TNMS-V15 Administration Manual
TNMS-V15 Administration Manual
TNMS-V15 Administration Manual
15.11
A50023-K4045-X030-01-7672
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This documentation is intended for the
use of Coriant customers only for the purposes of the agreement under which the document is
submitted, and no part of it may be used, reproduced, modified or transmitted in any form or
means without the prior written permission of Coriant. The documentation has been prepared to
be used by professional and properly trained personnel, and the customer assumes full respon-
sibility when using it. Coriant welcomes customer comments as part of the process of contin-
uous development and improvement of the documentation.
The information or statements given in this documentation concerning the suitability, capacity,
or performance of the mentioned hardware or software products are given "as is" and all liability
arising in connection with such hardware or software products shall be defined conclusively and
finally in a separate agreement between Coriant and the customer. However, Coriant has made
all reasonable efforts to ensure that the instructions contained in the document are adequate
and free of material errors and omissions. Coriant will, if deemed necessary by Coriant, explain
issues which may not be covered by the document. Coriant will correct errors in this documen-
tation as soon as possible.
IN NO EVENT WILL CORIANT BE LIABLE FOR ERRORS IN THIS DOCUMENTATION OR
FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDIRECT,
INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED TO
LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR
DATA,THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN
IT.
This documentation and the product it describes are considered protected by copyrights and
other intellectual property rights according to the applicable laws.
Other product names mentioned in this document may be trademarks of their respective
owners, and they are mentioned for identification purposes only.
Copyright © Coriant 2015. All rights reserved.
2 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
Table of Contents
Table of Contents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1 Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.1 Intended audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.2 Structure of this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.3 Symbols and conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.4 TNMS NCT documentation set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.5 Other documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.6 History of changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2 Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1 Power management options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2 Setting the date and time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2.1 Setting the time and the time zone in a Windows server . . . . . . . . . . . . 13
2.2.2 Setting the time zone in TNMS NCT Client (Windows) . . . . . . . . . . . . . 13
2.3 Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3.1 TNMS NCT login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.3.2 Terminating a client session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.3.3 Changing the password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.4 Internet Explorer configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.5 User and security management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.5.1 Single Sign-on configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.5.2 Domain management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.5.3 Policy management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.5.4 User management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.5.5 User group management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.5.6 Access rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.5.7 Security settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3 Basic Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.1 Managing Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.2 TNMS NCT Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.2.1 License Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.2.2 System Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.2.3 System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.2.4 System Preferences. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.2.5 SFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.3 Importing and exporting data from TNMS NCT . . . . . . . . . . . . . . . . . . . 26
3.3.1 Exporting configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.3.2 Importing configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.4 Log administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.4.1 Log data retention policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.4.2 Log export . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
A50023-K4045-X030-01-7672 3
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
4 Advanced Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.1 Security hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.1.1 Physical and hardware hardening. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.1.2 Operating System hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.1.3 Networking and firewall configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
4.1.3.1 List of ports to open in the firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
4.1.4 OEM Hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.1.5 TNMS Maintenance Packages and Workaround Updates . . . . . . . . . . . 59
4.1.6 User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.2 IPSec policy configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.2.1 IPSec policy configuration for Windows . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.3 7100 IP Sec NE Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.4 Monitoring system resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.5 Oracle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
List of Figures
Figure 1 ASCII characters.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Figure 2 System Information window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Figure 3 Modify Alarm Log window (Export tab) . . . . . . . . . . . . . . . . . . . . . . . . . 31
Figure 4 System Event Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Figure 5 Backup & Restore console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Figure 6 Changing the Oracle database backup schedule settings. . . . . . . . . . . 37
Figure 7 Backup submenu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Figure 8 Backup window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
A50023-K4045-X030-01-7672 5
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
6 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
List of Tables
Table 1 Structure of the manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Table 2 List of symbols and conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Table 3 History of changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Table 4 Tabular export file format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Table 5 Output folders for log types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Table 6 List of the available arguments in non-interactive mode . . . . . . . . . . . . 36
Table 7 Windows default shares. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Table 8 Firewall rules between TNMS NCT Server and TNMS NCT Client
machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Table 9 Firewall rules between TNMS NCT Server machine and NEs (firewall not
recommended) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Table 10 Firewall rules between TNMS NCT Server machine for base services 57
Table 11 Firewall rules for Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Table 12 Default TNMS user accounts and security hardenings. . . . . . . . . . . . . 60
A50023-K4045-X030-01-7672 7
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
8 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Preface
1 Preface
This preface describes the audience, structure, conventions, history of changes and
prerequisites of the Coriant TNMS NCT Administration (ADMN) manual.
A50023-K4045-X030-01-7672 9
Issue: 1 Issue date: November 2015
Preface Administration Manual (ADMN)
Representation Meaning
10 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Preface
Representation Meaning
[square brackets] A key to be pressed on a PC keyboard, for example [F11].
Keys to be pressed simultaneously are concatenated with a “+”
sign, for example [CTRL]+[ALT]+[DEL].
Keys to be pressed one after another are concatenated with
spaces, for example [ESC] [SPACE] [M].
> The greater than symbol “>” is used to concatenate a series of
GUI items in order to depict a GUI path. This is an abridged pre-
sentation of a procedure to be carried out in order to perform an
action or display a window or dialog box.
Examples:
A simple menu path: File > Save as
A more complex GUI path:
> Main window > File menu > Change Password command >
Change Password dialog box
x For convenience, card names are sometimes listed with a lower
(in card names) case x variable, in order to concisely represent multiple cards.
Example:
I01T40G-x (is to be interpreted as I01T40G-1 and I01T40G-2)
(parentheses) For convenience, card variants are sometimes listed with a
section of their name between parentheses, in order to concisely
represent both card variants.
Example:
CCEP-3(/S) (is to be interpreted as CCEP-3 and CCEP-3/S)
Screenshots of the graphical user interface are examples only to illustrate principles.
This especially applies to a software version number visible in a screenshot.
A50023-K4045-X030-01-7672 11
Issue: 1 Issue date: November 2015
Preface Administration Manual (ADMN)
Release notes
Where applicable, contains installation hints, patch descriptions, list of supported NEs,
list of supported cards and any relevant last-minute information.
12 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Initial Configuration
2 Initial Configuration
For a description of how to set the timezone in the TNMS NCT Client, refer to chapter
2.2.2 Setting the time zone in TNMS NCT Client (Windows).
2.2.1 Setting the time and the time zone in a Windows server
For Windows, you do not need to set the time, since the Windows Server will adopt the
time set by the domain server. This allows the times to be synchronized
automatically.
If you are logging in after an update rather than an installation from scratch, the users
and passwords remain unchanged from the previous version.
A50023-K4045-X030-01-7672 13
Issue: 1 Issue date: November 2015
Initial Configuration Administration Manual (ADMN)
Press the spacebar or click the icon to get the login window where you must fill in the
following fields:
ವ Server name
You can select a previously used value set from the menu. Alternatively, input server
data either in the <server IP address> or <server name> formats. The default values
are localhost:4447.
ವ User name
Input a valid user name. The default user name is administrator.
ವ Password
Input the user’s password. The default password is e2e!Net4u#.
For security reasons, the administrator is requested to change the password, based
on password complexity rules.
Refer to 2.3.3 Changing the password for a description of these rules.
Username rules
Usernames are validated according to a set of rules:
ವ The characters of the username must match the allowed character set. Refer to
Figure 1 to check the valid characters.
ವ The username must have at least 1 valid character.
ವ The maximum length of the username is 32 characters, except for usernames
configured at RADIUS servers, in which case the limit is 29 characters.
ವ The username must not begin nor end with a space.
ವ The username must be unique.
Figure 1 displays the valid characters for the username and password (white back-
ground):
- the first two rows display ASCII control characters (not valid);
- the remaining characters are ASCII printable characters;
- additional characters not displayed in this table are not valid.
Functions authorized by the administrator user’s access rights can now be accessed.
The user defined below has full access rights:
ವ Default available user - Administrator
ವ Default user group - Administrators
ವ Default policy - Global
14 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Initial Configuration
g If Single Sign-on is enabled later on, this menu item will no longer be displayed as no
password within TNMS NCT will be required.
A50023-K4045-X030-01-7672 15
Issue: 1 Issue date: November 2015
Initial Configuration Administration Manual (ADMN)
ವ The password must include at least three of the following four specifications: one
lower case alpha character, one upper case alpha character, one numeric character
and one special character.
g All user and security configurations must be executed via the TNMS NCT system GUI.
Direct manipulation of the user and security database with another tool is not supported
and could damage the system.
To ensure a secure system, the user and security management component provides the
capability to administer and visualize user and security relevant data by:
ವ Authenticating - allowing only valid users to, and preventing malicious ones from,
accessing the system.
ವ Authorizing - regulate the operations that can be performed by the authenticated
users by placing restrictions on the kind of operations that a user can carry out.
ವ Auditing - keep track of the operations that a user performs creating a record of the
operations that an authenticated user has performed on the secure system.
All the other software components rely on user and security management to ensure a
secure TMN system.
User management
User management allows the creation of a user account that belongs to a human user,
who is obligated to authenticate with the system. User accounts are assigned to user
groups that have access rights managed and configured by security management.
User management provides users with a single login throughout the TNMS NCT system
and stores their unique credentials and profiles. Each user’s profile records a number of
16 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Initial Configuration
Security management
User authentication and policy management are means of creating a secure TNMS NCT
system and authorizing a user to perform a particular action. Each component provides
a command tree with all the possible actions or commands to the security management
administration service.
User authorization is based on policy administration (on a certain action or command).
Security management allows a security administrator to:
ವ Retrieve the command tree from a given component.
ವ Retrieve a list of securable objects from that component.
ವ Create policies by assigning desired actions.
ವ Assign user groups with desired policies.
g For users logged in with Single Sign-on the list of groups is synchronized with Active
Directory. Any manual changes to these groups within the application will be over-
written the next time the account is accessed through Single Sign-on.
ವ Each user only has access to permissions/policies that were assigned to the user-
groups which in turn were assigned to that user.
Based on this information, the component can query security management and verify
whether a user has permission to execute a specific action on a certain securable object.
Alarming and logging
User and security management supports security and command logging as well as
security alarming. Component commands to be logged or raised alarms, have the same
granularity as defined for the command tree and offered in policy administration. These
functions rely on fault management and log management for implementation.
Main features
User and security management supports the following main features:
User management
ವ Create, delete and modify user accounts and user groups.
ವ Activate or deactivate user accounts.
ವ Force a user to logoff.
ವ Unlock user accounts.
ವ View the existing user accounts, the login status and the user groups they belong to
ವ Assign or unassign users accounts to user groups.
ವ User profile: user’s workspace settings, such as windows size and positioning, filter
and column settings.
Security management
A50023-K4045-X030-01-7672 17
Issue: 1 Issue date: November 2015
Initial Configuration Administration Manual (ADMN)
g ವ In order for users to login to TNMS NCT, they must be included in one of the
TNMS UserClass Groups according to the required access rights.
ವ In order for TNMS NCT to be able to import users from another domain, a two-
way, forest type trust must be set up.
18 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Initial Configuration
A50023-K4045-X030-01-7672 19
Issue: 1 Issue date: November 2015
Initial Configuration Administration Manual (ADMN)
This arrangement is required, for example, in network centers that are responsible for
maintaining only a subset of the nodes. The main purpose is security: it avoids that a
login to the system grants access to the entire network.
TNMS NCT now supports the creation, modification or deletion of multiple domains,
granting
or restricting their accesses.
By default, all NEs belong to the GLOBAL domain which cannot be modified or deleted.
The Domain management window (Administration > Domain Management) allows
an administrator to:
ವ View the list of available domains and assigned NEs.
ವ Create, modify and delete domains.
g Please note that in the domains you create, you have both reading and writing permis-
sions. However, regarding the NEs left outside those domains, you only have reading
permissions, which means you cannot modify or delete them.
20 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Initial Configuration
administrator must force a log off. Once the user logs in again the new permissions
become active. A user account must be a member of at least one group.
The User Administration window allows the user to:
ವ View all user accounts and status.
ವ Create, modify and delete user accounts.
ವ Unlock, force logoff, activate and deactivate user accounts.
When creating or modifying a user you can specify an inactivity timeout per user. If the
User inactivity timeout check box is selected, the timeout defined for that user will
override the inactivity timeout value defined in System Preferences > Security
Settings > General.
When setting either the specific value or the value in the general settings to zero, the
session never times out.
During creation or modification of a user you can specify the number of allowed
simultaneous user sessions, which means the number of TNMS NCT client sessions the
user can be logged into simultaneously.
When the maximum number of simultaneous sessions is reached, either log off from a
client session or contact your System Administrator.
You can also define an account expiration date, rendering the user account temporary.
Whenever a user account expires, you must contact your System Administrator so the
account can be reactivated.
g For users logged in with Single Sign-on the list of groups is synchronized with Active
Directory. Any manual changes to these groups within the application will be overwritten
the next time the account is accessed through Single Sign-on.
A50023-K4045-X030-01-7672 21
Issue: 1 Issue date: November 2015
Initial Configuration Administration Manual (ADMN)
Mappings can be configured via the Modify User Group window, under the Domains
and Policies tab. It is also possible to view all the mappings in the read-only Access
Rights window.
22 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
3 Basic Administration
g A 30 days free trial license is available where all menus and functionalities are enabled.
If you decide to import licenses during this period, the trial is not affected. After the 30
days expire only licensed TNMS NCT features are available and you will need to import
licenses keys to access further functionalities.
A50023-K4045-X030-01-7672 23
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
24 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
Security Settings
In this tab you can set general security settings, such as timeout and account lockout
definitions. You can also configure the single sign-on authentication and authorization
and whether you wish to display an advisory message at logon.
After your initial single sign-on configuration, whenever you change any of the settings
you will need to restart the TNMS Server for your changes to be applied.
Network Settings
This setting allows the NE native location to be displayed in addition to the TNMS NCT
location identifiers in all TNMS NCT fault windows.
If this setting is checked the object's location is presented in the following format:
TNMS location identifier (NE native location identifier)
Example: If the column Location in the Alarm List window displays by default: 1-15-04
when you check this setting it will display:1-15-04 (SLOT-15-4).
Synchronizations
In this setting, you can set the maximum number of synchronization reschedules in case
of a failed synchronization, as well as the maximum number of retries within the same
synchronization.
You can also set the number of scaled synchronizations, which means the number of
NEs that will simultaneously synchronize in each TNMS NCT software component. Note
that the new value only becomes effective after a TNMS NCT server restart.
Fault
In this tab you can configure several fault-related settings, such as customize the alarm
colors to be displayed. You can also define sound notifications for alarms and choose
to filter recurrent alarms triggered by the same cause.
SFTP
Use this tab to enable global SFTP settings, such as IP, user, password and path. If you
have Embargo NE versions in your network that only support FTP, the settings in the
SFTP tab will also be applied to FTP.
Physical Trails
Select the check box in this tab to activate the alarm correlation for internal physical
trails.
A50023-K4045-X030-01-7672 25
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
3.2.5 SFTP
In this setting you can configure the SFTP server to be used in all TNMS NCT.
g The settings below will also apply to FTP servers in case of some Embargo NE versions
that do not support SFTP and must use FTP.
g To use this setting you must configure all SFTP services to use the same user.
w Enter the User in lowercase. For example, if the original User is TNMS_sftp, enter
tnms_sftp.
w Enter the $user$ in lowercase. For example, if the original $user$ is TNMS_sftp,
enter tnms_sftp.
- For 7100 Nano NEs enter /home/$user$/.
Use Test Connection to check the status of the SFTP server only available for the
active server).
26 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
w The exported file may contain sensitive information and should be kept in a secure
location.
g If your export file does not contain some of the configurations you can skip the corre-
spondent import procedure.
A50023-K4045-X030-01-7672 27
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
28 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
ವ Client log (View > Client Log) - keeps a log of all events originating from your
TNMS NCT client. This log stores events such as timeout warnings and errors
arising from using local resources.
ವ Network event log (Network > Event Log) - logs all network event records, includ-
ing unsolicited messages from NEs and state change notifications
ವ Network resource log (Network > Resource Log) - logs higher-level network
resource and network route additions or changes.
ವ Alarm log (Supervision > Fault > Alarm Log) - contains all the raised and cleared
alarms over a specific period of time.
ವ System event log (Administration > System > Event Log) - logs the overall
system messages. This log is used by all components to log system wide informa-
tion, warnings and error messages that occur during the execution of commands.
ವ License log (Administration > License Log) - lists all license log records.
ವ Command log (Administration > Command Log) - logs all types of configuration
commands used by other components input by the user.
ವ Security log (Administration > Security Log) - stores security alarm notifications
and security configuration commands.
A50023-K4045-X030-01-7672 29
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
g To ensure no records are lost TNMS NCT executes hourly background checks of the
logs, to find those which have not been exported in the previous day(s). If TNMS NCT
was not running at the time scheduled for a log export and therefore the export did not
happen, an exceptional export is triggered.
All the export settings described for the manual export, except for the filter settings, can
also be configured for scheduled exports.
30 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
A50023-K4045-X030-01-7672 31
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
Example XML:
Example Tabular:
Example CSV:
Output location
Log management uses a predefined output directory on the server file system for the
export files. Table 5 shows the output directories for the different types of log and export
operations.
32 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
Output Directory
Log Type
Manual export Scheduled export
Alarm Log ...\TNMS\logs\Export\Alarm\Manual ...\TNMS\logs\Export\Alarm\Scheduled
License Log ...\TNMS\logs\Export\License\Manual ...\TNMS\logs\Export\License\Scheduled
Network Resource ...\TNMS\logs\Export\NeResource\Manual ...\TNMS\logs\Export\NeResource\Sched-
Log uled
Security Log ...\TNMS\logs\Export\Security\Manual ...\TNMS\logs\Export\Security\Scheduled
System Event Log ...\TNMS\logs\Export\SysEvent\Manual ...\TNMS\logs\Export\SysEvent\Scheduled
Network Event Log ...\TNMS\logs\Export\NetEvent\Manual ...\TNMS\logs\Export\NetEvent\Scheduled
Command Log ...\TNMS\logs\Export\Command\Manual ...\TNMS\logs\Export\Command\Sched-
uled
Although the operator is free to define a prefix for the name of the export files, the
complete name is generated by log management. This name includes full information
about the time that the export operation was triggered (year, month, day, hour, minute,
second and locale).
Example: pm_15min_log_export_2013_07_27_16h06m10s_cst.xml.
A50023-K4045-X030-01-7672 33
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
w You must not use the BACKUPSET directory for any operations other than Oracle
database backups.
Full backups of the Oracle database are stored with a retention policy that allows for
a redundancy of 2 backups. Therefore the BACKUPSET directory contains the last
3 backups and older ones are automatically removed.
ವ TNMS NCT database backup files are used to restore TNMS NCT to a previous
state in order to, for example, undo undesired user configurations or restore the
TNMS NCT state to a clean installation.
34 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
g TNMS NCT database backup files cannot be used to directly recover from an Oracle
database corruption event.
TNMS NCT database backup files are stored under a target directory (local or
remote) of your creation or choice. Inside this directory, each backup operation
creates a subdirectory named after the backup timestamp
<yyyy_MM_dd_HH_mm_ss>, where the backup files are saved.
w When performing a database backup, ensure that the target directory is writable by
the oracle user.
Interactive mode
To access the interactive mode console, run:
backuprestore.bat
with no arguments from
C:\Program Files (x86)\Coriant\TNMS\server\bin\backuprestore (default location).
The following interactive menu is displayed (Figure 5).
Non-interactive mode
The non-interactive mode allows you to embed the B&R feature into a scriptable
language in order to automate common and repetitive tasks.
To use the non-interactive mode, run one of the following using the available arguments
(Table 6):
backuprestore.bat from
C:\Program Files (x86)\Coriant\TNMS\server\bin\backuprestore (default location).
You can enter backuprestore-h in the command line to see this list.
A50023-K4045-X030-01-7672 35
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
Options Description
-b --backup Performs a TNMS NCT database backup.
-r --restore Performs a TNMS NCT database restore.
-s --schema Performs the operation on the TNMS NCT database.
-d --directory When saving or loading a backup, this option must be followed
by the path to the directory where the backup files will be stored
in or loaded from.
-u --username This option must be followed by the TNMS NCT username.
-p --password This option must be followed by the password matching the
TNMS NCT username.
-R --recovery Use this option to recover the Oracle database. Note that it does
not refer to the TNMS NCT database.
-h --help This option displays the list of the available arguments.
t In case you reschedule the daily backup, set it to run off high load periods, so that the
application performance is not affected.
36 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
t You should consider scheduling an independent backup of the TNMS NCT database
backup files since Oracle backup files are only kept for 3 days maximum. Refer to the
section Automating the Backup procedures in this chapter, for more information.
Provide the new time for the scheduled backup to run, in a 24-hour format (Figure 6).
Press Enter.
A50023-K4045-X030-01-7672 37
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
For example, you can create a weekly schedule with the following command.
SCHTASKS.EXE /CREATE /SC WEEKLY /TN "<SCHEDULE_NAME>" /ST
<SCHEDULE_TIME> /TR "<COMMAND>" /RU "SYSTEM"
Where:
ವ <SCHEDULE_NAME> is the name of the schedule.
ವ <SCHEDULE_TIME> is the time at which the command will be run (for example,
02:50:00).
ವ <COMMAND> is the command to be run.
You can also use SCHTASKS.EXE to inspect the schedule details or delete schedules.
To list schedule details run:
SCHTASKS.EXE /TN "<SCHEDULE_NAME>"
And to delete a schedule run:
SCHTASKS.EXE /DELETE /TN "<SCHEDULE_NAME>"
38 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
w You must create a user in TNMS NCT dedicated to scheduled backups and do not allow
it to expire. Create the user via “User Administration” and select the option “User cannot
change password”. When setting the backup commands to be run by the schedules, use
this user.
A50023-K4045-X030-01-7672 39
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
ವ If you use a remote drive, you have to specify the full network drive path, since
TNMS NCT is not able to reach the mapped drive through the letter assigned by
Windows.
Example:
ವ Local drive - C:\<BackupFolder>.
ವ Remote drive - \\<IP address>\<BackupFolder>
g When there is a backup running through the command line, it is not possible to run a
manual backup through the TNMS NCT Client.
40 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Basic Administration
w A database recovery is not the same as a TNMS NCT database restore and should
only be performed in case of Oracle database corruption. Recovering the Oracle
database will restore the TNMS NCT database. However, recovering the TNMS NCT
database alone will not restore the Oracle database.
The database recovery automatically stops and restarts the "TNMS Server" service.
g After the Oracle database recovery, a TNMS NCT database restore is not necessary
since the Oracle database backups also contain the TNMS NCT specific data.
A50023-K4045-X030-01-7672 41
Issue: 1 Issue date: November 2015
Basic Administration Administration Manual (ADMN)
42 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
4 Advanced Administration
g If you use the Windows Server Update Services (WSUS), refer to the official Microsoft
WSUS documentation for configuration instructions.
To assure compatibility between TNMS and the latest Microsoft Windows Critical and
Security patches, this TNMS release is automatically tested in machines installed with
the latest Microsoft Windows Critical and Security patches. These tests will be run after
Global Availability for as long as they are relevant for this TNMS release.
A50023-K4045-X030-01-7672 43
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
44 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
Configure Auditing
To automatically configure the audit policies, run the following command, located in the
TNMS NCT software:
TNMS_Prerequisites\Audit Policies\AuditPolicies.bat
t You can check the configured audit policies by running in the command line:
auditpol /get /category:*
A50023-K4045-X030-01-7672 45
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
46 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
A50023-K4045-X030-01-7672 47
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
Additional Software
The TNMS NCT server machine should be dedicated to run the TNMS NCT Server only.
No additional software should be installed beyond the TNMS NCT application and the
applications listed below:
ವ CopSSH
ವ OSI Stack
ವ Oracle Database Express Edition 11g Release 2 (64-bit)
ವ Java JRE7u79
ವ Virus Scanner (for example, TrendMicro OfficeScan Client)
g ftp shall only explicitly enabled whenever legacy NEs are used, which only support ftp
and not SFTP/SCP or FTPS.
48 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
* FTP is only needed if TNMS NCT manages legacy NEs, which support FTP but do not
support any secure protocol.
** Disable only if no remote server administration shall be permitted.
*** Disable only if IPSec is not used for communication with the NEs.
Windows services can be disabled via Start > Administrative Tools > Services.
If a service is changed to "disabled" via context menu it is no longer running and will no
longer be automatically started during OS startup.
TNMS NCT Server uses the following services:
ವ Application Host Helper Service
ವ Certificate Propagation
ವ COM+ Event System
ವ COM+ System Application
ವ Cryptographic Services
ವ DCOM Server Process Launcher
A50023-K4045-X030-01-7672 49
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
50 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
g If the Allow connections only from computers running Remote Desktop with
Network Level Authentication check box is selected and not enabled, the Require
user authentication for remote connections by using Network Level Authenti-
cation Group Policy setting has been enabled and applied to the Remote Desktop
Session Host server.
Click OK.
g If the Allow connections only from computers running Remote Desktop with
Network Level Authentication check box is selected and not enabled, the Require
user authentication for remote connections by using Network Level Authenti-
cation Group Policy setting has been enabled and applied to the Remote Desktop
Session Host server.
Click OK.
Go to the Start > Control Panel > Administrative Tools > Internet Information
Services (IIS) Manager. In the Connections pane, click the server-level node in the
tree.
Double-click the FTP Firewall Support icon in the list of features.
A50023-K4045-X030-01-7672 51
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
w Coriant does not recommend the deployment of a firewall between the mediation
(TNMS NCT Server machine) and the NE network. This scenario is not tested and there-
fore is not officially supported. In case the costumer needs to deploy one due to topol-
ogy/security reasons, the ports listed for Mediation <> NE communication in this manual
can be used as a starting point to configure the firewall. Refer to the specific NE's doc-
umentation to gather the required information to configure your firewall.
52 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
Firewall rules between TNMS NCT Server and TNMS NCT Client machines
Table 8 Firewall rules between TNMS NCT Server and TNMS NCT Client machines
A50023-K4045-X030-01-7672 53
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
Table 9 Firewall rules between TNMS NCT Server machine and NEs (firewall not recommended)
54 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
Table 9 Firewall rules between TNMS NCT Server machine and NEs (firewall not recommended) (Cont.)
A50023-K4045-X030-01-7672 55
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
Table 9 Firewall rules between TNMS NCT Server machine and NEs (firewall not recommended) (Cont.)
56 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
Table 10 Firewall rules between TNMS NCT Server machine for base services
A50023-K4045-X030-01-7672 57
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
58 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
CopSSH (SFTP)
If you wish to further restrict the CopSSH's user privileges by making the user
"chroot'ed" to the installation directory, do as follows:
Go to <CopSSH installation path>\etc\ and edit the sshd_config file.
Edit the line (example assuming default installation path, that is,
c:\program files (x86)\icw) from
(...)
Match User copsshuser
ChrootDirectory "/cygdrive/c/program files (x86)/icw"
PasswordAuthentication yes
(...)
Save the file.
Go to (Windows) Control panel > Administrative tools > Services, select
"Openssh SSHD" and restart the service.
w Note that, if you run the CopSSH's Control Panel after the procedure above, all the
changes to the sshd_config file will be reset. In order to keep your changes, for further
CopSSH restarts use the “Openssh” service through the Windows services.
Internet Explorer
The Internet Explorer should not be used for browsing the public internet, as this raises
the threat to compromise the system. You should disable the access to public internet.
A50023-K4045-X030-01-7672 59
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
60 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
A50023-K4045-X030-01-7672 61
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
62 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
Select Use this string (preshared key). The preshared key should be 64
or 128 characters long.
Click OK.
H In the Filter Action tab click Add.
The New Filter Action Properties opens.
In the Security Methods tab select Negotiate security, select Use
session key perfect forward secrecy (PFS) and click Add.
In the New Security Method window select Integrity and Encryption and
click OK.
Click Apply and then OK.
I Select both filters you created in the Filter Action tab and in the IP Filter List
tab.
Click Apply and then OK.
In the Policy Properties window click OK.
In the Local Security Policy window, right-click in the policy you created and select
Assign to activate the policy.
A50023-K4045-X030-01-7672 63
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
will have to connect to the local craft station physical interface of the NE. This interface
will always have IP SEC disabled.
64 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN) Advanced Administration
<threshold>90</threshold>
<frequency>301</frequency>
</resource>
4.5 Oracle
Oracle has policies for controlling the information-retention period of its trace files. In
some runtime scenarios Oracle can write information at such a rate that its file system
runs out of capacity, at which point those policies become inadequate.
When this happens, an alarm is generated. You must respond by cleaning up the trace
files as a user with Data Base Administrator (DBA) rights.
Proceed as follows:
ವ Issue:
adrci
ವ Issue:
adrci> purge -age 8640 -type TRACE
adrci> quit
A50023-K4045-X030-01-7672 65
Issue: 1 Issue date: November 2015
Advanced Administration Administration Manual (ADMN)
66 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Abbreviations
Abbreviations
These abbreviations are intended for the entire TNMS product range and may not apply
to this document in particular.
CC Cross Connection
DB Database
EM Element Manager
GM Generic Mediator
HW Hardware
IP Internet Protocol
LE Load Equivalent
LO Low Order
NE Network Element
NEC NE Controller
NG Next Generation
NW Network
OS Operating System
PC Personal Computer
PT Physical Trail
RE Route Element
SFTP Secure File Transfer Protocol, or Secure Shell File Transfer Protocol
SW Software
TN TransNet
TP Terminal Point
VC Virtual Container
XC Cross Connection
X-NE Cross-NE
Glossary
These glossary entries are intended for the entire TNMS product range and may not
apply to this document in particular.
@CT @CT is a web-based craft terminal (that is, element manager) software which provides
web access to hiT 7300 network elements (NEs) in the customer network without the
use of a management system. It communicates via SNMP with the NEs and uses the
FTPS for upload/download of software or other data configuration (for example, log
files).
3DES Triple DES is the common name for the Triple Data Encryption Algorithm (TDEA or
Triple DEA) symmetric-key block cipher, which applies the Data Encryption Standard
(DES) cipher algorithm three times to each data block.
Actual Creation Is the current state of the path which results from the accumulation of the actual creation
State (ACS) states of the path’s route elements.
Advanced Encryp- Is a specification for the encryption of electronic data. AES is based on a design principle
tion Standard (AES) known as a substitution-permutation network, and is fast in both software and hardware.
Alarm An alarm is a management mechanism intended to inform the user that there is a
standing fault condition in the system.
Alarm log An alarm log provides a list of the alarms associated with a managed object, and
provides the following information about each of the alarms:
ವ the identification of the affected object
ವ the identification of the failed NE or the NE in which the failed unit resides
ವ the alarm severity
ವ the time the event occurred
ವ the indication whether the alarmed event is service affecting or not
ವ the location and the affected traffic
Alarm severity Each failure is assigned a severity. The following values are used:
ವ indeterminate
ವ critical
ವ major
ವ minor
ವ warning
ವ cleared alarms
ವ not Existent
ವ not Alarmed
Element Manager (EM) can configure the severity which is assigned to each fault cause
by an alarm severity assignment profile. In addition, EM can specify that a fault cause
shall not be alarmed. These fault causes will be blocked, hence do not lead to any LED
alarm indications, log entries or alarm reporting.
Alien wavelength A wavelength that does not originate from a transponder or muxponder card, but is still
allowed to be multiplexed into the aggregate line signal for transport as an optical
channel by the system.
Automatic Laser Is a technique used to automatically shut down the output power of the transmitter in
Shutdown (ALS) case of fiber break. This is a safety feature that prevents dangerous levers of laser light
from leaking out of a broken fiber, provided ALS is provisioned on both ends of the fiber
pair.
Alarm Severity The Alarm Severity Assignment Profile is a feature that allows the management of Alarm
Assignment Profile Severity profiles in TNMS and also at the NE side. .
(ASAP)
Automatically- ASON domains are built on the VC4 layer of hiT 7065, 7070 or 7080, and on OCh layer
Switched Optical of hiT 7300 and on ODU2 layer of hiT 7100, which have a Control Plane. The Control
Networks (ASON) Plane uses network-generated signaling and routing protocols to set up or release a
connection, and can restore one when it fails. ASON domains can be built up as part of
the transport network. They provide the benefit of easy end-to-end provisioning, and
fault and protection management. Soft permanent connections (SPCs) connect both
endpoints (NE1 and NE2) within an ASON domain. If a path fails, an alternative path is
automatically used.
ASON Call A Call is a Soft Permanent Connection between two end-points (inside the same domain
or between different domains) and defines the type and attributes of the connection. The
establishment of a Call leads to having a path (and/or multiple alternative paths) con-
necting the end-points that respect the constraints and attributes defined in the Call.
Bidirectional Self- Is a telecommunications term for loop network topology, a common configuration in tele-
healing Ring (BSHR) communications transmission systems, this loop or ring is used to provide redundancy.
The system consists of a ring of bidirectional links between a set of stations. In normal
use, traffic is dispatched in the direction of the shortest path towards its destination. In
the event of the loss of a link, or of an entire station, the two nearest surviving stations
"loop back" their ends of the ring. In this way, traffic can still travel to all surviving parts
of the ring, even if it has to travel "the long way round".
Capacity Planning Capacity planning is the process of determining the capacity needed by a system to
meet future needs.
Card A card is a plug-in unit that occupies one (or multiple) shelf slots. Cards perform specific
electrical and/or optical functions within an NE.
Each card has a faceplate with information LEDs and, in most cases, several ports for
interconnection of optical fibers and/or optical interfaces.
Card slot A card slot is the insertion facility for a card in a shelf. Each card slot is designed for one
or several particular card types.
Mechanical coding elements make sure that each card can be fully inserted only into a
card slot that is suitable for the given card type. Therefore, fundamental shelf equipping
errors (which might cause hardware damage or fatal malfunctions) are impossible.
Ethernet Connectiv- Is an end-to-end perservice Ethernet layer OA&M protocol. IEEE 802.1ag CFM is a
ity Fault Manage- service level OA&M protocol that provides tools for detecting and isolating connectivity
ment (CFM) failures in the network. This includes proactive connectivity monitoring, fault verification
and fault isolation for large Ethernet Metropolitan Area Networks (MANs) and WANs.
Committed Informa- Is the guaranteed average rate (in Mbit/s) at which the information units are transferred
tion Rate (CIR) through the port over a measurement interval.
CLFI CLFI Codes provide a standard, mnemonic naming scheme to uniquely identify cable
Controller card NE controller cards provide the central monitoring and controlling functions of the
system, as well as the MCF to operate the Q and QF Ethernet interfaces.
The controller card performs the following main functions: Fault Management, Perfor-
mance Management, Configuration Management, Security Management, Equipment
Management, Communication Management, Software Management (performing all
software downloads, uploads, and software integrity functions) and controlling the NE
alarm LEDs.
Data Communica- Data Communications Network is a management network for telecommunication trans-
tion Network (DCN) port systems.
A DCN domain interconnects several NEs for the purpose of network management. The
communication is established via the Optical Supervisory Channel (OSC) of the optical
links and an Ethernet/L2 switching network implemented by the NEs.
Data Encryption Is a widely-used method of data encryption using a private key. DES applies a 56-bit key
Standard (DES) to each 64-bit block of data. The process can run in several modes and involves 16
rounds or operations.
Dynamic Host Con- Is a standardized networking protocol used on IP networks that dynamically configures
figuration Protocol IP addresses and other information that is needed for Internet communication. DHCP
(DHCP) allows computers and other devices to receive an IP address automatically from a
central DHCP server, reducing the need for a network administrator or a user from
having to configure these settings manually.
Domain TNMS allows you to restrict user groups to operate only a set of NEs or DCN subnets
instead of the entire network. This partitioning is called a “Domain” and limits the oper-
ation on nodes outside of their partitions by assigning user groups to domains. Further,
you can also assign policies to domains for further control and security, limiting the user
groups to specific menu entries and actions.This arrangement is required, for example,
in network centers that are responsible for maintaining only a subset of the nodes. The
main purpose is security: it avoids that a login to the system grants access to the entire
network.TNMS now supports the creation, modification or deletion of multiple domains,
granting or restricting their accesses. By default, all NEs belong to the GLOBAL domain
which cannot be modified or deleted.
Ethernet Linear Pro- Is a protection scheme defined in the ITU-T G.8031 standard designed to protect point-
tection (ELP) to-point Ethernet paths such as VLAN based Ethernet networks. To achieve protection
ELP uses two disjointed paths, a working path and a protection path, traffic is carried
firstly on the active path (working path) andin case of failure, traffic is switched to the
protection path. Both paths can be monitored using OAM protocols like CFM.ELP
provides 1:1 bi-directional protection switching with revertive mode capabilities.ELP
must first be configured at the NE side via the LCT, only then they are visible in TNMS
so that you can use it in the E-LAN and E-Line service creation via the New Ethernet
Service wizard.ELP is supported in specific network elements and cards only. Refer to
the NE dedicated documentation fore more information.
Element Manager Network elements enable the user to perform operation, administration and mainte-
(EM) nance tasks with the NE system in a GUI environment.
Fault management Fault management reports all hardware and software malfunctions within an NE, and
monitors the integrity of all incoming and outgoing digital signals.
Forward Error Cor- Forward Error Correction (FEC) or channel coding is a technique used for controlling
rection errors in data transmission over unreliable or noisy communication channels.
File Transfer FTP is a network protocol used to transfer files from one computer to an NEand vice-
Protocol (FTP) versa through the network.
Frequency Frequency is a physical attribute of a wave (for example, an optical wave), defined as
the number of wave cycles per time unit. The frequency is directly related to the wave-
length.
Generalized Multi- Is a protocol suite extending MPLS to manage further classes of interfaces and switch-
Protocol Label ing technologies other than packet interfaces and switching, such as time division mul-
Switching (GMPLS) tiplex, layer-2 switch, wavelength switch and fiber-switch.
Internet Protocol (IP) Is the principal communications protocol in the Internet protocol suite for relaying data-
grams across network boundaries. Its routing function enables internetworking, and
essentially establishes the Internet.
Internet Protocol Is a connectionless protocol for use on packet-switched networks. It operates on a best
version 4 (IPV4) effort delivery model, in that it does not guarantee delivery, nor does it assure proper
sequencing or avoidance of duplicate delivery. These aspects, including data integrity,
are addressed by an upper layer transport protocol, such as the Transmission Control
Protocol (TCP).
Link Aggregation Within the IEEE specification the Link Aggregation Control Protocol (LACP) provides a
Control Protocol method to control the bundling of several physical ports together to form a single logical
(LACP) channel. LACP allows a network device to negotiate an automatic bundling of links by
sending LACP packets to the peer (directly connected device that also implements
LACP).
Link Aggregation Allows a bridge to treat multiple physical links between two end-points as a single logical
(LAG) link, referred to also as a port-channel. The feature can be used to directly connect two
switches when the traffic between them requires high bandwidth and/or reliability, or to
provide a higher bandwidth connection to a public network. For this purpose, all the
physical links in a given port-channel must operate in full-duplex mode and at the same
speed.If a physical port or the related link of a LAG fails, the traffic previously carried
over the failed link automatically is switched to the remaining link(s) of the LAG (rapid
reconfiguration). Bandwidth degradation is an obvious impact if the sum of throughput
of the two/multiple aggregated links are higher than the throughput of the remaining
link(s). Be aware that certain link failures are not always visible to both ends of a link.
Link Aggregation Control Protocol (LACP) and Automatic Laser Shutdown (ALS)
enabled, guarantees that both ends of a link properly detect all failures and perform the
correct response.LAG groups must first be created at the NE side via the LCT, only then,
they are visible in TNMS so that you can use it in the E-LAN and E-Line service creation
via the New Ethernet Service wizard. LAG is supported in specific network elements and
cards only. Refer to the NE dedicated documentation fore more information.
Laser A laser is a device that generates an intense narrow beam of light by stimulating the
emission of photons from excited atoms or molecules.
Laser safety Laser safety rules are a group of mechanisms and actions necessary to protect all users
from harmful laser light emissions.
Local Craft network LCT is a client-based craft terminal (that is, element manager) software which provides
(LCT) access to network elements (NEs) in the customer network without the use of a man-
agement system.
Lightweight Direc- Is an application protocol for accessing and maintaining distributed directory information
tory Access Protocol services over an Internet Protocol network.
(LDAP)
Line interface A line interface is a transponder interface that faces the line side of the link. Contrast
with “client interface” which faces the client equipment side of the link.
Long Haul (LH) hiT 7300 LH segment is a DWDM application characterized by a reach of more than 500
km and up to 1200 km.
Label Switched Path Is a path through an MPLS network, set up by a signaling protocol such as LDP, RSVP-
(LSP) TE, BGP or CR-LDP. The path is set up based on criteria in the forwarding equivalence
class (FEC).
Label switch router Sometimes called transit router, is a type of a router located in the middle of a Multipro-
(LSR) tocol Label Switching (MPLS) network. It is responsible for switching the labels used to
route packets. When an LSR receives a packet, it uses the label included in the packet
header as an index to determine the next hop on the Label Switched Path (LSP) and a
corresponding label for the packet from a look-up table. The old label is then removed
from the header and replaced with the new label before the packet is routed forward.
Maintenance Associ- Are points at the edge of the domain that define the boundaries and sends and receives
ation End Points CFM frames through the wire side (physical port) or relay function side.
(MEP)
Management Infor- Is used for backup purposes where you can plan automatic upload jobs.
mation Base (MIB)
MX Juniper MX Series Universal Edge Routers are Ethernet-centric services routers that
are purpose-built for demanding carrier and enterprise applications (font: Juniper web-
site).
Network Craft NCT is a network management craft terminal (that is, element manager) software which
Terminal (NCT) is used for either local or remote network management.
Network Element A network element (NE) is a self-contained logical unit within the network. The NE can
(NE) be uniquely addressed and individually managed via software.
Each NE consists of hardware and software components to perform given electrical and
optical functions within the network.
Network Manage- The network management layer includes all the required functions to manage the optical
ment network in an effective and user-friendly way, such as the visualization of the network
topology, creation of services, and correlation of alarms to network resources.
Network topologies A topology of a network is defined by the list of NEs included in the network and the list
of links that connect those NEs (for example, point-to-point, chain, ring, and so on).
Network to Network Is an interface which specifies signaling and management functions between two net-
Interface (NNI) works. NNI circuit can be used for interconnection of IP (e.g. MPLS) networks.
Optical Channel A predefined wavelength that can be used to transmit a bit stream by means of a mod-
ulated light signal.
Optical Network An ONN is an NE where the incoming channels are either dropped or routed to a line in
Node (ONN) a different direction, outgoing channels can also be added locally. Apart from multiplex-
ing and demultiplexing an ONN NE implements optical or 3R signal regeneration and
dispersion compensation.
Optical path The path followed by an optical channel from the first multiplexer to the last demulti-
plexer.
Path Computation Implements, sets up and manages PCEP, while also notifying OM when PCEP is avail-
Engine Protocol able or unavailable to send/receive PCEP Route messages.
(PCEP)
Performance man- Performance monitoring and signal quality analysis provide information for detecting
agement and alerting, a cause that could lead to a degraded performance before a failure is
declared.
Peak Information Is a burstable rate set on routers and/or switches that allows throughput overhead.
Rate (PIR) Related to Committed Information Rate which is a committed rate speed guaran-
teed/capped. For example, a CIR of 10 Mbit/s PIR of 12 Mbit/s allows you access to 10
Mbit/s minimum speed with burst/spike control that allows a throttle of an additional 2
Mbit/s.
Pseudo-Random Is a known sequence of bits that can be used as a test signal to measure transmission
Binary Sequence delay and bit error rate of a channel. In this test, one port inserts the PRBS signal in the
(PRBS) channel (source port) and another detects if the sequence was received correctly (sink
port). This kind of test is traffic affecting since the test sequence is inserted into the
OPUk until the test is stopped.
Physical Trails (PT) Trails are represented as Physical Trails (PTs). They connect two Physical Termination
Points (PTP) on a physical layer rate, but can also contain non-physical layers.
Planning Tool Con- Interfaces Coriant TransNet/Intelligent Optical Control DWDM network planning tool.
nector (PTC)
PTX Juniper Packet Transport Routers are Converged Supercore platforms that deliver
powerful capabilities based on the Junos Express chipset and forwarding architectures
optimized for MPLS and Ethernet, with integrated, coherent 100GbE technology (font:
Juniper website).
Qualitative System Quality System Requirements are non-functional requirements that must be meet by a
Requirements System such as Reliability, Availability, Performance, Scalability, Security, Maintainabil-
ity, Portability, etc.
Required Creation Is the desired state of the path, which is set by the user upon creation.
State (RCS)
Optical Signal to OSNR is the ratio of an optical signal power to the noise power in the signal.
Noise Ratio (OSNR)
Ring network A ring network is a network topology in which each NE connects to exactly two other
NEs, forming a circular optical path for signals (that is, a ring).
Synchronous Digital Is a standardized protocol that transfer multiple digital bit streams over optical fiber using
Hierarchy (SDH) lasers or highly coherent light from light-emitting diodes. At low transmission rates data
can also be transferred via an electrical interface. The method was developed to replace
the Plesiochronous Digital Hierarchy system for transporting large amounts of telephone
calls and data traffic over the same fiber without synchronization problems.
Security manage- Security Management controls the individual access to particular NE functions via the
ment network management system and/or via a craft terminal, using a hierarchical security
management user ID, and password concept.
State Event Machine In computation, a finite-state machine is event driven if the transition from one state to
(SEM) another is triggered by an event or a message.
Secure Hash Algo- Is a family of cryptographic hash functions that takes an arbitrary block of data and
rithm (SHA) returns a fixed-size bit string, the cryptographic hash value, such that any (accidental or
intentional) change to the data will (with very high probability) change the hash value.
The data to be encoded are often called the message, and the hash value is sometimes
called the message digest or simply digest.
Simple Network SNMP is used in network management systems to monitor network-attached devices for
Management conditions that warrant administrative control. It consists of a set of standards for
Protocol (SNMP) network management, including an application layer protocol, a database schema, and
a set of data objects.
Software manage- Software management performs all software downloads, uploads, and software integrity
ment functions.
Secure Shell (SSH) Is a cryptographic network protocol for secure data communication, remote command-
line login, remote command execution, and other secure network services between two
networked computers that connects, via a secure channel over an insecure network, a
server and a client (running SSH server and SSH client programs, respectively).
Synchronous Synchronous Optical Networking and Synchronous Digital Hierarchy are standardized
Optical Networking protocols that transfer multiple digital bit streams over optical fiber using lasers or highly
(SONET) coherent light from light-emitting diodes.
Throughput Throughput measures the number of work units performed in a given time unit.
Topological Con- Defines a containment relationship between other topological container and/or NEs.
tainer (TC) This means they can contain NE symbols and other TCs. The network map is always
associated with one TC, which corresponds to a network view.
Tandem Connection TCMs are configurable parameters (via Element Manager) of the transponders. They
Monitoring (TCM) provide a Performance Management of all the Optical Transport Network (that is, end-
to-end connection) or specific sections only and implement an Optical channel Data Unit
(ODU) termination provisioned to support up to six TCM levels.
Transmission Is one of the core protocols of the Internet protocol suite (IP), and is so common that the
Control Protocol entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked
(TCP) delivery of a stream of octets between programs running on computers connected to a
local area network, intranet or the public Internet. It resides at the transport layer.
TNMS Core TNMS Core is an integrated solution designed for large, medium and small size net-
works. It supports NEs with DWDM, OTH, SDH, PDH, Ethernet in line, star, ring and
mesh network configurations. TNMS Core can be used to manage networks in the
access, edge, metro, core and backbone levels.
TNMS CT TNMS CT is a transparent software platform for SDH and DWDM NEs using QD2, QST,
QST V2, Q3 or SNMP telegram protocols. It supports line, star, ring and mesh networks
and provides access to NEs via Ethernet interface or via a serial line interface (RS232).
TNMS NCT TNMS NCT is a lighter version of TNMS for smaller networks. It uses GM or MVM-based
mediations and includes the basic functionalities for network management.
TransNet Planning of a hiT 7300 network is done by the Coriant TransNet tool. Coriant TransNet
is a sophisticated software simulation tool developed specifically for designing and/or
upgrading optical DWDM networks with hiT 7300. It runs on PCs using Microsoft
Windows operating systems.
Trail Trace Identifier TTI is a transponder card parameter (configurable via Element Manager) of which is
(TTI) used to verify correct cabling or correct Tandem Connection Monitoring (TCM) configu-
ration. The basic principle is that specific overhead bytes are reserved for Trace
Messages of the user's choosing. By specifying the Actually Sent (transmitted) and the
Expected (received) trace messages, the system can automatically verify that fiber con-
nections have been made as intended. This is accomplished by comparing the expected
Trace Message to that actually received. If they differ, an alarm is raised, alerting per-
sonnel of the incorrect connections.
Transponder card A transponder card receives an optical input signal and converts it to an optical output
signal suitable for DWDM multiplexing and transmission.
Transponder Loopbacks are diagnostic tests that can be activated via Element Manager. Loopbacks
loopback return the transmitted signal back to the sending device after the signal has passed
across a particular link. The returned signal can then be compared to the transmitted
one. Any discrepancy between the transmitted and the returned signal helps to trace
faults.
User Datagram Is one of the core members of the Internet protocol suite (the set of network protocols
Protocol (UDP) used for the Internet). With UDP, computer applications can send messages, in this
case referred to as datagrams, to other hosts on an Internet Protocol (IP) network
without prior communications to set up special transmission channels or data paths.
UDP uses a simple transmission model with a minimum of protocol mechanism. It has
no handshaking dialogues, and thus exposes any unreliability of the underlying network
protocol to the user's program. As this is normally IP over unreliable media, there is no
guarantee of delivery, ordering or duplicate protection. UDP provides checksums for
data integrity, and port numbers for addressing different functions at the source and des-
tination of the datagram.
Ultra Long Haul hiT 7300 ULH segment is a DWDM application characterized by long path lengths of up
(ULH) to 1600 km.
User-to-Network Is a demarcation point between the responsibility of the service provider and the respon-
Interface (UNI) sibility of the subscriber. This is distinct from a Network to Network Interface (NNI) that
defines a similar interface between provider networks.
Universal Network Universal Network Objects are software NEs that can be configured and used to repre-
Object (UNO) sent network elements which are not supported by TNMS. UNO also supports devices
with restricted functionalities, for example, without supervising interfaces.
They are also used to represent network services between third parties and TNMS net-
works.
Virtual Local Area In computer networking, a single layer-2 network may be partitioned to create multiple
Networks (VLAN) distinct broadcast domains, which are mutually isolated so that packets can only pass
between them via one or more routers; such a domain is referred to as a Virtual Local
Area Network, Virtual LAN or VLAN.
Wavelength Wavelength is a physical attribute of a wave (for example, an optical wave), defined as
the distance between corresponding points of two consecutive wave cycles.
The wavelength is directly related to the frequency of the wave.
Wait to restore time The time in minutes that TNMS waits until it tries to switch to the working path again,
(WTR) assuming the Revertive option is selected.
eXtensible Markup Is a markup language that defines a set of rules for encoding documents in a format that
Language (XML) is both human-readable and machine-readable. The design goals of XML emphasize
simplicity, generality, and usability over the Internet. It is a textual data format with strong
support via Unicode for the languages of the world. Although the design of XML focuses
on documents, it is widely used for the representation of arbitrary data structures, for
example in web services.
Index Log
administration 29
data retention policy 29
A export file formats 31
Access rights 21 export output location 32
Audit policies 45 license 33
manual export 30
scheduled export 30
B Log export
Backup 34 manual 30
automating 38 scheduled 29
client 39 Log Management
command line 36 messages 30
console 35 Log management
interactive mode 35 data retention policy 29
non-interactive mode 35 Log settings 30
Oracle database 36 Login 13
TNMS database 37
M
C Microsoft Windows
Console 35 security hardening 43
CopSSH security patches 43
security hardening 59 Monitoring 64
system resources 64
D
Date and time 13 N
Domain management 19 Non-interactive mode 35
F O
Firewall Operating system
configuration 52 security hardening 43
Windows firewall 58 shares 45
Functional overview Oracle 65
user and security management 16 Oracle backup files 37
H P
Hardware Password
security hardening 43 change 15
complexity rules 15
I Policies 45
Importing 26 Policy management 20
Interactive mode 35 Power management 13
Internet Explorer 16
R
L Recovering
License log 33 Oracle 41
License Management 23 Recovery 40
License management Remote
function overview 23 access 50
functions 23 desktop 50
Local security policy 48 Remote registry 46
A50023-K4045-X030-01-7672 83
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
T
Timezone
TNMS client 13
Windows 13
U
User and Security management 16
alarming and logging 17
functional overview 16
main features 17
security management 17
user management 16
84 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
A50023-K4045-X030-01-7672 85
Issue: 1 Issue date: November 2015
Administration Manual (ADMN)
86 A50023-K4045-X030-01-7672
Issue: 1 Issue date: November 2015