Avaya BCM50 2.0 User Manual

BCM50 Administration Guide
BCM50 2.0
Business Communications Manager
Document Status:Standard Document Number: NN40020-600 Document Version: 01.03 Date: January 2007
Copyright © 2007 Nortel Networks, All Rights Reserved
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty. Users must take full responsibility for their applications of any products specified in this document. The information in this document is proprietary to Nortel Networks.
Trademarks
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks. Microsoft, MS, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation. All other trademarks and registered trademarks are the property of their respective owners.

Task List

Getting started with BCM50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Overview of BCM50 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
BCM50 Management Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
BCM50 Security Policies and Accounts and Privileges . . . . . . . . . . . . . . 75
To set system access control policies ...........................................................................81
To set credential complexity ..........................................................................................81
To set lockout policy for failed logins.............................................................................82
To set password expiry policy .......................................................................................83
To set password history.................................................................................................83
To set the authentication method ..................................................................................84
To configure an authentication server in Element Manager ..........................................84
To set the idle session timeout ......................................................................................88
To upload a Web Server Certificate ..............................................................................88
To transfer an SSH Key-Pair .........................................................................................89
To add a new user account ...........................................................................................90
To modify a user account ..............................................................................................91
To add callback for a dial-up user .................................................................................92
To add Telset access for a user ....................................................................................92
To delete a user account ...............................................................................................93
To change a user’s password........................................................................................93
To change the current user’s password ........................................................................93
To create a group ..........................................................................................................94
To delete a group ..........................................................................................................94
To modify group privileges ............................................................................................95
To add a user account to a group..................................................................................95
To delete a user account from a group..........................................................................95
To release a locked-out user .........................................................................................96
To enable or disable an account immediately ...............................................................96
To enable or disable an account on a timed basis ........................................................96
To enable/disable exclusive access ..............................................................................97
3
Using the BCM50 Hardware Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
To view or update information about the BCM50 main chassis ..................................126
To view or update BCM50 system expansion information ..........................................128
To view or update other information about the BCM50 main unit ...............................129
To view information about attached devices ...............................................................130
To view additional information about the BCM50 hardware inventory ........................132
Managing BCM50 with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
To configure the BCM50 SNMP agent ........................................................................136
To configure BCM50 SNMP settings ...........................................................................136
To add an SNMP manager to the BCM50 SNMP manager list ...................................137
To delete an SNMP manager ......................................................................................138
To delete a community string value .............................................................................139
BCM50 Administration Guide
4 Task List
To configure pass phrases for a service access point.................................................141
To view details associated with a service access point...............................................141
To delete a service access point .................................................................................141
To modify a trap destination ........................................................................................143
Using the BCM Fault Management System . . . . . . . . . . . . . . . . . . . . . . . 147
To view an alarm .........................................................................................................151
To acknowledge an alarm ...........................................................................................151
To clear the alarm log..................................................................................................151
To include or omit acknowledged alarms in the Alarm Banner ...................................153
To specify the alarm set ..............................................................................................154
To clear an alarm from the alarm set...........................................................................154
To reset the Status LED ..............................................................................................155
To enable or disable SNMP traps for alarms...............................................................156
To enable or disable viewing of selected alarms in the Alarms table ..........................156
To view settings for the alarm set................................................................................156
To test an alarm...........................................................................................................157
Using the BCM50 Service Management System . . . . . . . . . . . . . . . . . . . 215
To view details about services.....................................................................................217
To restart a service ......................................................................................................218
Monitoring BCM50 Status and Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
To configure monitoring mode .....................................................................................220
To configure logging attributes ....................................................................................221
To view the QoS monitoring information .....................................................................222
To refresh the QoS monitor data .................................................................................223
To access UPS Status.................................................................................................223
To access the NTP Metrics .........................................................................................226
To view Trunk Module status.......................................................................................227
To disable or enable a B channel setting ....................................................................229
To provision a PRI B-channel ......................................................................................230
To enable the internal CSU .........................................................................................231
To check the performance statistics ............................................................................231
To check the CSU alarms............................................................................................232
To check carrier failure alarms ....................................................................................232
To check bipolar violations ..........................................................................................232
To check short-term alarms .........................................................................................233
To check defects .........................................................................................................233
To view CSU Alarm History .........................................................................................233
To access the CbC limit metrics ..................................................................................234
To access the Hunt Group metrics ..............................................................................236
To access PSTN Fallback metrics...............................................................................237
To configure PVQM threshold settings........................................................................239
To access PVQM metrics ............................................................................................242
BCM50 Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
To install BCM Monitor separately from BCM50 Element Manager ............................246
To remove BCM Monitor .............................................................................................246
To start BCM Monitor without the Element Manager...................................................247
To start BCM Monitor from the Element Manager .......................................................247
To connect to a different BCM50 .................................................................................248
NN40020-600
Task List 5
To configure static snapshot settings ..........................................................................249
To save a static snapshot ............................................................................................250
To configure dynamic snapshot settings .....................................................................251
To disable monitoring of UIP messages ......................................................................258
To log UIP data............................................................................................................259
To view UIP log files ....................................................................................................259
To configure timeout settings ......................................................................................259
To expand a UIP message ..........................................................................................260
To clear UIP message details......................................................................................260
To view all lines ...........................................................................................................261
To view the date and time of minimum and maximum values .....................................264
To reset the minimum and maximum values for a statistic..........................................264
To ping a device ..........................................................................................................265
To perform a trace route ..............................................................................................266
To view Ethernet activity..............................................................................................267
To reboot the BCM50 ..................................................................................................268
To perform a warm reset of BCM50 telephony services .............................................268
To perform a cold reset of BCM50 telephony services................................................269
To set Release Reasons .............................................................................................269
Backing Up and Restoring BCM50 Data . . . . . . . . . . . . . . . . . . . . . . . . . . 271
To perform an immediate backup to the BCM50 .........................................................275
To perform an immediate backup to your personal computer .....................................277
To perform an immediate backup to a network folder .................................................278
To perform an immediate backup to a USB storage device ........................................279
To perform an immediate backup to an FTP server ....................................................279
To perform an immediate backup to an SFTP server..................................................280
To view scheduled backups ........................................................................................282
To perform a scheduled backup to the BCM50 ...........................................................283
To perform a scheduled backup to a network folder ...................................................284
To perform a scheduled backup to a USB storage device ..........................................285
To perform a scheduled backup to an FTP server ......................................................286
To perform a scheduled backup to an SFTP server ....................................................288
To modify a scheduled backup ....................................................................................289
To delete a backup schedule.......................................................................................290
To restore data from the BCM50 .................................................................................293
To restore data from your personal computer .............................................................294
To restore data from a network folder .........................................................................295
To restore data from a USB storage device ................................................................296
To restore data from an FTP server ............................................................................297
To restore data from an SFTP server ..........................................................................298
To restore the factory configuration.............................................................................299
Managing BCM50 Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
To perform an immediate log transfer to a USB storage device..................................305
To perform an immediate log transfer to your personal computer...............................306
To perform an immediate log transfer to a network folder ...........................................307
To perform an immediate log transfer to an FTP server..............................................308
To perform an immediate log transfer to an SFTP server ...........................................309
To perform a scheduled log transfer to a storage location ..........................................310
To modify a scheduled log transfer .............................................................................311
To delete a scheduled log transfer ..............................................................................312
BCM50 Administration Guide
6 Task List
To use the BCM50 Web Page to transfer log files to other destinations .....................314
To extract log files using the Element Manager ..........................................................316
To specify retrieval criteria...........................................................................................319
To filter information in the Retrieval Results table .......................................................320
To view log details for multiple log records..................................................................320
Managing BCM50 Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
To obtain updates from the Nortel Technical Support Web page................................323
To view details about software updates in progress....................................................325
To apply an update from your personal computer .......................................................327
To apply a software update from a USB storage device .............................................328
To apply an update from a shared folder.....................................................................329
To apply an update from an FTP server......................................................................330
To apply an update from an HTTP server ...................................................................331
To create a scheduled software update ......................................................................333
To modify a scheduled software update......................................................................336
To delete a scheduled software update.......................................................................337
To view the software update history ............................................................................337
To remove a software update ......................................................................................339
To view the BCM50 software inventory .......................................................................340
Accounting Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Management Information Bases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
To access MIB files from the BCM50 Web Page ........................................................345
To access MIB files from the Nortel Customer Service Site ........................................345
NN40020-600

Contents

Chapter 1
Getting started with BCM50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Symbols and conventions used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
How to get Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 2
Overview of BCM50 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
About BCM50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
BCM50 hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
BCM50 applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Management Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
BCM50 interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
WAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
7
Chapter 3
BCM50 Management Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
BCM50 web page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
BCM50 Management Environment and Applications . . . . . . . . . . . . . . . . . . . . . . . . . 33
Managing BCM50 with Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Managing BCM50 with Telset administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Managing BCM50 Voicemail and ContactCenter: CallPilot Manager . . . . . . . . . . 34
Managing Digital Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Programming telephone sets: Desktop Assistant portfolio . . . . . . . . . . . . . . . . . . 34
Performing initialization: Startup Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Monitoring BCM50: BCM Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Managing BCM50 remotely with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Element Manager setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Element Manager window attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Element Manager panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Effective use of Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
BCM50 Administration Guide
8 Contents
BCM50 feature licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
BCM50 Help system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
BCM50 common file input/output processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Connecting to Element Manager through a router . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Chapter 4
BCM50 Security Policies and Accounts and Privileges. . . . . . . . . . . . . . . 75
Security Policies panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Configuring system security policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Configuring user accounts, user groups and privileges . . . . . . . . . . . . . . . . . . . . . . . . 89
Element Manager data features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Element Manager application logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
BCM50 integrated launch of related applications . . . . . . . . . . . . . . . . . . . . . . . . . 63
Menu bar Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Field-level Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Context-sensitive Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Comparison of data repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Configuring firewall settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Adding NAT rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Entry Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Local Authentication Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Authentication Service Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Session Management Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
SSL and SSH Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Setting system access control policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Setting credential complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Setting lockout policy for failed logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Setting password expiry policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Setting password history policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Setting the authentication method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Configuring an authentication server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Setting the idle session timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Uploading a Web Server Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Transferring an SSH Key-Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Adding a new user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Modifying a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Adding callback for a dial-up user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Adding Telset access for a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Deleting a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Changing a user’s password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Changing the current user’s password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Creating a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
NN40020-600NN40020-600
Contents 9
Deleting a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Modifying group privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Adding a user account to a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Deleting a user account from a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Re-enable a locked-out user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Enabling and disabling an account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Enabling and disabling exclusive access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
User account and user group management fundamentals . . . . . . . . . . . . . . . . . . . . . 97
User accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Default passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Default groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Default access privileges excluding set-based privileges . . . . . . . . . . . . . . . . . . 101
Telset access security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Telset group access privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Blocking user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Accounts and Privileges panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Current Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
View by Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
View by Accounts: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
View by Accounts: Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
View by Accounts: History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
View by Accounts: Group Membership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
View by Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
View by Groups: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
View by Groups: Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
BCM50 security fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Secure network protocols and encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Security audits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
System security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Security certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Site authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Chapter 5
Using the BCM50 Hardware Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
About the BCM50 Hardware Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Viewing and updating information about the BCM50 system . . . . . . . . . . . . . . . . . . 126
Viewing and updating information about the BCM50 main unit . . . . . . . . . . . . . 126
Viewing and updating BCM50 system expansion information . . . . . . . . . . . . . . 127
Viewing and updating other information about the BCM50 system . . . . . . . . . . 128
Viewing information about devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Viewing additional information about the BCM50 hardware inventory . . . . . . . . . . . 130
BCM50 Administration Guide
10 Contents
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Chapter 6
Managing BCM50 with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Overview of BCM50 support for SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Configuring routers to use Element Manager with SNMP . . . . . . . . . . . . . . . . . . . . . 134
Configuring SNMP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Configuring general SNMP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Configuring SNMP community strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Configuring service access points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Configuring SNMP trap destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Viewing and modifying SNMP trap destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Auto-SNMP dial-out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Alarm severity levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Chapter 7
Using the BCM Fault Management System . . . . . . . . . . . . . . . . . . . . . . . . 147
Overview of BCM fault management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
About BCM alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Alarms and log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Alarm severities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Administering alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Using the Alarms Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Using the Alarm Banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Using the alarm set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Alarms and LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Using SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Configuring alarm settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
List of BCM alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Chapter 8
Using the BCM50 Service Management System . . . . . . . . . . . . . . . . . . . . 215
Overview of the BCM50 service management system . . . . . . . . . . . . . . . . . . . . . . . 215
BCM50 services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Starting, stopping, and restarting services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Chapter 9
Monitoring BCM50 Status and Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
About the system status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
QoS Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
UPS Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
NTP Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Telephony Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
NN40020-600NN40020-600
Contents 11
Trunk Module Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Viewing Performance History information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Viewing D-Channel information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Disabling or enabling a B channel setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Provisioning a PRI B-channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Trunk Module CSU statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Enabling the internal CSU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Checking trunk module alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
CbC limit metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Hunt Group Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
PSTN Fallback Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Proactive Voice Quality Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Chapter 10
BCM50 Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
About BCM Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Installing BCM Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Connecting to a BCM50 system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Using BCM Monitor to analyze system status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Static snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Dynamic snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
BCM Info tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Media Card tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Voice Ports tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
IP Devices tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
RTP Sessions tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
UIP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Line Monitor tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Usage Indicators tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Using statistical values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Trace Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Ethernet Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Diagnostic settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Chapter 11
Backing Up and Restoring BCM50 Data . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Overview of backing up and restoring data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Backup and restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Viewing backup and restore activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
About backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
BCM50 Administration Guide
12 Contents
BCM50 backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Backup destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Performing immediate backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Performing an immediate backup to the BCM50 . . . . . . . . . . . . . . . . . . . . . . . . 275
Viewing and performing scheduled backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Modifying and deleting scheduled backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Restoring BCM50 system data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Effects on the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Chapter 12
Managing BCM50 Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Overview of BCM50 logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Log types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Overview of transferring and extracting log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Transferring log files using the BCM50 Element Manager . . . . . . . . . . . . . . . . . 304
Performing immediate log archive transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Performing scheduled log transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Transferring log files using the BCM50 Web page . . . . . . . . . . . . . . . . . . . . . . . 312
Extracting log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Viewing log files using the Log Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Retrieval Results area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Log Details area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Viewing log files using other applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Chapter 13
Managing BCM50 Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Overview of BCM50 software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Obtaining software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Viewing software updates in progress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Applying software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Creating and modifying scheduled software updates . . . . . . . . . . . . . . . . . . . . . 332
Viewing a history of software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Removing software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Viewing the inventory of BCM50 software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Chapter 14
Accounting Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Overview of accounting management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
About Call Detail Recording . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Using Call Detail Recording . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
CDR Toolkit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
NN40020-600NN40020-600
Contents 13
Appendix A
Management Information Bases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
About SNMP MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
MIB file descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Accessing, compiling, and installing MIB files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Small Site MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Small Site Event MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
BCM50 Administration Guide
14 Contents
NN40020-600NN40020-600
Chapter 1

Getting started with BCM50

This section contains information on the following topics:
“About this guide” on page 15
“Audience” on page 17
“Acronyms” on page 17
“Symbols and conventions used in this guide” on page 19
“Related publications” on page 20
“How to get Help” on page 21

About this guide

The BCM50 Administration Guide describes how to manage and maintain BCM50 systems at the Release 2.0 level using Business Element Manager.
15

Purpose

The concepts, operations, and tasks described in the guide relate to the FCAPS (fault, configuration, accounting, performance, and security) management features of the BCM50 system. This guide also describes additional administrative tasks, such as log management, backups, software updates, monitoring, and inventory management. Use the Element Manager to perform these administrative tasks.
In brief, the information in this guide explains:
Network structure and concepts
Management tools
Fault management & monitoring
Performance management
Security administration
Backup management
Software updates
Inventory management

Organization

This guide is organized for easy access to information that explains the administrative concepts, operations and procedures associated with using the BCM50 management application.
BCM50 Administration Guide
16 Chapter 1 Getting started with BCM50
The tasks described in this guide assume that you are using the Element Manager with full administrative privileges. If you do not have full administrative privileges, you may see only a subset of the tasks and panels described in this guide.
Table 1 BCM50 Administration Guide organization
Chapter Contents
Chapter 2, “Overview of BCM50 Administration
Chapter 3, “BCM50 Management Environment
Chapter 4, “BCM50 Security Policies and Accounts and Privileges
Chapter 5, “Using the BCM50 Hardware Inventory
Chapter 6, “Managing BCM50 with SNMP
Chapter 7, “Using the BCM Fault Management System
Chapter 8, “Using the BCM50 Service Management System
Chapter 9, “Monitoring BCM50 Status and Metrics
Chapter 10, “BCM50 Utilities This chapter contains information about the utilities that are part of
Chapter 11, “Backing Up and Restoring BCM50 Data
Chapter 12, “Managing BCM50 Logs This chapter contains information about viewing and managing
Chapter 13, “Managing BCM50 Software Updates
Chapter 14, “Accounting Management This chapter describes the management of accounting records in
Appendix A, “Management Information Bases
This chapter introduces management concepts and techniques.
This chapter contains information on the different tools available to manage your BCM50. It also describes the Element Manager application in detail.
This chapter describes Security Policies and Accounts and Privileges, which allow you to establish system-wide security policies and maintain system access security using Element Manager.
This chapter describes how to use the Hardware Inventory, which displays information about the BCM system, such as connected expansion units, populated Media Bay Modules (MBMs) and attached telephone devices.
This chapter describes the management of the BCM50 using SNMP. SNMP is a set of protocols for managing complex networks. SNMP-compliant devices, called agents, store data about themselves in Management Information Bases (MIBs) and provide this data to SNMP requesters.
This chapter contains information about managing alarms generated by the system and administering alarm settings.
This chapter describes how to use Element Manager to view and administer the services that run on the system.
This chapter describes how to use Element Manager to view detailed information about the performance of the system and of system resources.
the Element Manager. Several utilities are provided to allow partners and customers to monitor and analyze the system.
This chapter provides information about how to back up and restore data from the system.
log files generated by the BCM50.
This chapter contains information about managing software updates.
the BCM50. Account management uses the Call Detail Recording (CDR) application to record call activity. Each time a telephone call is made to or from a BCM, detailed information about the call can be captured in a CDR file.
This appendix contains information about how to install and use Management Information Bases (MIBs) if you use SNMP to manage your system.
NN40020-600NN40020-600

Audience

The BCM50 Administration Guide is directed to network administrators responsible for maintaining BCM networks that include BCM50 devices. This guide is also useful for network operations center (NOC) personnel supporting a BCM50 managed services solution. To use this guide, you must:
be an authorized BCM50 administrator within your organization
know basic Nortel BCM50 terminology
be knowledgeable about telephony and IP networking technology

Acronyms

The following is a list of acronyms used in this guide.
Table 1 List of acronyms
Acronym Description
3DES Triple Data Encryption Standard
AES Analog Encryption Standard
AIS Alarm Indication Signal
BCM Business Communications Manager
BRI Basic Rate Interface
CbC Call by Call
CDR Call Detail Recording
CFA Carrier Failure Alarms
CLID Calling Line Identification
CPE Customer Premises Equipment
CSU Channel Service Unit
DES Digital Encryption Standard
DHCP Dynamic Host Configuration Protocol
DN Directory Number
DNIS Dialed Number Idenification Service
DTM Digital Trunk Module
ES Errored Seconds
HTTP Hypertext Transfer Protocol
IP Internet Protocol
ISDN Integrated Switched Digital Network
LAN Local Area Network
MBM Media Bay Module
MIB Management Information Base
MGS Media Gateway Server
Chapter 1 Getting started with BCM50 17
BCM50 Administration Guide
18 Chapter 1 Getting started with BCM50
Table 1 List of acronyms
Acronym Description
MOS Mean Opinion Score
MPS Media Path Server
NAT Network Address Translation
NCM Network Configuration Manager
NOC Network Operations Center
NTP Network Time Protocol
OOF Out of Frame
PPP Point-to-Point Protocol
PRI Primary Rate Interface
PBX Private Branch Exchange
PSTN Public Switched Telephone Network
PVQM Proactive Voice Quality Monitoring
QoS Quality of Service
RAI Remote Alarm Indication
RTP Real-time Transport Protocol
SFTP Secure File Transfer Protocol
SNMP Simple Network Management Protocol
SSH Secure Shell
SSL Secure Socket Layer
UAS Unavailable Seconds
UPS Universal Power Supply
USB Universal Serial Bus
VoIP Voice over Internet Protocol
VLAN Virtual Local Area Network
VPN Virtual Private Network
WAN Wide Area Network
NN40020-600NN40020-600
Chapter 1 Getting started with BCM50 19

Symbols and conventions used in this guide

These symbols are used to highlight critical information for the BCM50 system:
Caution: Alerts you to conditions where you can damage the equipment.
Danger: Alerts you to conditions where you can get an electrical shock.
Warning: Alerts you to conditions where you can cause the system to fail or work
improperly.
Note: A Note alerts you to important information.
Tip: Alerts you to additional information that can help you perform a task.
Security note: Indicates a point of system security where a default should be changed,
or where the administrator needs to make a decision about the level of security required
!
for the system.
Warning: Alerts you to ground yourself with an antistatic grounding strap before performing the maintenance procedure.
Warning: Alerts you to remove the BCM50 main unit and expansion unit power cords from the ac outlet before performing any maintenance procedure.
BCM50 Administration Guide
20 Chapter 1 Getting started with BCM50
These conventions and symbols are used to represent the Business Series Terminal display and dialpad.
Convention Example Used for
Word in a special font (shown in the top line of the display)
Underlined word in capital letters (shown in the bottom line of a two line display telephone)
Dialpad buttons
Pswd:
PLAY
£
Command line prompts on display telephones.
Display option. Available on two line display telephones option on the display to proceed.
Buttons you press on the dialpad to select a particular option.
. Press the button directly below the
These text conventions are used in this guide to indicate the information described:
Convention Description
bold Courier text
Indicates command names and options and text that you need to enter. Example: Use the Example: Enter
info command.
show ip {alerts|routes}.
italic text Indicates book titles
plain Courier text
FEATURE HOLD
Indicates command syntax and system output (for example, prompts and system messages).
Example:
Set Trap Monitor Filters
Indicates that you press the button with the coordinating icon on whichever set you are using.
RELEASE

Related publications

Related publications are listed below. To locate specific information, you can refer to the
Master Index of BCM50 Library (NN40020-100).
BCM50 Installation Checklist and Quick Start Guide (NN40020-308)
BCM50 Installation and Maintenance Guide (NN40020-302)
Keycode Installation Guide (NN40010-301)
BCM50 Device Configuration Guide (NN40020-300)
BCM50 Networking Configuration Guide (NN40020-603)
BCM50 Telset Administration Guide (NN40020-604)
BCM50 Telephony Device Installation Guide (NN40020-309)
NN40020-600NN40020-600
CallPilot Telephone Administration Guide (NN40090-500)
CallPilot Contact Center Telephone Administration Guide (NN40040-600)
BCM50 LAN CTE Configuration Guide (NN40020-602)
BCM50 Call Detail Recording System Administration Guide (NN40020-605)
Digital Mobility System Installation and Configuration Guide (NN40020-306)

How to get Help

This section explains how to get help for Nortel products and services.
Getting Help from the Nortel Web site
The best way to get technical support for Nortel products is from the Nortel Technical Support Web site:
http://www.nortel.com/support
Chapter 1 Getting started with BCM50 21
This site provides quick access to software, documentation, bulletins, and tools to address issues with Nortel products. More specifically, the site enables you to:
download software, documentation, and product bulletins
search the Technical Support Web site and the Nortel Knowledge Base for answers to
technical issues
sign up for automatic notification of new software and documentation for Nortel equipment
open and manage technical support cases
Getting Help over the phone from a Nortel Solutions Center
If you don’t find the information you require on the Nortel Technical Support Web site, and have a Nortel support contract, you can also get help over the phone from a Nortel Solutions Center.
In North America, call 1-800-4NORTEL (1-800-466-7835).
Outside North America, go to the following Web site to obtain the phone number for your region:
http://www.nortel.com/callus
Getting Help from a specialist by using an Express Routing Code
To access some Nortel Technical Solutions Centers, you can use an Express Routing Code (ERC) to quickly route your call to a specialist in your Nortel product or service. To locate the ERC for your product or service, go to:
http://www.nortel.com/erc
BCM50 Administration Guide
22 Chapter 1 Getting started with BCM50
Getting Help through a Nortel distributor or reseller
If you purchased a service contract for your Nortel product from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller.
NN40020-600NN40020-600
Chapter 2

Overview of BCM50 Administration

The BCM50 Administration Guide describes the tools available with which to administer, or manage BCM50 systems. This section is an introduction to the BCM system and its management model.
The administration overview information is divided into three categories:
About BCM50
BCM50 Management Model
BCM50 Management Interfaces
BCM50 Administration Guide overview

About BCM50

The BCM50 system provides private network and telephony management capability to small and medium-sized businesses.
23
The BCM50 system:
integrates voice and data capabilities, IP Telephony gateway functions, and data-routing
features into a single telephony system
enables you to create and provide telephony applications for use in a business environment
Business Element Manager is the primary management application for BCM50 systems. Formerly known as the BCM Element Manager, the Business Element Manager manages BCM systems as well as other devices in Nortel’s SMB portfolio. The Business Element Manager encompasses not only telephony programming, but also backup management, software update management, and log management. For more information about the Business Element Manager, see “BCM50
Management Environment” on page 31.
The BCM50 system includes the following key components:
hardware
applications

BCM50 hardware

The BCM50 system includes the following key elements:
BCM50 main units
BCM50 expansion unit
BCM50 media bay modules (MBM):
— Analog direct inward dialing (ADID)
— BRIM
BCM50 Administration Guide
24 Chapter 2 Overview of BCM50 Administration
—CTM4/CTM8
—DTM
— G AT M4 / G ATM 8
— 4x16
—ASM8
— ASM8+, GASM
—DSM16+/DSM32+
— DDIM
Main units
The main hardware component in the BCM50 system is the main unit. The six BCM50 models are divided into two series: standard and BRI. The BRI (or b) series main units include BRI ports that replace the four analog lines on the standard series. The two series are as follows:
Standard series
BCM50 main unit (with Telephony only)
The BCM50 main unit provides call processing and simple data networking functions. It provides connections for 12 digital phones, 4 PSTN lines, 4 analog station ports, and 4 connections for auxiliary equipment (auxiliary ringer, page relay, page output, and music source). The BCM50 main unit does not have a router, but it does have 4 LAN ports: one is the OAM port for technicians, and the other three are for basic LAN connectivity.
BCM50a main unit (with ADSL router)
The BCM50a main unit provides all of the same core functionality as the BCM50 main unit, and it also has an integrated ADSL router for advanced data applications.
BCM50e main unit (with Ethernet router)
The BCM50e main unit provides all of the same core functionality as the BCM50 main unit, and it also has an integrated Ethernet router for advanced data applications.
BRI series (b series)—available only in EMEA and APAC regions
BCM50b main unit
The BCM50b main unit provides similar functionality to the BCM50 main unit. The difference is that the BCM50b main unit has two integrated BRI ports that replace the four analog lines on the RJ-21 telephony connector.
BCM50ba main unit (with ADSL router)
The BCM50ba main unit provides similar functionality to the BCM50a main unit. The difference is that the BCM50ba main unit has two integrated BRI ports that replace the four analog lines on the RJ-21 telephony connector.
BCM50be main unit (with Ethernet router)
The BCM50be main unit provides similar functionality to the BCM50e main unit. The difference is that the BCM50be main unit has two integrated BRI ports that replace the four analog lines on the RJ-21 telephony connector.
NN40020-600NN40020-600
Chapter 2 Overview of BCM50 Administration 25
All of the BCM50 main units provide call processing and data networking functions. They also provide connections for telephones, as well as LAN and WAN connections. You can install MBMs to provide connections for Public Switched Telephone Network (PSTN) lines. For detailed information about the main units, see the BCM50 Release 2.0 Installation and Maintenance Guide (NN40020-302).
Expansion units and media bay modules (MBMs)
In addition to the main unit, the BCM50 system can have up to two BCM50 expansion units. An expansion unit connects to the main unit and provides additional functionality.
The BCM50 expansion unit is designed to accomodate one media bay module (MBM) that enables you to connect addtional telephony equipment to the BCM50 system. The MBMs connect with external devices to implement various types of voice trunks and stations. For detailed information about expansion units and MBMs, see the BCM50 Release 2.0 Installation and Maintenance Guide (NN40020-302).

BCM50 applications

BCM50 supports many high-value applications.
You enable applications by entering the appropriate keycodes. Some applications are:
Voice Messaging for standard voicemail and autoattendant features
Unified Messaging providing integrated voicemail management between voicemail and
common email applications
Fax Suite providing support for attached analog fax devices
Voice Networking features
LAN CTE
Digital Mobility (additional hardware is required)

Management Model

Whether BCM50 is being installed as a standalone element, is part of a network of many BCM50s, or is part of a network encompassing both BCM50s and other devices, it is necessary to be able to perform a range of administrative tasks to keep the system (or systems) providing the services which they were deployed to provide.
The individual or organization responsible for performing the administration of the system needs to be able to do some or all of the following types of tasks:
monitor to validate that the system is healthy. For example, power is available, services are
running, CPU and memory are within a normal operating envelope
monitor for fault conditions
monitor link status and utilization
system programming is consistent with the requirements of the services
backups are being kept of the configuration
BCM50 Administration Guide
26 Chapter 2 Overview of BCM50 Administration
review logs of operational information
retrieve and view logs containing diagnostic information in the event of a system issue
manage system inventory
manage software updates
make changes to the system configuration to change service definitions or add users including
adding new features through the application of keycodes
The descriptions and procedures in this guide will assist the administrator in performing these tasks.
The following management model demonstrates how BCM50 manageability is achieved by breaking the management functions into layers.
At the base of the model is the element itself. In order to be a manageable system, the element must provide not only the ability to configure services, but must also regulate access to the system by administrative users, generate alarms in the event of issues, support the easy addition of new features through the application of keycodes, provide a means for making a backup of the configured data, and other administrative functions.
The management tools at the next layer provide a user interface to control these functions for a selected BCM50 device. The primary management application for BCM50 is the Element Manager, complemented by other management applications as explained in “BCM50
Management Environment and Applications” on page 33. For BCM releases prior to 4.0, the
management application is Unified Manager.
If the BCM50 is one of a number of elements in a network, network management tools at the network management layer facilitate monitoring and management across the network. Nortel provided tools such as Enterprise Network Management System (ENMS) for network monitoring, and third party tools supporting multi-vendor networks, can only deliver their value if the managed element itself has provided for the right functions at the manageable systems layer.
Also at the network layer, system and configuration management tools can provide support for tasks such as bulk distribution of selected configuration information, network wide inventory management and network wide backup management. The Network Configuration Manager (NCM) server-based management application provides these and other capabilities for managing a network of up to 2000 BCM50 devices. For more information about NCM, please consult the NCM User documentation.
NN40020-600NN40020-600
Figure 1 BCM50 network management model
Chapter 2 Overview of BCM50 Administration 27
Network Management Layer
Event & Alarm Mgmt
Infrastructure access
Performance & optimization
Communications
QoS Monitoring
Element Management Tools
Troubleshoot events & alarms
Backup & restore
Manageable Systems & Endpoints
User applications & capabilities
Event / alarm generation
System data / traffic
System & Config Management Layer
Multi-site configuration
Asset inventory mgmt
•Bulk MACs
Add features with keycodes
Configuration & administration
User access
Threshold settings
Keycodes
“BCM50 enterprise network model” on page 28 shows an example BCM50 enterprise network,
illustrating the various communications between the BCM50 end devices and management applications managing end devices. The diagram also shows that the physical enterprise network, conceptually, is segmented into domains.
The Network Operations Center (NOC) domain represents the tools, equipment and activities used to analyze and maintain the operation of a network of BCM50 devices. Element Manager and Network Configuration Manager are the management applications which allow the network administrators working in the NOC domain to perform the administrative functions. The management application workstations can be physically distributed across different enterprise sites if they are networked via an IP network as represented by the cloud in the middle of the figure.
The BCM network domain represents one or more BCM50s located a different sites in the network connected through an enterprise LAN to one or more management application workstations. The WAN represents an adjacent network, external to the LAN.
The VoIP and Wireless VoIP domains represent terminating IP devices.
BCM50 Administration Guide
28 Chapter 2 Overview of BCM50 Administration
Figure 2 BCM50 enterprise network model
NOC Domain
Network Configuration Manager (NCM)
Element Manager Workstation
SNMP Network Manager Workstation
NCM Server
NCM Database
BCM Network Domain
Network Solutions
VoIP
Wireless VoIP
WAN
PSTN
V.90 Modem
SNMP Network Manager Server

BCM50 interfaces

The BCM50 network can be distributed geographically across different sites. The network administrator must be able to remotely access each BCM50 in the network. BCM50 offers alternatives for connecting to the BCM50 devices depending on the network configuration and telephony resources available with a given system.
LAN
A Local Area Network (LAN) is a communications network that connects workstations and computers within a confined geographical area. Often the customer LAN has access to a router, forming a connection to the Internet.
Remote Dialup
NN40020-600NN40020-600
Chapter 2 Overview of BCM50 Administration 29
A network administrator can connect to and manage a BCM50 via an IP over LAN interface. If the administrator is accessing the BCM50 system from an external network, then a connectivity path would need to be provided from the corporate LAN network to the customer's WAN network or to the customer's ISP provider over another device such as a router elsewhere on the customer's premises.
Dialup
The modem supports callback for management user access to the BCM50. It can be used to support auto-dialout on SNMP traps, as well as automated sending of Call Detail Records (CDR) to a remote CDR collection point.
Due to modest dialup speeds, the administrator will find that the Element Manager panels take longer to load than if the Element Manager is directly connected through the OAM port or over a high bandwidth connection.
Configuration backups can be less than 1 Mbyte in size, however if voicemail greetings and messages are included they could grow considerably larger. If the performance being realized over the modem does not meet expectations, the administrator may choose to run backups to the local hard drive or a USB memory device.
For more information on modem configuration see the BCM50 Networking Configuration Guide (NN40020-603).
WAN
A Wide Area Network (WAN) is a communications network that covers a wide geographic area, such as state or country. A WAN usually consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system, or can be connected through private leased lines.
Management access over dial or BRI ports
You can remotely manage the BCM50 using ISDN BRI. Dial-over-ISDN is supported for any type of BRI/PRI Media Bay Module (MBM) in an expansion chassis, and is also supported on the main unit for the BCM50b-series models. On the BCM50b-series only, RJ-45 ports provide connectivity for BRI trunks from the PSTN.

Protocols

Several protocols are used in the day to day management of a network of BCM50s. These include:
SNMP (simple network management protocol): Simple Network Management Protocol is the
Internet standard protocol for network management software. It monitors devices on the
network, and gathers device performance data for management information (data)bases
(“MIB”).
HTTPS: A secure version of HTTP implemented using the secure sockets layer, SSL,
transmitting your communications in an encrypted form. HTTPS is used between the Element
Manager and the BCM.
BCM50 Administration Guide
30 Chapter 2 Overview of BCM50 Administration
FTP (file transfer protocol): FTP is a protocol used to transfer files over a TCP/IP network
(Internet, Unix). FTP allows you to log into FTP servers, list directories, and copy files from
other workstations.
SSH and other protocols are also used for certain tasks. These are covered in the section
“Secure Network Protocols and Encryption” in the Security chapter.
NN40020-600NN40020-600
Loading...
+ 322 hidden pages