All rights reserved. December, 2003.
The information in this document is subject to change without noti ce. The statements, configurations, te chnical data, and
recommendations in th is document are belie ved to be accurate and reliable, but are presented without express or implied
warranty. Users must take full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Nortel Networks NA Inc.
Trademarks
NORTEL NETWORKS and Business Communications Manager, are trademarks of Nortel Networks NA Inc.
Microsoft, MS, MS-DOS, Windows, and Windo w s N T are regist ered trademarks of Microsoft Corpor ation.
Symbol, Spe ctrum24, and NetVision are re gistered trademarks of Sym bol Technologies, Inc.
All other trademarks and registered tra dem arks are the property of their respectiv e owners.
Software licensing
The Apache Group
Copyright (c) 1995-1999 The Apache Group. All rights reserved.
Redistribution an d use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaim er.
2Redistributions in bina ry form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided
with the distribution.
3All advertising materials mentioning features or use of this software must display the
following acknowledg ment:
4“This product inc ludes software developed by the Apache Group for use in the Apache HTTP
server project (http://www.apache.org/).”
5The names “Apache Server” and “Apache Group” must not be used to endorse or promote
products derived from this software without prior written permission.
6For written permission, please contact apache@apache.org.
7Products derive d from this software may not be calle d “Apache” nor may “Apache” appe ar in
their names without prior wri tten permission of the Apache Group.
8Redistributions of any form whatsoever must retain the following acknowle dgment:
9“This product inc ludes software developed by the Apache Group for use in the Apache HTTP
server project (http://www.apache.org/).”
THIS SOFTWARE IS PROVIDED BY THE APACHE GROUP “AS IS” AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE GROUP OR ITS
P0609330 2.0
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This software consists of voluntary contributions made by many individuals on behalf of the
Apache Group and was originall y based on public domain software written at the National Center
for Supercomputing Applications, University of Illinois, Urbana-Champaign. For more
information on the Apache Group and the Apache HTTP server project, please see
http://www.apache.org/.
3
Business Communications Man ager - Management User Guide
Business Communications Man ager - Management User Guide
18
P0609330 2.0
Preface
The Business Communications Manager - Management User Guide describes how to manage,
maintain and sustain Busin ess Communications Manager network service s.
Purpose
The concepts, operations, and tasks described in the guide relate to the FCAPS (fault,
configuration, administration, performance, and security) management strategy for the Business
Communications Manager (BCM) and BCM network. This guid e provides task- base d information
on how to detect and correct faults through the interfaces and reportin g system.
Use the Nortel Networks Unified Manager (UM) and Network Configuration Manager (NCM)
applications to impl ement, monitor and administer the networ k level operations. Use this guide to
perform equivalent network-level operations using an SNMP based network management system.
In brief, the information in this guide explains:
•Network structure and concepts
•Network management tools
•Fault management & monitoring
•Performance manage ment
•Security administration
19
Audience
The Business Communications Manager - Management User Guide is directed to network
administrators r esponsible for maintaining BCM networks. This guide is also useful for network
operations center ( NOC) personnel supporting a Business Communications Manager managed
services soluti on. To use this guide, you must:
•be an authorized Business Co mmunic ations Manager administrator within your or ganization
•know basic Nortel Networks Business Communications Manager terminology
•be knowledgeable about te lephony and IP networking technology
Organization
This guide is organized for easy access to information that explains the concepts, operations and
procedures associa ted with using the Business Communications Manage r network management
applications.
Business Communications Manag er 3.6 Mana gement User Guide organization provides a
summary description of the cont ents of this document.
Business Communications Manager - Manageme nt User Guide
20Preface
Table 1 Business Communications Manager 3.6 Management User Guide organization
ChapterContents
1. Management OverviewThis chapter provides an overview of the net work management
2. Fault Management SystemThis chapter provides infor mation on ho w to set-up and main tain a
3. Service Manage me nt Syst emThis chapter describes service manager capabilities available in
4. Log Management SystemThis chapter provides an explanation of t he M S C (core telephony)
5. BCM MonitorThis chapter provides instructions how to ins tal l, access and use
6. Performance ManagementThis chapter provides information on metrics gathering tools and
7. Performance Management Using
NetIQ
8. Security ManagementThis chapter provides information about how you can set up and
9. System Backup and Rest oreThis chapter provides information and proc edures on how to
10. Testing, Troubleshooting, and
Diagnostics
Appendix A Management Information
Base (MIB) System
model, applications, tools, maintenance and moni toring
objectives.
fault detection and maintenance program using the Unified
Manager and SNMP toolsets.
the Unified Manag er interface. This chapter also describes the
propertie s of the services in the service manager and associated
log and alarm notifications
log system. This chapter also describes how to access, display
and erase logs and archlogs.
the BCM Monitor application to analyze BCM system status and
performance statistics.
applications to monitor the networ k tr aff ic. The tools help you
ascertain the per fo rmance and heal th of the n etwo rk el ements and
telephony services.
This chapter provides information on the third-party NetIQ
performance management solution for BCM.
maintain the access security to your system by users and client
applications.
execute a system Backup and Restore using the BRU.
This chapter contains information about diagnosing module line
performance i ssues and device line issues. The chapter also
provides ins tructions on how to perfo rm a system startup, set
identification parameters and maintain telephony resources.
This appendix describes BCM management information bases
(MIB).
Symbols used in this guide
This guide uses these symbols to draw your attention to important information:
Caution: Alerts you to cond itions where you can damage the equipment.
Danger: Alerts you to conditions where you can get an electrical shock.
P0609330 2.0
Preface21
Warning: Alerts you t o conditi ons wher e you can ca use the system to wor k i mproperly or
to fail.
Note: Alerts you to important information.
Tip: Alerts you to additional information that can help you perform a task.
Warning: Alerts you to ground yourself with an antista tic grounding strap before
performing the maintena nce procedure.
Warning: Alerts you to re move the Busine ss Communica tions Manager and Busi ness
Communications Manager expan sion unit power cords from the AC outlet before
performing any maintena nce procedure.
Display Tips
You can best use and read this publicati on from your computer monitor. Use your computer to
identify and access the numerous links throughout. Alternatively, you can print a hard copy. For
best on-screen displ ay results, use Adobe Acrobat Reader* version 4.0 or 5.0.
If you use Adobe Acrobat Reader, version 4.0, perform the following to optimize the illu strations:
•Increase display magnification
•Print the document
For Adobe Acrobat Reader, version 5.0, perform the following steps to optimize the graphical
display:
1Start the Adobe Acrobat Reader, version 5.0 application.
2On the Edit menu click Preferences and then click General.
3On the Preferences menu click Display.
The Display setup page appears.
4Select these smoothing options:
•Smooth Text
•Smooth Line Art
•Smooth Images
Business Communications Man ager - Management User Guide
22Preface
See Figure 1 to review Acrobat Reader version 5.0 display selections.
Figure 1 Acrobat Reader display setup selections
Text conventions
This guide uses these text conventions:
bold Courier text
italic textIndicates file and directory names, new terms, book titles, Web
bold t extIndicates command names, s creen titl es, op tions and te xt for a graphic al
angle brackets (< >)Indicates a keyboard key press or simultaneous key presses, i.e.
P0609330 2.0
Indicates command n ames and optio ns and te xt that you n eed to enter i n
a command- lin e interface.
Example: Use the
Example: Enter
dinfo command.
show ip {alerts|routes}.
addresses, and variables in command syntax descriptions.
user interfac e (G U I).
<ENTER> or <CTRL j>
Acronyms used in this guide
This guide uses these acronyms:
ANSIAmerican National Standards Institute
APIApplication Program Interface
ARPAddress Resolution Protocol
ASMAnalog station module
ATA (or ATA2)Analog Terminal Adapter
AUIAttachment Unit Interface
AWGAmerican Wire Gauge
BERTBit Error Rate Test
BIOSBasi c Input O u tp ut Sys t em
BKIBreak-in
BLFBusy Lamp Field
BootPBootstrap Protocol
Preface23
BRIBasic Rate Interface
CAPCentral Answering Position
CDPCoordinated Dialing Plan
CHAPChallenge-Handshake Authentication Protocol
CLIDCalling Line Identification
COPSCommon Open Policy Service
COSClass of Service
CSMA/CDCarrier Sense Multiple Access/Collision Detection
CSUChannel Service Unit
DASS2Digital Access Signaling System Number 2
DECTDigital enhanced cordless telecommu nications or Digital European
cordless telephone
DHCPDynamic Host Configuration Protocol.
DiffServDifferentiated Services
DIMMDual In-line Memory Module
DLCIData Link Connection Indentifier
DLCMIData Link Control Management Interface
DNDirectory Number
DNSDomain Name Service (DNS)
DPNSSDigital Pri va te N e t w or k Signalling Sys tem
DRTDelayed Ring Transfer
DTMFDual Tone Multifrequency.
Business Communications Man ager - Management User Guide
24Preface
EDOExtended Data-Out
FDDFull Double Density
FQDNFully Qualified D o m a in N ame
HDLCHigh-level Data Link Control
HFHandsfree
HSHospitality services
HTTPHypertext Transfer Protocol
I/CIntercom feature button
ICCLISDN Call Connection Limitation
IETFInternet Engineering Task Force.
IPInternet Protocol
IPSecInternet Protocol Security
IPXInternetwork Packet Exchange
IRQInterrupt Request
ISDNIntegrated Services Digital Network
ISOInternational Organization for Standardization
ISPInternet Service Provider
ITU-TInternational Telecommunication Union-Telecommunication
Standardization Sector (formerly CCITT)
IVRInteractive Voice Response
LANLocal Area Network
LCDLiquid Crystal Display
MACMedia Access Control
MAUMedia Access Unit
MCDNMeridian Client Defined Network (PRI SL-1)
MIBManagement Information Base
MLPPPMulti-Link Point-to-Point Protocol
NATNetwork Address Translation
NBMANonbroadcast Multi-Access
NCRINetwork Call Redirection Information
NICNetwork Interface Card
NOCNetwork Operations Center
OITOptivity Integration Toolkit
OPXOff Premises E xtension
OSPFOpen S horte st Path First
PAPPassword A uthentic ation Procedure
PBXPrivate Bran ch Exchange.
P0609330 2.0
PCIPeripheral Component Interconnect Slot
PDDPartial Double Density
PPPPoint-to-Point Protocol
PPPoEPoint-to-Poin t Pr o to c o l over Ethernet
PPTPPoint-to-Point Tunneling Protocol
PRIPrimary Rate Interface
PSTNPublic Switched Telephone Network
PVCPermanent Virtual Circuit
QoSQuality of Service
QSIGQ reference poi nt signalling
RASRemote access service
RIPRouting Information Protocol
SAPS Station Auxiliary Pow e r Supply
SDRAMSynchronous Dynamic Random Access Memory
SMDSSwitched Multimegabit Data Service
Preface25
SNMPSimple Network Management Protocol
SPIDService Profile Identifier
STPShielded Twisted Pair
TAPITelephony Application Program Interface
TCP/IPTransmission Control Protocol/Internet Protocol
TETerminal Equip men t
TEITerminal Endpoi nt Ident ifier
TOSType of Service.
TPETwisted Pair Ethernet
UDPUser Datagram Protocol
Universal Dialing Plan
VoIPVoice over IP
VPNVirtual Private Networks
WANWide Area Network
WFQWeighted Fair Queuing
Business Communications Man ager - Management User Guide
26Preface
How to get help
Your local distributor provides technical support for your Business Communications Manager
system or has access to that information through a Technical Service Center (TSC).
USA and Canada
Authorized Distributors - Tech nical Suppor t
Telephone:
1-800-4NORTEL (1-800-466-7835)
If you already have a PIN Code, you can enter Express Routing Code (ERC) 196#.
If you do not yet have a PIN Code, or for general questions and fir st line support, you can enter
ERC 338#.
Website:
http://www.nortelne tworks.com/support
Presales Support (CSAN)
Telephone:
1-800-4NORTEL (1-800-466-7835)
Use Express Routing Code (ERC) 1063#
EMEA (Europe, Middle East, Africa)
Technical Support
Telephone:
00800 800 89009 or 33 4 9296 1341
Fax:
33 49296 1598
email:
emeahelp@nortelnetworks.com
CALA (Caribbean & Latin America)
Technical Support
Telephone:
1-954-858-7777
email:
csrmgmt@nortelnetworks.com
P0609330 2.0
APAC (A sia Pacific)
Technical Support
Telephone:
+61 388664627
Fax:
+61 388664644
email:
asia_support@nortelnetworks.com
Relat e d public a t io ns
These documents provide furthe r information about the Business Communications Manager,
related media bay modules, extension equipment, and system applications and software:
Busine ss Communications Manager Programming Operations
Preface27
Guide
All optional Business Communications Manager applic ations have installation and user guides
specific to that application. Refer to the Programming Ope rations Guide and Tele phone Features Programming Guide. These guides describe core system operational configuration and how to
program the Business Communicat ions Manager equipment.
These guides provide programming for core telephony features and user features, such a s:
•Voice telephony confi guration for digi ta l, IP, ISDN and radio-based tel ephones and equipment
over analog, digital, ISDN, a nd voice over IP (VoIP) trunks.
•How to use and program user telephony features at the telephone
•Companion Applicati on Server software that controls the interface between the Business
Communi ca tio ns Manag e r sys te m and the Co m p ani on wi rel ess sys tem (av a ilab le fo r s elect ed
regions)
•Networking DPNSS (upgrade) (requires keycode) pr ovides private voice networking for the
UK Market.
•Networking MCDN and ETSI Q.SIG Voice Networking (requires keycode) allows you to
network your Business Communicat ions Manager system, or a number of Business
Communications Manager systems to a Meridian system. This allows the network to use a
common numbering plan, as well as common voice messaging and auto attendant systems
connected t o the Meridian.
•Data setup applications and protocols to configure the Business Communications Manager
system to be part of a LAN or WAN network. Refer to the next section for specifics.
Business Communications Man ager - Management User Guide
28Preface
Call Detail Recording System Administration Guide
Call Detail Recording (no ke ycode required) records and reports call activity from the Business
Communications Manager. You can create reports from this information to help you manage
system usage effectively.
IP Telephony Configuration Guide
•i2001, i2002, and i2004 IP telephones and the NetVision and NetVision Data telephones
require a combination of data and telephony settings to work with the Business
Communications Manager. These telephones can make or receive calls through e ither VoIP or
PBX lines.
•Nortel Networksi2050 Software Phone turns your PC into a telephone interface which
provides standard te lephony operating features such as Voice Mail, Caller ID, and multiple
telephone lines or line appeara nces. This application requires Windows 2000, a full duple x
sound card, and a computer-telephony headset. This document describes what settings are
required to use this application with the Business Communications Manager. The i2050 Software Phone Installation Guide provides specific installation information.
•VoIP Gateway (requires keycod e) converts the voice in a call into a packet format and sends
the call using an intranet tr unk. With Business Communi cations Manager VoIP Gateway , you
can make calls over any intranet connected to the Business Communications Manager system.
P0609330 2.0
Chapter 1
Management Overview
This section provides an introduction to the Business C ommunications Manager network-level
management concepts and techn iques contained throughout this guide.
The management overview information is divided into three categories:
•Concepts and models
•Unified Manager usage
•Management User Guide overview
The sections that describe management concepts and models are as follows:
•“Network Administrat ion Objectives” on page 29
•“Network Topology and Management Interfaces” on page 31
•“SNMP Network Management Concepts” on page 34
•“Network Management and Maintenance Applications” on page 36
•“Unified Manager Applica tion Model” on page 37
29
The sections that describe the Unifi ed Manager are as follows:
•“Using the Unified Manager Configure Application” on page 42
•“Unified Manager Maintena nce Page Overview” on page 45
The sections that describe the Management User Guide are as follows:
•“Management Guide Overview” on page 53
•“BCM Monitor overview” on page 54
•“Performance management overview” on page 55
•“Security management overview” on page 56
•“Backup and restore Overvie w” on page 56
•“Troubleshooting and diagnostics activities overview” on page 57
Network Administration Objectives
Network operations cente r (NOC) responsibilities encompa ss the operation of the entire network
domain. Network administration is a complex task that requires intimate knowledge of the
construction and workings of the network environment.
Generally, NOC personnel perform the following network administra tion activities:
•Monitor rout ers, swit ches, hubs, a nd auxil iary backup s yste ms (power sup ply, data) equipment
that comprise the enterpr ise data network.
•Monitor network traffic trends and resolve network bottleneck problems.
Business Communications Manager - Manageme nt User Guide
30Chapter 1 Management Overview
•Manage and allocate IP addresses and domain names, record and provide remote con nectivity
to the enterprise comput ing systems.
The descriptions and proce dures contained in this guide assist with the objectives of service
assurance:
•Monitor the network for alarms and performance threshold
•Ensure service net work integrity
•fault isolat ion, diagnosis and repair
•performance management. Network Operations Center (NOC) takes first call from the alarms
and performs initial tr oubleshooting of the problem. Monitor link status and view, provision,
edit and audit connectio ns. Log into network elements. Monitor inventor y. Monitor network
performance (performance threshold provisioning).
Network management model
The Business Communications Manager network management model defines the management
functions into layers to show the flow of management information between variou s
communicating entit ies. The following figure illustrates the various management layers.
Figure 2 Business Communications Manager network model
Business & Policy Management Layer
•Policy assessment, definition & evolution
Network Managemen t Layer
•Event & Alarm Mgmt
•Infrastructure access
•Performance & optimization
•Communications
•QoS M o n i tori ng
Element Management Tools
•Troubleshoot events & alarms
•Backup & restore
Manageable Systems & Endpoints
•User applications & capabilities
•Event / alarm generation
•System data / traffic
System & Config
Management Layer
•Multi-site configuration
•Asset inventory mgmt
•Bulk MACs
•Enable /d is a ble so f tware keys
•Configuration & administration
•User access
•Threshold settings
•Software keys
P0609330 2.0
Chapter 1 Management Overview31
Network Topology and Management Interfaces
The Business Communications Manager Unified Manager, Network Configuration Manager and
SNMP Network manager applications support the objective s and knowledge requirements of NOC
network administrators. These applications detect, observe and report on the state of the network
elements and the overall health of the network.
Figure 3 on page 32 shows a sample Business Communication s Manager enterprise network that
illustrates th e various c ommunica tions links to e nd devices and c ontrol cons ole s. The diagr am also
shows that the physical ente rprise network, conceptually, is segmented into domains.
•The Network Operations Cente r (NOC) domain represents the tools, equipment and activities
used to analyze and maintain the oper ation of the Business Communications Manager
network. Unified Manager and Network Configuration Manager applications provide the
software interfa ce to perf orm network control and maintenance funct ions. The controller
workstations can be locate d acr oss different enterprise sites.
•The BCM network domain represents one or more Business Communications Managers
networked through an enter prise LAN to one or more controller workstation. The Business
Communications Managers need not be co-located at the same site. The WAN represents an
adjacent net wo rk , extern al to the LAN .
•The VoIP and Wireless VoIP domains represent terminating IP devices.
Business Communications Man ager - Management User Guide
32Chapter 1 Management Overview
Figure 3 Business Communications Manager enterprise network model
NOC Domain
Network
Configuration
Manager (NCM)
Unified Manager
Workstation
SNMP Network
Manager
Workstation
NCM
Server
NCM
Database
BCM Network Domain
Network
Solutions
VoIP
Wireless VoIP
RS232 local interfa ce
WAN
PSTN
V.90
Modem
SNMP Network
Manager Server
Remote
Dialup
Network management physical interfaces
Business Communications Manag er offers alternatives on how to connect to, and access, the
Business Communications Manag er unit and devices in the network (see Figure 4 on page 33).
Connectivity to the network and Business Communications Manager depends on the network
configuration and telephony resources built in the system.
Physically, the Business Communications Manager network can be distributed geographically
across diffe rent sites. Th e network administra tor must be able to access each B CM in the network.
P0609330 2.0
Chapter 1 Management Overview33
Network administrat ion personnel have the ability to configure, observe and control the operation
and performance of the Business Communications Manager through one of the available access
portals. The following interfaces provide management access to the Business Communications
Manager (see Figure 4):
•WAN IP interface: WAN internet access (IP access through the Unified Manager interface)
The WAN interfaces use T1 (with CSU), V.35, X.21, PRI/BRI MBMs Dial on demand.
Establish a connectivity path provided from the corporate LAN network to the end-user’s
WAN network or ISP over another WAN device (e.g. router elsewhere on the enterprise
premises).
•V.90 Dial-up modem interface: (North America option only) The dial-up connection
interface i s availa ble for o ccasional use . Due to modest d ia lup speeds, and potentia ll y lar ge file
sizes, dial-up has limited use. For regular backup/restore and configuration tasks, use a higher
bandwidth connectio n for management a ccess to the Business Communications Manager.
•Local RS232 serial interfa ce (COM port): Local terminal emulation interface. The Business
Communications Manager platf orm base chassis has a serial RS232 port. The RS232 port
provides local terminal emulation connectivity to the BCM. This method is normally used
upon initial in stall. Use loc al c onnectivit y to set the sys tem’ s IP a ddress a nd other basic sys te m
and networking parameters to enable the BCM for remote access. Alternatively, the RS232
port is used to establish a loc al connection to perform local main tenance activitie s in the event
of an IP network communications failure.
•LAN IP interface: local LAN port (IP access through the Unified Manager interface). The
LAN Etherne t interface transm its at 10/ 10 0 M bps. Use IP o ver a LAN E the rn et int erf ace.
Figure 4 Business Communications Manager physical interfaces
CTM 4
1Aux 2 3 4
DSM 16+
12341234
StatusPower
21345
WAN card (field upgrade) connects the Business Comm unications Manager system to the wide area network.1
V.90 Modem port (available in North America only) provides PSTN dial-up access to the BCM.
2
Local RS232 COM port provides a serial connection t o a laptop for maintenance purposes. Also supports a
3
DB9 serial connection to a UPS for power monitoring (see
4
Ethernet port connector #2 provides access to internal local ar ea network
Ethernet port connector #1 provides access to external local area network
5
UPS Installation and Configuration Guide
CTM
DSM
DECT
Unpopulated
).
Business Communications Man ager - Management User Guide
34Chapter 1 Management Overview
SNMP Network Management Concepts
Your Business Communications Manager network uses several hardware devices and various
software applic ations. Network management software provides the ability to exerc ise control over
the network devices.
Refer to the following descr iptions:
•“Network management communication protocols” on page 34
•“SNMP network structure” on page 34
Network management communi cation protocols
The SNMP, HTTP, Telnet, and FTP protocols are fundamental to management of a network of
Business Communications Manag ers.
•SNMP (simple network management protocol): SNMP is application-layer software that
allows you to communicate with and control de vices in your network.
•HTTP (hypertext transport protocol) : HTTP is a communicatio ns protoc ol that allows users to
establish a connect ion with a W eb server and transmit HTML pages to a client browse r. BCM
is a web-server. HTTP also allows transmission of other files required by an HTTP
application.
•Telnet: Telnet is a terminal emulation communications protocol used on the Internet and TCP/
IP-based networks. Telnet allows a networ k administrator or user to use a local workstation to
log onto a remote computer and run a program. Telnet is part of the TCP/IP protocol.
•FTP (file transfer prot ocol): FTP is a protocol used to transfer file s over a TCP/IP network
(Internet, Unix). F TP allows you to log onto the network, list directories, and copy files from
other workstati ons/servers. FTP operations are performed by t yping commands at a command
prompt or through an FTP utility running under a graphical user interface (GUI).
SNMP network stru cture
Network management objectives for the Business C ommunications Manager are based upon the
FCAPS network management model (fault, configuration, administration, performance, security).
To accomplish these object ives, the Business Communications Manager must have the ability to
provide appropria te feedback to the network administrato r.
Network administrat ors use SNMP data to manage network performance, find and solve network
problems and plan for network expansion (see Network Administration Objectives on page 29).
The Business Communications Manager network management system is composed of the
following:
P0609330 2.0
Chapter 1 Management Overview35
•SNMP network management stations (NMS): A cons ole (se rver/workst at ion) through whic h
the network administrator performs network management activi ties upon managed objects.
The SNMP network manager server (workstation) is a physical control device equippe d with
network management applic ation software that interfac es with the Business Communications
Manager(s) in your network.
•SNMP agents: SNMP agent software interfaces and handles interaction between the device
and the SNMP network manager workstation . SNMP agents are softwa re modules resident in
network ele me nts , in this cas e the BCM. The SNMP ag en t coll ect s, stores and retrieves MI B
(management information ba se ) data and forwards the information to the SNMP network
manager server.
•Network elements (managed devices): Ha rdware components such as co mputers, router s, a nd
terminal serve rs that are connected to networks.
•Managed objects: Hardware, configuration parameters or perfor mance statistics that dire ctly
relate to the operati on of a device. Bridges, hubs, routers, or network servers are examples of
managed devices that conta in managed objects.
•Management information base (MIB) : The MIB is t he software t hat define s the data re ported
by the device and the exte nt of contr ol. A vir tual infor mation store that contains a colle ction of
managed objects.
•Management protocol (SNMP): Used to transport management information bet ween the
agents and console. Simple network management protocol (SNMP) is the standard
management protocol . An S NMP trap is a message format used by the SNMP agent to inform
the NMS of a system event.
Figure 5 illustrate s the agent and object relationship in a network and how the system provide s
event notification to the SNMP network manager workstation. Data passes from SNMP agents
(hardware/softwa re processes that report activity in all network devices) to the SNMP Network
Manager server.
Figure 5 Managed objects and agents
Fault in
Device 1
SNMP Network Manager
Workstation/Server
Network
SNMP
Messages
SNMP
Messages
Fault
SNMP
Messages
SNMP
Agent
SNMP
Agent
SNMP
Agent
Devi ce 1
MIB
Devi ce 2
MIB
Devi ce n
MIB
Business Communications Man ager - Management User Guide
36Chapter 1 Management Overview
Network Management and Maintenance Applications
The tools and applic ations bund led with the BCM provide stati stics a nd noti ficati ons of the system
status and operation. Various network management applications are available and compatible for
operation with the BCM or network elements .
There are three categories of network management tools and applications available:
•BCM-specific tools and applications
•optional tools and applications
•third-party tools and applic ations
BCM-specific tools and applications
•Unified Manager (see also “Unified Manager Application Model): A web-based
configuration and maintenance application bundled with the Business Communications
Manager software. Unified Manager is the single point of access for managing all
programming for individua l BCM systems. Access to the Unified Manager is password
protected, and is secure for both enterprise customers and small to medium sized businesses.
Administrators use Unified Manager to quickly set up BCM telephony and data functions, as
well as users, mailboxes, and directory numbers.
•Network Configuration Manager (NCM): Provides centralized configuration and system
management capabilitie s for a number of Business Communications Manager in a network.
This centralized functionality is required to enabl e multi-site Business Communication s
Manager customers a nd channel partners to s ignificantly reduce the cost of ownership of their
systems.
•BCM Monitor: This standalone diagnostic application allows you to view system and IP
telephony informat ion on individual Business Communications Manager units. Open several
instances of BCM Monitor to monitor sever al remote BCM systems on a single PC
simultaneously. This tool supports real-time debugging. This tool also allows you to save and
process data at a later time to generate system utilization and traf fic reports.
Optional tool s and applications
•Optivity Network Management S ystem (ONMS): Use Op tivit y NMS to manage Nort el dat a
devices such as Baystack switc hes, BPS2000, Passport LAN switches, BayRS, and Alteon.
Integrate Unified Mana ger into the Optivity Network Management System (NMS) via the
Optivity Integra tion Toolkit (OIT). Enab le BCM discovery, launch, and alarm integration into
Optivity NMS. Business Communications Manager appears as an element in an ONMS
network discovery di agram. BCM SNMP traps are dis playe d by ONMS, and Unified Mana ger
is launched from within Optivity.
P0609330 2.0
Note: If you r equire an integrated Unified Manager /ONMS configuration, c ontact Nortel
Networks to confirm the correct interoperation of the current releases BCM 3.6 and
ONMS.
Unified Manager Application Model
Unified Manager, a web-based navigation tool, provides access to all operations and maintenance
programming functions on the Business Communications Manager system. The Unified Manager
application allows authorized administration personnel to monitor and control BCM functions
from a single site.
Unified Manager is the single point for managing all programming for individual BCM systems.
You can access Unified Manager locally via the LAN or WAN. Remote access is available via a
V.90 modem dialup. You can also access Unified Manage r through a browser from across a WAN
or Internet connecti on.
Use the Unified Manager applica tion to configure data and voice services on the Business
Communications Manager by using the appl ication’s tabs, buttons, and right-click mouse
functions. Drop-down menus provide access to dialog boxes for data entry and per formance
tracking charts and tab les for network monitoring. The Unified Manager also allows access to
alarm and event notifica tions and diagnostic informatio n.
This section includes information about:
Chapter 1 Management Overview37
•“Using the Unified Manager main page buttons” on pa ge 37
•“Using the Unified Manager Configure Application” on page 42
•“Logging off the Unified Manager” on page 44
Using t h e Unified Manager main page bu ttons
When you access the Unified Manager main page (see Figure 6 on page 38), several selections
provide access to operations grouped under the following functional categories:
•“Configure” on page 38
•“Wizards” on page 38
•“Install clients” on page 40
•“CallPilot” on page 41
•“Documentation” on page 41
•“BRU” on page 41
•“Maintenance” on page 42
Business Communications Man ager - Management User Guide
38Chapter 1 Management Overview
Figure 6 Unified Manager mai n page
Configure
Access the Unifie d Manager programming inte rface for all servic es except those contr olled by the
CallPilot and IVR services.
Wizards
When you first install your system, you must run the Quick Start Wizard to set up your system
paramete rs. Thi s wizard is describ ed in the W i zard h el p, that can be acce sse d on ce y ou ent er t he
wizards section of the Unified Manager.
Use the wizards to perform the following c onfiguration tasks: Quick Start, Add Users, Edit DN
Record Template, DN Renumber, Network Update . Refer to the Programming Operations Guide
for further det ails.
The Wizards are self-contai ne d task applications that you can use to speed up some configur ation
tasks. The access icons for the Wizar ds are located on the Setup and Management Wizards page,
which is accessed through the Wizards button on the first page of the Unified Manager. Refer to
the Programming Operations Guide for further information.
P0609330 2.0
Chapter 1 Management Overview39
Figure 7 Wizards icon page, accessed through the Wizards button
These are the wizards that are available from this page:
•Quick Start Wizard: initializes the system and sets up your basic system information. This
wizard is only run once, when your system is first se t up.
•Add Users Wizard: allows you to change the telephony sett ings for a set of DNs or for a
single DN. You can define the settings in this Wizard, or you can use a pre-defined template,
from a local site or from a remote site, created with the Edit DN Reco rd Template wi zard.
•Edit DN Recor d Template Wizard: allows you to select Tele phony Use r Templates and
change and define the user settings for telephones. The Telephony Templat e is sto red in a file
for use with the Add Users Wizard.
•DN Renumber Wizard: renumbers a range of DNs.
•Network Update Wizard: allows you to update your syst em data netwo rk settings any time
after the Quick Start Wizard wa s run, which sets the initial network setup.
•DECT Mobile Recording Wizard: allows you to enable/disable mobile recording for one of
the base station ports.
•DECT Configuration Wizard: allows you to easily configure a DECT module. It also turns
on one of the base station ports to allow mobile recording (handset registration).
The DECT Wizards only a ppear on the Wizards page if there is a DECT module installed and
identified to the system. These wizards are discussed in the D ECT Installation and Maintenance Guide.
Business Communications Man ager - Management User Guide
40Chapter 1 Management Overview
Navigating the wizards
These are some helpful hints about how the wizards wor k, a nd how to use them.
•To open the online help, from the Progra mming Wizards screen click the Programming
Wiz ards Hel p link.
•You can move back and forth between screens in the wizards by clicking the Back and Next
buttons.
•You can revise your choices and entries on any of the wizard pages until you click the Apply
button. Once you click the Apply button, the system applies the selected configurations. The
user is presented with a confirmation box that provides the approximate timing of the process.
T o check the status of the configuration, press the Refresh button. When the process is
complete, the title of the page has the word completed as part of the title.
Install clients
After you set up th e system and it is operating, you can add the keycodes for any optional features
you want to include.
Access optional applications, including those which require keycode s, through the Install Clients
button. For information about how to set up these optional features, refer to the documentation for
each application.
The install clients utility allows you to select a nd download client applications that allows you to
run multi-media software and other telecommunications functions. Applications may depend on
other components or software keys to be functional. Each application page identifies the
dependencies required in order to activate the appropriate functionality
•Select the Insta ll Clients button to download client applic ations such as
—Call Centre
—Call Pilot
—IVR
— Desktop assistant, i2050 software phone, Personal Call Manager, NetVision Symbol
phone administrator.
•Select the Insta ll Clients button to download client tool kits such as:
— CDR Client wrapper
— LAN CTE client
— TAPI 2.1 installation
— Unified Manager Java class library
•Select the Insta ll Clients button to download developer infor mation such as:
— Program description
— Develop er ca te gor ie s
— Developer partners
.
P0609330 2.0
Chapter 1 Management Overview41
•Select the Insta ll Clients button to download administra tive tools such as:
— Desktop assistant Pro E
— BCM Monitor
—SSH client
CallPilot
Access the CallPilot management application. CallPilot Manager is a web-based application that
you use to set up and administer CallPil ot fea t ur es such as:
•Voice ma il
•Call answeri ng
•Auto attendant
•Custom call routing
•Fax answer ing
Note: Basic CallPilot functions are standard on the Business C ommunications Manager
and you define your region and basic settings when you run the Quick Start Wizard. Refer
to the Programming Operations Guide for further information.
Documentation
Use the Documentation button to find the information you require to help you understand a nd
configure your system to your spec ifications. The entire Business Communications Manager
documentation suit e, plus a number of training panels, are included on your Business
Communications Manager computer , a s well as on the CD that accompanied your system.
•Provides access to the following documentation categories:
— Documentation on how to install hardwa re, configure and operate various BCM-specific
Use the BRU (Backup and Restore Utility) button to ensure the integrity of your system data. The
utility provides a way to back up your system data and configurations in the way that is most
useful for your purposes. Backed up data can be restored to the BCM if a system failure occurs,
such as a prolonged power outage. See Chapter 9, “System Backup and Restore for further
information.
Business Communications Man ager - Management User Guide
42Chapter 1 Management Overview
Maintenance
The Maintenance button accesses a number of maintenance tools that allow you to determi ne the
current status of the various aspects of your Business Communications M anager system. For
further information refer to the description Unified Manager Maintenance Page Overview on page
45.
Using the Unified Manager Configure Application
Unified Manager provides a web-based navigation tool that allows you to view and change
configuration s for the Business Communications Manager system.
Most changes made with Unified Manager become part of current Business Communications
Manager programming when you select an ite m from the menu option s. Howe ver, some changes
take effect after you exi t the scr een. If a programming error occurs, you must re-enter the orig inal
programming.
For further informat ion on how to use the Unified Manager interface, refer to the Programming Operations Guide.
Understanding the nav igation tree headings
The Unified Manager naviga tion tree conta ins five main he adings tha t allo w you to access spe cifi c
areas of the Business Communications Manager system. These headings are described in the
following table.
(<IP address>)
P0609330 2.0
Chapter 1 Management Overview43
Table 2 Navigation tree menu functions
HeadingProgramming
SystemProvides access to Licensing, Identification and Security subheadings. This includes
a form to enter keycodes, and a list of current supported services.
The Security heading provides screens that allow you to determine the level of security
within and entering the system. Refer to Chapter 8, “Security Management.
When you select the System heading, you can view system information such as your
system name and a description about which resources and services are available.
Selecting the System heading also enables the following menu op ti ons: Configuration,
Performance, Fault, Logoff, View, and Help. These menu options provide access for
you to:
•enable/di sable services
•access CPU and memory status
•access to the alarm banner, which displays totals of alarms
•access or refresh a system inventory list
•perform system reboot or shutdown oper ations
ResourcesProvides access for conf iguring data and telephony resources for Business
Communications Manager hardware setup. Ref er to the
as well as in the
ServicesProvides access for configuring telephony and data networking services and various
other related services. Telephony information is discussed in the
Configuration Guide
Operations Guide
documentation , and t he documents for CDR Recording, LAN CTE, IVR, Doorphone,
Network adm ini stration,
and Configuration Guide
“Manually act ivating Telnet” on page 391 .
ManagementProvides access to the User Manager, which you use to manage the users who have
access to t he Unified Manager (Chapter 8, “Security Management), and to the Alarm
Manager, which is used to def ine why types of alarms get reported by the system. For
further infor m ati on on alarms and SNMP traps, refer to Chapter 2, “Fault Management
System.
DiagnosticsProvides access to items that allow you to generate and access statistics on different
system components. Business Communications Manager provides statistics, metrics
and event logs on resources and services to help you carry out system maintenance
activities.
System metrics information is contained in the programming section to whi ch they apply .
Refer to the
Split DS30 configuration and double density configurati on are l ocated under the
Configuration menu of the MSC heading. These syst em features are discussed in the
Programming Operations Guide
DECT Installati on and M aintenance Guide
. System data configuration is discuss ed in the
. This section also supports the informati on found in the CallPilot
UPS Installation and Maintenance Guide
. To manually enable or disable the Telnet service, refer to
Programming Operations Guide
.
and the
Programming O perations Guide
.
IP Telephony
Programming
, and
DECT Installati on
IP Telephony Guide
.
Business Communications Man ager - Management User Guide
44Chapter 1 Management Overview
Logging off the Unified Manager
When you have f inished a session on the Unified Manage r, you need to log off correctly to protect
the integrity of the info rmation you entered.
1Choose BCM (<IP address>) at the top of the navigation tree.
The Logoff menu is enabled.
2Click Logoff, then se lect Logoff.
A message appears that asks you to confirm your request to log off.
3Click Yes to continue.
4A second message appears reminding you to cl ose your br owser window after the system has
logged out. Click Yes to continue.
A Logoff progr ess bar appears. When it the logoff is complete, the browser display will revert
to the Login screen.
5Click the Windows exit icon (top, right corner).
6Click the Windows e xit ic on on t he browser win dow disp laying t he Busi ness Communi cations
Manager main menu.
Note: Exit both Unified Manager browser windows, even if you want to re-log on to the
Configuration area . Onc e you have exite d both windows, you can reestablish a
connection with the Business Communications Manager and log on as usual.
Failure to log out of both browser windows could re sult in a failed attempt to re-enter the
Unified Manager Configuration section.
P0609330 2.0
Chapter 1 Management Overview45
Unified Manager Maintenance Page Overview
The maintenance page is a dedicated maintenance area that provides access to several maintenance
tools and capabilit ies. Gathering these tools into one location provides the network administrator
with a single source for maintenance information, helping to reduce errors and contribute to
gaining overall ser viceability efficienc y.
Figure 8 summarizes the links through the maintenance page. Select any of the links in Figure 8 to
display a description of the maintenance function.
Figure 8 Unified Manager mai ntenanc e page pat hs
Maintenance page access
Support
Contact
Alarms and traps
Maintenance
System in fo rmation
Order and enable optional components
Install optional components
Maintenance tool s
Technical support contact screen
Alarms and traps screen
Shared drive tools
Attach to a shared volume
Detach a shared volume
Enable/Disable BCM driv e shares
System interact ion tools
Execute a command
Telnet session
Troubleshooting tools
IP network troubleshooting
Services & driver troubleshooting
DECT tools
Security
Miscellaneous
System information screen
Keycode retrieval screen
Install optional components screen
DECT tools
Uploading a certificate and a private security key
Business Communications Man ager - Management User Guide
46Chapter 1 Management Overview
Maintenance page access
Access the maintenance page by selecting the Maintenance button on the Unified Manage r main
page (see F igure 6 on page 38).
The following table lists the tools and applic a tions available under the Unified Manager
main t e n ance page.
SupportMaintenanceArchlog
•Contacts•System information•Report a problem wizard
•Alarms and traps•Order & enable optional components•Archlog scheduler
•Install opti onal components•Archlog vie w er
•Maintenance tools•Archlog settings
Figure 9 shows the maintenance page selections.
Figure 9 Unified Manager Mai ntenanc e page
•Browse logs folder
P0609330 2.0
Support
Maintenance page support selections are as follows:
•Contact
•Alarms and Tr aps
Contact
The contact screen displ ays the ITAS contact telephone numbers and contact instructions for all
regions. To display contact information, select Contact unde r the maintenance page support
category. The contact screen appears (see Figure 10) .
Figure 10 Technical support contact screen
Chapter 1 Management Overview47
Alarms and traps
The alarms and traps screen provid es a summary list of all BCM component ID alarms. To display
alarms and traps information, select Alarms and Traps under the maintenance page support
category (see Figure 11).
Select one of the component ID alarm links to navigate to a full description of the alarm and
associated servi ce (if any). For further information on alarm s and traps, refer to Chapter 2, “Fault
Management System.
Business Communications Man ager - Management User Guide
48Chapter 1 Management Overview
Figure 11 Alarms and t raps screen
Maintenance
Maintena nce s e l ect io ns are as follo ws:
•System informati on
•Order & enable optional components
•Install optional components
•Maintena nce too l s
System inf ormat ion
The system info rmation scr een displays a summary o f the software r ele ase and hardwar e inventor y
currently installed on your BCM system.
To display the system information, select System information under the maintenance page
maintena nce cat eg ory . The s ystem info rm at i on screen appears (s ee Figure 12).
P0609330 2.0
Figure 12 System information screen
Chapter 1 Management Overview49
Order and enable optional components
The keycode retrieval search screen displays a search form that allows you to perform the
following:
•select the login loc ation in which to access the keycode retrieval system
•select the product f amily for the keycodes you need to access
•search for keywords
To display the keycode retri eval se arch screen, select Order and enable optional components under the maintenance categor y. The keycode retrieval search scre en appe ars (see
Figure 13).
Business Communications Man ager - Management User Guide
50Chapter 1 Management Overview
Figure 13 Keycode retrieval screen
Install optional components
The install optional co mponents screen display allows you to perform the fol lowing:
•install the IPX rout ing protocol and services on the BCM
•install PPPoE to enable Point-to-Point over Ethernet capability on the BCM (requires a
keycode for install ation). The PPPoE product is only available for BCMs that contain 2 LAN
adapters
When you select either of the above options, the system displays an installation wizard to guide
you through the installation process.
To display the install optional components screen, select Install optional components under
the maintenance category. The install optional comp onents screen app ears (see Figure 14).
P0609330 2.0
Figure 14 Install optional components screen
Chapter 1 Management Overview51
Maintenance tools
The maintenance tools screen display allows you to select the tools necessary for the following
application categories:
ApplicationTools
Shared drive•Attach to a shared volume
•Detach a shared vol um e
•Enable/Disable BCM Drive Shares
System interac ti on•Execute a command
•Schedule a command to execute
•Schedule a restart
•Telnet session
Troubleshooting•IP network troubleshooting
•Services and driver trou bleshooting
DECT
(for further information ref er
DECT Installati on and
to the
Maintenance Guide
SecurityUpload certifica te and private key
MiscellaneousReset Unified M anager server
•Time synchronizat ion
•Backup firmware
•Res to r e fi r m w ar e
)
•Firmware upload
•Restore default configuration
•A-law/Mu-law companding scheme
Business Communications Man ager - Management User Guide
52Chapter 1 Management Overview
When you select a tool for any o f the above ap plica tions, t he syste m displ ays an instal lation wizard
to guide you through the install ation process.
To display the maintenance too ls scre en, select Maintenance tools under the maintenance
category. The maintenan ce tool s screen ap pear s (see Figure 15).
Figure 15 Maintenance page m aintenance to ols screen
P0609330 2.0
Management Guide Overview
This section summarizes the conte nt of the Management Guide as follows:
•“Fault management overvie w” on page 53
•“Service management overv iew” on page 53
•“Log management overview” on page 54
•“BCM Monitor overview” on page 54
•“Performance management overview” on page 55
•“Security management overview” on page 56
•“Backup and restore Overvie w” on page 56
•“Troubleshooting and diagnostics activities overview” on page 57
Fault management overview
This section provides a description of the alarm management system, system events and S NMP
traps. Administrators access alarms and perform fault analysis through the Unified Manager
interface. Use the Unified Manager to configure the fault system. This section provides detailed
information on
Chapter 1 Management Overview53
To further informati on on how to manage system faults, refer to Chapter 2, “Fault Management
System,” on page 59.
This section also provides a correlation between the event source (SNMP traps), components, logs
and services . For fu rth er d etai ls, refer to the fo llow i ng:
•“Component ID (alarm) summary information” on page 92
•“Component ID/SNMP Trap Error Interpretation” on page 100
Service management overview
This chapter describes service manager capabilities available in the Unified Manager interface.
This chapter also describes the properties of the services in the service manager and associated
alarm notifications.
To further information on services, refer to Chapter 3, “Service Management System,” on page
245.
Use the Service Manager to access, ass ess or modify the state of services running on the Busin ess
Communications Managers in your network. Servic es control the fundamenta l functional ity of the
Business Communications Mana ger. A service is a software process that controls interaction with
the Business Communication s Manager hardware devices, computing environment, telephony or
your browser interface .
Business Communications Man ager - Management User Guide
54Chapter 1 Management Overview
Modification of any servi ce has far reaching effects on communications or event r eporting
capability. Nortel Networks strongly recommends you consult with your support group prior to
using the service manager inte rface.
There are two categories of services:
•System level services: Software processes that are critical to essential operating system level
features (see “System-Level Service Definiti ons” on page 252)
•Nortel Networks conf igurable se rvic es: Software processes that are critical to the operation of
the Business Communications Manager software (see “Nortel Networks Configurable
Services” on page 278)
Log management overview
This section describe s the Media Service Card (core telephony) logs. All compone nts of the
Business Communications Manager are logged and hence, the system generates a la rge number of
logs for a variety of purposes. In the case of faults, consult the logs to assist in the diagnosis and
correction of the problem.
Some of the logs run continuously and collect information to help you troubleshoot in the event of
system problems. The network administrator is able to disable some logs because the information
collected may not be of immediate or critical interest to maintain the heal th of the system.
The system generates the foll owing MSC logs:
•MSC System Test Log: Contains diagnostic test results, tele phony events and alarms, audits.
It has a maximum size of 20 items, after which events are aged out to make room for new
events.
•MSC System Administration Log: Contains log-in, log-out information. Has a maximum of
10 entries. The 11th entry overwrites the 1st entry regardless of severity level.
•MSC Network Event log: Contains T1 / PRI network interface events and alarms. This log
has a maximum size of 10 events.
For further information on Business Communications Manager logs, refer to Chapter 4, “Log
Management System,” on page 309.
BCM Monitor overview
Business Communications Manag er diagnostics involves both monitor ing system status and
assessing performance.
To download and use the BCM Monitor application refer to Chapter 5, “BCM Monitor,” on page
329.
P0609330 2.0
Chapter 1 Management Overview55
BCM Monitor is an optional, standalone application that allows the syste m administrator to view
system and IP telephony information for each Business Communications Manager. Open several
instances of the applica tion on a single PC to monitor the corresponding number of Business
Communications Manager syst ems.
BCM Monitor supports real time troubl eshooting and report generatio n. Sys tem administrators
and support personnel obtain key, real-time information to perform troubleshooting if necessary.
The system administrator accesses and saves information to generate system utilization and traffic
reports.
Using BCM Monitor to monitor your system status
The Business Communications Manager (BCM) monitor allows you to see the curr ent status of
various parts of your system ser vices.
Use the BCM Monitor tool during troublesho oting to confirm current configurations, including
CallPilot applications and IP trunk information. You can find BCM Monitor under the Install Clients button on the first page of the Unified Manager. The section that describes BCM Monitor
provides the following main topics:
•“Starting BCM Monitor” on page 329
•“Use BCM Monitor to Analyze your System Statu s” on page 331
•“BCM Monitor Statistical (minimum and maximum) Values” on page 340
•“BCM Monitor information capture ” on page 341
Performance management overview
The Unified Manager System Performance m onitor pr ovides detaile d perfor mance inf ormation f or
the system and the system resources. The statis tics are shown in charts o r table format. If a
performance display is active, it is automatically update d with r eal-time performance informat ion
in time increments that you set.
BCM performance and usage informati on can be queri ed by SNMP.
For further details on performance management, refer to Chapter 6, “Performanc e Management, ”
on page 345.
Use the following tools a nd procedures to monitor the Business Communications Manager system
performance:
•“Unified Manager Performance Monitor
•“Service M anag er
•“Base function tray system status display LEDs
•“Using the Initialization menu to monitor system hardware
•“Disk mirroring function
•“Module Diagnostics
Business Communications Man ager - Management User Guide
56Chapter 1 Management Overview
If you determine through the use of the diagnostic tools, that a hardware problem exists, refer to
the Installation and Maintenance Guide for information on component replace ment.
Security management overview
When you first r un the BCM version 3.6 software, you will note that the default Web acc ess to the
Business Communications Manag er now utilizes SSL encryption for system security. This
includes the appearan ce of a secur ity alert when you initiate a connection to the Unified Mana ger
using SSL, which indicates site validation of the default certificate.
For further information on how to define security parameters for the system and for users, refer to
Chapter 8, “Security Management,” on page 377.
Security management include s the following primary topics:
•“Understanding BCM SSL certific ate properties” on page 377
•“Security Management Tools” on page 379
•“Setting the Interf ace Timeout” on page 380
•“Setting system security compatibility levels” on page 380
•“Managing access password s” on page 382
•“Using the SSH client to access the text-based interface” on page 390
•“Manually activating Telnet” on page 391
•“Access Unified Manager thr ough the Firewall” on page 392
Backup an d r esto re O verview
The backup and restore utility (BRU) provides a means to preserve the integrity of your Business
Communications Manager operating system software and configuration data. The BRU
application al lows you to perform a backup, restore or upgrade via a web connection. The BRU is
a single-user application.
Before you perform any substantial maintenance on the Business Communicati ons Manager, save
your data to a safe storage module location elsewhere in the network. After hardware maintenance
is complete, r estore the data to your Business Communications Manager.
For further information on how to operate the Backup and Restore utility, refer to Chapter 9,
“System Backup and Restore,” on page 395.
Backup and restore procedures are as follows:
•“Accessing the backup and restore utility” on page 411
•“Exiting from the backup and r estore utility” on page 411
•“Resetting the BRU screen” on page 412
•“Adding a new volume” on page 412
•“Modifying a volume” on page 413
P0609330 2.0
Chapter 1 Management Overview57
•“Deleting a volume” on page 413
•“Performing a backup using the BRU” on page 414
•“Scheduling a backup” on page 417
•“Viewing scheduled backups” on page 419
•“Viewing a scheduled backup report” on page 419
•“Deleting a scheduled backup” on page 419
•“Performing a restore using the BRU” on page 420
Troubleshooting and diagnostics activi ties overview
This section contains information about diagnosing module line performance issues and device
line issues. This section also provides instructi ons on how to perform a system startup, set
identification parameters and m aintain telephony resources.
For further informat ion on diagnostics activities , ref er to Chapter 10, “Testing, Troubleshooting,
and Diagnostics,” on page 423.
This chapter contains the following information:
•“Module Diagnostics” on page 423
•“Problems with trunk or stati on modules” on page 426
•“Media Bay Module status” on page 427
•“Testing DTM Modules” on page 429
•“DTM CSU statistics” on page 431
•“Testing the DDI Mux” on page 434
•“Troubleshooting Telephone Connections” on page 439
•“Performing a system start up and warm rese t” on page 441
•“Changing system identification parameters” on page 442
•“Maintenance progra mming for telephony resources” on page 444
•“General Diagnosti c Activities” on page 457
•“Emergency tele phone does not function” on page 464
•“ATA 2 does not function” on page 464
•“Unified Manager Diagnostics” on page 466
•“Driver Debug diagnosti cs” on page 466
Business Communications Man ager - Management User Guide
58Chapter 1 Management Overview
P0609330 2.0
Chapter 2
Fault Management System
Business Communications Manag er fault management includes the following major topic s
•“BCM Fault Management T ools” on page 59
•“Alarm Management System” on page 60
•“Alarm Reporting System” on page 61
•“Access and Configure the Alarm Syst em” on page 65
•“SNMP Traps” on page 74
•“Configuring an SNMP Community” on page 76
•“Configuring an SNMP Manager List” on page 80
•“Configuring an SNMP T rap Community List” on page 84
•“Alarm Analysis and Clearin g Procedures” on page 89
•“Component ID (alarm) summary information” on page 92
•“Component ID/SNMP Trap Error Interpretation” on page 100
•“Component ID alarm descriptions” on page 101
•“Events that cause a system restart” on page 242
59
BCM Fault Management Tools
Fault management activi ties range from system setup, monitoring and repor ting to fault
identificat ion, diagnosis and correction. The toolsets available to the BCM network administra tor
to access alarms and perform fault analysis are as follows:
•Alarm management using the Unified Manager Interface
•SNMP traps for remote fault management
Administrators access alarms and perform fault analysis thr ough the Unified Manager interface.
Business Communications Manager - Manageme nt User Guide
60Chapter 2 Fault Management System
Alarm Management System
The Business Communi cations Manager tracks and generates appr oximately 700 different alarms.
For example, alarms can provide notification that a network interface is not behaving as expected,
or that certain anomalie s in syste m operation have been detected.
When the Alarm Man a ge me n t system is enabled, al l BCM alar ms are rec o rded int o the N T Event
Log. Use the Alarm Banner of the Unified Manager to view alarms for each Business
Communications Manager. A subset of the alarm information pertaining to BCM core telephony
may also appear at the Alarm telephone, and in the MSC logs. Managing alarms within Unified
Manager is described on pages
Note: Assign the Alarm telephone in Feature se ttings under System programming.
Alarms have a higher severity tha n events. Attend to alarm codes before event messages
Alarm code information that is specific to Companion components is included in the
Windows NT Event Log.
Any information sent to the Windows NT event log c an generate an SNMP trap.
“Alarm Analysis and Clearing Procedur es” on page 89.
All BCM alarms can also be sent to a remote management system through an SNMP trap. For
information on how to perform remote fault management of BCM SNMP traps, refer to
Configuring an SNMP Community on page 76.
An alarm may not appear unti l two minutes after it is triggered. If the system is powered off when
the alarm is triggered, the al arm does not appear until two minutes after the system is power ed on.
For further inf ormation about BCM alarms, see ““Alarm Analysis and Clearing Procedures” on
page 89. For an explanation of BCM SNMP traps, see SNMP Trap s on page 74. For information
about the MSC logs, refer to Media service card (cor e telephony) logs on page 309.
P0609330 2.0
Chapter 2 Fault Management System61
Alarm Reporting System
Figure 16 on page 61 illustrates the internal processes by which the Business Communica tions
Manager manages system events.
Figure 16 Business Communications Manager events and alarms
Operating system, drivers
& applications
MSC
1
Telephony
Services
2
4
1
5
NT Event Log
Database
Alarm Manager
User defined
alarm filters
6
Alarm filters
SNMP Trap
Management
10
9
7
Alarm
database
NT SNMP
Extensible
Agent
SNMP
Traps
Alarm Banner
8
3
MSC Log
Database
Core telephony services running on the Media Serv ices Card (MSC), generate event outputs (see
1
“Event sources).
The system forwar ds all BCM core teleph ony (MSC) ev ents, i nclud ing ala rms, to the MSC telepho ny eve nt
2
logs.
BCM telephony (MSC) event logs include t he MSC System Test Log, MSC System Admin Log, and
3
MSC Network Event log. These logs capture all of the MSC (core telephony) system events (including
MSC alarms)
All BCM core telephony (MSC) alarms are written into the NT Event log database. A subset of the
4
core telephony (MSC) events are also written into the NT Event log dat abase.
The NT Event Log database captur es events from all BCM components, including MSC alarm and
5
some MSC event information.
6
The Alarm Manager applies system filters based on configuration inputs.
The Alarm database captu res all NT event information after system filt eri ng is applied.
7
Alarm Banner / Alarm Browser pro vides real-time displ ay of alarms within Unified Mana ger.
8
The Alarm Manager SNM P subsystem applies filters to the BCM alarms based on user inputs about
9
severity level s and event sources.
BCM alarms meeting the SNMP trap crit eria are forwarded to the SNMP trap r eporting interface in
10
accordance with the trap community list
Alarm Browser
Business Communications Man ager - Management User Guide
62Chapter 2 Fault Management System
Event sources
All BCM components can be a source of BCM event information. An event is defined as a
notification of an error or anomaly in operation, or a condition that may lead to an error or
anomaly. The terms “event” and “alarm” are use d interchangeably in the BCM environment.
Refer to Figure 16 when reviewing the following description:
•BCM events derived from the operating system , dr ivers, services and applications, are
captured in the NT Event Log (item 5).
•The BCM events are recorded in the BCM Alarm database (item 7) and displayed as alarms in
the Alarm Banner (item 8). See also Figure 18.
•The BCM events, or alarms, can also be made available to remote fault management systems
as SNMP traps (item 10).
MSC event s
Core telephony services, which run on the Media Services Card (MSC) (item 1 of Figure 16)
represent one of the maj o r BC M com po ne nts that act as a source of even ts. Refe rre d to as MS C
events or core telephony events, these events are assigned an MSC event id and an event priority
from P1 to P9, where P9 is the most severe. If an MSC event is serious enough to be considered an
alarm, the syst em al so assig n s the MSC event an MSC al arm id.
Refer to Figure 16 when reviewing the following description:
•All core telephony (MSC) events, including telephony alarms, are recorded in a set of core
system telephony logs (ite ms 2 & 3).
•All core telephony (MSC) events designated a s alarms are also written into the NT Event log
(item 4). In most cases, the MSC alarm id, assigned by the core telephony (MSC) service, is
re-used as the NT Eve nt ID.
•Some of the core telephony (MSC) events, which are not alarms, are also written into the NT
Event log, primarily those MSC events of priority P5 and higher (item 4). MSC events of
priority P4 and lower can only be seen in the MSC logs - see “MSC (core telephony) logs” on
page 63). MSC events that are visible to the alarm service can also generate SNMP traps.
Due to the interaction between the MSC system and the BCM alarm system, an event in the NT
event database which originates from the core telephony services (MSC) will have an NT event
ID. An event will also have an associated core telephony (MSC) services event ID, and possibly
also an MSC alarm id.
MSC event and alarm conditions
•Software error s that do not affect system operatio n
•Software errors that affect system operation: feature failure dropped calls, or system resets.
P0609330 2.0
Chapter 2 Fault Management System63
•Events ca used by hardware- related problems, but are not of sufficient severity as to b e marked
as an alarm condition. Installers, however, may need to know of these events as they may
indicate a hardware problem (e.g. , bad messages received on a signa lling channel) or a PSTNor private network- related problem (e.g., no battery feed, no dial tone, invalid disconnect
sequence).
•Events that are not of suf ficient severity as to marked as an alarm condition, but where the
problem is related to system limits affected by system usage patte rns, administration, or lack
of resource. Examples are running out of autodialler/speed dia ler bins, LHD nodes, DTMF/
dial tone receiver s. The se events may not be apparent to users, but a degr aded le vel of service
will likely result.
•Information events, concerning a user action, typically in **ADMIN or **CONFIG. (e.g.,
admin log cleared, user attempted to enter **ADMIN with wrong password).
•Permanent, service affecting events that an installer can rectify. Typically these will also be
alarms, but tha t is not a prerequisite. An example of the latter is the defaulting of a portion of
administrati on, without a cold start (installer action: re-administer the data ).
MSC (core telephony) logs
Refer to Figure 16 when reviewing the following description:
•MSC logs (item 3) are maintained on the Media Services card, MSC, which is the telephony
side of the Business Communicati ons Manager system.
•The MSC logs are actually a set of three logs, the MSC System Test, MSC System
Administration, and MSC Network Event log. These logs capture all of the core telephony
(MSC) syst em eve nts, (i ncl ud ing alarms). For furth er inf or ma tio n, ref er to “Media service
card (core telephony) logs” on page 309.
•Note that core teleph ony (MSC) events, designated as MSC alarms, are sent to the NT Event
Log in addition to being recorded in the MSC (core tele phony) logs (item 4). Also, MSC
events of priority 5 (P5) and higher are sent to the NT Event log (item 4). MSC events are
shown in the BCM alarms under component id “Voice Software”.
NT Event log database
When the alarm service is enabled, all BCM alarms are recorded into the NT Event Log (item 5 of
Figure 16).
For further information about how to view NT Event Logs, see “Obtaining NT Event Logs from
Archlog” on page 327.
Alarm manager
Refer to Figure 16 when reviewing the following description:
•The system forwards event s from the NT Event log to the Alarm Manager.
•The Alarm Manager applies system filters based on configuration inp uts.
Business Communications Man ager - Management User Guide
64Chapter 2 Fault Management System
•The events are then recorded into the Business Communications Manager alar m database .
Alarm da tabase
Refer to Figure 16 when reviewing the following description:
•The alarm database (ite m 7) holds a maximum of 5000 alarm rec ords. The network
administrator configures the record capacity of the alarm database to a smaller size if required.
•Use the Unif ied Manager Alarm Manager batch archive function to archive the inf ormation in
the alarm database. Set the batch job pa rameters (day of the week and time) and file
destination. For further information on how to configure and use the alarm manager, refer to
Configuring alarm manager settings on page 69.
Alarm banner and alarm browser
The Alarm Banner and the Alarm Browser (ite m 8, Figure 16) provide real-time inf ormati on about
events occurring with in the Business Communications Manager system.
Alarm system interfaces
•The Alarm Banner window allows you to continua lly monitor the Business Communications
Manager sy stem fo r alarms. For more info rma tio n , ref er to “Accessing the alarm b an ner to
monitor alarm notification” on page 67.
•The Alarm Browser window allows you to browse through a list of alarms and provides
detailed information on each one. For more information, Refer to “Accessing the alarm
browser to analyze alarm detail” on page 68.
•Alarm Manager a llows you to manag e the col lection a nd s torage of a lar m informat ion. Use the
Alarm Manager to enable or disable sending of all or some types of SNMP traps. The Alarm
Backup Batch Job application ba cks up old alarm records to an archive folder at scheduled
time intervals. For further information on how to use the Backup Batch Job, refer to
“Configuring alarm manage r settings” on page 69.
BCM alarm se verity
Alarm severity refers to a scale in which an alarm notification is categoriz ed. The alarm severity
prescribes the degree of appropriate user interventi on.
There are four alarm severity levels: critical, major, minor, and warning.
•Critical alarms indicate system problems that require im m ediate corrective action.
•Major alarms indicate system problems that require corrective action.
•Minor alarms indicate system problems that do not affect system performance and may or
may not require action.
•Warning alarms indicate syst em status changes that normally do no need any corrective
action.
P0609330 2.0
Chapter 2 Fault Management System65
Access and Configure the Alarm System
The alarm service works to generate SNMP trap event notifications. You must also enable and
configure SNMP traps. The Business Communications Manager alarm service performs the
following functions:
•Monitors Windows NT event logs for incoming events.
•Synchronizes Windows NT logs with Business Communicatio ns Manager alarm database.
•Receives eve nts (alarms) from other Business C ommunications Manager applications thr ough
its API and logs the events in the Business Communica tions Manager database.
•Archives alarm hist ory based on the criteria defined in Alarm Manager.
•Monitors the alarm conf iguration changes and updates SNMP trap agent and Alarm Service.
Note: When the alarm service is enabled, the Business Communications Manager system
automatically archives the BCM Event logs. See “Enabling the alarm service” on page
66.
Note: The alarm serv ice i s disa ble d by def ault. You mu st enab le t he alarm s erv ice t o
view alarms on the alarm banner (see “Enabling the alarm service” on page 66).
Note: You must configure how the system handles SNMP trap notifications. Events
arriving in the alarm datab ase tr igger an SNMP trap message to be generated. If you do
not configure SNMP traps, you will not obtain optimum alarm reporting capability.
Business Communications Man ager - Management User Guide
66Chapter 2 Fault Management System
Enab ling the alarm service
Use this procedure to enable the alarm service from the Unified Manager interface and to view
alarms on the alarm banner.
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2Select the Services key from the Unifie d Manager main page and expand the nav igation tree.
A list of available servic es appears in the Services information frame .
3Select the Alarm Service heading from the navigation tree window.
The Alarm Service Summary dialog box appears.
4From the Status list box, change the status of the alarm service to Enabled.
(See Figure 17 on page 66).
Figure 17 Alarm service selection window
5Press the Tab key to save the settings.
P0609330 2.0
Chapter 2 Fault Management System67
Accessing the alarm banner to monitor alarm notification
Use the alarm banner to continually monitor the Business Communications Manager syste m for
faults or alarm conditi ons. The alarm banner stays active on your desktop for quick acc ess. The
banner displays color codes to represent the alarm severity and the number of alarms for each
severity level. The alarm banner displays alarms in real time.
Note: You must enable alarm service before the alarm banner will function. To enable the
alarm server, refer to “Enabling the alarm service” on page 66.
Complete the following steps to access the alarm banner.
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree select the System heading.
The Performance, Fault and Tools menus are enabled.
3From the Fault menu select Alarm Banner.
The Alarm Banner appears (see Figure 18 on page 67).
Figure 18 Alarm bann er
4Select any color coded alarm button to view a report of active alarms.
The Alarm Browser appears. See “Accessing the al ar m br o wse r to anal y ze alarm detail” on
page 68 for more informat ion.
Business Communications Man ager - Management User Guide
68Chapter 2 Fault Management System
Accessing the alarm browser to anal yze alarm detai l
With the alarm b row s er yo u can acc es s and d et ect an ala rm occu r ring o n the sys tem. W ith the
alarm browser you can display detailed information on each alarm to assist you to perfor m
corrective acti on, if neede d.
See the section “Alarm Analysis and Clearing Procedures” on page 89 for a detailed explanation
on how to navigate through the alarm clea ring process and the descriptions in thi s guide.
To access the alarm browser and alarm detail screen
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the navigation tree clic k the System heading.
The Performance, Fault and Tools menus are enabled.
3On the Fault menu click Alarm Banner.
The Alarm Banner appear s.
4Select any color c oded alarm button from the alar m banner to dis pla y a report of act ive alarms .
Select ALL (white button) to browse throu gh the complete list of system alarms, regar dless of
the severity level. The alarm browser screen appears.
5Select the row correspondi ng to the alarm for which you want detailed information.
6On the alarm page click the Actions menu and select Display Details.
The Alarm Details screen appears. The Alarm Details screen is a read-only display.
P0609330 2.0
Figure 19 Alarm browser and detail screen
Chapter 2 Fault Management System69
7Close the Alarms Details screen when you are finished vie wing the alarm detail.
8Close the Alarm Browser screen when you are finished viewing the alarms for this severity.
Configuring alarm manager settings
The Alarm Manager enables you to manage the collection and storage of alarm information. The
Alarm Manager allows you to set different collection parameters for the Alar m Database. You can
use the Alarm Manager to enable or disable the sending of all or some types of SNMP traps. The
Alarm Manager provides the Alarm Backup Batc h Job, an application which backs up old alarm
records to an arc hive fo ld er at a schedu l ed time .
To configure alarm manager settings
1On the navigation tree, click the Management key and click Alarm Manager.
The Alarm Database, SNMP Trap and Alarm Backup Batch Job windows appear.
Business Communications Man ager - Management User Guide
70Chapter 2 Fault Management System
Figure 20 Alarm manager dat abas e fields
2Use the information from the following table to configure the Alarm Database:
Table 3 Alarm Database settings
AttributeDescription
Maxi mu m Num be r
Record
Kept Timer (days) Allows you t o set the number of days that the records r em ain in the database before the records
Resync Timer
(seconds)
Allows you to set the maximum number of record s that the alarm dat abase stores. The default is
0 (no limit).
The range is from 0 to 5000 records. If you enter 0, there is no limit to the number of records.
When the number of records reaches the maximum, t he earliest record is rem oved to make
room for the new alarm record.
are archived.
Allows you to set, in seconds, the interval at which the alarm service init iates a synchronization
operation with the Business Communications Manager's internal event logs. This
synchronization is in addition to the normal synchronization operations triggered by the arrivals
of new events.
P0609330 2.0
Chapter 2 Fault Management System71
Table 3 Alarm Database settings (Continued)
AttributeDescription
Archive LocationAllows you to enter the path to the director y where the archives of alarm information are kept.
The default path is: d:datafiles\nortel networks\unified manager\archive\.
Nortel Networks highly recommends that you do not change this path from it def ault value.
An archive of the al arm informa tion is made whe n an Al arm Backup Bat ch Job is run or whe n th e
Alarm Service is star ted. During an archive operation, the alarm database is copied to the
archive location and the alarm dat abase is then emptied.
During an archive operation, the Busines s Commu nications Manager's int ernal event logs are
also copied t o the archive locati on and the event logs are then emptied. The file names of these
internal eve nt l og archives are:
System Event Log SystemLog YYMMDDHHMM.evs
Application Event LogApplicationLogYYMMDDHHMM.evs
Security Event LogSecuri ty LogYYMMDDHHMM.evs
Where:
YY is the year the archive was created
MM is the month the archive was created
DD is the day the archive was created
HH is hour the archive was created
MM is the minute the archive was created
3Press the TAB key to save your settings.
4Click the SNMP Trap tab.
Business Communications Man ager - Management User Guide
72Chapter 2 Fault Management System
Figure 21 SNMP Trap screen
5Use the information from the following table to configure the SNMP Trap:
Table 4 SNMP Trap settings
AttributeDescription
Traps EnabledAllows you to enable or disable the sending of SNMP traps when a new event arrives in the alarm
Information
Events
Forwarded
Warning Events
Forwarded
Error E v en t s
Forwarded
Source
Exclusion List
database.
Allows you to enable or disable sending SNMP traps when an “Information” event arrives in the
alarm database. If you have auto SNMP trap dial out set up, and the value for 'Traps Enabled' is
'Yes', settin g "I nformation Events Forwar ded" to "Yes" causes the BCM to repeatedly redial the
trap client. Always set "Information Events Forwarded" to "No" when SNMP trap dial out is set up.
If the name of a demand dial inter face is selected as 'Int erface' (when you add/modify a trap
community entry) and the 'Traps Enabled' field value is 'Yes', Nortel Networks recommends you
specify the value of the 'Informa tion Event s Forwarde d' field as ' No'. If you speci fy a value of “Yes”,
the BCM will constantly redial to the trap client.
Note: Windows 95/98 is not supported on a receiving system for the 'SNMP trap dialout' feature.
Allows you to enable or disable sending SNMP traps when a “Warning” event arrives in the alarm
database.
Allows you to enable or disable sending SNMP traps when an “Error” event arrives in the alarm
database.
Allows you to add, in a comma-separated format, a list of event sources from which SNMP traps
must not be generated. The source exclusion list prevents you from recei ving SNMP traps which
have no meaning to you.
P0609330 2.0
6Press the TAB key to save your settings.
7Click the Alarm Back up Ba t ch J ob tab.
Figure 22 Alarm backup batch job screen
Chapter 2 Fault Management System73
8Use the information from the following table to configure the Alarm Backup Batch Job:
Table 5 Alarm Backup Batch Job se ttings
AttributeDescription
Batch JobAllows you to start or stop a schedu led batc h backu p to an archive f older. The Alarm Back up Batch
Job uses the Kept Timer value fr om the Ala rm Database screen to determine when to archive an
alarm record.
Schedule DayAllows you to set the day when the system must perform the backup.
Schedule TimeAllows you to set the time the backup must start.
Tips
Before you change the day or time, or both, you must first stop the batch job, make yo ur changes,
and then start the bat ch job again.
9Press the TAB key to save your settings.
Business Communications Man ager - Management User Guide
74Chapter 2 Fault Management System
SNMP Traps
A trap is a signal that tells a program that an event occurred in the system. When a program
receives a signal, a specif ic set of activities take place.
The SNMP system enables SNMPv1 traps to be generated based on all or a subset of NT Events
generated on the Busine ss Communicati ons Manager. Any informat ion sent to the BCM Windows
NT event log and shown in the Alarm Banner and Alarm Browser can generate an SNMP trap.
SNMP traps received from Business Communications Mana ger contain descript ions of the alarms
that occur in the system. Additionally, SNMP generic traps such as c oldStart, linkDown, linkup,
authenticati onFailure, are als o generated from the Business Communications Manager, depending
on the user’s configurat ion.
For the BCM to generate SNMP traps, you must configure how the system handl es SNMP trap
notifications. When SNMP is enabled, events arriving in the alarm database trigger a n SNMP trap
message to be generated. Use the alarm manager to enable or disable sending of all or some types
of SNMP traps.
The trap format is specified in the BCM “Small Site Ev ent MIBs” on page 472 and is captured and
viewed through any standard SNMP fault monitoring framework or trap watcher (see “Appendix
A Management Informat io n Ba se (MIB) System ).
BCM alarm and SNMP trap list
The complete set of BCM Alarms and SNMP traps is provided (see “Componen t ID (alarm )
summary information” on page 92). You can also view the BCM Alarms list using the following
methods:
1Access the Uni fied Ma na g er Ma int enance page. Se lect the he adi n g “Alarms and Traps” . The
Alarms and Traps selection presents a list of the events (see Table 12 on page 92).The events
are organized by event source.
2Contact your Business Communications Manager Nortel Networks Systems Engine er,
Services organization, or PLM and request a list in Excel spreadsheet format.
Alarm banner, NT event databa se, and SNMP trap correlation
Although the same events (alarms) are reported in the Unified Manager Ala rm System, made
available remotel y via SNMP traps and recor ded in the NT Event logs, the terminology used to
denote severity levels is not the same.
P0609330 2.0
Chapter 2 Fault Management System75
Refer to the table Alarm banner, NT Event and SNMP trap severities or types to interpret the
severity for each type of notification The terminology used to denote sev erity levels between the
NT Event log and in the Alarm Banner is not identical.
Table 6 Alarm banner, NT Event and SNMP trap severities or types
Alarm priorityAl arm BannerNT EventSNMP Trap Type
HighcriticalErrorError
Mediummajor or minorWarningWarning
LowwarningInformationInformation
Refer to the table SNMP trap types to interpret the severity for each type of notification. The
mapping between alarm severity levels and SNMP trap types (or 'specific-t rap' code) is
summarized in the table.
The BCM Alarm system denotes the source of a BCM alarm as “Component id”, whereas the
SNMP system de n ote s the sou rce of the sam e information as a trap of sour ce “ev e ntS our ce”. The
terminology used in this document of Component ID (alarm )/ eventSource (trap) is intended to
show that these two systems call the same information by a different name.
SNMP trap filtering
Trap filtering is supported at the Business Communications M anager by using a source exclusion
list and severity level (Error, Warning, Info). In this way, traps of type “error” (or severity level
critical) a re forwarde d in acc ordance with t he trap communi ty li st. The trap fil ters limit t he volume
and type of SNMP information and allows the Network Administrator to control essential
information trans ferred on the network.
Use the fields on the SNMP Trap tab in the Alar m Manager to set the fi lter s for SN M P t raps
(BCM-->Management-->Alarm Manager-->SNMP Trap).
SNMP guidelines
The SNMP service i n Business Communications Manager responds to r equests from manageme nt
stations, generates SNMP traps corresponding to events and reports to trap subscriber stations.
Business Communications Man ager - Management User Guide
76Chapter 2 Fault Management System
Use the following SNMP guidelines:
•Set read-only and read-write community names.
•Set a list of permitted manag ers. When set, the agent responds to SNMP managers requests
from those IP hosts only.
•An empty list of permitted manage rs implies that the agent responds to requests from anyone.
•Set trap communities. Each trap entry identifies the community name that must be used and
the manager addresses.
•Enable or disable sending authentication traps.
•Enable or disable the SNMP agent.
About defining SN MP trap destinations
Use the following to define SNMP trap desti nat ions:
•A community list specifying community name and access privileges
•a manager list spec ifying S NMP manager IP addres ses, i n oth er words SNMP mana gers which
are allowed to make SNMP queries to the Business Communica tions Manager
•a trap community list which specifies de stinations to which SNMP traps should be sent if
SNMP traps are enab l ed
Although no specific limit is se t for the number of trap communities, Nortel Networks
recommends that you limit the number of trap communities to a maximum of 5. Limiting the
number of trap communities ensur es that system performance does not degrade.
Configuring an SNMP Community
Use the procedures in this section to configure the Business Communications Manager to send
SNMP message s to an S NMP works tation.
•Configuring SNMP summary attribu tes on page 76
•Adding a community to an SNMP community list on page 78
•Modifying an SNMP community list on page 80
•Deleting an SNMP community on page 80
Configuring SNMP summary attributes
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading.
The SNMP Summary screen appears.
P0609330 2.0
Figure 23 SNMP summary screen
Chapter 2 Fault Management System77
5Configure the SNMP summary attribut es accor ding to the following table.
Table 8 SNMP Sum mary attributes
AttributeDescription
DescriptionShows the description of the SNMP agent.
VersionShows the version of the SNMP agent.
StatusAllows you to enable or disable the SNMP agent.
Authentication
Failure Traps
Allows you to disable authentication failure traps.
When enabled, t he SNMP agent sends authentication failure traps if there is an authentication
failure. Authent ication failures happens if an SNMP manager applica ti on provides an incorrec t
community strin g or performs an operation t hat is not permitted for a communit y.
Business Communications Man ager - Management User Guide
78Chapter 2 Fault Management System
Adding a community to an SNMP communi ty list
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading.
The SNMP Summary screen appears (see Figure 23 on page 77).
5Click the Community List tab.
The Community List screen appears.
6On the Configuration menu click Add Community.
The Community List dialog box appears.
Figure 24 Community list screen
P0609330 2.0
7Configure the Community List attr ibutes according to the following table.
Table 9 SNMP Comm unit y List attributes
AttributeDescription
Chapter 2 Fault Management System79
Community List
(C#)
Community Name Allows you to specify t he name of th e communi ty tha t the i ndivi dual manager s us e to intera ct wit h
Access
Permission
Allows you to specify th e entry name used as a key to uniquely id entify an individual community
entry on the SNMP agent. Its val ue mu st follow certain conventions. It must have the pre fi x C
followed by a unique numbe r tha t identifies the community name entry on the agent. For
example, C2 is a valid va lue. While adding, specify non-recurri ng values for the unique number.
While adding, if y ou sp ecify an exis ting communi ty ent ry nam e, i t modif ies t he exis ting c ommuni ty
entry. Using non-sequential numbers results in automatic reassignment of sequenti al numbers.
While modifying a communi ty entry, you can't change the name. The community ent ry name
does not have any significance other than to identify an entry.
this agent.
The name is case sensitive.
The default communit y nam es are public and Private.
If there are no community nam es listed, then all comm unity names are accepted.
All the community names are global to the agent. In other words, you cannot associate a s pecific
community name with a single management station.
Allows you to specify th e read and write access for this community. The following options are
available:
READ-ONLY and READ-WRITE
The default value is READ-ONLY.
8Click the Savebutton.
Business Communications Man ager - Management User Guide
80Chapter 2 Fault Management System
Modifying an SNMP community list
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading.
The SNMP Summary screen appears (see Figure 23 on page 77).
5Select the Community List tab.
The Commu ni ty L ist scr een ap p ear s (see Figure 23 on page 77).
6Highlight the community you want to modify.
7On the Configuration menu click Modify Communit y.The Community List dialog box
appears (see Figure 24 on page 78).
8Modify the Community attributes as required.
9Click the Save button.
Deleting an SNMP community
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading. The SNMP Summary screen appears (see Figure 23 on page 77).
5Click the Community List tab.
The Commu ni ty L ist scr een ap p ear s (see Figure 23 on page 77).
6Highlight the community you want to delete .
7On the Configuration menu select Delete Community.
A message appears that asks you to confirm the del et ion.
8Click the Yes button.
The community is deleted from the list.
Configuring an SNMP Manager List
Use the procedures in this section to add, modify or delete SNMP manager information in the
Manager List.
•Adding a manager to the SNMP manager list on page 81
•Modifying an SNMP manager on page 83
•Deleting an SNMP manager on page 83
P0609330 2.0
Adding a manager to the SNMP ma nager list
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading.
The SNMP Summary screen appears (see Figure 23 on page 77).
5Click the Manager List tab.
The Manager List screen appears.
6On the Configuration menu click Add Manager .
The Manager List dialog box appears see Figure 25 on page 81).
Figure 25 Manager list screen
Chapter 2 Fault Management System81
Business Communications Man ager - Management User Guide
82Chapter 2 Fault Management System
7Configure the Manager List attributes according to the following table.
Table 10 SNMP Manager List attributes
AttributeDescription
Manager List
(M#)
Manager IP
Address
8Click the Savebutton.
Allows you to specify th e entr y nam e used to identify an indivi dual manager entry on the SNMP
agent. Its value must follow certain conventions. It must have the prefix M f ollowed by a unique
number that identifies the manager entry on the agent . For example, M2 is a valid value. While
adding, specify non-recurring val ues for the unique number.
While adding, if you specify an existing mana ger entry name, it modifies the existing manager
entry. Using non-sequential numbers results in automatic reassignment of sequenti al numbers.
While modifying a manage r ent ry, you cannot change the nam e. The manager entry name
uniquely identifies an entry.
Allows you to specify the IP Address of the SNMP M anager station corresponding t o this entry. If
no manager entries ar e creat ed, the Business Communi cations Manager device accepts SNMP
requests from all stations. If there is a lis t of mana ger entries, Business Com mun ications
Manager base unit accepts SNMP requests from the IP Addresses specified in the list.
P0609330 2.0
Chapter 2 Fault Management System83
Modifying an SNMP manager
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading.
The SNMP Summary screen appears (see Figure 23 on page 77).
5Click the Manager List tab. The Manager List scr een app ear s (see Figure 25 on page 81).
6Highlight the manager you want to modify.
7On the Configuration menu select Modify Manager. The Manager L ist scr een ap p ear s.
8Modify the manager attributes.
9Click the Save button.
Deleting an SNMP manager
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading. The SNMP Summary screen appears (see Figure 23 on page 77).
5Click the Manager List tab.
The Manag er List scr een ap pears (see Figure 25 on page 81).
6Highlight the manager you want to delete .
7On the Configuration menu select Delete Manager. A message ap pears to co nfi rm the
deletion.
8Click the Yes button.
Business Communications Man ager - Management User Guide
84Chapter 2 Fault Management System
Configuring an SNMP T r ap Community List
Use the procedures in this section to add, modify or delete information within the SNMP trap
community list.
•Adding a trap community to the SNMP community list on page 84
•Modifying an SNMP trap community on page 87
•Deleting an SNMP trap community on page 88
Adding a trap community to the SNMP community list
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading. The SNMP Summary screen appears (see Figure 23 on page 77).
5Click the Community List tab. The Community L ist scr een app ear s (see Figure 25 on
page 81).
6On the Configuration menu select Add Trap Community. The Trap Community List dialog
box appears (see Figure 26 on page 85).
P0609330 2.0
Figure 26 Trap Community list screen
Chapter 2 Fault Management System85
7Configure the Trap List attributes according to the following table.
Table 11 SNMP Trap List attributes
AttributeDescription
Trap List (T#)Allows you to specify th e entr y nam e used to identify an indivi dual trap community entr y on the
SNMP agent. Its value must fol low certain conventi ons. It must have the prefix T followed by a
unique number that id entifies the trap commun ity entry on the agent. For example, T2 is a valid
value. While adding, specify non-recurring values for the unique number.
While adding, if you specify an existing trap community entry name, it mo dif ies the existing trap
community entry. Using non-sequential numbers results in a utomatic reassignment of sequential
numbers. While modif ying a trap community entr y, you can't change the name. The tr ap
community entry name does not have any signifi cance, other than to uniquely identify an entry.
Community Name The community name is case sensitive and encoded in each trap message. This name can not
be in the Community List.
Business Communications Man ager - Management User Guide
86Chapter 2 Fault Management System
Table 11 SNMP Trap List attributes (Continued)
AttributeDescription
Manager IP
Address
InterfaceAllows you to specify the method to route SNMP traps to the SNMP trap collector.
Allows you to specify th e IP addresses of the SNMP trap subscriber stations. If you have too
many IP addresses in the trap com m unity list, the SNMP service may degrade system
performance.
The IP address must corre spond to the PC where the trap collect or sof tware is installed.
Do not use the dynamic IP addres s that the PC receives when the dial-up link activates (as the
BCM initiates dialing). Using the dynamic IP addr ess causes the removal of the required static
route.
If the trap collector is on the same subnet as one of the BCM LAN or WAN interfaces, select
'RouterAssigned' as the Interface value. The RRAS decides how to route the packet to the trap
collector acc ording to its current routing table.
If you want to let the BCM send trap packets to the trap collector via the di alup interface, select a
demand dial interfac e as 'Int erfac e'. The BCM auto matical ly adds ( under IP rou ting) a static rout e
for the trap collector that points to the dial-out V.90 mo dem or ISDN interface. Configure a trap
community entry with the trap collector IP addr ess as the trap destination. Select
'RouterAssigned' or one of the dial-out interfaces listed in the drop-down list.
The types of communication links are as follows:
•Select RouterAssigned: The route for the trap destinati on is automatically determined and
handled by the RRAS. Enter the IP address of the tr ap collector in the Manag er I P Address
field.
•V.90 Dial-out: The interface is specified through Resource s/dialup/V.90/Modemtrapdialout.
The BCM will automatical ly dial -out to the SNMP trap collec tor te lephone n umber . Spec ify the
dial-out information under the V.90 Link Parameters tab. The Modembackup is not used f or
the auto SNMP trap dial-out feature.
•ISDN BRI (Europe/North America): The interf ace is specified thr ough Resources/dialu p/
ISDN. The BCM will automaticall y dial-out to the SNMP trap collector phone number.
•ISDN PRI (Europe): The int erface is specified through Resources /di alup/ISDN. The BCM will
automatically di al-out to the SNMP trap collector phone number.
8Click the Save button.
P0609330 2.0
Modifying an SNMP trap community
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading. The SNMP Summary screen appears (see Figure 23 on page 77).
5Click the Trap Community List tab. The Community List screen appears (see Figure 24 on
page 78).
6Highlight the list you want to modify.
7On the Configuration menu select Modify Trap. The Trap Commu n ity L ist screen ap pears
(see Figure 27 on page 87).
Figure 27 Modify trap community dialog box
Chapter 2 Fault Management System87
8Modify the trap community attr ibut es .
9Click the Save button.
Business Communications Man ager - Management User Guide
88Chapter 2 Fault Management System
Deleting an SNMP trap community
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager main page select Configuration.
3Click the Services key.
4Click the SNMP heading.
The SNMP Summary screen appears (see Figure 23 on page 77).
5Click the Trap Community List tab.
The Commu ni ty L ist scr een ap p ear s (see Figure 24 on page 78).
6Highlight the list you want to delete.
7On the Configuration menu select Delete Community.
A message appears that asks you to confirm or cancel the deletion.
8Click the Yes button.
The SNMP trap community list is deleted from the database.
P0609330 2.0
Chapter 2 Fault Management System89
Alarm Analysis and Clearing Procedures
Use the information in this sect ion to identify, analyze and clear alar m events. This section
describes alarm messages and appropriate, associated maintenance activities (see the “Alarm
clearing flow chart” on page 89). Use the information in this section as a reference to interpret and
act upon event notifications from your alarm interface.
Use the Unifie d Man ag er int er fac e to dete ct ev en ts th at af fect
system performance or function
•The alarm banner and alar m browser (primary Unifie d Manager in terfa ce for alar m detection) .
•The phone alarm (if configur ed) provides both a visual and audible indica tion of an MSC
alarm event.
•The event logs displayed through the SNMP trap watcher application provide supporting
information or as an altern at ive event reporting tool.
•The system test log provides supporting alarm information (for MSC events only).
Figure 28 Alarm clear ing f low chart
Examine Alarm
Banner
Locate alarm event in Component ID (alarm)/eventSource (trap) summary on page 92
Routine monitoring process
Alternative monitoring process
Examine Alarm
Follow recommended action indicated in alarm description
YesOther alarm?
Browser
Alarm event
Examine Alarm
Phone - MSC
Event
Examine
SNMP trap
Examine
System test
logs (MSC
events only)
No
End
Analysis & Resoluti on process
Business Communications Man ager - Management User Guide
90Chapter 2 Fault Management System
SNMP Event Messages
SNMP Trap notifications (messages) are displayed in your SNMP trap watcher application.
SNMP event messages are generated when the following occur:
•a system level service is activated or stopped
•a Nortel Networks confi gurable service is activated or stoppe d
SNMP events are characterized by the following severity levels:
•Error
•Warning
•Information
Using the component ID and event ID summary tables
The BCM Alarm system denotes the source of a BCM alarm as “Component ID”, whereas the
SNMP system de n ote s the sou rce of the sam e information as a trap of sour ce “ev e ntS our ce”. The
terminology used in this document of Component ID (alarm) / eventSource (trap) is intended to
show that these two systems call the same information by a different name.
Use the tab le “Component ID (alarm)/eventSource (trap) summary” on page 92 to navigate to the
SNMP event displayed in your SNMP trap watcher application.
Alternativel y, use “Component ID alarms/eventSource (Tr ap) by event ID” on page 95 to identify
SNMP event ID and display the associated SNMP trap message and appropriate maintenance
activity.
The alarm description provides the following information:
•associated service name
•event ID number
•alarm interpr etation and corrective action s
•associated logs
To use the alarm summary table
1Examine the alarm name shown in the alarm browser.
2Select the corr esponding link shown in “Component ID (alarm)/eventSource (trap) sum mary”
on page 92 under Alarm name.
The alarm description is displayed.
“Component ID (alarm)/eventS ource (trap) summary” on page 92 also displays the service
associated with the alarm.
3Select the associat ed ser vice name link to display the service description (see “Service
Definitions” on page 251).
P0609330 2.0
Chapter 2 Fault Management System91
4Select the Retu rn to tab le link to display the alarm summary table to select another alarm or
service description.
Business Communications Man ager - Management User Guide
92Chapter 2 Fault Management System
Component ID (alarm) summary information
Use the informatio n displayed in C omponent ID (al arm)/eve ntSource ( trap) sum mary to se ar ch fo r
an alarm by the Component ID. Use the table to display the Component ID alarm desc ription and
to determine the cause of a n alarm/trap and the appropriate maintenance activity.
Use the table as follows to navigate to the required description:
•click on any link lis ted under the Component ID (alarm)/eventS our ce (trap) column to review
the alarm/trap descr iption.
•click on the link list ed under the Associated Service column to review the service associated
with the Component ID (alarm). A service can be associa ted with a Component ID (alarm).
For example, disc ontinuation of a service or dependant service can trigger an event
notification or SNMP Trap for a specific Component. For further de tailed descriptions of
services refe r to Chap t er 3, “Service Managemen t System.
•Alternativ ely, use Component ID alarms/eventSource (Trap) by event ID to search for a
Component ID (ala rm) by the asso ciated Event ID.
Table 12 Component ID (alarm)/eventSource (trap) summary
Component ID (alarm) /
eventSource (trap)
AtapiNoneSAMNone
AutochkNoneSave DumpNone
BCMAmpNoneSecurityEventLog
BrowserComputer BrowserSerialNone
BRUNoneService Control ManagerCall D e ta il Rec or d in g
CDRTransferNoneService Control ManagerDECT Alarm monitor
cfsServrVoice CFSService Control ManagerDECT OAM
cfsServrVoice Licensing services Service Control ManagerMedia gateway server
CTEVoice CTEService Control ManagerMedia services manager
DCOMNoneService Control ManagerMessage trace tool
DECTAlarmsDECT Alarm monitorService Cont rol ManagerNet logon
DECTMtceDECT Maintenance
DhcpServerMicrosoft DHCP serverService Control ManagerRemote access
diskNoneService Control ManagerTask scheduler
DNSMicrosoft DNS serverService Control ManagerUNISTIM Terminal proxy
DrWatsonNoneService Control ManagerVoice CFS
emsManagerMedia services manager Service Control ManagerVoice CTE
eventLogEventLogService Control ManagerVoiceCTI
Associated
Service
console
Component ID (alarm) /
eventSource (trap)
Service Control ManagerPlug and play
Associated
Service
connection manager
server
P0609330 2.0
Table 12 Component ID (alarm)/eventSource (trap) summary
Chapter 2 Fault Management System93
Component ID (alarm) /
eventSource (trap)
FTMSSNoneService Control ManagerVoice mail
HotDeskingHotDeskingService Control ManagerVoice management
Inventory ServiceInventory serviceSer vice Control ManagerVoice software alarm
IPRIP2NoneService Control ManagerVoIP Gateway
IPSecIKEIPSecIKE serviceService Control ManagerVoice MSC service
IPXRouterManagerRouting and remote
IVRNortel Networks IVRSNMPSNMP
JETNoneSNMP Trap AgentSNMP Trap service
kbdclassNoneSrvNone
MGSMedia gateway serverSSH Secure Shell ServerNone
ModemNoneSurvivable Remote GatewayNone
MPSNoneSystem Status MonitorSystem status monitor
MSPAlarmServiceNoneTcpipNone
mspQoSNoneTlntSvrTlntsvr
mspQoSMPNoneToneSrvrNone
NCMNoneUPSUPS - APC Powerchute
NetBTNoneUTPSUNISTIM Terminal proxy
NetIQccmNetIQ AppManager
NetIQmcNetIQ AppMana ger
NetIQObjMgrNetIQ AppManager
NetLinkManagerNet link managerVoIPSipGatewayVoIP SIP Gateway
NetLogonNet logonVNetQosMonitorVoice Net QoS monitor
NGRPCINoneVNet VoIPGtwyVo IP G a te w a y
NnuVoice NNU diagnosticsVoice CTEVoice CTE
NSACDNSACDVoice softwareVoice software alarm
Business Communications Man ager - Management User Guide
94Chapter 2 Fault Management System
Table 12 Component ID (alarm)/eventSource (trap) summary
Component ID (alarm) /
eventSource (trap)
PerflibNoneVoiceRecordC a ll D e tail Record in g
Policy Service sPolicy serviceVoiceTimeSynchVoice time synch
qos_flt_initQos_flt_initVoiceWatchdogVoice watchdog
RdrNoneWinsWindows internet nam e
RouterRouting and remote
Associated
Service
access service
Component ID (alarm) /
eventSource (trap)
WINSCTRSNone
WorkstationWorkstation
Associated
Service
service
P0609330 2.0
Chapter 2 Fault Management System95
Component event ID
Use the information displ ayed in the table Component ID alarms/eventSource (Tra p) by event ID
to search for a Component ID (alarm)/eventSource (trap) by Event ID. The Event ID noted in the
table is a short-f orm to indicate an Event ID (Alarm) / eventId (Trap). The Event ID applies to the
Compone nt ID (al arm ) / even tSource (trap).
Use the Component ID alarm description to de termine the cause of an alarm and the appropriate
maintenance activity.
Use the links shown in the Component ID (Alarm) / eventSource (Trap) column to navigate as
follows:
•click on the Component ID name associated with the Event ID to display the Component ID
alarm description.
•Alternativ ely, use the table Compone nt ID (alarm)/eventSo u rc e (t rap) sum mary to search for
the Component ID alarm descripti on by the Component ID.
Table 13 Component ID alarms/eventSource (Trap) by event ID
Event ID (A l arm) / eventID (Trap)Component ID (Alarm) / eventSource (Trap)