All rights reserved. May, 2004.
The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied
warranty. Users must take full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Nortel Networks NA Inc.
Trademarks
NORTEL NETWORKS and Business Communications Manager, are trademarks of Nortel Networks NA Inc.
Microsoft, MS, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation.
Symbol, Spectrum24, and NetVision are registered trademarks of Symbol Technologies, Inc.
All other trademarks and registered trademarks are the property of their respective owners.
Software licensing
The Apache Group
Copyright (c) 1995-1999 The Apache Group. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that these conditions are met:
1Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
2Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials provided
with the distribution.
3All advertising materials mentioning features or use of this software must display the
following acknowledgment:
4“This product includes software developed by the Apache Group for use in the Apache HTTP
server project (http://www.apache.org/).”
5The names “Apache Server” and “Apache Group” must not be used to endorse or promote
products derived from this software without prior written permission.
6For written permission, please contact apache@apache.org.
7Products derived from this software may not be called “Apache” nor may “Apache” appear in
their names without prior written permission of the Apache Group.
8Redistributions of any form whatsoever must retain the following acknowledgment:
9“This product includes software developed by the Apache Group for use in the Apache HTTP
server project (http://www.apache.org/).”
THIS SOFTWARE IS PROVIDED BY THE APACHE GROUP “AS IS” AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE GROUP OR ITS
P0609330 3.0
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This software consists of voluntary contributions made by many individuals on behalf of the
Apache Group and was originally based on public domain software written at the National Center
for Supercomputing Applications, University of Illinois, Urbana-Champaign. For more
information on the Apache Group and the Apache HTTP server project, please see
http://www.apache.org/.
The Business Communications Manager Management Guide describes how to manage, maintain
and sustain Business Communications Manager network services.
Purpose
The concepts, operations, and tasks described in the guide relate to the FCAPS (fault,
configuration, administration, performance, and security) management strategy for the Business
Communications Manager (BCM) and BCM network. This guide provides task-based information
on how to detect and correct faults through the interfaces and reporting system.
Use the Nortel Networks Unified Manager (UM) and Network Configuration Manager (NCM)
applications to implement, monitor and administer the network level operations. Use this guide to
perform equivalent network-level operations using an SNMP based network management system.
In brief, the information in this guide explains:
•Network structure and concepts
•Network management tools
•Fault management & monitoring
•Performance management
•Security administration
17
Audience
The Business Communications Manager Management Guide is directed to network administrators
responsible for maintaining BCM networks. This guide is also useful for network operations
center (NOC) personnel supporting a Business Communications Manager managed services
solution. To use this guide, you must:
•be an authorized Business Communications Manager administrator within your organization
•know basic Nortel Networks Business Communications Manager terminology
•be knowledgeable about telephony and IP networking technology
Organization
This guide is organized for easy access to information that explains the concepts, operations and
procedures associated with using the Business Communications Manager network management
applications.
Business Communications Manager Management User Guide organization provides a summary
description of the contents of this document.
Business Communications Manager Management Guide
18Preface
Table 1 Business Communications Manager Management User Guide organization
ChapterContents
1. PrefaceAn overview of the network management model, applications,
tools, maintenance and monitoring objectives.
2. Fault Management SystemInformation on how to set-up and maintain a fault detection and
3. Service Management SystemService manager capabilities available in the Unified Manager
4. Log ManagementExplanation of the MSC (core telephony) log system. This chapter
5. BCM MonitorInstructions how to install, access and use the BCM Monitor
6. Performance ManagementInformation on metrics gathering tools and applications to monitor
7. Performance Management Using
NetIQ
8. Security ManagementInformation about how you can set up and maintain the access
9. System Backup and Restore (BRU)Information and procedures on how to execute a system Backup
10. Testing, Troubleshooting, and
Diagnostics
11. Management Information Base
(MIB) System
maintenance program using the Unified Manager and SNMP
toolsets.
interface. This chapter also describes the properties of the
services in the service manager and associated log and alarm
notifications
also describes how to access, display and erase logs and
archlogs.
application to analyze BCM system status and performance
statistics.
the network traffic. The tools help you ascertain the performance
and health of the network elements and telephony services.
Information on the third-party NetIQ performance management
solution for BCM.
security to your system by users and client applications.
and Restore using the BRU.
Information about diagnosing module line performance issues and
device line issues. The chapter also provides instructions on how
to perform a system startup, set identification parameters and
maintain telephony resources.
BCM management information bases (MIB).
Symbols used in this guide
This guide uses these symbols to draw your attention to important information:
Caution: Alerts you to conditions where you can damage the equipment.
Danger: Alerts you to conditions where you can get an electrical shock.
P0609330 3.0
Preface19
Warning: Alerts you to conditions where you can cause the system to work improperly or
to fail.
Note: Alerts you to important information.
Tip: Alerts you to additional information that can help you perform a task.
Warning: Alerts you to ground yourself with an antistatic grounding strap before
performing the maintenance procedure.
Warning: Alerts you to remove the Business Communications Manager and Business
Communications Manager expansion unit power cords from the AC outlet before
performing any maintenance procedure.
Display Tips
You can best use and read this publication from your computer monitor. Use your computer to
identify and access the numerous links throughout. Alternatively, you can print a hard copy. For
best on-screen display results, use Adobe Acrobat Reader* version 4.0 or 5.0.
If you use Adobe Acrobat Reader, version 4.0, to optimize the illustrations:
•Increase display magnification
•Print the document
For Adobe Acrobat Reader, version 5.0, to optimize the graphical display:
1Start the Adobe Acrobat Reader, version 5.0 application.
2On the Edit menu click Preferences and then click General.
3On the Preferences menu click Display .
The Display setup page appears.
4Select these smoothing options:
•Smooth Text
•Smooth Line Art
•Smooth Images
Business Communications Manager Management Guide
20Preface
Figure 1 Acrobat Reader display setup selections
Text conventions
This guide uses these text conventions:
bold Courier textIndicates command names and options and text that you need to enter in
italic textIndicates file and directory names, new terms, book titles, Web
bold textIndicates command names, screen titles, options and text for a graphical
angle brackets (< >)Indicates a keyboard key press or simultaneous key presses, i.e.
P0609330 3.0
a command-line interface.
Example: Use the dinfo command.
Example: Entershow ip {alerts|routes}.
addresses, and variables in command syntax descriptions.
user interface (GUI).
<ENTER> or <CTRL j>
Acronyms used in this guide
This guide uses these acronyms:
APIApplication Program Interface
ASMAnalog station module
ATA (or ATA2)Analog Terminal Adapter
AWGAmerican Wire Gauge
BIOSBasic Input Output System
BootPBootstrap Protocol
BRIBasic Rate Interface
CAPCentral Answering Position
COPSCommon Open Policy Service
CSUChannel Service Unit
DASS2Digital Access Signaling System Number 2
DECTDigital enhanced cordless telecommunications or Digital European
cordless telephone
Preface21
DHCPDynamic Host Configuration Protocol.
DNDirectory Number
DNSDomain Name Service (DNS)
DPNSSDigital Private Network Signalling System
DTMFDual Tone Multifrequency.
HTTPHypertext Transfer Protocol
IETFInternet Engineering Task Force.
IPInternet Protocol
IPSecInternet Protocol Security
IPXInternetwork Packet Exchange
ISDNIntegrated Services Digital Network
ISPInternet Service Provider
IVRInteractive Voice Response
LANLocal Area Network
MACMedia Access Control
MCDNMeridian Client Defined Network (PRI SL-1)
MIBManagement Information Base
NATNetwork Address Translation
NICNetwork Interface Card
NOCNetwork Operations Center
OITOptivity Integration Toolkit
Business Communications Manager Management Guide
22Preface
OSPFOpen Shortest Path First
PBXPrivate Branch Exchange.
PCIPeripheral Component Interconnect Slot
PDDPartial Double Density
PPPoEPoint-to-Point Protocol over Ethernet
PPTPPoint-to-Point Tunneling Protocol
PRIPrimary Rate Interface
PSTNPublic Switched Telephone Network
QoSQuality of Service
RASRemote access service
RIPRouting Information Protocol
SNMPSimple Network Management Protocol
TAPITelephony Application Program Interface
TCP/IPTransmission Control Protocol/Internet Protocol
TETerminal Equipment
TEITerminal Endpoint Identifier
UDPUser Datagram Protocol
Universal Dialing Plan
VoIPVoice over IP
VPNVirtual Private Networks
WANWide Area Network
P0609330 3.0
How to get help
Your local distributor provides technical support for your Business Communications Manager
system or has access to that information through a Technical Service Center (TSC).
USA and Canada
Authorized Distributors - Technical Support
Telephone:
1-800-4NORTEL (1-800-466-7835)
If you already have a PIN Code, you can enter Express Routing Code (ERC) 196#.
If you do not yet have a PIN Code, or for general questions and first line support, you can enter
ERC 338#.
Website:
http://www.nortelnetworks.com/support
Presales Support (CSAN)
Preface23
Telephone:
1-800-4NORTEL (1-800-466-7835)
Use Express Routing Code (ERC) 1063#
EMEA (Europe, Middle East, Africa)
Technical Support
Telephone:
00800 800 89009 or 33 4 9296 1341
Fax:
33 49296 1598
email:
emeahelp@nortelnetworks.com
CALA (Caribbean & Latin America)
Technical Support
Telephone :
1-954-858-7777
email:
csrmgmt@nortelnetworks.com
Business Communications Manager Management Guide
24Preface
APAC (Asia Pacific)
Technical Support
Telephone:
+61 388664627
Fax:
+61 388664644
email:
asia_support@nortelnetworks.com
Related publications
These documents provide further information about the Business Communications Manager,
related media bay modules, extension equipment, and system applications and software:
Business Communications Manager Programming Operations
Guide
All optional Business Communications Manager applications have installation and user guides
specific to that application. Refer to the Programming Operations Guide and Telephone Features Programming Guide. These guides describe core system operational configuration and how to
program the Business Communications Manager equipment.
These guides provide programming for core telephony features and user features, such as:
•Voice telephony configuration for digital, IP, ISDN and radio-based telephones and equipment
over analog, digital, ISDN, and voice over IP (VoIP) trunks.
•How to use and program user telephony features at the telephone
•Companion Application Server software that controls the interface between the Business
Communications Manager system and the Companion wireless system (available for selected
regions)
•Networking DPNSS (upgrade) (requires keycode) provides private voice networking for the
UK Market.
•With Networking MCDN and ETSI Q.SIG Voice Networking (requires keycode) you can
network your Business Communications Manager system, or a number of Business
Communications Manager systems to a Meridian system. This lets the network use a common
numbering plan, as well as common voice messaging and auto attendant systems connected to
the Meridian.
•Data setup applications and protocols to configure the Business Communications Manager
system to be part of a LAN or WAN network. See the next section for specifics.
P0609330 3.0
Preface25
Call Detail Recording System Administration Guide
Call Detail Recording (no keycode required) records and reports call activity from the Business
Communications Manager. You can create reports from this information to help you manage
system usage effectively.
IP Telephony Configuration Guide
•i2001, i2 002, and i2004 IP telephones and the NetVision and NetVision Data telephones
require a combination of data and telephony settings to work with the Business
Communications Manager. These telephones can make or receive calls through either VoIP or
PBX lines.
•Nortel Networks i2050 Software Phone turns your PC into a telephone interface which
provides standard telephony operating features such as Voice Mail, Caller ID, and multiple
telephone lines or line appearances. This application requires Windows 2000, a full duplex
sound card, and a computer-telephony headset. This document describes what settings are
required to use this application with the Business Communications Manager. The i2050 Software Phone Installation Guide provides specific installation information.
•VoIP Gateway (requires keycode) converts the voice in a call into a packet format and sends
the call using an intranet trunk. With Business Communications Manager VoIP Gateway, you
can make calls over any intranet connected to the Business Communications Manager system.
Business Communications Manager Management Guide
26Preface
P0609330 3.0
Chapter 1
Management Overview
This section is an introduction to the Business Communications Manager network-level
management concepts and techniques.
The management overview is divided into three categories.
Management oncepts and models
•“Network Administration Objectives” on page 27
•“Network Topology and Management Interfaces” on page 29
•“SNMP Network Management Concepts” on page 32
•“Network Management and Maintenance Applications” on page 33
•“Unified Manager” on page 34
Unified Manager
27
•“Using Unified Manager” on page 40
•“Unified Manager Maintenance Page Overview” on page 43
Management Guide overview
•“Management Guide Overview” on page 51
•“BCM Monitor overview” on page 52
•“Performance management overview” on page 53
•“Security management overview” on page 53
•“Backup and restore overview” on page 54
•“Troubleshooting and diagnostics activities overview” on page 55
Network Administration Objectives
Network operations center (NOC) responsibilities encompass the operation of the entire network
domain. Network administration is a complex task that requires intimate knowledge of the
construction and workings of the network environment.
NOC activities
•Monitoring routers, switches, hubs, and auxiliary backup systems (power supply, data)
equipment that comprise the enterprise data network.
•Monitoring network traffic trends and resolve network bottleneck problems.
Business Communications Manager Management Guide
28Chapter 1Management Overview
•Managing and allocating IP addresses and domain names, recording and providing remote
connectivity to the enterprise computing systems.
The descriptions and procedures in this guide that assist with service assurance:
•Monitoring the network for alarms and performance threshold
•Ensuring service network integrity
•Isolating, diagnosing and reparing faults
•Managing performance. NOC takes first call from the alarms and performs initial
troubleshooting of the problem. Monitor link status and view, provision, edit and audit
connections. Log into network elements. Monitor inventory. Monitor network performance
(performance threshold provisioning).
Network management model
The Business Communications Manager network management model defines the management
functions into layers that show the flow of management information between communicating
entities. The Business Communications Manager network mode figure illustrates the management
layers.
Figure 2 Business Communications Manager network model
Business & Policy Management Layer
•Policy assessment, definition & evolution
Network Management Layer
•Event & Alarm Mgmt
•Infrastructure access
•Performance & optimization
•Communications
•QoS Monitoring
Element Management Tools
•Troubleshoot events & alarms
•Backup & restore
Manageable Systems & Endpoints
•User applications & capabilities
•Event / alarm generation
•System data / traffic
System & Config
Management Layer
•Multi-site configuration
•Asset inventory mgmt
•Bulk MACs
•Enable/disable software keys
•Configuration & administration
•User access
•Threshold settings
•Software k eys
P0609330 3.0
Chapter 1Management Overview29
Network Topology and Management Interfaces
Business Communications Manager Unified Manager, Network Configuration Manager and
SNMP Network manager support the objectives and knowledge requirements of NOC network
administrators. These applications detect, observe and report on the state of the network elements
and the overall health of the network.
“Business Communications Manager enterprise network model” on page 30 shows a sample
Business Communications Manager enterprise network that illustrates the various
communications links to end devices and control consoles. The diagram also shows that the
physical enterprise network, conceptually, is segmented into domains.
•The Network Operations Center (NOC) domain represents the tools, equipment and activities
used to analyze and maintain the operation of the Business Communications Manager
network. Unified Manager and Network Configuration Manager provide the software
interface to perform network control and maintenance functions. The controller workstations
can be located across different enterprise sites.
•The BCM network domain represents one or more Business Communications Managers
networked through an enterprise LAN to one or more controller workstation. The Business
Communications Managers need not be co-located at the same site. The WAN represents an
adjacent network, external to the LAN.
•The VoIP and Wireless VoIP domains represent terminating IP devices.
Business Communications Manager Management Guide
30Chapter 1Management Overview
Figure 3 Business Communications Manager enterprise network model
NOC Domain
Network
Configuration
Manager (NCM)
Unified Manager
Workstation
SNMP Network
Manager
Workstation
BCM Network Domain
NCM
Server
NCM
Database
Network
Solutions
VoIP
Wireless VoIP
RS232 local interface
WAN
PSTN
V.90
Modem
SNMP Network
Manager Server
Remote
Dialup
Network management physical interfaces
Business Communications Manager offers alternatives on how to connect to, and access, the
Business Communications Manager unit and devices in the network (see “Business
Communications Manager physical interfaces” on page 31). Connectivity to the network and
Business Communications Manager depends on the network configuration and telephony
resources built in the system.
Physically, the Business Communications Manager network can be distributed geographically
across different sites. The network administrator must be able to access each BCM in the network.
Network administration personnel have the ability to configure, observe and control the operation
and performance of the Business Communications Manager through one of the available access
portals. These interfaces provide management access to the Business Communications Manager
(see Figure 4):
P0609330 3.0
•WAN IP interface: WAN internet access (IP access through the Unified Manager interface)
The WAN interfaces use T1 (with CSU), V.35, X.21, PRI/BRI MBMs Dial on demand.
Establish a connectivity path provided from the corporate LAN network to the end-user’s
WAN network or ISP over another WAN device (e.g. router elsewhere on the enterprise
premises).
•V.90 Dial-up modem interface: (North America option only) The dial-up connection
interface is available for occasional use. Due to modest dialup speeds, and potentially large file
sizes, dial-up has limited use. For regular backup/restore and configuration tasks, use a higher
bandwidth connection for management access to the Business Communications Manager.
•Local RS232 serial interface (COM port): Local terminal emulation interface. The Business
Communications Manager platform base chassis has a serial RS232 port. The RS232 port
provides local terminal emulation connectivity to the BCM. This method is normally used
upon initial install. Use local connectivity to set the system’s IP address and other basic system
and networking parameters to enable the BCM for remote access. Alternatively, the RS232
port is used to establish a local connection to perform local maintenance activities in the event
of an IP network communications failure.
•LAN IP interface: local LAN port (IP access through the Unified Manager interface). The
LAN Ethernet interface transmits at 10/100 Mbps. Use IP over a LAN Ethernet interface.
Figure 4 Business Communications Manager physical interfaces
Chapter 1Management Overview31
CTM 4
1 Aux234
DSM 16+
1 2 3 41 2 3 4
StatusPower
21345
WAN card (field upgrade) connects the Business Communications Manager system to the wide area network.1
V.90 Modem port (available in North America only) provides PSTN dial-up access to the BCM.
2
Local RS232 COM port provides a serial connection to a laptop for maintenance purposes. Also supports a
3
DB9 serial connection to a UPS for power monitoring (see UPS Installation and Configuration Guide).
45Ethernet port connector #2 provides access to internal local area network
Ethernet port connector #1 provides access to external local area network
CTM
DSM
DECT
Unpopulated
Business Communications Manager Management Guide
32Chapter 1Management Overview
SNMP Network Management Concepts
Your Business Communications Manager network uses several hardware devices and various
software applications. Network management software provides the ability to exercise control over
the network devices.
Refer to these descriptions:
•“Network management communication protocols” on page 32
•“SNMP network structure” on page 32
Network management communication protocols
The SNMP, HTTP, Telnet, and FTP protocols are fundamental to management of a network of
Business Communications Managers.
•SNMP (simple network management protocol): SNMP is application-layer software you use
to communicate with and control devices in your network.
•HTTP (hypertext transport protocol): HTTP is a communications protocol that lets users
establish a connection with a Web server and transmit HTML pages to a client browser. BCM
is a web-server. HTTP also allows transmission of other files required by an HTTP application.
•Telnet: Telnet is a terminal emulation communications protocol used on the Internet and TCP/
IP-based networks. Telnet allows a network administrator or user to use a local workstation to
log onto a remote computer and run a program. Telnet is part of the TCP/IP protocol.
•FTP (file transfer protocol): FTP is a protocol used to transfer files over a TCP/IP network
(Internet, Unix). With FTP you can log onto the network, list directories, and copy files from
other workstations/servers. FTP operations are performed by typing commands at a command
prompt or through an FTP utility running under a graphical user interface (GUI).
SNMP network structure
Network management objectives for the Business Communications Manager are based upon the
FCAPS network management model (fault, configuration, administration, performance, security).
To accomplish these objectives, the Business Communications Manager must have the ability to
provide appropriate feedback to the network administrator.
Network administrators use SNMP data do manage network performance, find and solve network
problems and plan for network expansion (see “Network Administration Objectives” on page 27.)
The Business Communications Manager network management system is composed of:
•SNMP network management stations (NMS): A console (server/workstation) through which
the network administrator performs network management activities upon managed objects.
The SNMP network manager server (workstation) is a physical control device equipped with
network management software that interfaces with the Business Communications Manager(s)
in your network.
P0609330 3.0
Chapter 1Management Overview33
•SNMP agents: SNMP agent software interfaces and handles interaction between the device
and the SNMP network manager workstation. SNMP agents are software modules resident in
network elements, in this case the BCM. The SNMP agent collects, stores and retrieves MIB
(management information base) data and forwards the information to the SNMP network
manager server.
•Network elements (managed devices): Hardware components such as computers, routers, and
terminal servers that are connected to networks.
•Managed objects: Hardware, configuration parameters or performance statistics that directly
relate to the operation of a device. Bridges, hubs, routers, or network servers are examples of
managed devices that contain managed objects.
•Management information base (MIB): The MIB is the software that defines the data reported
by the device and the extent of control. A virtual information store that contains a collection of
managed objects.
•Management protocol (SNMP): Used to transport management information between the
agents and console. Simple network management protocol (SNMP) is the standard
management protocol. An SNMP trap is a message format used by the SNMP agent to inform
the NMS of a system event.
Managed objects and agents illustrates the agent and object relationship in a network and how the
system provides event notification to the SNMP network manager workstation. Data passes from
SNMP agents (hardware/software processes that report activity in all network devices) to the
SNMP Network Manager server.
Figure 5 Managed objects and agents
Fault in
Device 1
SNMP Network Manager
Workstation/Server
Fault
SNMP
Messages
Network
SNMP
Messages
SNMP
Messages
Device 1
SNMP
Agent
Device 2
SNMP
Agent
Device n
SNMP
Agent
Network Management and Maintenance Applications
The tools and applications bundled with the BCM provide statistics and notifications of system
status and operation. There are three categories of network management applications that are
available and compatible for operation with the BCM or network elements:
MIB
MIB
MIB
Business Communications Manager Management Guide
34Chapter 1Management Overview
•BCM-specific tools and applications
•optional tools and applications
•third-party tools and applications
BCM-specific tools and applications
•Unified Manager (see also “Unified Manager” on page 34) is web-based configuration and
maintenance application bundled with the Business Communications Manager software.
Unified Manager is the single point of access for managing all programming for individual
BCM systems. Access to the Unified Manager is password protected, and is secure for both
enterprise customers and small to medium sized businesses. Administrators use Unified
Manager to quickly set up BCM telephony and data functions, as well as users, mailboxes, and
directory numbers.
•Network Configuration Manager (NCM) provides centralized configuration and system
management capabilities for a number of Business Communications Manager in a network.
This centralized functionality is required to enable multi-site Business Communications
Manager customers and channel partners to significantly reduce the cost of ownership of their
systems.
•BCM Monitor : Use this standalone diagnostic application to view system and IP telephony
information on individual Business Communications Manager units. Open several instances of
BCM Monitor to monitor several remote BCM systems on a single PC simultaneously. This
tool supports real-time debugging. You can also use BCM Monitor to save and process data at
a later time to generate system utilization and traffic reports.
Optional tools and applications
•Optivity Network Management System (ONMS): Use Optivity NMS to manage Nortel data
devices such as Baystack switches, BPS2000, Passport LAN switches, BayRS, and Alteon.
Integrate Unified Manager into the Optivity Network Management System (NMS) via the
Optivity Integration Toolkit (OIT). Enable BCM discovery, launch, and alarm integration into
Optivity NMS. Business Communications Manager appears as an element in an ONMS
network discovery diagram. BCM SNMP traps are displayed by ONMS, and Unified Manager
is launched from within Optivity.
Note: If you require an integrated Unified Manager/ONMS configuration, contact Nortel
Networks to confirm the correct interoperation of the current releases BCM and ONMS.
Unified Manager
Unified Manager, a web-based navigation tool, provides access to all operations and maintenance
programming functions on the Business Communications Manager system. Unified Manager
allows authorized administration personnel to monitor and control BCM functions from a single
site.
P0609330 3.0
Chapter 1Management Overview35
Unified Manager is the single point for managing all programming for individual BCM systems.
You can access Unified Manager locally via the LAN or WAN. Remote access is available via a
V.90 modem dialup. You can also access Unified Manager through a browser from across a WAN
or Internet connection.
Use Unified Manager to configure data and voice services on Business Communications Manager.
Unified Manager gives you data entry and performance tracking charts and tables for network
monitoring, access to alarm and event notifications and diagnostic information.
This section includes information about:
•“Using the Unified Manager main page buttons” on page 35
•“Using Unified Manager” on page 40
•“Logging off Unified Manager” on page 42
Using the Unified Manager main page buttons
When you access the Unified Manager main page (see “Unified Manager main page” on page 36 ),
several selections provide access to operations grouped under these functional categories:
•“Configure” on page 36
•“Wizards” on page 36
•“Installing clients” on page 38
•“CallPilot” on page 39
•“Documentation” on page 40
•“BRU” on page 40
•“Maintenance” on page 40
Business Communications Manager Management Guide
36Chapter 1Management Overview
Figure 6 Unified Manager main page
Configure
Access the Unified Manager programming interface for all services except those controlled by the
CallPilot and IVR services.
Wizards
When you install your system, you run the Quick Start Wizard to set up your system parameters.
This wizard is described in the Wizard help, that can be accessed after you from the Wizards page
of the Unified Manager.
Use the Wizards to perform Quick Start, Add Users, Edit DN Record Template, DN Renumber,
Network Update. See the Programming Operations Guide for more information.
The Wizards are self-co ntained task applications that you can use to speed up some configuration
tasks. You access the Wizards from the Wizards button on the first page of the Unified Manager.
See the Programming Operations Guide for more information.
P0609330 3.0
Figure 7 Programming Wizards
Chapter 1Management Overview37
Wizard
Quick Start
Add Users
Edit DN Record Template
DN Renumber
Network Update
Action
Initializes the system and sets up your basic system information.
This wizard is only run once, when your system is first set up.
Changes the telephony settings for a set of DNs or for a single
DN. You can define the settings in this Wizard, or you can use a
pre-defined template, from a local site or from a remote site,
created with the Edit DN Record Template wizard.
Selects Telephony User Templates and change and define the
user settings for telephones. The Telephony Template is stored
in a file for use with the Add Users Wizard.
Renumbers a range of DNs.
Updates your system data network settings any time after the
Quick Start Wizard, which does the initial network setup.
Business Communications Manager Management Guide
38Chapter 1Management Overview
Wizard
Quick Start
DECT Mobile Recording
DECT Configuration
Action
Initializes the system and sets up your basic system information.
This wizard is only run once, when your system is first set up.
Enables and disables mobile recording for one of the base
station ports.
Configures a DECT module. It also turns on one of the base
station ports to allow mobile recording (handset registration).
The DECT Wizards appear on the Wizards page only if there is
a DECT module installed and identified to the system. These
wizards are discussed in the DECT Installation and Maintenance Guide.
Navigating the wizards
These are some helpful hints about how the wizards work, and how to use them.
•To open the online help, from the Programming Wizards screen click the Programming
Wizards Help link.
•You can move back and forth between screens in the wizards by clicking the Back and Next
buttons.
•You can revise your choices and entries on any of the wizard pages until you click the Apply
button. Once you click the Apply button, the system applies the selected configurations. The
user is presented with a confirmation box that provides the approximate timing of the process.
To check the status of the configuration, press the Refresh button. When the process is
complete, the title of the page has the word completed as part of the title.
Installing clients
After you set up the system and it is operating, you can add keycodes for any optional features you
want to install.
You access optional applications through the Install Clients button. Many applications require a
keycode. For information about how to set up these optional features, see the documentation for
each application.
With the install clients utility you can select and download multimedia and telecommunications
clients. Applications can require other components or software keys to be installed. Each
application page identifies if anything else is required.
Clients you can download
Applications
•Call Center and Multimedia Call Center
P0609330 3.0
Chapter 1Management Overview39
•CallPilot
•Interactive Voice Response (IVR)
•Desktop assistant, i2050 software phone, Personal Call Manager, NetVision Symbol phone
administrator
Toolkits
•CDR Client wrapper
•LAN CTE client
•TAPI 2.1 installation
•Unified Manager Java class library
Developer information
•Program description
•Developer categories
•Developer partners
Administrative tools
•Desktop assistant Pro E
•BCM Monitor
•SSH client
CallPilot
Click the CallPilot button to access CallPilot Manager, the CallPilot management application.
CallPilot Manager is a web-based application that you use to administer:
•Voicemail
•Call answering
•Auto Attendant
•Custom Call Routing
•Fax answering
•Call Center
•Message Networking
Note: Basic CallPilot functions are standard on the Business Communications Manager
and you define your region and basic settings when you run the Quick Start Wizard. See
the Programming Operations Guide for more information.
Business Communications Manager Management Guide
40Chapter 1Management Overview
Documentation
Click the Documentation button to find the information you require to help you understand and
configure your system to your specifications. The entire Business Communications Manager
documentation suite, plus a number of training panels, are included on your Business
Communications Manager computer, as well as on the CD that accompanied your system.
•Provides access to:
— Documentation on how to install hardware, configure and operate various BCM-specific
Click the BRU (Backup and Restore Utility) button to access BRU functionality. BRU provides a
way to back up your system data and configurations in the way that is most useful for your
purposes. Backed up data can be restored to the BCM if a system failure occurs, such as a
prolonged power outage. See System Backup and Restore (BRU) on page 381 for more
information.
Maintenance
The Maintenance button accesses a number of maintenance tools that let you determine the current
status of the various aspects of your Business Communications Manager system. For more
information see the description “Unified Manager Maintenance Page Overview” on page 43.
Using Unified Manager
Unified Manager is a web-based navigation tool you use to view and change configurations for the
Business Communications Manager system.
Most changes made with Unified Manager become part of current Business Communications
Manager programming when you select an item from the menu options. However, some changes
take effect after you exit the screen. If a programming error occurs, you must re-enter the original
programming.
For more information on how to use the Unified Manager interface, see the Programming Operations Guide .
Understanding the navigation tree headings
The Unified Manager navigation tree contains five main headings that you use to access specific
areas of the Business Communications Manager system. These headings are:
P0609330 3.0
Chapter 1Management Overview41
(<IP address>)
Table 2 Navigation tree menu functions
HeadingProgramming
SystemProvides access to Licensing, Identification and Security subheadings. This includes a
form to enter keycodes, and a list of current supported services.
From the Security heading you can determine the level of security within and entering the
system. See Chapter9, “Security Management.
When you select the System heading, you can view system information such as your
system name and a description about which resources and services are available.
Selecting the System heading also enables Configuration, Performance, Fault, Logoff,
View, and Help. With these commands you can:
•enable/disable services
•access CPU and memory status
•access to the alarm banner, which displays totals of alarms
•access or refresh a system inventory list
•reboot the system or shut down operations
ResourcesProvides access for configuring data and telephony resources for Business
Communications Manager hardware setup. See the Programming Operations Guide as
well as in the DECT Installation and Maintenance Guide.
ServicesProvides access for configuring telephony and data networking services and various
other related services. Telephony information is discussed in the IP Telephony
Configuration Guide. System data configuration is discussed in the Programming
Operations Guide . This section also supports the information found in the CallPilot
documentation, and the documents for CDR Recording, LAN CTE, IVR, Doorphone,
Network administration, UPS Installation and Maintenance Guide, and DECT Installation and Configuration Guide. To manually enable or disable the Telnet service, See
“Manually activating Telnet” on page 431.
ManagementProvides access to the User Manager, which you use to manage the users who have
DiagnosticsProvides access to items you can use to generate and access statistics on different
access to the Unified Manage r (Chapter9, “Security Management), and to the Alarm
Manager, which is used to define why types of alarms get reported by the system. For
more information on alarms and SNMP traps, see Chapter2, “Fault Management
System.
system components. Business Communications Manager provides statistics, metrics
and event logs on resources and services to help you carry out system maintenance
activities.
System metrics information is contained in the programming section to which they apply.
See the Programming Operations Guide and the IP Telephony Guide.
Split DS30 configuration and double density configuration are located under the
Configuration menu of the MSC heading. These system features are discussed in the
Programming Operations Guide.
Business Communications Manager Management Guide
42Chapter 1Management Overview
Logging off Unified Manager
When you have finished a session on the Unified Manager, you need to log off correctly to protect
the integrity of the information you entered.
1Choose BCM (<IP address>) at the top of the navigation tree.
The Logoff menu is enabled.
2Click Logoff, then select Logoff.
A message appears that asks you to confirm your request to log off.
3Click Yes to continue.
4A second message appears reminding you to close your browser window after the system has
logged out. Click Yes to continue.
A Logoff progress bar appears. When it the logoff is complete, the browser display will revert
to the Login screen.
5Click the Windows exit icon (top, right corner).
6Click the Windows exit icon on the browser window displaying the Business Communications
Manager main menu.
Note: Exit both Unified Manager browser windows, even if you want to re-log on to the
Configuration area. After you exit both windows, you can reestablish a connection with
the Business Communications Manager and log on as usual.
Failure to log out of both browser windows can result in a failed attempt to re-enter the
Unified Manager Configuration section.
P0609330 3.0
Chapter 1Management Overview43
Unified Manager Maintenance Page Overview
The maintenance page is a dedicated maintenance area that provides access to several maintenance
tools and capabilities. Gathering these tools into one location provides the network administrator
with a single source for maintenance information, helping to reduce errors and contribute to
gaining overall serviceability efficiency.
Figure 8 summarizes the links through the maintenance page. Select any of the links in Figure 8 to
display a description of the maintenance function.
Figure 8 Unified Manager maintenance page paths
Maintenance page access
Support
Contact
Alarms and traps
Maintenance
System information
Order and enable optional components
Install optional components
Maintenance tools
Technical support contact screen
Alarms and traps screen
Shared drive tools
Attach to a shared volume
Detach a shared volume
Enable/Disable BCM drive shares
System interaction tools
Execute a command
Telnet session
Troubleshooting tools
IP network troubleshooting
Services & driver troubleshooting
DECT tools
Security
Miscellaneous
System information screen
Keycode retrieval screen
Install optional components screen
DECT tools
Uploading a certificate and a private security key
The contact screen displays the ITAS contact telephone numbers and contact instructions for all
regions.
Figure 10 Technical support contact screen
Alarms and traps
The alarms and traps screen provides a summary list of BCM component ID alarms.
Select one of the component ID alarm links to navigate to a full description of the alarm and
associated service (if any). For more information on alarms and traps, see Chapter2, “Fault
Management System.
Business Communications Manager Management Guide
46Chapter 1Management Overview
Figure 11 Alarms and traps screen
Maintenance
Maintenance selections are:
•System information
•Order & enable optional components
•Install optional components
•Maintenance tools
System information
The system information screen displays a summary of the software release and hardware inventory
currently installed on your BCM system.
P0609330 3.0
Figure 12 System information screen
Chapter 1Management Overview47
Order and enable optional components
The keycode retrieval search screen displays a search form you can use to:
•select the log on location to access the keycode retrieval system from
•select the product family for the keycodes you need to access
•search for keywords
Business Communications Manager Management Guide
48Chapter 1Management Overview
Figure 13 Keycode retrieval screen
Install optional components
On the install optional components screen you can:
•install the IPX routing protocol and services on the BCM
•install PPPoE to enable Point-to-Point over Ethernet capability on the BCM (requires a
keycode for installation). The PPPoE product is only available for BCMs that contain 2 LAN
adapters
When you select either of the above options, the system displays an installation wizard to guide
you through the installation process.
To display the install optional components screen, select Install optional components under the
maintenance category. The install optional components screen appears.
P0609330 3.0
Figure 14 Install optional components screen
Chapter 1Management Overview49
Maintenance tools
Use the maintenance tools screen to select the tools necessary for these application categories:
ApplicationTools
Shared drive•Attach to a shared volume
•Detach a shared volume
•Enable/Disable BCM Drive Shares
System interaction•Execute a command
•Schedule a command to execute
•Schedule a restart
•Telnet session
Troubleshooting•IP network troubleshooting
•Services and driver troubleshooting
DECT
(for more information see
the DECT Installation and
Maintenance Guide)
SecurityUpload certificate and private key
MiscellaneousReset Unified Manager server
•Time synchronization
•Backup firmware
•Restore firmware
•Firmware upload
•Restore default configuration
•A-law/Mu-law companding scheme
Business Communications Manager Management Guide
50Chapter 1Management Overview
When you select a tool for any of the above applications, the system displays an installation wizard
to guide you through the installation.
To display the maintenance tools screen, select Maintenance tools under the maintenance
category. The maintenance tools screen appears.
This section summarizes the content of the Management Guide:
•“Fault management overview” on page 51
•“Service management overview” on page 51
•“Log management overview” on page 52
•“BCM Monitor overview” on page 52
•“Performance management overview” on page 53
•“Security management overview” on page 53
•“Backup and restore overview” on page 54
•“Troubleshooting and diagnostics activities overview” on page 55
Fault management overview
This section describes the alarm management system, system events and SNMP traps.
Administrators access alarms and perform fault analysis through the Unified Manager interface.
Use Unified Manager to configure the fault system.
Chapter 1Management Overview51
For more information on how to manage system faults, see Chapter 2, “Fault Management
System,” on page 59.
This section also provides a correlation between the event source (SNMP traps), components, logs
and services. For more information see:
•“Component ID (alarm) summary information” on page 92
•“Component ID/SNMP Trap Error interpretation” on page 100
Service management overview
This section describes service manager capabilities in Unified Manager. This section also
describes the properties of the services in the Service Manager and associated alarm notifications.
To more information about services see Chapter 3, “Service Management System,” on page 251.
Use the Service Manager to access, assess or modify tervices running on Business
Communications Managers in your network. Services control the functionality of Business
Communications Manager. A service is a software process that controls interaction with Business
Communications Manager hardware devices, computing environment, telephony or your browser
interface.
Modification of any service has far-reaching effects on communications or event reporting
capability. Nortel Networks strongly recommends you consult with your support group before you
use the Service Manager.
Business Communications Manager Management Guide
52Chapter 1Management Overview
There are two categories of services:
•System level services: software processes that are critical to essential operating system-level
features (see “System-level service definitions” on page 258 )
•Nortel Networks configurable services: software processes that are critical to the operation
of Business Communications Manager software (see “Nortel Networks Configurable
Services” on page 285)
Log management overview
This section describes the Media Service Card (core telephony) logs. Because every components
of Business Communications Manager is logged, the system generates a large number of logs for a
variety of purposes. In the case of faults, consult the logs to help you to diagnose and correct the
problem.
Some logs run continuously and collect information to help you troubleshoot in the event of
system problems. You can disable some logs because the information collected may not be of
immediate or critical interest to maintain the system.
The system generates these MSC logs:
•MSC System Test Log: contains diagnostic test results, telephony events and alarms, audits. It
has a maximum size of 20 items, after which events are aged out to make room for new events.
•MSC System Administration Log : contains log on, and log off information. Has a maximum
of 10 entries. The 11th entry overwrites the 1st entry regardless of severity level.
•MSC Network Event log: contains T1 / PRI network interface events and alarms. This log has
a maximum of 10 events.
For more information on Business Communications Manager logs, see Chapter 4, “Log
Management,” on page 315 .
BCM Monitor overvie w
Business Communications Manager diagnostics involve both monitoring system status and
assessing performance.
For how to download and use the BCM Monitor, see Chapter 5, “BCM Monitor,” on page 335 .
BCM Monitor is an optional, standalone application you can use to view system and IP telephony
information for each Business Communications Manager. Open several instances of the
application on a single PC to monitor the corresponding Business Communications Manager
systems.
BCM Monitor supports real time troubleshooting and report generation. System administrators
and support personnel obtain key, real-time information to perform troubleshooting if necessary.
The system administrator accesses and saves information to generate system utilization and traffic
reports.
P0609330 3.0
Chapter 1Management Overview53
Using BCM Monitor to monitor your system status
With BCM Monitor you can see the current status of various parts of your system services.
Use BCM Monitor during troubleshooting to confirm current configurations, including CallPilot
applications and IP trunk information. You can find BCM Monitor under the Install Clients
button on the first page of the Unified Manager. The BCM Monitor section describes:
•“Starting BCM Monitor” on page 336
•“Using BCM Monitor to analyze your system status” on page 337
•“BCM Monitor statistical values (minimum and maximums)” on page 346
•“BCM Monitor information capture” on page 347
Performance management overview
The Unified Manager System Performance monitor provides detailed performance information for
the system and the system resources. The statistics are shown in charts or table format. If a
performance display is active, it is automatically updated with real-time performance information
in time increments that you set.
BCM performance and usage information can be queried by SNMP.
For more details on performance management, see Chapter 6, “Performance Management,” on
page 351.
Use these tools and procedures to monitor the Business Communications Manager system
performance :
•“System Performance tools and services” on page 351
•“Service Manager” on page 251
•“Base function tray system status display LEDs” on page 466
•“Using the Initialization menu to monitor system hardware” on page 470
•“Disk mirroring function” on page 471
•“Module Diagnostics” on page 433
If you determine through the use of the diagnostic tools, that a hardware problem exists, see the
Installation and Maintenance Guide for information on component replacement.
Security management overview
Web access to Business Communications Manager now uses SSL encryption for system security.
This includes the appearance of a security alert when you initiate a connection to the Unified
Manager using SSL, which indicates site validation of the default certificate.
Business Communications Manager Management Guide
54Chapter 1Management Overview
For more information on how to define security parameters for the system and for users, see
Chapter 9, “Security Management,” on page 407.
Security management topics
•“Understanding BCM SSL certificate properties” on page 410
•“Security Management Tools” on page 414
•“Setting the Interface Timeout” on page 415
•“Setting system security compatibility levels” on page 416
•“Managing access passwords” on page 417
•“Using the SSH client to access the text-based interface” on page 429
•“Manually activating Telnet” on page 431
•“Accessing Unified Manager through the firewall” on page 432
Backup and restore overview
Use the Backup and Restore Utility (BRU) to preserve the integrity of your Business
Communications Manager operating system software and configuration data. With BRU you can
perform a backup, restore or upgrade through a web connection. BRU is a single-user application.
Before you perform any substantial maintenance on the Business Communications Manager, save
your data to a safe storage module location elsewhere in the network. After hardware maintenance
is complete, restore the data to your Business Communications Manager.
For more information on how to operate the Backup and Restore utility, see Chapter 8, “System
Backup and Restore (BRU),” on page 381.
Backup and restore procedures
•“Accessing BRU” on page 396
•“Exiting from the backup and restore utility” on page 396
•“Resetting the BRU screen” on page 397
•“Adding a new volume” on page 397
•“Modifying a volume” on page 398
•“Deleting a volume” on page 398
•“Performing a backup using BRU” on page 399
•“Scheduling a backup” on page 402
•“Viewing scheduled backups” on page 404
•“Viewing a scheduled backup report” on page 404
•“Deleting a scheduled backup” on page 404
•“Performing a restore using BRU” on page 404
P0609330 3.0
Chapter 1Management Overview55
Troubleshooting and diagnostics activities overview
This section has information about diagnosing module line performance and device line issues.
This section also tells you how to perform a system startup, set identification parameters and
maintain telephony resources.
For more information on diagnostics activities, see Chapter 10, “Testing, Troubleshooting, and
Diagnostics,” on page 433 .
Troubleshooting and diagnostic activities topics
•“Module Diagnostics” on page 433
•“Problems with trunk or station modules” on page 436
•“Media Bay Module status” on page 437
•“Testing DTM Modules” on page 439
•“DTM CSU statistics” on page 441
•“Testing the DDI Mux” on page 444
•“Troubleshooting Telephone Connections” on page 448
•“Changing system identification parameters” on page 451
•“Changing the system domain” on page 451
•“Maintenance programming for telephony resources” on page 453
•“General Diagnostic Activities” on page 466
•“Emergency telephone does not function” on page 473
•“ATA 2 does not function” on page 474
•“Unified Manager Diagnostics” on page 475
•“Driver Debug diagnostics” on page 475
Business Communications Manager Management Guide
56Chapter 1Management Overview
P0609330 3.0
Chapter 2
Fault Management System
Business Communications Manager fault management topics
•“BCM Fault Management Tools” on page 59
•“Alarm Management System” on page 60
•“Alarm Reporting System” on page 61
•“Accessing and configuring the Alarm System” on page 66
•“SNMP Traps” on page 75
•“Configuring an SNMP Community” on page 77
•“Configuring an SNMP Manager List” on page 81
•“Configuring an SNMP Trap Community List” on page 85
•“Alarm Analysis and Clearing Procedures” on page 89
•“Component ID (alarm) summary information” on page 92
•“Component ID/SNMP Trap Error interpretation” on page 100
•“Component ID alarm descriptions” on page 101
•“Events that cause a system restart” on page 250
59
BCM Fault Management Tools
Fault management activities range from system setup, monitoring and reporting to fault
identification, diagnosis and correction. The tools available to the BCM network administrator to
access alarms and perform fault analysis are:
•Alarm management using the Unified Manager Interface
•SNMP traps for remote fault management
You access alarms and perform fault analysis through Unified Manager.
Business Communications Manager Management Guide
60Chapter 2Fault Management System
Alarm Management System
Business Communications Manager tracks and generates approximately 700 different alarms.
Alarms can provide notification that a network interface is not behaving as expected, or that
certain anomalies in system operation have been detected, for example.
When the Alarm Management system is enabled, all BCM alarms are recorded in the NT Event
Log. Use the Unified Manager Alarm Banner to view alarms for each Business Communications
Manager. A subset of the alarm information pertaining to BCM core telephony can also appear at
the Alarm telephone, and in the MSC logs. Managing alarms within Unified Manager is described
in “Alarm Analysis and Clearing Procedures” on page 89.
Note: Assign the Alarm telephone in Feature settings under System programming.
Alarms have a higher severity than events. Attend to alarm codes before event messages
Alarm code information that is specific to Companion components is included in the
Windows NT Event Log.
Any information sent to the Windows NT event log can generate an SNMP trap.
All BCM alarms can also be sent to a remote management system through an SNMP trap. For how
to perform remote fault management of BCM SNMP traps, see Configuring an SNMP Community
on page 77.
An alarm may not appear until two minutes after it is triggered. If the system is powered off when
the alarm is triggered, the alarm does not appear until two minutes after the system is powered on.
For more information aboutsee
BCM alarms“Alarm Analysis and Clearing Procedures” on page 89
BCM SNMP traps“SNMP Traps” on page 75
MSC logs“Media service card (core telephony) logs” on page 315
P0609330 3.0
Chapter 2Fault Management System61
Alarm Reporting System
This figure illustrates how Business Communications Manager manages system events.
Figure 16 Business Communications Manager events and alarms
Operating system, drivers
& applications
MSC
1
Telephony
Services
2
4
1
5
NT Event Log
Database
Alarm Manager
User defined
alarm filters
6
Alarm filters
SNMP Trap
Management
10
9
7
Alarm
database
NT SNMP
Extensible
Agent
SNMP
Traps
Alarm Banner
8
3
MSC Log
Database
Core telephony services running on the Media Services Card (MSC), generate event outputs (see
1
“Event sources” on page 62 ).
The system forwards BCM core telephony (MSC) events, including alarms, to the MSC telephony event
2
logs.
BCM telephony (MSC) event logs include the MSC System Test Log, MSC System Admin Log, and
3
MSC Network Event log. These logs capture all of the MSC (core telephony) system events (including
MSC alarms).
BCM core telephony (MSC) alarms are written into the NT Event log database. A subset of the
4
core telephony (MSC) events are also written into the NT Event log database.
The NT Event Log database captures events from all BCM components, including MSC alarm and
5
some MSC event information.
6
The Alarm Manager applies system filters based on configuration inputs.
The Alarm database captures all NT event information after system filtering is applied.7
Alarm Banner / Alarm Browser provides real-time display of alarms in Unified Manager.
8
The Alarm Manager SNMP subsystem applies filters to the BCM alarms based on user inputs about
9
severity levels and event sources.
BCM alarms meeting the SNMP trap criteria are forwarded to the SNMP trap reporting interface according
10
to the trap community list.
Alarm Browser
Business Communications Manager Management Guide
62Chapter 2Fault Management System
Event sources
All BCM components can be a source of BCM event information. An event is defined as a
notification of an error or anomaly in operation, or a condition that can lead to an error or anomaly.
The terms “event” and “alarm” are used interchangeably in the BCM environment.
Refer to “Business Communications Manager events and alarms” on page 61 when reviewing the
description.
•BCM events derived from the operating system, drivers, services and applications, are
captured in the NT Event Log (item 5).
•The BCM events are recorded in the BCM Alarm database (item 7) and displayed as alarms in
the Alarm Banner (item 8). See also “Alarm banner and alarm browser” on page 64.
•The BCM events, or alarms, can also be made available to remote fault management systems
as SNMP traps (item 10).
MSC events
Core telephony services, which run on the Media Services Card (MSC) (item 1 of “Business
Communications Manager events and alarms” on page 61), represent one of the major BCM
components that act as a source of events. Referred to as MSC events or core telephony events,
these events are assigned an MSC event id and an event priority from P1 to P9, where P9 is the
most severe. If an MSC event is serious enough to be considered an alarm, the system also assigns
the MSC event an MSC alarm ID.
Refer to “Business Communications Manager events and alarms” on page 61 when reviewing the
description.
•All core telephony (MSC) events, including telephony alarms, are recorded in a set of core
system telephony logs (items 2 & 3).
•All core telephony (MSC) events designated as alarms are also written into the NT Event log
(item 4). In most cases, the MSC alarm ID, assigned by the core telephony (MSC) service, is
reused as the NT Event ID .
•Some of the core telephony (MSC) events, which are not alarms, are also written into the NT
Event log, primarily MSC events of priority P5 and higher (item 4). MSC events of priority P4
and lower can be seen only in the MSC logs - see “MSC (core telephony) logs” on page 63).
MSC events that are visible to the alarm service can also generate SNMP traps.
Due to the interaction between the MSC system and the BCM alarm system, an event in the NT
event database that originates from the core telephony services (MSC) will have an NT event ID.
An event will also have an associated core telephony (MSC) services event ID, and possibly also
an MSC alarm ID.
MSC event and alarm conditions
•Software errors that do not affect system operation
•Software errors that affect system operation: feature failure dropped calls, or system resets.
P0609330 3.0
Chapter 2Fault Management System63
•Events caused by hardware-related problems, but are not of sufficient severity as to be an
alarm condition. Installers, however, may need to know of these events as they can indicate a
hardware problem (for example, bad messages received on a signalling channel) or a PSTN- or
private network-related problem (for example, no battery feed, no dial tone, invalid disconnect
sequence).
•Events that are not of sufficient severity to be an alarm condition, but where the problem is
related to system limits affected by system usage patterns, administration, or lack of resource.
Examples are running out of autodialler/speed dialer bins, LHD nodes, DTMF/dial tone
receivers. These events may not be apparent to users, but a degraded level of service will likely
result.
•Information events, concerning a user action, typically in **ADMIN or **CONFIG. (for
example, admin log cleared, user attempted to enter **ADMIN with wrong password).
•Permanent, service affecting events that an installer can fix. Typically these are also alarms,
but that is not a prerequisite. An example of the latter is the defaulting of a portion of
administration, without a cold start (installer action: readminister the data).
MSC (core telephony) logs
Refer to “Business Communications Manager events and alarms” on page 61 when reviewing the
descriptions.
•MSC logs (item 3) are maintained on the Media Services card, MSC, which is the telephony
side of the Business Communications Manager system.
•The MSC logs are a set of three logs: the MSC System Test, MSC System Administration, and
MSC Network Event log. These logs capture all core telephony (MSC) system events,
including alarms. For more information, see “Media service card (core telephony) logs” on
page 315.
•Note that core telephony (MSC) events, designated as MSC alarms, are sent to the NT Event
Log in addition to being recorded in the MSC (core telephony) logs (item 4). MSC events of
priority 5 (P5) and higher are sent to the NT Event log (item 4 ). MSC events are shown in the
BCM alarms under the Voice Software component ID.
Business Communications Manager Management Guide
64Chapter 2Fault Management System
NT Event log database
When the alarm service is enabled, all BCM alarms are recorded into the NT Event Log (item 5 of
“Business Communications Manager events and alarms” on page 61).
For more information about how to view NT Event Logs, see “Obtaining NT Event Logs from
Archlog” on page 332 .
Alarm manager
See “Business Communications Manager events and alarms” on page 61 when reviewing the
descriptions.
•The system forwards events from the NT Event log to the Alarm Manager.
•The Alarm Manager applies system filters based on configuration inputs.
•The events are recorded in the Business Communications Manager alarm database.
Alarm database
See “Business Communications Manager events and alarms” on page 61 when reviewing the
descriptions.
•The alarm database (item 7) holds a maximum of 5000 alarm records. The network
administrator configures the record capacity of the alarm database to a smaller size if required.
•Use the Alarm Manager batch archive function to archive the information in the alarm
database. Set the batch job parameters (day of the week and time) and file destination. For how
to configure and use the alarm manager, see Configuring Alarm Manager settings on page 70.
Alarm banner and alarm browser
The Alarm Banner and the Alarm Browser (item 8, “Business Communications Manager events
and alarms” on page 61) provide real-time information about events occurring in the Business
Communications Manager system.
Alarm system interfaces
•With the Alarm Banner window you can continually monitor the Business Communications
Manager system for alarms. For more information, see “Accessing the Alarm Banner to
monitor alarm notification” on page 68 .
•With the Alarm Browser window you can browse through a list of alarms and see detailed
information for each one. For more information, see “Accessing the Alarm Browser to analyze
alarm detail” on page 69 .
P0609330 3.0
Chapter 2Fault Management System65
•With Alarm Manager you can manage the collection and storage of alarm information. Use the
Alarm Manager to enable or disable sending of all or some types of SNMP traps. The Alarm
Backup Batch Job backs up old alarm records to an archive folder at scheduled time intervals.
For more information on how to use the Backup Batch Job, see “Configuring Alarm Manager
settings” on page 70.
BCM alarm severity
Alarm severity refers to a scale in which an alarm notification is categorized. The alarm severity
prescribes the degree of appropriate user intervention.
There are four alarm severity levels:
•Critical alarms indicate system problems that require immediate corrective action.
•Major alarms indicate system problems that require corrective action.
•Minor alarms indicate system problems that do not affect system performance and may or
may not require action.
•Warning alarms indicate system status changes that normally do no need any corrective
action.
Business Communications Manager Management Guide
66Chapter 2Fault Management System
Accessing and configuring the Alarm System
The Alarm Service works to generate SNMP trap event notifications. You must also enable and
configure SNMP traps.
Functions the Alarm Service performs
•monitoring Windows NT event logs for incoming events
•synchronizing Windows NT logs with Business Communications Manager alarm database
•receiving events (alarms) from other Business Communications Manager applications through
its API and logs the events in the Business Communications Manager database
•archiving alarm history based on the criteria defined in Alarm Manager
•monitoring the alarm configuration changes and updates SNMP trap agent and Alarm Service
Note: When the Alarm Service is enabled, Business Communications Manager
automatically archives the BCM Event logs. See “Enabling the alarm service” on page
67.
Note: The Alarm Service is disabled by default. You must enable the Alarm Service to
view alarms on the Alarm Banner. See “Enabling the alarm service” on page 67 .
Note: You must configure how the system handles SNMP trap notifications. Events that
arrive in the alarm database trigger an SNMP trap message to be generated. If you do not
configure SNMP traps, you will not obtain optimum alarm reporting capability.
P0609330 3.0
Chapter 2Fault Management System67
Enabling the alarm service
Use this procedure to enable the Alarm Service and view alarms on the Alarm Banner.
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On th e Unified Manager navigation tree, click the Services key and select the Alarm Service
heading.
The Alarm Service Summary screen appears.
3From the Status list box, change the status of the alarm service to Enabled.
Figure 17 Alarm service selection screen
4Press the Tab key to save the settings.
Business Communications Manager Management Guide
68Chapter 2Fault Management System
Accessing the Alarm Banner to monitor alarm notification
Use the Alarm Banner to continually monitor the Business Communications Manager system for
faults or alarm conditions. The Alarm Banner stays active on your desktop for quick access. The
banner displays color codes to represent the alarm severity and the number of alarms for each
severity level. The Alarm Banner displays alarms in real time.
Note: You must enable alarm service before the Alarm Banner will function.To enable
the alarm server, see “Enabling the alarm service” on page 67.
To access the Alarm Banner
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree select the System heading.
3From the Fault menu select Alarm Banner.
The Alarm Banner appears.
Figure 18 Alarm banner
4Select any color-coded alarm button to view a report of active alarms.
The Alarm Browser appears. See “Accessing the Alarm Browser to analyze alarm detail” on
page 69 for more information.
P0609330 3.0
Chapter 2Fault Management System69
Accessing the Alarm Browser to analyze alarm detail
With the Alarm Browser you can access and detect an alarm occurring on the system, and display
detailed information on each alarm to assist you to perform corrective action, if needed.
See the section “Alarm Analysis and Clearing Procedures” on page 89 for a detailed explanation of
how to navigate through the alarm clearing process and the descriptions in this guide.
To access the alarm browser and alarm detail screen
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the navigation tree click the System heading.
3On the Fault menu click Alarm Banner.
The Alarm Banner appears.
4Select any color-coded alarm buttonto display a report of active alarms. Select ALL (white
button) to browse through the complete list of system alarms, regardless of the severity level.
The alarm browser screen appears.
5Select the row corresponding to the alarm for which you want detailed information.
6On the Alarm Browser, click the Actions menu and select Display Details.
The Alarm Details screen appears. The Alarm Details screen is a read-only display.
Business Communications Manager Management Guide
70Chapter 2Fault Management System
Figure 19 Alarm browser and detail screen
7Close the Alarms Details screen and the Alarm Browser when you are finished viewing the
alarms for this severity.
Configuring Alarm Manager settings
With Alarm Manager you can manage how you collect and store alarm information. With the
Alarm Manager you can set different collection parameters for the Alarm Database. You can use
the Alarm Manager to enable or disable the sending of all or some types of SNMP traps. The
Alarm Manager provides the Alarm Backup Batch Job, which backs up old alarm records to an
archive folder at a scheduled time.
To configure Alarm Manager settings
1On the navigation tree, click the Management key and click the Alarm Manager heading.
P0609330 3.0
Figure 20 Alarm database screen
Chapter 2Fault Management System71
2Use the information in this table to configure the Alarm Database.
Table 3 Alarm Database settings
AttributeAction
Maximum Number
Record
Kept Timer (days) Set the number of days that the records remain in the database before the records are archived.
Resync Timer
(seconds)
Set the maximum number of records that the alarm database stores. The default is 0 (no limit).
The range is from 0 to 5000 records. If you enter 0, there is no limit to the number of records.
When the number of records reaches the maximum, the earliest record is removed to make
room for the new alarm record.
Set, in seconds, the interval at which the alarm service initiates a synchronization operation with
the Business Communications Manager's internal event logs. This synchronization is in addition
to the normal synchronization operations triggered by the arrivals of new events.
Business Communications Manager Management Guide
72Chapter 2Fault Management System
Table 3 Alarm Database settings (Continued)
AttributeAction
Archive LocationEnter the path to the directory where the archives of alarm information are kept.
The default path is: d:datafiles\nortel networks\unified manager\archive\.
Nortel Networks highly recommends that you do not change this path from it default value.
An archive of the alarm information is made when an Alarm Backup Batch Job is run or when the
Alarm Service is started. During an archive operation, the alarm database is copied to the
archive location and the alarm database is then emptied.
During an archive operation, the Business Communications Manager's internal event logs are
also copied to the archive location and the event logs are then emptied. The file names of these
internal event log archives are:
System Event Log SystemLogYYMMDDHHMM.evs
Application Event LogApplicationLogYYMMDDHHMM.evs
Security Event LogSecurityLogYYMMDDHHMM.evs
Where:
YY is the year the archive was created
MM is the month the archive was created
DD is the day the archive was created
HH is hour the archive was created
MM is the minute the archive was created
3Press the TAB key to save your settings.
4Click the SNMP Trap tab.
P0609330 3.0
Figure 21 SNMP Trap screen
Chapter 2Fault Management System73
5Use the information in this table to configure the SNMP Trap.
Table 4 SNMP Trap settings
AttributeAction
Traps EnabledEnable or disable the sending of SNMP traps when a new event arrives in the alarm database.
Information
Events
Forwarded
Warning Events
Forwarded
Error Events
Forwarded
Source
Exclusion List
Enable or disable sending SNMP traps when an “Information” event arrives in the alarm database.
If you have auto SNMP trap dial out set up, and the value for 'Traps Enabled' is 'Yes', setting
"Information Events Forwarded" to "Yes" causes the BCM to repeatedly redial the trap client.
Always set "Information Events Forwarded" to "No" when SNMP trap dial out is set up.
If the name of a demand dial interface is selected as 'Interface' (when you add/modify a trap
community entry) and the 'Traps Enabled' field value is 'Yes', Nortel Networks recommends you
specify the value of the 'Information Events Forwarded' field as 'No'. If you specify a value of “Yes”,
the BCM will constantly redial to the trap client.
Note: Win dows 95/98 is not supported on a receiving system for the 'SNMP trap dialout' feature.
Enable or disable sending SNMP traps when a “Warning” event arrives in the alarm database.
Enable or disable sending SNMP traps when an “Error” event arrives in the alarm database.
Add, in a comma-separated format, a list of event sources from which SNMP traps must not be
generated. The source exclusion list prevents you from receiving SNMP traps which have no
meaning to you.
Business Communications Manager Management Guide
74Chapter 2Fault Management System
6Press the TAB key to save your settings.
7Click the Alarm Backup Batch Job tab.
Figure 22 Alarm Backup Batch Job screen
8Use the information in this table to configure the Alarm Backup Batch Job.
Table 5 Alarm Backup Batch Job settings
AttributeAction
Batch JobStart or stop a scheduled batch backup to an archive folder. The Alarm Backup Batch Job uses the
Schedule DaySet the day for the backup.
Schedule TimeSet the time for the backup.
Kept Timer value from the Alarm Database screen to determine when to archive an alarm record.
Tips
Before you change the day or time, or both, you must first stop the batch job, make your changes,
and then start the batch job again.
9Press the TAB key to save your settings.
P0609330 3.0
SNMP Traps
A trap is a signal that tells a program that an event occurred in the system. When a program
receives a signal, a specific set of activities take place.
The SNMP system enables SNMPv1 traps to be generated based on all or a subset of NT Events
generated on the Business Communications Manager. Any information sent to the BCM Windows
NT event log and shown in the Alarm Banner and Alarm Browser can generate an SNMP trap.
SNMP traps received from Business Communications Manager contain descriptions of the alarms
that occur in the system. Additionally, SNMP generic traps such as coldStart, linkDown, linkup,
authenticationFailure, are also generated from the Business Communications Manager, depending
on the user’s configuration.
For the BCM to generate SNMP traps, you must configure how the system handles SNMP trap
notifications. When SNMP is enabled, events arriving in the alarm database trigger an SNMP trap
message to be generated. Use the alarm manager to enable or disable sending of all or some types
of SNMP traps.
The trap format is specified in the BCM “Small Site Event MIBs” on page 488 and is captured and
viewed through any standard SNMP fault monitoring framework or trap watcher (see
“Management Information Base (MIB) System).
Chapter 2Fault Management System75
BCM alarm and SNMP trap list
The complete set of BCM Alarms and SNMP traps is provided (see “Component ID (alarm)
summary information” on page 92 ).
To view the BCM Alarms list
1Access the Unified Manager Maintenance page.
2Click the Alarms and Traps link.
The Alarms and Traps screen displays a list of the events (see “Component ID (alarm)/
eventSource (trap) summary” on page 92).The events are organized by event source.
3Contact your Business Communications Manager Nortel Networks Systems Engineer,
Services organization, or PLM and request a list in Excel spreadsheet format.
Business Communications Manager Management Guide
76Chapter 2Fault Management System
Alarm banner, NT event database, and SNMP trap correlation
Although the same events (alarms) that are reported in the Alarm System are ade available
remotely via SNMP traps and recorded in the NT Event logs, the terminology used for severity
levels is not the same.
Refer to the table Alarm banner, NT Event and SNMP Trap Severities or Types to interpret the
severity for each type of notification The terminology for severity levels between the NT Event log
and in the Alarm Banner is not identical.
Table 6 Alarm banner, NT Event and SNMP trap severities or types
Alarm priorityAlarm BannerNT EventSNMP Trap Type
HighcriticalErrorError
Mediummajor or minorWarningWarning
LowwarningInformationInformation
Refer to the table SNMP Trap Types to interpret the severity for each type of notification. The
mapping between alarm severity levels and SNMP trap types (or 'specific-trap' code) is
summarized in the table.
The BCM Alarm system denotes the source of a BCM alarm as “Component ID”, whereas the
SNMP system denotes the source of the same information as a trap of source “eventSource”. The
terminology used in this document of Component ID (alarm )/ eventSource (trap) is intended to
show that these two systems call the same information by a different name.
SNMP trap filtering
Trap filtering is done on Business Communications Manager using a source exclusion list and
severity levels of Error, Warning and Info. In this way, traps of type “error” (or severity level
critical) are forwarded according to the trap community list. The trap filters limit the volume and
type of SNMP information, and let you control essential information transferred on the network.
To set the filters
1On the Unified Manager navigation tree, click the Management key and the Alarm Manager
P0609330 3.0
Chapter 2Fault Management System77
heading.
2Click the SNMP trap tab.
3Use the list boxes on the SNMP Trap screen to set the filters for SNMP traps.
SNMP guidelines
The SNMP service in Business Communications Manager re sponds to requests from management
stations, generates SNMP traps corresponding to events and reports to trap subscriber stations.
Use these SNMP guidelines
•Set read-only and read-write community names.
•Set a list of permitted managers. When set, the agent responds to SNMP managers requests
from those IP hosts only.
•An empty list of permitted managers implies that the agent responds to requests from anyone.
•Set trap communities. Each trap entry identifies the community name that must be used and
the manager addresses.
•Enable or disable sending authentication traps.
•Enable or disable the SNMP agent.
About defining SNMP trap destinations
SNMP trap destinations can be:
•a community list specifying community name and access privileges
•a manager list specifying SNMP manager IP addresses, that is, SNMP managers allowed to
make SNMP queries to the Business Communications Manager
•a trap community list that specifies destinations to which SNMP traps should be sent if SNMP
traps are enabled
Although no specific limit is set for the number of trap communities, Nortel Networks
recommends that you limit the number of trap communities to a maximum of 5. Limiting the
number of trap communities ensures that system performance does not degrade.
Configuring an SNMP Community
Use the procedures in this section to configure the Business Communications Manager to send
SNMP messages to an SNMP workstation.
•“Configuring SNMP summary attributes” on page 78
•“Adding a community to an SNMP community list” on page 79
•“Modifying an SNMP community list” on page 81
Business Communications Manager Management Guide
78Chapter 2Fault Management System
•“Deleting an SNMP community” on page 81
Configuring SNMP summary attributes
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree click the Services key and the SNMP heading.
The SNMP Summary screen appears.
Figure 23 SNMP summary screen
3Configure the SNMP summary attributes.
Table 8 SNMP Summary attributes
AttributeAction
DescriptionView the description of the SNMP agent.
VersionView the version of the SNMP agent.
StatusEnable or disable the SNMP agent.
Authentication
Failure Traps
P0609330 3.0
Disable authentication failure traps.
When enabled, the SNMP agent sends authentication failure traps if there is an authentication
failure. Authentication failures happens if an SNMP manager application provides an incorrect
community string or performs an operation that is not permitted for a community.
Chapter 2Fault Management System79
Adding a community to an SNMP community list
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree click the Services key and the SNMP heading.
The SNMP Summary screen appears.
3Click the Community List tab.
The Community List screen appears.
4From the Configuration menu click Add Community.
The Community List dialog box appears.
Figure 24 Community list screen
Business Communications Manager Management Guide
80Chapter 2Fault Management System
5Configure the Community List attributes.
Table 9 SNMP Community List attributes
AttributeAction
Community List
(C#)
Community Name Specify the name of the community that the individual managers use to interact with this agent.
Access
Permission
Specify the entry name used as a key to uniquely identify an individual community entry on the
SNMP agent. Its value must follow certain conventions. It must have the prefix C followed by a
unique number that identifies the community name entry on the agent. For example, C2 is a valid
value. While adding, specify non-recurring values for the unique number.
While adding, if you specify an existing community entry name, it modifies the existing community
entry. Using non-sequential numbers results in automatic reassignment of sequential numbers.
While modifying a community entry, you can't change the name. The community entry name
does not have any significance other than to identify an entry.
The name is case sensitive.
The default community names are public and Private.
If there are no community names listed, then all community names are accepted.
All the community names are global to the agent. In other words, you cannot associate a specific
community name with a single management station.
Specify the read and write access for this community. Available options are:
READ-ONLY and READ-WRITE
The default value is READ-ONLY.
6Click the Save button.
P0609330 3.0
Chapter 2Fault Management System81
Modifying an SNMP community list
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree click the Services key and click the SNMP heading.
The SNMP Summary screen appears.
3Select the Community List tab.
The Community List screen appears.
4Select the community you want to modify.
5On the Configuration menu click Modify Community.The Community List dialog box
appears.
6Modify the Community attributes as required.
7Click the Save button.
Deleting an SNMP community
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree click the Services key and click the SNMP heading.
The SNMP Summary screen appears.
3Select the Community List tab.
The Community List screen appears.
4Select the community you want to delete.
5On the Configuration menu select Delete Community.
A message appears that asks you to confirm the deletion.
6Click the Yes button.
The community is deleted from the list.
Configuring an SNMP Manager List
Use the procedures in this section to add, modify or delete SNMP manager information in the
Manager List.
•“Adding a manager to the SNMP manager list” on page 81
•“Modifying an SNMP manager” on page 84
•“Deleting an SNMP manager” on page 84
Adding a manager to the SNMP manager list
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
Business Communications Manager Management Guide
82Chapter 2Fault Management System
2On the Unified Manager navigation tree click the Services key and click the SNMP heading.
The SNMP Summary screen appears.
3Click the Manager List tab.
The Manager List screen appears.
4On the Configuration menu click Add Manager.
The Manager List dialog box appears.
Figure 25 Manager list screen
5Configure the Manager List attributes.
Table 10 SNMP Manager List attributes
AttributeAction
Manager List
(M#)
P0609330 3.0
Specify the entry name used to identify an individual manager entry on the SNMP agent. Its value
must follow certain conventions. It must have the prefix M followed by a unique number that
identifies the manager entry on the agent. For example, M2 is a valid value. While adding, specify
non-recurring values for the unique number.
While adding, if you specify an existing manager entry name, it modifies the existing manager
entry. Using non-sequential numbers results in automatic reassignment of sequential numbers.
While modifying a manager entry, you cannot change the name. The manager entry name
uniquely identifies an entry.
Table 10 SNMP Manager List attributes (Continued)
AttributeAction
Chapter 2Fault Management System83
Manager IP
Address
6Click the Save button.
Specify the IP Address of the SNMP Manager station corresponding to this entry. If no manager
entries are created, the Business Communications Manager device accepts SNMP requests
from all stations. If there is a list of manager entries, Business Communications Manager base
unit accepts SNMP requests from the IP Addresses specified in the list.
Business Communications Manager Management Guide
84Chapter 2Fault Management System
Modifying an SNMP manager
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree click the Services key and click the SNMP heading.
The SNMP Summary screen appears.
3Click the Manager List tab.
The Manager List screen appears.
4Highlight the manager you want to modify.
5On the Configuration menu select Modify Manager.
The Manager List screen appears.
6Modify the manager attributes.
7Click the Save button.
Deleting an SNMP manager
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree click the Services key and click the SNMP heading.
The SNMP Summary screen appears.
3Click the Manager List tab.
The Manager List screen appears.
4Highlight the manager you want to delete.
5On the Configuration menu select Delete Manager .
A message appears to confirm the deletion.
6Click the Yes button.
P0609330 3.0
Chapter 2Fault Management System85
Configuring an SNMP Trap Community List
Use the procedures in this section to add, modify or delete information within the SNMP trap
community list.
•“Adding a trap community to the SNMP community list” on page 85
•“Modifying an SNMP trap community” on page 87
•“Deleting an SNMP trap community” on page 87
Adding a trap community to the SNMP community list
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree click the Services key and click the SNMP heading.
The SNMP Summary screen appears.
3Select the Community List tab.
The Community List screen appears.
4On the Configuration menu select Add Trap Community.
The Trap Community List dialog box appears.
Figure 26 Trap Community list screen
Business Communications Manager Management Guide
86Chapter 2Fault Management System
5Configure the Trap List attributes.
Table 11 SNMP Trap List attributes
AttributeAction
Trap List (T#)Specify the entry name used to identify an individual trap community entry on the SNMP agent.
Its value must follow certain conventions. It must have the prefix T followed by a unique number
that identifies the trap community entry on the agent. For example, T2 is a valid value. While
adding, specify non-recurring values for the unique number.
While adding, if you specify an existing trap community entry name, it modifies the existing trap
community entry. Using non-sequential numbers results in automatic reassignment of sequential
numbers. While modifying a trap community entry, you can't change the name. The trap
community entry name does not have any significance, other than to uniquely identify an entry.
Community Name View the community name. The community name is case sensitive and encoded in each trap
Manager IP
Address
InterfaceSpecify the method to route SNMP traps to the SNMP trap collector.
message. This name cannot be in the Community List.
Specify the IP addresses of the SNMP trap subscriber stations. If you have too many IP
addresses in the trap community list, the SNMP service may degrade system performance.
The IP address must correspond to the PC where the trap collector software is installed.
Do not use the dynamic IP address that the PC receives when the dial-up link activates (as the
BCM initiates dialing). Using the dynamic IP address causes the removal of the required static
route.
If the trap collector is on the same subnet as one of the BCM LAN or WAN interfaces, select
'RouterAssigned' as the Interface value. The RRAS decides how to route the packet to the trap
collector according to its current routing table.
If you want to let the BCM send trap packets to the trap collector via the dialup interface, select a
demand dial interface as 'Interface'. The BCM automatically adds (under IP routing) a static route
for the trap collector that points to the dial-out V.90 modem or ISDN interface. Configure a trap
community entry with the trap collector IP address as the trap destination. Select
'RouterAssigned' or one of the dial-out interfaces listed in the drop-down list.
Types of communication links are:
•Select RouterAssigned: The route for the trap destination is automatically determined and
handled by the RRAS. Enter the IP address of the trap collector in the Manager IP Address
field.
•V.90 Dial-out: The interface is specified through Resources/dialup/V.90/Modemtrapdialout.
The BCM will automatically dial-out to the SNMP trap collector telephone number. Specify the
dial-out information under the V.90 Link Parameters tab. The Modembackup is not used for
the auto SNMP trap dial-out feature.
•ISDN BRI (Europe/North America): The interface is specified through Resources/dialup/
ISDN. The BCM will automatically dial-out to the SNMP trap collector phone number.
•ISDN PRI (Europe): The interface is specified through Resources/dialup/ISDN. The BCM will
automatically dial-out to the SNMP trap collector phone number.
6Click the Save button.
P0609330 3.0
Chapter 2Fault Management System87
Modifying an SNMP trap community
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
2On the Unified Manager navigation tree click the Services key and click the SNMP heading.
The SNMP Summary screen appears.
3Click the Trap Community List tab.
The Community List screen appears.
4Highlight the list you want to modify.
5On the Configuration menu select Modify Trap.
The Trap Community List screen appears.
Figure 27 Modify trap community dialog box
6Modify the trap community attributes.
7Click the Save button.
Deleting an SNMP trap community
1Access the correct Business Communications Manager in your network from the Unified
Manager workstation browser.
Business Communications Manager Management Guide
88Chapter 2Fault Management System
2On the Unified Manager navigation tree click the Services key and click the SNMP heading.
The SNMP Summary screen appears.
3Click the Trap Community List tab.
The Community List screen appears.
4Highlight the list you want to delete.
5On the Configuration menu select Delete Community.
A message appears that asks you to confirm or cancel the deletion.
6Click the Yes button.
The SNMP trap community list is deleted from the database.
P0609330 3.0
Chapter 2Fault Management System89
Alarm Analysis and Clearing Procedures
Use the information in this section to identify, analyze and clear alarm events. This section
describes alarm messages and appropriate, associated maintenance activities (see the Alarm
clearing flow chart below.). Use the information in this section as a reference to interpret and act
upon event notifications from your alarm interface.
Unified Manager tools for detecting events that affect system
performance or function
•The Alarm Banner and Alarm Browser. These are the primary Unified Manager alarm
detectiontools.
•The phone alarm (if configured) provides both a visual and audible indication of an MSC
alarm event.
•The event logs displayed through the SNMP trap watcher provide supporting information or as
an alternative event reporting tool.
•The system test log provides supporting alarm information (for MSC events only).
Figure 28 Alarm clearing flow chart
Examine Alarm
Banner
Locate alarm event in Component ID (alarm)/eventSource (trap) summary on page 92
Routine monitoring process
Alternative monitoring process
Examine Alarm
Follow recommended action indicated in alarm description
YesOther alarm?
Browser
Alarm event
Examine Alarm
Phone - MSC
Event
Examine
SNMP trap
Examine
System test
logs (MSC
events only)
No
End
Analysis & Resolution process
Business Communications Manager Management Guide
90Chapter 2Fault Management System
SNMP Event Messages
SNMP Trap notifications (messages) are displayed in your SNMP trap watcher.
SNMP event messages are generated when
•a system level service is activated or stopped
•a Nortel Networks configurable service is activated or stopped
SNMP events severity levels
•Error
•Warning
•Information
Using the component ID and event ID summary table s
The Alarm System shows the source of a BCM alarm as “Component ID”, whereas the SNMP
system shows the source of the same information as a trap of source “eventSource”. The
terminology used in this document of Component ID (alarm) / eventSource (trap) is intended to
show that these two systems call the same information by different names.
Use the table “Component ID (alarm)/eventSource (trap) summary” on page 92 to navigate to the
SNMP event displayed in your SNMP trap watcher.
Alternatively, use “Component ID alarms/eventSource (Trap) by event ID” on page 95 to identify
SNMP event ID and display the associated SNMP trap message and appropriate maintenance
activity.
Alarm description information
•associated service name
•event ID number
•alarm interpretation and corrective actions
•associated logs
To use the alarm summary table
1Examine the alarm name shown in the Alarm Browser.
2Select the corresponding link shown in “Component ID (alarm)/eventSource (trap) summary”
on page 92 under Alarm name.
The alarm description is displayed.
“Component ID (alarm)/eventSource (trap) summary” on page 92 also displays the service
associated with the alarm.
P0609330 3.0
Chapter 2Fault Management System91
3Select the associated service name link to display the service description (see “Service
Definitions” on page 257 ).
4Select the Return to table link to display the alarm summary table to select another alarm or
service description.
Business Communications Manager Management Guide
92Chapter 2Fault Management System
Component ID (alarm) summary information
Use the information displayed in this table to search for an alarm by the Component ID. Use the
table to display the Component ID alarm description and to determine the cause of an alarm/trap
and the appropriate maintenance activity.
Use the table to go to the descriptions you require:
•Click a link in the Component ID link (alarm)/eventSource (trap) column to review the alarm/
trap description.
•Click a link in the Associated Service column to review the service associated with the
Component ID (alarm). For example, discontinuation of a service or dependant service can
trigger an event notification or SNMP Trap for a specific Component. For detailed descriptions
of services see Chapter3, “Service Management System .
•Use Component ID alarms/eventSource (Trap) by event ID to search for a Component ID
(alarm) by the associated Event ID.
Table 12 Component ID (alarm)/eventSource (trap) summary
Component ID (alarm) /
eventSource (trap)
AtapiNoneSAMNone
AutochkNoneSave DumpNone
BCMAmpNoneSecurityEventLog
BrowserComputer BrowserSerialNone
BRUNoneService Control ManagerCall Detail Recording
CDRTransferNoneService Control ManagerDECT Alarm monitor
cfsServrVoice CFSService Control ManagerDECT OAM
cfsServrVoice Licensing services Service Control ManagerMedia gateway server
CTEVoice CTEService Control ManagerMedia services manager
DCOMNoneService Control ManagerMessage trace tool
DECTAlarmsDECT Alarm monitorService Control ManagerNet logon
DECTMtceDECT Maintenance
DhcpServerMicrosoft DHCP serverService Control ManagerRemote access
diskNoneService Control ManagerTask scheduler
DNSMicrosoft DNS serverService Control ManagerUNISTIM Terminal proxy
DrWatsonNoneService Control ManagerVoice CFS
emsManagerMedia services manager Service Control ManagerVoice CTE
eventLogEventLogService Control ManagerVoiceCTI
FTMSSNoneService Control ManagerVoice mail
Associated
Service
console
Component ID (alarm) /
eventSource (trap)
Service Control ManagerPlug and play
Associated
Service
connection manager
server
P0609330 3.0
Table 12 Component ID (alarm)/eventSource (trap) summary
Chapter 2Fault Management System93
Component ID (alarm) /
eventSource (trap)
HotDeskingHotDeskingService Control ManagerVoice management
Inventory ServiceInventory serviceService Control ManagerVoice software alarm
IPRIP2NoneService Control ManagerVoIP Gateway
IPSecIKEIPSecIKE serviceService Control ManagerVoice MSC service
IPXRouterManagerRouting and remote
IVRNortel Networks IVRSNMPSNMP
JETNoneSNMP Trap AgentSNMP Trap service
kbdclassNoneSrvNone
MGSMedia gateway serverSSH Secure Shell ServerNone
ModemNoneSurvivable Remote GatewayNone
MPSNoneSystem Status MonitorSystem status monitor
MSPAlarmServiceNoneTcpipNone
mspQoSNoneTlntSvrTlntsvr
mspQoSMPNoneToneSrvrNone
NCMNoneUPSUPS - APC Powerchute
PerfctrsNoneVoiceMSCServiceVoice MSC service
PerflibNoneVoiceRecordCall Detail Recording
Associated
Service
access service
client communication
manager
client communication
manager
client communication
manager
Component ID (alarm) /
eventSource (trap)
Service Control ManagerVoice WAN
VBMainVBMain
VNC ServiceVNC server
VNetManagerNone
Associated
Service
subsystem
monitor
plus
server
monitor
subsystem
Business Communications Manager Management Guide
94Chapter 2Fault Management System
Table 12 Component ID (alarm)/eventSource (trap) summary
Component ID (alarm) /
eventSource (trap)
Policy ServicesPolicy serviceVoiceTimeSynchVoice time synch
qos_flt_initQos_flt_initVoiceWatchdogVoice watchdog
RdrNoneWinsWindows internet name
RouterRouting and remote
Associated
Service
access service
Component ID (alarm) /
eventSource (trap)
WINSCTRSNone
WorkstationWorkstation
Associated
Service
service
P0609330 3.0
Chapter 2Fault Management System95
Component event ID
Use the information in the table Component ID alarms/eventSource (Trap) by event ID to search
for a Component ID (alarm)/eventSource (trap) by Event ID. The Event ID noted in the table is a
short-form to indicate an Event ID (Alarm) / eventId (Trap). The Event ID applies to the
Component ID (alarm) / eventSource (trap).
Use the Component ID alarm description to determine the cause of an alarm and the appropriate
maintenance activity.
Use the links shown in the Component ID (Alarm) / eventSource (Trap) column to navigate.
•Click a Component ID name associated with the Event ID to display the Component ID alarm
description.
•Use the table Component ID (alarm)/eventSource (trap) summary to search for the Component
ID alarm description by the Component ID.
Table 13 Component ID alarms/eventSource (Trap) by event ID
Event ID (Alarm) / eventID (Trap)Component ID (Alarm) / eventSource (Trap)