BCM50 Administration Guide BCM50 2.0 Business Communications Manager Document Status: Standard Document Number: NN40020-600 Document Version: 01.
Copyright © 2006 Nortel Networks, All Rights Reserved All rights reserved. The information in this document is subject to change without notice. The statements, configurations, technical data, and recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks.
Task List Getting started with BCM50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Overview of BCM50 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 BCM50 Management Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 BCM50 Security Policies and Accounts and Privileges . . . . . . . . . . . . . . 75 To set system access control policies ...........................................................................
Task List To configure pass phrases for a service access point.................................................141 To view details associated with a service access point ...............................................141 To delete a service access point .................................................................................141 To modify a trap destination ........................................................................................143 To delete a trap destination ...................
Task List 5 To start BCM Monitor from the Element Manager .......................................................247 To connect to a different BCM50 .................................................................................248 To configure static snapshot settings ..........................................................................249 To save a static snapshot ............................................................................................
Task List To modify a scheduled log transfer .............................................................................311 To delete a scheduled log transfer ..............................................................................312 To use the BCM50 Web Page to transfer log files to other destinations .....................314 To extract log files using the Element Manager ..........................................................316 To specify retrieval criteria................................
Contents Chapter 1 Getting started with BCM50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Audience .
Contents Element Manager data features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Element Manager application logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 BCM50 integrated launch of related applications . . . . . . . . . . . . . . . . . . . . . . . . . 63 BCM50 feature licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 BCM50 Help system . . . . . . . . . . . . . . . . . . . . . .
Contents 9 Deleting a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Modifying group privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Adding a user account to a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Deleting a user account from a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Re-enable a locked-out user . . . . . . . . . .
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Chapter 6 Managing BCM50 with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Overview of BCM50 support for SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Configuring routers to use Element Manager with SNMP . . . . . . . . . . . . . . . . . . . . . 134 Configuring SNMP settings . . . . . . . . .
Contents 11 Trunk Module Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Viewing Performance History information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Viewing D-Channel information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Disabling or enabling a B channel setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Provisioning a PRI B-channel . . . . . . . . . . . . . . . . . .
Contents BCM50 backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Backup destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Performing immediate backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Performing an immediate backup to the BCM50 . . . . . . . . . . . . . . . . . . . . . . . . 275 Viewing and performing scheduled backups .
Contents 13 Appendix A Management Information Bases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 About SNMP MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 MIB file descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Accessing, compiling, and installing MIB files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 Small Site MIB . . . . . . . . . . . . . . . .
Contents NN40020-600
Chapter 1 Getting started with BCM50 This section contains information on the following topics: • • • • • • “About this guide” on page 15 “Audience” on page 17 “Acronyms” on page 17 “Symbols and conventions used in this guide” on page 19 “Related publications” on page 20 “How to get Help” on page 21 About this guide The BCM50 Administration Guide describes how to manage and maintain BCM50 systems at the Release 2.0 level using Business Element Manager.
Chapter 1 Getting started with BCM50 The tasks described in this guide assume that you are using the Element Manager with full administrative privileges. If you do not have full administrative privileges, you may see only a subset of the tasks and panels described in this guide. Table 1 BCM50 Administration Guide organization Chapter Contents Chapter 2, “Overview of BCM50 Administration This chapter introduces management concepts and techniques.
Chapter 1 Getting started with BCM50 17 Audience The BCM50 Administration Guide is directed to network administrators responsible for maintaining BCM networks that include BCM50 devices. This guide is also useful for network operations center (NOC) personnel supporting a BCM50 managed services solution.
Chapter 1 Getting started with BCM50 Table 1 List of acronyms Acronym Description MOS Mean Opinion Score MPS Media Path Server NAT Network Address Translation NCM Network Configuration Manager NOC Network Operations Center NTP Network Time Protocol OOF Out of Frame PPP Point-to-Point Protocol PRI Primary Rate Interface PBX Private Branch Exchange PSTN Public Switched Telephone Network PVQM Proactive Voice Quality Monitoring QoS Quality of Service RAI Remote Alarm Indication
Chapter 1 Getting started with BCM50 19 Symbols and conventions used in this guide These symbols are used to highlight critical information for the BCM50 system: Caution: Alerts you to conditions where you can damage the equipment. Danger: Alerts you to conditions where you can get an electrical shock. Warning: Alerts you to conditions where you can cause the system to fail or work improperly. Note: A Note alerts you to important information.
Chapter 1 Getting started with BCM50 These conventions and symbols are used to represent the Business Series Terminal display and dialpad. Convention Example Used for Word in a special font (shown in the top line of the display) Pswd: Command line prompts on display telephones. Underlined word in capital letters (shown in the bottom line of a two line display telephone) PLAY Display option. Available on two line display telephones.
Chapter 1 Getting started with BCM50 21 CallPilot Telephone Administration Guide (NN40090-500) CallPilot Contact Center Telephone Administration Guide (NN40040-600) BCM50 LAN CTE Configuration Guide (NN40020-602) BCM50 Call Detail Recording System Administration Guide (NN40020-605) Digital Mobility System Installation and Configuration Guide (NN40020-306) How to get Help This section explains how to get help for Nortel products and services.
Chapter 1 Getting started with BCM50 Getting Help through a Nortel distributor or reseller If you purchased a service contract for your Nortel product from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller.
Chapter 2 Overview of BCM50 Administration The BCM50 Administration Guide describes the tools available with which to administer, or manage BCM50 systems. This section is an introduction to the BCM system and its management model.
Chapter 2 Overview of BCM50 Administration — — — — — — — — CTM4/CTM8 DTM GATM4/GATM8 4x16 ASM8 ASM8+, GASM DSM16+/DSM32+ DDIM Main units The main hardware component in the BCM50 system is the main unit. The six BCM50 models are divided into two series: standard and BRI. The BRI (or b) series main units include BRI ports that replace the four analog lines on the standard series.
Chapter 2 Overview of BCM50 Administration 25 All of the BCM50 main units provide call processing and data networking functions. They also provide connections for telephones, as well as LAN and WAN connections. You can install MBMs to provide connections for Public Switched Telephone Network (PSTN) lines. For detailed information about the main units, see the BCM50 Release 2.0 Installation and Maintenance Guide (NN40020-302).
Chapter 2 Overview of BCM50 Administration • • • • • review logs of operational information retrieve and view logs containing diagnostic information in the event of a system issue manage system inventory manage software updates make changes to the system configuration to change service definitions or add users including adding new features through the application of keycodes The descriptions and procedures in this guide will assist the administrator in performing these tasks.
Chapter 2 Overview of BCM50 Administration 27 Figure 1 BCM50 network management model Network Management Layer • • • • • Event & Alarm Mgmt Infrastructure access Performance & optimization Communications QoS Monitoring System & Config Management Layer • Multi-site configuration • Asset inventory mgmt • Bulk MACs Element Management Tools • • Troubleshoot events & alarms Backup & restore • • Add features with keycodes Configuration & administration Manageable Systems & Endpoints • • • User applicati
Chapter 2 Overview of BCM50 Administration Figure 2 BCM50 enterprise network model NOC Domain Network Configuration Manager (NCM) BCM Network Domain NCM Server Network Solutions VoIP Wireless VoIP NCM Database Element Manager Workstation WAN SNMP Network Manager Workstation PSTN V.90 Modem SNMP Network Manager Server Remote Dialup BCM50 interfaces The BCM50 network can be distributed geographically across different sites.
Chapter 2 Overview of BCM50 Administration 29 A network administrator can connect to and manage a BCM50 via an IP over LAN interface. If the administrator is accessing the BCM50 system from an external network, then a connectivity path would need to be provided from the corporate LAN network to the customer's WAN network or to the customer's ISP provider over another device such as a router elsewhere on the customer's premises. Dialup The modem supports callback for management user access to the BCM50.
Chapter 2 Overview of BCM50 Administration • • FTP (file transfer protocol): FTP is a protocol used to transfer files over a TCP/IP network (Internet, Unix). FTP allows you to log into FTP servers, list directories, and copy files from other workstations. SSH and other protocols are also used for certain tasks. These are covered in the section “Secure Network Protocols and Encryption” in the Security chapter.
Chapter 3 BCM50 Management Environment This chapter contains information on the different tools available for managing your BCM50 system. It also describes the Element Manager application in detail.
Chapter 3 BCM50 Management Environment The applications available from the BCM50 webpage are supported on Windows XP and Windows 2000 operating systems. Some applications, such as BCM Monitor, are also supported on a Citrix operating system.
Chapter 3 BCM50 Management Environment 33 * Provides a description of the application and information about where to find it. Administrator documentation is provided in English. User documentation is provided in the following languages: • • • • • • • • • • English French Danish German Spanish Dutch Italian Norwegian Swedish Portuguese BCM50 Management Environment and Applications A number of tools are available to help manage your BCM50.
Chapter 3 BCM50 Management Environment Managing BCM50 with Telset administration While BCM Element Manager is the primary management application, BCM50 also supports the programming of telephony and applications areas of BCM50 through set-based administration. This allows installers, already familiar with this interface, to perform programming from the keypad of any telephone connected to the BCM50 device. This alleviates the need for access to a computer at the customer site.
Chapter 3 BCM50 Management Environment • • 35 Desktop Assistant Pro Desktop Assistant Pro AE For more information about Desktop Assistant tools, see the BCM50 Device Configuration Guide (NN40020-300). Note: You require a LAN CTE keycode to operate Desktop Assistant Pro and Desktop Assistant Pro AE. See the LAN CTE Configuration Guide (NN40020-602) for more information about installing and using LAN CTE.
Chapter 3 BCM50 Management Environment • • • Host MIB RFC 2790 IF-MIB (RFC2863) SNMP-Framework-MIB (RFC2261) SNMPv1, v2c and v3 are supported, as well as SNMP traps. See Chapter 6, “Managing BCM50 with SNMP,” on page 133 for more information about using Element Manager with SNMP. Element Manager The BCM Element Manager is a client-based management application that runs on a Windows computer or on a Citrix server. The Element Manager allows for connection to BCM50 devices over an IP network.
Chapter 3 BCM50 Management Environment 37 The BCM Element Manager has the following system requirements: • • • Windows: Windows 2000, Windows XP RAM: minimum 256 MB, recommended 512 MB free space: 150 MB To install Element Manager on your computer: 1 Connect to the BCM50 web page: — If the BCM50 is installed on the network use a browser and type in the BCM50 IP address as the URL in the following format: http://xxx.xxx.xxx.
Chapter 3 BCM50 Management Environment • Set up the BCM50 as a device in the Network Elements tree. See “Adding a BCM50 to the Network Element tree” on page 39 for information. Installing Element Manager in a Citrix environment You can run Element Manager in a Citrix environment, using the following software: • • • Windows 2000 Server SP4 (fully patched) Citrix Metaframe XP Feature Release 3 Citrix Program Neighborhood Version 7.
Chapter 3 BCM50 Management Environment 39 If an older version of Element Manager is already installed on your computer, you can choose to update the existing installation, or perform a new installation. If you choose to perform a new installation, you can copy the existing resources to the new installation, including the device tree, cartridges, and user preferences. BCM Monitor replaces any older versions of BCM Monitor already installed on your computer.
Chapter 3 BCM50 Management Environment 5 Enter the Read-Write Community String, if it is present. The Read-Write Community String is only present if SNMP is enabled. SNMP is disabled by default. The default SNMP Read-Write Community String is public. Contact your system administrator to find out the correct SNMP community string to use. See Chapter 6, “Managing BCM50 with SNMP,” on page 133 for more information about SNMP community strings. 6 Click OK to exit the dialog box.
Chapter 3 BCM50 Management Environment 41 Connecting to a BCM50 element Use the following steps to connect to your BCM50 once it is defined in the Element Manager: 1 On the Network Elements tree, select the element to which you wish to connect by selecting the IP address or element name as it appears in the Network Element tree. Login fields appear in the Information panel. 2 Enter your log in credentials for the BCM50 to which you are trying to connect.
Chapter 3 BCM50 Management Environment Disconnecting through the menu bar 1 Click Session on the menu bar. 2 Select the IP address of the device you want to disconnect. 3 Select Disconnect from the list of tasks that are displayed. 4 Click Yes in the Confirmation dialog box to confirm the disconnect request. Warning: Clicking the X box on the upper right corner causes the Element Manager application to close and all current sessions with BCM50 devices are terminated.
Chapter 3 BCM50 Management Environment 43 Figure 3 Element Manager Window - no defined Elements Table 3 lists and describes the initial Element Manager window. Table 3 Initial Element Manager window attributes Element Description Title bar When you connect to a device, this area indicates the type of device (Nortel Networks BCM50 Element Manager - Network Elements) and the IP address for the connected device.
Chapter 3 BCM50 Management Environment Table 3 Initial Element Manager window attributes (Continued) Network This menu is not available when a connected device is selected. When the Network Elements folder icon is selected in the Network Elements tree the following options are available: • New Folder: Allows you to create a new folder on the Network Elements tree. Folders allow you to organize your devices. • New Network Element: Allows you to create a new entry under the Network Elements tree.
Chapter 3 BCM50 Management Environment 45 Table 3 Initial Element Manager window attributes (Continued) Help Provides information to assist in using the Element Manager. • PDF Documents: Provides a link to the documentation interface, on the Business Communications Manager web page, where you can find various PDF books describing the BCM50system and programming. • Contents: Provides a link to the help system. Note: A brief function description appears when you mouse over field headings.
Chapter 3 BCM50 Management Environment Table 3 Initial Element Manager window attributes (Continued) Information panel The information in the Information panel changes depending on what is selected in the Network Elements tree. • If a network element is selected that is not connected: The information panel shows the network element connection login information. Refer to Information displayed for unconnected elements on page 46.
Chapter 3 BCM50 Management Environment 47 Figure 4 Information display for unconnected network element Table 4 Unconnected network element information Field Description IP Address The IP address of the selected device. Read-Write Community String The current community string for the selected device (shown if SNMP is enabled). User Name Name of an authorized BCM50 user account. Password A valid password associated to the User Name.
Chapter 3 BCM50 Management Environment Figure 5 Element Manager window when connected to a BCM50 Task Navigation panel Information panel Configuration task navigation panel details The Configuration task navigation panel contains the Configuration task tree that allows you to set up and configure your BCM50 and the attached devices. Table 5 lists the tasks in the Configuration task tree and describes the task functions available within the information panel when the task is selected.
Chapter 3 BCM50 Management Environment 49 Table 5 Configuration task navigation panel headings (Continued) Resources Application Resources Reserved resources as well as resources in use Media Gateways Manage level of Echo cancellation and T.
Chapter 3 BCM50 Management Environment Table 5 Configuration task navigation panel headings (Continued) Restriction Filters Add or delete restrictions and exceptions for restrictions Remote Access Packages Add or delete line pool access Class of Service Manage passwords for class of service as well as restrictions Hospitality Manage general administration, wake-up call settings, call restrictions, and room settings Hunt Groups Manage group members and line assignment Call Detail Recording Ma
Chapter 3 BCM50 Management Environment 51 Table 6 Administration task navigation panel headings (Continued) Trunk Module Metrics Run loopback test on trunk modules CbC Limit Metrics View (Call by Call) logs of denied calls Hunt Group Metrics Reset metrics by hunt group PSTN Fallback Metrics Reset PSTN fallback metrics PVQM View voice quality metrics.
Chapter 3 BCM50 Management Environment In some cases, further panels can appear beside the main table. This is the case for restriction filters, for example, where there are three side-by-side panels that are programmed in a progressive order from left to right. Tabs that do not apply to a selected item appear greyed out and behind the active tabs.
Chapter 3 BCM50 Management Environment 53 Other information that only requires one or two fields is arranged on composite panels that may have more than one sub-panel. Each sub-panel includes related information.
Chapter 3 BCM50 Management Environment Use the following steps to copy data within a table: 1 Select the row from table that you want to copy by clicking on it. 2 Press the Copy button 3 Select the row or rows to which you want to paste the information. You can select multiple rows to paste data in by pressing either the Shift or Ctrl key.
Chapter 3 BCM50 Management Environment 55 Table 7 Paste Data (Continued) Check box title Settings copied Capabilities (Sets) • • • • • • • • • • • • • • • User Preferences (Sets) • • • • • Settings not copied Call Forward No Answer • (DN + delay + setting) • Call Forward Busy (DN +setting) • DND on busy Handsfree setting Handsfree answerback Pickup group Paging zone Paging Direct-dial (which set is reached by the D-Dial digit) Priority calling Hotline Auxiliary ringer Allow redirect Redirect ring A
Chapter 3 BCM50 Management Environment Rearranging columns You can move columns in a table if you want to temporarily display information in a different way. Changes to the table layouts are not saved. If you leave the panel, the columns return to the default order. To move a column, click and hold the column heading and drag and drop it to another location on the table. Figure 7 shows a step-by-step example of how to move a column within a table.
Chapter 3 BCM50 Management Environment 57 Figure 8 Sort dialog box Table 8 Sort dialog box fields Attribute Value Description Sort By Ascending/descending Choose the column to uses for sorting table data. This is the first column the data set is sorted by. Then By None, Ascending/descending Choose the column to uses for sorting table data. This is the second column the data set is sorted by.
Chapter 3 BCM50 Management Environment Using your keyboard to move around a table Use the key or the directional arrow keys on your keyboard to move around a table. Each press moves the cursor to the field to the right. At the end of a line, the next line is highlighted and the cursor continues moving to the right. Each press moves the cursor to the field to the left.
Chapter 3 BCM50 Management Environment 59 Figure 9 shows an example of a programming record saved in HTML format and Figure 10 on page 60 shows an example of a programming record saved in Excel spreadsheet format.
Chapter 3 BCM50 Management Environment Figure 10 Programming record in an Excel spreadsheet To create this file, you use the Save Programming Record command on the Session menu. The Save Programming Record provides four menu options. Figure 11 shows the menu options available.
Chapter 3 BCM50 Management Environment 61 Use the following steps to save the data programming: 1 Select the item on the task navigation panel for which you want to save the data into an HTML report or Excel workbook. An item can be a task item, task bullet, or a folder. 2 Click on Session > device IP address > Save Programming Record > Save Selected Data. A Save dialog box appears. Figure 12 Save dialog box 3 In the Save: field choose the path where you want the file stored.
Chapter 3 BCM50 Management Environment Element Manager application logging This section describes the logging performed by Element Manager to generate a record of its tasks. There is usually no need to monitor Element Manager log activities. However, the log files are available for troubleshooting should issues arise within the Element Manager operations. When you select Application Log from the menu bar Help command, the Element Manager Log Browser opens.
Chapter 3 BCM50 Management Environment 63 Figure 13 Application log panel BCM50 integrated launch of related applications BCM50 Voicemail and CallCenter applications are managed by CallPilot Manager, and real-time system activity is monitored with the BCM Monitor. All of these applications can be launched through buttons provided at an appropriate location in the Element Manager.
Chapter 3 BCM50 Management Environment Figure 14 Launch CallPilot Manager button You can access the BCM Monitor through the Launch BCM Monitor button under Administration Task > Utilities > BCM Monitor, or you can choose Tools > BCM Monitor. Figure 15 on page 65 shows the location of the Launch BCM Monitor button.
Chapter 3 BCM50 Management Environment 65 Figure 15 Launch BCM Monitor button BCM50 feature licensing You require a keycode to enable software features on the BCM. The keycode is a 24-digit code that authenticates the feature or bundle of features you purchased for your BCM50.
Chapter 3 BCM50 Management Environment Figure 16 BCM50 Keycode panel BCM50 Help system The following types of help information are available to you in Element Manager to help you understand how to program your BCM50: • • • “Menu bar Help” on page 66 “Field-level Help” on page 68 “Context-sensitive Help” on page 68 Menu bar Help The menu bar help provides access to the entire Help system, which includes online help and user manuals in PDF.
Chapter 3 BCM50 Management Environment 67 Table 10 Element Manager help elements Help menu option Description BCM Web Page and PDF Documents Link to PDF documents located on the BCM50 web page. Contents Opens a browser window that shows the help information by contents or index and allows a search. Customer Support Opens a browser to a Nortel Networks customer support web site About Provides information about the Element Manager software, such as the build number.
Chapter 3 BCM50 Management Environment Field-level Help When you position the cursor over a field, a pop-up box provides a brief description of the information required in the field. Figure 18 shows an example of a field-level help pop-up box. Figure 18 Field-level Help Context-sensitive Help You can view context-sensitive Help by clicking on a navigation tree heading, tab heading, or field heading of a connected BCM50 device and pressing the F1 function key.
Chapter 3 BCM50 Management Environment 69 Figure 19 Context-sensitive HTML page BCM50 common file input/output processes Many BCM50 tasks require task data to be transferred, to or retrieved from, different destinations or sources.
Chapter 3 BCM50 Management Environment Table 11 shows the data repositories that can be used for transferring task data to or from your BCM50 device during a task that requires data input or output.
Chapter 3 BCM50 Management Environment 71 The BCM50 Transferring information on the BCM50 is quick and easy, but does not protect your data in the event of damage to the BCM50. It makes an ideal solution in small environments where the BCM50 is the only computer on site, and where no network resources are available. Personal computer Storing information on a personal computer is a safe option either for short-term storage, or for environments where only one computer is used to access Element Manager.
Chapter 3 BCM50 Management Environment SFTP servers The process of using an SFTP server is similar to the process for using an FTP server. However, an SFTP server has a greater level of security than an FTP server, and more credentials are required to use an SFTP server. You must set up and manage security keys and certificates, including generating a SSH key, which you must then install on the SFTP server.
Chapter 3 BCM50 Management Environment 73 HTTP/HTTPS server HTTP and HTTPS servers are available as an option only for software updates. It can be a good solution if you have many BCM50s that require software updates from a centralized location. See Table 16 for the information required to use an HTTP or HTTPS server. Table 16 Configure HTTP or HTTPS server attributes Attribute Action HTTP Server Enter the hostname or IP address of the HTTP server.
Chapter 3 BCM50 Management Environment • • • Start Port: 443 End Port: 443 Server IP address: The BCM50 LAN IP address • • • • Name: HTTP Start Port: 80 End Port: 80 Server IP address: The BCM50 LAN IP address After these rules are configured, the BCM50 Element Manager can be accessed from the WAN.
Chapter 4 BCM50 Security Policies and Accounts and Privileges BCM50 Security Policies and Accounts and Privileges allows you to establish system-wide security policies and maintain access security on your system using settings on the Element Manager.This chapter describes the security policies that you can configure through the Element Manager. The BCM50 provides security capabilities such as NAT, VPN, DoS alert, data communication, DHCP, VLAN, and PPP.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Figure 20 Security Policies panel The following table describes the fields on this panel:. Table 17 Security Policies fields Attribute Value Description Disable telset login check box When selected, specifies when users cannot access the system through any telset interface. Default: unchecked Tip: If this is enabled, and DHCP changes the system IP address, you can determine the new IP address by way of the OAM port.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 77 Table 17 Security Policies fields (Continued) Attribute Value Challenge key Hide Challenge Key Description Specifies an alphanumeric key. This key is part of the access information your service technician requires to remotely access your system. Default: trust no one. If you change the default string, retain a record of the new string so that Nortel Technical Support can access your system during a support service call.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Table 17 Security Policies fields (Continued) Attribute Value Description Password Complexity Level (telset interface) 1 2 3 4 5 Specifies the number of unique digits that must be part of a telset password: 0: No complexity checks 1: one unique digit 2: two unique digits 3: three unique digits 4: four unique digits 5: prevent consecutive numbering Note: A password complexity higher than 0 will ensure that the user name is not used as th
Chapter 4 BCM50 Security Policies and Accounts and Privileges 79 Table 17 Security Policies fields (Continued) Attribute Value Description Account management drop down menu Specifies the method used for authenticating users when they log in. Options are Local Authentication and RADIUS. If RADIUS is selected, you must also select the Enabled check box.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Table 17 Security Policies fields (Continued) Attribute Value Description Install Web Server Certificate (SSL) Button Downloads application security certificates to the server where SSH is running to ensure a secure copy connection for operations like backup and restore, upgrades and patches. alphanumeric Displays an indentifier for the application security certificate.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 81 Session Management Policy tab Use the Session Management Policy tab to perform the following procedure: • “Setting the idle session timeout” on page 88 SSL and SSH Policy tab Use the SSL and SSH Policy tab to perform the following procedures: • “Uploading a Web Server Certificate” on page 88 • “Transferring an SSH Key-Pair” on page 89 Setting system access control policies Setting system access control policies allows the administrator
Chapter 4 BCM50 Security Policies and Accounts and Privileges 5 Under the Password Complexity Level column, enter a number from 1 to 5 that represents the password complexity level requirement, or enter 0 if no complexity check is required. For an alphanumeric password, the level is from 0 to 4. For a numeric password, the level is from 0 to 5.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 4 In the Lockout duration box, enter the number of minutes the user is locked out after the Lockout counter threshold is reached. 5 In the Lockout counter reset box, enter the number of minutes to wait to reset the Lockout counter. 83 Setting password expiry policy Use this procedure to enable a password expiry policy.
Chapter 4 BCM50 Security Policies and Accounts and Privileges If you use RADIUS for authenticating and authorizing users, and the RADIUS servers are not in-service or are out-of-contact, the BCM will revert to using local authentication.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Server Port Port number of the server to be used for authentication Enabled Check to enable the use of a RADIUS server authentication.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Table 19 Attributes in an ACCESS-ACCEPT message Attribute Name Value Description RADIUS attribute type 26 Vendor specific attribute Vendor type 562 Northern Telecom (Nortel) Vendor attribute type 166 BCM privilege level of the user being authenticated. Enter this level as a hex integer. Privilege level 0-36 (see Table 20) Privilege level of user, entered in big endian (network byte order).
Chapter 4 BCM50 Security Policies and Accounts and Privileges 87 Table 20 Privilege levels Privilege name Value Description VoiceMailAdmin 0 Voice Mail Administrator Contact Center 1 MMCC - Administrator SBAInstaller 2 Set Based Administrator Level 4 SBASystemCoord 3 Set Based Administrator Level 3 SBASystemCoordBasic 4 Set Based Administrator Level 2 SBABasic 5 Set Based Administrator Level 1 Security 6 Security Administrator CTEApp 7 LAN CTE DA Pro AE User SBA - IP Set Registr
Chapter 4 BCM50 Security Policies and Accounts and Privileges Operational Logs 26 The ability to download operational logs. Diagnostic Logs 27 Full access to download any logs. ISDN - Dial-in 30 The ability to use ISDN for dial-in. WAN - Dial-in 32 The ability to use WAN for dial-in PPP access. Setting the idle session timeout You can use the idle session timeout feature to automatically log out users who have been inactive for a specified period of time.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 89 Transferring an SSH Key-Pair Transferring an SSH Key-Pair allows the administrator to download a public security certificate or an SSH key-pair. The new certificate must be installed on each sftp server the BCM50 communicates with to ensure a secure connection for operations like backup and restore, and software updates. To transfer an SSH Key-Pair 1 Select Configuration, Administrator Access, Security Policies > SSL and SSH Policy.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Job Aid These links provide navigation to the sections of the panel for each user management item: Panel tabs Tasks “Current Account” on page 111 “Enabling and disabling exclusive access” on page 97 “View by Accounts” on page 114 • • • • • • • “Adding a new user account” on page 90 “Modifying a user account” on page 91 “Deleting a user account” on page 92 “Changing a user’s password” on page 93 “Changing the current user’s password” on
Chapter 4 BCM50 Security Policies and Accounts and Privileges 3 In the Add Account dialog box, enter a description of the account in the Description field. 4 Enter the user’s identifier in the User ID field. 5 In the User password field, enter the user’s password. 6 In the Confirm password dialog box, enter the user’s password again. 7 In the Telset password field, enter the telset password for the user. 8 In the Confirm password dialog box, enter the user’s password again.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Adding callback for a dial-up user As an administrator, you can provide callback access to a user who is accessing the system through a dial-up connection.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 93 To delete a user account 1 Select Configuration, Administrator Access, Accounts and Privileges, and click the View by Account tab. 2 Select a user on the Accounts table. 3 Click the Delete button. 4 In the confirmation box, click Yes to remove the user account from the system.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 3 Enter a new password that conforms with the system password policies, which are defined by the administrator during system setup. A confirmation dialog box appears. 4 In the confirmation dialog box, enter the new password again. 5 Click OK. The password takes effect the next time you log in. Creating a group As an administrator, you can create new groups to satisfy organizational requirements.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 95 To modify group privileges 1 Select Configuration, Administrator Access, Accounts and Privileges, View by Groups tab. 2 Select a group and then click the General tab. 3 To remove privileges, click on the Group Privileges tab, select one or more group privileges to delete from the existing group, and click Delete. A confirmation dialog box appears; click Yes to delete the selected items.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Re-enable a locked-out user As the administrator you can re-enable a locked-out user when the user has exceeded the login retry threshold. The system shows an enabled check box under the Locked Out column on the Accounts table. To release a locked-out user 1 Select Configuration, Administrator Access, Accounts and Privileges, View by Accounts tab. 2 Select the user record with the Locked Out status check box checked.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 97 Enabling and disabling exclusive access As the administrator, you can enable or disable exclusive access for special activities or maintenance. The administrator performing maintenance tasks can lock the system during the maintenance period. When you enable exclusive access, this capability prevents new logins but does not affect existing logins. This functionality is available to administrators only.
Chapter 4 BCM50 Security Policies and Accounts and Privileges After you create an account, you can assign groups to that account. Groups are sets of privileges based on user tasks or roles. For example, if you have a user who is responsible for remote monitoring, you can create an account for that user and then assign a group to the account; the group that you assign would contain the appropriate privileges for that role.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 99 Default passwords The following table lists the available default passwords for the Element Manager interface, the telset interface, and the voice mail interface.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Table 22 Default user account groups (Continued) Group Name Privileges Notes Contact Center Contact Center Only access to the Contact Centre application is available if this is the only group assigned to a user account. Contact Center access privileges on page 101 CDR Application CDRApp Only access to the call detail record functions is available if this is the only group assigned to a user account.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 101 Table 22 Default user account groups (Continued) Group Name Privileges Notes Backup Operators Security BackupOperators Security access privileges on page 102 Backup Operators access privileges on page 106 Security Security AdminDownload Alarm Viewer Diagnostic Logs Operational Logs Security access privileges on page 102 Admin Download access privileges on page 103 Alarm Viewer access privileges on page 107 Diagnostic Logs access pri
Chapter 4 BCM50 Security Policies and Accounts and Privileges • Web - User Applications Security access privileges • EM - CONFIG - Administrator Access - Current User • EM - CONFIG - Administrator Access - Accounts and Privileges • EM - CONFIG - Administrator Access - Security Policies • EM - CONFIG - Administrator Access - SNMP • EM - CONFIG - Administrator Access - Dial In • EM - CONFIG - Administrator Access - Dial Out • EM - CONFIG - Telephony - Call Security • EM - ADMIN - Genera
Chapter 4 BCM50 Security Policies and Accounts and Privileges 103 BCMMonitor Appl access privileges • EM - CONFIG - Administrator Access - Current User • EM - ADMIN - Utilities - BCM Monitor • Web Documentation - User Documentation • BCM50 Applications - Applications - BCM Monitor • Web - User Applications CDR Appl access privileges • EM - CONFIG - Administrator Access - Current User • Web Documentation - User Documentation • BCM50 Applications - Applications - Call Detail Recording • Web
Chapter 4 BCM50 Security Policies and Accounts and Privileges • Web Application Download - Web Download - Desktop Assistant • Web Application Download - Web Download - Desktop Assistant Pro • Web Application Download - Web Download - 2050 Soft Phone • Web Application Download - Web Download - Personal Call Manager • Web Application Download - Web Download - Lan CTE Client • Web Application Download - Web Download - BCM Monitor • Web Application Download - Web Download - CDR Client Wrapper
Chapter 4 BCM50 Security Policies and Accounts and Privileges 105 Remote Access access privileges • EM - CONFIG - Administrator Access - Current User • EM - CONFIG - Administrator Access - SNMP • EM - CONFIG - Administrator Access - Dial In • EM - CONFIG - Administrator Access - Dial Out • EM - ADMIN - General - SNMP Trap Destinations • Web Documentation - User Documentation Guests access privileges • Read-only access to all but Utilities, Backup and Restore, and Log Management • EM - CONFI
Chapter 4 BCM50 Security Policies and Accounts and Privileges • EM - ADMIN - Telephone Metrics - all • EM - ADMIN - Utilities - BCM Monitor • EM - ADMIN - Utilities - Reboot • EM - ADMIN - Software Management - all as read only • Web Documentation - User Documentation Backup Operators access privileges • EM - CONFIG - Administrator Access - Current User • EM - ADMIN - Backup and Restore - Admin - Backup • EM - ADMIN - Backup and Restore - Admin - Restore • Web Documentation - User Doc
Chapter 4 BCM50 Security Policies and Accounts and Privileges 107 Alarm Viewer access privileges • EM - CONFIG - Administrator Access - Current User • EM - ADMIN - General - Alarm • EM - ADMIN - General - Alarm Setting • EM - ADMIN - General - Inventory • Web Documentation - User Documentation • Web - User Applications Operational Logs access privileges • Web Documentation - User Documentation • EM - ADMIN - Log Management- Operational Logs • Web - User Applications Diagnostic Logs acces
Chapter 4 BCM50 Security Policies and Accounts and Privileges ISDN dial out access privileges • EM - CONFIG - Administrator Access - Current User • Web Documentation - User Documentation • Web - User Applications • PPP dial out via ISDN WAN dial in access privileges • EM - CONFIG - Administrator Access - Current User • Web Documentation - User Documentation • Web - User Applications • PPP dial in via analog WAN WAN dial out access privileges • EM - CONFIG - Administrator Access - Curr
Chapter 4 BCM50 Security Policies and Accounts and Privileges 109 Telset access security You can use the Telset administration interface (FEATURE 9*8) to activate or deactivate the telset default access user accounts. You can also use this interface to change the password for these accounts. For further information about using telset features, see the Telset Admin Guide.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Telset group access privileges There are four set-based group access privileges. These are listed in order of greatest to least access privileges with SBA - Installer being the group with the greatest privileges.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 111 • Primarily, you can block unauthorized access by ensuring that you change all default passwords once the system is set up and verified. • You can also block user access by simply changing the password. Note that you must retain a record of the password, since this information is not displayed either on the Element Manager panel or in the programming record file.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Figure 21 Accounts and Privileges: Current Account panel Table 24 describes each field on the Current Account context panel. Table 24 Current Account fields Attribute Value Description Account Notifications read-only This field displays account notifications, such as notifications of password expiries.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 113 Table 24 Current Account fields (Continued) Attribute Value Description Account Management read-only Displays the method used to authenticate the user session: local authentication, or centralized authentication through a RADIUS server. Exclusive access time remaining numeric minutes Specifies the amount of time left before other users are allowed to log on to the system. Visible only to users with administrator-level privileges.
Chapter 4 BCM50 Security Policies and Accounts and Privileges View by Accounts The View by Accounts context panel contains the table that defines individual user accounts. On these panels, you define how the system identifies the user. You also define what privileges the user has by assigning the user to groups. You can add, delete, or modify user account information from this panel.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 115 Table 25 describes each field on the View by Accounts panel. Table 25 View by Accounts fields Attribute Value Description User ID alphanumeric Displays the accounts by User ID Telset User ID numeric Displays the accounts by Telset User ID Locked Out checkbox Indicates whether or not the user has been locked out. When checked, the user cannot access the system.
Chapter 4 BCM50 Security Policies and Accounts and Privileges View by Accounts: General The General panel provides user account information and account control settings. Table 26 describes each field on this panel. Table 26 View by Accounts: General fields Attribute Description Value Description alphanumeric Displays the descriptive name and information for the user or the user function. This field may be left blank.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 117 View by Accounts: History The History panel provides user account and login histories and account control settings. Table 28 describes each field on this panel. Table 28 View by Accounts: History fields Attribute Value Description Account created Created by read-only Specifies the date that the user record was added. Specifies the userID of the person who added the user account.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Table 29 Group membership fields Attribute Value Description Buttons Add Opens the Add Account dialog box. Choose the group or groups with the appropriate access privileges for the user. Note: You cannot add user accounts to groups with read-only privileges. Delete Deletes the user account from the selected group. View by Groups The View by Groups panel allows you to add or delete members from group profiles.
Chapter 4 BCM50 Security Policies and Accounts and Privileges 119 Table 31 View by Groups: General panel fields (Continued) Attribute Value Description Last modified Modified by read-only Specifies the last date the group account was changed Specifies the user who performed the changes Group Privileges: Privileges Description read-only Lists the system access privileges that are allowed to members of the selected group Actions: Add Opens the Add Privilege to Group dialog box.
Chapter 4 BCM50 Security Policies and Accounts and Privileges View by Groups: Members For a selected group in the Groups table (“View by Groups” on page 118), you can use the Members panel to assign the group to existing user accounts and to view which accounts have the selected group assigned. Table 32 describes each field on this panel. Table 32 View by Groups: Group Membership fields Attribute Value Description Description read-only Lists the user accounts in the selected group.
Chapter 4 BCM50 Security Policies and Accounts and Privileges • DHCP server • Router • Voice messaging • LAN CTE 121 Security on Administration panels • Alarms • Alarm settings • SNMP trap destinations • Service manager • Backup and Restore • Logs • Software Management Security on Applications panels • Desktop Assistant • DA Pro • i2050 software phone • Personal Call Manager • LAN CTE Client • CDR, BCM Monitor • NCM Secure network protocols and encryption The BCM uses t
Chapter 4 BCM50 Security Policies and Accounts and Privileges Security audits A security log file is created at system startup to record user logins and transactions. This log is rolled each day and kept until the maximum log size is reached. When the maximum size is reached, the oldest record is deleted to make room for the newest record. For information about managing logs, see Chapter 12, “Managing BCM50 Logs,” on page 301.
Chapter 4 BCM50 Security Policies and Accounts and Privileges • 123 Do you require the added security of a private SSL certificate? Core system configuration, such as resources and network management should be restricted to an administrator-level account. Use the group profiles to define other levels of users with access to the headings that are specific to their task. This also helps to prevent overlap programming if more than one person is using the interface at the same time.
Chapter 4 BCM50 Security Policies and Accounts and Privileges Security certificate The BCM50 is delivered with a generic SSL security certificate. The self-signed certificate that is included in BCM enables SSL encryption functionality, providing the necessary encryption keys. There is also a facility to generate SSH certificates which are required in the setup of a SSH server if SCP is used as a transfer method. Security certificates rely on an NTP server for time and date information.
Chapter 5 Using the BCM50 Hardware Inventory This chapter describes how to use the BCM50 Hardware Inventory. The Hardware Inventory task in the Element Manager displays information about the BCM50 system, including: • • • connected expansion units populated Media Bay Modules (MBMs) attached telephone devices You can view the information in the Hardware Inventory remotely, using Simple Network Management Protocol (SNMP) management systems and the Entity Management Information Base (MIB), RFC2737.
Chapter 5 Using the BCM50 Hardware Inventory Viewing and updating information about the BCM50 system You can view and update certain information about the BCM50 main unit using the System tab on the Hardware Inventory panel. The System tab is divided into three areas: • • • Main unit BCM50 system expansion Other Information You can save inventory information to a file using the Programming Record. See “Saving programming records” on page 58.
Chapter 5 Using the BCM50 Hardware Inventory 4 127 If you want to add or update the asset ID for the BCM50 main unit, enter an asset ID in the Customer Asset ID field. Figure 23 Hardware Inventory Viewing and updating BCM50 system expansion information The BCM50 system expansion area in the System tab provides information about the expansion unit connected to the BCM main unit, if any. If an expansion unit is present and populated with an MBM, this information is also provided.
Chapter 5 Using the BCM50 Hardware Inventory Table 34 Expansion unit area and Fiber expansion media bay module area Column Name Column Description Column Value Read/Write MBM Use the drop-down menu to Drop-down menu identify the type of MBM, such as whether it is a DSM16 or DSM32. Write MBM Asset ID Enter the asset ID of the MBM. Numeric Write MBM Field Replaceable Indicates if the unit is considered field replaceable by the manufacturer.
Chapter 5 Using the BCM50 Hardware Inventory 129 To view or update other information about the BCM50 main unit 1 In the BCM50 Element Manager, connect to a BCM50 device. 2 Select Administration, General, Hardware Inventory. The Hardware Inventory panel opens. The BCM50 System tab is displayed. 3 View the information displayed in the Other Information area. 4 If you want to add or update information about the owner or administrator of the BCM50 system, enter information in the Owner Name field.
Chapter 5 Using the BCM50 Hardware Inventory Figure 24 Hardware Inventory Devices tab To view information about attached devices 1 In the BCM50 Element Manager, connect to a BCM50 device. 2 Select Administration, General, Hardware Inventory. The Hardware Inventory panel opens. 3 Click the Devices tab. 4 View the information displayed in the Attached Devices table.
Chapter 5 Using the BCM50 Hardware Inventory 131 Table 37 lists the fields displayed in the Additional Information tab. Items marked as read-only are detected by the BCM. For items that are not auto-detected, the Element Manager provides checkboxes, pull-down menus, and fields that the administrator can populate to indicated that these resources are present. Note: Asterisk (*) items can also be remotely queried by SNMP using the Entity MIB.
Chapter 5 Using the BCM50 Hardware Inventory Figure 25 Hardware Inventory Additional Information tab To view additional information about the BCM50 hardware inventory 1 In the BCM50 Element Manager, connect to a BCM50 device. 2 Select Administration, General, Hardware Inventory. The Hardware Inventory panel opens. 3 Click the Additional Information tab. The Additional Information tab opens. 4 View the information displayed in the Additional BCM50 Main Unit Information area.
Chapter 6 Managing BCM50 with SNMP SNMP (Simple Network Management Protocol) is a set of protocols for managing complex networks. SNMP-compliant devices, called agents, store meta-data in Management Information Bases (MIBs) and provide this data to SNMP requesters. You can use external SNMP clients, such as HP OpenView, to monitor the BCM50 system by means of read-only SNMP requests.
Chapter 6 Managing BCM50 with SNMP BCM50 supports read-only SNMP requests, even for SNMP variables that display as read-write. BCM50 does not support configuration operations through SNMP. Variables that are not supported are displayed as “0”. Configuring routers to use Element Manager with SNMP Before you use the BCM for SNMP management, you must ensure that the BCM and the optional integrated router are configured to allow SNMP queries to be received and responded to.
Chapter 6 Managing BCM50 with SNMP • 135 Server IP address: The BCM50 LAN IP address. This rule means that all TCP/IP traffic to port 161, which is the BCM50’s SNMP agent port, will be forwarded to the BCM50 for processing. Configuring the SNMP router port By default, both the BCM50 and the BCM50 router attempt to use port 161 for SNMP. This causes a conflict. In the router configuration, access the Remote Management section, and the SNMP tab to change this.
Chapter 6 Managing BCM50 with SNMP You can create a list of SNMP managers who are permitted to query the BCM50 system by specifying their IP addresses. If you have specified SNMP managers, the BCM50 SNMP agent will respond only to SNMP requests from those IP devices. To configure the BCM50 SNMP agent 1 Start the Element Manager. 2 In the Network Element navigation panel, select a BCM element. 3 Log on to the BCM50 by clicking the Connect button.
Chapter 6 Managing BCM50 with SNMP 5 137 Configure SNMP settings. Table 39 Configure SNMP Settings Attributes Attribute Action Enable SNMP Agent Select whether to enable or disable the SNMP agent by selecting the check box. Minimum Required Security Select the minimum required security for SNMP. Options are: AuthNoPriv or NoAuthNoPriv. Valid for SNMP v3. SNMP Version Support Select the appropriate version from the drop-down list.
Chapter 6 Managing BCM50 with SNMP 5 Configure the manager list attributes. Table 40 SNMP Manager Attributes Attribute Action Manager IP Address Enter the IP address of the SNMP manager that you want to authorize to query the BCM50 system. The IP address must correspond to the PC where the SNMP manager software is installed. Do not use the dynamic IP address that the PC receives when the dial-up link activates (when the BCM50 initiates dialing).
Chapter 6 Managing BCM50 with SNMP 139 You can define the value of a community string, as well as the type of access. You can also delete a community string. Caution: Although there is no limit for the number of SNMP communities that you can set, Nortel recommends that you limit the number of SNMP communities to a maximum number of 5. Limiting the number of SNMP communities will reduce degradation of system performance. To add a community string 1 Click the Configuration tab.
Chapter 6 Managing BCM50 with SNMP Configuring service access points Service access points are associated with the enhanced security and privacy features of SNMP v3. The Service Access Point tab is not visible if SNMPv3 is not selected on the SNMP General Settings tab. You can view and configure the following parameters associated with service access points.
Chapter 6 Managing BCM50 with SNMP 141 To configure pass phrases for a service access point 1 Click the Configuration tab. 2 Open the Administrator Access folder, and then click SNMP. 3 Click the Service Access Points tab. The Service Access Points panel is displayed. 4 Click Add. The Add Service Access Point dialog box appears. 5 Complete the fields in the dialog box.
Chapter 6 Managing BCM50 with SNMP 3 Click the Service Access Points tab. The Service Access Points panel is displayed. 4 In the Service Access Points table, select a service access point. 5 Click the Delete button. A confirmation dialog box opens. 6 Click the Yes button. The selected service access point is deleted from the Service Access Points table. Configuring SNMP trap destinations An SNMP trap is a signal that tells the SNMP manager that an event has occurred on the system.
Chapter 6 Managing BCM50 with SNMP 3 Click the SNMP Trap Destinations tab. The SNMP Trap Destinations panel is displayed. 4 Click the Add button. The Add Trap Destination dialog box opens. 5 Configure the Add Trap Destination attributes. 143 Table 44 Add Trap Destination Attributes Attribute Action Name Enter a name for the trap. Host Enter the IP address of the trap destination. Port Enter the UDP port number from which the trap will be sent. The default value is 162.
Chapter 6 Managing BCM50 with SNMP 3 Click the Modify button. The Modify Trap Destination dialog box opens. 4 Configure the Modify Trap Destination attributes. Table 45 Modify Trap Destination Attributes Attribute Action Name Enter a name for the trap. Host Enter the IP address of the trap destination. Port Enter the UDP port number from which the trap will be sent. The default value is 162. SNMP Version Select the version of the SNMP Agent for the trap. Options are: v1/v2C, and v3.
Chapter 6 Managing BCM50 with SNMP 145 To configure auto-SNMP dialout 1 Click the Configuration tab. 2 Open the Resources folder, and then click Network Interface. 3 Click the Dial-out Parameters tab. The Dial-out Parameters panel is displayed. 4 In the Dial-out Number field, enter a phone number for the modem to use. 5 In the Dial-out Routes area, click the Add button and enter a route and subnet mask.. 6 In the Static IP Address Pool area, enter a static IP address.
Chapter 6 Managing BCM50 with SNMP NN40020-600
Chapter 7 Using the BCM Fault Management System This chapter contains information about managing alarms generated by the BCM system and administering alarm settings. The chapter provides information about the following: • • • • • • • an overview of BCM fault management tools an overview of BCM alarms alarms and log files administering alarms configuring alarm settings BCM alarm list alarm severities Overview of BCM fault management You can view and manage real-time alarms generated by the BCM system.
Chapter 7 Using the BCM Fault Management System About BCM alarms Alarms are generated by software components that are running on the BCM system, and cover BCM services and applications. Each component has a range of alarm IDs, so that each BCM alarm has a unique alarm ID. Table 47 lists the components and the alarm ID ranges.
Chapter 7 Using the BCM Fault Management System 149 Alarms and log files All alarms that appear in the BCM Element Manager Alarms Panel are logged in the alarms.systemlog file. This file is capped at 1 MB in size; when the file reaches this size, a new alarms.systemlog file is started. The BCM keeps the current file as well as three previous files. The file is also capped and a new file is started when the BCM system is rebooted. You can retrieve the alarms.
Chapter 7 Using the BCM Fault Management System Administering alarms Alarm information can be delivered to you by any of the following means: • • • • • the Alarms Panel in the BCM Element Manager the Alarm Banner in the BCM Element Manager the alarm set (core telephony alarms only) Simple Network Management Protocol (SNMP) traps for remote management of faults LEDs on the BCM main unit Using the Alarms Panel You can view real-time alarm information using the Alarms Panel in the BCM Element Manager.
Chapter 7 Using the BCM Fault Management System 151 To view an alarm When you view an alarm on the alarms panel, you can change the order of the columns in the table and you can sort alarms. For example, you may want to sort alarms by Component ID and Alarm ID. 1 Click the Administration tab. 2 Open the General folder, and then click the Alarms task. The Alarms page opens. 3 In the Alarms Panel table, select an alarm. The Alarm Details panel displays below the Alarms table.
Chapter 7 Using the BCM Fault Management System 3 On the Alarms panel, click the Clear Alarm Log button. The Alarms table is cleared. Any new alarms will be displayed after the next alarm polling interval. Using the Alarm Banner You can use the Alarm Banner in the BCM Element Manager to view current alarm counts and recent alarm activity on the BCM system. The Alarm Banner appears on the bottom-right corner of the BCM Element Manager window.
Chapter 7 Using the BCM Fault Management System 153 Each alarm severity counter has a graph, which represents a data sample of the last 20 polling intervals. The graph has a color to indicate a data change. The colors are as follows: Table 50 Alarm graph colors Color Indicates Green There are no alarms of this severity, or there are alarms of this severity but the count has decreased since the last polling interval.
Chapter 7 Using the BCM Fault Management System Figure 26 shows an example of an alarm on the alarm set. Figure 26 Alarm set alarm To specify the alarm set 1 Click the Configuration tab. 2 Open the Telephony folder. 3 Open the Global Settings folder, and then click the Feature Settings task. The Feature Settings page opens. 4 In the Feature Settings area, enter the DN of the telephone set that you want to use for the alarm set in the Alarm Set field.
Chapter 7 Using the BCM Fault Management System 155 Using the BCM Element Manager, you can reset the Status LEDs on the front panel of the BCM to a normal state. Note: Once the Status LED has changed to red in response to a Critical or Major alarm condition, it remains in the alarmed state until you reset it using the BCM Element Manager. To reset the Status LED 1 Click the Administration tab. 2 Open the General folder, and then click the Alarms task. The Alarms panel opens.
Chapter 7 Using the BCM Fault Management System • • • • the maximum number of alarms to display in the Alarms Panel (from 50 to 400) whether to enable or disable SNMP traps for selected alarms; by default, all Critical and Major alarms are sent as SNMP traps if you have specified one or more trap destinations whether to display selected alarms in the Alarms table; by default all Critical, Major, Minor, and Warning alarms are displayed in the Alarms table whether to display selected alarms on the alar
Chapter 7 Using the BCM Fault Management System 4 157 The Enable Alarm Set column indicates whether the alarm will display on the alarm set. To test an alarm 1 Click the Administration tab. 2 Open the General folder, and then click the Alarm Settings task. The Alarm Settings panel opens. 3 In the Alarms table, select an alarm. 4 Click the Test Alarm button. In the Alarms table, “Test Event” is displayed in the alarm Problem Description field. List of BCM alarms Table 51 lists BCM alarms.
Chapter 7 Using the BCM Fault Management System 6 35 critical Core Telephony 7 36 critical Core Telephony 8 37 critical Core Telephony 9 39 critical Core Telephony 10 40 critical Core Telephony 11 41 critical Core Telephony NN40020-600 Core Telephony Media Bay Module firmware download failure. Power down the Yes system and check the expansion chassis connections. Check for corresponding alarm 31 or 79 to determine which module is having issues.
Chapter 7 Using the BCM Fault Management System 12 42 critical Core Telephony 13 43 critical Core Telephony 14 44 critical Core Telephony 15 45 critical Core Telephony 16 46 critical Core Telephony Core Telephony "Loss of Frame" long term alarm threshold has been exceeded on the DTM. Check your cabling Yes from any DTM modules to the external network and run loopback tests on the circuit to check for network issues.
Chapter 7 Using the BCM Fault Management System 17 47 critical Core Telephony 18 50 critical Core Telephony 19 51 critical Core Telephony 20 52 critical Core Telephony 21 54 warning Core Telephony 22 55 warning Core Telephony 23 61 critical Core Telephony 24 62 critical Core Telephony NN40020-600 Core Telephony - Check your cabling Yes "Remote Alarm from any DTM Indication" long term modules to the alarm threshold has external network and been exceeded on run loopback
Chapter 7 Using the BCM Fault Management System 25 63 critical Core Telephony 26 67 critical Core Telephony 27 68 critical Core Telephony 28 69 critical Core Telephony 29 71 warning Core Telephony 30 72 critical Core Telephony 31 75 critical Core Telephony 32 77 critical Core Telephony Core Telephony - If this happens more Yes No DTMF receivers than once in a 5 available. minute span check that any auto answer or DISA configured trunks are operating properly.
Chapter 7 Using the BCM Fault Management System 33 79 critical Core Telephony 34 194 critical Core Telephony 35 224 critical Core Telephony 36 247 critical Core Telephony 37 260 minor Core Telephony 38 262 minor Core Telephony 39 263 minor Core Telephony 40 265 minor Core Telephony NN40020-600 Core Telephony ASM firmware download error. Power down the Yes system and check the ASM hardware and the expansion chassis connections.
Chapter 7 Using the BCM Fault Management System 41 270 minor Core Telephony 42 271 minor Core Telephony 43 323 minor Core Telephony 44 324 minor Core Telephony 45 325 minor Core Telephony Core Telephony - If the event occurs Yes Set initialization more than once in a error from an invalid 5 minute span then message from the disconnect the set in set. question. If problem stops replace set and check cable between set and system.
Chapter 7 Using the BCM Fault Management System 46 326 minor Core Telephony 47 327 minor Core Telephony 48 328 minor Core Telephony 49 329 minor Core Telephony NN40020-600 Core Telephony - Check your cabling Yes "Slip Underflow" from any DTM short term alarm modules to the threshold has been external network and exceeded on the run loopback tests DTM. The module is on the circuit to in a no-new-calls check for network state. issues.
Chapter 7 Using the BCM Fault Management System 50 330 minor Core Telephony 51 331 minor Core Telephony 52 332 minor Core Telephony 53 333 minor Core Telephony Core Telephony - Check your cabling Yes "Loss of Frame" from any DTM short term alarm modules to the threshold has been external network and exceeded on the run loopback tests DTM. The module is on the circuit to in a no-new-calls check for network state. issues.
Chapter 7 Using the BCM Fault Management System 54 334 minor Core Telephony 55 335 minor Core Telephony 56 336 information Core Telephony 57 367 minor Core Telephony 58 372 warning Core Telephony 59 401 minor Core Telephony 60 608 minor Core Telephony NN40020-600 Core Telephony - Check your cabling Yes "Alarm Indication" from any DTM short term alarm modules to the threshold has been external network and exceeded on the run loopback tests DTM.
Chapter 7 Using the BCM Fault Management System 61 639 minor Core Telephony 62 799 minor Core Telephony 63 894 minor Core Telephony 64 901 critical Core Telephony 65 949 minor Core Telephony 66 999 warning 67 1001 major Core Telephony Operating System 68 1002 critical Operating System 69 2100 information Software Updates 70 2101 information Software Updates 71 2102 information Software Updates 72 2103 information Software Updates 73 2104 information Softwar
Chapter 7 Using the BCM Fault Management System 76 2300 critical Software Updates 77 2301 major Software Updates 78 2302 critical Software Updates 79 2303 major Software Updates 80 2304 major Software Updates 81 5001 critical Persistent Data Repository 82 5002 critical Persistent Data Repository 83 5003 critical Persistent Data Repository 84 6000 minor Date and Time 85 6004 critical Date and Time 86 6007 minor Date and Time 87 6008 minor Date and Time NN
Chapter 7 Using the BCM Fault Management System 88 6010 critical Date and Time Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes No No No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes critical Modem Call Control Date and Time Don't reboot the Real time clock on system and contact system not working your local support properly. group. Modem Call Control Reboot system and - MCC stopped contact your local unexpectedly. support group.
Chapter 7 Using the BCM Fault Management System 104 8018 information 105 8019 information 106 8020 Warning 107 8021 information 108 8022 information 109 8023 information 110 8024 information 111 8025 Warning 112 8029 Warning 113 8030 Warning 114 8031 Warning 115 8032 Warning 116 8033 Warning 117 8035 information 118 8038 information NN40020-600 Modem Call Modem Call Control No Action Required. Yes Control - MCC Incoming Call on Busy Modem [%s].
Chapter 7 Using the BCM Fault Management System 119 8040 Warning 120 8041 information 121 8042 Warning 122 10001 critical 123 10002 critical 124 10003 critical 126 10005 critical 127 10006 critical Modem Call Modem Call Control Contact your local Yes Control - MCC Failed to support group. Open Prompts Library. NNU Return Code = %ld. Modem Call Modem Call Control No Action Required. Yes Control - MCC Modem DN changed in admin.
Chapter 7 Using the BCM Fault Management System 128 10007 critical Service Manager 129 10008 critical Service Manager 131 10009 critical Service Manager 132 10010 critical Service Manager 133 10011 critical Service Manager NN40020-600 Service Manager - Check for Yes Call Detail corresponding alarm Recording Service 10107 or 10307. If (CDRService) has service doesn't stopped restart then reboot unexpectedly.
Chapter 7 Using the BCM Fault Management System 134 10012 critical Service Manager 135 10013 critical Service Manager 136 10014 critical Service Manager 137 10015 critical Service Manager 138 10016 critical Service Manager Service Manager - Check for Yes Line Monitor Service corresponding alarm (lms) has stopped 10112 or 10312. If unexpectedly. This service doesn't will affect the Line restart then reboot Service Manager - system and contact Monitor in BCM your local support Monitor.
Chapter 7 Using the BCM Fault Management System 139 10017 critical Service Manager 140 10018 critical Service Manager 141 10019 critical Service Manager 142 10020 critical Service Manager 143 10021 critical Service Manager NN40020-600 Service Manager - Check for Yes Keycode Service corresponding alarm (cfsserver) has 10117 or 10317. If stopped service doesn't unexpectedly. This restart then reboot will affect the ability system and contact to enter any new your local support keycodes.
Chapter 7 Using the BCM Fault Management System 145 10024 critical Service Manager 146 10025 critical Service Manager 150 10029 critical Service Manager 153 10032 minor Service Manager 154 10033 minor Service Manager 156 10101 critical Service Manager Service Manager - Check for Yes IP Terminal Service corresponding alarm (EchoServer) has 10124 or 10324. If stopped service doesn't unexpectedly.
Chapter 7 Using the BCM Fault Management System 157 10102 critical Service Manager 158 10103 critical Service Manager 160 10105 critical Service Manager 161 10106 critical Service Manager 162 10107 critical Service Manager 163 10108 critical Service Manager NN40020-600 Service Manager - Reboot system and CallPilot has contact your local stopped support group. unexpectedly and could not be restarted by service manager.
Chapter 7 Using the BCM Fault Management System 165 10109 critical Service Manager 166 10110 critical Service Manager 167 10111 critical Service Manager 168 10112 critical Service Manager 169 10113 critical Service Manager 170 10114 critical Service Manager Service Manager - Reboot system and Modem Call Control contact your local (modemcc) has support group. stopped unexpectedly and could not be restarted by service manager.
Chapter 7 Using the BCM Fault Management System 171 10115 critical Service Manager 172 10116 critical Service Manager 173 10117 critical Service Manager 174 10118 critical Service Manager 175 10119 critical Service Manager NN40020-600 Service Manager - Reboot system and Media Gateway contact your local Server (mgs) has support group. stopped unexpectedly and could not be restarted by service manager. This will affect all IP Telephony.
Chapter 7 Using the BCM Fault Management System 176 10120 critical Service Manager 177 10121 critical Service Manager 178 10122 critical Service Manager 180 10124 critical Service Manager 181 10125 critical Service Manager Service Manager - Reboot system and Yes Web Server (httpd) contact your local has stopped support group. unexpectedly and could not be restarted by service manager. This will affect the onbox web pages, downloads and documentation.
Chapter 7 Using the BCM Fault Management System 185 10129 critical Service Manager 188 10132 critical Service Manager 189 10133 critical Service Manager 191 10201 Warning Service Manager 192 10202 Warning Service Manager NN40020-600 Service Manager - Reboot system and Yes Doorphone service contact your local (BCM_Doorphone) support group. has stopped unexpectedly and could not be restarted by service manager. This will affect the ability to use a doorphone on the system.
Chapter 7 Using the BCM Fault Management System 193 10203 Warning Service Manager 195 10205 Warning Service Manager 196 10206 Warning Service Manager 197 10207 Warning Service Manager Service Manager - No Action Required. Yes IP Terminal Service (UTPS) has been stopped either due to user action or because Service Manager has stopped this service due to a dependency on another service that has been stopped. This will affect service on all IP terminals on the system.
Chapter 7 Using the BCM Fault Management System 198 10208 Warning Service Manager 200 10209 Warning Service Manager 201 10210 Warning Service Manager 202 10211 Warning Service Manager NN40020-600 Service Manager - No Action Required. Yes Voice Application Interface Service (ctiserver) has been stopped either due to user action or because Service Manager has stopped this service due to a dependency on another service that has been stopped.
Chapter 7 Using the BCM Fault Management System 203 10212 Warning Service Manager 204 10213 Warning Service Manager 205 10214 Warning Service Manager 206 10215 Warning Service Manager Service Manager - No Action Required. Yes Line Monitor Service (lms) has been stopped either due to user action or because Service Manager has stopped this service due to a dependency on another service that has been stopped. This will affect the Line Monitor in BCM Monitor.
Chapter 7 Using the BCM Fault Management System 207 10216 Warning Service Manager 208 10217 Warning Service Manager 209 10218 Warning Service Manager 210 10219 Warning Service Manager NN40020-600 Service Manager - No Action Required. Yes Persistent Data Repository (Pdrd) has been stopped either due to user action or because Service Manager has stopped this service due to a dependency on another service that has been stopped. This will affect any management done to running services.
Chapter 7 Using the BCM Fault Management System 211 10220 Warning Service Manager 212 10221 Warning Service Manager 214 10224 Warning Service Manager Service Manager - No Action Required. Yes Web Server (httpd) has been stopped either due to user action or because Service Manager has stopped this service due to a dependency on another service that has been stopped. This will affect the onbox web pages, downloads and documentation. Service Manager - No Action Required.
Chapter 7 Using the BCM Fault Management System 215 10225 Warning Service Manager 219 10229 Warning Service Manager 222 10232 Warning Service Manager 223 10233 Warning Service Manager NN40020-600 Service Manager - No Action Required. Yes IP Terminal Firmware upload Service (UftpServer) has been stopped either due to user action or because Service Manager has stopped this service due to a dependency on another service that has been stopped.
Chapter 7 Using the BCM Fault Management System 225 10301 Information Service Manager 226 10302 Information Service Manager 227 10303 Information Service Manager 228 10304 Information Service Manager 229 10305 Information Service Manager 230 10306 Information Service Manager 231 10307 Information Service Manager 232 10308 Information Service Manager 233 10309 Information Service Manager 234 10310 Information Service Manager 235 10311 Information Service Manager 236 10312 Information
Chapter 7 Using the BCM Fault Management System 237 10313 Information Service Manager 238 10314 Information Service Manager 239 10315 Information Service Manager 240 10316 Information Service Manager 241 10317 Information Service Manager 242 10318 Information Service Manager 243 10319 Information Service Manager 244 10320 Information Service Manager 245 10321 Information Service Manager 246 10322 Information Service Manager 248 10324 Information Service Manager NN40020-600 Servi
Chapter 7 Using the BCM Fault Management System 249 10325 Information Service Manager 253 10329 Information Service Manager 256 10332 Information Service Manager 257 10333 Information Service Manager 259 10906 Information Startup Sequence 261 10907 Information Startup Sequence 263 10908 Information Startup Sequence 264 10909 Information Startup Sequence 266 11002 Information Platform Status Monitor 267 11003 Information Platform Status Monitor Service Manager - No Action Required.
Chapter 7 Using the BCM Fault Management System 268 11004 Information Platform Status Monitor 269 11005 Information Platform Status Monitor 270 11006 Information Platform Status Monitor 271 11011 Information Platform Status Monitor 272 11012 Information Platform Status Monitor 273 11014 Information Platform Status Monitor 274 11015 Information Platform Status Monitor 275 11016 Information Platform Status Monitor 276 11017 Information Platform Status Monitor 277 11018 Information Pla
Chapter 7 Using the BCM Fault Management System 282 11203 minor Platform Status Monitor 283 11204 major Platform Status Monitor 284 11209 major Platform Status Monitor 285 11210 major Platform Status Monitor 286 11212 major Platform Status Monitor 287 11213 major 288 11214 warning 289 11215 warning Platform Status Monitor Platform Status Monitor Platform Status Monitor 290 11216 warning Platform Status Monitor 291 11217 warning Platform Status Monitor 292 11250 major Platform
Chapter 7 Using the BCM Fault Management System 293 11400 minor Platform Status Monitor 295 11405 critical Platform Status Monitor 296 11406 critical Platform Status Monitor 297 11408 critical Platform Status Monitor 298 11409 critical Platform Status Monitor 299 11502 critical Platform Status Monitor 300 12001 major Backup and Restore 301 12002 major Backup and Restore 302 12003 major Backup and Restore 303 12004 major Backup and Restore 304 12005 major Backup and Rest
Chapter 7 Using the BCM Fault Management System 307 12008 warning Backup and Restore 308 12009 major Backup and Restore 309 12010 minor Backup and Restore 310 12011 minor Backup and Restore 311 12012 major Backup and Restore 312 12013 major Backup and Restore 313 12014 major Backup and Restore 314 12015 major Backup and Restore 315 12016 warning Backup and Restore 316 12017 warning Backup and Restore 317 12018 major Backup and Restore 318 12019 warning Backup and Restore
Chapter 7 Using the BCM Fault Management System 321 12022 major Backup and Restore 322 12023 major Backup and Restore 323 12024 major Backup and Restore 324 12025 major Backup and Restore 325 12026 major Backup and Restore 326 12027 critical Backup and Restore 327 12028 minor Backup and Restore 328 12029 major Backup and Restore 329 12030 minor Backup and Restore 330 12031 minor Backup and Restore 331 12032 major Backup and Restore 332 12033 minor Backup and Restore
Chapter 7 Using the BCM Fault Management System 335 12036 warning Backup and Restore 336 12037 minor Backup and Restore 337 12038 minor Backup and Restore 338 12041 minor Backup and Restore 356 12059 major Backup and Restore 357 12202 Information Backup and Restore 358 12203 Information Backup and Restore 359 12204 Information Backup and Restore 360 12205 Information Backup and Restore 361 12206 Information Backup and Restore 362 13002 Information UPS 363 13003 Information UPS
Chapter 7 Using the BCM Fault Management System 367 13007 warning UPS 368 13008 warning UPS 369 13009 Information UPS 370 13010 Information UPS 371 13011 Information UPS 372 13012 major UPS 373 13013 major UPS 374 13014 Information UPS 375 13015 major 376 13016 Information UPS 377 13017 Information UPS 378 13018 Information UPS 379 13019 warning 380 13020 Information UPS 381 13021 Information UPS 382 16001 Information Configuration Change 383 17002 Information Syst
Chapter 7 Using the BCM Fault Management System 387 388 389 390 391 392 393 394 395 396 397 398 399 400 17005 Information System Set System Set Based No Action Required. Yes Based Admin Admin - UserId=X, user account deleted successfully, Dn=Y. 17006 Information System Set System Set Based No Action Required. Yes Based Admin Admin - UserId=X, password changed successfully, Dn=Y. 17007 Information System Set System Set Based No Action Required. Yes Based Admin Admin - DHCP client enabled for eth1.
401 402 403 404 405 406 407 408 409 410 411 Chapter 7 Using the BCM Fault Management System 17120 warning System Set System Set Based Log back into Yes Based Admin Admin - Key code System Set based activation failed. admin to verify change. If problem persists contact your local support group. 17121 warning System Set System Set Based Log back into Yes Based Admin Admin - Key code System Set based set failed. admin to verify keyccode. If problem persists contact your local support group.
Chapter 7 Using the BCM Fault Management System 412 30100 major 413 30101 information 414 30200 information 415 30201 information 416 30202 minor 417 30203 information 418 30300 information 419 30301 information 420 30302 information 421 30303 information 422 30304 information 423 30400 information 424 30401 information 425 30402 information 426 30403 information 427 30404 information System Authenticatio n System Authenticatio n System Authentication User Locked out.
Chapter 7 Using the BCM Fault Management System 430 31006 critical Keycodes 431 31007 critical Keycodes 432 31019 warning Keycodes 433 31045 critical Keycodes 434 31052 critical Keycodes 435 31055 critical Keycodes 436 31056 critical Keycodes 437 31057 critical Keycodes 438 31058 critical Keycodes 439 31059 critical Keycodes 440 31062 critical Keycodes 441 31063 critical Keycodes 442 31067 critical Keycodes 443 31068 critical Keycodes 444 31079 critical Keyc
Chapter 7 Using the BCM Fault Management System 448 40003 critical Media Services Manager MSM - Unable to communicate with DSP. Reboot system and Yes if problem persists contact your local support group. Contact your local Yes support group. Yes Yes Yes 449 40004 warning MSM - DSP audit failed. 450 40005 critical Media Services Manager Media Services Manager No No No If alarm 40002 Yes proceeds this then no action required otherwise contact your local support group.
Chapter 7 Using the BCM Fault Management System 466 43008 information Voice CTI 467 43009 warning Voice CTI 468 43010 critical Voice CTI 496 50001 critical Unistim Terminal Proxy Server 497 50002 critical Unistim Terminal Proxy Server 498 50003 critical Unistim Terminal Proxy Server 499 50004 critical Unistim Terminal Proxy Server 500 50005 critical Unistim Terminal Proxy Server NN40020-600 Voice CTI - More than 20 percent voice file space available.
Chapter 7 Using the BCM Fault Management System 501 50006 critical 502 50007 critical 503 50008 critical 504 50009 critical 505 50010 critical 506 50011 critical 507 50012 critical 508 50013 critical 509 50014 critical Unistim UTPS failed to Contact your local Terminal establish a link to support group. Proxy Server the SRG process. Aborting with error << errorCode. Unistim UTPS opened a link Contact your local Terminal with the SRG support group.
Chapter 7 Using the BCM Fault Management System 510 50015 critical 511 50050 critical 512 50060 critical 513 50061 critical 514 50062 critical 515 50064 critical 516 50065 critical 517 50101 major 518 50102 major 519 50103 major 520 50104 major 521 50105 major 522 50106 major NN40020-600 Unistim The UTPS couldn't Contact your local Terminal find the network support group. Proxy Server adaptor that is bound to the published IP address - aborting.
Chapter 7 Using the BCM Fault Management System 523 50108 major 524 50109 major 525 50110 major 526 50111 major 527 50112 major 528 50113 major 529 50114 major 530 50115 major 531 50116 major 532 50117 major 533 50118 major 534 50119 major 535 50120 major Unistim Error << errorCode Contact your local Terminal << writing support group. Proxy Server advertisement logo \ << logo<< \ to PDR. Unistim Error << errorCode Contact your local Terminal << changing support group.
Chapter 7 Using the BCM Fault Management System 536 50121 major 537 50122 major 538 50123 major 539 50124 major 540 50125 major 541 50192 major 542 50193 major 543 50194 major 544 50195 major 545 50196 major 546 50197 major NN40020-600 Unistim Attempt to Hot Desk Contact your local Terminal << dnToHighjack << support group. Proxy Server from << HighjackerDn << has failed because 'stand-by Hot Desking service' could be started [Debug information << sessionId << << errorCode << ].
Chapter 7 Using the BCM Fault Management System 547 50198 major 548 50300 information 549 50301 information 550 50302 information 551 50303 information 552 50304 information 553 50305 information 554 50306 information 555 50307 information 556 50308 information 557 50501 information Unistim Application::Run Contact your local Yes Terminal caught exception: support group. Proxy Server << exceptionType << FORCING EMERGENCY SHUTDOWN. Unistim ** Running the No Action Required.
Chapter 7 Using the BCM Fault Management System 558 50502 warning 559 50503 minor 560 50504 information 561 50505 warning 562 50506 minor NN40020-600 Unistim Packet Loss No Action Required. Yes Terminal Violation Warning: Proxy Server <>, near DN: <>, source IP: <>, source port: <>, destination IP: <>, destination port: <>, cT <>,eT <>,nLR <>,dR <>,bD <>,bL <>,gD <>,gL <>, eSD <>,aNL ,aSP <>,rTT <>. Unistim Packet Loss No Action Required.
Chapter 7 Using the BCM Fault Management System 563 50507 information 564 50508 warning 565 50509 minor 566 50510 information 567 50511 warning Unistim Round Trip Delay No Action Required. Yes Terminal Violation Cleared: Proxy Server <>, near DN: <>, source IP: <>, source port: <>, destination IP: <>, destination port: <>, cT <>,eT <>,nLR <>,dR <>,bD <>,bL <>,gD <>,gL <>, eSD <>,aNL ,aSP <>,rTT <>. Unistim Round Trip Delay No Action Required.
Chapter 7 Using the BCM Fault Management System 568 51010 warning VoIP Gateway VoIP Gateway configuration parameters not found.
Chapter 7 Using the BCM Fault Management System 585 52003 critical Media Path Server 586 52004 critical Media Path Server 587 52005 critical 588 52006 critical Media Path Server Media Path Server 589 52007 critical Media Path Server 590 52008 critical Media Path Server 591 52009 critical Media Path Server 592 52013 warning Media Path Server 593 52014 warning 594 53000 critical 595 53001 critical 596 53002 critical 597 53003 critical 598 53004 critical Media Path Server Me
Chapter 7 Using the BCM Fault Management System 604 53010 critical Media Gateway Server 605 53011 critical 606 53012 critical 607 53018 critical Media Gateway Server Media Gateway Server Media Gateway Server 608 53019 information 609 56003 major 610 56004 minor IP Telephony Provider 611 56005 major IP Telephony Provider 612 56006 minor IP Telephony Provider 613 57002 warning 614 57003 warning Survivable Remote Gateway Survivable Remote Gateway 615 57004 warning Survivable
Chapter 7 Using the BCM Fault Management System 619 57008 warning Survivable Remote Gateway 620 57250 minor Survivable Remote Gateway 621 57251 minor Survivable Remote Gateway 622 57252 minor Survivable Remote Gateway 623 57253 major Survivable Remote Gateway 624 57500 major Survivable Remote Gateway 625 57501 major Survivable Remote Gateway 626 57750 critical Survivable Remote Gateway 627 60005 critical LAN Driver Survivable Remote Check your local Yes Gateway - DN:XXX, configur
Chapter 7 Using the BCM Fault Management System NN40020-600
Chapter 8 Using the BCM50 Service Management System You can use the Element Manager to view and administer the services that run on the BCM50 system.
Chapter 8 Using the BCM50 Service Management System Table 52 BCM50 Services Service Name Description BCM_Doorphone Doorphone Service BCM_HostProviderAgent Cimom Provider BCM_IPMusicProviderAgent Cimom Provider BCM_LicenseProviderAgent Cimom Provider BCM_LogProviderAgent Cimom Provider BCM_MIB2ProviderAgent Cimom Provider BCM_SNMPProviderAgent Cimom Provider BCM_SRGProviderAgent Cimom Provider BCM_SecurityProvider Agent Cimom Provider BCM_TimeServiceProviderAgent Cimom Provider BC
Chapter 8 Using the BCM50 Service Management System 217 Table 52 BCM50 Services Service Name Description core_file_monitor core file monitoring service crond Cron Scheduler cti server CTI service feps Functional Endpoint Proxy Server (VoIP Gateway) httpd HTTP Daemon lms Line Monitor Server mgs Media Gateway Server modemcc modem service mib2agt MIB II service mps IP Telephony—Media Path owcimomd Open Wbem Cimom Server Daemon psm — qmond QoS Monitor securityservice Authenticatio
Chapter 8 Using the BCM50 Service Management System Starting, stopping, and restarting services You can stop any of the services that are running on the BCM50 system. Caution: Use the BCM50 Services Manager only as directed by Nortel Technical Support. Improper use of the BCM50 Services Manager may adversely affect system operation. To stop a service 1 Click the Administration tab. 2 Open the General folder, and then click the Service Manager task. The Service Manager page opens.
Chapter 9 Monitoring BCM50 Status and Metrics You can use the Element Manager to view detailed information about the performance of the BCM50 and about the performance of system resources. This chapter provides information about the following: • • system status telephony metrics About the system status Using the Element Manager, you can monitor overall system performance and other performance-related information.
Chapter 9 Monitoring BCM50 Status and Metrics To configure monitoring mode 1 On the Navigation tree, click the Administration tab, System Metrics, and QoS Monitor. 2 Configure the monitoring mode attributes. Table 53 Monitoring Mode attributes Attribute Action Disabled — Link-Monitor Mode Continuously test the connection between the BCM50 and remote endpoints.
Chapter 9 Monitoring BCM50 Status and Metrics 221 Figure 27 QoS Monitoring mode To configure logging attributes 1 On the Navigation tree, click the Administration tab, System Metrics, and QoS Monitor. 2 Configure logging attributes. Table 54 Logging attributes Attribute Action Enable Logging Enable the check box if you want to enable the logging of MOS scores. Maximum log file size Enter a value for the maximum size of the log file, from 1 to 10240 kilobytes (KB). The default is 10 KB.
Chapter 9 Monitoring BCM50 Status and Metrics Figure 28 QoS Logging attributes To view the QoS monitoring information The Mean Opinion Scores table displays the current network quality described as a Mean Opinion Score (MOS) for each IP destination. You can view the MOS mapping. Unlike the BCM 3.x where both transmit and receive values were reported, the QoS Monitor collects only the transmit values. Table 55 lists the fields displayed in the Mean Opinion Score table.
Chapter 9 Monitoring BCM50 Status and Metrics 223 Table 55 Mean Opinion Score descriptions (Continued) Attribute Description Name Displays the name of the Remote Gateway G.723-5.3kbit/s Displays the current MOS value calculated when using a G.723 5.3 kbit/s codec to transmit VoIP packets to this Remote Gateway. The MOS can be a value from 0.00 to 5.00, where 0.00 is the worst score (Poor) and 5.00 is best score (Excellent). G.723-6.3kbit/s Displays the current MOS value calculated when using a G.
Chapter 9 Monitoring BCM50 Status and Metrics The UPS Status panel confirms that a UPS is connected including model and serial number, its current status, and provides a read out of the current values. Additionally, an indication is given whether the value is within the normal range or not. The UPS Status panel tracks occurrences of alarms pertaining to UPS operation. These alarms are also sequentially viewable in the Alarm panel.
Chapter 9 Monitoring BCM50 Status and Metrics 225 Figure 30 UPS Status page NTP Metrics Using Network Time Protocol (NTP), you can configure the time on the BCM50 indirectly from a single time server. NTP is a network protocol designed to synchronize the clocks of computers over an IP network. The NTP Metrics provide an overview of the integrity of the NTP time source.
Chapter 9 Monitoring BCM50 Status and Metrics To access the NTP Metrics 1 Open the Element Manager, click the Administration tab, click System Status and then select NTP Metrics in the navigation tree. See Figure 31. Figure 31 NTP Metrics The NTP Metrics panel displays information contained in Table 56.
Chapter 9 Monitoring BCM50 Status and Metrics 227 Telephony Metrics The following sections provide a general overview of the Element Manager Telephony Metrics headings. The Telephony Metrics folder groups together a number of BCM50 system status tracking different aspects of Telephony services.
Chapter 9 Monitoring BCM50 Status and Metrics Figure 32 Viewing Trunk Module metrics 3 Click Start Loopback Test button to start the network test without having to remove the BCM50. 4 Select a loopback type. The options are: • • • • 5 payload line card edge continuity Click Stop Loopback Test when done the test of the network.
Chapter 9 Monitoring BCM50 Status and Metrics 229 Viewing Performance History information The Performance History tab displays the performance information over 15-minute intervals collected in the past 24 hours. The performance information collected includes the number of errored seconds, severely errored seconds, and unavailable seconds over each 15-minute interval. 1 On the navigation tree, click Administration, Telephony Metrics, Trunk Module Metrics.
Chapter 9 Monitoring BCM50 Status and Metrics To provision a PRI B-channel 1 Choose Administration, Telephony Metrics, Trunk Module Metrics. 2 Choose an expansion module. 3 Choose B channels. A list of the B channels on this module appears. 4 Click a channel, for example, B 01 The display shows the status of the PRI channel. 5 On the Configuration menu, click Enable or Disable to change the setting for the channel.
Chapter 9 Monitoring BCM50 Status and Metrics • • • 231 the number of bipolar violations that occurred in the last minute any defects that occurred in the last minute, such as loss of signal (LOS), out of frame (OOF), and alarm indication signal (AIS) the number of milliseconds of short-term alarms in the last minute, such as loss of signal (LOS), out of frame (OOF), alarm indication signal (AIS), and remote alarm indication (RAI).
Chapter 9 Monitoring BCM50 Status and Metrics 4 The Current interval displays the duration of the current 15-minute interval of the selected card, the number of errored seconds (ES), the number of severely errored seconds (SES) and the number of unavailable time seconds (UAS). 5 Click the 24-hour summary heading for an overall summary of the previous 24 hours. The Number of intervals, Errored Seconds, Severely Errored Seconds, Unavailable Seconds appear in the summary.
Chapter 9 Monitoring BCM50 Status and Metrics 233 To check short-term alarms 1 Choose Administration, Telephony Metrics, Trunk Module Metrics. 2 Choose an expansion module. 3 Click the CSU Alarms tab. The display shows the short term alarms and the number of milliseconds (not necessarily contiguous) that were active in the last minute. To check defects 1 Choose Administration > Telephony Metrics > Trunk Module Metrics. 2 Choose a an expansion module. 3 Click the CSU Alarms tab.
Chapter 9 Monitoring BCM50 Status and Metrics To access the CbC limit metrics 1 To access the CbC metrics, in the Element Manager, click the Administration tab, click the Telephony Metrics and then CbC Limit Metrics in the navigation tree. 2 To assess the capacity of the PRI call services on your system, on the Call by Call Metrics table, select the line pool for which you want to view CbC traffic. See Figure 33.
Chapter 9 Monitoring BCM50 Status and Metrics 235 Figure 34 Denied calls details Table 58 describes each field on the two CbC metrics panels. Table 58 Details for a Line Pool Attribute Value Call By Call Limit Metrics table Line Pool Read-only. The pool of lines that call-by-call limits are applied to. Calls denied because CbC limits were exceeded table Service Type Read-only. The type of service that the limits apply to. INCOMING due to Outgoing Min. Read-only.
Chapter 9 Monitoring BCM50 Status and Metrics This section provides the procedure for “To access the Hunt Group metrics”. Note: You can include Hunt Group hourly metrics files with the CDR data files when the are transferred to the central server. For more information on configuring this option, refer to the Call Detail Recording System Configuration Guide (NN40020-605).
Chapter 9 Monitoring BCM50 Status and Metrics 237 Table 59 Hunt Group Metrics fields (Continued) Attribute Value Total calls Read-only Total number of calls Answered: Total Read-only Total number of answered calls Answered Average% Read-only Average number of answered calls Answered: Average time (s) Read-only Average answer time in seconds Abandoned: Total Read-only Total number of abandoned calls Abandoned: Average% Read-only Average number of abandoned calls Busy: Total Read-only
Chapter 9 Monitoring BCM50 Status and Metrics Figure 36 Fallback Metrics panel Table 60 describes each field on the panel. Table 60 PSTN Fallback Metrics fields Attribute Value Description Last reset time This is the date and time the metrics table was last reset. Fallback requests The number of calls that were not able to route through the preferred trunk. Fallback failures The number of calls that were not able to route through the fallback trunk.
Chapter 9 Monitoring BCM50 Status and Metrics 239 You can use PVQM to configure and report threshold violations for the following voice quality metrics: • • • • packet loss—packets lost in transit due to errors or network failures inter arrival jitter—the variable delay on a packet as it traverses a network round trip delay listening R—the transmission quality as experienced by the user; this metric reflects the segment of the call that is carried over the RTP session There are two thresholds for PVQM m
Chapter 9 Monitoring BCM50 Status and Metrics Figure 37 PVQM panel 2 Configure the threshold value for each PVQM metric. The options are: • • • • warning (desktop) warning (soft client) unacceptable (desktop) unacceptable (soft client) Note: The term “desktop” indicates IP sets that are desktop models. The term “soft client” indicates IP sets that are software applications, such as the 2050 and the 2050MVC.
Chapter 9 Monitoring BCM50 Status and Metrics 241 Table 64 describes the settings. Table 62 PVQM threshold settings Default Value for Unacceptable thresholds Metric Description Packet Loss Rate The fraction of RTP data 0-100 packets from the source lost since the beginning of the call, expressed as a percentage. 1% 5% Inter-arrival Jitter The inter-arrivak time of incoming RTP packets, as defined in RFC 1889. Expressed in milliseconds.
Chapter 9 Monitoring BCM50 Status and Metrics Table 63 PVQM alarm information Abbreviation Attribute Value Description eSD end system delay milliseconds Average end system delay on the call aNL noise level dBm Measured received silent period noise level aSP average signal level dBm Measured received signal level during talk spurts rTT local round trip time average 1/65536 of a second Average round trip time on the call For a list of the alarms generated by PVQM threshold violations
Chapter 9 Monitoring BCM50 Status and Metrics 243 Figure 38 PVQM Metrics panel Table 64 describes each field on the panel. Table 64 PVQM Metrics fields Attribute Value Description Number of connections Displays the total number of connections by IP sets on the system since the last reset. This count includes non-interactive features such as dial tones, call progress tones, and music on hold. Last rest Displays the time of the last reset.
Chapter 9 Monitoring BCM50 Status and Metrics Table 64 PVQM Metrics fields Attribute Value Description Actions Reset Metrics NN40020-600 Click this button to clear out the metrics table. The Last reset time will display the current date and time.
Chapter 10 BCM50 Utilities This chapter contains information about the utilities that are part of the Element Manager. These utilities provide information about the BCM50 system, so that you can monitor and analyze system status and performance.
Chapter 10 BCM50 Utilities The following operating systems support BCM Monitor: • • • Windows 2000 Windows XP Citrix Installing BCM Monitor BCM Monitor is included with the installation of the BCM50 Element Manager. You do not need to download and install the utility separately, unless you are an administrative user who requires access to only this management tool and you do not have or require the BCM50 Element Manager.
Chapter 10 BCM50 Utilities 247 To start BCM Monitor without the Element Manager 1 Double-click the BCM Monitor shortcut on your desktop or find BCM Monitor in your Start/Programs menu. The Enter Logon Information window opens. 2 In the System Name or IP Address field, enter the system name of the BCM50 you want to monitor. 3 In the Connect As field, enter your BCM50 user name. 4 In the Password field, enter the password associated with your BCM50 user name. 5 Click the Connect button.
Chapter 10 BCM50 Utilities . Note: You can also launch the BCM Monitor from within the Element Manager by selecting Tools > BCM Monitor. Disconnecting BCM Monitor from a BCM50 On the File menu of the BCM Monitor, select Disconnect from BCM. BCM Monitor disconnects from the BCM50 system and clears all the fields. Note: If you do not want to connect to another BCM50 system, close the BCM Monitor application. This terminates the application and disconnects BCM Monitor from the BCM50 system.
Chapter 10 BCM50 Utilities 249 Static snapshots You can capture an instantaneous snapshot of system information in a text file. You specify which BCM Monitor tab you want to capture and then save the information to the .txt file. The file name embeds the time, date, and BCM50 name information so that you can view the data using Microsoft Word or another application at another time. Before you start a snapshot, you must configure static snapshot settings.
Chapter 10 BCM50 Utilities 7 Select the BCM Monitor tabs that you want to include in static snapshots in the Tabs Saved in Snapshot box. For example, if you want snaphots to include information about voice ports, make sure that Voice Ports is included in the Tabs Saved in Snapshot box. 8 To remove tabs from the snapshots definition, select a tab from the Tabs Saved in Snapshot box and use the arrow button to move the tab to the Tabs Not Saved in Snapshot box. 9 Click the OK button.
Chapter 10 BCM50 Utilities 251 You can: • • • specify which information you want to dynamically log enable or disable automated dynamic snapshots specify the interval of time between successive snapshots Time intervals are specified in seconds. You can specify a maximum number of snapshots or infinite logging. To configure dynamic snapshot settings 1 On the File menu, select Snapshot Settings. The Snapshot Settings panel opens. 2 Click the Dynamic Snapshot Settings tab.
Chapter 10 BCM50 Utilities 7 Select the BCM Monitor tabs that you want to include in dynamic snapshots in the Tabs Saved in Snapshot box. For example, if you want the snapshots to include information about voice ports, make sure that Voice Ports is included in the Tabs Saved in Snapshot box. 8 To remove a tab from the snapshots, select a tab from the Tabs Saved in Snapshot box and use the arrow button to move the tab to the Tabs Not Saved in Snapshot box.
Chapter 10 BCM50 Utilities 253 On the File menu, select Dynamic Snapshot, Start. BCM Monitor starts taking snapshots and saves the snapshot data in a file located in the folder you specified when you configured the dynamic snapshot settings. Stopping a dynamic snapshot On the File menu, select Dynamic Snapshot, Stop.
Chapter 10 BCM50 Utilities • • • Eth0 — indicates a LAN internal to the BCM50 system. Eth1 — indicates a customer LAN. This is the LAN accessible to the customer through ports 1, 2 and 3 on the front panel of the BCM50 main unit. Eth2 — OAM LAN. This is a dedicated OAM port accessible as port 0, the left-most Ethernet port on the front panel of the BCM50 main unit. Media Card tab The Media Card tab provides information about the telephony system of the BCM50.
Chapter 10 BCM50 Utilities 255 Voice Ports tab The Voice Ports tab displays real-time information about configured voice ports. A configured voice port is a logical device used for Voice Mail, and Contact Center. Values associated with voice ports change with the usage of the switch, and are therefore well suited for dynamic logging to view trends relating to system activity.
Chapter 10 BCM50 Utilities RTP Sessions tab The RTP Sessions tab shows details about RTP (Real Time Protocol over UDP) sessions, which involve either the BCM50 system or an IP set controlled by the BCM50 system. You can use the information in this tab to monitor the direct path between two IP sets.
Chapter 10 BCM50 Utilities 257 The IP Endpoint tokens contain information about each IP endpoint (type, DN, IP address, RTP port number). The IP Trunk tokens contain information about the IP Trunk used by each endpoint (if no trunk is used, the token is omitted). The stream info token shows which RTP streams are enabled between the two endpoints. The Codec token describes the codec type used for the RTP session. The FPP shows the negotiated value of frames per packet.
Chapter 10 BCM50 Utilities Enabling UIP message monitoring Caution: Monitoring UIP messages may affect the performance of the BCM50 system or connected peripherals. For example, if IP sets or voice ports make or receive a high number of calls over PRI trunks, monitoring UIP increases the amount of signalling data and may increase the response time for IP sets or voice ports. Therefore, it is strongly recommended that you monitor only a single UIP module at a time and restrict the monitoring time.
Chapter 10 BCM50 Utilities 259 To log UIP data 1 Click the UIP tab. 2 Select the Log UIP Data check box. You can log UIP data to track the most recent 20 UIP messages. If you enable UIP logging, BCM Monitor writes UIP messages in log files, which are created in the log folder in the BCM Monitor startup directory. One log file is generated for each monitored system and each module or loop. Log files are named IPAddr_MCDN.log, IPAddr_PRI_BusX.log, and IPAddr_BRI_BusXModuleYLoopZ.log.
Chapter 10 BCM50 Utilities • additional data extracted from information elements To expand a UIP message 1 Click the UIP tab. The Universal ISDN Protocol Messages area displays detailed information about monitored UIP modules. 2 In the Universal ISDN Protocol Messages area, double-click a UIP message. Information elements appear below the UIP message. To clear UIP message details 1 Click the UIP tab.
Chapter 10 BCM50 Utilities • • • • • 261 duration — displays the duration of the call direction — “Outgoing” indicates that the call originated from the BCM50; “Incoming” indicates that the call originated from outside and is directed at the BCM50 start time — displays the time and date on which the call started user — displays the DN and name of the BCM50 user state — displays Idle if there is no active call on the line; displays Dialing if the BCM50 user is in the process of dialing digits to place a c
Chapter 10 BCM50 Utilities Usage Indicators tab The Usage Indicators tab displays real time information about the BCM50 system. The tab displays the following information: • • • BCM50 system data, including CPU and memory use resources used on the Media Card, including signaling channels, media channels, voice bus channels, and DSP resources active telephony devices, such as IP trunks, IP sets.
Chapter 10 BCM50 Utilities 263 Using statistical values BCM Monitor stores the minimum and maximum values for many of the statistics that appear on BCM Monitor tabs. A statistic must be a numeric value and must change over time; that is, the value cannot be a static value. Examples of statistics that have minimum and maximum values are CPU usage, Active Lines, and Enabled i20XX sets.
Chapter 10 BCM50 Utilities The three values remain on the Status bar until you select another value. These values also continue to change as the value for the selected statistic changes. This is useful if you want to monitor a single statistic on one panel while you are viewing the information on another panel. Viewing the date and time of minimum and maximum values When BCM Monitor stores the minimum and maximum value, it also stores the date and time when the minimum or maximum occur.
Chapter 10 BCM50 Utilities 265 Ping Ping (Packet InterNet Groper) is a utility that you can use to verify that a route exists between the BCM50 and another device. Ping sends an ICMP (Internet Control Message Protocol) echo request message to a host. It expects an ICMP echo reply, which you can use to measure the round-trip time to the selected host. You can measure the percent packet loss for a route by sending repeated ICMP echo request messages. To ping a device 1 Click the Administration tab.
Chapter 10 BCM50 Utilities Note: Establishing a PPP link over a modem make take some time. If the Ping utility times out before the modem call can be established, click the Ping button again. Trace Route You can use Trace Route to measure round-trip times to all hops along a route. This helps you to identify bottlenecks in the network. Trace Route uses the IP TTL (time-to-live) field to determine router hops to a specific IP address. A router must not forward an IP packet with a TTL field of 0 or 1.
Chapter 10 BCM50 Utilities 267 To view Ethernet activity 1 Click the Administration tab. 2 Open the Utilities folder, and then click Ethernet Activity. The Ethernet Activity panel opens. 3 In the Ethernet Activity area, click the Retrieve button. Details are displayed in the Results area.
Chapter 10 BCM50 Utilities Rebooting the BCM50 system Caution: Rebooting the BCM50 system temporarily stops all services running on the system. To reboot the BCM50 1 Click the Administration tab. 2 Open the Utilities folder, and then click Reset. The Reset panel opens. 3 Click the Reboot BCM50 System button. A confirmation dialog box opens. 4 Click the OK button. The operating system of the BCM50 restarts.
Chapter 10 BCM50 Utilities 269 Performing a cold reset of BCM50 telephony services Caution: Performing a cold reset of telephony services erases all telephony programming, as well as all Voice Message mailboxes and messages. Telephony services will restart with all telephony programming at default values for the specified region, template, and start DN, for the current software release level. To perform a cold reset of BCM50 telephony services 1 Click the Administration tab.
Chapter 10 BCM50 Utilities Figure 39 Telephony diagnostic settings 3 From the Release Reason drop-down menu, select the level of reporting that you require. Table 70 lists the possible values for Release reasons. Table 70 Release reasons Attributes Values Description None Default Value No text will accompany a dropped call notification. Simple Cause Code: Off On Off: no text is provided On: the code only is provided Note: if you select Simple text, you must turn off the Cause code.
Chapter 11 Backing Up and Restoring BCM50 Data 271 Chapter 11 Backing Up and Restoring BCM50 Data This chapter provides information about how to back up and restore data from the BCM50 system. Overview of backing up and restoring data Before you make administrative changes or as your BCM50 system accumulates information, you can create a backup archive on the BCM itself, on a USB drive, or on another location on the network. At a later time, you can restore the data to the BCM50.
Chapter 11 Backing Up and Restoring BCM50 Data During the backup procedure, you can exclude a number of optional services from the backup operation to ensure that service is not interrupted. The remainder of the services and settings are automatically included during a backup operation. Table 71 lists the components that you can choose to include or exclude from the backup operation.
Chapter 11 Backing Up and Restoring BCM50 Data • • 273 email text-to-speech envelope information Caution: A backup operation can interrupt services running on the BCM. A warning displays whenever the backup will cause a service interruption. If you want to perform a backup that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a backup at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data For USB storage devices, an additional copy of the backup archive is stored in the file backup.tar; the BCM will reference this file during a USB restore operation. Only the most recent backup to the USB storage device is available for a restore operation. To access historical backup archives, attach the USB storage device to a personal computer and use the Restore from My Computer option.
Chapter 11 Backing Up and Restoring BCM50 Data 275 For more information about how to access and use the storage locations, see “BCM50 common file input/output processes” on page 69. Before you back up BCM50 data, make sure that the BCM50 has appropriate access to the shared resource on which you will store the data. You must set full access permissions on the shared resource.
Chapter 11 Backing Up and Restoring BCM50 Data 3 Click the Backup button. The Backup window opens. 4 In the Optional Components table, select or clear the check box for each component to include or exclude these components from the backup operation. 5 Click the OK button. A warning window opens. Read the warning carefully before proceeding. 6 Click the Yes button to proceed. A progress window opens. When the backup is complete, the Backup Complete message appears. 7 Click the OK button.
Chapter 11 Backing Up and Restoring BCM50 Data 277 Performing an immediate backup to your personal computer Caution: A backup operation can interrupt services running on the BCM. A warning displays whenever the backup will cause a service interruption. If you want to perform a backup that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a backup at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data Performing an immediate backup to a network folder Caution: A backup operation can interrupt services running on the BCM. A warning displays whenever the backup will cause a service interruption. If you want to perform a backup that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a backup at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data 279 Performing an immediate backup to a USB storage device Caution: A backup operation can interrupt services running on the BCM. A warning displays whenever the backup will cause a service interruption. If you want to perform a backup that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a backup at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data 4 Configure the FTP Server attributes. Table 74 Configure FTP Server attributes Attribute Action FTP Server Enter the hostname or IP address of the FTP server. User Name Enter the user name associated with the FTP server. Password Enter the password associated with the FTP server. Directory Enter the path to the subdirectory (optional). 5 Click the Backup button. The Backup window opens.
Chapter 11 Backing Up and Restoring BCM50 Data 281 Table 75 Configure SFTP Server attributes Attribute Action User Name Enter the user name associated with the SFTP server. Directory Enter the path to the subdirectory, as applicable. 5 Click the Backup button. The Backup window opens. 6 In the Optional Components table, select or clear the check box to include or exclude these components from the backup operation. 7 Click the OK button. A warning window opens.
Chapter 11 Backing Up and Restoring BCM50 Data You can change the order of the information in the table by clicking a column heading and dragging it to a new location in the table. You can list the information in a column in ascending or descending order by clicking a column heading. To view scheduled backups 1 In the task panel, click the Administration tab. 2 Open the Backup and Restore folder, and then click Backup. The Backup panel opens and displays the Immediate Backup tab.
Chapter 11 Backing Up and Restoring BCM50 Data 283 Performing a scheduled backup to the BCM50 Caution: A backup operation can interrupt services running on the BCM. A warning displays whenever the backup will cause a service interruption. If you want to perform a backup that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a backup at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data Performing a scheduled backup to a network folder Caution: A backup operation can interrupt services running on the BCM. A warning displays whenever the backup will cause a service interruption. If you want to perform a backup that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a backup at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data 9 285 Configure the schedule attributes. Table 79 Configure schedule attributes Attribute Action Memo Enter a note for the scheduled backup, as applicable. Recurrence Select how often the scheduled backup is to occur. Options are: Once, Daily, Weekly, Monthly. Depending on the option you choose, the window displays selections for the month and day of month. If you select Weekly, days of the week are displayed.
Chapter 11 Backing Up and Restoring BCM50 Data 8 Configure the schedule attributes. Table 80 Configure schedule attributes Attribute Action Memo Enter a note for the scheduled backup, as applicable. Recurrence Select how often the scheduled backup is to occur. Options are: Once, Daily, Weekly, Monthly. Depending on the option you choose, the window displays selections for the month and day of month. If you select Weekly, days of the week are displayed.
Chapter 11 Backing Up and Restoring BCM50 Data 6 287 Configure the FTP Server attributes. Table 81 Configure FTP Server attributes Attribute Action FTP Server Enter the hostname or IP address of the FTP server. User Name Enter the user name associated with the FTP server. Directory Enter the path to the subdirectory (optional). 7 Click the OK button. The Add Scheduled Backup window opens.
Chapter 11 Backing Up and Restoring BCM50 Data Performing a scheduled backup to an SFTP server Caution: A backup operation can interrupt services running on the BCM. A warning displays whenever the backup will cause a service interruption. If you want to perform a backup that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a backup at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data 289 Table 84 Configure schedule attributes Attribute Action Day of Month Select the day of the month on which the scheduled backup is to occur. Time Select the time at which the scheduled backup is to occur. 10 Click the OK button. The scheduled backup is displayed in the Scheduled Backups table. Modifying and deleting scheduled backups You can modify existing scheduled backups.
Chapter 11 Backing Up and Restoring BCM50 Data 7 Click the OK button. The modified backup is displayed in the Scheduled Backups table. To delete a backup schedule 1 In the task panel, click the Administration tab. 2 Open the Backup and Restore folder, and then click Backup. The Backup panel opens and displays the Immediate Backup tab. 3 Click the Scheduled Backups tab. The Scheduled Backups panel opens. 4 Select a scheduled backup in the Scheduled Backups table. 5 Click the Delete button.
Chapter 11 Backing Up and Restoring BCM50 Data 291 You can restore a backup to a different system; for example, to quickly bring a second system into service in a new installation. In this case, not all of the configuration information in the Configuration backup is relevant to the second system. You can select whether to restore device-specific configuration information, such as network settings. You may wish to exclude certain components from being restored.
Chapter 11 Backing Up and Restoring BCM50 Data Effects on the system A restore operation is a service-affecting operation. A number of services running on the BCM50 system are stopped and then restarted after the data has been restored. A reboot warning is displayed if any of the components selected for restoration require a system restart. Table 85 lists the effects of restoring optional components.
Chapter 11 Backing Up and Restoring BCM50 Data 293 Restoring data from the BCM50 Caution: A backup operation can interrupt services running on the BCM. A warning displays whenever the backup will cause a service interruption. If you want to perform a backup that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a backup at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data 6 Click the Yes button to proceed. A progress window opens. When the operation is complete, the Restore Complete window opens. 7 Click the OK button. Restoring data from your personal computer Caution: A restore operation can interrupt services running on the BCM. A warning displays whenever restoring data will cause a service interruption.
Chapter 11 Backing Up and Restoring BCM50 Data 295 Restoring data from a network folder Caution: A restore operation can interrupt services running on the BCM. A warning displays whenever restoring data will cause a service interruption. If you want to perform a restore operation that does not affect the system, you can exclude services that would be affected. Alternatively, you can include these services and perform a restore operation at a time when the system is typically not in use.
Chapter 11 Backing Up and Restoring BCM50 Data 8 Click the Yes button to proceed. A progress window opens. When the operation is complete, the Restore Complete window opens. 9 Click the OK button. Restoring data from a USB storage device Your BCM50 supports the ability to recover using the USB device. The backup must have been created on the USB device while directly attached to a BCM50. The BCM will select the most recent backup made to the USB device for the restore operation.
Chapter 11 Backing Up and Restoring BCM50 Data 9 297 Click the OK button. Restoring data from an FTP server Caution: A restore operation can interrupt services running on the BCM. A warning displays whenever restoring data will cause a service interruption. If you want to perform a restore operation that does not affect the system, you can exclude services that would be affected.
Chapter 11 Backing Up and Restoring BCM50 Data 8 Click the Yes button to proceed. A progress window opens. When the operation is complete, the Restore Complete window opens. 9 Click the OK button. Restoring data from an SFTP server Caution: A restore operation can interrupt services running on the BCM. A warning displays whenever restoring data will cause a service interruption.
Chapter 11 Backing Up and Restoring BCM50 Data 299 7 Click the OK button. A warning window opens and displays information about components that will be affected by the restore operation. Read the warning carefully before proceeding. 8 Click the Yes button to proceed. A progress window opens. When the operation is complete, the Restore Complete window opens. 9 Click the OK button. Restoring the factory configuration Caution: A restore operation is a service-affecting operation.
Chapter 11 Backing Up and Restoring BCM50 Data NN40020-600
Chapter 12 Managing BCM50 Logs This chapter contains information about viewing and managing log archives generated by the BCM50. Overview of BCM50 logs A log archive is a collection of individual log events generated by the BCM50. An administrator can use log archives to monitor and analyze system behavior, user sessions, and events. You manage logs by transferring selected BCM50 log archives from the BCM50 to a specified location, such as your personal computer.
Chapter 12 Managing BCM50 Logs Administrators have access to all log categories. Users who need only operational information have access to Operational and System Information logs. Operational logs Operational logs contain information about the BCM50 system and its use, such as alarm information, configuration changes, and security information. Administrators and authorized users can access Operational logs and view them using the Log Browser.
Chapter 12 Managing BCM50 Logs 303 The Sensitive Logs category includes only three log files for core telephony, LAN CTE, and Voice CTI. Caution: The Sensitive Logs category can become very large due to the large core telephony log files. ! Security Note: Once logs are transferred to an external location, the administrator is responsible for securing the information and controlling access to it. Additional System Information A set of System Information files is included with every log file transfer.
Chapter 12 Managing BCM50 Logs Transferring log files using the BCM50 Element Manager Using the BCM50 Element Manager, you can transfer log files by using: • • an immediate log transfer a scheduled log transfer You can create, modify, or delete a scheduled log transfer.
Chapter 12 Managing BCM50 Logs 305 Note: Log archives written to external devices (except My Computer) have a unique name based on the timestamp. This prevents earlier log archives from being overwritten. A device will eventually reach its capacity if log archives are not manually detected. To perform an immediate log transfer to a USB storage device 1 Click the Administration tab, and then open the Logs folder. 2 Click the Log Management task. The Log Management panel opens.
Chapter 12 Managing BCM50 Logs 6 Select the log file categories that you want to include in the log file transfer. All the log files associated with the selected categories will be transferred. 7 Click the OK button. A transfer window opens and displays applicable warnings. 8 Click the Yes button to initiate the transfer. The Progress Update window opens. When the log files are transferred, the Transfer Complete window opens. 9 Click the OK button.
Chapter 12 Managing BCM50 Logs 307 8 Click the Yes button to initiate the transfer. The Progress Update window opens. When the log archive is ready to be saved, the The Save window opens. 9 Select the directory in which you want to save the log file transfer. 10 In the File Name field, enter the name of the log file followed by a .tar extension. For example, log1.tar. Note: If you do not specify a .tar extension, the transfer proceeds and the file will be written to the specified location.
Chapter 12 Managing BCM50 Logs 7 Select the log file categories that you want to include in the log file transfer. 8 Click the OK button. A confirmation window opens, and displays applicable warnings. 9 Click the Yes button to initiate the transfer. The Progress Update window opens. When the log files are transferred, the Transfer Complete window opens. 10 Click the OK button. The log file is saved as a .tar file in the location you specified.
Chapter 12 Managing BCM50 Logs 309 10 Click the OK button. The log file is saved as a .tar file in the location you specified. Performing an immediate log transfer to an SFTP server Note: The time required to transfer log files varies with the amount of log data being collected and the speed of your devices and network. Note: You must set up the SFTP server to allow the BCM50 to communicate with the SFTP server.
Chapter 12 Managing BCM50 Logs Performing scheduled log transfers You can schedule a log transfer for a future date or for a single transfer, or for recurring future transfers. You can create multiple schedule entries. For example, you can transfer Operational logs and System Information logs on a daily basis and transfer Diagnostic and Sensitive Information logs on a weekly basis. You can also modify or delete a scheduled log transfer.
Chapter 12 Managing BCM50 Logs 8 Select the log file categories that you want to include in the log file transfer. 9 Configure the schedule attributes. 311 Table 94 Configure schedule attributes Attribute Action Memo Enter a note for the scheduled log transfer, as applicable. Recurrence Select how often the scheduled transfer is to occur. Options are: Once, Daily, Weekly, Monthly. Depending on the option you choose, the window displays selections for the month and day of month.
Chapter 12 Managing BCM50 Logs 3 Click the Scheduled Log Transfer tab. 4 In the Scheduled Log Transfer table, select a scheduled log file transfer. 5 Click the Modify button. The Modify Scheduled Transfer window opens. 6 In the Destination field, modify the destination as appropriate. 7 In the Memo field, modify the memo for the scheduled log transfer as appropriate.
Chapter 12 Managing BCM50 Logs 3 Click the Administrators Applications link. 4 Click the Retrieve Log Files link. 313 The Get Logs panel appears. 5 Click one of the three options for file transfer: Transfer to My Computer, Store on USB Memory, or Sent to. 6 If you select the Send to radio button, select a destination from the drop-down list, otherwise, go to the next step. 7 Click the Click Here to Download Logs link. The File Download screen opens. 8 Click the Save button.
Chapter 12 Managing BCM50 Logs To use the BCM50 Web Page to transfer log files to other destinations 1 In your web browser, type the IP address of the BCM50 and click the Go button. The login screen opens. 2 Log in to the BCM50 using the same user name and password that you use to log into a BCM50 using the BCM50 Element Manager. The BCM50 Web page opens. 3 Click the Administrators Applications link. 4 Click the Retrieve Logs link.
Chapter 12 Managing BCM50 Logs • 6 315 Windows Shared Folder If you selected a Send To option, configure the destination attributes. Table 95 Configure destination attributes Attribute Action Remote Resource Enter the FTP or SFTP address or the network pathway, as appropriate. Directory Enter the path of the directory to which you want to transfer the log files. UserID Enter the user ID associated with the remote resource. Password Enter the password associated with the remote resource.
Chapter 12 Managing BCM50 Logs 11 Click the Save button. The file is saved. Extracting log files Once you have transferred log files using the Element Manager or the BCM50 Web page, you can extract the log files using the Element Manager Log Browser. The log files must be extracted from the log archive before you can view them using the Element Manager Log Browser.
Chapter 12 Managing BCM50 Logs 317 7 Click the OK button to acknowledge an individual message, or click OK to All to acknowledge all messages once the extraction is complete. Alternatively, you can wait until the extraction is complete, and then close the window. Once the files are extracted, the View Log File window opens. 8 Select a log file folder, for example operationalLogs.tar. Select .systemlog from the Save as Type select field to show only log files that the Log Browser can display.
Chapter 12 Managing BCM50 Logs 10 Select a .systemlog file or a .log file, and click the Open button. The Log Browser opens and displays retrieval results for the selected log file. Viewing log files using the Log Browser The Log Browser is an application that you can use to search for and view information about log events from different types of data sources. You can determine what type of information you want to see and customize how you want to display the information.
Chapter 12 Managing BCM50 Logs 319 When you select an attribute from the Retrieval Criteria table, the Criteria Definition area to the right of the table displays the corresponding details for the attribute you selected. You can select or define the corresponding details. You can click the Pane View buttons at the top right corner of the Retrieval Criteria area to display a summary view of your selected criteria. This allows you to review selected criteria before you retrieve the logs.
Chapter 12 Managing BCM50 Logs Retrieval Results area The Retrieval Results area displays the list of log information that was retrieved according the criteria you selected in the Retrieval Criteria area. The information is displayed in a table that you can sort by clicking column headings. While the Log Browser is retrieving records, you can monitor the progress of the retrieval by following the progress counter. This counter also displays the elapsed time and the number of records found.
Chapter 12 Managing BCM50 Logs 321 Log details for the selected log records are displayed in the Log Details area, separated by dashed lines. 2 In the Retrieval Results list table, hold down the Control key and select log records to select multiple non-contiguous log records. Log details for the selected log records are displayed in the Log Details area, separated by dashed lines.
Chapter 12 Managing BCM50 Logs NN40020-600
Chapter 13 Managing BCM50 Software Updates This chapter contains information about managing BCM50 software updates. During the lifecycle of the BCM50, you can apply software updates to the BCM50 unit to introduce new functionality. Between software upgrades, you may find it necessary to apply software updates to resolve field issues. Both software upgrades and software updates are applied in the same manner.
Chapter 13 Managing BCM50 Software Updates Viewing software updates in progress You can view the status of software updates that are transferring or waiting to be transferred, or waiting to be applied. Table 97 lists the information that is available on the Updates in Progress table. Table 97 Information about updates in progress Detail Description Name The name of the software update. Version The version of the software update. Description A brief description of the software update.
Chapter 13 Managing BCM50 Software Updates 325 Table 98 lists the statuses of software updates. Table 98 Software update statuses Status Description Available The software update is available to be applied to the BCM50. Only an Available software update can be applied to the BCM50. Invalid A newer version of software has been applied to the BCM50,or a problem has been detected with the software update, and has rendered this software update invalid.
Chapter 13 Managing BCM50 Software Updates Applying a software update is a two-part process: 1 You transfer a software update to the BCM50, which validates the integrity of the software update and ensures that the BCM50 meets prerequisites for applying the software update. 2 You apply the software update to the BCM50, which then brings the update into service. Caution: Applying a software update to the BCM50 may be a service-affecting operation.
Chapter 13 Managing BCM50 Software Updates 327 Applying an update from your personal computer Caution: Applying a software update to the BCM50 is a service-affecting operation. Nortel recommends that you schedule updates for low-traffic hours. Caution: If a software update has a checkmark applied against it in the Reboot Req’d column of the Find Software Updates window, the BCM50 automatically restarts as soon as the update is applied. You do not receive a reboot confirmation before the reboot occurs.
Chapter 13 Managing BCM50 Software Updates 12 Click the Apply button to apply the update. A warning dialog box opens. 13 Click the OK button. The Software Update Complete confirmation window opens. 14 A dialog box opens to display the options available for this update. The options available depend on the update that you are applying. Select the appropriate options and click the OK button. If no options are available, click the OK button to continue.
Chapter 13 Managing BCM50 Software Updates 6 Click the OK button. The Find Software Updates window opens and displays a list of updates found in the specified location. 7 Select an update. The update must have a status of “Available”. 8 Click the Apply button. A confirmation window opens. 9 Click the Yes button. The Software Update Complete confirmation window opens. 329 10 Click the OK button. The Updates in Progress table lists the update as “In Progress”.
Chapter 13 Managing BCM50 Software Updates 6 Click the OK button. The Find Software Updates window opens and displays a list of updates found in the specified location. 7 Select an update. The update must have a status of “Available”. 8 Click the Apply button. A confirmation window opens. 9 Click the Yes button. The Software Update Complete confirmation window opens. 10 Click the OK button. The Updates in Progress table lists the update as “In Progress”.
Chapter 13 Managing BCM50 Software Updates 331 Table 100 Configure FTP Server attributes Attribute Action Password Enter the user name associated with the FTP server. Directory Enter the path to the location of the update. The path is relative to the root of the FTP server you are logging into. For example, if the root of the FTP server you have logged into is /public and your patches are located under /public/patches, you would enter patches as the directory. 6 Click the OK button.
Chapter 13 Managing BCM50 Software Updates 5 Configure the HTTP Server attributes. Table 101 Configure HTTP Server attributes Attribute Action HTTP Server Enter the IP address or host name of the remote computer, and the port number if required. Use HTTPS Check this box if the HTTP server requires SSL. User Name Enter the user name associated with the HTTP server. Password Enter the user name associated with the HTTP server. Directory Enter the path to the location of the update.
Chapter 13 Managing BCM50 Software Updates 333 Table 102 Information about scheduled software updates Columns Description Description A brief description of the update. Size The size of the software update, in kilobytes. Reboot Req’d Displays whether the software update causes the BCM50 to reboot when the update has been applied. If a reboot is required, the check box is checked. Location The storage location of the update. For example, FTP server. Status The status of the update.
Chapter 13 Managing BCM50 Software Updates 3 Click the Scheduled Updates tab. The Scheduled Software Updates panel opens. 4 Click the Add button. The Get New Updates window opens. 5 In the Retrieve From selection field, select the location where the software update is stored: • • • • • 6 USB Storage Device My Computer Network Folder FTP Server HTTP Server Select an update location and/or complete the appropriate access information.
Chapter 13 Managing BCM50 Software Updates 335 7 Click the OK button. The New Updates Found window opens and displays a list of updates found in the specified location. 8 Select an update. The update must have a status of “Available”. 9 To view the details for an update, click the Show Details button. The Details for Update window opens and displays any details about the update. Click the OK button to close the details window. 10 Click the Schedule button to create a schedule.
Chapter 13 Managing BCM50 Software Updates Modifying a scheduled software update Caution: Applying a software update to the BCM50 is a service-affecting operation. Nortel recommends that you schedule updates for low-traffic hours. Caution: If a software update has a checkmark applied against it in the Reboot Req’d column of the New Updates Found window, the BCM50 will automatically reboot as soon as the update has been applied. You will not receive a reboot confirmation before the reboot occurs.
Chapter 13 Managing BCM50 Software Updates 337 To delete a scheduled software update 1 In the task panel, click the Administration tab. 2 Open the Software Management folder, and then click the Software Update task. The Software Update panel opens. The Updates in Progress tab is open. 3 Click the Scheduled Updates tab. 4 In the Scheduled Software Updates table, select a scheduled update. 5 Click the Delete button. The Confirm Delete window opens. 6 Click the Yes button to delete the update.
Chapter 13 Managing BCM50 Software Updates 3 View the updates in the Software Update History table. If software updates have not been applied to your BCM50, the table is empty. 4 To view release notes about a particular software update, select the update in the table. Release notes containing details about the software update are displayed in the Release Notes panel below the table. Removing software updates You may find that you need to remove a software update that has been applied to the BCM50.
Chapter 13 Managing BCM50 Software Updates 339 You can remove a software update if the update has a checkmark in the Removeable column of the Software Update History table. Removing a software update Caution: Removing a software patch or upgrade from the BCM50 is a service-affecting operation. All services running on the system will be stopped. Consequently, Nortel recommends that you schedule removal of updates during low-traffic hours.
Chapter 13 Managing BCM50 Software Updates You can change the order of the information displayed in the table by clicking a column heading and dragging it to a new place in the table. You can also sort the information in a column by descending or ascending order, by clicking the column heading. To view the BCM50 software inventory 1 In the task panel, click the Administration tab. 2 Open the Software Management folder, and then click the Software Inventory task. The Software Inventory panel opens.
Chapter 14 Accounting Management This chapter describes how to manage accounts in a BCM50 system. Overview of accounting management BCM50 Call Detail Recording (CDR) is an application that records call activity. Each time a telephone call is made to or from a BCM, detailed information about the call can be captured in a Call Detail Recording file.
Chapter 14 Accounting Management CDR information can be collected for all calls, outgoing calls only, specific long distance prefix strings only, or calls associated with an account code only (to track calls for client billing purposes). You can set parameters to specify whether additional information should be recorded, such as hospitality information, including room occupancy status and room number information.
Appendix A Management Information Bases This appendix describes the Management Information Bases (MIBs) supported by the BCM50. A MIB is a virtual information store that contains a collection of objects that are managed using Simple Network Management Protocol (SNMP). The MIB is software that defines the data reported by a computing or network device and the extent of control over that device. About SNMP MIBs A MIB enables access to the managed objects of a system.
Appendix A Management Information Bases Table 106 lists the file names and file descriptions of each supported standard MIB. Table 106 MIB file descriptions for standard MIBs MIB File Name Notes MIB-II rfc1213.mib This MIB defines the Management Information Base (MIB-II) for use with network management protocols in TCP/IP-based internets. SNMP-FRAMEWORK-MIB rfc2261.mib This is the SNMP Management Architecture MIB. This standard MIB displays parameters related to the SNMP agent on the BCM50.
Appendix A Management Information Bases 345 Accessing, compiling, and installing MIB files You access MIB files from the BCM50 Web Page. You can also access BCM50 MIB files as a zipped file from the Nortel Customer Service Site. Note: You can use a MIB browser to load MIB information so that you can browse the structure of a MIB. An example of a MIB browser is Microsoft Operations Manager (MOM). Each MIB browser has its own MIB compilation tool.
Appendix A Management Information Bases 10 In the Save As dialog box, select the file or folder in which you want to save the MIB zip file, and then click the Save button. The MIB zip file is saved to your personal computer. Compiling and installing Nortel MIB files Note: Small Site MIBs have definitions for the binding values of the BCM50 SNMP traps. For more information, see Table 110 in this section. Complete the compilation procedure, in the following order: a SmallSite.mib b SmallSiteEvents.
Appendix A Management Information Bases 347 Small Site Event MIB The Small Site Events MIB defines events (SNMP traps) that can be used by any Small Site product or component. BCM50 traps can be captured and viewed using a standard SNMP fault monitoring framework or trap watcher. SNMP traps are generated by the BCM50 if you have enabled SNMP for specific BCM50 alarms. You configure SNMP settings using the Alarm Settings task in the Element Manager.
Appendix A Management Information Bases NN40020-600
Index A account created, users 117 account expiry, users 116 callback 92 user accounts 116 CbC Limit Metrics.
Index E Element Manager last successful log-in 112 minimum password length 77 minimum user ID length 77 password complexity 77 user session timeout 79 enable lockout 78 enable telset interface 76 Ethernet activity, Viewing 267 Ethernet Metrics 266 exclusive access time remaining 113 F failed login 117 H Hard reset, telephony services 269 Hunt Group Metrics.
Index Minimum and maximum values, viewing the date and time 264 minimum password length 77 minimum user ID length 77 modem callback number, users 116 N Nortel service challenge key 77 NTP Metrics.
Index Removing an update from Software History 337 UIP, viewing log files 259 Software updates, deleting a schedule 337 Unified Manager security considerations 122 Software updates, history 337 UPS Metrics.