STMS V8.2 Getting Started and Administration Guide
STMS V8.2 Getting Started and Administration Guide
Version 8.2
ECI's NPT-1800, NPT-1200, NPT-1050, NPT-1021, and NPT-1010 are CE2.0 certified.
ECI's qualification lab is accredited by A2LA for competence in electrical testing according to
the International Standard ISO IEC 17025-2005 General Requirements for the Competence of
Testing and Calibration Laboratories.
Related documents
STMS What's New Guide
STMS User Guide
STMS Performance Management Guide
LCT-STMS Getting Started and Administration Guide
Apollo Reference Manual
Contact information
Telephone Email
ECI documentation group +972-3-9268145 techdoc.feedback@ecitele.com
ECI customer support +972-3-9266000 on.support@ecitele.com
NOTE: The MTNM CORBA-based interface (NBI) is a fully integrated add-on capability that is
available on a cost basis. The feature is available if a license has been purchased, is current,
and has not exceeded its limits (see Manage licenses).
Comprehensive Network Planning: The comprehensive and accurate data stored in the STMS
database enable effective network planning. Managed device, inventory, and available slot reports
assist capacity planning and inventory control. Device-monitoring capabilities prevent problems from
reaching a critical stage by providing proactive monitoring of components, such as CPU utilization, file
system size, memory usage, and device temperature, sending alerts when thresholds are exceeded.
The user can define multiple entities of the same type using the Copy command, via the CLI or STMS. For
example, if the user has defined a slot, he doesn't have to repeat the changes manually to another slot in
the same or other shelves. He can use this slot as a template and copy its configuration to another slot. This
functionality is also supported for cards and shelves of the same type.
1.1.5 Security
The following security features are supported:
Authentication and password manipulation: Authentication is performed according to the user ID
and a complex password. Features password aging (range from 1 to 360 days) and protects the NE
from denial of service attacks.
User privileges: Users are explicitly granted permission to create, define, and delete interfaces and
services. Service operators can also enable and disable interfaces and services. Access to LCT
functionality is controlled, with permissions provided on a per-need basis.
Separate resource domains per user, down to the port level.
Audit log: Displays messages about the EMS that indicate the occurrence of non-error system events
or conditions.
Action log: Records and displays user operations that affect the configuration of the network or of the
EMS. The log records are displayed in the following logs:
Activity Log: Displays records of all user actions that affect the network configuration.
Security Log: Displays records of user actions related to security only (login, logout, forced
logout, password change).
Security Certificates: Uses security certificates to communicate with NEs and enables updating them
as required.
Optical Encryption: Enables Layer 1 optical encryption to secure data entering and exiting the
network.
Northbound API
The NB-API consists of a set of Enterprise JavaBean (EJB) interfaces that represent the main access points
for creating, reading, updating, and deleting objects within the STMS Domain. Java applications can use the
EJB interfaces via Java Remote Method Invocation (RMI).
CORBA Stubs
STMS generates CORBA stubs to implement a CORBA interface to the OPT9600 series NEs. CORBA provides
powerful architectural advantages over SNMP-based systems, including increased efficiency through
reduced calls, enhanced reliability using TCP/IP, and secure communications via SSL.
GUI Layer
STMS (server-side software) implements a sophisticated GUI layer to support the powerful features and
functions of the Java-based STMS Client (Java 8 only).
Event Manager
Implemented on top of the Java Message Service (JMS), the event manager is responsible for receiving
event messages from OPT9600 series NEs and routing them to subscribed client applications. Messages can
pertain to alarms, device trace events, and state change events.
This STMS provides most of the same management capabilities as the regular STMS.
It does not support:
ASON/WSON protection
ROADM cards
ODU_XC for all FIO cards
NBI/LightSOFT
Remote backup and RDR
NOTE: For an STMS backup, the following items are not maintained in the DB and must be
stored and backed up separately on a Network File System (NFS) server that is mounted under
the root directory of the STMS server:
Historical counters
Software builds
If the NFS server is mounted at the same point in the file system, the standby STMS can open
these items.
NOTE: You can also restart the STMS server on Solaris systems. This process stops the server
and immediately restarts it.
NOTE: The default installation location for PuTTY is C:\Program Files\PuTTY. If you want
to install PuTTY in a different folder, adjust the instructions in the procedure.
NOTE: The STMS is installed with one default user account for each of the three STMS user
groups. For the System Operator account, the default user name is system and the default
password is eci. For security purposes, it is strongly recommended that you change the default
passwords immediately after logging in for the first time.
NOTE:
If your password has expired or if the system administrator has reset your password since
your last login, you might be prompted to change your password.
If you don't type a correct password during login, your account might be locked for a
period of time. Contact your system administrator.
5. Verify that the Launcher and jnlp file are in the same folder.
6. Open the Launcher.
The STMS Client application starts, and the Login window opens.
7. In the User Name field, type your STMS user name.
8. In the Password field, type your password.
NOTES: For STMS on Linux PC, perform this step using the STMS user.
9. Click OK.
The STMS Client main window opens.
Preference Description
General Interface Options
Enable "Are You Sure" By default, you are prompted to confirm any actions that might disrupt
prompts for service-affecting services.
actions
Use native interface-naming Select to use default naming conventions for cards, ports, and paths. Clear
scheme to use description naming.
Load nested QoS state on Select to load only shallow state for Layer 3 classifiers on GUI startup.
startup
Chassis View
OPT9932 View Select the default view of the OPT9932 chassis:
Vertical Scroll (Full Scale)
Zoom In/Out (to/from Reduced Scale)
See OPT9932 Chassis view.
Layout view
Enable Layout View Select to enable/disable the layout view option. The layout view displays a
logical representation of all managed NEs in the STMS Domain.
Background Image Sets the background image for the layout view option.
Max. NEs in view Sets the maximum number of NEs that can be displayed in the layout view
(default 50).
Properties
Show properties in popup By default, right-click an object (NE, component card, interface, etc.) and
window by default then click Properties to display the properties for that object in the
Property Inspector in the View panel.
If you select this checkbox, right-click an object and then click Properties to
open the property sheet in a popup window.
Temperature Units Select the units in which to view temperature statistics: Degrees Celsius or
Fahrenheit
Logging
Show logs from all NEs in a By default, the STMS Client displays messages about system events and
single area conditions for all NEs (for which you have enabled logging) in one tab in the
Alarm/Log panel. If you clear this checkbox, messages about system events
and conditions for each NE type (for which you have enabled logging) are
displayed in separate tabs in the Alarm/Log panel.
NOTE: By default, alarms are displayed in table view and this checkbox is cleared.
3. Click Apply.
A message popup states that the STMS Client must be restarted for your change to take effect.
Preference Description
Max. interfaces per port Max. number of logical interfaces to be displayed at a given time
in the Logical Interfaces table for a port or physical interface
(default 1,000).
Max. interfaces per customer Max. number of logical interfaces to be displayed at a given time
in the Logical Interfaces table for a customer or Carrier
Resources (default 10,000).
Max. E-Lines per customer Max. number of E-Line services to be displayed at a given time in
the Services table for a customer or Carrier Resources (default
10,000).
Max. VPNs per customer Max. number of Layer 3 VPN services to be displayed at a given
time in the Layer 3 VPNs table for a customer or Carrier
Resources (default 1,000).
Max. FIB entries per instance Max. number of FIB entries contained in the FIB table for this
instance (default 10,000).
Notes:
For OTU1, no Bandwidth value exists - 20 tokens will be charged.
For 1++ protection of such a WSON trail, STMS will detect two separate WSON trails, so
the charge will be double.
NBI Connections: Enables NBI connections to the STMS server. One token is charged for each NBI
connection.
Network Element Tokens: The following number of tokens are charged for each NE, according to NE
type:
9603 NE: 1 token
9608 NE: 2 tokens
9624 NE: 6 tokens
9904X NE: 6 tokens
9914 NE: 10 tokens
9932 NE: 20 tokens
Advanced MPLS Tokens: Enables MPLS-PE Switching Mode on AoC10_L2 cards. One token is charged
each time the Switching Mode of an AoC10_L2 is changed to MPLS-PE.
Encryption Tokens: Enables:
TR10_4EN cards: OTU2/OTU2e/OTU2f line ports
TM200EN/TM100_2EN cards: ODUk sub-interfaces of client ports (encryption feature is disabled
by default)
TR10_12EN cards: ODUk sub-interfaces of any port
The following number of tokens are charged for each port/sub-interface rate:
1.25G - 13.75G: 1 token
27.5 Gbps: 3 tokens
40G: 4 tokens
100G: 10 tokens
TM400 2nd Line Port Tokens: Enables the support of the TM400 card. The first line port is not charged
(regardless of whether it's line 0 or line 1). One token is charged for the second line port.
TM400-REG100 ports do not require a license.
Muxponder Tokens: Enables muxponder client ports for the MIO200, TM200EN, and TM100_2EN
cards.
The following number of tokens are charged for each client port:
1.25G - 13.75G port: 1 token
27.5 Gbps port: 3 tokens
40G port: 4 tokens
100G port: 10 tokens
OPT99xx Matrix Capacity Tokens: Charged for the OPT99xx cards used. The following number of
tokens are charged for each card:
HIO10_20 card: 20 tokens
HIO100_2 card: 20 tokens
TIOMR_32 card: 3 tokens
OPT99xx Port Capacity Tokens: Charged for the OPT99xx ports assigned. The ports assigned for the
TIOMR_32 card are free.
The following number of tokens are charged for each HIO10_20/HIO100_2 port:
10G port: 1 token
40G port: 4 tokens
100G port: 10 tokens
L2 Packet Tokens: Charged for GExx ports assigned for HIO10_20/HIO100_2 cards. One token is
charged per NE.
You can view and manage your licenses and the available tokens via the License Manager.
To manage licenses:
1. From the System menu, select License Manager.
The STMS License Manager window opens.
2. To change the Expiration Date format, select the format from the dropdown list.
3. Click one of the following buttons:
License String: Displays the license string and enables copying it.
Description: Enabled when an entry in the list is selected. It describes the number of tokens
charged by STMS for the selected feature.
Not Usable List: Shows a list of the objects that are "not usable" due to license “overdraft”.
“Not usable” for ports means that they can't be used in trails.
Load License: Enables loading a license file to replace the current one, to extend the expiration
date or increase the number of tokens.
Save License as: Enables saving the license to a specific location.
To view the Network Element Status view for the entire network:
From the Network Explorer, right-click STMS Domain and select Network Element Status.
The NEs and their details appear in the right area.
5. Click Apply.
The changes take effect when the GUI is restarted.
The following icons can appear next to the NE name, when relevant:
- Indicates that an alarm exists for the NE (color changes according to the alarm severity)
2. The default Chassis view displays a graphical representation of the configured cards. To see the actual
installed cards in the chassis, select the Show Actual option.
NOTE: You can perform various configuration and management tasks via the menus, and by
right-clicking on the ports. Most of the Chassis view menu options are also available from the
right-click menus in the Explorer area and from the STMS main menus.
2. To view the expanded top or bottom area of the chassis, click Top Expand or Bottom Expand.
3. To change back to the regular Chassis view, click Change OPT9932 View.
NOTE: To indicate an alarm condition, the port color changes to yellow, orange, or red.
GUI Audit Log: Displays messages about the STMS Client that indicate the occurrence of non-error
system events or conditions, such as NEs being discovered.
GUI Error Log: Displays messages about the STMS Client that indicate the occurrence of system
exceptions or conditions.
Network Element Logging: If you enable logging for one or multiple NEs, this tab appears in the
Alarm/Log panel and displays messages about NE system events or conditions.
NOTE: For information about viewing and managing alarms, see Fault management. For
information about logging and tracing, see Log management.
NOTE: Alarm indicators appear in the lower right portion of an object icon in the Explorer
panel and Layout views, for example, .
If an NE is in a state which prevents the STMS from managing it, an indicator ( ) appears in the
lower portion of the NE icon to indicate that management is disabled.
NOTE: If your new password does not meet the complexity requirements of the system, you
will be prompted for a different password.
NOTE: The Security Configuration window is only available to users defined with
Administrator or Security user group privileges.
You can enable or disable a user account by selecting or de-selecting the checkbox in the Enabled
column. When a user account is disabled, the user can't log in to the STMS client.
NOTE: The Security Configuration window is only available to users defined with
Administrator or Security user group privileges.
Password History Enabled: Enables saving a defined number of previous passwords, so that a
new password defined by the user can't be the same as any of the previous passwords. The
number of saved passwords must be defined in the Size field.
3. Click Apply.
The password requirements are saved.
NOTE: The Security Configuration window is only available to users defined with
Administrator or Security user group privileges.
9. Enter the user's details. For the Password Expiration Date, you can enter an expiration date or select
Never for the password to never expire.
10. Click Finish.
The new user is added.
NOTE: The Security Configuration window is only available to users defined with
Administrator or Security user group privileges.
2. Select the user you want to modify and click Edit User.
The Edit User window opens.
4. Click Finish.
The user's details are updated.
NOTE: The Security Configuration window is only available to users defined with
Administrator or Security user group privileges.
2. Select the user you want to delete and click Delete User.
A confirmation message appears.
3. Click Yes.
The user is deleted.
NOTE: The Security Configuration window is only available to users defined with
Administrator or Security user group privileges.
2. Select the user whose password you want to change and click Reset Password.
The Reset Password window opens.
3. In the New Password field, type a new password for the user.
4. In the Verify New Password field, type the password again and click OK.
The password is reset.
NOTE: The Security Configuration window is only available to users defined with
Administrator or Security user group privileges.
2. Select the user for which you want to change the user group and click Change Group.
The Change Group window appears.
3. Select the user group from the dropdown list and click OK.
The user group is updated for the user.
NOTE: The Active User Sessions window is only available to users defined with Administrator
or Security user group privileges.
NOTE: The Active User Sessions window is only available to users defined with Administrator
or Security user group privileges.
2. Select the user session you want to end and click Force Logout.
NOTE: The Force Logout button is disabled if you select your own user session.
NOTE: You can select the amount of records to be displayed via the Page Size dropdown list.
b. Filter the activity logs according to category, operation result, time period, and/or specific text.
c. Click Apply.
The filtered log records appear.
NOTES:
To export the Activity Log to a CSV file, click Export .
NOTE: You can select the amount of records to be displayed via the Page Size dropdown list.
b. Filter the activity logs according to category, operation result, time period, and/or specific text.
c. Click Apply.
The filtered log records appear.
NOTES:
To export the Security Log to a CSV file, click Export .
NOTE: Log records older than one year are also automatically archived and deleted from the
STMS database.
Archive Directory: The name of the directory to which the log files are archived. The default is
ActivityLogArchive for the Activity Log files, and SecurityLogArchive for the Security Log files.
NOTE: Archived log files older than two years are automatically deleted.
3. Click Apply.
The archive settings are saved.
2. In the Selected column, select the checkbox of the log type you want to archive immediately (Activity
Log and/or Security Log).
3. The checkbox in the Clear After Archive column is selected automatically, which enables the deletion
of the records from the STMS database upon completion of the archive process. If you don't want the
records to be deleted, de-select this checkbox for the relevant log type.
4. Click Apply.
The log records are archived.
2. From the Select Log Type dropdown list, select the log type.
The log files appear.
NOTE: You can select the amount of records to be displayed via the Page Size dropdown list.
Field Description
User Username of the user who attempted to log in to the server
Time Time of login attempt
Result Result of login attempt