operation set. Users or user
groups entitled to an operation set can perform all the operations in the
operation set. The NMS provides some default operation sets. If the
default operation sets cannot meet the requirements for right allocation,
users can create operation sets as required.
S
Submap Submap is one of the topology objects, which contains the submap,
nodes and the connection. It is displayed in the topological view with
the submap icon. Submap contains several types, such as the common
submap and the IP submap.
T
Topology Object The basic element of the topology includes the submap, the device and
the connection.
U
User A client user of the NMS. The user name and password uniquely
identifies the operation rights of a user in the NMS.
User Group The user group is group in the device and used to control the access of
the user to the network.
V
View Edits and displays the rule of the topology data or the filter conditions.
It can be tailored according to the requirements.
A
ACL Access Control List
C
CORBA Common Object Request Broker Architecture
CPU Central Processing Unit
D
DMS Datacom Integrated Network Management System
F
FTP File Transfer Protocol
G
GUI Graphic User Interface
GMT Greenwich Time
H
HTML Hyper Text Markup Language
I
iMAP Integrated Management Applicant Platform
ICMP Internet Control Message Protocol
ID Identity
IP Internet Protocol
L
LDAP Lightweight Directory Access Protocol
LSP Label Switch Path
M
MIB Management Information Base
MPLS MultiProtocol Label Switching
N
NMS Network Management System
NTP Network Time Protocol
P
PID Process Identification
PRC People's Republic of China
S
SNMP Simple Network Management Protocol
SQL Structured Query Language
SSL Security Socket Layer
T
TCP Transport Control Protocol