Anda di halaman 1dari 260

iManager U2000 Unified Network Management

System
V100R002C00

Product Description

Issue

03

Date

2010-11-02

HUAWEI TECHNOLOGIES CO., LTD.

Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved.


No part of this document may be reproduced or transmitted in any form or by any means without prior
written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions


and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address:

Huawei Industrial Base


Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website:

http://www.huawei.com

Email:

support@huawei.com

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Product Description

About This Document

About This Document


Related Version
The following table lists the product version related to this document.
Product Name

Version

iManager U2000

V100R002C00

Intended Audience
The iManager U2000 Product Description describes the position, functional characteristics,
system architecture and networking mode of the U2000, appended with standards that the
U2000 complies with, and performance indexes.
This document provides guides for getting the features and functions of the U2000.
This document is intended for:

Network Planning Engineer

Data Configuration Engineer

System Maintenance Engineer

Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol

Description
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.
Indicates a hazard with a medium or low level of risk,
which if not avoided, could result in minor or moderate
injury.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iii

iManager U2000 Unified Network Management System


Product Description

About This Document

Symbol

Description
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save
time.
Provides additional information to emphasize or
supplement important points of the main text.

Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention

Description

Boldface

The keywords of a command line are in boldface.

Italic

Command arguments are in italics.

[]

Items (keywords or arguments) in brackets [ ] are optional.

{ x | y | ... }

Optional items are grouped in braces and separated by


vertical bars. One item is selected.

[ x | y | ... ]

Optional items are grouped in brackets and separated by


vertical bars. One item is selected or no item is selected.

{ x | y | ... }*

Optional items are grouped in braces and separated by


vertical bars. A minimum of one item or a maximum of all
items can be selected.

[ x | y | ... ]*

Optional items are grouped in brackets and separated by


vertical bars. Several items or no item can be selected.

GUI Conventions
The GUI conventions that may be found in this document are defined as follows.

iv

Convention

Description

Boldface

Buttons, menus, parameters, tabs, window, and dialog titles


are in boldface. For example, click OK.

>

Multi-level menus are in boldface and separated by the ">"


signs. For example, choose File > Create > Folder.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

About This Document

Change History
Updates between document issues are cumulative. Therefore, the latest document issue
contains all updates made in previous issues.

Changes in Issue 03 (2010-11-02)


The second commercial release has the following updates:
The Management capabilities of the U2000 on different hardware platforms table is
updated.

Changes in Issue 02 (2010-04-15)


The initial commercial release has the following changes:
NMS Basic Functions
Descriptions of NMS basic functions are updated.
Management Capability
Descriptions of management capability are updated.

Changes in Issue 01 (2009-12-28)


Initial field trial release.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System


Product Description

Contents

Contents
About This Document ................................................................................................................... iii
1 Overview......................................................................................................................................1-1
1.1 Network Position ........................................................................................................................................... 1-1
1.1.1 Development Trend of Network Management ..................................................................................... 1-2
1.1.2 Product Orientation .............................................................................................................................. 1-2
1.2 Product Characteristics .................................................................................................................................. 1-3
1.3 Manageable Equipment ................................................................................................................................. 1-5

2 Networking and Application ...................................................................................................2-1


2.1 U2000 Deployment Mode ............................................................................................................................. 2-1
2.1.1 Centralized Deployment of the Single-Server System ......................................................................... 2-2
2.1.2 Distributed Deployment ....................................................................................................................... 2-2
2.1.3 Centralized Deployment of an HA System .......................................................................................... 2-3
2.1.4 Distributed Deployment of an HA System ........................................................................................... 2-4
2.2 Networking Scheme Introduction ................................................................................................................. 2-5
2.2.1 Inband Networking Mode .................................................................................................................... 2-5
2.2.2 Outband Networking Mode.................................................................................................................. 2-6
2.3 Application Scenario of the U2000 Management.......................................................................................... 2-7
2.3.1 Integrated NMS for Unified Network Equipment Management .......................................................... 2-8
2.3.2 Broadband Bearer Network.................................................................................................................. 2-9
2.3.3 Mobile Bearer Network ..................................................................................................................... 2-10
2.3.4 IP Core Network ................................................................................................................................ 2-12
2.3.5 Access Network ................................................................................................................................. 2-14

3 System Architecture ...................................................................................................................3-1


3.1 Software Structure ......................................................................................................................................... 3-1
3.1.1 Software Structure of the U2000 Single-Server System ...................................................................... 3-1
3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby) ................................................... 3-2
3.2 External Interfaces ........................................................................................................................................ 3-4
3.2.1 NBI....................................................................................................................................................... 3-5
3.2.2 SBI ....................................................................................................................................................... 3-9

4 NMS Basic Functions ................................................................................................................4-1


4.1 Security Management .................................................................................................................................... 4-3

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

vii

Contents

iManager U2000 Unified Network Management


System
Product Description

4.2 Topology Management .................................................................................................................................. 4-5


4.3 Alarm Management ....................................................................................................................................... 4-7
4.4 Performance Management ........................................................................................................................... 4-15
4.5 Inventory Management ............................................................................................................................... 4-18
4.6 Log Management ........................................................................................................................................ 4-19
4.7 Database Management ................................................................................................................................ 4-21
4.8 NE Communication Parameter Management .............................................................................................. 4-22
4.9 DCN Management ...................................................................................................................................... 4-23
4.10 NE Software Management ........................................................................................................................ 4-23
4.11 Report Management .................................................................................................................................. 4-25
4.12 System Monitoring .................................................................................................................................... 4-27

5 MSTP Network Feature Management ...................................................................................5-1


5.1 MSTP NE Management ................................................................................................................................ 5-2
5.2 MSTP Protection Subnet Management ......................................................................................................... 5-9
5.3 End-to-End MSTP Management ................................................................................................................. 5-10
5.4 End-to-End MSTP IP Management ............................................................................................................. 5-14
5.5 SDH ASON Management ........................................................................................................................... 5-15

6 WDM Network Feature Management....................................................................................6-1


6.1 WDM NE Management................................................................................................................................. 6-2
6.2 NA WDM NE Management ........................................................................................................................ 6-11
6.3 WDM Protection Subnet Management ....................................................................................................... 6-20
6.4 End-to-End WDM Management ................................................................................................................. 6-20
6.5 WDM ASON Management ......................................................................................................................... 6-23

7 RTN Network Feature Management ......................................................................................7-1


7.1 RTN NE Management ................................................................................................................................... 7-1
7.2 RTN Protection Subnet Management .......................................................................................................... 7-10
7.3 End-to-End RTN Management .................................................................................................................... 7-10
7.4 End-to-End RTN IP Management ............................................................................................................... 7-12

8 PTN Network Feature Management ......................................................................................8-1


8.1 PTN NE Management ................................................................................................................................... 8-1
8.2 End-to-End PTN Management .................................................................................................................... 8-18

9 Router Networks and Switch Networks Feature Management ........................................9-1


9.1 Router NE Management ................................................................................................................................ 9-2
9.2 Switch NE Management ................................................................................................................................ 9-6
9.3 Template Management .................................................................................................................................. 9-9
9.4 Diagnosis Management ............................................................................................................................... 9-11
9.5 Cluster Management ................................................................................................................................... 9-12
9.6 Node Redounded Management ................................................................................................................... 9-14
9.7 Report Subsystem Management .................................................................................................................. 9-14
9.8 VPN Service Management .......................................................................................................................... 9-14

viii

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Contents

9.9 Tunnel Service Management ....................................................................................................................... 9-16

10 Security Device Network Feature Management ..............................................................10-1


10.1 NE Management of Security Devices ....................................................................................................... 10-1
10.2 Single-Point Web Configuration of Security Devices ............................................................................... 10-2
10.3 Centralized Security Policy Configuration ................................................................................................ 10-3
10.3.1 Policy Package Management ........................................................................................................... 10-4
10.3.2 Security Policy Configuration .......................................................................................................... 10-5
10.3.3 Attack Defense Configuration .......................................................................................................... 10-5
10.3.4 Policy Resource Configuration ........................................................................................................ 10-6
10.3.5 Mapping Service .............................................................................................................................. 10-6
10.4 Report Subsystem Management ................................................................................................................ 10-6
10.5 VPN Service Management ........................................................................................................................ 10-7
10.5.1 IPSec End-to-End Service ................................................................................................................ 10-7
10.5.2 Remote Access Service .................................................................................................................... 10-7

11 FTTx Network Feature Management .................................................................................11-1


11.1 OLT Management ...................................................................................................................................... 11-1
11.2 ONU Management .................................................................................................................................... 11-3

12 MSAN Network Feature Management ..............................................................................12-1


12.1 MSAN Management ................................................................................................................................. 12-1

13 DSLAM Network Feature Management............................................................................13-1


13.1 DSLAM Management ............................................................................................................................... 13-1

14 ONT Management .................................................................................................................14-1


15 Reliability ................................................................................................................................15-1
15.1 Reliability Indicator................................................................................................................................... 15-1
15.2 HA System ................................................................................................................................................ 15-2
15.3 DCN Protection ......................................................................................................................................... 15-3
15.4 Disk Mirroring .......................................................................................................................................... 15-3
15.5 Data Backup .............................................................................................................................................. 15-3

16 Performance Indicators .........................................................................................................16-1


17 Management Capability .......................................................................................................17-1
17.1 Management Capability ............................................................................................................................ 17-1
17.2 Manageable MSTP Series Equipment ..................................................................................................... 17-12
17.3 Manageable WDM Series Equipment ..................................................................................................... 17-14
17.4 Manageable NA WDM Series Equipment............................................................................................... 17-15
17.5 Manageable Marine Series Equipment .................................................................................................... 17-16
17.6 Manageable RTN Series Equipment ....................................................................................................... 17-16
17.7 Manageable PTN Series Equipment ........................................................................................................ 17-17
17.8 Manageable FTTx Series Equipment ...................................................................................................... 17-18
17.9 Manageable MSAN Series Equipment .................................................................................................... 17-19
Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

ix

Contents

iManager U2000 Unified Network Management


System
Product Description

17.10 Manageable DSLAM Series Equipment ............................................................................................... 17-19


17.11 Manageable Router Series Equipment .................................................................................................. 17-20
17.12 Manageable Switch Series Equipment .................................................................................................. 17-21
17.13 Manageable Metro Service Platform Equipment .................................................................................. 17-22
17.14 Manageable Broadband Access Series Equipment ................................................................................ 17-22
17.15 Manageable VoIP Gateway Equipment ................................................................................................. 17-23
17.16 Manageable WLAN Series equipment .................................................................................................. 17-23
17.17 Manageable Firewall Series Equipment ................................................................................................ 17-23
17.18 Manageable Service Inspection Gateway Equipment ........................................................................... 17-26
17.19 Manageable SVN Series Equipment ..................................................................................................... 17-27

18 Standards Compliance ..........................................................................................................18-1


A Glossary .................................................................................................................................... A-1
B Acronyms and Abbreviations ................................................................................................ B-1

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Figures

Figures
Figure 1-1 Network position of the U2000 ........................................................................................................ 1-3
Figure 1-2 Centralized network management..................................................................................................... 1-4
Figure 2-1 Single-server mode ........................................................................................................................... 2-2
Figure 2-2 Distributed deployment mode ........................................................................................................... 2-3
Figure 2-3 Centralized deployment of an HA system......................................................................................... 2-4
Figure 2-4 Distributed deployment of an HA system ......................................................................................... 2-5
Figure 2-5 Inband networking diagram .............................................................................................................. 2-6
Figure 2-6 Outband networking mode................................................................................................................ 2-7
Figure 2-7 Integrated NMS for unified network equipment management.......................................................... 2-8
Figure 2-8 Network management solution for a broadband bearer network ...................................................... 2-9
Figure 2-9 Network management solution for a mobile bearer network .......................................................... 2-11
Figure 2-10 Network management solution for an IP core network ................................................................. 2-13
Figure 2-11 Networking application of the U2000 in the access network ........................................................ 2-15
Figure 3-1 U2000 software structure .................................................................................................................. 3-2
Figure 3-2 Software structure - Solaris HA system (Veritas hot standby) .......................................................... 3-3
Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby) ................................................. 3-3
Figure 3-4 Software structure - Windows HA system (Veritas hot standby) ...................................................... 3-4
Figure 3-5 Function and Feature ........................................................................................................................ 3-5
Figure 4-1 Overview of some of the U2000 applications ................................................................................... 4-1
Figure 4-2 Mechanism for implementing security management ........................................................................ 4-3
Figure 4-3 Topology view and its functions ....................................................................................................... 4-5
Figure 4-4 Alarm display in the topology view .................................................................................................. 4-6
Figure 4-5 Illustration of automatic topology discovery .................................................................................... 4-7
Figure 4-6 Alarm Browsing ................................................................................................................................ 4-9
Figure 4-7 Various alarm notification means .................................................................................................... 4-13
Figure 4-8 Alarm jumping ................................................................................................................................ 4-14

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xi

Figures

iManager U2000 Unified Network Management


System
Product Description

Figure 4-9 Performance Management Process ................................................................................................. 4-15


Figure 4-10 Inventory management window and its functions ........................................................................ 4-18
Figure 4-11 Log management window and its functions .................................................................................. 4-19
Figure 4-12 Function and Feature .................................................................................................................... 4-24
Figure 4-13 Diagram of the NE resource report ............................................................................................... 4-26
Figure 4-14 Diagram of the network resource report ....................................................................................... 4-27
Figure 8-1 Unicast MPLS tunnel ...................................................................................................................... 8-10
Figure 8-2 CES service application model ....................................................................................................... 8-12
Figure 8-3 ATM service application model ...................................................................................................... 8-13
Figure 8-4 E-Line Service ................................................................................................................................ 8-14
Figure 8-5 E-Aggr service scenario 1 ............................................................................................................... 8-15
Figure 8-6 E-Aggr service scenario 2 ............................................................................................................... 8-15
Figure 8-7 E-LAN service ................................................................................................................................ 8-16
Figure 9-1 Cluster topology.............................................................................................................................. 9-13
Figure 9-2 Navigation path to cluster functions ............................................................................................... 9-13

xii

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Tables

Tables
Table 4-1 Description of alarm functions ........................................................................................................... 4-9
Table 4-2 Monitoring template type ................................................................................................................. 4-16
Table 8-1 Types of PTN service interfaces ......................................................................................................... 8-3
Table 15-1 Reliability indicators of the U2000 ................................................................................................. 15-2
Table 15-2 Data backup .................................................................................................................................... 15-4
Table 16-1 Performance indicators ................................................................................................................... 16-1
Table 16-2 DCN bandwidth requirements ........................................................................................................ 16-2
Table 17-1 Management capabilities of the U2000 on different hardware platforms ....................................... 17-3
Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents .................................. 17-7
Table 17-3 Management capabilities of the U2000 on different IP NE equivalents ......................................... 17-9
Table 17-4 Management capabilities of the U2000 on different access NE equivalents ................................ 17-12
Table 17-5 Manageable MSTP series equipment ............................................................................................ 17-13
Table 17-6 Manageable WDM equipment ...................................................................................................... 17-14
Table 17-7 Manageable NA WDM series equipment ..................................................................................... 17-16
Table 17-8 Manageable marine series equipment ........................................................................................... 17-16
Table 17-9 Manageable RTN equipment ........................................................................................................ 17-17
Table 17-10 Manageable PTN series equipment ............................................................................................ 17-17
Table 17-11 Manageable FTTx series equipment ........................................................................................... 17-18
Table 17-12 Manageable MSAN series equipment ........................................................................................ 17-19
Table 17-13 Manageable DSLAM series equipment ...................................................................................... 17-19
Table 17-14 Manageable router series equipment .......................................................................................... 17-20
Table 17-15 Manageable switch series equipment ......................................................................................... 17-21
Table 17-16 Manageable Metro service platform equipment ......................................................................... 17-22
Table 17-17 Manageable broadband access series equipment ........................................................................ 17-22
Table 17-18 Manageable VoIP gateway equipment ........................................................................................ 17-23
Table 17-19 Manageable WLAN series equipment ........................................................................................ 17-23

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

xiii

Tables

iManager U2000 Unified Network Management


System
Product Description
Table 17-20 Manageable firewall series equipment ....................................................................................... 17-23
Table 17-21 Manageable service inspection gateway equipment ................................................................... 17-26
Table 17-22 Manageable SVN series equipment ............................................................................................ 17-27
Table 18-1 Details of the Standards and Protocols ........................................................................................... 18-2

xiv

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

1 Overview

Overview

About This Chapter


This topic describes the position of the U2000 in the telecommunication management network
(TMN) hierarchy, the product characteristics, and the equipment that the U2000 can manage.
1.1 Network Position
Introduce the development trend of network management and the network position of the
U2000.
1.2 Product Characteristics
After software optimization, the U2000 improves the capability of managing integrated
networks, scalability, and ease of use. Therefore, the U2000 helps to construct a
customer-centered and future-oriented network management system of a new generation.
1.3 Manageable Equipment
Introduce the equipment that the U2000 V100R002C00 can manage.

1.1 Network Position


Introduce the development trend of network management and the network position of the
U2000.
1.1.1 Development Trend of Network Management
With the development of IT and IP technology and the convergence of telecommunications, IT,
media, and electronic industries, the telecommunications industry has witnessed tremendous
growth. The broadband services and mobile services have become the mainstream services in
telecommunications networks.
1.1.2 Product Orientation
The U2000 is the major and future-oriented network management product and solution in
Huawei.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

1-1

iManager U2000 Unified Network Management System


Product Description

1 Overview

1.1.1 Development Trend of Network Management


With the development of IT and IP technology and the convergence of telecommunications, IT,
media, and electronic industries, the telecommunications industry has witnessed tremendous
growth. The broadband services and mobile services have become the mainstream services in
telecommunications networks.
All-IP architecture and fixed-mobile convergence (FMC) are the network development goals
for the next three to five years, during which the market orientations and business modes of
telecom carriers will vary accordingly. The development of all-IP architecture is the leading
factor in the transition from the existing vertical network that is divided by technology and
service to the flattened horizontal network. Improving user experience, lowering operation
expenditure (OPEX), and improving efficiency are the driving forces for FMC.
Network convergence requires network management to be consolidated. To be oriented to the
future network trend, the iManager U2000 that is the integrated network management system
(NMS) combines all-IP and FMC, and manages carrier equipment and access equipment in a
centralized manner. The U2000 can perform not only integrated management of multi-domain
equipment but also integrated management at the network element (NE) and network layers.
The U2000 has revolutionized the layer-based management mode to meet the management
requirements in the transition from the existing vertical network to the flattened horizontal
network.
The integrated NMS U2000 aims to minimize operation and maintenance (O&M) costs for
customers and to bring more network value. The U2000 is based on the design of distributed
software architecture, and supports the new generation advanced telecom computing
architecture (ATCA) hardware platform. In addition, the super network management
capability and modular software architecture of the U2000 that shapes the development trend
in the future network management make the U2000 a leading all-IP and FMC management
solution.

1.1.2 Product Orientation


The U2000 is the major and future-oriented network management product and solution in
Huawei.
The U2000 is an integrated management platform for all equipment in the Huawei. It can
manage transport equipment, access equipment, and IP equipment (including routers, security
equipment, and Metro Ethernet equipment) in a centralized manner. The U2000 is designed as
the management system for Huawei equipment. With powerful management functions at the
NE and network layers, the U2000 is the major and future-oriented network management
product and solution in Huawei.
In the TMN hierarchy, the U2000 is located between the element management layer and
network management layer, and supports all functions of the NE and network layers. Figure
1-1 shows the network position of the U2000.

1-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

1 Overview

Figure 1-1 Network position of the U2000


OSS
Service
management layer
XML/CORBA/SNMP/FTP
iManager U2000

Network
management layer

Element
management layer

Access network
MSAN/FTTX

Transport network
SDH/WDM/
OTN/MW

IP network
Router/Switch/
BRAS/PTN

Network
element layer

1.2 Product Characteristics


After software optimization, the U2000 improves the capability of managing integrated
networks, scalability, and ease of use. Therefore, the U2000 helps to construct a
customer-centered and future-oriented network management system of a new generation.

Centralized Network Management


The U2000 can manage transport equipment, access equipment, and IP equipment in a
centralized manner. Figure 1-2 shows the equipment that the U2000 manages. The main
characteristics of the U2000 are as follows:

Manages multiple equipment and the services related to the equipment in Huawei. For
details, see 1.3 Manageable Equipment.

Manages end-to-end services across domains in access and bearer networks. The services
include synchronous digital hierarchy (SDH, WDM, microwave, and packet services).

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

1-3

iManager U2000 Unified Network Management System


Product Description

1 Overview

Figure 1-2 Centralized network management

U2000

IP MSAN

WDM
EPE
NPE

EPE

VDSL2
OLT

BRAS

VPLS/MPLS

IP/MPLS

NPE

AG

MSE
MSTP

MSTP

BRAS

Internet/
SP
WDM

MSTP

VC12/VC4

UPE

Home/Business

IPTV

MSE
EPE

ONT

IMS
Core

Access
Node

MSTP

MSTP

Metro Network

SR/BRAS

Backbone

Multiple Operating Systems


The U2000 is a stand-alone application that can be installed on different operating systems
and databases. Hence, multiple operating systems are compatible.
The U2000 is developed based on Huawei's integrated management application platform
(iMAP). It supports Sun workstations, PC servers, Sybase databases, Oracle databases, SQL
Server databases, and Solaris, Windows, and SuSE Linux operating systems. It provides
high-end solutions to large-scale networks and low-cost solutions to small and medium-scale
networks.

Modular Architecture
The U2000 uses a modular design to increase system flexibility.

1-4

By adopting the mature and widely-used C/S (Client/Server) architecture, the U2000
supports distributed and hierarchical database system, service processing system, and
foreground application system, and supports concurrent operations of multiple clients, to
meet the management requirements of complex and large-scale networks.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

1 Overview

The U2000 uses an object-oriented, multiprocessing, modular, and componentized


architecture design. Hence, the degree of coupling of NE management components
decreases. In addition, different application processes are integrated into the system by
means of registry files. In this way, the U2000 has flexible expansion capabilities.

Stand-alone and distributed deployment of the U2000 increases the management


capability to a great extent.

The modular architecture of the U2000 meets the management requirements of products
in a single domain and the integrated management requirements of products across
domains.

1.3 Manageable Equipment


Introduce the equipment that the U2000 V100R002C00 can manage.
The equipment that the U2000 V100R002C00 can manage is listed as follows:

Manageable MSTP series equipment

Manageable WDM series equipment

Manageable NA WDM series equipment

Manageable marine series equipment

Manageable RTN series equipment

Manageable PTN series equipment

Manageable FTTx series equipment

Manageable MSAN series equipment

Manageable DSLAM series equipment

Manageable router series equipment

Manageable switch series equipment

Manageable Metro service platform series equipment

Manageable broadband access series equipment

Manageable VoIP gateway series equipment

Manageable WLAN series series equipment

Manageable firewall series equipment

Manageable service inspection gateway series equipment

Manageable SVN series equipment

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

1-5

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Networking and Application

About This Chapter


The U2000 provides a centralized networkwide management solution to transport, IP, and
access networks. In addition, the U2000 provides standard external interfaces to integrate with
the operation support system (OSS), to meet the management requirements of large-scale
transport networks.
2.1 U2000 Deployment Mode
The U2000 supports the centralized and distributed deployment modes of servers.
2.2 Networking Scheme Introduction
The U2000 adopts the widely used C/S (Client/Server) model. In such a model, the client and
the server communicate through the LAN or wide area network (WAN). The U2000 server
communicates with its managed devices in inband or outband networking mode.
2.3 Application Scenario of the U2000 Management
This topic describes the typical application scenario of U2000 management.

2.1 U2000 Deployment Mode


The U2000 supports the centralized and distributed deployment modes of servers.
The U2000 uses the Client/Server architecture. Depends on the sizes of managed networks,
the U2000 supports the centralized and distributed deployment modes of servers.
To ensure the high availability of the system, the U2000 supports the HA system (Veritas hot
standby). The HA system (Veritas hot standby) can also be configured in the distributed mode.
The U2000 system contains management components for manageable equipment. The
components support multiple instances in the distributed mode.
2.1.1 Centralized Deployment of the Single-Server System
The U2000 supports centralized deployment of the single-server system on Windows, Solaris
or SUSE Linux OS, that is, there is only one U2000 server on which all management
components are installed and all processes run.
2.1.2 Distributed Deployment

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

2-1

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

The U2000 supports distributed deployment of the single-server system on SUSE Linux OS.
Slave servers can share the CPU usage and memory usage of the master server. In this manner,
the load is balanced.
2.1.3 Centralized Deployment of an HA System
The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where
there is only one server on either the primary site or the secondary site.
2.1.4 Distributed Deployment of an HA System
The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed
deployment mode where both the primary and secondary sites use distributed systems.

2.1.1 Centralized Deployment of the Single-Server System


The U2000 supports centralized deployment of the single-server system on Windows, Solaris
or SUSE Linux OS, that is, there is only one U2000 server on which all management
components are installed and all processes run.
The U2000 supports a networking scheme of a single server and multiple clients. In the
centralized deployment mode of the single-server system, there is only one U2000 server on
which all management components are installed and all processes run. See Figure 2-1.
Figure 2-1 Single-server mode

This type of networking is applicable to medium and small-scale networks.

2.1.2 Distributed Deployment


The U2000 supports distributed deployment of the single-server system on SUSE Linux OS.
Slave servers can share the CPU usage and memory usage of the master server. In this manner,
the load is balanced.
The U2000 supports a networking scheme of multiple servers and clients, as shown in Figure
2-2.

2-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Figure 2-2 Distributed deployment mode

The management components for manageable equipment can be deployed on different servers
or on the same server.
Distributed system consists of the master server and slave server, which compose a site to
perform the U2000 server function.
The master server is the core of a distributed system. The database server and the core
subsystems of the U2000 are running on the master server.
The non-core subsystems of the U2000 (such as the management components for manageable
equipment) are running on the slave server. In this way, the CPU usage and the memory usage
of the master server are lowered, the load is balanced between the master and slave servers
and the management capability of the U2000 is increased.
In the distributed deployment mode, you can deploy all servers in only the same LAN.

2.1.3 Centralized Deployment of an HA System


The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where
there is only one server on either the primary site or the secondary site.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

2-3

2 Networking and Application

iManager U2000 Unified Network Management System


Product Description

The primary and secondary sites comprise an HA system. The data in different locations is
backed up through a network. When a fault occurs in the primary site, the system switches to
the secondary site so that network monitoring continues. Figure 2-3 shows the networking
diagram.
Figure 2-3 Centralized deployment of an HA system

2.1.4 Distributed Deployment of an HA System


The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed
deployment mode where both the primary and secondary sites use distributed systems.
The primary and secondary sites comprise an HA system. The data in different locations is
backed up through a network. When a fault occurs in the primary site, the system switches to
the secondary site so that network monitoring continues. In the primary or secondary site,
master and slave servers are deployed in a distributed mode. The slave servers can share the
CPU usage and memory usage of the master server. In this manner, the load is balanced
between the master and slave servers. Figure 2-4 shows the networking diagram.

2-4

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Figure 2-4 Distributed deployment of an HA system

2.2 Networking Scheme Introduction


The U2000 adopts the widely used C/S (Client/Server) model. In such a model, the client and
the server communicate through the LAN or wide area network (WAN). The U2000 server
communicates with its managed devices in inband or outband networking mode.
2.2.1 Inband Networking Mode
In inband networking mode, the U2000 uses the service channels that are provided by the
managed devices to manage the devices on the network. The messages sent from the U2000
are transmitted through the service channels of the managed devices.
2.2.2 Outband Networking Mode
In outband networking mode, the U2000 uses the communication channels that are provided
by devices other than the managed devices to transmit messages for network management. In
normal cases, the management interface on the main processing unit or routing switch unit of
the managed device are used as the access interface.

2.2.1 Inband Networking Mode


In inband networking mode, the U2000 uses the service channels that are provided by the
managed devices to manage the devices on the network. The messages sent from the U2000
are transmitted through the service channels of the managed devices.
Figure 2-5 shows the inband networking diagram.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

2-5

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Figure 2-5 Inband networking diagram

Managed Network
NMS

Networking Description
The devices managed by the U2000 are all connected to the managed network. The U2000
needs to be connected to only the nearby NE on the managed network. After configuring the
related routes, you can manage all the devices on the network.
The way of connecting the U2000 with the managed network depends on the distance
between the U2000 and its nearby NE. If the U2000 and its nearby IP devices are in the same
equipment room, you can use the LAN mode. If the U2000 and its nearby IP devices are far
from each other, you can use the private line mode. The private line mode is similar to the
outband networking mode.

Networking Advantages: This networking mode is flexible and cost-effective. It does not
need extra devices.

Networking Disadvantages: In the case of network failure, the communication channel


between the U2000 and its managed network is interrupted. As a result, the U2000
cannot maintain the managed network.

2.2.2 Outband Networking Mode


In outband networking mode, the U2000 uses the communication channels that are provided
by devices other than the managed devices to transmit messages for network management. In
normal cases, the management interface on the main processing unit or routing switch unit of
the managed device are used as the access interface.
In this mode, the U2000 can be connected to the managed devices in multiple ways. The
U2000 manages the devices within its management scope through the data communication
network (DCN).Figure 2-6 shows the outband networking mode.

2-6

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Figure 2-6 Outband networking mode

DCN

NMS

Managed Network

Networking description
The devices managed by the U2000 are all connected to the managed network. The U2000
connects with the devices on the managed network through the DCN that is made up of other
devices. In this manner, the U2000 implements its management on the managed network and
devices.

Networking advantages: In outband networking mode, the U2000 is connected to its


managed devices through other devices. It is not connected to its managed devices
directly. Compared with the inband networking mode, this mode provides more reliable
device management channels. When a fault occurs on a managed device, the U2000 can
locate information about the faulty device in a timely manner and monitor this device in
real time.

Networking disadvantages: In outband networking mode, the U2000 manages its


managed devices through a maintenance channel that is independent of the service
channel. To provide such a maintenance channel, you need to build a network that is
made up of extra devices. Thus, the cost of constructing the network is high.

2.3 Application Scenario of the U2000 Management


This topic describes the typical application scenario of U2000 management.
2.3.1 Integrated NMS for Unified Network Equipment Management
This topic describes the integrated NMS U2000, which is developed for the typical solution of
unified equipment management.
2.3.2 Broadband Bearer Network

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

2-7

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

The U2000 provides perfect solutions for broadband bearer networks in terms of network
deployment, service deployment, and service assurance.
2.3.3 Mobile Bearer Network
The U2000 provides perfect solutions for mobile bearer networks in terms of network
deployment, service deployment, and service assurance.
2.3.4 IP Core Network
The U2000 provides perfect solutions for IP core networks in terms of network deployment,
service deployment, and service assurance.
2.3.5 Access Network
In the networking application of the access network, the U2000 manages and maintains xPON
OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner.

2.3.1 Integrated NMS for Unified Network Equipment


Management
This topic describes the integrated NMS U2000, which is developed for the typical solution of
unified equipment management.
Figure 2-7 Integrated NMS for unified network equipment management
oss

Service management layer

XML/CORBA/SNMP/FTP/TL1
iManager U2000
Network management layer
+
NE management layer

Access network
MSAN/FTTX

Access network

Transport network
SDH/WDM/OTN/MW

Datacom network
Router/Switch/BRAS
/PTN

NE layer

The features of the U2000 are as follows:

2-8

The U2000 provides a unified platform for managing access equipment, transport
equipment, and datacom equipment, thus realizing integrated management on
cross-domain equipment. In addition, the U2000 breaks the restrictions of the vertical
management mode and realizes integrated management on the equipment at the network
layer and NE layer.

The U2000 meets the network integration trend and can provide management schemes
for multiple types of networking scenarios. With unified and consistent GUIs, simple and
convenient service deployment, and effective service monitoring and assurance, the
U2000 brings good user experience and greatly reduces network operation and
maintenance costs.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

U2000Blessed by the good cooperation relationships between Huawei and many


mainstream OSS vendors, the U2000 can provide abundant NBIs and powerful NBI
customization support, protecting user investment to the largest extent.

2.3.2 Broadband Bearer Network


The U2000 provides perfect solutions for broadband bearer networks in terms of network
deployment, service deployment, and service assurance.

Networking Diagram
Figure 2-8 Network management solution for a broadband bearer network

Network Deployment
The U2000 meets the following requirements in the network deployment stage:

Supporting the remote disaster recovery solutions


When the active server fails, the standby server can take over as the active server to
avoid service interruption.

Issue 03 (2010-11-02)

Providing the fast OSS integration capability through abundant NBIs such as SNMP, FTP,
CORBA, and XML NBIs and implementing end-to-end management by providing alarm,
inventory, and performance data for upper-layer OSSs.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

2-9

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Service Deployment
Carrying multiple services is one of the most distinctive features of the Metro Ethernet.
Services such as the high-speed internet (HSI) service, IPTV, and voice over IP (VoIP) must
be established on logical channels.
The U2000 allows you to quickly establish specific logical channels on physical networks.
For example, you can quickly establish end-to-end MPLS LSP, MPLS TE, PW, and VPLS
logical channels through GUIs. You can verify the validity of services before deployment and
modify services after the logical channels are established.
The Metro Ethernet often carries heavy service traffic. To adapt to this feature, the U2000
provides the batch deployment function to accelerate the deployment process.
To ensure the reliability of key channels, you can configure protection protocols such as BFD,
VRRP, and MPLS OAM.
The U2000 provides efficient test diagnosis tools. Through the related test cases, you can use
test diagnosis tools to quickly identify fault causes and rectify network faults, thus ensuring
network stability.

Service Assurance
The U2000 monitors the running status of the network 24 hours a day and 7 days a week in
multiple ways. It can detect network faults or degradation in a timely manner and report
endto- end SLA data of the network.
The U2000 provides the following service assurance for the broadband bearer network:

Real-time alarm monitoring and notification


The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network.

Performance monitoring 24 hours a day and 7 days a week


The U2000 regularly collects the traffic data of all the links or some key links on the
entire network to provide effective support for network monitoring.

End-to-end SLA monitoring on network nodes


The U2000 regularly collect the SLA data between PEs, between the local CE and PE,
and between the PE and remote CE. With these data, you can discover network
degradation, predict the trend of network running, and optimize the network accordingly.

2.3.3 Mobile Bearer Network


The U2000 provides perfect solutions for mobile bearer networks in terms of network
deployment, service deployment, and service assurance.

2-10

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Networking Diagram
Figure 2-9 Network management solution for a mobile bearer network

Network Deployment
The U2000 meets the following requirements in the network deployment stage:

Large-scale network management in distributed deployment mode


In distributed deployment mode, NE Explorer instances can be deployed on one or more
servers, enabling the entire system to have good expansibility and meet various complex
network management requirements. This greatly reduces the operation and maintenance
investment of large-scale networks.

HA solution
The U2000 supports two-node cluster backup and real-time monitoring to ensure data
security.

Service Deployment
On a mobile bearer network, the TDM base station, ATM base station, and IP base station are
borne by end-to-end PWs.
The U2000 supports the following features in terms of service deployment:
Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

2-11

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Providing user-friendly GUIs for the creation and maintenance of logical CES, ATM,
Ethernet, and PWE3 channels

Supporting the ability to perform end-to-end management on static and dynamic tunnels
and to query the binding relations between PWs and tunnels

Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, MPLS OAM,
and QoS to ensure service reliability

Supporting the ability to deploy services in batches through the service template to
improve the efficiency and preciseness of service deployment, in the case that a large
number of NEs are deployed on the mobile bearer network

Service Assurance
The U2000 provides the following service assurance for the mobile bearer network:

Real-time alarm monitoring and notification


The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network.

Performance monitoring 24 hours a day and 7 days a week


The U2000 periodically collects the key performance indicators of networkwide links or
specified links and dynamically displays the network running status, providing important
references for locating network faults.

Service-centered performance monitoring


On a mobile bearer network, you can precisely analyze the trend of service traffic, and
identify and locate faults through the performance indicators used to monitor the related
services, such as PWE3, VPLS, and L3VPN services.

2.3.4 IP Core Network


The U2000 provides perfect solutions for IP core networks in terms of network deployment,
service deployment, and service assurance.

2-12

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Networking Diagram
Figure 2-10 Network management solution for an IP core network

Network Deployment
The U2000 meets the following requirements in the network deployment stage:

Centralized deployment and authority- and domain-based user management


Different users can mange different objects according to their respective management
rights. In this manner, the security of the U2000 is ensured.

HA solution
The U2000 supports two-node cluster backup and real-time monitoring to ensure data
security.

Distributed deployment of collectors for managing large-scale networks


In distributed deployment mode, NE explorer instances can be deployed on one or more
servers, enabling the whole system to have good expansibility and meet various complex
network management requirements. This greatly reduces the operation and maintenance
investment of large-scale networks.

Service Deployment
The U2000 supports the following features in terms of service deployment:

Issue 03 (2010-11-02)

Supporting the ability to deploy mainstream services such as VPLS, L3VPN, and PWE3
services and providing multiple types of service configuration templates and bulk
configuration templates

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

2-13

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

With simple and user-friendly GUIs, the U2000 effectively improves the efficiency of
service deployment.

Supporting the ability to manage mainstream routing protocols, such as OSPF, ISIS, and
BGP

Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, VPN FRR,
MPLS OAM, and QoS to ensure service reliability

Service Assurance
The U2000 provides the following service assurance for the IP core network:

Real-time alarm monitoring and notification


The U2000 can monitor network faults and the status of devices and interfaces in real
time. By notifying the related personnel of network faults through the SMS or email, the
U2000 effectively ensures the normal running of the network. By diagnosing services
according to network protocol layers, the U2000 can quick locate the faulty network
layer.

Performance monitoring 24 hours a day and 7 days a week


The U2000 periodically collects the key performance indicators of networkwide links or
specified links and dynamically displays the network running status, providing important
references for locating network faults.

End-to-end SLA monitoring on network nodes


The U2000 regularly collects the SLA data between PEs, between the local CE and PE,
and between the PE and remote CE. With these data, you can discover network
degradation, predict the trend of network running, and optimize the network accordingly.

2.3.5 Access Network


In the networking application of the access network, the U2000 manages and maintains xPON
OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner.
Figure 2-11 shows the networking application of the U2000 in the access network.

2-14

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

Networking Diagram
Figure 2-11 Networking application of the U2000 in the access network

Networking description

Issue 03 (2010-11-02)

Broadband access:

As IP-DSLAMs, the broadband access devices support various broadband access


modes, such as the ADSL2+, SHDSL, and VDSL2. They provide high-speed Internet
access service, video service, and ATM and IP private line services for business users,
enterprises, cyber cafes, and common users.

The DSLAMs at different levels can be subtended through GE/FE ports to provide
xDSL services. The subtending of devices extends the coverage of the network
efficiently and meets the requirements of the scenarios in which a large number of
users are supported.

The broadband access devices provide the LAN private line interconnection service
of the carrier-class high quality. The service is applicable to the interconnection
between branches, such as the government, enterprise, and business user (for example,
a bank), and their headquarters. It is also applicable to other applications such as
broadband Internet access and video conference.

FTTx access:

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

2-15

iManager U2000 Unified Network Management System


Product Description

2 Networking and Application

2-16

The OLT in the PON system works with the ONU/ONT, which is connected to the
LAN switch or hub in the downstream direction, to provide service access for users.

In the downstream direction, the OLT is connected to the MDU or mini-MSAN


through fibers. The MDU or mini-MSAN provides service access for more users
through twisted pairs, coaxial cables, and category-5 cables.

Integrated access:

Controlled by the MGC, the MSAN supports the VoIP, FoIP, and MoIP service access
and provides ISDN BRA and ISDN PRA services.

The MSAN provides the ADSL/VDSL2 broadband Internet access service and the
SHDSL private line interconnection service.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

System Architecture

About This Chapter


The U2000 provides solution of the single-layer management network for small- and
medium-scale transport networks. In addition, the U2000 provides standard external
interfaces, through which the U2000 is interconnected with an upper-layer NMS to form a
hierarchical management network. The U2000 assists the NMS at the network management
layer and the NMS at the service management layer to manage large-scale transport networks.
3.1 Software Structure
This topic describes the configuration requirements of the software structures of the U2000
single server system and U2000 HA system.
3.2 External Interfaces
An external interface is used for the communication and data exchange between the NMS and
external systems. An external interface can be a northbound or southbound interface.

3.1 Software Structure


This topic describes the configuration requirements of the software structures of the U2000
single server system and U2000 HA system.
3.1.1 Software Structure of the U2000 Single-Server System
This topic describes the software structure of the U2000 single-server system.
3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby)
This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).

3.1.1 Software Structure of the U2000 Single-Server System


This topic describes the software structure of the U2000 single-server system.
The U2000 single-server system is a standard system structure of the U2000. A U2000 server
can be connected to multiple U2000 clients.
Figure 3-1 shows the structural relationship between main modules.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

3-1

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

Figure 3-1 U2000 software structure

3.1.2 Software Structure of the U2000 HA System (Veritas Hot


Standby)
This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).
The U2000 HA system (Veritas Hot Standby), a type of HA system provided by the U2000,
applies to geographic redundancy of an HA system.
The U2000 HA system (Veritas Hot Standby) supports the Solaris, SUSE Linux, and
Windows. Figure 3-2, Figure 3-3, and Figure 3-4 show the software structure.

3-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

Figure 3-2 Software structure - Solaris HA system (Veritas hot standby)

Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby)

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

3-3

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

Figure 3-4 Software structure - Windows HA system (Veritas hot standby)

The Veritas volume replicator (VVR) is used to duplicate the U2000 data on the primary
site to the secondary site so that data is synchronized between the primary and secondary
sites in real time.

The Veritas cluster server (VCS) is used to monitor the system and application service in
real time. When a fault occurs in hardware or software, the VCS restarts or stops the
application service.

The Veritas volume manager (VxVM) is used to manage the disks and data volumes of
servers.

3.2 External Interfaces


An external interface is used for the communication and data exchange between the NMS and
external systems. An external interface can be a northbound or southbound interface.
Figure 3-5 depicts the function and feature of external interface.

3-4

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

Figure 3-5 Function and Feature

3.2.1 NBI
Through the NBIs, the U2000 offers networking monitoring information for the OSS on
various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the
U2000 support network management functions, including service provisioning and diagnosis
test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs.
3.2.2 SBI
Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to
implement the functions such as provisioning services, transmitting alarms, and transmitting
performance data.

3.2.1 NBI
Through the NBIs, the U2000 offers networking monitoring information for the OSS on
various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the
U2000 support network management functions, including service provisioning and diagnosis
test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs.
The following table lists the equipment supported by the NBIs of the U2000.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

3-5

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

Interface
Type

Equipment

XML

The XML NBI enables unified management functions for the OSS in
terms of alarms, performance, inventory, and service provisioning. These
management functions apply to routers, Metro equipment, transport
equipment, and access equipment.

CORBA

The CORBA NBI enables unified alarm management for the OSS on
routers, Metro equipment, transport equipment, and access equipment.
Meanwhile, the CORBA NBI enables management of performance,
inventory, and service provisioning for the OSS in Metro and transport
domains.

SNMP

The SNMP NBI enables unified alarm management of the OSS on


routers, Metro equipment, transport equipment, and access equipment.

TL1

The TL1 NBI enables inventory query, inventory provisioning, and


service provisioning (xDSL, xPON, broadband, and narrowband
services) for the OSS in the access domain.

FTP

The FTP performance NBI enables the export of performance statistics


for the OSS. In this case, the performance statistics is exported to the
specified FTP server for analysis.

MML

The U2000 can access an OSS test system, and can support tests on
narrowband access devices (lines and terminals) and ADSL lines through
the OSS test NBI.

XML NBI
Compliant with the TMF MTOSI 2.0 series standard, the U2000 XML NBI enables unified
management functions of the OSS in terms of alarms, performance, inventory, and service
provisioning. These management functions apply to routers, Metro equipment, transport
equipment, and access equipment.
The U2000 XML NBI mainly supports the following functions:

Alarm management

Report alarm events.

Synchronize active alarms.

Acknowledge alarms.

Unacknowledge alarms.

Collect alarm statistics.

Performance management

Query history performance data.

Query current performance data.

Report performance threshold-crossing events.

Query performance threshold-crossing events.

Inventory management

3-6

Query physical inventory (NE, shelf, slot, card, and physical port).

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

Query logical inventory (logical port, fiber/cable, tunnel, and service).

Export inventory data and report the change of inventory.

Service provisioning management

Provision resources for the routing and Metro tunnels (MPLS tunnel and IP tunnel).

Provision resources for the routing and Metro services (ATM PWE3, CES PWE3,
ETH PWE3, VPLS, and L3VPN).

CORBA NBI
Compliant with the TMF MTNM V3.5 series standard, the U2000 CORBA NBI enables
unified alarm management for the OSS. Meanwhile, the CORBA NBI enables service
provisioning, diagnosis test, inventory management, and performance management on Metro
and transport equipment.
The U2000 CORBA NBI mainly supports the following functions:

Alarm management

Report alarm events.

Synchronize active alarms.

Acknowledge alarms.

Unacknowledge alarms.

Performance management in the Metro and transport domains

Query history performance data.

Query current performance data.

Report performance threshold-crossing events.

Query performance threshold-crossing events.

Inventory management in the Metro and transport domains

Query physical inventory (NE, shelf, slot, card, and physical port).

Query logical inventory (logical port, fiber/cable, and trail).

Service provisioning management in the Metro and transport domains

Provision end-to-end services in the transport domain (SDH, WDM, OTN, MSTP,
ASON, and RTN).

Provision single-station services in the transport domain (SDH, WDM, OTN, and
MSTP).

Provision resources for Metro tunnels (MPLS tunnel and IP tunnel).

Provision resources for Metro services (ATM PWE3, CES PWE3, ETH PWE3, and
VPLS).

Diagnosis test management in the transport domain

Set loopback on a port and alarm insertion.

Conduct Ethernet CC, LB, and LT tests.

Conduct the 2M PRBS test.

SNMP NBI
Compliant with the SNMP V1/V2/V3 standard, the U2000 SNMP NBI enables unified alarm
management of the OSS on routers, Metro equipment, transport equipment, and access
equipment.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

3-7

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

The U2000 SNMP NBI mainly supports the following functions:

Report alarm events.

Synchronize active alarms.

Acknowledge alarms.

Unacknowledge alarms.

Report heartbeat alarm events.

Set alarm filter criteria.

TL1 NBI
Compliant with the GR 831 standard, the U2000 TL1 NBI enables inventory query, inventory
provisioning, and service provisioning (xDSL, xPON, broadband, and narrowband services)
for the OSS in the access domain.
The U2000 TL1 NBI mainly supports the following functions:

Service provisioning management in the access domain

Provision xDSL services (ADSL, SHDSL, and VDSL2).

Provision xPON services (GPON and EPON).

Provision multicast services.

Provision voice services.

Provision BRAS services.

Manage service port/PVC connections.

Manage VLANs.

Manage Ethernet ports.

Manage ACL&Qos.

Inventory management in the access domain

Query resources (equipment, shelf, card, daughter card, port, and service virtual port).

Report resource change notification.

Manage and maintain resources.

FTP Performance NBI


The U2000 FTP performance NBI enables the export of performance statistics for the OSS. In
this case, the performance statistics is exported to the specified FTP server for analysis.
The U2000 FTP performance NBI mainly supports the following functions:

Set conditions for exporting performance data, as follows:

Monitoring period of performance events

Monitoring indicator of performance events

Export period of performance data

Export performance data to the specified FTP server.

MML Test NBI


The U2000 provides the MML NBI for the upper layer OSS to implement the following
features:

3-8

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

Controlling the test component of an access device to perform a line test and report the
test result.

Issuing commands to capture or release a subscriber line to the test bus of a device and
then using external test unit to perform a line test.

The MML NBI solves the following problems:

A centralized line test system is provided to manage and test lines in the entire network.
These lines can be managed by EMSs provided by different vendors.

The integrated line test system can control an access device and a test unit concurrently
to perform a line test.

The U2000 supports the following types of MML NBIs:

Narrowband line test NBI: It is used to test narrowband access devices (lines and
terminals).

ADSL line test NBI: It is used to query ADSL port information, and capture or release
lines.

3.2.2 SBI
Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to
implement the functions such as provisioning services, transmitting alarms, and transmitting
performance data.

Qx Interface
The Qx interface adopts the private OptiX management protocol developed by Huawei.
Through the Qx interface, the U2000 is connected to the OptiX series equipment.

SNMP SBI
The SNMP interface is compliant with the SNMP V1, V2, and V2 standards. Through the
SNMP interface, the U2000 is connected to routers, switches, and security products of
Huawei.

CLI SBI
Through the CLI interface, the U2000 is connected to routers, switches, and security products
of Huawei.

SSH SBI
Secure Shell (SSH) is a tool that is similar to Telnet. All the transmitted data can be encrypted
through the SSH to prevent DNS spoofing and IP spoofing. In addition, the transmission rate
is high because the data transmitted through the SSH is compressed.

Telnet SBI
Through the Telnet SBI, the U2000 can log in to equipment remotely and manage equipment.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

3-9

iManager U2000 Unified Network Management System


Product Description

3 System Architecture

TFTP/FTP/SFTP SBI
The U2000 can back up the data of devices, upgrade devices, and load patches through the
TFTP/FTP/SFTP SBI.
When the data is backed up in the SFTP mode, the commands and the data are encrypted before they are
transmitted.

Syslog SBI
The U2000 can manage the NE logs through the Syslog SBI.

3-10

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

NMS Basic Functions

About This Chapter


The U2000 provides all management functions at element management layer and network
management layer.
Figure 4-1 depicts an overview of some of the U2000 applications.
Figure 4-1 Overview of some of the U2000 applications

4.1 Security Management

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-1

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

This topic describes how to ensure the security of the U2000 by managing objects such as
users, user groups, rights, and operation sets.
4.2 Topology Management
In topology management, the managed NEs and their connections are displayed in a topology
view. The managed NEs are displayed and managed in subnets and views. You can monitor
the operating status of the entire network in real time by browsing the topology view.
4.3 Alarm Management
In alarm management, you can monitor network exceptions in real time. It provides various
management methods such as alarm statistics, alarm identification, alarm notification, alarm
redefinition, and alarm correlation analysis. This helps the network administrator take proper
measures to recover the normal operation of the network.
4.4 Performance Management
The U2000 can monitor the key indicators of a network in real time, and provide statistics on
the collected performance data. It provides a graphical user interface (GUI) to facilitate
network performance management.
4.5 Inventory Management
The U2000 provides the inventory management function that allows you to query and collect
the statistics on physical and logical resources in a unified manner.
4.6 Log Management
Log management includes the management of U2000 security logs, U2000 operation logs,
and NE security logs. The U2000 allows you to query and save logs periodically, to detect
illegal login and operations, and analyze faults in a timely manner. You can query the U2000
client that is used by a U2000 user to log in to the U2000 server and query the operations
performed by the user after login. You can also dump or print log data.
4.7 Database Management
The database backup management system of the U2000 provides a tool for database backup
and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable
and safe running of the U2000. Database management includes the management of NE and
U2000 databases. To ensure data security, you need to back up the database periodically.
4.8 NE Communication Parameter Management
You can set the parameters for the communication between the U2000 and NEs to ensure that
the U2000 communicate with the NEs in normal state.
4.9 DCN Management
DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and
microwave products.
4.10 NE Software Management
U2000 supports backup and loading of the equipment data.
4.11 Report Management
The U2000supports the iWeb report function and at the same time supports NMS report that
provides reports about alarms, logs, and resources. The U2000 user is able to print desired
data while viewing them. The report in table format supports filtering by equipment type and
can be saved in Excel format.

4-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

4.12 System Monitoring


The U2000 provides a GUI-based system monitoring tool, which is used for managing the
NMS and querying the system information.

4.1 Security Management


This topic describes how to ensure the security of the U2000 by managing objects such as
users, user groups, rights, and operation sets.
Figure 4-2 shows the mechanism for implementing security management.
Figure 4-2 Mechanism for implementing security management
OSS/BSS

Hacker
SSL encryption

Firewall

Plain text
<=> 1010100100...

Worm

Client

Virus

Firewall
iManager U2000
SSL encryption
Plain text
<=> 1010100100...

Centralized authentication
Account security policy
Access control list

Database backup and


restoration
Log management

SNMP/Telnet/FTP

Managed equipment and network

The following describes security management in details.

Login and Session Management


The functions of login and session management are described as follows:

The user can log in to the U2000 with an account. The user performs operations
according to the permissions assigned to the account.

If the client is not used for a period of time, the user can manually lock the client or set
the lock time to make the U2000 lock the client automatically. This prevents others from
performing operations illegitimately. If the client is locked out, you need to enter the user
password or use the administrator account to unlock the client.

The members of the administrator group have the permissions to monitor the session
information and log out of illegitimate users forcibly.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-3

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

The U2000 can automatically detect and clear invalid sessions.

User and User Group Management


The functions of user and user group management are described as follows:

Creating a user account or user group. During user account creation, the user details,
owner group of the user, management domain, user permissions, and access control list
must be set. During user group creation, the user group details, management domain, and
user group permissions must be set.

Modifying the user or user group information, and deleting a user account or user group.

Adding a user to a user group. After addition, the user has the permissions of the user
group. A user can be added to multiple user groups. In this case, the user has the
permissions of the user groups besides those of the user.

Permission Management
User permissions are classified into management permissions and operation permissions.
Through permission assignment, user operations on the U2000 can be controlled.

Management permissions refer to the permissions that a user is given to manage the
specified equipment and its data, or the permissions that a user group is given to manage
the specified domains. In the topology view, the equipment or areas that cannot be
managed are invisible.

Operation permissions refer to the permissions that a user is given to perform operations.
If a user does not have the permissions to manage a type of equipment, the user does not
have the permissions to operate the equipment.

The functions of permission management are described as follows:

Adding or deleting user or user group permissions, and setting the management domain
of the user or user group.

Creating object sets. Managed objects are grouped into different object sets to facilitate
permission assignment.

Creating operation sets. Operation permissions are grouped into different operation sets
to facilitate permission assignment.

Modifying or deleting object sets or operation sets.

Assigning the permissions of a type set to the user. After that, the user has the
permissions to view and operate the devices whose type is consistent with the type set.

Security Policy Management


The functions of security policy management are described as follows:

4-4

The password policy is used to set the user password rules and password security
policies. The password rules involve the minimum password length of common users,
minimum password length of superusers, and maximum password length. The password
security policies involve the maximum number of password duplications with history
passwords, maximum password reservation period, minimum password reservation
period, and number of days ahead for notifying password expiration.

The account policy is used to set the minimum length of the user name, automatic
unlocking time, maximum number of login attempts, and timeout period at a login or
unlocking failure.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Access Control List


The Access Control List (ACL) is a secure access control mechanism. It restricts user access
to the server by allowing only the clients with specified IP addresses.
ACL can effectively control the client IP addresses from which users can log in to the U2000.
In this case, even if the user account and password are obtained by illegal users, these users
cannot log in to the U2000. Thus, the security of the U2000 is improved.

4.2 Topology Management


In topology management, the managed NEs and their connections are displayed in a topology
view. The managed NEs are displayed and managed in subnets and views. You can monitor
the operating status of the entire network in real time by browsing the topology view.
U2000 provides the Physical Root, Clock View, IP View, Tunnel View, and Custom View.
Therefore, you can view the required information in different views and also monitor and
learn the operating status of the entire network.

Topology View and Its Functions


The topology view of the U2000 consists of a navigation tree on the left and a view on the
right. The navigation tree directly shows the network hierarchy. Meanwhile, the view displays
the objects at different coordinates in the background map, which offers an intuitive view on
the deployment of objects.
Figure 4-3 shows the functions provided in the topology view of the U2000.
Figure 4-3 Topology view and its functions

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-5

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Adjustable topology view: The view can be zoomed in or out so that you can view the
objects clearly.

Bird's eye view: You can see the position of the current topological window in the entire
view.

Network-wide NE statistics collection: You can collect statistics on the number of NE


types and the number of NEs of each type in the entire network.

Filter tree: You can filter all the NEs to display only the required NEs quickly.

Status bar: It displays the information such as the current status, current login user, IP
address of the server that is connected currently, and current operation result.

Topology view: A GUI in the U2000, which reflects the network structure. This GUI
shows various physical and logical entities of the network and provides the entrances of
various operations.

Alarm Display In the Topology View


In the topology view of the U2000, alarms are displayed in different colors to indicate
different status of the submaps and NEs. The alarms in the topology view are displayed by
two methods: color-coded display and small icon display. The default method is the small
icon display, as shown in Figure 4-4.
Figure 4-4 Alarm display in the topology view

The display of topology alarms on the U2000 has the following features:

The color of a topological node indicates the polling status (such as normal, unknown, or
offline) and the alarm status of the monitored NE.

When an NE generates multiple fault alarms at different severities, the corresponding


topological node is displayed in the color/iron that indicates the highest alarm severity of
these alarms.

When multiple nodes in a subnet generate fault alarms, the subnet is displayed in the
color/iron that indicates the highest alarm severity of these alarms.

You can query the current alarms of an NE through the NE node. In addition, you can
query the details of the fault alarms through the NE Panel.

Automatic Topology Discovery


The U2000 provides the automatic topology discovery function. Therefore, manual
intervention is not required and the operational expenditure (OPEX) is reduced.
The U2000 supports two methods of automatic topology discovery, as follows:

4-6

After the SNMP parameters are set on the NE based on the SNMP protocol, the NE
sends traps to the U2000 in an unsolicited manner. Then, the NE is added to the topology
view on the U2000 automatically.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

In automatic topology discovery, the transport NE, NE based on the SNMP protocol, and
NE based on the ICMP protocol are searched separately in batches. Then, the NE that is
searched out is added to the topology view automatically.

The Secuity NE can be added to the topology view automatically by use the function of
Batch Import NE.

The U2000 searches for the fiber/link in batches. Then, the discovered fiber/link is added
to the topology view on the U2000 automatically.

Figure 4-5 Illustration of automatic topology discovery

1.

The automatic topology discovery operation is implemented step by step through a


wizard. Specifically, the wizard guides you to configure the parameters required for the
automatic discovery, such as NE type, SNMP parameters, and the IP address range.

2.

After you finish configuring the parameters, the U2000 searches for the required NE
among the specified network segments according to the preset parameters. All NE (both
from Huawei and other vendors) that is based on the SNMP protocol and meets the
conditions is displayed automatically in the topology view. At the same time, the basic
configurations of the NE is uploaded automatically. In this manner, you need not
perform basic configurations on the NE again.

3.

During the discovery, you can cancel the discovery at any time. In addition, you can
learn the cause if the discovery fails.

4.3 Alarm Management


In alarm management, you can monitor network exceptions in real time. It provides various
management methods such as alarm statistics, alarm identification, alarm notification, alarm
redefinition, and alarm correlation analysis. This helps the network administrator take proper
measures to recover the normal operation of the network.

Networkwide Alarm Browsing


Alarm display is classified into alarm panel display, alarm topology display, and alarm
browsing.
The U2000 supports the following alarm browsing functions:

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-7

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Alarm panel display


It is used to display the number of alarms of the currently managed objects by severity
and simply provide the fault status of the system. It can be used as a monitoring panel.

Alarm topology display


When an NE reports an alarm, the NE icon in the topology view can be in different
colors according to the alarm severity. In this case, you can right-click the NE icon and
query the current alarm of the NE from the shortcut menu.

Alarm browsing

Browsingcurrent alarms
It is used to browse the fault alarms that are currently not processed, that is,
unacknowledged and uncleared alarms.

Browse history alarms


It is used to browse all fault alarms that were acknowledged and cleared.

Browse alarm logs


It is used to browse all fault alarms reported by NEs.

Browsing event logs


It is used to browse current abnormal events.

Setting an alarm query template


You can save common query conditions in an alarm query template. Thus, next time
when you query alarms that meet the common conditions, you can use the template
directly without setting query conditions again. This helps you browse and monitor
the alarms that concerns you.

In the handling suggestion pane of the alarm, a link is provided, which points to the
corresponding alarm reference topic in the Online Help.

In addition to the preceding functions, the U2000 provides various customized functions, as
shown in Figure 4-6 and as listed in Table 4-1.

4-8

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Figure 4-6 Alarm Browsing

Table 4-1 Description of alarm functions


Function

Description

Unified alarm panel

Through the alarm panel, you can customize alarm conditions in


an alarm template flexibly and display alarms dynamically. This
helps to classify alarms quickly and acknowledge the concerned
alarms.

Alarm filtering

With the alarm filtering function, you can learn the running status
of an NE in real time. In addition, you can query the alarm status,
refresh the status in real time, and query the details of an alarm in
the alarm activation window. You can also print the alarm
records that are received recently and meet the print conditions.

Alarm query

With the alarm query function, you can query alarms by object
where an alarm occurs, function, alarm status, and alarm severity.
In addition, you can save and print the query result.

Alarm color display

The severity of each alarm in the alarm list is displayed with a


corresponding color. The color can be customized.

Alarm topology
display

When an NE reports an alarm, the icon in the upper left corner of


the NE in the topology view varies with the alarm severity, or the
NE icon in the topology view can be in different colors according
to the alarm severity. In this case, you can query the current alarm
of the NE from the shortcut menu.

Alarm locating

With the alarm locating function, you can select an alarm and
locate the topology object that generates the alarm (For a physical
alarm, you can locate the panel of the NE that generates the
alarm.)

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-9

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Function

Description

Sequence customizing

Through the sequence customizing function, you can sort alarms


by field in the alarm list and customize the alarm display. In
addition, you can save alarms in the .txt, html, xls, pdf, and csv
file, and print the required alarm records.

Alarm Statistics
You can learn the alarm status through alarm statistics and alarm analysis.
U2000 can collect alarm statistics based on user-defined conditions. The alarm conditions
include the alarm name, alarm severity, alarm function type, alarm rising time, alarm status, or
a combination of any preceding items.

Alarm Masking and Alarm Correlation Analysis


NEs report a large number of alarms during maintenance, test, or new deployment. However,
you need not concern the reported alarms. Therefore, these alarms reported by the NE need to
be masked, that is, these alarms are not displayed or saved. You can set conditions to mask the
alarms or events that meet the conditions.
The U2000 provides the following means for you to perform specific correlation analysis:
alarm/event correlation analysis, intermittent alarm analysis, repeated event analysis, and
alarm/event frequency analysis, and lasting time analysis of acknowledged but uncleared
alarms.

Alarm/Event correlation analysis


This function helps to find the root alarm. The U2000 supports the analysis of the
correlation between different NEs. The system analyzes the alarms based on the
pre-defined correlation rule to mask the correlative alarms and finds the root alarm. This
helps the maintenance personnel to easily find and rectify the fault.

Intermittent alarm/repeated event analysis


This function helps you to analyze alarms that are repeatedly cleared or events that are
repeatedly reported within a short period of time. To handle these alarms or events, the
system reserves only one of these alarms or events and/or change their severities. The
reserved alarms or events record the frequency with which the intermittent alarms or

4-10

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

repeated events occur. In addition, the system can change the alarm or event severity
according to the pre-defined settings.

Alarm/Event frequency analysis


This function helps you to analyze the frequency with which an alarm or event occurs.
You can set a condition. Within the pre-defined period, when the number of alarms or
events exceeds the threshold, the system informs the user according to the pre-defined
correlation action.

Acknowledged&Uncleared alarm time analysis


This function helps you to analyze the time of an acknowledged but uncleared alarm.
You can set a condition. Within the pre-defined period, if the time of an acknowledged
alarm exceeds the threshold, the system changes the alarm severity.

Alarm Dumping and Acknowledging


Alarm acknowledgment helps to identify whether an alarm is processed.
Alarm acknowledgment helps you to identify a processed alarm. You can then take proper
measures by checking whether the alarm is in the acknowledged state.

Alarm dumping: It supports overflow dumping and manual dumping of alarms. Alarm
dumping is used to dump history alarms and events to files, which ensures a stable and
efficient system and saves disk space.

Alarm acknowledgment: It helps you to identify a processed alarm. You can then take
proper measures by checking whether the alarm is in the acknowledged state. The U2000
supports manual and automatic acknowledgment of alarms.

Alarm Synchronization
The U2000 supports the ability to synchronize NE alarms automatically and manually. You
can manually synchronize NE alarms by performing operations through GUI or set an
automatic synchronization policy. When the U2000 restarts or the communication with an NE
recovers, the NE sends an alarm to the U2000. This implements the automatic alarm
synchronization on the U2000.
The U2000 supports the ability to synchronize NE alarm.

Manual synchronization
You can manually synchronize NE alarms by performing operations through GUI.

Automatic synchronization
You can set an automatic synchronization policy. When the U2000 starts, when its
communication with an NE recovers, or when the LCT user logs out, the NE sends an
alarm to the U2000. This implements the automatic alarm synchronization on the U2000.

Alarms are synchronized according to the following rules:

If an alarm is cleared on the NE but uncleared on the U2000, the alarm on the U2000 is
cleared.

If an alarm exists on the NE but does not exist on the U2000, the alarm is added to the
U2000.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-11

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Alarm Redefinition
The U2000 allows you to redefine the alarms of the NE. You can redefine the alarm severity
according to the requirements.
You can use this function to change the alarm severity displayed on the U2000, thus
highlighting only the alarms that concerns you.

Alarm Suppression
U2000 supports the ability to suppress NE alarms. If you set the status of an alarm to
Suppressed, the NE does not report the alarm.
The difference between alarm suppression and alarm masking is as follows: If you enable
alarm masking, an NE still reports an alarm but the U2000 does not receive the alarm. If you
enable alarm suppression, the NE does not report an alarm.

Various Alarm Notification Means


The U2000 provides various alarm notification means. The U2000 can send notifications to
the related maintenance personnel for locating faults regardless of the time and place, which
ensures that the faults are troubleshoot in time. Figure 4-7 shows the alarm notification
means.

4-12

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Figure 4-7 Various alarm notification means

The U2000 supports the following two remote notification means:

By email
You can send an alarm remote notification by email. The alarm information is sent to an
email address. The user can check the email address for alarm information received on
the alarm server.

By SMS
You can send an alarm remote notification by SMS. The U2000 sends the alarm
information to a mobile phone through the SMS device (SM modem or SM gateway)
connected to the alarm server. The mobile phone user can check the SMS for alarm
information received on the alarm server.

Alarm Jumping
The U2000 supports the alarm locating function. This function helps to jump to the topology
object that generates the required alarm. In addition, this function helps to quickly locate a
network fault, which improves the efficiency of alarm locating. Figure 4-8 shows the alarm
jumping function.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-13

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Figure 4-8 Alarm jumping

Alarm Maintenance Experience Base


You can obtain the alarm processing information from the alarm maintenance experience base.
This base stores alarm details.
The alarm maintenance experience refers to the experience summarized by customers during
the maintenance. The experience is imported to the U2000. If the same fault occurs, you can
refer to the related experience to quickly handle the alarm, which improves the efficiency of
troubleshooting.

4-14

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Alarm Time Localization


U2000 can display the time when an alarm is generated, acknowledged, cleared, or received
as the local time. The U2000 can display the time based on the server time or client time.
The NE that reports an alarm and the current U2000, however, may be in different time zones.
To learn the correct alarm generation time, the U2000 automatically converts the alarm
generation time (NE time) into the local time of the client.

4.4 Performance Management


The U2000 can monitor the key indicators of a network in real time, and provide statistics on
the collected performance data. It provides a graphical user interface (GUI) to facilitate
network performance management.
Figure 4-9 Performance Management Process

Monitoring Instance Management


Monitoring instance enables you to collect performance data according to the monitoring
template and schedule policy for all performance indicators belonging to a resource from a
device. One monitoring instance collects data for only one resource. Monitoring instance can
be either data monitoring instance or TCA monitoring instance.

Creating a monitoring instance for resources, such as equipment, boards, ports, and links.
Monitoring the IP SPLA of the PTN and the third-party equipment.

Modifying a monitoring instance.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-15

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Querying a monitoring instance.

Suspending a monitoring instance.

Resuming a monitoring instance.

Synchronizing resources of an instance.

TCA query.

Querying a VPN SLA test matrix. Querying the VPN SLA test result through a matrix.

Capability license control. Capability license controls the monitoring instance creation
based on the license availed.

Data Monitoring Template Management


The monitoring template is used with a monitor instance to monitor the performance data for
specific indicators.
Table 4-2 Monitoring template type
Template

Description

Data Monitoring Template

A data monitoring template is a collection


of indicators, which can be applied on the
resources for collecting the performance
data. You can configure indicators and
indicator groups.

TCA Monitoring Template

A threshold crossing alert (TCA)


monitoring template is a collection of
indicators and threshold definition that can
be applied on the resources for monitoring
the TCA alerts. TCA can be applied
according to the conditions selected such as
high TCA monitor and low TCA monitor.
Threshold definition includes high trigger,
low trigger, high clear, low clear, high alarm
level, and low alarm level.

View History Performance Data


You can query the performance of network resources by using the U2000 which displays the
history performance of a network in the form of table, curve diagram, or bar chart. In this way,
you can know the dynamic running status of the network from different dimensions. You can
save the performance data in different file formats. Meanwhile, you can compare the
performance data in different periods in the line chart or in the histogram.

Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.

Information displayed in table mode can be saved in TXT,CSV or HTMLformat.

You can collect statistics on network performance data within a specified period, to know the
performance status of a network in the specified period and to provide data reference for
forecasting performance change of the network.

4-16

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

By setting the performance monitoring template, you can manage performance monitoring
tasks in an easy manner.

View Real-time Performance Data


You can query real-time performance data in the form of table, curve diagram or bar chart,
and save the performance data into file.

Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.

Information displayed in table mode can be saved in TXT,CSV or HTMLformat.

View TOPN Performance Data


You can query TOP N performance data sorted by two indicators, and the result will be
refreshed when the new data generates.

Schedule Policy Management


Schedule policy enables you to set the time segments and repeat periods at which the data
needs to be collected. The schedule policy can be applied on the resources while creating or
modifying a monitoring instance

Data Lifecycle Management


You can back up the performance data to a specified storage medium manually or
automatically when excessive performance data is saved in the database ofU2000.
Data can be dumped in the following two ways:

Automatic Dumping: Performance data is dumped automatically based on the


configured values, such as the number of days for different granularities and the database
usage.

Manual Dumping: Performance data is dumped based on the user-defined conditions,


according to the dump type with in the end date.

Monitoring Network Performance


Through network grouping, you can view the performance data of devices, interfaces, IP links,
L2 links, static tunnel, dynamic tunnel, and tests on the same network. In addition, you can
implement various tests within a network, such as the tests of UDP jitter and FTP ping, to
evaluate the quality of networks and services and perform association analysis on the quality
of networks and services.

Creating a network group


Associate the monitoring instances of the resources of different types with the same
network according to the customized grouping rules, such as the area-based rule and
service-based rule, so that you can conveniently browse and compare data.

Analyzing the interface performance trend


After the interface indicators on the network are set, the trend analysis graph of the
interface indicators which is generated at the current time point or 12 hours before and
after the current time point can be obtained. The trend analysis graph helps you know the
entire change trend of the interface performance in a timely manner.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-17

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Viewing the running results of SLA test on network monitoring through a matrix (Now
only support UDP jitter test through matrix)
You can view the results of the network monitoring test cases through a matrix. In this
manner, you can know the statistics about network-related indicators, evaluate network
performance, and perform association analysis on network performance.

4.5 Inventory Management


The U2000 provides the inventory management function that allows you to query and collect
the statistics on physical and logical resources in a unified manner.
Figure 4-10 shows the inventory management window of the U2000.
Figure 4-10 Inventory management window and its functions

Physical Resources
The physical resources are as follows:

4-18

Telecommunications room

Rack

NE

Shelf

Board

Subboard

Port

ONU

Slot Information Report

Slot Used Statistics


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

SFP Information Report

Fiber/cable

4 NMS Basic Functions

Logical Resources
The logical resources are as follows:

Connection

Gateway

VLAN

Multicast

QoS and ACL

Protocol

Link

Link group

Interface resource

4.6 Log Management


Log management includes the management of U2000 security logs, U2000 operation logs,
and NE security logs. The U2000 allows you to query and save logs periodically, to detect
illegal login and operations, and analyze faults in a timely manner. You can query the U2000
client that is used by a U2000 user to log in to the U2000 server and query the operations
performed by the user after login. You can also dump or print log data.
Figure 4-11 shows the U2000 log management window and its functions.
Figure 4-11 Log management window and its functions

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-19

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Operation Logs
Operation logs record the operations (such as fault management, performance management,
topology management, and resource management) performed on the U2000.

View operation logs. The network administrator can set query conditions and query user
operation logs by user name, operation terminal, operation result, risk level, time range,
operation name, operation object, or a random combination of the preceding items. In
this manner, the network administrator can learn the operations performed by the current
user in real time.

Dump operation logs.

Dump operation logs manually.

Dump operation logs upon log overflow or at scheduled times.

Forward operation logs to the syslog server.

Save operation logs as the TXT, HTML, CVS, PDF or Excel file.

System Logs
System logs record operations performed on the U2000, including the service start and stop,
and log exporting and deletion.

View system logs. The network administrator can set query conditions and query user
operation logs by source, level, time range, details, or a random combination of the
preceding items. In this manner, the network administrator can learn the operations
performed by the current user in real time.

Dump system logs.

Dump system logs manually.

Dump system logs upon log overflow or at scheduled times.

Forward system logs to the syslog server.

Save system logs as the TXT, HTML, CVS, PDF or Excel file.

Security Logs
Security logs record the security-based operations that the user performs on the U2000,
including logout, login, log dumping, and device log synchronization.

View security logs. The network administrator can set query conditions and query user
operation logs by user name, operation terminal, operation result, risk level, time range,
operation name, security event, operation object, or a random combination of the
preceding items. In this manner, the network administrator can learn the operations
performed by the current user in real time.

Dump security logs.

Dump security logs manually.

Dump security logs upon log overflow or at scheduled times.

Forward security logs to the syslog server.

Save operation logs as the TXT, HTML, CVS, PDF or Excel file.

NE Logs
NE logs record the operations on the managed NEs. You can query the NE logs through
theU2000 client GUI. You do not need to query the operation logs on each NE.
4-20

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Browse the NE syslog run logs.


You can know the equipment running information through NE logs.

Dump NE syslog run logs.

Dump NE logs manually.

Dump NE logs upon logs overflow or at scheduled times.

Forward NE logs to the syslog server.

Save NE logs as the TXT, HTML, CVS, PDF or Excel file.

4.7 Database Management


The database backup management system of the U2000 provides a tool for database backup
and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable
and safe running of the U2000. Database management includes the management of NE and
U2000 databases. To ensure data security, you need to back up the database periodically.

NE Database Management
By using the U2000, you can perform the following NE database management operations:

For transport equipment and access equipment, back up the NE database to the system
control and communication unit (SCC).

For transport equipment and access equipment, back up the NE database of transport or
access equipment to the CF card manually or automatically.

For transport equipment and access equipment, restore the NE configuration data of
transport or access equipment from the SCC board or CF card.

Back up the NE database to a local or remote server.

Start a manual backup.

Set a scheduled backup task.

Restore the NE database from a local or remote server.

U2000 Database Management


By using the U2000, you can perform the following NMS database management operations:

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-21

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Back up the U2000 database to a local or remote server.

Start an immediate backup.

Set a scheduled backup task.

Restore the U2000 database from a local or remote server.

Dump data in the U2000 database, including operation logs, system logs, security logs,
alarm /event logs, and performance data.

Set a manual dump.

Set periodical dump.

Import or export script files: Export the configuration data in the U2000 to script files, or
import the configuration data to the U2000 from script files. This function is applicable
only to MSTP, WDM, PTN and microwave products.

Initialize the U2000 database.

Configuration upgrade wizard: On the upgraded U2000 software, previous data can be
restored with the help of the upgrade wizard.

Customize scheduled tasks: Provide flexible customization of scheduled tasks to reduce


operation and maintenance costs. The scheduled tasks that the U2000 supports are
backing up the database, exporting script files, collecting performance data, collecting
ATM performance data, backing up history performance data, and refreshing the
automatically switched optical network (ASON) information.

In the case of MSTP and WDM products, the U2000 information can be exported to a
TXT file so that it can be used by the MDS 6600.

In the case of MSTP and WDM products, the U2000 can import a TXT file that contains
the MDS 6600 data.

4.8 NE Communication Parameter Management


You can set the parameters for the communication between the U2000 and NEs to ensure that
the U2000 communicate with the NEs in normal state.
You can query or set the following communication parameters:

4-22

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Query and set the NE access protocol parameters.

Manage the default access protocol parameters.

Query and set the NE Telnet or STelnet parameters.

Manage the Telnet or STelnet parameter template.

4 NMS Basic Functions

4.9 DCN Management


DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and
microwave products.
The U2000 communicates with NEs and manages and maintains network nodes through a
DCN. In the DCN, the U2000 and NEs can be considered as nodes. These nodes are
connected by using Ethernet or data communications channel (DCC). In actual practice, the
U2000 and NEs may be located at different floors of the same building, or different buildings
or cities. Hence, the U2000 and NEs are usually connected through an external DCN that
consists of equipment such as switches and routers. Comparatively, the DCN between NEs is
referred to as an internal DCN.

Modify gateway NE (GNE) parameters.

Change the GNE for an NE.

Set the secondary GNE for an NE.

Convert a GNE to a normal NE.

Convert a normal NE to a GNE.

Check the GNE switching status.

Test the communication between the U2000 and a GNE.

Check the network communication status.

4.10 NE Software Management


U2000 supports backup and loading of the equipment data.

Function and Feature


Figure 4-12 depicts the function and feature of software management.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-23

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Figure 4-12 Function and Feature

Task Management
U2000 enables you to create scheduled tasks, including backing up the data of an NE, loading
the programs or patches of an NE, and restoring the data of an NE. U2000 can automatically
perform the tasks and can also suspend and resume tasks.

Policy Management
U2000 enables you to configure backup policies and saving policies. You can configure the
default backup policy or saving policy. In this case, U2000 backs up or saves the data
automatically and periodically according to the configured policy. You can also modify,
suspend, and run the equipment backup or saving policy.

Data Backup Management


U2000 supports automatic and manual data backup. You can back up the data on the GUI of
U2000. U2000 supports the ability to restore the backup data of equipment. You can restore
the historical backup data of the equipment on the GUI of U2000.

Software library management


The system supports the ability to manage NE software. The NE software is imported to the
software library of the system for formal management.
During the upgrade, a user can select the required target software from the software library.

4-24

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

4.11 Report Management


The U2000supports the iWeb report function and at the same time supports NMS report that
provides reports about alarms, logs, and resources. The U2000 user is able to print desired
data while viewing them. The report in table format supports filtering by equipment type and
can be saved in Excel format.

Alarm and Log Report

Equipment alarm severity distribution details report

Equipment alarm severity distribution report

Equipment connectivity statistics report

General alarm information report

History change record report

Resource Report

Port Resource Report

Statistics Report of SDH Tributary Port Resources

Lower Order Cross-Connections Statistic Report

SDH Fiber/Microwave Link Resource Usage Report

Statistics Report of Trails Between SDH NEs

Statistics Report of SDH Protection Subnet Resources

Statistics Report of SDH Circuit Resources

Microwave Link Report

Microwave License Capacity Report

Statistics Report of Ethernet Port Resources

Statistics Report of Service Resources Between Ethernet NEs

WDM Protection Group Switching State Report

WDM NE Master/Slave Subrack Info Report

Statistics Report of WDM Client-Side Port Resources

Statistics Report of WDM Link Resources

Statistics Report of Inter-Station Wavelength Resources

Browse WDM Wavelength Resource

Wavelength Resource Usage Report

PON Port Splitting Status

Board Manufacturer Information

Export project Document

Clock Tracing Diagram

Networking Diagram

Timeslot Allocation Diagram

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-25

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

iWeb report
The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
The function of the iWeb report see 9.7 Report Subsystem Management.

The diagrams of the resource report


Figure 4-13 Diagram of the NE resource report

4-26

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Figure 4-14 Diagram of the network resource report

4.12 System Monitoring


The U2000 provides a GUI-based system monitoring tool, which is used for managing the
NMS and querying the system information.
The system monitoring tool of the U2000 provides the functions for managing system
processes, as shown in the following figure.

The main functions for managing system processes are as follows:

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

4-27

iManager U2000 Unified Network Management System


Product Description

4 NMS Basic Functions

Starting and stopping a process

Setting the security communication mode

The system monitoring tool of the U2000 provides the functions for querying the system
information, as shown in the following figure.

The main functions for querying the system information are as follows:

4-28

Querying the process information

Querying the hard disk information

Querying the database information

Querying the component information

Querying the operation logs

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

5 MSTP Network Feature Management

MSTP Network Feature Management

About This Chapter


This topic describes the functional features of MSTP NE management and network
management.
5.1 MSTP NE Management
NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration data is saved to the
database of the U2000 and to the database of the NE.
5.2 MSTP Protection Subnet Management
A protection subnet is a network structure with the comprehensive self-protection function. In
the U2000, the protection subnet is a generalized concept that includes not only the network
structure with the comprehensive self-protection function, such as an MSP ring and a path
protection (PP) ring, but also the network structure without the self-protection function, such
as an unprotected ring and an unprotected chain.
5.3 End-to-End MSTP Management
End-to-end network management is also referred to as trail management. You can construct
the configuration data of end-to-end network management by searching for the data at the NE
layer of the U2000, or directly configure the data at the network layer of the U2000, and apply
the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
5.4 End-to-End MSTP IP Management
There is the IP feature in MSTP equipment. You can build the configuration data of
end-to-end MSTP IP network management by searching for the data at the NE layer of the
U2000, or directly configure the data at the network layer of the U2000, and apply the data to
all the relevant NEs. Configuring NE data by using the trail management function is faster
and more convenient compared with configuring NE data on a per-NE basis.
5.5 SDH ASON Management
ASON is a new generation of optical network that integrates the exchange and transport. After
a user initiates a service request, the ASON selects a route automatically, establishes and
removes connections through the signaling control, and performs network connections
automatically and dynamically. An ASON NE refers to the equipment that is equipped with

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-1

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

both SDH and ASON features. An ASON network is managed by the U2000 that combines
ASON and SDH features.

5.1 MSTP NE Management


NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration data is saved to the
database of the U2000 and to the database of the NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:

Modify NE attributes such as:

NE name

NE ID

NE Extended ID

Remarks

NE pre-configuration

In the case of the NE whose ID needs to be set through the DIP switch, you can modify the NE ID on the
U2000.

Synchronize NE time: Align all NEs with the system time of the U2000 server. The user
can configure the U2000 to automatically synchronize the NE time by specifying the
automatic synchronization period.

Query physical resources in the following lists:

NE list

Board manufacturer information

Board list

Cabinet list

Subrack list

Equipment room list

Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.

Replace a board. The user can replace a board with a board of another type on the
U2000.

The user can replace board A with board B whose rate is the same as the rate of board
A and where the number of ports is the same as the number of ports on board A.

The user can also replace board A with board B whose rate is lower than the rate of
board B and where the number of ports is less than the number of ports on board A.

Query the actual physical board type of a board that is used as a board of another type.

Automatically disable the NE functions: You can set to periodically disable some NE
functions that may affect services, such as loopback and automatic laser shutdown (ALS).
When the time expires, these operations automatically stop.

Environment monitoring information. You can set the following items:

5-2

PMU interface

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

EMU interface

CAU interface

NE fan speed

5 MSTP Network Feature Management

Virtual NE management

Create a virtual NE.

Add a board.

Create fibers between the virtual NE and other NEs.

Create SDH services.

Create protection subnets.

Search for and create trails on the virtual NE.

Support the replacement of the boards.

Supports the management of inband DCN.

Support graphical display of performance events relevant to the optical power.

Orderwire Configuration
By using the U2000, a user can perform the following operations:

Set and query the orderwire phone numbers, call waiting time and orderwire phone port
availability.

Set and query the networkwide conference call number.

Set and query the subnet No. length and the related subnet of the optical interface.

Configure and query the SDH network node interface (NNI) connection for orderwire.

Configure and query the F1 data port.

Configure and query the broadcast data port.

Board Protection Configuration


By using the U2000, a user can perform the following operations:

Configure board 1+1 protection.

Configure 1:N tributary protection switching (TPS) protection for a tributary board.

Configure board level protection.

Configure port protection.

Query the data backup status between the active and standby SCC boards.

Interface Configuration
By using the U2000, a user can perform the following operations:

Interface board management: Query and set the SDH interface boards installed on NEs.

Set the parameters of SDH interfaces.

Set the parameters of PDH interfaces.

Modify the optical/electrical attributes of the board port.

Set overhead interfaces, including:

Issue 03 (2010-11-02)

Orderwire

Hotline number
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

5-3

5 MSTP Network Feature Management

Special line number

Conference call number

Subnet number length

F1 data port

Broadcast data port

Communication port

Data port

Out-ring route

iManager U2000 Unified Network Management System


Product Description

Set the optical amplifier board interface.

Manage the optical power of a board.

Set tone and data access (TDA) interfaces, including:

TDA clock source.

TDA power feeding.

Query and set the overhead including:

Regenerator section overhead (J0).

Lower order path overhead (V5, J2)

VC4 higher order path overhead (J1, C2) and its pass-through or termination.

VC3 higher order path overhead (J1, C2).

Support PRBS.

Support pre-alerts for the port optical power.

Support setting and querying the TUG structure in the transmit and receive directions.

Support lower order loopbacks.

Support querying the in service (IS) port status and the out of service (OOS) port status
of a line board or a data board.

Support managing the power consumption.

Support setting and querying the optical power threshold of a line board.

Support the TCM function.

Support the configuration of enabling the AIS insertion of the J0MM alarm.

Set the parameters for an IF interface.

Set the parameters for a digital interface.

Set the parameters for an Outdoor unit (ODU) interface.

Configuration for SDH Services and Protection


By using the U2000, a user can perform the following operations:

5-4

Configure VC12, VC3, or VC4 services and select protection groups for them. In the
case of the platform 4.0 equipment, you can also select protection groups of these
services.

Manage Transmux services, including M13/E13 Transmux and M13/E13 Transmux


Server services.

Configure VC4-4C, VC4-8C, VC4-16C, or VC4-64C concatenated service; bind or


unbind services, and select protection groups for them. In the case of the platform 4.0
equipment, you can also select protection groups of these services.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

5 MSTP Network Feature Management

Configure other services: enterprise system connection (ESCON) services, 64 kbit/s


services (including TDA board services, N x 64 kbit/s services), and DSL services.

Manage subnetwork connection multiple protection (SNCMP) services.

Activate or deactivate services.

Manage subnetwork connection protection (SNCP) services.

Manage subnetwork connection tunnel protection (SNCTP) services.

Convert an SNCP service to a normal service or convert a normal service to an SNCP


service.

Support multiple multiplex section protection (MSP) rings configured at a single optical
port. You can configure multiple MSP rings by VC4 at an optical port to increase the
usage of network resources.

Configure REG. After the line board is set as REG on the U2000, each pair of optical
interfaces of the line board provides a special receive or transmit function. Through the
internal switch, the SDH signals from the receiving optical interface are sent out directly
to the corresponding transmitting optical interface after passing through the regenerator
section layer and being amplified. The REG function is completely realized by the board
without the need of the SCC board and a cross-connect board.

Query the capacity of higher order and lower order cross-connections on an NE.

Manage multiprotocol label switching (MPLS) for MSTP equipment. The MSTP
equipment builds a label switched path (LSP) with a PE router, identifies LSP labels and
service priorities, and encapsulates LSPs into virtual concatenation groups (VCGs) for
transmission.

The linear MSP supports the reconstruction protocol. You can set the appointed MSP
group as the reconstruction protocol.

Configure two 40G lower order cross-connect protection groups at the same time. You
can adjust concatenated timeslots and optimize higher order pass-trough.

Configuration for ATM Interfaces, Services, and Protection


By using the U2000, a user can perform the following operations:

Interface board management: Query and configure the ATM interface board on an NE.

ATM bandwidth management: Query the bandwidth of ATM board.

Set the parameters for an ATM interface.

Configure ATM traffic.

Configure ATM cross-connections.

Create a network to network interface (NNI) on the ATM processing board.

Configure ATM cross-connections.

Configure ATM protection groups.

Configure ATM protection pairs.

Configure ATM services from ATM board to SDH line.

Activate or deactivate ATM cross-connections.

Configure ATM bound path.

Perform ATM operation, administration and maintenance (OAM).

Set or query the section-end attribute of a connection point.

Set or query the continuity check (CC) activation status of the connection point.

Perform a remote loopback test.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-5

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Set or query the NE loopback location identifier (LLID).

Upload, download, duplicate the OAM data of the NE or perform the related consistency
check.

Configure an inverse multiplexing over ATM (IMA) group.

Configuration for Ethernet Interfaces and Services


By using the U2000, a user can perform the following operations:

Interface board management: Query and configure the Ethernet interface board on an
NE.

Configure fast Ethernet transparent transmission board.

Configure Ethernet internal interfaces, including:

5-6

Basic attributes

TAG attributes

Network attributes

Encapsulation/mapping

Link capacity adjustment scheme (LCAS)

Bound path

Advanced attributes.

Configure external ports of Ethernet interface, including:

Basic attributes

Flow control

TAG attributes

Network attributes

Advanced attributes.

Configure point-to-point LPT and point-to-multipoint LPT.

Configure private line services, including Ethernet private line (EPL) and Ethernet
virtual private line (EVPL). You can create a new service and configure a bound path.

Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge
(VB) and configure the following: service mount, VLAN filtering, VLAN unicast,
disable MAC address, bound path, self-learning MAC address, VB port MAC address
table capacity, and VLAN MAC address table capacity.

Configure Ethernet Layer-2 switching, including:

Aging time

Spanning tree

Multiple Spanning Tree

IGMP snooping protocol.

Configure QinQ service: QinQ is an embedded technology in VLAN, and tags users with
multi-layer VLAN ID, so that VLAN can be extended. You can perform operations such
as adding, stripping and exchanging of tags in different scenarios.

Configure Ethernet link aggregation group (LAG), which contains intra-board LAG and
inter-board LAG.

Create or delete an LAG.

Add or delete LAG ports.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

5 MSTP Network Feature Management

Query LAG ports and aggregation state.

Configure quality of service (QoS), including:

Flow configuration

CAR configuration

CoS configuration

Flow shaping management

Port shaping management

Configuring the differentiated service (DiffServ) domains

Port policy

CAR policy

Port WRED Policy

V-UNI ingress policy

V-UNI egress policy

PW policy

Weighted random early detection (WRED) congestion and discarding policy of


services

QinQ policy

Weighted fair queuing (WFQ) schedule policy

Test frame receiving and transmitting on Ethernet boards, including the EGT, EFT, EGS,
EFS and EMS boards.

Support the ability to query the opposite NE of the data services on these boards for the
Metro 1000V3.

Configure OAM for Ethernet services.

Configure OAM for Ethernet ports.

Configure the LCAS attributes such as hold-off time, WTR time and protocol mode.

Use QoS template to simplify the QoS configuration for Ethernet services.

Support the automatic reporting of RMON performance of Ethernet boards.

Support the dumping of history RMON performance of Ethernet boards.

Support the automatic creation of OAM for Ethernet trails.

Support the protocol diagnosis function.

Support the configuration of IGMP static multicast table items.

Support the standard LPT bearer mode.

Support the setting of the LCAS alarm threshold.

Support the alarm function in the case of no traffic at Ethernet ports.

Support the Ethernet port mirroring.

Support the unidirectional LPT function.

Support setting and querying the MAC address of a data board.

Support traffic monitoring and report for an Ethernet port.

Support the board-level configuration, including setting and querying the IP address.

Support the LPT and port traffic statistics functions.

Support creating flows in batches.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-7

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Support the setting of the LPT restoration time and the point to multi-point LPT
management in the three scenarios of IP->VCTrunk(s), VCTrunk->IP(s), and
VCTrunk(s)->VCTrunk(s) for a board.

Support the ability to manage multiprotocol label switching (MPLS) for multi-service
transmission platform (MSTP) equipment. The MSTP equipment builds an label
switched path (LSP) with a PE router, identifies LSP labels and service priorities, and
encapsulates LSPs into virtual concatenation groups (VCGs) for transmission.

Supports the management of the virtual Ethernet interface

Supports the control plane for configuring the static routes and address resolution.

Supports the packet Ethernet services including E-Line service, E-LAN service,
E-AGGR service and clock service.

RPR Management
By using the U2000, a user can perform the following operations:

Modify resilient packet ring (RPR) node information.

Set and query the node information of an NE in the RPR.

Set the RPR link information of an NE.

Query the topology of the RPR that the NE belongs to.

Query the protection status, switching status and switching position of the RPR that an
NE belongs to.

Configure forced switching, manual switching or clear switching in the RPR that an NE
belongs to.

Clock Configuration
By using the U2000, a user can perform the following operations:

Query the clock synchronization status.

Set clock source priority tables, including:

5-8

System clock source priority list

Priority table for phase-locked sources of 1st external clock output

Priority table for phase-locked sources of 2nd external clock output

Set clock source switching, including:

Clock source restoration parameters

Clock source switching condition

Clock source switching

Configure clock subnets, including:

Clock subnet

Clock quality

Synchronization status message (SSM) output control

Clock ID status

Set phase-locked sources output by external clock, including:

External clock output phase-locked source

2 Mbit/s phase-locked source external clock attributes

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

5 MSTP Network Feature Management

IEEE 1588 Packet Clock


By using the U2000, a user can perform the following operations:

Configure the selection mode of a frequency source.

Set the PTP clock source port.

Set the quality level of the clock source.

Set the PTP clock source priority.

Configure a PTP clock service.

Set the clock interface configuration.

Set the external clock interface configuration.

Ethernet OAM Management


By using the U2000, a user can configure the 802.1 ag Ethernet OAM as follows:

Create and configure maintenance nodes.

Perform a CC check.

Perform a loopback (LB) check.

Perform a link trace (LT) check.

Perform a ping test.

Perform performance detection.

By using the U2000, a user can configure the 802.3 ah Ethernet OAM as follows:

Query remote OAM parameters.

Set link monitoring parameters. This function can help you to detect the events of frame
error, frame error period, and frame error seconds.

Perform a remote loopback test.

Support reporting of Ethernet OAM loopback events.

Supports OAM management for MPLS tunnels.

5.2 MSTP Protection Subnet Management


A protection subnet is a network structure with the comprehensive self-protection function. In
the U2000, the protection subnet is a generalized concept that includes not only the network
structure with the comprehensive self-protection function, such as an MSP ring and a path
protection (PP) ring, but also the network structure without the self-protection function, such
as an unprotected ring and an unprotected chain.
To perform protection subnet management, you need to have the related license.
By using the U2000, a user can perform the following operations:

Issue 03 (2010-11-02)

Create protection subnets of different types.

Linear MSP: 1+1 and M:N.

MSP ring: two-fiber bidirectional MS shared protection ring, two-fiber unidirectional


MS dedicated protection ring, and four-fiber bidirectional MS shared protection ring.

PP ring: two-fiber unidirectional PP ring and two-fiber bidirectional PP ring.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-9

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

dual node interconnection (DNI) protection.

Non-protection (NP) ring and NP chain.

Search for a protection subnet according to the information of NEs and fibers or cables
in the U2000, to form a complete protection subnet.

Migrate an NP chain to a 1+1 linear MSP without interrupting services.

Start or stop the MSP protocol of the MSP subnet, such as enabling or disabling the MSP
protocols networkwide or the MSP protocol for a single node.

For 1+1 MSP, the U2000 automatically generates the service of the protection channel
according to the service of the working channel.

Adjust the bandwidth dynamically. You can dynamically adjust the MSP bandwidth
according to the service demands and how the network bandwidth is used currently to
improve the utilization of network bandwidth. For example, for an STM-16 MSP of an 8
x VC4 bandwidth, if the 6 x VC4 bandwidth is enough, then you can change the
protection bandwidth from 8 x VC4 to 6 x VC4 bandwidth and save 4 x VC4 for the use
of non-MSP-protected services.

Expand the capacity of an MSP ring and a linear MSP chain. Expand the link capacity by
replacing the line boards on both sides of the link without interrupting active services.
For example, upgrade an STM-16 MSP ring to STM-64 smoothly.

Change the reversion mode of linear MSP protection without restarting the protocol.

Expand and add nodes to multiple types of protection subnets, including MSP, SNCP, PP,
NP ring, NP chain and their combinations.

Query the names, types and status of all protection subnets.

Query and set the switching status, wait-to-restore (WTR) time and the trigger condition
of the protection subnet.

Query all the isolated nodes and delete useless nodes.

Set and view SDH NNIs.

Query the relevant trail by protection subnet.

Manage the entire RPR ring network. You can create, delete, and search for an RPR ring.
You can also manage the RPR ring protection parameters and link parameters. RPR ring
topology can be displayed through a view.

Collect statistics on protection subnets, and display the rate levels of the protection
subnets.

5.3 End-to-End MSTP Management


End-to-end network management is also referred to as trail management. You can construct
the configuration data of end-to-end network management by searching for the data at the NE
layer of the U2000, or directly configure the data at the network layer of the U2000, and apply
the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
To perform end-to-end network management, you need to have the related license.

MSTP Trail Management


By using the U2000, you can perform the following operations:

5-10

Create and maintain an SDH trail.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Issue 03 (2010-11-02)

5 MSTP Network Feature Management

Create an SDH trail, designate a timeslot, and select the protection priority strategy
and the resource usage strategy. The service levels include VC12, VC3, VC4, VC4
server trail, VC4-4C, VC4-8C, VC4-16C and VC4-64C.

Activate or deactivate, and lock or unlock an SDH trail.

Join or split, and enable or disable a VC4 server trail.

During search of SDH trails, the U2000 retains the attributes of the existing ones as
they are.

Upgrade an SDH trail to an ASON trail.

Degrade an ASON trail to an SDH trail.

Query the service status on a per-NE basis according to SDH trails.

Manage optical power: Query the input power, output power, and power thresholds
for SDH boards.

Set and query the overhead bytes of all NEs on the trail, such as the trace byte.

The U2000 prompts users to configure trace bytes when timeslot out-of-sequence
occurs to the MS.

Query the status of a lower order service.

Set overhead pass-through or termination of all NEs on the trail.

Insert alarms into the trails of VC4 level, such as AIS and remote defect indication
(RDI).

Set loopback on any nodes of the trail, including VC4 loopback, tributary loopback,
optical interface loopback and cross-connection loopback.

Perform a PRBS test on the trail.

Modify the add/drop ports of the trail and the timeslot occupied by the trail
in-service.

Adjust the original route partially by changing the NE, board or timeslot that the trail
passes through.

Modify the route for concatenated services in-service.

Person SNCP switching on a trail.

Generate dual-fed SDH services automatically for 1+1 linear MSP.

Duplicate an SDH trail for creating trails in batches.

Manage discrete SDH services, such as querying or analyzing discrete services.

View the usage of VC12 or VC3 trails related to a VC4 server trail in an easy manner.
You can also view the information about the VC12 or VC3 trails.

Convert SDH discrete cross-connections to a mono nodal trail.

Manage an SDH trail based on rights and domains.

Manage the alarms and performance events related to an SDH trail.

Configure alarm suppression or alarm reversion for a trail.

Query current and history alarms, current and history performance data, unavailable
time (UAT) and performance threshold-crossing records of an SDH trail.

Set the performance parameters for an SDH trail.

Query the SDH trails and customer information affected by an alarm.

Display the R_LOS alarms in the Transmission Media Layer Route view.

Search for trails. According to the NE configuration data, at the NE layer, or the fiber
connection data, protection subnet information at the network layer, the U2000 generates

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-11

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

the network layer information about end-to-end trails, including SDH trails and Ethernet
trails.

Name trails automatically.

Filter trails in three ways.

Filter all: Filter all trails and only display the qualified trails in a network.

Secondary filter: Filter those trails that are already displayed according to the filter
criteria.

Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

Ethernet Trail Management


By using the U2000, you can perform the following operations:

Create and maintain an Ethernet trail.

Create trunk links at VC12, VC3, VC4, VC4-4C, VC4-8C and VC4-16C levels.

Create an unterminated trunk link.

Create an Ethernet trail. The service includes EPL, EVPL, unterminated EPL, EPLAN,
EVPL based on QinQ, EVPL based on RPR and EVPLAN based on RPR.
For release 4.0 NEs, the SDH NNI needs to be created on Ethernet line boards.

Activate or deactivate an Ethernet trail.

During search of Ethernet trails, the U2000 retains the attributes of the existing ones as
they are.

Manage discrete Ethernet services, such as querying or analyzing discrete services.

Search for an Ethernet trail.

Manage the alarms and performance events related to an Ethernet trail.

Query the Ethernet trails and customer information affected by the alarm.

Query current and history alarms of an Ethernet trail.

Filter trails in three ways.

Filter all: Filter all trails and only display the qualified trails in a network.

Secondary filter: Filter those trails that are already displayed according to the filter
criteria.

Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

Manage the alarms and performance events related to an Ethernet trail.

Query the Ethernet trails and customer information affected by the alarm.

Query current alarms, history alarms of an Ethernet trail.

Implement the RMON performance function of an Ethernet trail.

ATM Trail Management


By using the U2000, you can perform the following operations:

5-12

Create and maintain an asynchronous transfer mode (ATM) trail.

Create an ATM trunk link.

Create an ATM trail.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

5 MSTP Network Feature Management

Activate and deactivate an ATM trail.

Manage ATM discrete services, such as querying and analyzing a discrete service.

Search for an ATM trail.

Manage the alarms and performance events related to an ATM trail.

Query the ATM trails and customer information affected by an alarm.

Query the current and history alarms related to an ATM trail.

Filter trails in three ways.

Filter all: Filter all trails and only display the qualified trails in a network.

Secondary filter: Filter those trails that are already displayed according to the filter
criteria.

Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

Network-Wide Clock Topology Management

Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.

Displaying clock trace relationship.

Displaying clock alarm status.

PWE3 Service Management


By using the U2000, you can perform the following operations:

Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

Manage multi-hop PWE3 services.

Implement the protection management of PWE3 services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Test and check a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Clone a PWE3 service.

Manage PWE3 service templates.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management
By using the U2000, you can perform the following operations:

Create static tunnels.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-13

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels, including the working and protection routes.

View the alarm of a tunnel.

View the performance of a tunnel.

Test and check a tunnel.

Manage discrete tunnels.

Manage BGP/MPLS VPN tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.

5.4 End-to-End MSTP IP Management


There is the IP feature in MSTP equipment. You can build the configuration data of
end-to-end MSTP IP network management by searching for the data at the NE layer of the
U2000, or directly configure the data at the network layer of the U2000, and apply the data to
all the relevant NEs. Configuring NE data by using the trail management function is faster
and more convenient compared with configuring NE data on a per-NE basis.
To perform end-to-end network management by using the U2000, you need to have the
required license.

PWE3 Service Management


By using the U2000, you can perform the following operations:

Create the CES service and the Ethernet service of the PWE3 services.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

Manage multi-hop PWE3 services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Copy a PWE3 service.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

VPLS Service Management


By using the U2000, you can perform the following operations:

5-14

Create a VPLS service.

Pre-deploy a VPLS service.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

5 MSTP Network Feature Management

Implement the function of automatically discovering VPLS services.

Modify and delete VPLS services, and filter VPLS services to view the desired services.

View the topology of VPLS services.

View the alarms of a VPLS service.

View the performance of a VPLS service.

Manage discrete VPLS services.

Manage VPLS services based on rights and domains.

Implement the function of automatically generating Ethernet OAM for VPLS services.

Tunnel Management
By using the U2000, you can perform the following operations:

Create static CR tunnel.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels.

View the alarm of a tunnel.

View the performance of a tunnel.

Manage discrete tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.

5.5 SDH ASON Management


ASON is a new generation of optical network that integrates the exchange and transport. After
a user initiates a service request, the ASON selects a route automatically, establishes and
removes connections through the signaling control, and performs network connections
automatically and dynamically. An ASON NE refers to the equipment that is equipped with
both SDH and ASON features. An ASON network is managed by the U2000 that combines
ASON and SDH features.

ASON Topology Management


By using the U2000, a user can perform the following operations:

Discover ASON topologies and resources automatically.

Synchronize NEs in a domain: The U2000 can obtain the topology of the network
through the active NE.

Upload the configuration data of NEs that are already created automatically.

Set the active and standby NEs.

Synchronize cross-connections for NEs.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-15

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Manage domains, including creating and deleting domains, and changing the domain
name.

Query the ASON NE software version.

Search for ASON discrete signaling.

Manage node IDs on ASON NEs.

Enable or disable the optical virtual private network (OVPN) status of the NE.

Query SRGs relevant to an NE.

Control Link Management


By using the U2000, a user can perform the following operations:

Synchronize networkwide control links .

Filter links by domain or source/sink information.

View control links.

Query the current alarm and history alarm about a control link.

Set alarm suppression for a control link.

Customize whether to display the color of alarms in the SDH Control Link
Management window.

Print or save the report list control links information.

Component Link Management


By using the U2000, a user can perform the following operations:

Synchronize networkwide component links.

Filter component links by domain or source/sink information

View component link information.

Create component links.

Delete component links.

Set resources reservation.

Query VC4 timeslot usage status.

Query link timeslot segmentation.

Print or save the report list component links information.

TE Link Management
By using the U2000, a user can perform the following operations:

5-16

Synchronize networkwide links by domain.

Filter links by domain, source/sink information or OVPN customer.

View traffic engineering (TE) links.

Create virtual TE links.

Delete virtual TE links.

Create fibers.

Set the distance for a TE link.

Set the risk link group number.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Create a link resource report.

View bandwidth usage.

Divide link resource to an OVPN customer.

Query the alarm information for a TE link.

Set alarm suppression for a TE link.

Query the performance for a TE link.

View the interrupted TE links.

Query SRGs relevant to a TE link.

Set the cost of a TE link.

5 MSTP Network Feature Management

ASON Trail Management


By using the U2000, a user can perform the following operations:

Filter relevant ASON services by actual route, original route or shared mesh restoration
trail.

Synchronize ASON trails by domain or attributes.

View ASON trails.

View the details of an ASON trail.

Create an ASON server trail of the diamond, gold, silver, or copper class.

Create an ASON trail of the diamond, gold, silver, copper or iron class.

Set OVPN customer of an ASON trail.

Activate or deactivate ASON trails or SDH ASON server trails.

Delete inactive SDH ASON trails or inactive SDH ASON server trails.

Delete SDH ASON trails or SDH ASON server trails from NM.

Duplicate ASON trails.

Optimize ASON trails.

Pre-calculate and optimize service trails.

Create a user network interface (UNI) service trail.

Set routing attributes of the ASON trails, including rerouting lockout status, revertive
lockout status, rerouting priority, rerouting revertive mode, WTR time, schedule
revertive time, rerouting policy, trigger condition, crankback and rerouting triggered by
B3 bit error

Query the rerouting reversion status of a revertive ASON trail.

Create and disable SDH ASON associated trails.

Set association for ASON trails.

Remove association for ASON trails.

Set the association source for ASON trails.

Set the trigger condition for rerouting associated route.

Query the related SDH trails for ASON trails.

Set a preset restoration trail for an ASON trail.

Downgrade an ASON trail to an SDH trail.

Migrate a trail in-service.

View the actual route, original route or associated route of an ASON trail.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-17

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

View the preset restoration trail or shared mesh for restoration trail an ASON trail.

Revert ASON trails manually.

Switch the working or protection trail of a diamond trail manually.

View the alarms of an ASON trail.

Set alarm suppression for the selected ASON trail.

View the control plane performance of an ASON trail.

View the performance events of an ASON trail.

Create the ASON trail report.

Refresh the original route, actual route or associated route of an ASON trail.

Refresh the preset restoration trail or shared MESH restoration trail for an ASON trail.

Set an actual route as an original route.

Restore to the original route in batches.

Set names for ASON trails in batches according to the naming rules.

Query the service level agreement (SLA) conformity of ASON trails.

Support the display of valid routes for gold services after the MSP switching.

Save the attributes of the service after you create an ASON service successful.

Restore the default attributes of the service when you create an ASON service.

Set SNCP access to a ASON trail.

Manage creators of SDH ASON trails.

Downgrade an SDH ASON trail forcibly.

Reroute the preset SDH ASON restoration trail in case of a fault.

UNI Service Management

Synchronize UNI services by domain.

View the information about an UNI service.

Filter UNI services by domain or source/sink information.

ASON Clock Subnet Management

Create an ASON clock subnet.

Create a preconfigured ASON clock subnet.

Convert a preconfigured ASON clock subnet into an ASON clock subnet.

Convert a traditional clock subnet into an ASON clock subnet.

Manage a hybrid network composed of an ASON clock subnet and a traditional clock
subnet.

Manage the startup time for the SDH ASON clock recovery.

SRG Management

Create, delete and modify an SRG.

Manage SRGS of the pipe, fiber/cable, NE and site.

One-End Terminated ASON Server Trail Management


By using the U2000, a user can perform the following operations:

5-18

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

5 MSTP Network Feature Management

Create and delete a one-end terminated ASON server trail.

Activate and deactivate a one-end terminated ASON server trail.

Associate one-end terminated ASON server trails.

Create and delete the ASON-SDH trail that contains one-end terminated ASON server
trail.

Activate and deactivate the ASON-SDH trail that contains one-end terminated ASON
server trail.

Search for the ASON-SDH trail that contains one-end terminated ASON server trail.

Set association relations between the ASON trails that have different sources and sinks.

Integration of SDH and ASON Trails


By using the U2000, a user can perform the following operations:

Specify the explicit route for ASON services when creating an ASON-SDH trail. That is,
an ASON-SDH trail includes an SDH trail and an ASON trail.

View SDH and ASON trails at the same time in the SDH Trail Management window.

Manage overhead bytes, alarms and performance of a joint trail in a unified manner.

Query the related ASON trails by an SDH trail.

Query the related SDH trails by an ASON trail.

Downgrade an ASON trail to an SDH trail.

Upgrade an SDH trail to an ASON trail.

Set the revertive attributes when an SDH trail is being migrated to an ASON trail.

Create dual-fed and selectively received VC4 ASON server trails.

Create lower order diamond trails.

Calculate working and protection routes using the SPC first policy.

The alarm in the ASON section of an ASON-SDH trail supports the alarm statistics
function.

Support an SNCP access scheme, such as setting the SNCP access attributes of an ASON
trail, querying the SNCP protection switching status of the ASON trail, and performing
protection switching on the SNCP access point of the ASON trail.

File Export or Import for Simulated Network Planning Information


By using the U2000, a user can perform the following operations:

Export the simulated network planning information, including networkwide


configuration file, NE configuration file, network layer information file, ASON
information file, the TE link information, the associated ASON service information, the
route calculation policy, the component link information, the ASON resource reservation
information, the WTR time information, the preset restoration trails and route calculation
policy for nodes.

Import file scripts of the simulated planning information.

ASON NE Catastrophe Restoration


The U2000 supports an ASON NE catastrophe restoration scheme.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

5-19

5 MSTP Network Feature Management

iManager U2000 Unified Network Management System


Product Description

SDH ASON Management on a Per-NE Basis


By using the U2000, a user can perform the following operations:

5-20

Manage board ASON feature.

Manage control plane parameters.

LMP control channel.

Query LMP component link.

Query LMP TE link.

Set LMP auto discovery type.

Manage fiber resource threshold.

Query OSPF control link.

Query OSPF SDH TE link.

Query OSPF component link.

Manage OSPF IP address.

Manage OSPF TE Link flood threshold.

Manage OSPF protocol authentication.

Manage ASON trail group.

Query ASON trail.

Maintenance SDH ASON signaling.

Maintenance SDH ASON switch controller.

Maintenance ASON shared MESH switch controller.

Suppression the control plane alarm.

Manage control plane performance parameters.

Manage reserved resource .

Manage VC4 timeslot occupation status.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

WDM Network Feature Management

About This Chapter


This topic describes the functional features of WDM NE management and network
management.
6.1 WDM NE Management
NE management refers to the management of configurations of an NE in terms of attributes,
services, protection, and clocks. The configuration object is a single NE. The data is saved to
the database of the U2000 and the database of the NE.
6.2 NA WDM NE Management
NE management includes the configurations on attributes, communications, services,
protection, and clock on an individual NE basis. The configuration data is saved at the NE
layer on the U2000 and in the database of the NE.
6.3 WDM Protection Subnet Management
A protection subnet is a network structure with the comprehensive self-protection function. In
the U2000, the protection subnet is a generalized concept that includes not only the network
structure with the comprehensive self-protection function, such as an MSP ring and a PP ring,
but also the network structure without the self-protection function, such as an unprotected ring
and an unprotected chain.
6.4 End-to-End WDM Management
End-to-end network management is also referred to as trail management. You can construct
the configuration data of end-to-end network management by searching for the data at the NE
layer of the U2000, or directly configure the data at the network layer of the U2000, and apply
the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
6.5 WDM ASON Management
ASON is a new generation of optical network that integrates the exchange and transport. After
the user initiates a service request, the ASON selects a route automatically, establishes and
removes connections through the signaling control, and performs network connections
automatically and dynamically. An ASON NE refers to the equipment that is equipped with
both WDM and ASON features. An ASON network is managed by the U2000 that combines
ASON and WDM features.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-1

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

6.1 WDM NE Management


NE management refers to the management of configurations of an NE in terms of attributes,
services, protection, and clocks. The configuration object is a single NE. The data is saved to
the database of the U2000 and the database of the NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:

Synchronize NE time: Send the computer system time, NTP server time, or standard
NTP server time at the U2000 server end to all NEs for synchronizing the NE time. You
can set the U2000 to automatically synchronize the NE time by specifying the automatic
synchronization period.

Query the physical inventory information, including the equipment room, racks, NEs,
shelves, boards, subboards, and ports.

Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.

Disable NE functions automatically. You can set the U2000 to periodically disable
certain NE functions that may affect services, such as loopback and ALS. When the time
expires, these operations automatically stop.

Modify NE attributes such as:

NE name

NE ID

NE extended ID

Remarks

NE pre-configuration

NE Time zone and DST

Change attributes of optical NEs, including:

Name

Remarks

Resources assigned for them

Environment monitoring information. You can set or query the PMU interface, NE fan
speed and monitor temperature.

Network operator information. You can set the information about the network operator,
including the international identifier, domestic identifier, and customized identifier.

Search and create NEs by discovering the NE IP address automatically.

Orderwire Configuration
By using the U2000, a user can perform the following operations:

6-2

Configure the board to an orderwire board, and query the orderwire board information.

Set and query the orderwire phone numbers, call waiting time, dialing mode, and
orderwire phone port availability.

Set and query the networkwide conference call number.

Set and query the subnet No. length and the related subnet of the optical interface.

Set and query the SDH NNI connection for orderwire.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Configure and query the F1 data port.

Configure and query the broadcast data port.

Configure E1 Cross-Connections.

6 WDM Network Feature Management

Configuration for Ethernet Interfaces and Services


By using the U2000, a user can perform the following operations:

Configure Ethernet port mirroring. You can monitor packets, perform routine
maintenance operations and in-service commissioning through a mirrored port in a
flexible manner.

Configure or query the internal ports of an Ethernet interface, including:

Basic attributes

Flow control

TAG attributes

Network attributes

Bound path

Advanced attributes

Configure or query the external port of an Ethernet interface, including:

Basic attributes

Flow control

TAG attributes

Network attributes

Advanced attributes

Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.

QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different
users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.

The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a
VLAN SNCP service and a normal Ethernet service.

Configure EPLAN services. You can create a new VB and configure the following:
service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and
self-learning MAC address.

Configure QoS, including:

Flow

CAR

CoS

Flow shaping

Port shaping

Configure link capacity adjustment scheme (LCAS): The LCAS can dynamically adjust
the number of virtual containers for mapping desired services, to meet different
bandwidth requirements of services. In this manner, the bandwidth utilization is
improved.

Configure OAM for Ethernet services.

Configure OAM for Ethernet ports.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-3

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Support the intra-board LAG function.

Support the DLAG function.

Support the VLAN group function.

Support the port MAC address filtering.

Test frame receiving and transmitting on Ethernet boards.

Support the protocol diagnosis function.

Configure QinQ type area.

Configure Ethernet Layer-2 switching, including:

Aging time

Spanning tree.

IGMP snooping protocol.

Configure Multiple Spanning Tree Protocol (MSTP). MSTP is compatible with the STP
and RSTP, and it also fixes the defects of the STP and RSTP. The convergence rate of the
MSTP is fast. In addition, traffic of different VLANs passes through corresponding trails,
which provides a well load balancing mechanism.

Configure MPLS Tunnel. In a PSN network, the MPLS tunnel carries PWs where
various services are encapsulated. In this way, data packets can be transparently
transmitted among NEs.

Configure Ethernet ring protection switching (ERPS). Based on the traditional Ethernet
mechanism, the ERPS uses the Eth-OAM function and the ring automatic protection
switching (R-APS) protocol to achieve fast protection switching on the Ethernet ring
network.

Configure link-state pass through (LPT). LPT is used to return the remote-end link status
to the near end. The near-end equipment performs operations depending on the
remote-end link status. The Ethernet board periodically monitors the network to know
the Ethernet status. For the change in the connection status of Ethernet ports, if the
change is caused by the opposite equipment, a board at the local end, network cable,
human factors and other reasons, you can use the LPT function to quickly switch the
route to the equipment on both ends.

Support the automatic reporting of RMON performance of Ethernet boards.

Dump history RMON performance data of Ethernet boards.

WDM Board Configuration


By using the U2000, a user can perform the following operations:

6-4

Configure optical transponder units.

Configure service multiplexing and de-multiplexing units.

Configure tributary and line boards.

Configure protection boards.

Configure optical amplifier units.

Configure spectrum analysis units.

Configure optical supervisory channel units.

Configure optical add/drop multiplexing units.

Configure variable optical attenuator units.

Configure optical equalization units.

Configure optical fiber monitoring units.


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Configure dispersion compensation units.

Configure wavelength management boards.

6 WDM Network Feature Management

Manage dynamic ports.


Query the line rate of an optical transport network (OTN).

Overhead Configuration
By using the U2000, a user can configure OTN overheads as follows:

Configure and query the SM overhead.

Configure and query PM overheads.

Configure and query the TCM overhead.

Configure and query the FTFL overhead.

Query the OPU overhead.

By using the U2000, a user can configure WDM overheads as follows:

Configure the optical channel (OCh) overhead at the SDH interface.

Configure the optical transponder unit (OTU) overhead at the OTN interface.

Configure the optical demultiplexer unit (ODU) overhead at the OTN interface.

Configure the optical channel payload unit (OPU) overhead at the OTN interface.

Configure the optical transmission section (OTS) overhead at the OTN interface.

By using the U2000, a user can configure SDH overheads for the OptiX OSN 8800 I and
OptiX OSN 8800 II as follows:

Configure the regenerator section overhead (J0).

Configure the lower order path overhead (V5, J2).

Configure the VC4 higher order path overhead (J1, C2) and pass-through or termination.

Configure the VC3 higher order path overhead (J1, C2).

WDM Service Configuration


At an optical add/drop multiplexer (OADM) station, a user can perform ADM configuration
for GE/Any services using the OTU board as follows:

Several WDM service boards in specified slots form a cross-connect unit group.

GE/FC services can be added or dropped, passed through or looped back in each
cross-connect unit group.

Support wavelength cross-connection protection (WXCP), with working and protection


cross-connections configured at the sink NE.

Support the function of configuring electrical cross-connections.

The U2000 allows you to configure electrical cross-connections to control service flow
in the electrical layer, and to dynamically groom, converge and split sub-wavelength
services. In this way, the networking and network survivability ability is enhanced.

Integrated grooming of GE services, ODU0, ODU1 and ODU2 services realized by


cross-connect boards.

Distributed grooming of GE services, ODU0, ODU1 and ODU2 services and Any
services.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-5

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Support SNCP at the ODU2, ODU1 and ODU0 level.

You can configure optical cross-connections as follows:

Create optical cross-connections dynamically. Manage optical cross-connections for a


board and a per-NE basis, including creation, activation, deactivation, deleting and
querying.

Support the functions of creating, querying, and deleting boundary ports.

You can perform the following service management functions:

Lock WDM trails and view the lock status of the corresponding trails in the service
management window of the NE Explorer.

View the name of the trail that a service belongs to.

Query the trail that a service belongs to.

The OSN 1800 supports service package management. The service package module helps you
perform typical service configurations. In this manner, you are freed from the in-field
commissioning. This reduces costs of deployment commissioning and maintenance of
products. In addition, the equipment can be configured in a one-touch manner.
Manage license for the service types and cross-connect capacity of the OptiX OSN 8800 I and
OptiX OSN 8800 II.

ROADM Configuration
Using the reconfigurable optical add/drop multiplexer (ROADM) function in the U2000, a
user can perform add/drop and pass-through configuration for optical channels. The WDM
equipment uses the DWC and wave selective switch (WSS) to implement the ROADM
function.

Configure ROADM boards based on the DWC boards: The wavelength grooming is
realized through the DWC boards. This configuration method is often used for the
normal nodes in a chain or ring network.

Configure ROADM boards based on the WSS boards: There are two types of networking:
WSSD+WSSM and WSS+RMU/ROAM. This configuration method is often used for the
cross-connect nodes in a ring network.

Configure ROADM boards based on the multiplexing and demultiplexing boards:


Wavelengths cannot be groomed dynamically. This configuration method is often used
for the normal nodes in a chain network.

Clock Configuration
By using the U2000, a user can perform the following operations:

6-6

Configure a board clock source.

Configure transparent transmission of an external clock.

Configure a clock for the SCC board.

Configure a clock for the optical supervisory channel unit.

Specify the traceable clock source for the SCC board.

Define the clock source priorities.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

PTP Clock(1588 V2 Clock) Configuration

Configure the frequency source mode.

Configure PTP clock synchronization attributes.

Query the clock source received at the port.

Configure PTP clock subnet.

Configure PTP packet attributes.

Configure the external time interface.

Physical Clock Configuration

Configure input attributes of external clocks.

Configure the system clock source priority table.

Configure the clock source protection and clock source reversion.

Configure phase-locked source output of external clocks.

Configure the quality of clock sources.

WDM Protection Configuration


By using the U2000, a user can perform the following operations:

Configure optical line protection and 1:1 optical line protection.

Configure optical wavelength protection group.

Configure port protection.

Configure 1:N(N no larger than 8) optical channel protection.

Configure 1+N(N no larger than 48) optical channel protection.

Configure protection for clock transparent transmission.

Configure optical wavelength share protection (OWSP) in the case of the Metro WDM
equipment and the NG WDM equipment.

Configure WXCP protection for GE/FC services.

Configure WXCP protection group for the NE in the sink slot.

Configure and query the WXCP protection parameters.

Query the status of WXCP protection switching.

Query the services with WXCP protection.

Perform WXCP protection switching.

Configure tributary protection set.

Configure dual path protection set.

Configure board 1+1 protection.

Configure SCC board 1+1 protection.

Configure cross-connect and synchronous timing (XCS) board 1+1 protection.

Perform switching between working and protection.

Query the switching status.

Configure SNCP protection.

Configure sub-wavelength (SW) SNCP for GE services or services of the Any type on an
OTU board.

Configure SNCP for optical channel data unit (ODUk) services.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-7

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Configure MS SNCP.

Configure VLAN SNCP for an Ethernet board.

Perform protection switching.

Query the switching status.

Support BPS protection.

Support the DBPS protection. The distribute board protect system (DBPS) protects the
10GE and GE ports of the TBE board.

Support ODUk SPRings of the ODU1 and ODU2 levels.

Support the service package. The service package module helps you perform typical
service configurations. In this manner, you are freed from the in-field commissioning.
This reduces costs of deployment commissioning and maintenance of products. In
addition, the equipment can be configured in a one-touch manner.

In the case of 1+1 protection for the SCC board, a user can query the status of the data
backup between the active and standby SCC boards.

Optical Power Adjustment


By using the U2000, a user can perform the following operations:

Manage the optical power. The user can query the input power, output power and power
threshold and so on for each WDM board.

Perform the function of intelligent power adjustment (IPA) management. When a fiber is
cut off, the optical amplifier board detects the signal loss at the station. The station
reports an exceptional event to the U2000. After the user confirms the event, the optical
amplifier boards at the upstream and downstream stations reduce their output power to a
safe value to prevent the fiber maintainer from being hurt by the lasers emitted from the
cut-off fiber. After the fiber is reconnected, the optical signals restore to normal and the
optical power of each optical amplifier board automatically returns to a normal value.

Automatic level control (ALC) management: Support the adjustment modes including
wavelength count detection, power detection, and link attenuation (gain mode). The
wavelength detection mode applies to the transmission link where no service is added or
dropped or where the number of wavelengths added and that dropped are the same at the
OADM. When the spectrum analyzer unit detects that the sum of each wavelength power
greatly differs from the standard power of the corresponding wavelength count, an
exceptional event is reported to the U2000. After the user confirms the event, the user
needs to manually issue a command to adjust the attenuations of each station on the link.
The power reference mode applies to the transmission links where the number of added
wavelengths differs from the number of dropped ones at an OADM. When the optical
amplifier board detects that the output power becomes abnormal, the station
automatically issues the command to adjust the attenuation of each station on the link.
This mode does not involve the spectrum analyzer unit, and is thus cost-effective. For the
previous two modes, a user can manually control whether to enable the ALC function.
The link attenuation adjustment mode also applies to the transmission link where the
number of added wavelengths differs from the number of dropped ones at an OADM.
When the optical power is attenuated to the detection threshold, a command is
automatically issued to adjust the attenuation of each station on the link.
The link attenuation adjustment mode is also referred to as the gain mode, which compares the
difference between the line attenuation and the amplifier gain, and also compares the node gain
compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the
attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus
ensuring the power budget of the entire link.

6-8

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

Perform the function of automatic power equilibrium (APE). If the MCA board at the
receive end detects that the optical power of some channels is abnormal, the station
reports an exceptional event to the U2000. After the user confirms the event, the U2000
issues a command to the optical attenuation adjustment board of the upstream station.
This board adjusts the optical power of the abnormal channel so that the optical signal
noise ratio (OSNR) of each channel at the receive end is equalized.

Perform the function of ROADM optical power equalization. After the ROADM is used
to dynamically configure the wavelength services, the WDM equipment outputs
multiplexed wavelengths. The optical power, however, may be greatly different between
each channel, especially for the newly added wavelength channels. To avoid negative
impacts on the transmission performance, the ROADM optical power equalization
function is provided. The ROADM first distinguishes between the pass-through
wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power
of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the
added wavelengths based on the wavelength flags.

Support pre-alerts for the port optical power.

Dispersion Compensation
By using the U2000, a user can perform the following operations:

The DCM board can conduct dispersion compensation to each band to realize dispersion
equalization.

Tunable dispersion compensators (TDCs) can be used to precisely adjust the dispersion.

The submarine system supports using a separate dispersion compensation board, such as
the TDC1 and TDC2, to perform dispersion compensation for signals at the line side of
OTU boards.

Wavelength Monitoring
The U2000 supports wavelength monitoring management for the OptiX BWS 1600G, OptiX
OSN 6800, OptiX OSN 8800 I and OptiX OSN 8800 II.

WDM PRBS
You can perform a PRBS test on a board to check the path quality. You can also check
whether the WDM link is normal before a service is available.

SDH Board Configuration


You can configure SDH line boards for the OptiX OSN 8800 I and OptiX OSN 8800 II.

Configure dynamic SDH ports.

Adjust the rates of optical ports on SDH boards.

Query the status of a port.

Configuration for SDH Services and Protection


By using the U2000, a user can perform the following operations:

Configure SDH line boards, SDH services, and SDH service protection for the OptiX
OSN 8800 I and OptiX OSN 8800 II.

Configure VC12, VC3, or VC4 services and select protection groups for them.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-9

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Activate or deactivate services.

Configure subnetwork connection protection (SNCP) services.

Convert an SNCP service to a normal service or convert a normal service to an SNCP


service.

Query the capacity of higher order and lower order cross-connections on an NE.

Configure subnetwork connection tunnel protection (SNCTP). SNCTP provides


protection channels at the VC4 level. When the working channel is faulty, all its services
can be switched to the protection channel.

Configure linear multiplex section protection (MSP). In the MSP protection, bytes K1
and K2 in the SDH multiplex section overhead (MSOH) are used to transmit protocol
information to control the transmit and receive routes of services.

Configure MSP Ring, including two-fiber and four-fiber MSP rings.

Configure transoceanic MSP Ring, A transoceanic multiplex section (MS) is an MS


based on transoceanic MSP protocol and used to provide path protection for higher-order
service on a transoceanic ring network.

Power Consumption Management


By using the U2000, a user can perform the following operations:

Manage NE power consumption, to ensure that energy conservation and environment


protection can be achieved when the NE runs in the normal state.

Query the power consumption of a board or an NE.

Configure energy conservation for an NE. You can dynamically adjust NE power
consumption to achieve environment protection and energy conservation.

View the networkwide NE power consumption report.

Submarine Cable Line Management


You need to create a line group for the actual submarine cable on the U2000. Hence, you can
measure and analyze the line data, and monitor the working status of lines. Submarine cable
line management includes the following functions:

Create a submarine cable line.

Modify a submarine cable line.

Activate a submarine cable line.

Delete a submarine cable line.

Submarine Cable Line Monitoring


You can monitor and test the status of fibers and repeaters, analyze the test data, to monitor
the working status of a submarine line system and locate faults. Submarine cable line
monitoring includes the following functions:

6-10

Support submarine line threshold management.

Monitor submarine cable lines and the status of a repeater in the in-service mode.

Support the fast fault location function.

Locate a fault in a submarine cable line in the out-of-service mode.

Support tests of multiple types: manual test, comparison test in single-test mode, and
comparison test in periodic mode.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

Synchronize, query and analyze the test data.

Support the ability to refresh monitoring information in real time.

Support querying the gain report and event report.

PFE Managent
The U2000 supports the ability to manage the PFE 1670, the PFE 1670 is the power supply
equipment for the submarine transmission system.

FC Service Test
The FC service test uses the 12LOM board to replace the FC test equipment (such as Smartbit)
to run the test. The FC service test serves to verify whether the FC service line and the
equipment under test are normal.

6.2 NA WDM NE Management


NE management includes the configurations on attributes, communications, services,
protection, and clock on an individual NE basis. The configuration data is saved at the NE
layer on the U2000 and in the database of the NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:

Synchronize NE time: Send the computer system time, NTP server time at the U2000
server end to all NEs for synchronizing the NE time. You can configure the U2000 to
automatically synchronize the NE time by specifying the automatic synchronization
period.

Query physical resources in the following lists:

NE list

Board manufacturer information

Board list

Subrack list

Equipment room list

Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.

Disable the NE functions automatically. You can set to periodically disable some NE
functions that may affect services, such as loopback and ALS. When the time expires,
these operations automatically stop.

Modify NE attributes such as:

Issue 03 (2010-11-02)

NE name

Remarks

Enable or disable automatic board installation.

Enable or disable LAN port access control.

Set start time for 24-hour performance monitoring.

Enable or disable daylight saving time.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-11

6 WDM Network Feature Management

Modify IP address and subnet mask of NE.

Enable or disable ARP proxy.

Enable or disable OSI protocol.

Modify subrack name.

Modify subrack remarks.

Set the time zone and DST.

Cold reset or warm reset NE.

Reset the NE in the DBERASE mode, with the NE database erased.

Reset the NE in the SWDL mode after the NE software is downloaded.

Enable or disable performance reporting.

Enable or disable alarm reporting.

Enable or disable database changed (DBCHG) reporting.

Clear audible and visual alarm indication of NE cabinet.

Set the NE alarm delay time, including the delay time of alarm start and the delay
time of alarm end.

Set the longitude and latitude of the NE.

Affiliated gateway IP address.

Affiliated gateway port.

Choose to set the state model level of the NE.

Set the country code and national segment code of the NE.

Enable or disable buzzer of the NE.

Change attributes of optical NEs, including:

Type

Name

Remarks

Vendor

Resources assigned for them

Support querying and modification of the parameters in board attribute interface,


including:

Set the primary and secondary states.

Query NE logical board and physical board.

Query board PCB version, software version, FPGA version, and BIOS version.

Query CLEI code, vendor ID, part number, serial number, date of manufacture and
board description.

Query backup power and rated power voltage.

Set temperature upper threshold, temperature lower threshold and current


temperature.

Set fan speed, working mode and LED state.

Perform a cold reset on a board.

Perform a warm reset on a board.

Environment monitoring information. You can set NE fan speed mode and speed level.

Manages fibers and cables as follows:

6-12

iManager U2000 Unified Network Management System


Product Description

View fiber cable information.


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Create or delete a fiber cable.

Create a fiber cable report.

6 WDM Network Feature Management

Dynamically add a port: The new function of dynamically adding, deleting, or modifying
a port supports the SFP/XFP client side color port, fiber connection and optical
cross-connection, and client side 1+1 protection.

Search and create NEs by discovering the NE IP address automatically.

Orderwire Configuration
By using the U2000, a user can perform the following operations:

Set and query the orderwire phone numbers, and call waiting time.

Set and query the networkwide conference call number.

Set and query the subnet number length.

Card attributes Management


By using the U2000, a user can perform the following operations:

Set the primary and secondary states. The primary and secondary states are presented in
the form of PST-PSTQ, SST.

Query NE logical board and physical board.

Query board PCB version, software version, FPGA version, and BIOS version.

Query CLEI code, vendor ID, part number, serial number, date of manufacture and board
description.

Query backup power and rated power voltage.

Set temperature upper threshold, temperature lower threshold and current temperature.

Set fan speed, working mode and LED state.

Perform a cold reset on a board.

Perform a warm reset on a board.

Configuration for Ethernet Interfaces and Services


By using the U2000, a user can perform the following operations:

Configure Ethernet port mirroring. You can monitor packets, perform routine
maintenance operations and in-service commissioning through a mirrored port in a
flexible manner.

Configure the internal ports of an Ethernet interface, including:

Issue 03 (2010-11-02)

Basic attributes

TAG attributes

Network attributes

Advanced attributes

Flow control

Configure the external port of an Ethernet interface, including:

Basic attributes

Flow control

TAG attributes

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-13

6 WDM Network Feature Management

Network attributes

Advanced attributes

iManager U2000 Unified Network Management System


Product Description

Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.

QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different
users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.

The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection.
You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a
VLAN SNCP service and a normal Ethernet service.

Configure EPLAN services. You can create a new VB and configure the following:
service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and
self-learning MAC address.

Configure QoS, including:

Flow

CAR

CoS

Port shaping

Configure OAM for Ethernet services.

Configure OAM for Ethernet ports.

Support the intra-board LAG function.

Support the DLAG function.

Support the VLAN group function.

Support the port MAC address filtering.

Test frame receiving and transmitting on Ethernet boards.

Support the protocol diagnosis function.

Configure QinQ Type area.

Configure Ethernet Layer-2 switching, including:

Aging time

Spanning tree

IGMP snooping protocol.

Support the automatic reporting of RMON performance of Ethernet boards.

Dump history RMON performance data of Ethernet boards.

WDM Card Configuration


By using the U2000, a user can perform the following operations:

6-14

Configure optical transponder units.

Configure service multiplexing and de-multiplexing units.

Configure tributary and line cards.

Configure protection cards.

Configure optical amplifier units.

Configure spectrum analysis units.

Configure optical supervisory channel units.

Configure optical add/drop multiplexing units.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Configure variable optical attenuator units.

Configure optical equalization units.

Configure wavelength monitoring.

Optical equalization board.

6 WDM Network Feature Management

Overhead Configuration
By using the U2000, a user can configure OTN overheads as follows:

Configure and query the SM overhead.

Configure and query the PM overhead.

Configure and query the TCM overhead.

Query the OPU overhead.

Configure and query the FTFL overhead.

By using the U2000, a user can configure WDM overheads as follows:

OCh Overhead Management-SONET Interface.

Configure the OTU overhead at the OCh overhead management-OTN interface.

Configure the ODU overhead at the OCh overhead management-OTN interface.

Configure the OPU overhead at the OCh overhead management-OTN interface.

Configure the TCM overhead at the OCh overhead management-OTN interface.

Configure the OTS overhead at the OCh overhead management-OTN interface.

WDM Service Configuration


At an OADM station, a user can perform ADM configuration for GE/Any services using the
LQG, LOG and other boards as follows:

Several WDM service boards in specified slots form a cross-connect unit group.

GE services can be added or dropped, passed through or looped back in each


cross-connect unit group.

Support WXCP protection, with working and protection cross-connections configured at


the sink NE.

Configure electrical cross-connections. The U2000 allows you to configure electrical


cross-connections to control service flow in the electrical layer. In this way, the networking
and network survivability ability is enhanced.

Integrated grooming of GE services, ODU1 and ODU2 services realized by XCS.

Distributed grooming of GE services, ODU1 and ODU2 services and Any services.

Support ODU1, ODU2, ODU0, GE/Any, and OTU1 cross-connections, and SNCP at the
ODU0, ODU1 and ODU2 level.
Optical Cross-connection Configuration:

Create OCh cross-connections dynamically. Manage optical cross-connections for a


board and a per-NE basis, including creation, activation, deactivation, deleting and
querying.

Create edge ports.

You can perform the following service management functions:

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-15

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Lock WDM trails and view the lock status of the corresponding trails in the service
management window of the NE Explorer.

View the name of the trail that a service belongs to.

Query the trail that a service belongs to.

ROADM Configuration
Using the ROADM function in the U2000, a user can perform add/drop and pass-through
configuration for optical channels. The WDM equipment uses the DWC and WSS to
implement the function of reconfiguration optical add/drop multiplexing.

The DWC type of the ROADM: The DWC is applicable to normal nodes in a chain or
ring network.

The WSS type of the ROADM: The WSS is applicable to cross-connect nodes in a ring.
This way is applicable for the grooming of multi-dimensional optical cross-connections.
A maximum of eight dimensions are supported.

Optical cross-connection broadcast services: Support the broadcast services of optical


cross-connections on a per-NE basis.

Clock Configuration
By using the U2000, a user can perform the following operations:
Configure the master clock.

Add a clock source.

Delete a clock source.

Query a clock source.

Configure the OTC card clock.

Set the input attributes of the OTC card clock.

Set the output attributes of the OTC card clock.

Set the working route of the OTC card clock.

Set the synchronization clock source.

WDM Protection Configuration


By using the U2000, a user can perform the following operations:

6-16

Configure the 1+1 optical channel protection.

Configure 1:N optical channel protection.

Configure the inter-subrack protection.

Configure port protection.

Configure optical line protection.

Configure intra-board 1+1 protection: This function includes the intra-board 1+1
protection realized by the dual-fed OTU board and the intra-board 1+1 protection
realized by the assistance of the DCP or OLP board.

Configure client-side 1+1 protection.

Configure protection for clock transparent transmission.

Configure OWSP protection.


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

Configure WXCP protection for GE/OTU1 services.

Configure WXCP protection group for the NE in the sink slot.

Configure and query the WXCP protection parameters.

Query the status of WXCP protection switching.

Query the services with WXCP protection.

Perform WXCP protection switching.

Configure board 1+1 protection.

Configure SCC board 1+1 protection.

Configure XCS board 1+1 protection.

Configure AUX board 1+1 protection.

Perform switching between working and protection.

Query the switching status.

Configure SNCP protection.

Configure subwavelength (SW) SNCP for GE services or services of the Any type on
an OTU board.

Configure SNCP for ODUk services.

Configure VLAN SNCP for an Ethernet board.

Perform protection switching.

Query the switching status.

Support BPS protection. The BPS protection uses two boards, that is, the working and
protection boards. This function realizes the protection of any one port by performing
board-level switching.

In the case of 1+1 protection for the SCC board, a user can query the status of the data
backup between the active and standby SCC boards.

Optical Power Adjustment


By using the U2000, a user can perform the following operations:

Manage the optical power, such as querying the input power, output power, and power
threshold for each WDM board.

Perform the function of IPA management. When a fiber is cut off, the optical amplifier
board detects the signal loss at the station. The station reports an exceptional event to the
U2000. After the user confirms the event, the optical amplifier boards at the upstream
and downstream stations reduce their output power to a safe value to prevent the fiber
maintainer from being hurt by the lasers emitted from the cut-off fiber. After the fiber is
reconnected, the optical signals restore to normal and the optical power of each optical
amplifier board automatically returns to a normal value.

ALC management: Support link attenuation (gain mode) as the adjustment mode. The
link attenuation adjustment mode applies to the transmission link where the number of
added wavelengths differs from the number of dropped ones at an OADM. When the
optical power is attenuated to the detection threshold, a command is automatically issued
to adjust the attenuation of each station on the link.
The link attenuation adjustment mode is also referred to as the gain mode, which compares the
difference between the line attenuation and the amplifier gain, and also compares the node gain
compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the
attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus
ensuring the power budget of the entire link.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-17

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Perform the function of APE. If the MCA board at the receive end detects that the optical
power of some channels is abnormal, the station reports an exceptional event to the
U2000. After the user confirms the event, the U2000 issues a command to the optical
attenuation adjustment board of the upstream station. This board adjusts the optical
power of the abnormal channel so that the OSNR of each channel at the receive end is
equalized.

Perform the function of ROADM optical power equalization. After the ROADM is used
to dynamically configure the wavelength services, the WDM equipment outputs
multiplexed wavelengths. The optical power, however, may be greatly different between
each channel, especially for the newly added wavelength channels. To avoid negative
impacts on the transmission performance, the ROADM optical power equalization
function is provided. The ROADM first distinguishes between the pass-through
wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power
of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the
added wavelengths based on the wavelength flags.

Support pre-alerts for the port optical power.

Dispersion Compensation

The G.652 and G.655 fibers have positive dispersion coefficient and positive dispersion
slope at 1550 nm window. After the optical signal is transmitted over a certain distance,
the accumulation of positive dispersion broadens the optical signal pulse and seriously
affects the system transmission performance. To minimize this effect, a negative DCM is
used in the network. It uses negative dispersion to compensate the positive dispersion of
transmitting fiber, so as to maintain the original shape of the signal pulse.

The OEQ NE can apply dispersion compensation to each band to reach dispersion
equalization.

This function supports 40G dispersion compensation configuration. It uses the TDC to
precisely adjust the dispersion.

Wavelength Monitoring
Wavelength monitoring uses the wavelength supervisory unit to monitor the wavelengths that
are transmitted from the WDM-side optical interface of the OTU board (including the service
convergence unit) and to control the wavelength drift. This function ensures stable
wavelengths.

WDM PRBS
You can perform PRBS on a board to check the path quality. You can also check whether the
WDM link is normal before a service is available.

Housekeeping Configuration
By using the U2000, a user can perform the following operations:

6-18

Set and query environment alarm property.

Create environment alarm attributes.

Set normal state of environment property.

Query environment alarm attributes.

Modify environment alarm attributes.

Delete environment alarm attributes.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

Set and query external control property.

Create external control attributes.

Query external control attributes.

Modify external control attributes.

Delete external control attributes.

Set the control time of the external control relay.

Query of AO Buffer Records


By using the U2000, a user can perform the following operations:

Query the records in the automatic output (AO) buffer.

The time at which the record is generated.

The auto report tag (ATAG) of the record.

The type of the record.

The description of the record.

Filter the records in the AO buffer.

Save the records in the AO buffer to file.

Export the AO buffer information to the browser of the operating system for printing.

EAPE Management
Enhanced automatic power equalization (EAPE) management can reduce the bit error rate
(BER) of a service. You can query the EAPE function for an OCh trail.

Power Consumption Management


By using the U2000, a user can perform the following operations:

Manage NE power consumption, to ensure that energy conservation and environment


protection can be achieved when the NE runs in the normal state.

Query the power consumption of a board or an NE.

Configure energy conservation for an NE. You can dynamically adjust NE power
consumption to achieve environment protection and energy conservation.

View the networkwide NE power consumption report.

ASON Management
Topology Management
By using the U2000, a user can perform the following operations:

Discover ASON topologies and resources automatically.

Synchronize NEs in a domain: the U2000 can obtain the topology of the network through
the active NE.

Set the active and standby NEs.

Manage domains, including creating and deleting domains, and changing the domain
name.

Query the ASON NE software version.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-19

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Manage node IDs on ASON NEs.

Query the enable status of the ASON NE software.

Enable or disable the ASON feature of an ASON NE.

TE Link Management
By using the U2000, a user can perform the following operations:

Synchronize networkwide links by domain or payload type.

Filter links by domain, link signal type, payload type, or source/sink information.

View TE links.

Create fibers.

Manage TE links whose payload type is OCh.

Set the distance for a TE link.

Create a link resource report.

6.3 WDM Protection Subnet Management


A protection subnet is a network structure with the comprehensive self-protection function. In
the U2000, the protection subnet is a generalized concept that includes not only the network
structure with the comprehensive self-protection function, such as an MSP ring and a PP ring,
but also the network structure without the self-protection function, such as an unprotected ring
and an unprotected chain.
To perform protection subnet management, you need to have the related license.
By using the U2000, a user can perform the following operations:

Search for a wavelength protection subnet.

Create a 1:N wavelength protection subnet by using the search function.

Create ODUk SPRings at ODU1 and ODU2 levels by using the search function.

Manage a wavelength protection subnet.

Set 1:N Wavelength Protection Subnet Parameters.

Perform and verify the 1:N Wavelength Protection Switching.

Set Parameters of an ODUk SPRing Protection Subnet.

Perform and verify the ODUk Wavelength Protection Switching

Query and delete a protection subnet.

Query and delete an isolated node.

Query protection subnet resources.

6.4 End-to-End WDM Management


End-to-end network management is also referred to as trail management. You can construct
the configuration data of end-to-end network management by searching for the data at the NE
layer of the U2000, or directly configure the data at the network layer of the U2000, and apply
the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.

6-20

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

To perform end-to-end network management, you need to have the related license.
By using the U2000, a user can perform the following operations:

Issue 03 (2010-11-02)

Search for a trail.

According to the NE configuration data and fiber connection data in the NE layer, the
U2000 generates the network layer information about end-to-end trails, including
OTS trails, OCh client trails, OCh trails, optical multiplex section (OMS) trails,
optical supervisory channel (OSC) trails, ODUk layer trails and optical channel
transport unit (OTUk) layer trails.

Manage conflict and discrete trails created during the search process.

Join trails automatically during the wavelength trail search process.

Support the reservation of user-defined information on trails during WDM trail


search.

Search for inverse multiplexing trail of the 40G and 10G rate levels.

Create a trail.

The U2000 automatically generate an OTS trail after the fibers are correctly
connected between the specified boards.

Create an OCh trail, and create an OCh cross-connection by using the trail
management function.

Create an ODU0, ODU1 or ODU2 trail, and create an ODU0, ODU1 or ODU2
cross-connection by using the trail management function.

Create a client trail, and create GE, FC, and FE services based on the OCh and ODUk
trails by using the trail management function.

Create SNCP or WXCP by using the trail management function.

Create a WDM trail by double-clicking an NE and select the source and sink ends.

Select the explicit route of the protection trail when creating a WDM trail.

Support the end-to-end management function for ASON-WDM trails.

Create multi-layer WDM trails. Meanwhile, the Client and ODUk cross-connections
are created by using the end-to-end trail management function.

Create trails through duplication. You can create multiple trails by duplicating a trail.
In addition, you can generate Client and ODUk cross-connections in batches by using
the end-to-end trail management function.

Create WDM trails whose fiber jumpers are connected inside a station

Support port attribute.

View inner cross-connection.

Manage customers of a trail.

Create a customer.

View and modify the customer information.

View the trail related to a customer.

View the current and history alarms for a customer.

Delete a customer.

View trails.

Join trails of the same type.

Split a trail into trails of the same type.

Browse the trails included in a trail group.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-21

6 WDM Network Feature Management

6-22

iManager U2000 Unified Network Management System


Product Description

Query the route information of a trail.

Display the signal flow diagram of a trail.

Query the transmission media layer (that is, server trail) for a trail.

Query the client trail for a trail.

Query details of a trail, including its attributes and channel allocation.

Query the optical power of a trail. You can query the optical power of a WDM trail,
and the input and output optical power of the source and sink of the trail.

Query the DPPS protection for a trail.

Support display of valid routes for the protected wavelength trails.

Query the associated working and protection trails for the protected OCh trails.

Support the functions of displaying intra-site fibers in real lines and inter-site fibers in
dotted lines in the signal flow diagram of a trail.

Support the functions of displaying working and protection routes in different colors
in the signal flow diagram of a trail.

Support the function of displaying the details of a trail group. The details of a trail
group include direction, name, trail status, source and sink, source and sink
wavelength, bearer rate, rate, and service type.

Support enable or disable service alarm.

Switch between the window for viewing WDM trails and the window for viewing
associated SDH trails.

Support lock WDM trails.

Manage the alarms and performance events related to a trail.

Query the current alarms of a trail.

Query the history alarms of a trail.

Query history performance data of a trail.

Query UAT of a trail.

Support the ability to set the performance threshold of a WDM trail.

Query the performance threshold-crossing records of a trail.

Query the current performance data of a trail.

Query the Ethernet performance of an OCh client trail with GE services.

Manage networkwide alarmed WDM trails in real time.

Support display of MUT_LOS and R_LOS alarms on the signal flow diagram of a
trail.

Support the function of setting the alarm threshold for a trail.

Support the service alarm.

Query statistics resources report.

Support the function of collecting the statistics on WDM client-side port resources.

Support the function of collecting the statistics on WDM inter-site wavelength


resources.

Support the function of collecting the statistics on WDM link resources.

Support the OTUk link resource occupancy report.

Support the statistics report of WDM wavelength resource.

Support the statistics report of WDM wavelength usage.

Manage trails.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

Query 1+1 protection for an optical layer trail and perform protection switching for
the optical layer trail.

Query WXCP and SNCP protected trails, and perform protection switching.

Support the ability to add and delete a WXCP protection group.

Use the TTI byte to check fiber connection relations of an OCh trail.

Support the transaction creation of WDM trails and the rollback in the case of a
creation failure.

Support outputting the TM-TM connection diagram for WDM trails.

Support the automatic naming rule for WDM trails.

Modify the source and sink of a Client trail.

Support ODU trail end-to-end management.

Support the search and end-to-end management of Client trails.

Support the optical layer alarms and the configuration of optical layer overheads on
trail levels.

Support the functions of adding and deleting the WXCP or SNCP protection of an
ODUk trail or a Client trail.

Set the optical power mode by the end-to-end trail management function.

Implement the Save As and Print functions for the channel allocation of a WDM trail.

Save the signal flow diagram of a WDM trail.

Manage WDM trails base on rights and domains.

Manage WDM discrete services.

Manage WDM platinum trails.

Support 8 clients to create WDM trail on the same time.

Delete a trail. You can delete a WDM trail (except the OTS trail) from the NE layer and
network layer of the U2000.

Support enhanced automatic power equilibrium (EAPE) based on an OCh trail. The
EAPE function automatically adjusts the transmitted optical power of each path
according to the signal quality of each path monitored by the OTU board at the receive
end, to ensure the quality of signals in each path at the receive end meets the preset
requirements. This ensures that services are available.

Filter trails in three ways.

Filter all: Filter all trails and only display the qualified trails in a network.

Secondary filter: Filter those trails that are already displayed according to the filter
criteria.

Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

6.5 WDM ASON Management


ASON is a new generation of optical network that integrates the exchange and transport. After
the user initiates a service request, the ASON selects a route automatically, establishes and
removes connections through the signaling control, and performs network connections
automatically and dynamically. An ASON NE refers to the equipment that is equipped with
both WDM and ASON features. An ASON network is managed by the U2000 that combines
ASON and WDM features.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-23

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Topology Management
By using the U2000, a user can perform the following operations:

Discover ASON topologies and resources automatically.

Synchronize NEs in a domain: the U2000 can obtain the topology of the ASON domain
through the active NE.

Set the active and standby NEs.

Manage domains, including creating and deleting domains, and changing the domain
name.

Query the ASON NE software version.

Manage node IDs on ASON NEs.

Query the version of the ASON software.

ASON Control Link Management


By using the U2000, a user can perform the following operations:

Synchronize control links networkwide.

Filter links by domain or source/sink information.

View control links.

View the current alarm or history alarm information about a control link.

Set alarm suppression for a control link.

Customize whether to display the color of alarms in the Control Link Management
window.

TE Link Management
By using the U2000, a user can perform the following operations:

6-24

Synchronize networkwide links by domain or payload type.

Filter links by domain, link signal type, payload type (optical layer, electrical layer), or
source/sink information.

View TE links.

Query the related ASON trails for a TE link.

Create fibers according the TE link.

Create a virtual TE link.

Delete a virtual TE link.

Manage TE links whose payload type is OCh, ODUk or client (GE/Any).

Set the distance for a TE link.

Set the risk link group number.

Create a link resource report.

View resource usage.

View the current alarm or history alarm information about a link.

Set alarm suppression for a control plane alarm.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

6 WDM Network Feature Management

ASON Trail Management


By using the U2000, a user can perform the following operations:

Filter relevant ASON services by domain, name, original route, shared MESH restoration
trail, created time, planned time, OVPN customer, type, activation status, managed
identifier, class or whether original route is active.

Synchronize networkwide ASON trails by domain, level or attributes.

View ASON trails.

View details of an ASON trail.

Create an ASON trail of the diamond, gold, silver, or copper class.

When diamond WDM ASON OCh trails are created, the working and protection
wavelengths are shared.

Create an ASON trail of the OCh, ODU0, ODU1, ODU2 and Client level.

Set the SNCP type and OTN level when create a diamond WDM ASON ODUk trai.

Create a inverse multiplexing WDM ASON trail.

Create WDM ASON associated trail.

Duplicate ASON trails.

Pre-calculate route when create or optimize ASON trails.

Activate or deactivate ASON trails.

Apply planning data to an ASON trail.

Delete inactive ASON trails.

Delete an ASON trail from NM.

Set routing attributes, including rerouting lockout status, reversion lockout status,
rerouting priorities , revertive mode, WTR time, scheduled revertive time, rerouting
policy, trigger condition, crankback, rerouting triggered by B3 bit error and rerouting
hold-off time.

Set association source for ASON trails.

Set association for ASON trails.

Remove association for ASON trails.

Set the trigger condition for rerouting associated route.

Set the shared policy of associated service.

Downgrade an ASON trail to an traditional trail.

Query related server trails for ASON trails.

Query related client trails for ASON trails.

Query related trails for ASON trails.

Migrate a ASON trail in-service.

Enable or disable the optical parameters of WDM ASON OCh trails, including OSNR,
PMD and chromatic dispersion.

Revert an ASON trail to the original route.

Optimize ASON trails.

Switch the working or protection trail of a diamond trail manually.

Revert ASON trails manually.

Refresh the actual route, original route, associated route or signal flow diagram of an
ASON trail.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-25

6 WDM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Set an actual route as an original route.

Refresh the preset restoration trail for an ASON trail.

Set the preset restoration trail for an ASON trail.

Delete the preset restoration trail for an ASON trail.

View the actual route , original route or associated route of an ASON trail.

View the preset restoration trail for an ASON trail.

View the alarms of an ASON trail.

View the alarm suppression information for the selected ASON trail.

Set alarm suppression for the selected ASON trail.

View the performance events of the ASON trails.

View the control plane performance of the ASON trails.

View the control plane performance parameters of the ASON trails.

Create the ASON trail report.

Recover to original route in batch.

Set names for ASON trails in batches according to the naming rules.

Save the attributes of the service after you create an ASON service successful.

Restore the default attributes of the service when you create an ASON service.

Manage creators of WDM ASON trails.

Downgrade a WDM ASON trail forcibly.

Combination of ASON and Traditional Trails


By using the U2000, a user can perform the following operations:

Support the ability to create an ASON-WDM trail.

View both WDM and WDM ASON trails in the WDM Trail Management window.

Manage the overhead bytes, alarms, and performance events of an ASON-WDM trail in
a centralized manner.

Query the ASON trail related to a WDM trail.

Query the WDM trail related to an ASON trail.

Downgrade an ASON trail to a traditional trail.

Upgrade a traditional WDM trail to a WDM ASON trail.

The alarm in the ASON section of an ASON-WDM trail supports the alarm statistics
function.

Exchange Script Files


By using the U2000, a user can perform the following operations:

Import and export the script files of WDM ASON nodes,.

Import and export the script files of WDM TE links

Import and export the script files of WDM ASON trails.

NG WDM ASON Management on a Per-NE Basis


By using the U2000, a user can perform the following operations:

6-26

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Enable or disable ASON features.

Manage node IDs on ASON NEs.

Query control plane parameters.

Manage control channel.

Manage LMP TE links.

Support LMP automatic discovery.

Manage OSPF control links.

Manage OSPF TE links.

Manage OSPF IP addresses.

Authenticate the OSPF protocol.

Authenticate the RSVP protocol.

Manage WDM ASON trails.

Maintain ASON signaling.

Maintain the ASON switching controller.

Manage the LMP status.

Manage the OSPF protocol status.

Set alarm suppression for a control plane alarm.

Manage the control plane performance.

Manage resource reservation.

Manage the resource occupation status.

Issue 03 (2010-11-02)

6 WDM Network Feature Management

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

6-27

iManager U2000 Unified Network Management System


Product Description

7 RTN Network Feature Management

RTN Network Feature Management

About This Chapter


This topic describes the functional features of RTN NE management and network
management.
7.1 RTN NE Management
NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration object is a single NE. The
data is saved to the database of the U2000 and to the database of the NE.
7.2 RTN Protection Subnet Management
A protection subnet is a network structure with the comprehensive self-protection function.
7.3 End-to-End RTN Management
End-to-end network management is also referred to as trail management. You can construct
the configuration data of the end-to-end network management by searching for the data at the
NE layer of the U2000, or directly configure the data at the network layer of the U2000, and
apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
7.4 End-to-End RTN IP Management
There is the IP feature in RTN equipment. You can build the configuration data of end-to-end
RTN IP network management by searching for the data at the NE layer of the U2000, or
directly configure the data at the network layer of the U2000, and apply the data to all the
relevant NEs. Configuring NE data by using the trail management function is faster and more
convenient compared with configuring NE data on a per-NE basis.

7.1 RTN NE Management


NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration object is a single NE. The
data is saved to the database of the U2000 and to the database of the NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:
Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

7-1

7 RTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Support the ability to manage the connections between back-to-back RTN NEs. On the
Main Topology of the U2000, the connections between back-to-back RTN NEs indicate
the relations between the RTN NEs on the same station that are connected in a
back-to-back manner through network interfaces.

Modify NE attributes such as:

NE name

NE ID

NE Extended ID

Remarks

Synchronize NE time: Align all NEs with the system time of the U2000 server. The user
can configure the U2000 to automatically synchronize the NE time by specifying the
automatic synchronization period.

Query physical resources in the following lists:

NE list

Board manufacturer information

Board list

Cabinet list

Subrack list

Equipment room list

Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.

Automatically disable the NE functions: You can set to periodically disable some NE
functions that may affect services, such as loopback and automatic laser shutdown (ALS).
When the time expires, these operations automatically stop.

Environment monitoring information. You can set the interfaces of environment


monitoring.

Support the license management function for equipment.

Support the press-to-install function for logical boards.

Support the Hop management function.

Orderwire Configuration
By using the U2000, a user can perform the following operations:

Set and query the orderwire phone numbers, call waiting time and orderwire phone port
availability.

Set and query the orderwire occupied bytes.

Configure and query the F1 data port.

Configure and query the broadcast data port.

Equipment Protection Configuration


By using the U2000, a user can configure board 1+1 protection.

Interface Configuration
By using the U2000, a user can perform the following operations:

7-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

7 RTN Network Feature Management

Set the parameters for a SDH interface.

Set automatic laser shutdown.

Set the parameters for a PDH interface.

Set the parameters for an IF interface.

Set the parameters for a digital interface.

Set the parameters for an Outdoor unit (ODU) interface.

Set overhead interfaces, including:

Orderwire

Broadcast data port

Query and set the overhead including:

Regenerator section overhead (J0).

Lower order path overhead (V5, J2)

VC4 higher order path overhead (J1, C2) and its pass-through or termination.

VC3 higher order path overhead (J1, C2).

Enable IEEE-1588 overhead bytes.

Support PRBS.

Support the feature of packet-based microwave. You can configure a microwave


interface in terms of basic and advanced attributes, IF attributes, and Layer-2 and
Layer-3 attributes.

Support the ability to configure the long and short serial numbers for an MP group.

Configuration for RTN Service and Protection


By using the U2000, a user can perform the following operations:

Configure VC12, VC3, or VC4 services.

Convert between an SNCP service and a normal service.

Modify attributes of SNCP services.

Perform SNCP protection switching.

Support 1+1 linear MSP, 1:N (N no larger than 3) linear MSP.

Support the N+1 protection.

Support IF 1+1 protection.

Support the REG configuration.

Support MSP rings.

Support the XPIC feature.

Configuration for Ethernet Interfaces and Services


By using the U2000, a user can perform the following operations:

Issue 03 (2010-11-02)

Configure Ethernet internal interfaces, including:

TAG attributes

Encapsulation/mapping

Network attributes

Link capacity adjustment scheme (LCAS)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

7-3

7 RTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Bound path

Configure external ports of Ethernet interface, including:

Basic attributes

Flow control

TAG attributes

Network attributes

Advanced attributes.

Configure Jumbo frame.

Configure QinQ Type area.

Configure Ethernet private line (EPL) services.

Configure EVPL (QinQ) services.

Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge
(VB) and configure the following: service mount, VLAN filtering, VLAN unicast,
disable MAC address, bound path, self-learning MAC address, and VLAN MAC address
table capacity.

Configure Ethernet virtual private LAN (EVPLAN) services.

Test frame receiving and transmitting on Ethernet boards.

Configure quality of service (QoS), including:

Flow configuration

CAR configuration

CoS configuration

Port shaping configuration

Board shaping configuration

Configure Ethernet Layer-2 switching, including:

Aging time

Spanning tree

IGMP snooping protocol.

Support the ability to diagnose protocol faults and restore protocols.

Configure point-to-point LPT management and point-to-multipoint LPT management.

Configure Ethernet intra-board LAG.

Configure Ethernet Ring Protection.

Configure the RMON performance functions such as browsing history groups of


Ethernet ports, collecting performance statistics of a group, setting an alarm group of
Ethernet ports, and setting a history control group.

Clock Configuration
By using the U2000, a user can perform the following operations:

7-4

Query the clock synchronization status.

Set system clock source priority list.

Set clock source switching, including:

Clock source restoration parameters

Clock source switching condition

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

7 RTN Network Feature Management

Clock source switching

Configure clock subnets, including:

Clock subnet

Clock quality

Synchronization status message (SSM) output control

Clock ID status

Set 2 Mbit/s phase-locked source external clock attributes.

Set the priority table of NE clock sources and query the currently-traced clock source.

IEEE 1588 Packet Clock


By using the U2000, a user can perform the following operations:

Configure the selection mode of a frequency source.

Set the PTP system time.

Configure a PTP clock subnet.

Configure a PTP clock service.

Set the WTR time for a PTP clock source.

Set the PTP clock source priority.

Ethernet OAM Management


By using the U2000, a user can configure the 802.1 ag Ethernet OAM as follows:

Support maintenance domain (MD), maintenance association (MA), maintenance end


point (MEP), and maintenance intermediate point (MIP).

Perform CC check.

Perform LB check.

Perform LT check.

Perform Ping test.

Perform Performance detect.

By using the U2000, a user can configure the 802.3 ah Ethernet OAM as follows:

Support OAM self-loop detection.

Enable OAM automatic discovery.

Support link event notification and support the adjustment of the OAM error frame
monitoring threshold.

Perform remote loopback.

IS-IS Protocol Configuration


The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the
protocol of the network control plane, and provides the following configuration functions:

Configure an IS-IS protocol instance.

Enable the IS-IS protocol for a port.

Import routes.

Configure link TE information.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

7-5

7 RTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

OSPF Protocol Configuration


The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network
control plane, and provides the following configuration functions:

Configure an OSPF protocol instance.

Enable the OSPF protocol for a port.

Import routes.

Configure the TE information about a link.

MPLS Signaling Protocol Configuration


The U2000 supports configuring the following two signaling protocols:

RSVP-TE protocol. Resource reservation protocol-traffic engineering (RSVP-TE) is


derived from the RSVP protocol. The RSVP protocol is a type of QoS protocol. The
RSVP protocol reserves resources for specific services in a network to ensure the service
quality. As the TE is generated, RSVP is extended accordingly to support LSP creation
and to realize TE.

LDP protocol. Label distribution protocol (LDP) is a control and signaling protocol of
multi-protocol label switching (MPLS).

PTN equipment supports using the RSVP-TE protocol to create dynamic LSP connection and
using the LDP protocol to create PW connection.

Static Route Management Configuration


The U2000 supports configuring the static route management.

Address Parse Configuration


The U2000 supports configuring the address parse.

LAG Configuration
Link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical
link of faster rate for transmitting data. This function improves the link availability and
increases link capacity.
The U2000 supports configuring the following LAG attributes:

Configure the load sharing type, including sharing and non-sharing.

Configure the LAG type, including manual and static.

Configure the service distribution algorithm of the LAG.

Configure the port priority and system priority of the LAG.

BFD Configuration
Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.
BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols
in many aspects. A pair of systems periodically sends detection packets on the channel on
which session between the two systems is created. If a system does not receive any detection

7-6

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

7 RTN Network Feature Management

packet from the opposite end in a specific time, the system regards that a failure occurs in
some part of the bidirectional channel to the adjacent system.

QoS Configuration
Quality of service (QoS) indicates the performance of the data flow that travels through a
network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the
bandwidth, but it can minimize the delay and jitter in the network by reasonably allocating
and monitoring network resources. In this way, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision
policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS
nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification
on the traffic that enters the DS domain. Traffic of different types is marked with different
PHB service types. For internal DS nodes, you need to perform only simple flow
classification based on PHB service type.
The U2000 supports the following QoS functions:

Configure Diffsever domains.

Configure ATM CoS mapping.

Configure simple flow classification and complex flow classification.

Configure CAR and Shaping.

Configure the color blindness mode.

Configure the WFQ schedule policy.

Configure the port WREQ schedule policy.

To simplify the operation and share some common QoS configuration parameters, the
U2000 supports creating QoS function point policy. The function point policies are as
follows: port policy, ATM policy and V-UNI ingress policy. By using these function
point policies, you can bind the CAR configuration attribute, shaping configuration
attribute, flow classification configuration attributes, WFQ schedule policy and WRED
policy attributes.

MPLS Tunnel Configuration


The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service,
the MPLS tunnel realizes end-to-end transmission and carries the PWs related to the service.
The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE
basis:

Configure basic attributes of the MPLS.

Configure static unicast MPLS tunnels.

Create forward and backward MPLS tunnels at the same time.

Create the E-LSP.

Manage PWs.

Manage Tunnel labels and PW labels.

MPLS Tunnel Protection Group Configuration


The U2000 provides the following functions of configuring an MPLS tunnel protection group:

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

7-7

7 RTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,
containing the switching mode, revertive mode, wait-to-restore (WTR) time, and
hold-off time.

Perform MPLS tunnel protection switching.

Query the protection switching status of an MPLS tunnel.

PWs with UDP Encapsulation.


The U2000 supports the PWs with UDP encapsulation that are carried in IP tunnels.

IP Tunnel and GRE Tunnel Configuration


If the equipment at the two ends of an IP network does not support MPLS tunnel, PWE3
services can pass through the IP network by using the IP tunnel or GRE tunnel.
IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication.
The U2000 supports configuring bidirectional IP tunnels and GRE tunnels on a per-NE basis.
The U2000 supports the Offload protection between MPLS and GRE tunnels.

CES Service Configuration


CES is mainly used for service transparent transmission of TDM trail switching data in the
packet transport network (PTN).
The U2000 provides the following configuration functions for CES service creation:

Create the corresponding PW when creating a CES service.

Create UNI-UNI and UNI-NNI CES services.

Create CES services of structure-aware TDM circuit emulation service over packet
switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).

Configure QoS of the CES service.

Configure idle timeslot recovery value.

Support to carry the CES service by IP/GRE Tunnel.

ATM Service Configuration


ATM emulation service is mainly used to transparently transmit ATM services in the PTN.
The U2000 provides the following configuration functions for ATM service creation:

7-8

Create an ATM service that contains multiple ATM connections.

Create UNI-UNI and UNIs-NNI ATM services.

Create PVP and PVC ATM services.

Create the corresponding PW when creating an ATM service.

Configure the IMA group.

Configure QoS of the ATM service.

Configure the CoS mapping.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

7 RTN Network Feature Management

E-Line Service Configuration


The E-line service is a point-to-point Ethernet service. The equipment transmits user packets
from the user side to the network side based on Port or Port+VLAN. In this way, user data can
be transparently transmitted in a point-to-point manner.
The U2000 supports the following functions of configuring E-line services on a per-NE basis:

Create UNI-UNI E-Line services.

Create UNI-NNI E-Line services that are carried on ports.

Create UNI-NNI E-Line services that are carried on PWs.

Create UNI-NNI E-Line services that are carried on QinQ links.

Configure the service and the QoS of the corresponding PW when creating an L2VPN
service.

Configure the V-UNI group.

E-Aggr Service Configuration


The E-Aggr service is a multipoint-to-point Ethernet service. The equipment uses several
ports to access services from the V-UNI side, and converges the services into one PW at the
network side for transmission. In this way, user data from multiple points can be converged
into one point.
The U2000 supports the following functions of configuring E-Aggr services on a per-NE
basis:

Configure the VLAN forwarding table items of an E-Aggr service.

Configure the service and the QoS of the corresponding PW when creating an E-Aggr
service.

Configure the V-UNI group.

MPLS OAM Configuration


MPLS OAM is an OAM function of the MPLS network. This function can check the quality
of LSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge,
and locate a defect inside the network at the MPLS layer. It can report and handle a defect.
When a fault occurs, the MPLS OAM provides trigger scheme of protection switching.
The U2000 provides the following functions of configuring MPLS OAM:

Configure MPLS OAM parameters of a tunnel.

Perform CV/FFD check.

Perform LSP ping check.

Perform PW ping check.

Perform LSP traceroute check.

ATM OAM Configuration


ATM OAM is an end-to-end OAM function for ATM services. This function can check the
quality of ATM links that pass through multiple NEs. The ATM OAM function checks an
ATM link by inserting some OAM cells of the standard cell structure to the user cell flow.
The U2000 provides the following functions of configuring ATM OAM:

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

7-9

7 RTN Network Feature Management

Set segment end attributes.

Perform CC activation test.

Perform remote loopback.

Set LLID.

iManager U2000 Unified Network Management System


Product Description

7.2 RTN Protection Subnet Management


A protection subnet is a network structure with the comprehensive self-protection function.
To perform protection subnet management, you need to have the related license.
By using the U2000, you can perform the following operations:

Create an RTN protection subnet.

IF_1+1 protection subnet

IF_N+1 protection subnet

Manage RTN protection subnets.

Set the parameters for a protection subnet.

Query the switching status of a protection subnet.

Query and delete a protection subnet.

Query protection subnet resources.

7.3 End-to-End RTN Management


End-to-end network management is also referred to as trail management. You can construct
the configuration data of the end-to-end network management by searching for the data at the
NE layer of the U2000, or directly configure the data at the network layer of the U2000, and
apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis,
configuring NE data by using the trail management function is faster and more convenient.
To perform end-to-end network management, you need to have the related license.
By using the U2000, you can perform the following operations:

7-10

Create and maintain an RTN trail.

Create a PDH microwave trail.

Create a PDH microwave trail.

Activate and deactivate an RTN trail.

Manage the alarms and performance events related to an RTN trail.

Query current and history alarms, current and history performance data, UAT and
performance threshold-crossing records of an RTN trail.

Set the performance parameters for an RTN trail.

Query the RTN trails and customer information affected by an alarm.

Filter trails in three ways.

Filter all: Filter all trails and only display the qualified trails in a network.

Secondary filter: Filter those trails that are already displayed according to the filter
criteria.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

7 RTN Network Feature Management

Incremental filter: Filter the newly added trails and display the newly qualified trails
together with the currently displayed ones.

Network-Wide Clock Topology Management

Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.

Displaying clock trace relationship.

Displaying clock alarm status.

PWE3 Service Management


By using the U2000, you can perform the following operations:

Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

Manage multi-hop PWE3 services.

Implement the protection management of PWE3 services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Test and check a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Clone a PWE3 service.

Manage PWE3 service templates.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management
By using the U2000, you can perform the following operations:

Create static tunnels.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels, including the working and protection routes.

View the alarm of a tunnel.

View the performance of a tunnel.

Test and check a tunnel.

Manage discrete tunnels.

Manage BGP/MPLS VPN tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

7-11

7 RTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.

7.4 End-to-End RTN IP Management


There is the IP feature in RTN equipment. You can build the configuration data of end-to-end
RTN IP network management by searching for the data at the NE layer of the U2000, or
directly configure the data at the network layer of the U2000, and apply the data to all the
relevant NEs. Configuring NE data by using the trail management function is faster and more
convenient compared with configuring NE data on a per-NE basis.
To perform end-to-end network management by using the U2000, you need to have the
required license.

PWE3 Service Management


By using the U2000, you can perform the following operations:

Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Copy a PWE3 service.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

Tunnel Management
By using the U2000, you can perform the following operations:

7-12

Create static CR, RSVP, and IP tunnels.

Create RSVP tunnels in batches.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels.

View the alarm of a tunnel.

View the performance of a tunnel.

Manage discrete tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Issue 03 (2010-11-02)

7 RTN Network Feature Management

Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection
groups.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

7-13

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

PTN Network Feature Management

About This Chapter


This topic describes the functional features of PTN NE management and network
management.
8.1 PTN NE Management
NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration object is a single NE.
8.2 End-to-End PTN Management
End-to-end network management is trail management. You can build the configuration data of
end-to-end network management by searching for the data at the NE layer of the U2000, or
directly configure the data at the network layer of the U2000, and apply the data to all the
relevant NEs. Configuring NE data by using the trail management function is faster and more
convenient compared with configuring NE data on a per-NE basis.

8.1 PTN NE Management


NE management refers to the management of configurations of an NE in terms of attributes,
communication, services, protection, and clocks. The configuration object is a single NE.

Basic NE Configuration
By using the U2000, a user can perform the following operations:

Issue 03 (2010-11-02)

Modify NE attributes such as:

NE name

NE ID

NE extended ID

Remarks

NE pre-configuration

Synchronize NE time: Align all NEs with the system time of the U2000 server. You can
set the U2000 to automatically synchronize the NE time by specifying the automatic
synchronization period.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-1

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Support the board plug and display feature: After a board is inserted to the slot, the NE
Panel automatically displays the board and board information.

Disable NE functions automatically: You can set to periodically disable certain NE


functions that may affect services, such as loopback and ALS. When the time expires,
these operations automatically stop.

Support environment monitoring information.

Support the board replacement function.

Configure NE Alarm Attribute

Configure alarm severity and auto reporting.

Configure alarm saving mode, reversion mode and alarm correlation.

Configure alarm suppression.

Configure AIS insert switch.

Configure alarm reversion.

Configure NE Performance Attribute

Configure NE performance monitoring time.

Configure RMON performance.

Query board current performance, history performance and UAT event.

Reset board performance register.

Configure board performance monitor status.

Configure board performance threshold.

Configure NE Security Attribute

Support NE user management.

Support NE login management.

Configure LCT Access control.

Support NE user group management.

Support Online user management.

Configure NE security parameters.

Query NE security log.

Configure ACL.

Service Interface Types Configuration


You can configure the basic, Layer-2, or Layer-3 attributes for an interface to specify the
working mode and application scenario of the interface.
Basic attributes are physical attributes of the interface. Layer-2 attributes are data link layer
attributes of the interface, such as ATM attribute, VLAN attribute, and QinQ attribute.
Layer-3 attributes are network layer attributes of the interface, such as the IP attribute.
Table 8-1 lists the PTN service interface types that the U2000 supports.

8-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

Table 8-1 Types of PTN service interfaces


Service
Interface

Supported
Port
Mode/Encaps
ulation Type

Port Type

MP Group
Supported or
Not

Function

SDH interface

General
attributes

Physical port

Not supported

Sets together
with the Layer
3 attributes or
connects to the
equipment as
the channelized
STM service
interface.

Layer 2
attributes

Physical port

Not supported

This interface
can carry the
ATM services.

Layer 3
attributes

Physical port

Not supported

This interface
can carry
tunnels after the
PPP is enabled.

General
attributes

Physical port

Not supported

This interface
can carry the
TDM services.

Layer 2
attributes

Physical port

Not supported

Carries the
IMA signals.

Layer 3
attributes

Physical port

Supported

This interface
can be added
into a multilink
PPP (MP)
group after the
PPP is enabled.

General
attributes

None

None

Sets together
with the Layer
2 and Layer 3
attributes.

Layer 2
attributes

Physical port

Not supported

Carries the
user-side or
network-side
Ethernet
services.

Layer 3
attributes

Physical port

Not supported

Carries tunnels.

General
attributes

Logical port

Not supported

Sets together
with the Layer
2 and Layer 3
attributes.

PDH interface

Ethernet
interface

Ethernet Virtual
interface

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-3

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

Service
Interface

Supported
Port
Mode/Encaps
ulation Type

Port Type

MP Group
Supported or
Not

Function

Layer 2
attributes

Logical port

Not supported

Carries the
Ethernet
services for
VLAN Sub
Interface.

Layer 3
attributes

Logical port

Not supported

EOA Virtual
Interface:
carries the IP
or GRE
tunnels.

VLAN Sub
Interface:
applies to the
BFD, L3VPN
or Tunnel

ADSL interface

General
attributes

Physical port

Carries the
ADSL signals

G.SHDSL
interface

General
attributes

Physical port

Carries the
G.SHDSL
signals

Serial interface

General
attributes

None

None

Sets together
with the Layer
3 attributes.

Layer 3
attributes

Logical port

Supported

This interface
can be added to
an MP group
after the PPP is
enabled.

General
attributes

None

None

Sets together
with the IP
attributes.

Layer 3
attributes

Logical port

None

Carries tunnels.

MP Group

IMA Group Configuration


By using the U2000, you can perform the following operations:

8-4

Bind ports.

Manage IMA groups.

Query the status of an IMA group.

Query the status of an IMA link.


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

Manage ATM ports.

Microwave Interface Configuration


By using the U2000, you can perform the following operations:

Configure a microwave interface in terms of basic and advanced attributes, IF attributes,


and Layer-2 and Layer-3 attributes.

Configure a radio link, including the IF 1+1 protection, IF boards, and ODU boards.

Configure HOP Management.

IS-IS Protocol Configuration


The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the
protocol of the network control plane, and provides the following configuration functions:

Configure node attributes.

Configure port attributes.

Import routes.

Configure link TE information.

Configure GR Session.

Configure route aggregation.

OSPF Protocol Configuration


The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network
control plane, and provides the following configuration functions:

Configure node attributes.

Configure port attributes.

Configuring peer attributes.

Import routes.

Configure link TE information.

Configure route aggregation.

MP-BGP Protocol Configuration


By using the internal border gateway protocol (IBGP), the U2000 implements L3VPN
functions and provides the following configuration functions:

Configuring MP-BGP instance.

Configuring MP-BGP Peer.

Configuring route filtering policy.

LDP Protocol Configuration


By using the label distribution protocol (LDP), the U2000 creates LSP connections and PW
connections and provides the following configuration functions:

Configuring MPLS-LDP peer entities.

Configuring node attributes.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-5

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Configuring port attributes.

Configuring IP address filtering table.

Configuring routing policy.

Configuring label policy.

RSVP Protocol Configuration


By using the resource reserved protocol (RSVP), the U2000 creates LSP connections and
provides the following configuration functions:

Configure node attributes.

Configure port attributes.

Static Route Management Configuration


The U2000 supports the function of configuring the static route management.

Address Parse Configuration


The U2000 supports configuring the address parse.

Routing Policy Configuration


The U2000 supports configuring routing policy.

Clock Configuration
The U2000 supports configuring various clock mode.

Configuration the clock domain.

Query the clock synchronization status.

IEEE 1588 Packet Clock

8-6

Configure clock service.

Configure clock synchronization attribute.

Configure clock source priority table.

Configure clock subnet.

Configure external interface.

TOP Packet Clock Configuration

Configure clock services.

Select a differential clock source.

ACR Clock Configuration

Configure CES ACR or 1588 ACR clock.

Configure ACR clock protection.

Physical Clock Configuration

Query the clock synchronization status.

Set clock source priority tables, including:

System clock source priority list

Priority table for phase-locked sources of 1st external clock output


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

Priority table for phase-locked sources of 2nd external clock output

Configure clock subnets, including:

Clock subnet

Clock quality

SSM output control

Clock ID status

Set phase-locked sources output by external clock, including:

External clock output phase-locked source

2 Mbit/s phase-locked source external clock attributes

Board-Level Protection Configuration


By using the U2000, a user can perform the following operations:

Configure TPS protection of a sub-board.

Configure board 1+1 protection for the SCC and cross-connect boards.

Check the switching status.

Perform protection switching.

LAG/MC LAG Configuration


A LAG aggregates multiple Ethernet physical links to form a logical link of faster rate for
transmitting data. This function improves the link availability and increases link capacity.
The MC LAG supports the ability to share load between aggregation group devices.
The U2000 supports configuring the following LAG/MC LAG attributes:

Configure the load sharing type, including sharing and non-sharing.

Configure the LAG type, including manual and static.

Configure the load sharing hash algorithm of the LAG.

Configure the port priority and system priority of the LAG.

MSTP Configuration
The MSTP can be used to clear loops in a network. The MSTP uses a specific algorithm to
block some redundant trails and change a loop network to a non-loop tree network. This
function prevents packet increase in a loop network and generation of broadcast storms in an
endless cycle. Different from the STP and RSTP, the MSTP can forward data according to
VLAN packets and realize load balance of VLAN data.
The U2000 supports configuring the following MSTP attributes:

Configure parameters of port groups and bridges.

Configure CIST and MSTI parameters.

Query CIST status and MSTI status.

IGMP Snooping Configuration


IGMP Snooping is the multicast constraint scheme that runs on the Layer-2 equipment, and is
used to manage and control multicast groups.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-7

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

The U2000 supports the ability to configure IGMP snooping for E-LAN services and provides
the following functions:

Configure IGMP Snooping protocol parameters.

Configure quick leave ports.

Manage routes.

Configure route member ports.

Query statistic information of IGMP protocol packets.

BFD Configuration
Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status.
BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols
in many aspects. A pair of systems periodically sends detection packets on the channel on
which session between the two systems is created. If a system does not receive any detection
packet from the opposite end in a specific time, the system regards that a failure occurs in
some part of the bidirectional channel to the adjacent system.
The U2000 supports the functions of performing the BFD detection on IP/GRE tunnels and
the inter gateway protocol (IGP).
The U2000 supports configuring single-hop or multi-hop BFD detection.

LPT Configuration
LPT is used to return the remote-end link status to the near end. The near-end equipment
performs operations depending on the remote-end link status. When the intermediate
transmission network of the services becomes faulty, the LPT informs the access equipment at
both ends of the transmission network to enable the backup network. That ensures the normal
transmission of the important data.

Synchronization Protocol Configuration


In the application scenario of dual-homing, the status of the peer equipment needs to be
obtained either for the MC LAG or for the cross-MC LMSP. Meanwhile, the actions on both
sides need to be negotiated based on different fault cases. With the method of adding
information of the peer end, a channel is established for control status synchronization with
the peer end. In this manner, the control packets can be transmitted and received through the
channel and link fault detection can be performed.

LMSP/MC LMSP Configuration


Linear MSP protection contains 1+1 linear MSP and 1:N linear MSP. They use the protection
channel to protect services that are transmitted on the working channel. When the working
channel fails, services are switched to the protection channel. The linear MSP applies to the
POS interface and structured STM interface.
The multi-chassis (MC) LMSP can implement the LMSP among NEs.
The U2000 supports the following functions of LMSP/MC LMSP configuration:

8-8

Create a linear MSP.

Check the linear MSP switching status.

Perform linear MSP switching.


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

QoS Configuration
QoS indicates the performance of the data flow that travels through a network. The QoS is
used to ensure end-to-end service quality. The QoS cannot increase the bandwidth, but it can
minimize the delay and jitter in the network by reasonably allocating and monitoring network
resources. In this way, the quality of important services is ensured.
The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ
function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision
policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS
nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification
on the traffic that enters the DS domain. Traffic of different types is marked with different
PHB service types. For internal DS nodes, you need to perform only simple flow
classification based on PHB service type.
The U2000 supports the following QoS functions:

Configure QoS profile.

Configure DiffServ domains.

Configure ATM CoS mapping.

Configure SVLAN DEI used flag.

Configure simple flow classification and complex flow classification.

Configure CAR and Shaping.

Configure the color blindness mode.

Configure the WFQ schedule policy.

Configure the port WRED schedule policy.

Configure the port WFQ policy.

Configure the service WRED policy.

To simplify the operation and share some common QoS configuration parameters, the
U2000 supports creating QoS function point policy. The function point policies are as
follows: port policy, ATM policy, V-UNI ingress policy, V-UNI egress policy, PW policy
and QinQ policy. By using these function point policies, you can bind the CAR
configuration attribute, shaping configuration attribute, flow classification configuration
attributes, WFQ schedule policy, WRED policy and color blindness mode attributes.

Configure CoS queue mapping.

Supports the application of the QoS policy to multiple NEs.

MPLS Tunnel Configuration


The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service,
the MPLS tunnel realizes end-to-end transmission and carries the PWs related to the service.
See Figure 8-1. Unicast MPLS tunnel is mainly used to transparently transmit point-to-point
PWE3 services.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-9

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Figure 8-1 Unicast MPLS tunnel

The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE
basis:

Configure basic attributes of the MPLS.

Configure static unicast MPLS tunnels.

Create forward and backward MPLS tunnels at the same time.

Create bidirectional MPLS Tunnel.

Create the E-LSP and L-LSP.

Manage PWs.

Manage tunnel labels and PW labels.

Query the PWs that a tunnel carries.

MPLS Tunnel Protection Group Configuration


The U2000 provides the following functions of configuring an MPLS tunnel protection group:

Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group,
containing the switching mode, revertive mode, wait-to-restore (WTR) time, and
hold-off time.

Perform MPLS tunnel protection switching.

Query the protection switching status of an MPLS tunnel.

MS PW Configuration
By creating multi step (MS)-PW to transmit services, you can save tunnel resources and
transmit services over different networks.

8-10

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

UDP-Encapsulated PW Configuration
The U2000 supports the UDP-encapsulated PWs that are carried in IP tunnels.

PW APS/MC PW APS Configuration


As a network protection mechanism, PW automatic protection switching (APS) is intended to
protect the services on the working PW with a protection PW. That is, when the working PW
is faulty, the services on the working PW are switched to the protection PW. In this manner,
the services on the working PW are protected.
By using the MC PW APS function, you can implement the PW APS protection among NEs.
You can perform the following PW APS/MC PW APS functions on a per-NE basis:

Create a protection group.

Bind the master and slave protection pairs.

IP Tunnel and GRE Tunnel Configuration


If the equipment at the two ends of an IP network does not support MPLS tunnel, PWE3
services can pass through the IP network by using the IP tunnel or GRE tunnel.
IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication.
The U2000 supports configuring bidirectional IP tunnels and GRE Tunnels on a per-NE basis.
Query the PWs that a tunnel carries.

Dual-Homing Protection Configuration


The two sets of PE equipment, that is, dual-homing nodes, are connected to the same CE
equipment through the corresponding attachment circuits (ACs). In this case, the services that
are received on the PE nodes at the two end of a carrier network can be protected. This is the
dual-homing protection.
You can configure the following types of dual-homing protection for ATM and CES services.

1:1 MC-PW APS and 1:1 MC-LMSP

1:1 MC-PW APS and 1+1 MC-LMSP

1:1 PW redundancy and 1:1 MC-LMSP

1+1 PW redundancy and 1+1 MC-LMSP

You can configure the following types of dual-homing protection for E-line services.

1:1 MC-PW APS and MC-LAG

1:1 PW redundancy and MC-LAG

You can configure dual-homing protection for E-LAN services through the MAC address
withdrawal and MC-LAG.

CES Service Configuration


CES is mainly used for service transparent transmission of TDM trail switching data in the
PTN network.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-11

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

See Figure 8-2. The 2G/3G stations or Intranet line accesses the PTN equipment by using the
E1/ channelized STM-1 line. The equipment divides the E1 signals into pieces, encapsulates
the pieces into the Ethernet, and transmits the E1 signals to the opposite end by using the PW.
Figure 8-2 CES service application model

The U2000 provides the following configuration functions for CES service creation:

Create the corresponding PW when creating a CES service.

Create UNI-UNI and UNI-NNI CES services.

Create CES services of structure-aware TDM circuit emulation service over packet
switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).

Configure QoS of the CES service.

Configure idle timeslot recovery value.

Configure CES service alarm transparent transmission.

Select the tunnel where a PW is carried online.

ATM Service Configuration


ATM emulation service is mainly used to transparently transmit ATM services in the PTN.
See Figure 8-3. The 3G station accesses the PTN equipment by using the ATM IMA group.
The equipment encapsulates the ATM cells into the Ethernet, and transmits the ATM cells to
the opposite end by using the PW.

8-12

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

Figure 8-3 ATM service application model

The U2000 provides the following configuration functions for ATM service creation:

Create UNI-UNI and UNIs-NNI ATM services.

Create PVP, PVC and transparent ATM services.

Create the corresponding PW when creating an ATM service.

Configure the IMA group.

Configure QoS of the ATM service.

Configure the CoS mapping.

Select the tunnel where a PW is carried online.

E-Line Service Configuration


The E-line service is a point-to-point Ethernet service. The equipment transmits user packets
from the user side to the network side based on Port or Port+VLAN. In this way, user data can
be transparently transmitted in a point-to-point manner.
See Figure 8-4. Company A has branches in City 1 and City 3. Company C has branches in
City 1 and City 2. Branches of Company A or Company C that are in different cities have data
communication requirements. The PTN equipment can provide E-line services for Company
A and Company C, to meet their communication requirements. In addition, the service data
can be completely isolated.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-13

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Figure 8-4 E-Line Service

The U2000 supports the following functions of configuring E-line services on a per-NE basis:

Create UNI-UNI E-Line services.

Create UNI-NNI E-Line services that are carried on ports.

Create UNI-NNI E-Line services that are carried on PWs.

Create UNI-NNI E-Line services that are carried on QinQ links.

Configure the service and the QoS of the corresponding PW when creating an L2VPN
service.

Configure ETH LPT.

Configure the V-UNI group.

Select the tunnel where a PW is carried online.

E-Aggr Service Configuration


The E-Aggr service is a multipoint-to-point Ethernet service. The equipment uses several
ports to access services from the V-UNI side, and converges the services into one PW at the
network side for transmission. In this way, user data from multiple points can be converged
into one point.
See Figure 8-5 and Figure 8-6. One carrier wants to construct a 3G network. Services of each
Node B are converged and transported to the RNC. The data between each Node B and RNC
is regarded as one service. At the convergence point, the QoS parameters such as the overall
bandwidth are specified.

8-14

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

Figure 8-5 E-Aggr service scenario 1

Figure 8-6 E-Aggr service scenario 2

The U2000 supports the following functions of configuring E-Aggr services on a per-NE
basis:

Configure the VLAN forwarding table items of an E-Aggr service.

Configure the service and the QoS of the corresponding PW when creating an E-Aggr
service.

Configure the V-UNI group.

Select the tunnel where a PW is carried online.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-15

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

E-LAN Service Configuration


The E-LAN is a multipoint-to-multipoint Ethernet service. It connects to multiple V-UNI and
NNI access points. It realizes packet forwarding and interconnection by using the MAC
address self-learning scheme of layer 2.
See Figure 8-7. The HQ of Company A is in City 3. Company A has Branch A in City 1, City
2, and City 3, and has Branch B in City 1 and City 2. Branch A and Branch B do not have
business with each other. Hence, the data should be isolated between the two branches. The
HQ has requirements of communicating with each branch and accessing the Internet.
Figure 8-7 E-LAN service

Different VLANs are used to identify service data of different branches by using the E-LAN
service. In this way, data is shared within a branch and is isolated from other branches. The
Internet data of the HQ is also isolated from the internal service data by using the VLAN.
The U2000 supports the following functions of configuring E-LAN services on a per-NE
basis:

8-16

Create E-LAN services that are carried on port.

Create E-LAN services that are carried on PWs.

Create E-LAN services that are carried on QinQ links.

Configure the service and the QoS of the corresponding PW when creating an E-LAN
service.

Configure the V-UNI and NNI interfaces of an E-LAN service.

Configure the split horizon group of an E-LAN service.

Configure the V-UNI group.

Configure the MAC address learning parameters.

Configure the unknown frame processing mode.

Configure the static MAC address.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Configure the disabled MAC address.

Select the tunnel where a PW is carried online.

8 PTN Network Feature Management

Service Mirroring Configuration


In the case of the service mirroring, all packets that enter a certain port are duplicated and
then duplicated packets are transmitted through an observation port. In this manner, the
normal service is scarcely affected when packets of the mirrored service are captured and
analyzed.
You can configure the service mirroring as follows:

Configure the local service mirroring.

Configure the remote service mirroring.

MPLS OAM Configuration


MPLS OAM is an OAM function of the MPLS network. This function can check the quality
of LSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge,
and locate a defect inside the network at the MPLS layer. It can report and handle a defect.
When a fault occurs, the MPLS OAM provides trigger scheme of protection switching.
The U2000 provides the following functions of configuring MPLS OAM:

Configure MPLS OAM parameters of a tunnel.

Perform CV/FFD check.

Perform LSP ping check.

Perform PW ping check.

Perform LSP traceroute check.

Perform PW traceroute check.

The FDI can be enabled and disabled.

Ethernet Service OAM Configuration


Ethernet service OAM is an end-to-end OAM function for services. This function can check
the quality of Ethernet links that pass through multiple NEs. The Ethernet service OAM
checks an Ethernet link by sending OAM packets. The OAM packet is handled only at the
MAC layer. As a low rate protocol, the OAM protocol uses very small network bandwidth.
Hence, this function does not affect services carried by the link.
The U2000 provides the following functions of configuring Ethernet service OAM:

Create maintenance domains (MDs), maintenance associations (MAs), maintenance end


points (MEPs), and maintenance intermediate points (MIPs).

Perform a CC check.

Perform an LB check.

Perform an LT check.

Ethernet Port OAM Configuration


The Ethernet port OAM is mainly used to automatically check the connectivity and
performance and locate the faults of the physical links under the MAC layer. It is applicable
when the physical Ethernet ports are directly connected.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-17

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

The U2000 provides the following functions of configuring Ethernet port OAM:

Configure OAM parameters.

Configure the OAM error frame monitoring.

Query the remote OAM parameters.

ATM OAM Configuration


ATM OAM is an end-to-end OAM function for ATM services. This function can check the
quality of ATM links that pass through multiple NEs. The ATM OAM function checks an
ATM link by inserting some OAM cells of the standard cell structure to the user cell flow.
The U2000 provides the following functions of configuring ATM OAM:

Set segment end attributes.

Perform CC activation test.

Perform remote loopback.

Set LLID.

Configure ATM alarm transmission

8.2 End-to-End PTN Management


End-to-end network management is trail management. You can build the configuration data of
end-to-end network management by searching for the data at the NE layer of the U2000, or
directly configure the data at the network layer of the U2000, and apply the data to all the
relevant NEs. Configuring NE data by using the trail management function is faster and more
convenient compared with configuring NE data on a per-NE basis.
To perform end-to-end network management by using the U2000, you need to have the
required license.

PWE3 Service Management


By using the U2000, you can perform the following operations:

8-18

Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.

Pre-deploy a PWE3 service.

Implement the function of automatically discovering PWE3 services.

Modify and delete PWE3 services, and filter PWE3 services to view the desired services.

Manage multi-hop PWE3 services.

Implement the protection management of PWE3 services.

View the topology of PWE3 services.

View the alarms of a PWE3 service.

View the performance of a PWE3 service.

Test and check a PWE3 service.

Manage discrete PWE3 services.

Manage PWE3 services based on rights and domains.

Clone a PWE3 service.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

8 PTN Network Feature Management

Manage PWE3 service templates.

Implement the function of automatically generating Ethernet OAM for PWE3 services.

VPLS Service Management


By using the U2000, you can perform the following operations:

Create a VPLS service.

Pre-deploy a VPLS service.

Implement the function of automatically discovering VPLS services.

Modify and delete VPLS services, and filter VPLS services to view the desired services.

View the topology of VPLS services.

View the alarms of a VPLS service.

View the performance of a VPLS service.

Test and check a VPLS service.

Manage VSI resource.

Manage VPLS services based on rights and domains.

Manage VPLS service templates.

Implement the function of automatically generating Ethernet OAM for VPLS services.

L3VPN Service Management


By using the U2000, you can perform the following operations:

Create an L3VPN service that supports the BGP/MPLS protocol.

Pre-deploy an L3VPN service.

Implement the function of automatically discovering L3VPN services.

Modify and delete L3VPN services, and filter L3VPN services to view the desired
services.

View the topology of L3VPN services.

View the alarms of an L3VPN service.

View the performance of an L3VPN service.

Test and check the configuration of an L3VPN service.

Manage VRF resource.

Manage L3VPN services based on rights and domains.

Manage L3VPN service templates.

Tunnel Management
By using the U2000, you can perform the following operations:

Create static CR, RSVP, LDP, and IP tunnels.

Create RSVP and LDP tunnels in batches.

Pre-deploy a tunnel.

Implement the function of automatically discovering tunnels.

Modify and delete a tunnel, and filter tunnels to view the desired tunnels.

View the topology of tunnels.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

8-19

8 PTN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

View the alarm of a tunnel.

View the performance of a tunnel.

Test and check a tunnel.

Manage discrete tunnels.

Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the
function of automatically discovering 1+1 or 1:1 tunnel protection groups.

Switch services in a 1+1 or 1:1 tunnel protection group manually.

Network-Wide Clock Topology Management

8-20

Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.

Displaying clock trace relationship.

Displaying clock alarm status.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

9 Router Networks and Switch Networks Feature


Management

Router Networks and Switch Networks


Feature Management

About This Chapter


This topic describes the functions and features of router networks and switch networks.
9.1 Router NE Management
NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure devices through GUIs.
9.2

Switch NE Management

NE Configuration Management provides GUIs for you to configure and maintain NE


configurations. You can directly configure devices through GUIs.
9.3 Template Management
In the process of NE configuration management, you need to perform a large number of
repetitive operations. With the template management function, you can quickly configure NEs
in batches.
9.4 Diagnosis Management
It provides easy-to-use test diagnosis functions for you to test the connectivity of networks
and services. You can manually run diagnosis cases or customize test policies to let the
diagnosis cases run automatically at scheduled times.
9.5 Cluster Management
The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of
automatic management operations and centralized management for multiple dispersed
low-end and mid-range switches.
9.6 Node Redounded Management
E-Trunk (Enhanced-Trunk), developed on the basis of Link Aggregation Control Protocol
(LACP), is a protocol that controls and implements link aggregation among multiple sets of
equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS,
VLL, or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links
between the CE and PEs.
9.7 Report Subsystem Management

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

9-1

9 Router Networks and Switch Networks Feature


Management

iManager U2000 Unified Network Management System


Product Description

The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
9.8 VPN Service Management
The U2000 provides centralized and unified management, including service deployment,
service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS
service, and PWE3 service.
9.9 Tunnel Service Management
Tunnel service management is used to plan and deploy services on the entire MPLS network.
Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service
management, thus reducing the costs of operating and maintaining MPLS networks.

9.1 Router NE Management


NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure devices through GUIs.

Device Management
Identify the software versions of devices and adapt to different types of devices automatically.

Entity Management
This function allows you to perform the following operations:

Automatically obtain the data about device entities, including frames, boards, power
supplies, fans, and ports.

Refresh entity data and monitor the entity status.

Device Panel Management


This function displays device entities, including frames, boards, power supplies, fans, and
ports, on the device panel.

Clock Management
This function supports physical clock and PTP clock.

Interface Management
This function allows you to configure a variety of media interfaces, including:

9-2

Ethernet interfaces

POS interfaces

Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and


virtual template (VT) interfaces

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

9 Router Networks and Switch Networks Feature


Management

LLDP Management
This function supports the configuration of LLDP globally or on interfaces.

Ethernet Features Management


The specific functions are as follows:

Manage VLANs, such as configuring the global VLAN, port VLAN, VLAN stacking,
and VLAN mapping.

Manage MAC address forwarding, such as configuring static MAC addresses, MAC
address learning rules, and MAC address aging.

Manage VLAN switch.

Ethernet OAM Management


To realize OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With IEEE
802.1ag, the U2000 can continuously monitor user services, and acknowledge and locate
faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last mile, and
notify the related faults.
The specific functions are as follows:

Manage global information.

Support IEEE 802.1ag-related functions, such as managing the configurations of the MD,
MA, local MEP, remote MEP, and MIP and managing test diagnosis (including loopback,
link trace, MAC ping, and MAC trace).

Support IEEE 802.3ah-related functions, such as configuring protocols, querying ports,


and detecting loopbacks.

NE Channel Management
This function allows you to configure and maintain various types of management channels,
including:

Manage local users

Configure VTYs

Configure the Telnet and FTP service

Configure log services

Configure alarm services

Configure SSH services

Configure NAP services

QoS Management
The specific functions are as follows:

Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.

Manage the configurations of interface QoS and system QoS.

Configure DS domain policies.

Manage the configurations of mirrored traffic and mirrored ports.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

9-3

9 Router Networks and Switch Networks Feature


Management

iManager U2000 Unified Network Management System


Product Description

Manage the configurations of HQoS, including the discard policy, HQoS flow queue
policy, HQoS flow queue mapping, HQoS scheduler, and HQoS user scheduling.

Route Management
This function allows you to configure the static routes, routing information, routing policy,
public network and private network of BGP routes, IS-IS routes, and OSPF routes.

MPLS Management
This function supports NE-level MPLS management, including:

Enable MPLS-related protocols.

Configure MPLS TE tunnel.

Set MPLS interface parameters.

Configure static LSPs.

Configure MPLS OAM detection and protection groups.

ACL Management
This function allows you to configure ACLs on network devices and perform specific access
control.

BRAS Management
This function supports the broadband remote access service (BRAS) features of multi-service
gateways, including:

Address pool management

Authorization, authentication and accounting (AAA) management

Domain and Point-to-Point Protocol (PPP) management

Built-in Web server management

Layer-3 Internet Service Provider (ISP) configuration management

Portal server management

VLAN management

User management

This function also allows the system to collect the statistics on domains, IP address segments,
and IP addresses of the whole device in real time.

VPDN Management
This function allows you to configure the Layer-2 Tunneling Protocol (L2TP) on
multi-service gateways and manage L2TP tunnels.

BFD Management
The specific functions are as follows:

9-4

Configure BFD attributes.

Manage BFD sessions.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

9 Router Networks and Switch Networks Feature


Management

Manage BFD alarms.

Perform BFD in VRF, PW, MPLS TE, IS-IS, BGP, and physical links services.

VRRP/VGMP Management
The specific functions are as follows:

Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as
configuring global VRRP attributes, interface attributes, and interface VR, and managing
VRRP alarms.

Manage the configurations of the VRRP Group Management Protocol (VGMP), such as
configuring global VGMP attributes, managing VGMP members, and managing VGMP
alarms.

VPN Management
The specific functions are as follows:

Support tunnel policies.

Support PW templates.

Manage PWs.

Manage VSIs.

Manage VRFs.

MSE Management
This function enables routers to support MSE features, such as configuring MSE globally,
managing AAA, managing users, and configuring interface services.

Multicast Management
This function enables routers to support multicast features, such as configuring IGMP
Snooping, configuring SSM Mapping, managing multicast CAC, and configuring channel
group.

E-Trunk Management
This function supports E-Trunk search and discovery, configure E-Trunk and member of
E-Trunk.

Smart Configuration Tool


This function supports import NE from other system, grammer check of CLI, template of
configuration, parameter setup and batch execution, provide menu entry and integration
withU2000

ANCP Management
This function enables routers to support ANCP services, such as configuring global ANCP
information, configuring ANCP template, and configuring access management.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

9-5

9 Router Networks and Switch Networks Feature


Management

iManager U2000 Unified Network Management System


Product Description

9.2 Switch NE Management


NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure devices through GUIs.

Device Management
This function identifies the software versions of devices and adapts to different types of
devices automatically.

Entity Management
This function allows you to perform the following operations:

Obtain the data about device entities, including frames, boards, power supplies, fans, and
ports automatically.

Refresh entity data and monitor the entity status.

Device Panel Management


This function displays device entities, including frames, boards, power supplies, fans, and
ports on the device panel.

LLDP Management
This function supports the configuration of LLDP globally or on ports.

Interface Management
This function allows you to configure a variety of media interfaces, including:

Ethernet interfaces

POS interfaces

Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and VT


interfaces

Ethernet Features Management


The specific functions are as follows:

Manage VLANs.

Manage MAC address forwarding.

Isolate ports.

Detect LDT loopback.

Detect PWs.

Configure BPDU tunnels.

OAM Management

9-6

To realize the OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With
IEEE 802.1ag, the U2000 can continuously monitor user services, and acknowledge and

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

9 Router Networks and Switch Networks Feature


Management

locate faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last
mile, and notify the related faults.

BFD is used to detect the communication fault between forwarding engines. To be


specific, BFD detects the connectivity of a data protocol on the same path between two
systems. The path can either be a physical link or a logical link.
The specific OAM management functions are as follows:

Manage global information.

Support IEEE 802.1ag-related functions, such as managing the configurations of the


MD, MA, local MEP, remote MEP, and MIP, and managing test diagnosis (including
loopback, link trace, MAC ping, and MAC trace).

Support IEEE 802.3ah-related functions, such as configuring protocols, querying


ports, and detecting loopback.

Configure BFD attributes, manage BFD sessions and BFD alarms, and perform BFD
in VRF, PW, and VSI services.

QoS Management
The specific functions are as follows:

Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.

Manage the configurations of interface QoS and system QoS.

Configure DS domain policies.

Manage the configurations of mirrored traffic and mirrored ports.

Route Management
This function allows you to configure the public network, routing information, routing policy,
and private network of static routes, BGP routes, IS-IS routes, and OSPF routes.

MPLS Management
This function supports NE-level MPLS management, including:

Enable MPLS-related protocols.

Configure MPLS TE tunnel.

Configure MPLS interface parameters.

Configure static LSPs.

Configure MPLS OAM detection and protection groups.

ACL Management
This function allows you to configure ACLs on network devices and perform specific access
control.

BFD Management
The specific functions are as follows:

Configure BFD attributes.

Manage BFD sessions.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

9-7

9 Router Networks and Switch Networks Feature


Management

iManager U2000 Unified Network Management System


Product Description

Manage BFD alarms.

Perform BFD in VRF, PW, MPLS TE, VSI, and physical links services.

VRRP/VGMP Management
The specific functions are as follows:

Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as
configuring the global VRRP attributes, interface attributes, and interface VR, and
managing VRRP alarms.

Manage the configurations of the VRRP Group Management Protocol (VGMP), such as
configuring global VGMP attributes, and managing VGMP members and VGMP alarms.

VPN Management
The specific functions are as follows:

Support tunnel policies.

Support PW templates.

Manage PWs.

Manage VSIs.

Manage VRFs.

EPON Management
This function supports PON interface management and ONU management.

NE Channel Management
This function allows you to configure and maintain various types of management channels,
including:

Configure VTYs.

Configure FTP services.

Manage local users.

Configure log services.

Configure alarm services.

Configure SSH services.

Set SNMP parameters.

DLDP Management
This function supports the management on the DLDP working mode, packet authentication
mode, and statistics.

MSTP Management
This function supports the management on the MSTP domain, MSTP protection, and
statistics.

9-8

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

9 Router Networks and Switch Networks Feature


Management

DHCP Management
This function supports the management on the DHCP server, DHCP relay, client address, and
DHCP statistics.

Web Authentication Management


This function supports the management on the Web authentication server.

Controllable Multicast Management


This function supports the management on the multicast group, multicast template, and
interface filtering.

Mirroring Management
This function supports the management on the local/remote interface mirroring, VLAN
mirroring, MAC address mirroring, flow mirroring, CPU mirroring, and CPU buffer statistics.

IP Source Guard Management


This function supports the management on the static user binding table, dynamic check, and
clearance of dynamic configurations.

Interface Security Management


This function supports the management on the Ethernet interface security.

MAC Address Authentication Management


This function supports the management on the MAC address authentication.

PPPoE+ Management
This function supports the management on the PPPoE+ function.

AAA and User Management


This function supports the management on the user authentication, authorization, and
accounting.

9.3 Template Management


In the process of NE configuration management, you need to perform a large number of
repetitive operations. With the template management function, you can quickly configure NEs
in batches.

Template Features
Template Management provides some default configuration templates. When you reference a
template, the attribute settings on the template automatically apply to the configured resource.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

9-9

9 Router Networks and Switch Networks Feature


Management

iManager U2000 Unified Network Management System


Product Description

A template has the following features:

Offline configuration
Global templates are created in advance and saved on the U2000 instead of being created
on a device. Thus, you can create global templates when devices are offline or do not
exist. The creation of global templates is irrelevant to the device status.

Global validity
After a global template is created, this template can take effect on all the devices
managed by the U2000. It can be referenced by a type of device or none of the devices.

Little duplicate data

After a global template is applied to a type of device, if the template data on some
devices is the same, the U2000 keeps only one template data record for these devices.

When a device references a global template, the U2000 does not adds a record of
template data. Instead, the U2000 records the reference relation between the device
and global template.

A global template can be referenced by a large number of devices of the same type,
which helps to reduce recorded template data and facilitate maintenance.

Main Templates
The main templtes are as follows:

ACL template
ACLs can be used to control the access of user packets that flow into ports. Configuring
ACLs in batches simplifies the configuration of the defense against attacks on the
network access side. When you configure the firewall on the network access side, you
need to configure ACL matching rules, such as the restriction on a MAC address and the
restriction on an IP address. If a rule needs to be applied to multiple interfaces on
different routers, configuring the rule at every point is time-consuming and increases the
costs of management and maintenance.

QoS template
The main applications of network QoS are as follows:

CBQoS template, and it can be applied to interfaces on NEs in batches.

DS domain template, and it can be applied to interfaces on NEs in batches.

HQoS template, and it can be applied to interfaces on NEs in batches.

PQ template, and it can be applied to interfaces on NEs in batches.

Interface CAR template, and it can be applied to interfaces on NEs in batches.

VPN service template


The service template is used to perform batch configurations for multiple devices when a
VPN service is created or configured. In this manner, the efficiency of service
deployment is greatly improved.

Switch EPON template


When you configure multiple ONU services, you can manage ONUs uniformly by
configuring templates to improve configuration efficiency.

9-10

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

9 Router Networks and Switch Networks Feature


Management

9.4 Diagnosis Management


It provides easy-to-use test diagnosis functions for you to test the connectivity of networks
and services. You can manually run diagnosis cases or customize test policies to let the
diagnosis cases run automatically at scheduled times.

Test Diagnosis Functions

This describes the test diagnosis function of the U2000. The U2000 provides test cases,
such as VPLS MAC ping/traceroute, ICMP ping/traceroute, PWE3 ping/traceroute, LSP
ping/traceroute, and ICMP VRF ping/traceroute, which can help you to test the network
connectivity at each protocol layer.

The U2000 allows you to combine several test cases into a test suite, so that you can
perform test diagnosis in batches as required. By diagnosing services layer by layer
according to network protocol layers, theU2000 can quickly locate the faulty network
layer.

Application Layer
DNS, DHCP, FTP, SNMP, VOIP

Transport Layer
TCP, UDP

Network Layer
ICMP ping/traceroute, ICMP VRF ping/traceroute, ICMP Jitter, multicast ping/trace,
multicast VRF trace, MTU ping

Data Link layer


8021.ag MAC ping, CE ping

MPLS Services
PWE3 ping, LSP ping, VPLS MAC ping, MAC study, mfib ping, service ping

The U2000 provides intelligent result analysis. You can manually customize the
thresholds of test case indicators such as delay, jitter, and packet loss ratio in the result
analysis template and the result analysis policy according to the related service level. In
this manner, you can quickly determine the network status.

Test Diagnosis Management


Through test diagnosis management, you can test the connectivity and QoS of a network and
diagnose network faults according to the test results. Test diagnosis management helps to
narrow the range of fault diagnosis and reduce the time of fault location and rectification.
A test diagnosis tool consists of the following parts:

Issue 03 (2010-11-02)

Test suite

A test suite is made up of multiple test cases. Created according to user test requests,
a test case is the entity of a test tool based on the application layer, transport layer,
network layer, data link layer, and MPLS services. The test suite is a group of test
tools organized according to certain test scenarios.

You can take a test suite as a performance unit and perform all the test cases or
optionally perform some test cases in the test suite. Then you can diagnose network
QoS according to the parameters shown in the test results, such as delay, jitter, and
packet loss ratio.

Diagnosis policy

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

9-11

9 Router Networks and Switch Networks Feature


Management

iManager U2000 Unified Network Management System


Product Description

The U2000 provides multiple running policies for test suites. You can run the test suite
associated with a certain running policy at a specified time daily, weekly, or monthly.

Network scanning
It collects network information through network synchronization and tests the
connectivity of partial types links on the network. The U2000 provides real-time
scanning and allows you to stop running scanning tasks. The U2000 also provides the
traceroute function for you to locate faults.

History data
The history data is the records of test suite operations. You can filter and query history
data according to conditions such as the test suite name, test result, or test time, and
export query results.

Diagnosis result analysis


It provides intelligent result analysis. You can manually customize the thresholds of test
case indicators such as delay, jitter, and packet loss ratio in the result analysis template
and the result analysis policy according to the related service level. In this manner, you
can quickly determine the network status.

9.5 Cluster Management


The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of
automatic management operations and centralized management for multiple dispersed
low-end and mid-range switches.
Cluster network management involves the following functions:

Managing cluster views

Configuring clusters

Managing cluster configuration files

Managing image programs

Locating cluster faults

The U2000 provides cluster management for the


CX200/CX200D/CX300/CX380/CX600/S2300/S3300/S5300. This function allows you to
manage network equipment in a more convenient and efficient manner. With this function,
you can monitor the network status through the physical topology of cluster networks and
reduce improper operations on single equipment during management. Therefore, the U2000
meets the ever-increasing service requests.
Figure 9-1 and Figure 9-2 show the cluster topology management window and functions
provided by theU2000.

9-12

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

9 Router Networks and Switch Networks Feature


Management

Figure 9-1 Cluster topology

Figure 9-2 Navigation path to cluster functions

Automatically discovering and dynamically refreshing cluster equipment nodes

Automatically discovering and dynamically refreshing the physical topology of cluster


networks and links

Managing the configurations of cluster equipment in batches and in a unified and


centralized manner

Maintaining the equipment of a cluster in a centralized manner and supporting fault


detection and recovery

Facilitating the backup and recovery of configuration data

Setting the parameters, such as the management VLAN, IP address pool, and multicast
MAC address, for the switches of a cluster

Supporting the plug-and-play feature of protocols such as NDP, NTDP, and HGMP

Supporting the access to command or member switches through Telnet based on the
nodes in the cluster view

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

9-13

9 Router Networks and Switch Networks Feature


Management

iManager U2000 Unified Network Management System


Product Description

9.6 Node Redounded Management


E-Trunk (Enhanced-Trunk), developed on the basis of Link Aggregation Control Protocol
(LACP), is a protocol that controls and implements link aggregation among multiple sets of
equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS,
VLL, or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links
between the CE and PEs.
This function allows you to perform the following operations:

Creat an E-Trunk, bind Eth-Trunks, and configure the attributes of the E-Trunk and the
Eth-Trunks.

Display the automatically discovered E-Trunk information in the database of the NMS
to the interface of the NMS.

Automatically discover the E-Trunk by user specify the equipment range, the
configuration of the equipment and the E-Trunk group can be automatically discovered.

9.7 Report Subsystem Management


The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
The report subsystem not only supports the manual and periodical generation of reports, but
also is perfect in distributing reports. It can be easily integrated with the security management
module of the U2000 and has a strong data display power.
The report subsystem provides Web-based report generation, distribution, and management
functions.
For more information, reference to "iManager U2000 (RPT)V100R002C00SPC001 Release
Notes_01.doc".

9.8 VPN Service Management


The U2000 provides centralized and unified management, including service deployment,
service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS
service, and PWE3 service.

Service Deployment
The U2000 provides a user-friendly service configuration GUI on which you can complete all
configuration operations. The parameters of multiple sets of equipment can be automatically
generated through related service templates. User configuration results can be previewed
through the topology before being delivered.

Customer management
The U2000 supports the operations of adding, deleting, and modifying customers, and
binding customers to VPN services.

9-14

L3VPN service management

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

9 Router Networks and Switch Networks Feature


Management

Configuring L3VPNs in networking modes such as Full-Mesh, Hub-Spoke, and


Extranet

Configuring VPN FRR and IP FRR for L3VPNs and binding L3VPNs to TE tunnels

Configuring static, OSPF, and BGP private routes

Configuring VPN services in inter-AS OptionA or inter-AS OptionB mode

VPLS service management

Supporting the VPLS services in LDP signaling (Martini) mode

Supporting the interworking of different VSIs

Supporting VLL/VPLS services

PWE3 service management

Configuring static and dynamic PWE3 services

Supporting PWE3 services in CES, ATM, Ethernet, IWF, and heterogeneous


interworking mode

Backing up PW configurations

Configuring PW FRR

Composite service management


The U2000 supports the management on composite services, such as VLL/VPLS,
VLL/L3VPN, L3VPN multi-VRF, and inter-AS OptionA.

Automatic Service Discovery


The U2000 provides the function of automatically discovering L3VPN, VPLS, and PWE3
services that are running on the managed network. In addition, the U2000 can quickly load
services on the current network to itself for unified management and monitoring, without
requiring much user participation.

Service Monitoring

The U2000 provides the visual topology display function for L3VPN, VPLS, and PWE3
services. The running status of the resources used by the current service, such as an
interface, a VRF, or a VSI, can be displayed in the related topology view, thus helping
you to quickly locate faults.

You can quickly locate a faulty service based on the alarm generated by the related NE.

Service Diagnosis

The diagnosis tools are used to detect the connectivity of networks and locate faults.
Through the service diagnosis function, you can generate diagnosis tasks according to
the selected services and directly operate equipment nodes in topology views. The
diagnosis results can be directly displayed.

Service Check and Test

Configuration check: checking the consistency of VPN service configurations on


different sites and showing the positions of configuration errors

Service connectivity test: testing the service connectivity through the ping and tracert
tests, and locating the fault equipment

Protocol status test: checking the service protocol status and the forwarding table, and
displaying the error information, thereby helping you to locate faults

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

9-15

9 Router Networks and Switch Networks Feature


Management

iManager U2000 Unified Network Management System


Product Description

9.9 Tunnel Service Management


Tunnel service management is used to plan and deploy services on the entire MPLS network.
Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service
management, thus reducing the costs of operating and maintaining MPLS networks.

Tunnel Deployment

Enabling MPLS, LDP, and MPLS TE on the network equipment and interfaces in
batches

Implement the planning of traffic on MPLS core networks by supporting the deployment
of end-to-end MPLS TE tunnel services

Facilitating the implementation of the MPLS access scheme by supporting the


deployment of static LSP services

Implementing the end-to-end MPLS OAM protection by supporting the configuration of


end-to-end MPLS TE protection groups, configuration of MPLS OAM detection, and
monitoring of related alarms

Automatic Tunnel Discovery


With the help of a network administrator, the LSPs and related protection groups that are
previously deployed on the network can be restored to the U2000. This satisfies the
requirement in the special case where the LSP deployment is prior to the U2000 installation.
Moreover, less time of the network administrator is required and the impact of incorrect
operations on original services is prevented.

Tunnel Monitoring

Supporting the networkwide tunnel view and displaying multiple types of tunnels, such
as static, RSVP, LDP, and IP tunnels, and their alarms in the topology view

Collecting and displaying the performance data of tunnels

Switching to the related tunnel from an alarm

Tunnel Diagnosis
The U2000 supports LSP ping and LSP tracert functions through which you can diagnose
deployed MPLS TE tunnels and static tunnel services.

9-16

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

10

10 Security Device Network Feature Management

Security Device Network Feature


Management

About This Chapter


This topic describes the functions and features of security device networks.
10.1 NE Management of Security Devices
NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure basic configurations on devices through GUIs.
10.2 Single-Point Web Configuration of Security Devices
Single-point Web configuration integrates the existing Web functions on the device by
embedding browser controls in the Client/Server interfaces. Single-point configuration applies
to all the configurations of security devices. In collaboration with centralized security policy
configuration, it provides an integrated and comprehensive network security management
solution.
10.3 Centralized Security Policy Configuration
Deploying a set of security devices with comprehensive technologies during network security
construction does not mean that the network is under stable and reliable security protection.
10.4 Report Subsystem Management
The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
10.5 VPN Service Management
As an important management component for the IPSec and L2TP VPN solutions, the VPN
service management module is used to configure and monitor the IPSec and L2TP VPN
services. It provides intelligent configuration and monitoring means.

10.1 NE Management of Security Devices


NE Configuration Management provides GUIs for you to configure and maintain NE
configurations. You can directly configure basic configurations on devices through GUIs.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

10-1

10 Security Device Network Feature Management

iManager U2000 Unified Network Management System


Product Description

The NE configuration management functions are as follows:

Device management
This function allows you to perform the following operations:

Identify the software versions of devices and adapt to different types of devices
automatically.

Configure management tunnels on devices, for example, configure local users such as
Telnet users or STelnet users, set SNMP parameters and set trap parameters.

Entity management
This function allows you to perform the following operations:

Obtain the data about device entities, including frames, boards, power supplies, fans,
and ports automatically.

Refresh entity data and monitor the entity status.

Panel management
This function is used to display device entities, including frames, boards, power supplies,
fans, and ports, on the device panel.

Interface management
This function is used to configure the general interface information and Ethernet
interfaces.

GTP management
Through the configuration of GTP policies, the security devices can filter GTP packets
according to different rules, thus realizing the security defense of the GPRS network.
The security devices defend against GTP overbilling attacks, thus protecting users'
benefits against illegitimate damages.

Automatic registration
This function is used to receive the automatic registration messages sent by devices. If
the IP address of a device changes, the NMS can synchronize the IP address information
of the device in time.

10.2 Single-Point Web Configuration of Security Devices


Single-point Web configuration integrates the existing Web functions on the device by
embedding browser controls in the Client/Server interfaces. Single-point configuration applies
to all the configurations of security devices. In collaboration with centralized security policy
configuration, it provides an integrated and comprehensive network security management
solution.
The Web features of security devices provide users with simple and easy-to-use Web
configuration interfaces. You can easily operate and maintain devices.
The single-point Web configuration is a proxy-based Web access mode. It includes two parts:
Web proxy and Web browser.The functions of single-point Web configuration are as follows:

10-2

Open the Web management interface of a device through a U2000 client.

Log in to the device Web interface automatically.

Access devices through the Hyper Text Transfer Protocol (HTTP) or Hyper Text Transfer
Protocol Secure (HTTPS).

Support multiple Web protocols, such as javascript, Hyper Text Marked Language
(HTML), CSS, and Applet, and technologies related to Web 2.0.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

10 Security Device Network Feature Management

Function without modifying or affecting the usage of local browsers such as IE and
Firefox.

10.3 Centralized Security Policy Configuration


Deploying a set of security devices with comprehensive technologies during network security
construction does not mean that the network is under stable and reliable security protection.
In network security maintenance, even deploying a satisfied security policy scheme for a
small-sized local network is a rather complex task. Designing and deploying a set of reliable
security protection policies for a large-scale network, accordingly, is a fairly hard and
challenging task.
An industry-leading security policy design, configuration, and management system is worked
out upon the aim of making a security configuration and management center. With this system,
the truly reliable and stable network security protection can be implemented on the basis of
the security devices deployed on the network.
It has the following features:

Policy package management


A policy package can be used to manage all the security devices on the whole network
and sort the protection tasks on each security device into security policy, attack defense,
and service port mapping.
Users can create their own policy packages and include the configuration tasks in the
policy packages. Users can also perform operations such as creating, deploying,
undeploying, and verifying policy packages. A policy package can cover all the network
security configuration and management tasks of a user on a network.

Configuration and management ranges


Security policy
Attack defense
Service port mapping
Policy resource

Policy recovery
During network security management and maintenance, how to ensure the data
consistency between the NMS and devices so that the actual network configurations can
be accurately displayed on the NMS?
Policy recovery can restore the security policies and attack defense configurations
deployed on devices and the used resources of devices to the NMS, thereby achieving
the data consistency between the NMS and devices.

Policy audit
Auditing the configuration data difference between the NMS and devices helps to ensure
the data consistency and make users to fully trust the NMS when using it.

Security policy configuration and management modes of two dimensions

1.

Service-dimension configuration: manages the configurations when the services are


deployed on multiple or all devices on the network. This helps users to manage and audit
services from the point of networkwide view. On a large-scale network, users do not
need to check and configure services on devices one by one. Therefore, missing
configurations are reduced, and security services can be configured reliably and
efficiently.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

10-3

10 Security Device Network Feature Management

iManager U2000 Unified Network Management System


Product Description

2.

Single NE-dimension configuration: manages the configurations of a single NE. Users


can select an NE to check security configurations, create, modify, deploy, and undeploy
configurations, and import the configurations of other NEs to this NE.

Policy deployment status display


Whether a policy is deployed, whether the deployment is successful, and whether the
deployment status is the same as that on the device are displayed. This helps to prevent
the repeated deployment of a policy that is already deployed.

History record query


The detailed policy package configuration and maintenance procedures are recorded. The
history operations that users perform on policy packages can be audited.

10.3.1 Policy Package Management


This topic describes the fuction of policy package management.
10.3.2 Security Policy Configuration
The U2000 allows you to manually create and modify security device rules.
10.3.3 Attack Defense Configuration
The U2000 provides attack defense functions.
10.3.4 Policy Resource Configuration
The configuration of policy resources includes the configuration of service,addess sets,period
and ports sets.
10.3.5 Mapping Service
The U2000 It provides the configuration function that re-maps the most common service ports
to other ones.

10.3.1 Policy Package Management


This topic describes the fuction of policy package management.
This feature allows you to create, modify, delete, verify, deploy, undeploy, discover, and audit
policy packages, view the deployment and audit result of policy packages.
By changing operations based on single policies and single devices to centralized operations
based on batch policies and multiple devices, this feature increases operation efficiency and
reduces maintenance cost.
The policy packages verifying function ensures the correctness of policy package
configurations and correlations among the policies within the same policy package. With the
policy verifying function, you can correctly deploy policy packages on devices and avoid
repeated modifications due to configuration errors during policy deployment.
Policy auditing is to audit the policy configuration differences between the NMS and device,
so as to determine whether the policy needs to be deployed or discovered.
Policy discovery is to recover the data synchronized to the database to the NMS for
management.
The rights to perform various operations on policy packages are under control. Operations on
policy packages are recorded in logs for the policy maintenance personnel to monitor and
manage policies.

10-4

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

10 Security Device Network Feature Management

10.3.2 Security Policy Configuration


The U2000 allows you to manually create and modify security device rules.
The U2000 allows you to manually create the device rule, including:

Specify the name of a new rule

Select the source security zone

Add the source address manually

Select the destination security zone

Add the destination address

Select the service

Select the action

Add the device

Add the time range

Choose whether to generate logs

Configure functions such as ASPF

Configure functions such as DDoS

Configure functions such as package filtering

After a rule is created and deployed to a device, the device filters device information
according to this rule.
The U2000 allows you to modify the device rule, including:

Change the name of a rule

Change the source security zone

Change the source address

Change the destination security zone

Change the destination address

Change the service

Change the action

Change the device

Change the time range

Change whether to generate logs

Modify functions such as ASPF

Modify functions such as DDoS

Modify functions such as package filtering

The U2000 also allows you to delete a rule, or the value of a certain configuration item of a
rule.

10.3.3 Attack Defense Configuration


The U2000 provides attack defense functions.
This feature provides attack defense functions against SYN flood, UDP flood, ICMP flood,
HTTP get flood, DNS request flood, connection flood, scanning, malformed packet, special
packet control, and blacklist for security devices.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

10-5

10 Security Device Network Feature Management

iManager U2000 Unified Network Management System


Product Description

10.3.4 Policy Resource Configuration


The configuration of policy resources includes the configuration of service,addess sets,period
and ports sets.

Configuring services, address set, time range, and port set

Services
As flexible support for the IP protocol, security services can be classified into TCP
services, UDP services, ICMP services, and other services. The U2000 provides some
basic services by default. You can create different services by adding different
parameter settings to the same protocol. Different types of services can form a service
group. A rule corresponds to one or multiple services. In the case where a rule
corresponds to multiple services, these services can be in a service group or map to
these services. When you log in to the U2000 for the first time, the U2000 provides
some services by default.

Address set
When setting source and destination addresses on the U2000, you can either set
single IP addresses or set address sets.

Time range
Time ranges are classified into two types: continuous time ranges and periodic time
ranges. A continuous time range starts from one time point and ends at another time
point. Rules are valid only within the time range. A period time range is on a weekly
cycle. You need to set the start time and end time of a day and specify on which days
of a week the rules are valid. Then the rules will take effect on a weekly cycle.

Port set
A port set is a collection of single, continuous, or discontinuous port numbers,
specifying the ports through which the server can provide services. The value of a
port set ranges from 0 to 65535.

Configuration log server


Binary flow logs of devices can be sent to binary servers via configuration of log server.

10.3.5 Mapping Service


The U2000 It provides the configuration function that re-maps the most common service ports
to other ones.
Mapping Service means security devices map the service ports of networking program to
out-of-ordered ports when forwarding network data packets.It implies the most common ports
to prevent the outer attack to programs.

10.4 Report Subsystem Management


The report subsystem provides a complete set of convenient services. It allows you to
generate, distribute, and manage reports based on the Web. The powerful report subsystem
can help you to monitor, analyze, improve, and plan network performance.
9.7 Report Subsystem Management lists the details of the report subsystem management.

10-6

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

10 Security Device Network Feature Management

10.5 VPN Service Management


As an important management component for the IPSec and L2TP VPN solutions, the VPN
service management module is used to configure and monitor the IPSec and L2TP VPN
services. It provides intelligent configuration and monitoring means.
10.5.1 IPSec End-to-End Service
The IPSec end-to-end service is to securely connect two intranets trustable to each other
through Internet. It is applied when secure communication connections need to be established.
This application mode can be used to protect the sensitive data transmitted on the Internet.
10.5.2 Remote Access Service
The U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2)
and L2TP over IPSec technologies. The remote access service is applicable to employees
accessing the enterprise intranet in remote dial-up mode over the Internet.

10.5.1 IPSec End-to-End Service


The IPSec end-to-end service is to securely connect two intranets trustable to each other
through Internet. It is applied when secure communication connections need to be established.
This application mode can be used to protect the sensitive data transmitted on the Internet.

Service deployment
This feature provides both the single service deployment function and the service batch
deployment function. Service deployment is used to make services take effect on devices.
You can view the deployment results through the auditing function.

Service discovery
This feature supports the function of automatically discovering services. With this
function, you can discover running IPSec VPN services on the network and then restore
the discovered services to the U2000 for unified management and monitoring.

Service monitoring
By monitoring the status of managed services in real time, the performance management
module allows you to view the service status in the topology view. The performance
management module monitors the service status and performance indicators and displays
collected performance data in graphs or reports.

Display of the service topology


This feature provides the function of visualizing the service topology. In the topology
view, you can view service alarms, service statuses, and service-related device alarms.

Service audit
This feature supports to audit the differences of service configuration between the NMS
and device.

10.5.2 Remote Access Service


The U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2)
and L2TP over IPSec technologies. The remote access service is applicable to employees
accessing the enterprise intranet in remote dial-up mode over the Internet.

Service deployment
The remote access service management supports the deployment of a single service and
the deployment of services in batches. In addition, you can view deployment results in

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

10-7

10 Security Device Network Feature Management

iManager U2000 Unified Network Management System


Product Description

the service topology view. Remote access services include L2TP service, L2TP over
IPSec service and IPSec (IKEv2) service three types.

Service monitoring
The L2TP service, L2TP over IPSec service and IPSec (IKEv2) service management can
manage and monitor the online users of remote access services. It also provides the
functions of displaying the statuses of online users in real time, restricting the number of
online users, and forcing users to log out.

Display of the service topology


The remote access service management provides the function of visualizing the service
topology. In the topology view, you can view service alarms, service statuses, and
service-related device alarms.

Service audit
The remote access service management supports to audit the differences of service
configuration between the NMS and device.

Service resource management


The remote access service management provides the function of radius template
management and user domain management.

10-8

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

11

11 FTTx Network Feature Management

FTTx Network Feature Management

About This Chapter


This topic describes the functional features of FTTx NE management and network
management.
11.1 OLT Management
In the FTTx solution, the OLT is connected with high bandwidth across a long distance. It
works with the ONU to provide voice, data, and video services and meets the individualized
requirements of telecom users. NE configuration management provides GUIs for you to
configure NEs and maintain NE configurations. You can directly configure services on
devices through GUIs.
11.2 ONU Management
The ONU supports GPON, EPON, and GE in the upstream direction and provides different
access modes to meet different FTTx application scenarios. NE configuration management
provides GUIs for you to configure NEs and maintain NE configurations. You can directly
configure services on devices through GUIs.

11.1 OLT Management


In the FTTx solution, the OLT is connected with high bandwidth across a long distance. It
works with the ONU to provide voice, data, and video services and meets the individualized
requirements of telecom users. NE configuration management provides GUIs for you to
configure NEs and maintain NE configurations. You can directly configure services on
devices through GUIs.

Device Management
By using the U2000, you can manage device panels, shelves, cards, clock sources, and system
parameter profiles.

Network Interface Management


By using the U2000, you can perform the following operations:

Issue 03 (2010-11-02)

Manage and maintain TDM E1/T1 ports.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

11-1

11 FTTx Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Manage and maintain CES E1/T1 ports.

Manage and maintain STM-x/OC-x TDM ports.

Manage Ethernet ports.

Connection Management
By using the U2000, you can manage service virtual ports and traffic profiles.

Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.

Layer 3 Management
By using the U2000, you can configure the DHCP relay and the ARP function and perform
MPLS management.

ACL&QoS
By using the U2000, you can manage ACLs, QoS, time segments, and HQoS.

User Security and System Security


By using the U2000, you can perform the following operations:

Configure user access in PITP mode.

Configure user access in DHCP option 82 mode.

Configure user access control.

Configure system security access.

Manage BFD sessions.

Ethernet Connection Fault Management


By using the U2000, you can manage maintenance domains (MDs), maintenance associations
(MAs), and maintenance association end point (MEPs).

Protection Group Management


By using the U2000, you can manage PS protection groups and configure type B dual homing
protection, GPON type C protection, and EPON type D protection.

GPON Management
By using the U2000, you can manage GPON optical ports, ONTs, GEM ports, TDM private
line services, and GPON profiles.

EPON Management
By using the U2000, you can manage EPON optical ports, ONTs, CESoP connections, TDM
private line services, and EPON profiles.

11-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

11 FTTx Network Feature Management

Multicast Service Management


By using the U2000, you can perform basic configurations and manage programs, profiles,
and users.

Service Provisioning Profile


The U2000 supports E2E service provisioning profiles to improve the service provisioning
efficiency.

Alarm Root Cause Identification


By using the U2000, you can quickly determine the reason why the ONU is offline, and
distinguish whether the backbone or tributary optical fiber is faulty or the terminal is powered
off. This reduces the number of orders that require engineers to rectify faults on site.

Quick Service Cutover of PON Ports


When a PON port of an OLT is faulty, you can connect the optical fiber that is connected to
the faulty PON port to an idle PON port on the OLT, copy the configurations of the faulty
PON port to the idle PON port, and transfer the configurations of the MDUs that are
connected to the faulty PON port to the idle PON port. Then, the services restore quickly.

11.2 ONU Management


The ONU supports GPON, EPON, and GE in the upstream direction and provides different
access modes to meet different FTTx application scenarios. NE configuration management
provides GUIs for you to configure NEs and maintain NE configurations. You can directly
configure services on devices through GUIs.

Device Management
By using the U2000, you can manage device panels, shelves, cards, and system parameter
profiles.

Network Interface Management


By using the U2000, you can perform the following operations:

Manage and maintain TDM E1/T1 ports.

Manage and maintain CES E1/T1 ports.

Manage GPON optical ports.

Manage EPON optical ports.

Connection Management
By using the U2000, you can manage service virtual ports and traffic profiles.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

11-3

11 FTTx Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.

Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security


By using the U2000, you can perform the following operations:

Configure user access in PITP mode.

Configure user access in DHCP option 82 mode.

Configure user access control.

Configure system security access.

Manage BFD sessions.

Ethernet Connection Fault Management


By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management


By using the U2000, you can manage PS protection groups and configure type B dual homing
protection, GPON type C protection, and EPON type D protection.

xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, and VDSL2 profiles and ports.

Ethernet Access Management


By using the U2000, you can manage Ethernet ports.

Multicast Service Management


By using the U2000, you can perform basic configurations and manage programs, profiles,
and users.

VoIP Service Management


By using the U2000, you can manage media gateways (MGs), signaling gateways, POTS
ports, and IP interfaces.

11-4

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

11 FTTx Network Feature Management

Layer 2 Topology Management of MDUs


In the topology view, an MDU is managed as a card in the remote shelf of an OLT node. You
can double-click the virtual ODN shelf to enter the Layer 2 topology view of the ODN and the
MDU. Then, you can add, delete, or modify the MDU and configure the services associated
with the MDU.

Sheet Pre-deployment
The U2000 provides the sheet pre-deployment solution. Therefore, you can bulk import
devices to the U2000 and implement the functions of software-commissioning-free and
remote acceptance. In addition, only one site visit is required and the plug and play (PnP)
feature is supported. These features greatly improve the deployment efficiency and reduce
network construction costs.

PnP and Quick Replacement


When an MDU is faulty, you need to quickly locate the fault and restore services. It is time
consuming to locate internal faults of an MDU and repair the MDU. Therefore, it is
recommended that you replace faulty MDUs directly and store and repair the faulty MDUs in
a centralized manner.

Remote Acceptance
In FTTx network construction, the U2000 supports remote acceptance of deployed ONUs to
implement one site visit and reduce operation and maintenance costs.

Automatic Bulk Upgrade


The U2000 provides the solution to automatic bulk upgrade of offline ONTs. By using the
U2000, you can perform the following operations:

Bulk upgrade ONTs.

Manage scheduled upgrade tasks.

Upgrade offline ONTs.

Enable the function of automatically upgrading ONTs when the ONTs are connected.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

11-5

iManager U2000 Unified Network Management System


Product Description

12

12 MSAN Network Feature Management

MSAN Network Feature Management

About This Chapter


This topic describes the functions and features of msan device networks.
12.1 MSAN Management
The multi-service access node (MSAN) connects user telephone lines to the core network. It
also provides voice, ISDN, and broadband services on the same platform. NE configuration
management provides GUIs for you to configure NEs and maintain NE configurations. You
can directly configure services on devices through GUIs.

12.1 MSAN Management


The multi-service access node (MSAN) connects user telephone lines to the core network. It
also provides voice, ISDN, and broadband services on the same platform. NE configuration
management provides GUIs for you to configure NEs and maintain NE configurations. You
can directly configure services on devices through GUIs.

Device Management
By using the U2000, you can manage device panels, shelves, cards, clock sources, and system
parameter profiles.

Network Interface Management


By using the U2000, you can perform the following operations:

Manage E1 ports and Ethernet ports.

Configure and maintain E3/T3 ports.

Manage and maintain STM-x/OC-x TDM ports

Manage IMA groups and links.

Connection Management
By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP
connections.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

12-1

12 MSAN Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and
LACP.

Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security


By using the U2000, you can perform the following operations:

Configure user access in PITP mode.

Configure user access in DHCP option 82 mode.

Configure user access control.

Configure system security access.

Manage BFD sessions.

Ethernet Connection Fault Management


By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management


By using the U2000, you can manage PS protection groups and configure type B dual homing
protection, GPON type C protection, and EPON type D protection.

xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, and VDSL2 profiles and ports.

Multicast Service Management


By using the U2000, you can perform basic configurations and manage programs, profiles,
and users.

VoIP Service Management


By using the U2000, you can manage MGs, signaling gateways, POTS ports, and IP
interfaces.

V5 Voice Service Management


By using the U2000, you can manage V5 interfaces, service ports, SPCs, and VFB, ATI, CDI,
and party line services.

12-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

12 MSAN Network Feature Management

Narrowband Data Service Management


By using the U2000, you can manage MTA and HSL services and TDM SHDSL ports.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

12-3

iManager U2000 Unified Network Management System


Product Description

13

13 DSLAM Network Feature Management

DSLAM Network Feature


Management

About This Chapter


This topic describes the functions and features of dslam device networks.
13.1 DSLAM Management
In the ATM-DSLAM or IP-DSLAM networking mode, the DSLAM provides the access to
various services such as ADSL, ADSL2+, SHDSL, and VDSL2. It also provides the
integrated services that feature large capacity, high rate, and high quality. NE configuration
management provides GUIs for you to configure NEs and maintain NE configurations. You
can directly configure services on devices through GUIs.

13.1 DSLAM Management


In the ATM-DSLAM or IP-DSLAM networking mode, the DSLAM provides the access to
various services such as ADSL, ADSL2+, SHDSL, and VDSL2. It also provides the
integrated services that feature large capacity, high rate, and high quality. NE configuration
management provides GUIs for you to configure NEs and maintain NE configurations. You
can directly configure services on devices through GUIs.

Device Management
By using the U2000, you can manage device panels, shelves, cards, and system parameter
profiles.

Network Interface Management


By using the U2000, you can perform the following operations:

Manage E1 ports and Ethernet ports.

Configure and maintain E3/T3 ports.

Manage and maintain STM-x/OC-x TDM ports

Manage IMA groups and links.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

13-1

13 DSLAM Network Feature Management

iManager U2000 Unified Network Management System


Product Description

Connection Management
By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP
connections.

Layer 2 Management
By using the U2000, you can manage VLANs and configure the RSTP, MSTP and LACP.

Layer 3 Management
By using the U2000, you can configure the DHCP relay and ARP.

ACL&QoS
By using the U2000, you can manage ACLs, QoS, and time segments.

User Security and System Security


By using the U2000, you can perform the following operations:

Configure user access in PITP mode.

Configure user access in DHCP option 82 mode.

Configure user access control.

Configure system security access.

Manage BFD sessions.

Ethernet Connection Fault Management


By using the U2000, you can manage MDs, MAs, and MEPs.

Protection Group Management


By using the U2000, you can manage PS protection groups and configure type B dual homing
protection, GPON type C protection, and EPON type D protection.

xDSL Management
By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and
ports, EFM SHDSL ports, and VDSL2 profiles and ports.

Multicast Service Management


By using the U2000, you can perform basic configurations and manage programs, profiles,
and users.

13-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

14

14 ONT Management

ONT Management

The U2000 supports the management of EPON terminals in the OAM mode and GPON
terminals in the OMCI mode. In this manner, the terminals are managed in a centralized
manner, which saves the maintenance workload.
To manage xPON terminals, the U2000 adopts two solutions, namely, SNMP+OMCI and
FTP+OMCI.

The objects managed by the ONT L2 protocol and protocols at lower layers provision
multicast IPTV and data services by using the SNMP+OMCI solution.

The VoIP services are provisioned through the FTP+OMCI solution. The N2000 BMS
generates a .xml configuration file and then uploads the file to the FTP server. The OLT
obtains the configuration file from the FTP server, loads it, and then sends it to the ONT
through the OMCI. Finally, the service configuration of the ONT is complete.

The U2000 supports the automatic batch upgrade of ONTs.

Supports the batch upgrade of ONTs.

Supports the scheduled task upgrade management.

Supports the upgrade of offline ONTs, that is, automatic upgrade when the ONT is
connected.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

14-1

iManager U2000 Unified Network Management System


Product Description

15 Reliability

15

Reliability

About This Chapter


In reliability design, measures are taken to reduce potential risks, so that the product can
operate in a safer manner.
15.1 Reliability Indicator
This topic describes the indicators of the reliability design.
15.2 HA System
The high availability (HA) system helps you improve the running reliability of the U2000
server.
15.3 DCN Protection
You can use a data communication network (DCN) to connect the U2000 to a standby
gateway NE (GNE). This improves the reliability of the communication connection between
the U2000 and equipment.
15.4 Disk Mirroring
The disk mirroring function helps you improve the reliability of disk data on the U2000
server.
15.5 Data Backup
The data backup function helps you improve the reliability of important U2000 data.

15.1 Reliability Indicator


This topic describes the indicators of the reliability design.
Table 15-1 lists the reliability indicators of the U2000.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

15-1

iManager U2000 Unified Network Management System


Product Description

15 Reliability

Table 15-1 Reliability indicators of the U2000


Item

Indicator

Remarks

MTBF

The average fault interval is


larger than 6 months.

HA system

The fault is defined as database


crash.
The average fault recovery time
is no more than 15 minutes.

MTTR

HA system

The fault is defined as database


crash.
HA switching time

15 minutes

70% of the management


capacity

NMS start time

10 minutes

70% of the management


capacity

NMS shutdown time

10 minutes

70% of the management


capacity

15.2 HA System
The high availability (HA) system helps you improve the running reliability of the U2000
server.
The non-distributed U2000 server uses a 1+1 scheme. If the active site fails, the U2000 can be
switched to the standby site so that the U2000 application is not interrupted.

The U2000 supports distributed cluster. For better stability and risk resistance capability, the
distributed cluster uses a 1+1 scheme. If a slave server fails, the master server fails, the

15-2

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

15 Reliability

database is faulty, IP addresses conflict, or the key process fails to be switched, you can
switch the distributed cluster to the standby distributed cluster without interrupting the U2000.
The protection mechanism of an HA system has two aspects:

Database synchronization and backup between the active and standby sites

Switching the application program between the active and standby sites

The U2000 provides the following HA schemes:

HA system (Veritas 1+1 hot standby): Applicable to remote hot standby of the
non-distributed system, featuring automatic switching.

HA system (Veritas distributed hot standby): Applicable to remote hot standby of the
distributed system on SUSE Linux OS, featuring automatic switching.

15.3 DCN Protection


You can use a data communication network (DCN) to connect the U2000 to a standby
gateway NE (GNE). This improves the reliability of the communication connection between
the U2000 and equipment.
The communication between non-GNEs and the U2000 is forwarded by the GNE. In the
U2000, you can set the active GNE and standby GNE for NEs in advance. When the
communication between the active GNE and the U2000 is interrupted, the U2000
automatically switches to the standby GNE for communication, so that the communication
between the U2000 and NEs is not interrupted. When the communication between the U2000
and the active GNE recovers, the U2000 determines whether to use the active GNE again
according to the preset revertive mode.

15.4 Disk Mirroring


The disk mirroring function helps you improve the reliability of disk data on the U2000
server.
If the server is a Sun workstation with more than two hard disks, disk mirroring can be
installed together with the U2000. After you create disk mirroring, if the active disk fails, you
can use a command to switch the data to the standby disk, to restore the working data and
parameter settings before the active disk is damaged.

15.5 Data Backup


The data backup function helps you improve the reliability of important U2000 data.
The security of network data is a concern for users. The U2000 provides the following
solutions listed in Table 15-2.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

15-3

iManager U2000 Unified Network Management System


Product Description

15 Reliability

Table 15-2 Data backup

15-4

Data to Be Backed Up

Solution of the U2000

Operation Description

Alarm log, abnormal event


log, performance log,
security, and operation log

Dump logs.

Operate on the U2000 client.


For more details, see the
U2000 Online Help.

Configuration data

Export them to script files,


adopting the MML
command format. The script
files can neglect the
structural differences among
databases of all the U2000
versions, and are suitable for
data backup in the case of
version upgrade. The script
files supported by the
U2000 consist of
networkwide configuration
files, NMS naming file, NE
configuration file, NE list
files, server computer
information files, service
implementation
configuration file,
network-layer information
files, and network
simulation and planning
information files.

Database

Back up all data in the


U2000 database.

NE database

Back up the NE data.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

16

16 Performance Indicators

Performance Indicators

This topic describes the performance indicators of the U2000.


Table 16-1 Performance indicators
Item

Subitem

Indicator

Storage capacity

Capacity of current alarms

Default: 100,000 pieces


Maximum: 100,000 pieces

Capacity of history alarms

Default: 2,000,000 pieces


Maximum: 2,000,000 pieces

Capacity of logs, including


operation logs and system
logs

Default: 1,000,000 pieces

Resources occupied

CPU usage

Normally, the CPU usage is


not greater than 10%.

Processing capability

Response speed of alarm


handling

Normally, the time interval


from the time at which an
alarm is generated on the
equipment to the time at
which the alarm is displayed
on the U2000 is not more
than 10 seconds.

Response speed of
performance event handling

Normally, in the case of


1,000 pieces of performance
data, the time interval from
the time at which they are
reported to the U2000 to the
time at which they are stored
in the database is
approximately 10 seconds.

Alarm handling capability

Normally, 100 (not more


than 400 at most) pieces of
alarms can be handled per
second.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Maximum: 1,000,000 pieces

16-1

iManager U2000 Unified Network Management System


Product Description

16 Performance Indicators

Item

Subitem

Indicator

U2000 user management

User

Maximum: 500

User group

Maximum: 50

Equipment set

Maximum: 100

Function set

Maximum: 255

HA switching time

Switching between remote


active and standby servers

< 15 minutes

Stability

Mean time between failures


(MTBF)

The MTBF is more than six


months (a failure refers to
the situation where the
database quits
unexpectedly).

Mean time to recovery


(MTTR)

The MTTR is not more than


15 minutes (a failure refers
to the situation where the
database quits
unexpectedly).

The number of managed


physical nodes

Maximum: 15,000 physical


nodes

The number of managed


equivalent NEs

Maximum: 15,000
equivalent NEs

Management capability

Table 16-2 DCN bandwidth requirements

16-2

Item

Bandwidth Requirements

Bandwidth required for the communication


between the U2000 server and a U2000
client

2 Mbit/s

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

16 Performance Indicators

Item

Bandwidth Requirements

Bandwidth required for the communication


between the N equivalent NEs and U2000
server

A bandwidth of 2 Mbit/s may not meet the


bandwidth requirements in the case of
different networks. In this case, you can
determine the CIR or PIR by using the
following formula:

CIR:
N>56:
2048k+(N-56)*
0.5k

N<=56:
2Mbit/s

N>56:
2048k+(N-56)*
5k

N<=56:
10Mbit/s

PIR:

Bandwidth required for the communication


between the OSS and U2000 server

2 Mbit/s

Bandwidth required for the communication


between the primary and secondary sites in
an HA system (Veritas)

2 Mbit/s

Issue 03 (2010-11-02)

NOTE
A minimum of 2 Mbit/s is required.

NOTE
A minimum of 2 Mbit/s is required. A bandwidth
of 2 Mbit/s refers to the bandwidth that is
required when you do not synchronize all
performance data by using PMS. If you want to
synchronize the performance data, more
bandwidth is required.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

16-3

iManager U2000 Unified Network Management System


Product Description

17

17 Management Capability

Management Capability

About This Chapter


Introduce the manageable equipment and the management capability of the U2000.
17.1 Management Capability
The management capability of the U2000, on the basis of satisfying the preceding
performance indexes, can be measured by the maximum number of NEs it manages.

17.1 Management Capability


The management capability of the U2000, on the basis of satisfying the preceding
performance indexes, can be measured by the maximum number of NEs it manages.
Currently, a set of U2000 can manage a maximum of 15,000 physical NEs, 20,000 equivalent
NEs and 100 clients. This conclusion is drawn after the tests under a certain environment and
objectively reflects the actual management capability of the U2000.

Management capability: In this document, management capability refers to the capability


of the NMS to manage network resources, which are expressed in the number of
equivalent NEs.

Equivalent NE: The functional features, cross-connect capacity, and number of


boards/ports/channels are specific to NEs of different types. As these NEs require
different resources of the NMS, the number of NEs that can be managed by the NMS
depends on the NE types. For easy description and calculation of the management
capability, the concept of equivalent NE is defined so that NEs of different types or a
number of ports can be converted to equivalent NEs by an uniform criteria according to
the system resources required by them. The system resources required by an equivalent
NE is equal to the resources for managing an STM-1 transport NE.

Equivalent coefficient: The equivalent coefficient refers to the ratio of the resources used
by physical NEs or ports to the resources used by equivalent NEs. Equivalent coefficient
= (Resources used by physical NEs or ports)/(Resources used by equivalent NEs)

The management capability of the U2000 in a network that consists of different types of NEs
is affected by the following factors:

Issue 03 (2010-11-02)

The key technical specifications include the number of equivalent NEs, number of
clients, and number of physical NEs.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-1

17 Management Capability

iManager U2000 Unified Network Management System


Product Description

The management capability of the U2000 also depends on the hardware and varies with
the hardware configuration.

The system limits the number of physical nodes. Hence, the number of physical nodes is
a restriction for the management capability.

The management capability refers to the maximum number of equivalent NEs that can
be managed by the U2000 on certain hardware configuration conditions.

If a client also runs on the computer where the server is running, the management
capability is reduced by 50%. Hence, it is recommended that you run the client and
server on different computers.

Virtual NEs are not included in the management capability. A pre-configured NE is equal
to a real NE. One third-party NE is equal to one equivalent NE, and can only be
discovered instead of being managed. The equivalent coefficient of the OEM equipment
is calculated in the way similar to Huawei equipment.

Generally, the number of equivalent NEs that the U2000 can manage is calculated according
to the following rules:

Number of equivalent NEs = <Number of equivalent NEs in the transport domain> +


<Number of equivalent NEs in the IP domain> + <Number of equivalent NEs in the
access domain>

<Number of equivalent NEs in the transport domain> = (Number of transport NEs of


type_I x Equivalent coefficient + ... + (Number of transport NEs of type_n x Equivalent
coefficient)
For example, there are 5 OptiX OSN 9500 (equivalent coefficient: 10), 10 OptiX OSN 7500 (equivalent
coefficient: 6.5), and 100 OptiX OSN 3500 (equivalent coefficient: 4.5). Then, you can calculate the
number of equivalent NEs in the transport domain as follows:
Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 + 100 x 4.5 = 565

<Number of equivalent NEs in the IP domain> = (Number of IP NEs of type_I x


Equivalent coefficient) + ... + (Number of IP NEs of type_n x Equivalent coefficient)
For example, there are 5 NE5000E (equivalent coefficient: 10), 200 S5300 (equivalent coefficient: 1.25),
and 1000 CX200 (equivalent coefficient: 0.625). Then, you can calculate the number of equivalent NEs
in the IP domain as follows:
Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925

17-2

<Number of equivalent NEs in the access domain> = Number of FTTx OLT equivalent
NEs + Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs +
Number of DSLAM equivalent NEs + Number of equivalent NEs of other access
equipment

Number of FTTx OLT equivalent NEs = (Number of ONTs x Equivalent coefficient) + (Number of
MDUs x Equivalent coefficient) + (Number of P2P ports x Equivalent coefficient)

Number of FTTx MDU equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ...
+ (Number of ports of type n x Equivalent coefficient)

Number of MSAN equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type n x Equivalent coefficient)

Number of DSLAM equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... +
(Number of ports of type_n x Equivalent coefficient)

Number of equivalent NEs of other access equipment = (Number of NEs of type_I x Equivalent
coefficient) + ... + (Number of NEs of type_n x Equivalent coefficient)

The basic unit of an equivalent NE of the U2000 is OptiX Metro 1000.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

The comparison coefficient of an equivalent NE of the U2000 to the equivalent NE in


each domain is as follows:

1 equivalent NE in the transport domain = 1 equivalent NE of the U2000

4 equivalent nodes in the IP domain = 1 equivalent NE of the U2000

3.3 equivalent nodes in the access domain = 1 equivalent NE of the U2000

The management scales of the U2000 are defined as follows:

Small-scale network: less than 2,000 equivalent NEs of the U2000

Medium-scale network: less than 6,000 equivalent NEs of the U2000

Large-scale network: less than 15,000 equivalent NEs of the U2000

Extra-large-scale network: less than 20000 equivalent NEs of the U2000

Conversion between monitored instances to equivalent nodes:


Monitored instances are converted into physical equivalent nodes as follows: 2
monitored instances = 1 equivalent NE of the U2000

Conversion between service resources to equivalent NEs.


Service resource management needs to be converted into a certain number of equivalent
nodes. The formulas for calculating the equivalent nodes are as follows:

For 1-20,000 service resource licenses, Equivalent nodes of services = Total


equivalent nodes x 20%

For 20,001-60,000 service resource licenses, Equivalent nodes of services = Total


equivalent nodes x 25%

For 60,001-100,000 service resource licenses, Equivalent nodes of services = Total


equivalent nodes x 30%

The management capability of the U2000 varies with hardware platforms, as shown in Table
17-1.
Table 17-1 Management capabilities of the U2000 on different hardware platforms
Server

Short Name of
Computer

Management
Capability

Number
of
Clients

Support
Unified
Network
Management

Mainstream Server to Be Delivered with the U2000 V100R002C00


Sun
Server

Issue 03 (2010-11-02)

T5220-4C*1.2G-16G

2000

32

No

T5220-8C*1.4G-32G

6000

64

Yes

M4000-4P*2.53G-32G
Array: 6*146G Array

15000

100

Yes

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-3

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Server

Short Name of
Computer

Management
Capability

Number
of
Clients

Support
Unified
Network
Management

PC
Server

HP
DL380G6-2P*2.0G-8G

2000

32

Yes

HP
DL580G5-4P*2.13G-16G

6000

64

Yes

M4000-2P*2.15G-16G

6000

64

No

SUN V890-4P*1.5G-16G

3000

48

No

SUN V890-2P*1.5G-8G

1500

32

No

SUN
V445-4P*1.6GHz-8G

1500

32

No

SUN
E2900-8P*1.5GHz-32G

5000

80

Yes

SUN
E2900-12P*1.5GHz-48G

5000

100

Yes

Fujitsu
Server

PW650-4P*1.8GHz-16G

2000

48

No

PW650-2P*1.8GHz-8G

1500

32

No

PC
Server

IBM X3650-2P*2.0G-8G

2000

32

No

IBM
X3850M2-4P*2.13G-16G

6000

64

No

Compatible Server (Reuse)


SUN
Server

Compatible Server for the Single-Domain Upgrade


The servers are applicable to only the single-domain upgrade instead of the
cross-domain management in centralized manner. For example, if the T2000 is
installed on SUN V490, the T2000 can be directly upgraded to the U2000, but the
U2000 cannot have the management functions of the IP and access domains in this
case.

17-4

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Server

Short Name of
Computer

Management
Capability

Number
of
Clients

Support
Unified
Network
Management

SUN
Server

SUN
Netra240-2P*1.5GHz-2G

600

16

No
SUN Netra240
does not
support the
management
of PTN
devices. If
T2000 is
installed on
Netra240,
after upgraded
to the U2000,
the U2000
cannot have
the
management
functions of
the PTN
devices. If
must to
manage the
PTN devices,
the Netra240
must be
changed.

SUN
V490-2P*1.6GHz-4G

800

24

No

SUN
V440-2P*1.6GHz-4G

800

24

No

SUN
V240-2P*1.5GHz-4G

600

16

No

SUN
V245-2P*1.5GHz-4G

600

16

No

IBM X3500-2P*2.0G-4G

2000

64

No

IBM X3200-1P*2.4G-2G

600

14

No

HP ML350-2P*2.0G-4G

2000

64

No

PC
Server

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-5

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Server

Short Name of
Computer

Management
Capability

Number
of
Clients

Support
Unified
Network
Management

HP ML110-1P*2.4G-2G

600

24

No

HP ML570-4P*2.0G-4G

2000

48

No

DELL
R900-4P*2.13G-4G

2000

48

No

DELL
PE6800-4P*2.0G-4G

2000

48

No

DELL
PE2900-2P*2.0G-4G

1500

32

No

DELL
PE840-1P*2.4G-2G

600

24

No

HP
DL380G5-2P*2.0G-8G

6000

64

No

HP
DL580G5-4P*2.13G-16G

10000

100

No

IBM X3650-2P*2.0G-8G

6000

64

No

IBM
X3850M2-4P*2.13G-16G

10000

100

No

Maximum number of physical NEs managed by U2000 as follows:

Maximum number of physical NEs: 15000

Maximum number of SDH paths: 300000

Maximum number of WDM paths: 50000

The management capability of the U2000 varies with OptiX NE equivalents, as shown in
Table 17-2.

17-6

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents


NE Series

NE Type

Equivalent Coefficient
for the U2000

OSN series

OptiX OSN 500

OptiX OSN 1500

3.5 (With ASON)


2.5 (Without ASON)

OptiX OSN 2000

OptiX OSN 2500

4.5 (With ASON)


3.5 (Without ASON)

OptiX OSN 2500 REG

1.5

OptiX OSN 3500

6.5 (With ASON)


4.5 (Without ASON)

OptiX OSN 7500

10 (With ASON)
6.5 (Without ASON)

OptiX OSN 9500

15 (With ASON)
10 (Without ASON)

MSTP series

SDH series

Issue 03 (2010-11-02)

OptiX Metro 100

0.5

OptiX Metro 200

0.5

OptiX Metro 500

OptiX 155/622H (Metro


1000)

OptiX Metro 1000V3

OptiX Metro 1050

1.5

OptiX Metro 1100

1.5

OptiX 155/622 (Metro


2050)

OptiX 2500+(Metro 3000)

OptiX Metro 3100

OptiX 10G (Metro 5000)

OptiX 155C

OptiX 155S

OptiX 155/622B_I

OptiX 155/622B_II

OptiX 2500

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-7

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

NE Series

NE Type

Equivalent Coefficient
for the U2000

Metro WDM series

OptiX Metro 6020

OptiX Metro 6040

OptiX Metro 6040V2

OptiX Metro 6100

1.5

OptiX Metro 6100V1

1.5

OptiX Metro 6100V1E

1.5

OptiX OSN 900A

OptiX BWS OAS, OptiX


BWS OCS, OptiX BWS
OIS

1.5

OptiX BWS 320GV3

1.5

OptiX BWS 1600G, OptiX


BWS 1600G OLA

1.5+1.5*N (N refers to the


number of slave shelves)

OptiX OTU40000

OptiX BWS 1600S

1.5

OptiX PFE 1670

OptiX SLM 1630

OptiX OSN 1800

OptiX OSN 3800

3.5 (With ASON)

LH WDM series

Marine series

NG WDM series

1.5 (Without ASON)


OptiX OSN 6800

4+4*N (With ASON)


2+2*N (Without ASON)
N refers to the number of
slave shelves

OptiX OSN 8800 I

10+10*N (With ASON)


6+6*N (Without ASON)
N refers to the number of
slave shelves

OptiX OSN 8800 II

16+16*N (With ASON)


12+12*N (Without ASON)
N refers to the number of
slave shelves

NA WDM series

17-8

OptiX BWS 1600A

1.5

OptiX BWS 1600(NA)

1.5

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

NE Series

17 Management Capability

NE Type

Equivalent Coefficient
for the U2000

OptiX OSN 1800(NA)

OptiX OSN 3800A

3.5 (With ASON)


1.5 (Without ASON)

OptiX OSN 6800A

4+4*N (With ASON)


2+2*N (Without ASON)
N refers to the number of
slave shelves

OptiX OSN 8800 I(NA)

10+10*N (With ASON)


6+6*N (Without ASON)
N refers to the number of
slave shelves

OptiX OSN 8800 II(NA)

16+16*N (With ASON)


12+12*N (Without ASON)
N refers to the number of
slave shelves

RTN series

OptiX RTN 605

0.4

OptiX RTN 610

0.4

OptiX RTN 620

0.5

OptiX RTN 910

0.5

OptiX RTN 950

OptiX RTN 5000S

The management capability of the U2000 varies with IP NE equivalents, as shown in Table
17-3.
Table 17-3 Management capabilities of the U2000 on different IP NE equivalents
NE Series

NE Type

Equivalent Coefficient
for the U2000

Router

NE05/NE08(E)/NE16(E)

0.75

NE20/NE20E

1.25

NE40/NE80

NE40E/NE80E

10

NE5000E

10*N (N: number of


chassis)

R-series router

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-9

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

NE Type

Equivalent Coefficient
for the U2000

AR-series router

0.25

Security equipment for load


balancing and blocking

SSP

10

NSE

10

Switch

S2000 series

0.125

S2300 series

0.625

S3000 series

0.125

S3300 series

0.75

S5000 series

0.25

S5300 series

1.25

S6500 series

0.75

S7800 series

1.25

S8016 series

1.25

S8500 series

1.25

S9300 series

2.5

OptiX PTN 1900

2.5

OptiX PTN 3900

4.5

OptiX PTN 912

0.5

OptiX PTN 910

0.5

OptiX PTN 950

CX200 series

0.625

CX300 series

1.25

CX600 series

Eudomen 300/500/1000

0.5

Eudomen 200E series

0.25

Eudomen 1000E series

0.75

Eudomen 8040

Eudomen 8080

Eudomen 8080E

Eudomen 8160E

USG9110

NE Series

PTN series

MAN service platform

Firewall

USG

17-10

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

NE Type

Equivalent Coefficient
for the U2000

USG9120

USG9210

USG9220

USG9310

USG9320

USG5000 series

0.75

USG3030

0.25

USG3040

0.25

USG2100 series

0.25

USG2200 series

0.25

USG50

0.25

SRG1200

0.25

SRG20-10

0.25

SRG20-11

0.25

SRG20-12

0.25

SRG20-15

0.25

SRG20-20

0.25

SRG20-21

0.25

SRG20-30

0.25

SRG20-31

0.25

SRG20-31-D

0.25

SIG9810

SIG9820

SIG9800 Server

0.25

SVN

SVN3000

0.25

Broadband access

MA5200E/F series

1.5

MA5200G series

10

ME60 series

10

Voice gateway

VG1040/1041 series

0.25

WLAN AP

AP

0.25

NE Series

SRG

SIG

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-11

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

The management capability of the U2000 varies with access NE equivalents, as shown in
Table 17-4.
Table 17-4 Management capabilities of the U2000 on different access NE equivalents
Class

Type

Equivalent Coefficient
for the U2000

FTTx OLT (calculation


based on the managed ONT,
MDU, and P2P resources in
the case of OLT)

ONT

1/64

MDU

1/32

P2P port

1/64

FTTx MDU (calculation


based on the managed user
ports in the case of MDU)

xDSL port

1/128

E1 port

1/128

ETH port

1/128

PSTN/ISDN/HSL port

1/160

xDSL port

1/128

E1 port

1/128

ETH port

1/128

PSTN/ISDN/HSL port

1/160

xDSL port

1/128

E1 port

1/128

ETH port

1/128

MD5500

1.5

8850

18

8825

18

8750

18

MA5200V1R2/R9

MSAN (calculation based


on the number of managed
ports)

DSLAM (calculation based


on the number of managed
ports)

Other NEs (calculation


based on the NE types)

17.2 Manageable MSTP Series Equipment


Manageable MSTP series equipment is listed as follows:

17-12

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Table 17-5 Manageable MSTP series equipment


Category

Equipment

Description

SDH series

OptiX 155C

OptiX 155C SDH transmission unit for


the access network

OptiX 155S

OptiX 155S simplified STM-1 optical


transmission system

OptiX 1556/622B_I

OptiX 155/622B STM-1/STM-4


compatible optical transmission system
(19-inch rack)

OptiX 1556/622B_II

MSTP series

OSN series

Issue 03 (2010-11-02)

OptiX 2500

OptiX 2500 STM-4/STM-16


compatible optical transmission system

OptiX 2500 REG

OptiX 2500 REG STM-16 regenerator

OptiX Metro 100

OptiX Metro 100 terminal STM-1


optical transmission system

OptiX Metro 200

OptiX Metro 200 ultra compact STM-1


optical transmission system

OptiX Metro 500

OptiX Metro 500 ultra compact STM-1


multi-service transmission system

OptiX 155/622H (Metro


1000)

OptiX 155/622H(Metro1000)
STM-1/STM-4 MSTP

OptiX Metro 1000

OptiX 155/622H(Metro1000)
STM-1/STM-4 MSTP optical
transmission system V3 series

OptiX Metro 1050

OptiX Metro 1050 compact


STM-1/STM-4 multi-service optical
transmission system

OptiX Metro 1100

OptiX Metro 1100 compact container


STM-16 multi-service transmission
system

OptiX 155/622 (Metro


2050)

OptiX 155/622(Metro2050)
STM-1/STM-4 compatible optical
transmission system

OptiX 2500+ (Metro


3000)

OptiX 2500+(Metro3000) STM-16


MADM/MSTP optical transmission
system

OptiX Metro 3100

OptiX Metro 3100 STM-16


multi-service transmission system

OptiX 10G (Metro 5000)

OptiX 10G(Metro5000)STM-64
MADM optical transmission system

OptiX OSN 500

OptiX OSN 500 STM-1/STM-4


multi-service CPE optical transmission
system

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-13

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Category

Equipment

Description

OptiX OSN 1500

OptiX OSN 1500 intelligent optical


transmission system

OptiX OSN 2000

OptiX OSN 2000 enhanced


STM-1/STM-4 multi-service optical
transmission system

OptiX OSN 2500

OptiX OSN 2500 intelligent optical


transmission system

OptiX OSN 2500 REG

OptiX OSN 2500 REG STM-16


regenerator

OptiX OSN 3500

OptiX OSN 3500 intelligent optical


transmission system

OptiX OSN 3500 II


OptiX OSN 7500

OptiX OSN 7500 intelligent optical


switching system

OptiX OSN 9500

OptiX OSN 9500 intelligent optical


switching system

17.3 Manageable WDM Series Equipment


Manageable WDM series equipment is listed as follows:
Table 17-6 Manageable WDM equipment

17-14

Category

Equipment

Description

Metro WDM series

OptiX Metro 6020

OptiX Metro 6020 compact


container CWDM system
V100R001

OptiX Metro 6040

OptiX Metro 6040 compact


container WDM system
V100R001

OptiX Metro 6040 V2

OptiX Metro 6040 compact


container DWDM system
V200R001 or higher

OptiX Metro 6100

OptiX Metro 6100 DWDM


multi-service transmission
system V100R002

OptiX Metro 6100V1

OptiX Metro 6100 DWDM


multi-service transmission
system V100R003

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Category

LH WDM series

NG WDM series

17 Management Capability

Equipment

Description

OptiX Metro 6100 V1E

OptiX Metro 6100 WDM


multi-service transmission
system V100R004 or higher

OptiX OSN 900A

OptiX OSN 900A compact


WDM system (A Type)

OptiX BWS 320G

OptiX BWS 320G backbone


DWDM optical transmission
system V300R002

OptiX BWS 320G V3

OptiX BWS 320G backbone


DWDM optical transmission
system V300R004

OptiX BWS 1600G, OptiX


BWS 1600G OLA

OptiX BWS 1600G


backbone DWDM optical
transmission system
V100R003 or higher

OptiX OTU40000

OptiX OTU 40000


backbone DWDM optical
transmission system

OptiX OSN 1800

OptiX OSN 1800 compact


multi-service edge optical
transport platform

OptiX OSN 3800

OptiX OSN 3800 compact


intelligent optical transport
platform

OptiX OSN 6800

OptiX OSN 6800 intelligent


optical transport platform

OptiX OSN 8800/8800 II

OptiX OSN 8800 I/ 8800 II


intelligent optical transport
platform

The OptiX BWS 1600G OLA is an independent power supply subrack. It is supported by the OptiX
BWS 1600G backbone DWDM optical transmission system V100R004 and higher versions.

17.4 Manageable NA WDM Series Equipment


Manageable NA WDM series equipment is listed as follows:

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-15

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Table 17-7 Manageable NA WDM series equipment


Category

Equipment

Description

LH WDM series

OptiX BWS 1600A

OptiX BWS 1600A WDM


Optical Transmission
System

OptiX BWS 1600G(NA)

OptiX BWS 1600G(NA)


Backbone DWDM Optical
Transmission System

OptiX OSN 1800(NA)


compact intelligent optical
transport platform

OptiX OSN 1800(NA)

OptiX OSN 3800A compact


intelligent optical transport
platform

OptiX OSN 3800A

OptiX OSN 6800A


intelligent optical transport
platform

OptiX OSN 6800A

OptiX OSN 8800 I/II(NA)


intelligent optical transport
platform

OptiX OSN 8800 I/II(NA)

NG WDM series

17.5 Manageable Marine Series Equipment


Manageable marine series equipment is listed as follows:
Table 17-8 Manageable marine series equipment
Category

Equipment

Description

Submarine line series

OptiX SLM 1630

OptiX SLM 1630 submarine


line monitor

OptiX PFE 1670

OptiX PFE 1670 Power


Feeding Equipment

OptiX BWS 1600S

OptiX BWS 1600S


submarine line terminal
equipment

17.6 Manageable RTN Series Equipment


Manageable RTN series equipment is listed as follows:

17-16

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Table 17-9 Manageable RTN equipment


Category

Equipment

Description

RTN series

OptiX RTN 605

OptiX RTN 605 radio


transmission system

OptiX RTN 610

OptiX RTN 610 radio


transmission system

OptiX RTN 620

OptiX RTN 620 radio


transmission system

OptiX RTN 910

OptiX RTN 910 radio


transmission system

OptiX RTN 950

OptiX RTN 950 radio


transmission system

OptiX RTN 5000S

OptiX RTN 5000S radio


transmission system

17.7 Manageable PTN Series Equipment


Manageable PTN series equipment is listed as follows:
Table 17-10 Manageable PTN series equipment
Category

Equipment

Description

PTN series

OptiX PTN 1900

OptiX PTN 1900 optical


network PTN series
multi-service packet
transmission platform

OptiX PTN 3900

OptiX PTN 3900 optical


network PTN series
multi-service packet
transmission platform

OptiX PTN 912

OptiX PTN 912 optical


network PTN series
multi-service packet
transmission platform

OptiX PTN 910

OptiX PTN 910 optical


network PTN series
multi-service packet
transmission platform

OptiX PTN 950

OptiX PTN 950 optical


network PTN series
multi-service packet
transmission platform

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-17

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

17.8 Manageable FTTx Series Equipment


Manageable FTTx series equipment are listed as follows:
Table 17-11 Manageable FTTx series equipment
Category

Equipment

Description

OLT series

MA5600T

SmartAX MA5600T Multi-service


Access Module

MA5603T

SmartAX MA5603T Optical Access


Equipment

MA5680T

SmartAX MA5680T Optical Access


Equipment

MA5683T

SmartAX MA5683T Optical Access


Equipment

MA5606T

SmartAX MA5606T Optical Access


Equipment, Only the version of
V800R105 support.

MA5606T

SmartAX MA5606T Optical Access


Equipment

MA5620

SmartAX MA5620 Multiple Dwelling


Unit

MA5626

SmartAX MA5626 Multiple Dwelling


Unit

MA5620E

SmartAX MA5620E EPON Multiple


Dwelling Unit

MA5626E

SmartAX MA5626E EPON Multiple


Dwelling Unit

MA5620G

SmartAX MA5620G GPON Multiple


Dwelling Unit

MA5626G

SmartAX MA5626G GPON Multiple


Dwelling Unit

MA5610

SmartAX MA5610 Multi-service Access


Module

MA5612

SmartAX MA5612 Multi-service Access


Module

MA5616

SmartAX MA5616 Multi-service Access


Module

ONU series

17-18

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Category

17 Management Capability

Equipment

Description

MA5651

SmartAX MA5651 Multiple Dwelling


Unit

MA5651G

SmartAX MA5651G Multiple Dwelling


Unit

MA5652G

SmartAX MA5652G GPON Multiple


Dwelling Unit

MA5635

SmartAX MA5635 Multi-service Access


Module

ATN930

ATN930 FMC Multi-service Access Unit

SRG2220

SRG2220 Service Router Gateway

17.9 Manageable MSAN Series Equipment


Manageable MSAN series equipment are listed as follows:
Table 17-12 Manageable MSAN series equipment
Category

Equipment

Description

UA5000 series

UA5000

UA5000 Universal Access Unit

UA5000(PVU)

UA5000 Universal Access Unit

UA5000(IPMB)

UA5000 Universal Access Unit

UA5000(PVMV1)

UA5000 Universal Access Unit

MD5500

MD5500 Multi-service
Distribution Module

MD5500 series

17.10 Manageable DSLAM Series Equipment


Manageable DSLAM series equipment are listed as follows:
Table 17-13 Manageable DSLAM series equipment
Category

Equipment

Description

MA5100 series

MA5100V1

SmartAX MA5100 Multi-service


Access Module

MA5100V2

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-19

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Category

Equipment

Description

MA5105 series

MA5105

SmartAX MA5105 Multi-service


Access Module

MA5605 series

MA5605

SmartAX MA5605 Multi-service


Access Module

MA5615 series

MA5615

SmartAX MA5615 Broadband


Access System

MA5300 series

MA5300

SmartAX MA5300 Broadband


Access System

MA5600 series

MA5600V3

SmartAX MA5600 Multi-service


Access Module

MA5600V8 series

MA5600T

SmartAX MA5600T
Multi-service Access Module

MA5603T

SmartAX MA5603T
Multi-service Access Module

MA5606T

SmartAX MA5606T
Multi-service Access Module

17.11 Manageable Router Series Equipment


Manageable router series equipment are listed as follows:
Table 17-14 Manageable router series equipment

17-20

Category

Device

Description

NE series routers

NE05

Net engine 05 router

NE08

Net engine 08 router

NE16

Net engine 16 router

NE08E

Net engine 08E router

NE16E

Net engine 16E router

NE20

Net engine 20 router

NE20E

Net engine 20E router

NE40

Net engine 40 universal switching router

NE80

Net engine 80 universal switching router

NE40E/NE80E

Net engine 40E/80E core router

NE5000E

Net engine 5000E core router

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Category

Device

Description

R/AR series routers

R series routers

R series routers

AR18

Advanced router 18 serials router

AR28

Advanced router 28 serials router

AR46

Advanced router 46 serials router

AR19

Advanced router 19 serials router

AR29

Advanced router 29 serials router

AR49

Advanced router 49 serials router

17.12 Manageable Switch Series Equipment


Manageable switch series equipment are listed as follows:
Table 17-15 Manageable switch series equipment
Category

Device

Description

S8500 series switches

S8505

Quidway S8505 routing switch

S8505E

Quidway S8505E routing switch

S8508

Quidway S8508 Lanswitch

S8512

Quidway S8512 routing switch

S6502

Quidway S6502 Lanswitch

S6503

Quidway S6502 Ethernet switch

S6506R

Quidway S6506R Ethernet


switch

S6506

Quidway S6506 Ethernet switch

S5000 series switches

Quidway S5000 Lanswitch

S5500 series switches

Quidway S5500 Lanswitch

S5600 series switches

Quidway S5600 Lanswitch

S3000 series switches

Quidway S3000 Lanswitch

S3500 series switches

Quidway S3500 Lanswitch

S3900 series switches

Quidway S3900 Lanswitch

S2000 series switches

Quidway S2000 Lanswitch

S2400 series switches

Quidway S2400 Lanswitch

S6500 series switches

S5000 series switches

S3000 series switches

S2000 series switches

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-21

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Category

Device

Description

box series switches

S2300 series switches

Quidway S2300 Ethernet switch

S3300 series switches

Quidway S3300 Lanswitch

S5300 series switches

Quidway S5300 Lanswitch

S9300 series switches

Quidway S9300 Lanswitch

frame series switches

17.13 Manageable Metro Service Platform Equipment


Manageable Metro service platform equipment are listed as follows:
Table 17-16 Manageable Metro service platform equipment
Category

Device

Description

CX series devices

CX200

Quidway carrier switch platform 200

CX200C

Quidway carrier switch platform 200C

CX200D

Quidway carrier switch platform


200D

CX300

Quidway carrier switch platform 300

CX380

Quidway carrier switch platform 380

CX600

Quidway carrier switch platform 600

17.14 Manageable Broadband Access Series Equipment


Manageable broadband access series equipment are listed as follows:
Table 17-17 Manageable broadband access series equipment

17-22

Category

Device

Description

Multi-service
gateways

MA5200E

Multiservice access 5200E service gateway

MA5200F

Multiservice access 5200F service gateway

MA5200G

Multiservice access 5200G service gateway

ME60 series

Multiservice engine 60 serials service gateway

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

17.15 Manageable VoIP Gateway Equipment


Manageable VoIP gateway equipment are listed as follows:
Table 17-18 Manageable VoIP gateway equipment
Category

Device

Description

VoIP Gateway

VG10

VoIP gateways 10

VG20

VoIP gateways 20

VG80

VoIP gateways 80

XE series

17.16 Manageable WLAN Series equipment


Manageable WLAN Series equipment are listed as follows:
Table 17-19 Manageable WLAN series equipment
Category

Device

Description

WLAN

WA10 AP

WLAN 10

WA12 AP

WLAN 12

17.17 Manageable Firewall Series Equipment


Manageable firewall series equipment are listed as follows:
Table 17-20 Manageable firewall series equipment
Category

Device

Description

Eudemon

Eudemon 8040

Eudemon 8000 series Firewall

Eudemon 8080

Eudemon 8000 series Firewall

Eudemon 1000

Eudemon 1000 series Firewall

Eudemon 500

Eudemon 500 series Firewall

Eudemon 300

Eudemon 300 series Firewall

Eudemon 8080E

Eudemon 8000E series Firewall

Eudemon 8160E

Eudemon 8000E series Firewall

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-23

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Category

USG

17-24

Device

Description

Eudemon 1000E-U2

Eudemon 1000E series Firewall

Eudemon 1000E-U3

Eudemon 1000E series Firewall

Eudemon 1000E-U5

Eudemon 1000E series Firewall

Eudemon 1000E-U6

Eudemon 1000E series Firewall

Eudemon 200E_B

Eudemon 200E series Firewall

Eudemon 200E_C

Eudemon 200E series Firewall

Eudemon 200E_F

Eudemon 200E series Firewall

Eudemon 200S

Eudemon 200S series Firewall

Eudemon 100E

Eudemon 100E series Firewall

Eudemon 6080E

Eudemon 6000E series Firewall

USG9210

USG9210 Unified Security Gateway

USG9220

USG9220 Unified Security Gateway

USG9310

USG9310 Unified Security Gateway

USG9320

USG9320 Unified Security Gateway

USG5320

USG5320 Unified Security Gateway

USG5330

USG5330 Unified Security Gateway

USG5350

USG5350 Unified Security Gateway

USG5360

USG5360 Unified Security Gateway

USG3030

USG3030 Unified Security Gateway

USG3040

USG3040 Unified Security Gateway

USG2130

USG2130 Unified Security Gateway

USG2130W

USG2100 Unified Security Gateway

USG2130P

USG2100 Unified Security Gateway

USG2130WP

USG2100 Unified Security Gateway

USG2130BSR

USG2100 Unified Security Gateway

USG2130BSR-W

USG2100 Unified Security Gateway

USG2130HSR

USG2100 Unified Security Gateway

USG2130HSR-W

USG2100 Unified Security Gateway

USG2130HSR-P

USG2100 Unified Security Gateway

USG2130HSR-WP

USG2100 Unified Security Gateway

USG2120BSR

USG2100 Unified Security Gateway

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Category

SRG

Issue 03 (2010-11-02)

17 Management Capability

Device

Description

USG2110

USG2110 Unified Security Gateway

USG2160

USG2100 Unified Security Gateway

USG2160W

USG2100 Unified Security Gateway

USG2160P

USG2100 Unified Security Gateway

USG2160WP

USG2100 Unified Security Gateway

USG2160BSR

USG2100 Unified Security Gateway

USG2160BSR-W

USG2100 Unified Security Gateway

USG2160HSR

USG2100 Unified Security Gateway

USG2160HSR-W

USG2100 Unified Security Gateway

USG2160HSR-P

USG2100 Unified Security Gateway

USG2160HSR-WP

USG2100 Unified Security Gateway

USG5120

USG5100 Unified Security Gateway

USG5120-D

USG5100 Unified Security Gateway

USG5120BSR

USG5100 Unified Security Gateway

USG5120BSR-D

USG5100 Unified Security Gateway

USG5120HSR

USG5100 Unified Security Gateway

USG5150

USG5100 Unified Security Gateway

USG5150BSR

USG5100 Unified Security Gateway

USG5150HSR

USG5100 Unified Security Gateway

USG2210

USG2210 Unified Security Gateway

USG2220

USG2220 Unified Security Gateway

USG2230

USG2230 Unified Security Gateway

USG2250

USG2250 Unified Security Gateway

USG50

USG50 Unified Security Gateway

USG9110

USG9110 Unified Security Gateway

USG9120

USG9120 Unified Security Gateway

SRG1210-S

SRG1200 Secure Routing Gateway

SRG1210

SRG1200 Secure Routing Gateway

SRG1210W

SRG1200 Secure Routing Gateway

SRG1210P

SRG1200 Secure Routing Gateway

SRG1210WP

SRG1200 Secure Routing Gateway

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-25

iManager U2000 Unified Network Management System


Product Description

17 Management Capability

Category

EGW

Device

Description

SRG1220

SRG1200 Secure Routing Gateway

SRG1220W

SRG1200 Secure Routing Gateway

SRG1220P

SRG1200 Secure Routing Gateway

SRG1220WP

SRG1200 Secure Routing Gateway

SRG20-11

SRG20 Secure Routing Gateway

SRG20-12

SRG20 Secure Routing Gateway

SRG20-15

SRG20 Secure Routing Gateway

SRG20-20

SRG20 Secure Routing Gateway

SRG20-21

SRG20 Secure Routing Gateway

SRG20-30

SRG20 Secure Routing Gateway

SRG20-31

SRG20 Secure Routing Gateway

SRG20-31-D

SRG20 Secure Routing Gateway

SRG3230

SRG3200 Secure Routing Gateway

SRG3230-D

SRG3200 Secure Routing Gateway

SRG3240

SRG3200 Secure Routing Gateway

SRG3240-D

SRG3200 Secure Routing Gateway

SRG3250

SRG3200 Secure Routing Gateway

SRG3260

SRG3200 Secure Routing Gateway

EGW2130

EGW2100 series Enterprise Gateway

EGW2160

EGW2100 series Enterprise Gateway

17.18 Manageable Service Inspection Gateway Equipment


Manageable service inspection gateway equipment are listed as follows:
Table 17-21 Manageable service inspection gateway equipment

17-26

Category

Device

Description

SIG

SIG9810

SIG9810 Service Inspection


Gateway

SIG9820

SIG9810 Service Inspection


Gateway

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Category

17 Management Capability

Device

Description

SIG9800 Server

SIG9800 Server Service


Inspection Gateway Server

17.19 Manageable SVN Series Equipment


Manageable SVN series equipment are listed as follows:
Table 17-22 Manageable SVN series equipment
Category

Device

Description

SVN

SVN3000

SVN3000

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17-27

iManager U2000 Unified Network Management System


Product Description

18

18 Standards Compliance

Standards Compliance

This topic describes the standards that the U2000 is compliant with.
The U2000 is developed according to the network management system model that the ITU-T
TMN series standards define. The information model is constructed based on the
object-oriented concept. Complying with multiple standards, the U2000 has good
expandability and reusability. The U2000 complies with the following international standards
and protocols:

RFC 793 Telnet/TCP/IP standards

RFC 1155, RFC 1157, RFC 1212, RFC 1213 and RFC 1215 SNMP V1 series standards

RFC 1905, RFC 1906, RFC 1907, RFC 1908, RFC 2011, RFC 2012, RFC 2013, RFC
2571, RFC 2572, RFC 2573, RFC 2574, RFC 2576, RFC 2578, RFC 2579, and RFC
2580 SNMP V2 series standards

RFC 3411, RFC 3412, RFC 3413, RFC 3414, RFC 3415, RFC 3416, RFC 3417, and
RFC 3418 SNMP V3 series standards

RFC 3164 Syslog standards

ISO 8824 and ISO 8825 ASN.1 standards

ITU-T standards for managing the telecommunications management network: M.3000,


M.3010, M.3020, M.3100, and M.3400 (without accounting)

HTTP and JAVA interface protocols and standards

W3C SOAP 1.1/WSDL

TL1 (Telcordia GR-811, GR-831, etc.)

The XML service delivery and inventory query are based on the MTOSI standards as
follows: TMF 517, TMF 608, and TMF 854

CORBA 2.5 protocol

ISO 8824 and ISO 8825 ASN.1 standards

The CORBA alarm northbound interface complies with the MTNM standards as
follows: TMF 513, TMF 608, and TMF 814

Table 18-1 lists the details of the standards and protocols.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

18-1

iManager U2000 Unified Network Management System


Product Description

18 Standards Compliance

Table 18-1 Details of the Standards and Protocols


Standards
and
Protocols

18-2

Description

RFC 793

Transmission Control Protocol (Darpa Internet Program Protocol


Specification)

RFC 1155

Structure and Identification of Management Information for TCP/IP-based


Internets

RFC 1212

Concise MIB Definitions

RFC 1213

Management Information Base for Network Management of TCP/IP-based


Internets: MIB-II

RFC 1215

A Convention for Defining Traps for use with the SNMP

RFC 1905

Protocol Operations for Version 2 of the Simple Network Management


Protocol

RFC 1906

Transport Mappings for Version 2 of the Simple Network Management


Protocol

RFC 1907

Management Information Base for Version 2 of the Simple Network


Management Protocol

RFC 1908

Coexistence between Version 1 and Version 2 of the Internet-standard


Network Management Framework

RFC 2011

SNMPv2 Management Information Base for the Internet Protocol using


SMIv2

RFC 2012

SNMPv2 Management Information Base for the Transmission Control


Protocol using SMIv2

RFC 2013

SNMPv2 Management Information Base for the User Datagram Protocol


using SMIv2

RFC 2571

An Architecture for Describing SNMP Management Frameworks

RFC 2572

Message Processing and Dispatching for the Simple Network Management


Protocol

RFC 2573

SNMP Applications

RFC 2574

User-based Security Model (USM) for version 3 of the Simple Network


Management Protocol

RFC 2576

Coexistence between Version 1, Version 2, and Version 3 of the


Internet-standard Network Management Framework

RFC 2578

Structure of Management Information Version 2 (SMIv2)

RFC 2579

Textual Conventions for SMIv2

RFC 2580

Conformance Statements for SMIv2

RFC 3411

An Architecture for Describing Simple Network Management Protocol


(SNMP) Management Frameworks

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Standards
and
Protocols

18 Standards Compliance

Description

RFC 3412

Message Processing and Dispatching for the Simple Network Management


Protocol (SNMP)

RFC 3413

Simple Network Management Protocol (SNMP) Applications

RFC 3414

User-based Security Model (USM) for version 3 of the Simple Network


Management Protocol (SNMPv3)

RFC 3415

View-based Access Control Model (VACM) for the Simple Network


Management Protocol (SNMP)

RFC 3416

Version 2 of the Protocol Operations for the Simple Network Management


Protocol (SNMP)

RFC 3417

Transport Mappings for the Simple Network Management Protocol (SNMP)

RFC 3418

Management Information Base (MIB) for the Simple Network Management


Protocol (SNMP)

RFC 3164

BSD syslog Protocol

ISO
8824-4-200
0

Information Technology - Abstract Syntax Notation One (ASN.1):


Parameterization of ASN.1 Specifications Amendment 1: ASN.1 semantic
model

ISO
8825-2-199
8

Information Technology - ASN.1 Encoding Rules: Specification of Packed


Encoding Rules (PER) Second Edition; Technical Corrigendum 1:
12/15/1999; Amendment 1: 12/01/2000

ITU-T
M.3000

Overview of TMN recommendations

ITU-T
M.3010

Principles for a telecommunications management network

ITU-T
M.3013

Considerations for a telecommunications management network

ITU-T
M.3017

Framework for the integrated management of hybrid circuit/packet networks

ITU-T
M.3020

TMN interface specification methodology

ITU-T
M.3100

Generic network information model

ITU-T
M.3101

Managed Object Conformance statements for the generic network


information model

ITU-T
M.3180

Catalogue of TMN management information

ITU-T
M.3200

TMN management services and telecommunications managed areas:


overview

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

18-3

iManager U2000 Unified Network Management System


Product Description

18 Standards Compliance

Standards
and
Protocols

18-4

Description

ITU-T
M.3300

TMN F interface requirements

ITU-T
M.3400

TMN management functions

ITU-T
X.720

Management information model

ITU-T
X.721

Definition of management information

ITU-T
X.722

Guidelines for the definition of managed objects

ITU-T
X.733

Information technology - Open Systems Interconnection - Systems


Management: alarm reporting function

ITU-T
X.903

Information technology - Open distributed processing - Reference Model:


architecture

ITU-T
G.707

Network node interface for the synchronous digital hierarchy (SDH)

ITU-T
G.773

Protocol suites for Q-interfaces for management of transmission systems

ITU-T
G.774 (01,
02, 03, 04)

Synchronous digital hierarchy (SDH) - Management information model for


the network element view

ITU-T
G.783

Characteristics of synchronous digital hierarchy (SDH) equipment


functional blocks

ITU-T
G.784

Synchronous digital hierarchy (SDH) management

ITU-T
G.803

Architecture of transport networks based on the synchronous digital


hierarchy (SDH)

ITU-T
G.831

Management capabilities of transport networks based on the synchronous


digital hierarchy (SDH)

ITU-T
G.851.1

Management of the transport network - Application of the RM-ODP


framework

ITU-T
G.852.1

Enterprise viewpoint for simple subnetwork connection management

ITU-T
G.852.2

Enterprise viewpoint description of transport network resource model

ITU-T
G.852.3

Enterprise viewpoint for topology management

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Standards
and
Protocols

18 Standards Compliance

Description

ITU-T
G.852.6

Enterprise viewpoint for trail management

ITU-T
G.853.1

Common elements of the information viewpoint for the management of a


transport network

ITU-T
G.853.2

Subnetwork connection management information viewpoint

ITU-T
G.853.3

Information viewpoint for topology management

ITU-T
G.853.6

Information viewpoint for trail management

ITU-T
G.854.1

Computational interfaces for basic transport network model

ITU-T
G.854.3

Computational viewpoint for topology management

ITU-T
G.854.6

Computational viewpoint for trail management

Rational
Unified
Process 5.5

Rational Unified Process

Sif99025

EML-NML interface models

TMF513
V2.0

Multi-Technology Network Management Business Agreement NML-EML


Interface Version 2.0

TMF608
V2.0

Multi-Technology Network Management Information Agreement


NML-EML Interface Version 2.0

TMF814
V2.0

Multi Technology Network Management Solution Set Conformance


Document Version 2.0

TMF814
V2.0

Multi Technology Network Management Solution Set Conformance


Document Version 2.0

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

18-5

iManager U2000 Unified Network Management System


Product Description

A Glossary

Glossary

A
Abnormal Resource

When the NMS carries out the operation of device resource polling
on the device management module or the module is refreshed
manually, the physical resources of some devices, such as the card,
sub-card and port, cannot be accessed because they have been
deleted or have some faults. So, after the NMS carries out the
operation of device resource polling on the device management
module or the module is refreshed manually again, the result of
polling the physical resources differ from the first time. The
physical resources that cannot be polled in the second time are
called the abnormal resource.

AIS insertion

If there are excessive errors in a channel, AIS can be inserted in this


channel to indicate it is unavailable. For a line board, you can set
whether to insert AIS when there are excessive errors in the B1, B2
and B3 bytes. For a tributary board at the E1 or T1 level, you can
set whether to insert AIS when there are excessive errors in BIP-2.
For a tributary board at the E3 level or higher, you can set whether
to insert AIS when there are excessive errors in the B3 byte.

AIS

Alarm Indication Signal. A signal sent downstream in a digital


network if an upstream failure has been detected and persists for a
certain time.

Alarm correlation
analysis

In the case alarm2 is raised within five seconds after alarm1 is


raised, and alarm2 complies with the conditions defined in the
alarm correlation analysis rule, you can either suppress the alarm2
or raise its severity level according to the behavior defined in the
alarm correlation rule. Such a process is called alarm correlation
analysis.

Alarm Level

Alarm level is to identify the severity of an alarm or event. It is


divided up into four levels: critical, major, minor, warning alarm.

Alarm Status

Device reports the trap information to NMS. NMS displays the


received information on the alarm start on the topological view.
The alarm state contains four types: urgent alarm, important alarm,
subordinate alarm and prompt alarm.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

A-1

iManager U2000 Unified Network Management System


Product Description

A Glossary

Auto Discovery

NMS tests the remote device by using PING or the SNMP


parameter module configured in advanced to discover the IP device
or the device that supports SNMP and to add the discovered devices
automatically.

Alarm reversion

For the port that has already been configured but not actually loaded
with services, this function can be used to avoid generating relevant
alarm information, thus preventing alarm interference.

Alarm severity

According to ITU-T recommendations, the alarm is classified into


four severities: Critical, Major, Minor, and Warning.

Alarm suppression

The suppressed alarm of a specific object is not reported. The object


here may be the networkwide equipment, a specific NE, a specific
board and even a specific function module of a specific board.

Alarm

A visible or an audible indication to notify the person concerned


that a failure or an emergency has occurred. See also Event.

ATM protection
group

An ATM protection group refers to the logically bound ATM VP


network or subnetwork connections that share the same physical
transmission channel. In the VP group (VPG), a pair of VP
connections (working connection and its protection connection) is
used for monitoring the automatic protection switching, called
monitoring connections (APS VPCs). If the monitoring connections
switch over, the whole VPG will switch over to quicken the ATM
protection switching (as quick as the protection switching of the
SDH layer.

ALS

Automatic Laser Shutdown. ALS is turned on when the optical


interface board does not carry services or the optical fibre is faulty.
Its service life can be prolonged by decreasing the duration during
which laser is on.

Attribute

Property of an object.

Automatic switching

When the active board or path fails, the standby one can
automatically take over the job of the active one.

A-2

Band Width

In the data communication area, bandwidth specifies the maximum


value of the rate when the data passes through some data channel.

Baseline

Select the test result when the line is in good condition as the line
test baseline, to provide a basis of comparison and analysis for the
following line test result.

Baseline collection
test

One of the test types for submarine line. In the case of deployment
or fault restoration, or when updating the baseline is required, you
need to collect the baseline, to provide reference for comparison
tests, and alerts or alarms.

Binding

In virtual concatenated payload configuration, designating one


binding number to identify the VC4s of the same virtual
concatenated payload is called "bind". If a fault occurs to one of the
bound services, all bound services will switch as a whole.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

Bit error alarm


threshold

A Glossary

When the bit error reaches a specific limit, the equipment will
report an alarm. This limit is the bit error alarm threshold. The
threshold can be divided into crossing threshold and defect
threshold.

C
Comparison test in
periodic mode

One of the test types for submarine line. Carry out polling tests for
multiple lines on the same LMU board periodically, compare the
test result with the baseline data in in-service mode, and provide
alerts or alarms for the line.

Comparison test in
single-test mode

One of the test types for submarine line. Test a line by using test
parameters of the baseline collection test in in-service mode,
compare the test result with the baseline data, and provide alerts or
alarms for the line.

Check alarms

The check feature compares one (or more) uncleared alarm on the
NMS with that on the NE. If an alarm is included in the current
alarms on the NE, it is kept on the NMS. If not, it will be removed
from the NMS.

Client

A kind of terminal (PC or workstation) connected to a network that


can send instructions to a server and get results through a user
interface. See also server.

Clock View

The Clock View provides a visible platform to enable:1. NE clock


settings2. Networkwide clock synchronisation status query3. Clock
tracing and search functions

Configuration data

The data that configures the NE hardware for coordination between


this NE and other NEs in the entire network and operation of
specified services. Configuration data is the instruction file of NEs,
and it is the key for efficient network running. The typical
configuration data includes board configuration, clock configuration
and protection relationship.

Configuration
management

Configuration management enables inventory query of network


configuration resources, including relevant configuration of NMS
or SNMS, NE, subnet, links, SNC, route, TP, edge point,
equipment, and so on. Real-time inventory change report can also
be provided through this resource, it will be timely reported to the
upper NMS to notify the carrier of the current network operation
status and ensure data consistency of the upper NMS or SNMS.

Configure

To set the basic parameters of an operation object.

Connection point

A reference point where the output of a trail termination source or a


connection is bound to the input of another connection, or where the
output of a connection is bound to the input of a trail termination
sink or another connection. The connection point is characterized by
the information which passes across it. A bidirectional connection
point is formed by the association of a contradirectional pair.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

A-3

iManager U2000 Unified Network Management System


Product Description

A Glossary

Connection

A "transport entity" which consists of an associated pair of


"unidirectional connections" capable of simultaneously transferring
information in opposite directions between their respective inputs
and outputs.

Current alarms

Alarms that do not clear, or has cleared but is not acknowledged.

Current performance
data

The performance data stored in the current register is called current


performance data. The current 15-minute or 24-hour register (only
one for each) is applied to collect the performance data in the
current monitoring period. It changed within the monitor period.

Change Audit
Service

Change Audit Service is developed to record the change on the


network device, including the changes on the information about the
device, the configuration and the mapping. It provides one
integrated database. Every application program records these
changes in the database and ensures that these changes in the
database are reflected on other applications.

Cluster

The cluster is an administrative domain composed of a set of


switches. It consists of a command switch and multiple member
switches. The management over all the switches within the cluster
is realized through a public IP address.

Configuration File

Text file, including various configuration on the device.

D
DCC

Within an STM-N signal there are two DCC channels, one is the
192 kbit/s DCC-R channel composed of bytes D1-D3, and the other
is the 576 kbit/s DCC- channel composed of bytes D4-D12. All
NEs can communicate with one another through the DCC-R. The
DCC-M is not the regenerator section overhead and does not
support communications among regenerators, and it is used to
support communication channels of more universal purpose.

DNI

Dual Node Interconnection. The protection mode defined in G. 842


Recommendation for the inter-ring service . By using the
recommended protection modes, the protection of the
interconnecting service between two ring networks composed of the
devices from different manufacturers and in different protection
modes can be realised. Moreover, in case of fibre failure or node
failure, services can also be protected.

Domain

The domain of the NMS specifies the scope of address or functions


which are available to a certain user.

Dump

Dump is a process of exporting alarm data from the database to the


customized file and meanwhile the exported data is cleared in the
database.

A-4

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

A Glossary

EMU

Environment Monitoring Unit. As one type of power and


environment monitoring unit, EMU is installed on the top of the
OptiX 155/622H equipment cabinet to monitor the environment
variables, such as the power supply and temperature. With external
signal input through the relay, fire alarm, smoke alarm, burglary
alarm, and so on can be monitored as well. Displayed on the NMS,
the change of environment can be monitored timely and accurately.

Equipment set

An aggregate of multiple managed equipment. Equipment set


facilitates the user authority management on equipment in the
management domain of the NMS. If some operation authorities
over one equipment set are assigned to a user (user group), these
operation authorities over all equipment of the equipment set are
assigned to the user (user group).

F
Failure

The fault cause persisted long enough to consider the ability of an


item to perform a required function to be terminated. The item may
be considered as failed; a fault has now been detected.

Fault

A fault is the inability of a function to perform a required action.


This does not include an inability due to preventive maintenance,
lack of external resources, or planned actions.

Filter

The filter is used to filter the matched logs and have the unmatched
one left.

Forced switch

This command performs the ring switch from working channels to


the protection channels. This switch occurs regardless of the state of
the protection channels, unless the protection channels are
satisfying a higher priority bridge request.

H
History alarms

Alarms that have cleared and been acknowledged.

History performance
data

The performance data stored in the history register and the


auto-report performance data stored on the NMS are called history
performance data in a unified way.

I
Intermediate office

Issue 03 (2010-11-02)

It refers to the equipment used for optical fibre management and


dispatch in the metropolitan area. It has multiple pairs of interfaces
for the optical fibre connection. Every two interfaces in a pair are
connected with each other to form a longer physical optical fibre
path. The physical optical fibre path connecting the transmission
equipment can comprise two or more sections of optical fibre
cascaded via the intermediate office. There is an intermediate office
information list for some fibre & cable connections, which shows
the section information about the fibre & cable.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

A-5

iManager U2000 Unified Network Management System


Product Description

A Glossary

In-Service Mode

One of the test modes for submarine line. By using the in-service
test mode , you can test submarine cables and repeaters without
damaging the existing services of the submarine system.

Image (OS)

Binary file, equivalent to the OS of the device and a part of the


device version.

IP address

In the TCP/IP protocol, it is used to uniquely identify the address of


the communication port, which consists of four bytes in decimal
digits, for example, 129.9.161.55.

J
This index shows the delay stability of many Ping operations with
the unit of ms.

Jitter

L
Label

A mark on a cable, a subrack, or a cabinet for identification.

Layer

A concept used to allow the transport network functionality to be


described hierarchically as successive levels; each layer being
solely concerned with the generation and transfer of its
characteristic information.

LCT

Local Craft Terminal. The LCT provides the user with single-layer
management network solutions to the transmission network of up to
five NEs to realise integrated management of multi-service
transmission network. Usually it uses the cross-over cable or serial
port cable to connect one NE, so as to configure and maintain a
single NE. See also U2000 LCT.

Licence

A permission provided by a vendor to authorise the use of specific


functions of a product. Usually the licence consists of encrypted
codes, and the operation authority varies with different level of
licence.

Link

The link is responsible to transmit the data from one station to next
neighbour station correctly.

Lock NE login

This function prohibits the users at lower levels from logging in NE


and forces logged NE users with lower level to log out.

A-6

Main Topology

The default NMS client interface and all topology management


functions are accessed here.

Management
information

The signal passing across an access point.

Manual switch

When the protection channel is efficient and there is no higher-level


switching request, this mode switches the service from the working
channel to the protection channel, thus testing whether network still
has the protection capability.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

A Glossary

Manual test

One of the test types for submarine line. You need to set test
parameters manually, start the test, and save the test result as the
baseline of the in-service mode.

MO

Managed Object. The management view of a resource within the


telecommunication environment that may be managed via the agent.
Examples of SDH managed objects are: equipment, receive port,
transmit port, power supply, plug-in card, virtual container,
multiplex section, and regenerator section.

MS

Multiplex Section. A multiplex section is the trail between and


including two multiplex section trail termination functions.

MSP

Multiplex section protection. The nodes online achieve protection


switching through the K1 and K2 bytes in the multiplex section,
including linear 1+1 MS protection switching link, linear 1:n MS
protection switching link, dedicated MS protection ring and shared
MS protection ring.

N
NE database

There are three types of database on NE SCC board as following:


(1) DRDB: a dynamic database in a dynamic RAM, powered by
battery; (2) SDB: a static database in a power-down RAM; (3)
FDB0, FDB0: permanently saved databases in a Flash ROM. In
efficient operation, the NE configuration data is saved in DRDB
and SDB at the same time. Backing up an NE database means
backing up the NE configuration data from SDB to FDB0 and
FDB1.

NE Explorer

NE Explorer is the main operation interface of the NMS. For easy


navigation, the NE Explorer window presents an expandable
directory tree (Function Tree) in the lower left pane. The
configuration, management and maintenance of the equipment are
accessed here.

NE

Network Element. NE includes the hardware unit and the software


running on it. Usually, one NE has at least an SCC (system control
and communication) board which responsible for the management
and monitoring of the NE. The NE software runs on the SCC board.

NM

Network Management. In the telecommunication management


network structure, the NMS is located between the NE level and
network level, which can supports all functions at NE level and part
of the network level management functions. See also U2000.

NNI

Network Node Interface. NNI identifies the interface between the


ATM network nodes. See also SDH NNI.

Node

Node is one of the topology objects and the minimum unit that
represents the device displayed on the topological view. The device
is displayed with the node icon on the topological view. The type of
the node includes the router, the switch and the 3rd-party device and
the virtual node.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

A-7

iManager U2000 Unified Network Management System


Product Description

A Glossary

O
Online help

An indexed collection of information on all aspects of the NMS.


They can be accessed at any time from the Help menu or by
pressing the F1 key.

Optical time domain


reflectormeter

OTDR is an optical fault locator and analysis tool for optical fiber
networks. The OTDR features a light, compact, hand-held design
with an intelligent user interface that is easy and quick to use. The
color LCD display and backlight design makes testing work more
comfortable and convenient, whether during daylight or at night.

Out-of-Service
Mode

One of the test modes for submarine line. By transmitting detection


light with high power, the out-of-service test can detect the fiber
status and repeater status, to realize the status detection and fault
point location after fiber cut. In general, when detecting that a line
is abnormal during a test in in-service mode, you can carry out a test
in out-of-service mode to locate the fault.

OWSP

Optical Wavelength Shared Protection. OWSP is a bidirectional


ring, where each node is equipped with an OWSP. There are two
channels (1 and 2) in the main optical path on the internal and
external rings in each span on a ring. The fibre and the OWSP on
the main optical path are connected with the optical ports inputting
1 and 2 on the mux/demux board (unnecessary to be connected
with the OTU), and thus 1 and 2 can be added and dropped at
every node.

A-8

Path protection

The working principle of path protection: When the system works


in path protection mode, the PDH path uses the dual-fed and signal
selection mode. Through the tributary unit and cross-connect unit,
the tributary signal is sent simultaneously to the east and west lines.
Meanwhile, the cross-connect matrix sends the signal dually sent
from the opposite end to the tributary board through the active and
standby buses, and the hardware of the tributary board will
selectively receive the signal from the two groups of buses
automatically according to the AIS number of the lower order path.

Path

A trail in a path layer.

Performance register

Performance register is the memory space for performance event


counts, including 15-min current performance register, 24-hour
current performance register, 15-min history performance register,
24-hour history performance register, UAT register and CSES
register.

Performance
threshold

Performance events usually have upper and lower thresholds. When


the performance event count value exceeds the upper threshold, a
performance threshold-crossing event is generated; when the
performance event count value is below the upper threshold for a
period of time, the performance threshold-crossing event is ended.
In this way, performance jitter caused by some sudden events can
be shielded.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

A Glossary

PMU

One type of power and environment monitoring unit.

Private line

Both communication parties are connected permanently.

Procedure

A generic term for an action.

Process

A generic term for a collection of actions.

Protection path

A specific path that is part of a protection group and is labeled


protection.

Protection strategy

In case the service route provides multiple service protections,


different protection strategies can be selected as required. Protection
strategy refers to the protection mode given the priority in use for
the trail: protection, no protection, and extra traffic. Of the above,
the protection preference is divided into trail protection and
sub-network connection protection.

Protection subnet

The resources that form a protection subnetwork include NEs and


fiber cables. The creation of the protection subnetwork actually
means that corresponding logical system is configured for each NE
by means of creating the protection subnetwork, the optical
interfaces (or VC4) of each board are mapped into the logical
system, and then these independent logical systems are connected
with one another to form a complete network structure.

Packets Loss Ratio

This index shows the packet loss ratio after many Ping operations
with the unit of %.

Poll Status

The NMS polls the device status and other configuration data
periodically and displays the polling results on the topology view.
The polling status contains normal, unknown, off-line, light fault,
subordinate fault, important fault and urgent fault.

R
ROADM

Issue 03 (2010-11-02)

Reconfiguration Optical Add/Drop Multiplexing. ROADM helps


you to terminate or pass through any one wavelength at every node
without affecting the existing services. At the same time, ROADM
can change wavelengths through the NMS remotely, to adjust
wavelengths added or dropped in a quick and convenient manner. In
addition, ROADM enables power equalization at path level through
a built-in power equalization function, and thus adjusts power for
pass-through paths in a better way than a band-based dynamic gain
equalizer (DGE) does.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

A-9

iManager U2000 Unified Network Management System


Product Description

A Glossary

Route

The IP route selection is in table driving mode. In each host and


each router of the Internet, there is a routing table that contains
information about how the service is transmitted from the source to
the sink, providing a basis for route selection. Ethernet static
routing in ET1 refers to the mapping relationship between the
Ethernet port and the bound path. Its routing type includes port
routing and VLAN routing. Port routing: It means configuring a
route between the Ethernet port and the bound path port, which is
usually used for point-to-point networking communication; VLAN
routing: It means configuring a route between the Ethernet port and
the bound path port based on the VLAN service. It can be used
flexibly in point-to-point, point-to-multipoint or
multipoint-to-multipoint communication. The implementation is to
divide and converge the data stream according to the VLAN flag of
the packet. As a VLAN flag can be added to the Ethernet port, the
equipment can be applied more flexibly.

Report

The report that is generated manually in a real-time fashion.

RTT

RTT is the round trip time, which is the time delay of the ping task.

A-10

Script file

It is the text file describing the physical information and


configuration information of the entire network, including the NE
configuration file, port naming file, end-to-end configuration file,
NE physical view script file, NM information file and service
implementation data script file.

Schedule Task

The report on schedule task that is generated at a interval along with


the periodical running of the schedule tasks.

Script

A list of instructions for performing a specific task or action,


written in a scripting language.

SDH NNI

SDH Network Node Interface. It is applied to build


communications connection with the equipment beyond the NMS
management area. Usually, the NM creates an SDH NNI by
creating a logical system on the port of an idle line board, and the
NE must be a TM without protection and fibre connection.

Section

A trail in a section layer.

Settings

Parameters of an operation that can be selected by the user.

Severity

See Alarm Severity.

Subnet mask

Also referred to as the network mask off code, it is used to define


network segments, so that only the computers in the same network
segment can communicate with one another, thus suppressing
broadcast storm between different network segments.

Subnet number

Subnetwork number is used to differentiate the different network


sections in the sub-network conference. Actually it is the first
several digits (one or two) of the user phone number. An orderwire
phone number is composed of the sub-network number and the user
number.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

A Glossary

Subnet

Sub-network is the logical entity in the transmission network and


comprises a group of network management objects. A sub-network
can contain NEs and other sub-networks. A sub-network planning
can better the organisation of a network view.

Support

The frame on the bottom of a cabinet, when installing the cabinet on


the antistatic floor.

Synchronise NE
time

Send the system time of the NMS server to NEs so as to


synchronise all NEs with the server.

T
TDA clock source

TDA is short for Tone Data Access. For the 2500+ NE equipment,
it can be installed with the external TDA board for which the clock
source must be set so that the TDA board can switch according to
the set clock source sequence when clock source switching occurs.

TMN

Telecommunications Management Network. The entity which


provides the means used to transport and process information
related to management functions for the telecommunications
network.

Topology

The NMS topology is a basic component of the man-machine


interactive interface. The topology clearly shows the structure of the
network, the alarms of different NEs, sub-networks in the network,
the communication status as well as the basic network operation
status.

Trail management
function

A network level management function of the NMS. Through trail


management, you can configure end-to-end services, view graphic
interface and visual routes of a trail, query detailed information of a
trail, filter, search and locate a trail quickly, manage and maintain
trails in a centralised manner, manage alarms and performance data
by trail, and print a trail report.

Trail

A trail is a kind of transport entity, mainly engaged in transferring


signal from the input of the trail source to the output of the trail
sink, and monitoring the integrality of the transferred signal.
According to the different levels of the trail, the trail includes
various types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail,
VC4, VC3 and VC12). Among them, OTS, OCH and OMS
represent the trails in a DWDM layer network. For the ADM and
TM equipment in the SDH network, each optical fibre connection
corresponds to an SPI, RS or MS trail, and a trail is the general
name for service carriers, including SDH and PDH services.

Tributary loopback

A fault can be located for each service path by performing loopback


to each path of the tributary board. There are three kinds of
loopback modes: No loopback, Outloop and Inloop.

Threshold

The alarm range will be defined after the performance data is


collected. The threshold contains the upper and lower one, related
with the unit and index.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

A-11

iManager U2000 Unified Network Management System


Product Description

A Glossary

U
U2000

To be oriented to the future network trend, the iManager U2000 that


is the unifed network management system (NMS) combines all-IP
and FMC, and manages carrier equipment and access equipment in
a centralized manner.

UAT

Unavailable Time. A UAT event is reported when the monitored


object generates 10 consecutive severely errored seconds (SES) and
the SESs begin to be included in the unavailable time. The event
will end when the bit error ratio per second is better than 10-3
within 10 consecutive seconds.

UNI

UNI is the abbreviation for User Network Interface. It identifies the


interface between the user and the ATM network node.

Unprotected

Services transmitted through an ordinary way, once a failure or


interruption occurs, the data cannot be restored for lack of
protection mechanism.

Upload

Report all or part of the configuration data of the NE to the NM and


overwrite the configuration data saved in the NE layer on the NM
side.

User group

User set refers to the set of NMS users with the same management
authorities. The default user group includes: system administrator,
system maintainer, system operator and system supervisor. The
attributes of user set include name and detailed description.

User

The user of the NMS client, and the user and his/her password
define the corresponding authority of operation and management of
the NMS.

A-12

VC4 loopback

The fault of each VC4 path on the optical fibre can be located by
setting loopback for each VC4 path of the line. There are three
kinds of loopback modes: No loopback, Outloop, Inloop.

VC4 server trail

The path rate of the VC4 server trail is 150.336Mbit/s. The VC4
server trail provides transparent channels (that is, circuit group) for
circuit-layer network nodes (for example, a switch) in a path-layer
network, and acts as the basic unit of inter-office communication
path. When the VC4 server trail is configured, only the higher order
cross-connection of VC4 is generated in the intermediate NE, but
no cross-connection is generated at the two ends, that is, no service
is added/dropped. Therefore, the VC4 server trail is not a traditional
service. It is only the basis for VC3 and VC12 trail creation.

VCI

The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in


both NNI cell or UNI cell. It indicates the virtual channel in the
path. The VPI and VCI together indicate a virtual connection.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

A Glossary

Organize and display rules and filter conditions of the topology


data. Customize the view according to requirements of every
product and organize the data in the view displayed by the topology
module, such as the layer 2 view, VPN view and IP view. By
default, the platform provides the physical view. The topology view
can be planned according to the domain, maintenance relationship
and so on.

View

Edits and displays the rule of the topology data or the filter
conditions. It can be tailored according to the requirements
Virtual fibre

A virtual fibre is created between SDH equipment that has WDM


equipment in between. From SDH equipment perspective, creation
of virtual fibres disassociates its fibre connection with WDM
equipment and prevents impact on the auto fibre search function,
ensuring independence of SDH trail management.From WDM
equipment perspective, its service bearer layer is a virtual fibre
instead of a true one after the virtual fibre is created. Deletion of the
true fibre does not affect trail management.

Virtual NE

Like a common NE, a virtual NE is also displayed with an icon on a


view, but it is only an NE simulated according to the practical
situation, which does not represents an actual NE. Therefore, the
actual status of this NE cannot be queried and its alarm status
cannot be displayed with colours. Usually, when the trail
management function is used for the NEs or sub-networks the NMS
cannot manage, or the equipment is interconnected with other
vendors' NEs for service configuration, the end-to-end service
configuration method and the trail management capability are
provided.

VLAN ID

Namely, it is the virtual LAN identifier. One Ethernet port can


support 4K VLAN routes, and one NE can support up to 8K VLAN
routes.

VPI

The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the
NNI cell, and 8 bits in the UNI cell.

W
Wavelength
protection group

The wavelength protection group is important to describe the


wavelength protection structure. Its function is similar to that of the
protection sub-network in the SDH NE. The wavelength path
protection can only work with the correct configuration of the
wavelength protection group.

WDM service

The WDM service is accessed at the client side of the OTU board
that can access SAN services.

Web LCT

In the TMN architecture, the Web LCT is located in the NE


management level, which can manage the RTN series and NG
WDM series equipment.

Working path

A specific path that is part of a protection group and is labelled


working.

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

A-13

iManager U2000 Unified Network Management System


Product Description

A Glossary

A-14

WTR time

A period of time that must elapse before a - from a fault recovered trail/connection can be used again to transport the normal traffic
signal and/or to select the normal traffic signal from.

WTR

Wait to Restore. This command is issued when working channels


meet the restoral threshold after an SD or SF condition. It is used to
maintain the state during the WTR period unless it is pre-empted by
a higher priority bridge request.

WXCP

Wavelength Cross-Connection Protection. It is a path protection


type for ring networks. In this protection mode, services are
switched between the primacy and secondary rings through
cross-connection based on the dual fed signal selection principle.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

B Acronyms and Abbreviations

Acronyms and Abbreviations

A
AAA

Authorization, Authentication and Accounting

ACE

Adaptive Communication Environment

ACL

Access Control List

AIS

Alarm Indication Signal

ALC

Automatic Level Control

APE

Automatic Power Equilibrium

ARP

Address Resolution Protocol

ASN.1

Abstract Syntax Notation One

ASON

Automatically Switched Optical Network

ATM

Asynchronous Transfer Mode

B
BFD

Bidirectional Forwarding Detection

BGP

Border Gateway Protocol

BML

Business Management Layer

BRAS

Broadband Remote Access Server

C
CAR

Committed Access Rate

CC

Continuity Check

CORBA

Common Object Request Broker Architecture

CLI

Command Line Interface

CoS

Class of Service

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

B-1

iManager U2000 Unified Network Management System


Product Description

B Acronyms and Abbreviations

CPU

Central Processing Unit

CWDM

Coarse Wavelength Division Multiplexing

D
DC

Data Center

DCC

Data Communications Channel

DCN

Data Communication Network

DDN

Digital Data Network

DHCP

Dynamic Host Configuration Protocol

DNI

Dual Node Interconnection

DNS

Domain Name System

DPPS

Dual Path Protection Switching

DWC

Dynamic Wavelength Control

DMS

Datacom network Management System

DWDM

Dense Wavelength Division Multiplexing

E
ECC

Embedded Control Channel

EML

Element management Layer

EMS

Element Management System

EPL

Ethernet Private Line

EPLAN

Ethernet Private LAN

ESCON

Enterprise System Connection

EVPL

Ethernet Virtual Private Line

F
FCAPS

Fault Management, Configuration Management, Accounting


Management, Performance Management, Security Management

FTP

File Transfer Protocol

B-2

GNE

Gate Network Element

GUI

Graphical User Interface

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

B Acronyms and Abbreviations

H
HA

High-Availability

HGMP

HUAWEI Group Management Protocol

HQoS

Hierarchical QoS

HSI

High Speed Internet

HTML

Hyper Text Markup Language

HTTP

Hyper-Text Transmission Protocol

I
ID

IDentification

IEEE

Institute of Electrical and Electronics Engineers

IF

Intermediate Frequency

IGMP

Internet Group Management Protocol

IMA

Inverse Multiplexing for ATM

iMAP

Integrated Management Application Platform

ION

Intelligent Optical Network

IP

Internet Protocol

IPA

Intelligent Power Adjustment

ISDN

Integrated Services Digital Network

ISO

International Organization for Standardization

ISP

Internet Service Provider

ITU-T

International Telecommunication Union- Telecommunication


Standardization Sector

L
LAN

Local Area Network

LCAS

Link Capacity Adjustment Scheme

LCD

Liquid Crystal Display

LCT

Local Craft Terminal

LLID

Locate Loopback ID

LPT

Link-state Pass Through

L2TP

Layer 2 Tunneling Protocol

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

B-3

iManager U2000 Unified Network Management System


Product Description

B Acronyms and Abbreviations

LLDP

Link Layer Discovery Protocol

LSP

Label Switched Path

M
MA

Maintenance Association

MAC

Media Access Control

MCA

Multi-channel Spectrum Analyzer Unit

MEP

Maintenance association End Point

MD

Maintenance Domain

MDI

Multi-Document Interface

MDP

Message Dispatch Process

Mgr

Manager

MIB

Management Information Base

MIP

Maintenance association Intermediate Point

MIT

Managed Object Instance Tree

MML

Man Machine Language

MO

Managed Object

MPLS

Multiprotocol Label Switching

MS

Multiplex Section

MSP

Multiplex Section Protection

MSTP

Multi-Service Transmission Platform

MTBF

Mean Time Between Failures

MTTR

Mean Time to Repair

NBI

Northbound Interface

N
NE

Network Element

NEL

Network Element Level

NML

Network Management Layer

NMS

Network Management System

NSAP

System Network Service Access Point

B-4

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

B Acronyms and Abbreviations

OADM

Optical Add/Drop Multiplexer

OAM

Operation Administration and Maintenance

OAMS

Optical fiber (cable) line Automatic Monitoring System

OCH

Optical Channel

OEQ

Optical Equalizer

ODU

Optical Demultiplexer Unit

ODU

Outdoor Unit

OIF

Optical Internetworking Forum

OLA

Optical Line Amplifier

OMS

Optical Multiplex Section

OMU

Optical Multiplexer Unit

OSC

Optical Supervisory Channel

OSF

Operation System Function

OSI

Open Systems Interconnection

OSN

Optical Switch Network

OSNR

Optical Signal-to-Noise Ratio

OSS

Operation Support System

OTDR

Optical Time Domain Reflectometry

OTM

Optical Terminal Multiplexer

OTS

Optical Transmission Section

OTU

Optical Transponder Unit

OWSP

Optical Wavelength Shared Protection

OSPF

Open Shortest Path First

P
PC

Personal Computer

PSTN

Public Switched Telephone Network

PDH

Plesiochronous Digital Hierarchy

PP

Path Protection

PPP

Point-to-Point Protocol

PRBS

Pseudo-Random Binary Sequence

PSTN

Public Switched Telephone Network

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

B-5

iManager U2000 Unified Network Management System


Product Description

B Acronyms and Abbreviations

Q
QoS

Quality of Service

R
RAID

Redundant Array of Inexpensive Disk

RAS

Reliability, Availability, Survivability

RDBMS

Relational Database Management System

RPR

Resilient Packet Ring

RMON

Remote Monitoring

ROADM

Reconfiguration Optical Add/drop Multiplexer

RPT

Repeater

RS

Regenerator Section

RSVP

Resource Reservation Protocol

RTN

Radio Transmission Node

RUP

Rational Unified Process

B-6

SDH

Synchronous Digital Hierarchy

SLM

Submarine Line Monitor

SLTE

Submarine Line Terminal Equipment

SML

Service Management Layer

SMS

Service Management System

SNCMP

Sub-Network Connection Multiple Protection

SNCP

Sub-Network Connection Protection

SNCTP

Sub-Network Connection Tunnel Protection

SNML

Sub-Network Management Layer

SNMS

Subnetwork Management System

SONET

Synchronous Optical Network

SSL

Security Socket Layer

SAP

Service Access Point

SNMP

Simple Network Management Protocol

STP

Spanning Tree Protocol

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

iManager U2000 Unified Network Management System


Product Description

B Acronyms and Abbreviations

T
TCM

Tandem Connection Measurement

TCP/IP

Transmission Control Protocol / Internet Protocol

TDA

Tone & Data Access Unit

TFTP

Trivial File Transfer Protocol

TM

Terminal Multiplexer

TMF

TeleManagement Forum

TMN

Telecommunication Management Network

TPS

Tributary Protection Switching

U
UML

Unified Modeling Language

UPS

Uninterrupted Power Supply

V
VB

Virtual Bridge

VCI

Virtual Channel Identifier

VCS

Veritas Cluster Server

VOA

Variable Optical Attenuator

VPI

Virtual Path Identifier

VLAN

Virtual Local Area Network

VPN

Virtual Private Network

VGMP

VRRP Group Management Protocol

VRRP

Virtual Router Redundancy Protocol

VVR

Veritas Volume Replication

VVR

VERITAS Volume Replicator

VxVM

Veritas Volume Manager

W
WDM

Wavelength Division Multiplexing

WSF

Work Station Function

WTR

Wait-to-Restore

WXCP

Wavelength Cross-Connection Protection

Issue 03 (2010-11-02)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

B-7

B Acronyms and Abbreviations

B-8

iManager U2000 Unified Network Management System


Product Description

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

Issue 03 (2010-11-02)

Anda mungkin juga menyukai