The information in this document is subject to change without notice. The statements, configurations, technical
data, and recommendations in this document are believed to be accurate and reliable, but are presented without
express or implied warranty. Users must take full responsibility for their applications of any products specified in this
document. The information in this document is proprietary to Nortel Networks Inc.
The software described in this document is furnished under a license agreement and may be used only in accordance
with the terms of that license. The software license agreement is included in this document.
Trademarks
*Nortel, Nortel Networks, the Nortel logo, the Globemark, Passport, BayStack, and Contivity are trademarks of
Nortel Networks.
All other products or services may be trademarks or registered trademarks of their respective owners.
The asterisk after a name denotes a trademarked item.
Restricted rights legend
Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer
software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth
in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
Export
This product, software and related technology is subject to U.S. export control and may be subject to export or import
regulations in other countries. Purchaser must strictly comply with all such laws and regulations. A license to export
or reexport may be required by the U.S. Department of Commerce.
Statement of conditions
In the interest of improving internal design, operational function, and/or reliability, Nortel Networks Inc. reserves the
right to make changes to the products described in this document without notice.
Nortel Networks Inc. does not assume any liability that may occur due to the use or application of the product(s) or
circuit layout(s) described herein.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION,THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that
contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices
imposed by third parties).
Page 3
Licensing
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
ttp://www.openssl.org/).
(h
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
This product includes software developed by the Apache Software Foundation (h
Portions of the TunnelGuard code include software licensed from The Legion of the Bouncy Castle.
ttp://www.apache.org/).
Nortel Networks Inc. software license agreement
This Software License Agreement ("License Agreement") is between you, the end-user ("Customer") and Nortel
Networks Corporation and its subsidiaries and affiliates ("Nortel Networks"). PLEASE READ THE FOLLOWING
CAREFULLY. YOU MUST ACCEPT THESE LICENSE TERMS IN ORDER TO DOWNLOAD AND/OR USE THE
SOFTWARE. USE OF THE SOFTWARE CONSTITUTES YOUR ACCEPTANCE OF THIS LICENSE AGREEMENT.
If you do not accept these terms and conditions, return the Software, unused and in the original shipping container,
within 30 days of purchase to obtain a credit for the full purchase price.
"Software" is owned or licensed by Nortel Networks, its parent or one of its subsidiaries or affiliates, and is
copyrighted and licensed, not sold. Software consists of machine-readable instructions, its components, data,
audio-visual content (such as images, text, recordings or pictures) and related licensed materials including all whole
or partial copies. Nortel Networks grants you a license to use the Software only in the country where you acquired the
Software. You obtain no rights other than those granted to you under this License Agreement. You are responsible for
the selection of the Software and for the installation of, use of, and results obtained from the Software.
Licensed Use of Software. Nortel Networks grants Customer a nonexclusive license to use a copy of the
1.
Software on only one machine at any one time or to the extent of the activation or authorized usage level,
whichever is applicable. To the extent Software is furnished for use with designated hardware or Customer
furnished equipment ("CFE"), Customer is granted a nonexclusive license to use Software only on such
hardware or CFE, as applicable. Software contains trade secrets and Customer agrees to treat Software as
confidential information using the same care and discretion Customer uses with its own similar information that it
does not wish to disclose, publish or disseminate. Customer will ensure that anyone who uses the Software
does so only in compliance with the terms of this Agreement. Customer shall not a) use, copy, modify,transferor
distribute the Software except as expressly authorized; b) reverse assemble, reverse compile, reverse engineer
or otherwise translate the Software; c) create derivative works or modifications unless expressly authorized; or d)
sublicense, rent or lease the Software. Licensors of intellectual property to Nortel Networks are beneficiaries of
this provision. Upon termination or breach of the license by Customer or in the event designated hardware or
CFE is no longer in use, Customer will promptly return the Software to Nortel Networks or certify its destruction.
Nortel Networks may audit by remote polling or other reasonable means to determine Customer’s Software
activation or usage levels. If suppliers of third party software included in Software require Nortel Networks to
include additional or different terms, Customer agrees to abide by such terms provided by Nortel Networks
with respect to such third party software.
2.Warranty. Except as may be otherwise expressly agreed to in writing between Nortel Networks and Customer,
Software is provided "AS IS" without any warranties (conditions) of any kind. NORTEL NETWORKS DISCLAIMS
ALL WARRANTIES (CONDITIONS) FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE AND ANY WARRANTY OF NON-INFRINGEMENT. Nortel Networks is not obligated
to provide support of any kind for the Software. Some jurisdictions do not allow exclusion of implied warranties,
and, in such event, the above exclusions may not apply.
3.Limitation of Remedies. IN NO EVENT SHALL NORTEL NETWORKS OR ITS AGENTS OR SUPPLIERS BE
LIABLE FOR ANY OF THE FOLLOWING: a) DAMAGES BASED ON ANY THIRD PARTY CLAIM; b) LOSS
OF, OR DAMAGE TO, CUSTOMER’S RECORDS, FILES OR DATA; OR c) DIRECT, INDIRECT, SPECIAL,
INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS),
WHETHER IN CONTRACT, TORT OR OTHERWISE (INCLUDING NEGLIGENCE) ARISING OUT OF YOUR
USE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS, ITS AGENTS OR SUPPLIERS HAVE BEEN
Page 4
ADVISED OF THEIR POSSIBILITY. The foregoing limitations of remedies also apply to any developer and/or
supplier of the Software. Such developer and/or supplier is an intended beneficiary of this Section. Some
jurisdictions do not allow these limitations or exclusions and, in such event, they may not apply.
General
4.
a.If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks
Software available under this License Agreement is commercial computer software and commercial
computer software documentation and, in the event Software is licensed for or on behalf of the United States
Government, the respective rights to the software and software documentation are governed by Nortel
Networks standard commercial license in accordance with U.S. Federal Regulations at 48 C.F.R. Sections
12.212 (for non-DoD entities) and 48 C.F.R. 227.7202 (for DoD entities).
b.Customer may terminate the license at any time. Nortel Networks may terminate the license if Customer
fails to comply with the terms and conditions of this license. In either event, upon termination, Customer
must either return the Software to Nortel Networks or certify its destruction.
c.Customer is responsible for payment of any taxes, including personal property taxes, resulting from
Customer’s use of the Software. Customer agrees to comply with all applicable laws including all applicable
export and import laws and regulations.
d.Neither party may bring an action, regardless of form, more than two years after the cause of the action
arose.
e.The terms and conditions of this License Agreement form the complete and exclusive agreement between
Customer and Nortel Networks.
f.This License Agreement is governed by the laws of the country in which Customer acquires the Software.
If the Software is acquired in the United States, then this License Agreement is governed by the laws of
the state of New York.
Page 5
Contents
Preface9
Before you begin 9
Text conventions 10
Related information 11
How to get help 12
Chapter 1 Installing SREM15
SREM installation precautions 15
System requirements 16
Removing previous versions of SREM 16
Installing SREM on your system 21
Chapter 2 SREM Screen Descriptions27
SREM window areas27
Indicator icons 33
Screen icons 34
Right-click menu 35
5
Publications 11
Online 12
Accessing the uninstall application 17
Uninstalling SREM 17
Menus 29
Toolbar items 32
Chapter 3 Using SREM37
Accessing the SREM software 37
Opening SREM 38
Quitting SREM 38
Viewing SREM online help 38
Configuring SREM settings 40
Managing network access devices from the SREM 41
This document provides generic instructions for installing and using the
Security & Routing Element Manager (SREM) software.
Security & Routing Element Manager (SREM) is a graphical user
interface (GUI) that runs in an online, interactive mode. SREM allows the
management of multiple devices (for example, the Nortel SNAS 4050) from
one application. To use SREM, you must have network connectivity to a
management station running SREM in one of the supported environments.
Before you begin
This guide is intended for network administrators who have the following
background:
•
basic knowledge of networks, Ethernet bridging, and IP routing
•
familiarity with networking concepts and terminology
•
experience with windowing systems or GUIs
9
•basic knowledge of network topologies
Before using this guide, you must complete the following procedures. For a
new switch:
To access Nortel technical documentation online, go to the Nortel web site:
www
nortel.com/support
.
You can download current versions of technical documentation. To locate
documents, browse by category or search using the product name or
number.
You can print the technical manuals and release notes free, directly from
the Internet. Use Adobe* Reader* to open the manuals and release notes,
search for the sections you need, and print them on most standard printers.
Go to the Adobe Systems site at w
ww.adobe.com to download a free copy
of Adobe Reader.
How to get help
If you purchased a service contract for your Nortel product from a distributor
or authorized reseller, contact the technical support staff for that distributor
or reseller for assistance.
If you purchased a Nortel service program, use the w
web page to locate information to contact Nortel for assistance:
•
•
An Express Routing Code (ERC) is available for many Nortel products and
services. When you use an ERC, your call is routed to a technical support
person who specializes in supporting that product or service. To locate the
ERC for your product or service, go to the w
and follow these links:
StepAction
1
ww.nortel.com/help
To obtain Nortel Technical Support contact information, click the
CONTACT US link on the left side of the page.
To call a Nortel Technical Solutions Center for assistance, click the
CALL US link on the left side of the page to find the telephone number
for your region.
ww.nortel.com/help web page
Click CONTACT US on the left side of the HELP web page.
The Security & Router Element Manager (SREM) is a graphical user
interface that allows users to configure and monitor a variety of devices,
including the Nortel Secure Network Access Switch 4050 (Nortel SNAS
4050) and the Nortel Secure Router 6200 Series.
SREM runs in an online, interactive mode, and allows the management of
multiple devices from a single application.
This chapter includes the following topics:
Topic
"SREM installation precautions" (page 15)
"System requirements" (page 16)
"Removing previous versions of SREM" (page 16)
"Installing SREM on your system" (page 21)
15
•
"SREM installation precautions" (page 15)
•
"System requirements" (page 16)
•
"Removing previous versions of SREM" (page 16)
•
"Installing SREM on your system" (page 21)
SREM installation precautions
The following warnings apply to SREM on all operating environments:
•
If you have other Nortel devices in your network, and are running earlier
versions of SREM software, you must install the newest version of
SREM in order to access the switches running the latest software.
•
To maintain multiple versions of SREM on your system, choose a
different installation folder for each new version of SREM.
To replace an existing version of SREM, you must complete the uninstall
process first. The uninstall process is launched when:
— the SREM uninstall process is started manually (see "Accessing the
uninstall application" (page 17) "Accessing the uninstall application"
(page 17))
— the install folder selected during an SREM installation already
contains a version of the software
•
SREM saves the IP addresses that are visited to an encrypted network
configuration (.xvn) file. Uninstalling SREM does not remove this
settings file.
For details about creating a network configuration file, refer to "Saving
a network configuration" (page 47) "Saving a network configuration"
(page 47).
•The network configuration file containing IP addresses visited from a
previous SREM version is automatically used by a newly installed SREM
version. If you do not wish to use the existing network configuration
file, rename or delete the network configuration file before starting the
SREM.
System requirements
Before you install SREM, ensure that you have the current installation file
and that your system meets the following minimum requirements:
•
Java Runtime Environment 1.4.2_02 or later (w
•Win 2k, Win NT 4.0 or later, Windows XP
•
Hardware: P3 1.2 GHz or higher
•
Memory: 512 MB
•
Hard drive space: 72.5 MB
Removing previous versions of SREM
Removing previous versions of SREM is an optional process. Multiple
versions of SREM can exist on one system, as long as each version is
installed in a separate location. If you decide to allow previous versions of
SREM to remain, then you must choose a different folder to use during the
installation process.
For details about the Uninstall process, refer to "Uninstalling SREM" (page
If you attempt to install SREM in a folder that already contains a version
of the software, then you are prompted to uninstall the existing version
automatically before completing the install process.
There are also two ways to access the SREM uninstall application manually:
•
"Using the Start Menu shortcut" (page 17)
•
"Using Windows Explorer" (page 17)
•
"Using the Start Menu shortcut" (page 17)
•
"Using Windows Explorer" (page 17)
Using the Start Menu shortcut
Remove existing versions of SREM software with the Uninstall Security
& Routing Element Manager option, created in the Windows Start menu
during installation.
For example, to remove SREM from a Windows XP system using the default
program group, choose the following option from the Windows Start menu:
All Programs > Nortel Networks Device Manager > Uninstall Security &
Routing Element Manager.
Removing previous versions of SREM17
Using Windows Explorer
If no program group was added to the Windows Start menu during
installation, then complete the following steps to access the SREM uninstall
software:
StepAction
1
Navigate to the folder where the SREM software is installed using
Windows Explorer.
2
3
Open the Uninstall_Security & Routing Element Manager sub-folder.
Run the Uninstall Security & Routing Element Manager.exe file.
Note: If more than one version of SREM software is installed, be sure
that you select the correct software version to uninstall.
Uninstalling SREM
Use the following procedure to remove SREM from your system.
Click Restore Default Folder to use the default location for SREM,
or click Choose to select a different installation folder.
Note: To replace an SREM installation on your computer, select
the same storage path as the existing version. The existing
SREM version will be uninstalled before the current installation
is completed.
To install multiple instances of SREM on your computer, choose
a storage path that does not conflict with existing versions.
If the selected install folder is empty, or if you complete the required
uninstall process, then the Pre-Installation Summary screen
appears(Figure 11 "Pre-Installation Summary" (page 25)). This
screen displays a summary of the installation choices you have
made for confirmation.
This section is an overview of the areas of the SREM screen. The following
table Table 2 "Main SREM window" (page 27) describes the six key areas of
the SREM interface, as shown in the figure below Figure 13 "Main SREM
TabsScreen areas that the user can select to monitor
and configure additional device options.
Configuration and
Monitoring pane
Area where the user views, updates and configures
device options. Required fields are marked with
asterisk (*).
Device listAllows you to select, view, expand, and collapse
configured devices. When you expand a device,
you see any devices or components configured
under it in the device hierarchy. Devices with
subdevices or components are referred to as
"parents."
Screen iconsAllows quick access to some common screens.
The menu items available from the Edit menu are described in the following
table Table 4 "Edit menu" (page 30).
Table 4
Edit menu
Menu optionDescription
DeleteDelete the highlighted device or attribute.
View menu items
The menu items availablefrom the View menu are described in the following
table Table 5 "View menu" (page 30).
Table 5
View menu
Menu optionDescription
BackRevert to the previous view.
ForwardJump to the next view, if you reverted to a previous
view.
RediscoverRediscover the selected device, or any discoverable
component in the Device List if no device is selected.
Revert to DefaultRevert all attributes on the selected screen to their
default value.
RefreshRefresh attributes displayed in the Configuration and
Monitoring pane.
ApplyApply changes made in SREM to the network access
device.
ScreensOpen any currently visible tab from the Configuration
and Monitoring pane for the selected device.
This option is only available after a device is configured.
CommitCommit any configuration changes to the device.
RevertRefresh attributes displayed in the Configuration and
Monitoring pane
DiffOpen the Configuration Modifications screen, which
lists all configuration changes made during this
session.
DisconnectTerminates connectivity to the selected device.
A Guide to Create a
Group
Open a wizard that helps you quickly create a Group
The menu items available from the Help menu are described in The
following table Table 8 "Help menu" (page 32).
Table 8
Help menu
Menu optionDescription
ContentsOpen the SREM help system.
AboutDisplay details about the SREM software version.
Toolbar items
This section is an overview of the toolbar items available on the SREM
screen, as shown in the figure below Figure 14 "SREM toolbar" (page 32).
SREM help is divided into generic and device-specific
sections. When this menu item is selected, context
sensitive help appears for the current screen or device,
as applicable.
Figure 14
SREM toolbar
The following table Table 9 "Toolbar items" (page 32) provides descriptions
of each toolbar item.
Table 9
Toolbar items
ItemDescription
First row
NewClear the Device List.
OpenOpen the Device List.
SaveSave the Device List.
DeleteDelete currently selected devices/components.
Revert to DefaultRevert all attributes on the selected screen to the
default value.
RediscoverRefresh the Device List hierarchy by clearing cached
data.
RefreshRefresh attributes on the Configuration and Monitoring
ApplyUpdate the selected device with new entries made on
the Configuration and Monitoring Pane.
New WindowOpen another SREM window with the same devices in
the Device List.
Second row
<
Open the previously displayed Configuration and
Monitoring Pane.
>
Open the next Configuration and Monitoring Pane, if
you opened a previous screen.
CommitCommit configuration changes to the device.
RevertRefresh attributes displayed in the Configuration and
Monitoring pane
DiffOpen a screen that lists the existing configuration
changes.
DisconnectTerminates connectivity to the selected device.
Indicator icons
Icons that identify the status of an entered or displayed component or device
are described in The following table Table 10 "Indicator icons" (page 33).
Table 10
Indicator icons
A Guide to Create a
Group
Open a wizard to help you quickly create a Group
within a domain.
Tunnel GuardOpen the Nortel Networks TunnelGuard Software and
Rule Definition Tool.
Domain Quick WizardOpen a wizard to help you quickly create a domain.
IconNameDescription
ValidParameter values were successfully
retrieved from the device and are in sync
with the device.
Open the Right-click menu by highlighting a device or I/O and clicking the
alternate, or secondary button on your mouse. The right-click menu varies
according to the device or parameter selected. In addition to cut/paste and
renaming functionality, the Right-click menu provides quick access to tabs
in the Configuring and Monitoring pane and to buttons available on the
toolbar for the selected equipment.
When you right-click a network access device in the Device List, the
right-click menu also contains all toolbar options.
the figure below Figure 17 "Right-click menu example" (page 35) illustrates
a generic right-click menu that is displayed when you click on devices and
options in the Device List.
This section provides procedures for general or common SREM tasks. For
more detailed SREM procedures and interface descriptions, refer to the
online help.
This chapter includes the following topics:
Topic
"Accessing the SREM software" (page 37)
"Configuring SREM settings" (page 40)
"Managing network access devices from the SREM" (page 41)
"Changing information within the SREM" (page 48)
"Managing changes within the SREM" (page 50)
"Managing logs and statistics within the SREM" (page 52)
37
"Using the Log Browser tool" (page 54)
•
"Accessing the SREM software" (page 37)
•
"Configuring SREM settings" (page 40)
•
"Managing network access devices from the SREM" (page 41)
•
"Changing information within the SREM" (page 48)
•
"Managing changes within the SREM" (page 50)
•
"Managing logs and statistics within the SREM" (page 52)
Several different methods exist to access the SREM software, depending on
the options selected during installation. To open the SREM application on
your local system, use one of the following directions:
•
From the Windows Start menu, select All Programs > Nortel >
Security & Routing Element Manager.
•
From the desktop, click the SREM icon (if you installed icons on your
workstation during the installation process).
•
Using Windows Explorer, locate the SREM installation folder and run
the Security & Routing Element Manager.exe file. The default folder
location for this file is: C:\Program Files\Nortel\SREM\Nortel Secure
Network Access.
Quitting SREM
Use the following procedure to quit the SREM application on your local
system.
StepAction
1
Apply and commit any unsaved changes. (See "Applying and
saving individual changes" (page 50) "Applying and saving individual
changes" (page 50) for details.)
2
Select File > Exit.
A confirmation dialog box appears.
3Click Yes to quit the SREM application.
Viewing SREM online help
The help system contains procedures for configuring and monitoring a
network access device through SREM and context sensitive descriptions
for each screen and window.
To open the SREM online help system, do one of the following:
The online help content appears in a new web browser instance (Figure 18
"SREM online help" (page 39)). If the SREM screen that is active when
online help is opened has context sensitive help available, then the content
displayed will related to that screen.
To view available online help content use either the navigation tree on the
left side of the web browser or the toolbar icons described in the following
table Table 13 "Online help icons" (page 39).
This icon is only available when viewing context
sensitive help where the navigation tree is not
already visible.
NN47230-301 02.01 Standard
1.6.1 16 July 2007
Page 40
40 Chapter 3 Using SREM
IconNameDescription
Show in ContentsShow the displayed page in the navigation tree.
PreviousDisplay the previous page of online help content.
NextDisplay the next page of online help content.
PrintPrint the currently displayed help content page.
Configuring SREM settings
Use the following procedure to change general configuration settings for
SREM.
This icon is only available when the navigation
tree is already visible.
Using this icon will print only the content displayed
in the actual help screen. Toolbar icons and the
navigation tree are not printed.
StepAction
1
2
Open SREM.
Select Tools > Options to open the Options dialog box (Figure 19
Change the desired settings, as described in the following table
Table 14 "SREM Options" (page 41).
Table 14
SREM Options
Option
Application Look
and Feel
Beep on ErrorSelect Yes from the list to have SREM beep
Eager Refresh
Mode
Tool Tip from HelpSelect Yes to view tooltip help over certain fields
Show Uncomm
itted Changes
Warning
Description
Allows you to configure how the application looks.
Configuration changes to the Application Look
and Feel setting take effect only after you restart
SREM.
when an error is made.
Automatically refreshes the Configuration and
Monitoring pane with changes applied to the
device.
and buttons.
Select Yes to have SREM prompt you that
uncommitted changes exist before leaving the
active screen.
Click Yes on the prompt dialog to return to the
screen with changes, or click No to continue
to a new screen without saving the changes.
Selecting the check box before closing the
warning prompt changes this setting to No.
Do Not Save
Passwords
4
Click OK.
Select Yes to force SREM to check passwords
every time.
Important Note: If you select No for this option,
unauthorized users might gain access to the
SREM. Use caution when you change this option.
Enter the connection details for this new device in the applicable
fields. the following table Table 15 "New Device fields" (page 43)
describes the New Device fields.
Table 15
New Device fields
FieldDescription
DeviceSpecifies the IP address for the network access
device you are adding.
User NameSpecifies the user name to connect with the
specified device.
PasswordSpecifies the password to connect with the
specified device.
Device TypeSpecifies the type of network access device to
connect to.
The default value is Secure Network Access
Switch.
Note: This field is not editable for this release.
Cutting, copying, and pasting data between devices
Cut, copy and paste information between devices, such as interface cards,
to save time when you enter data. If you are entering similar data for several
devices, SREM allows you to cut, copy and paste information between
devices.
If moving information between multiple network access devices, SREM
allows you to cut and paste information from one device to another. Copying
is not enabled between devices because you cannot have multiple network
access devices in the Device List with the same configuration data.
StepAction
1
In the Device List, right-click the device with information that you
want to cut or copy.
2
Select Cut or Copy in the right-click menu (Figure 21 "Right-click
menu" (page 45)).
Figure 25
Right-click menu
3
In the Device List, right-click the device heading for the network
access device where you want to paste the copied information.
4
Select Paste As in the right-click menu.
The Paste As dialog box appears (Figure 26 "Paste As dialog box"
Select the slot for the card to which you want to paste the copied
data.
NN47230-301 02.01 Standard
1.6.1 16 July 2007
Page 50
50 Chapter 3 Using SREM
6
Click OK.
Changing field values in the SREM
SREM uses standard Windows components to display and edit information.
The most common components includes editable text boxes, lists to select
from, and checkboxes to select.
Some special actions to be aware of when using SREM include:
•"Selecting and deselecting table items" (page 50) "Selecting and
deselecting table items" (page 50)
•
"Copying, cutting, and pasting values" (page 50) "Copying, cutting, and
pasting values" (page 50)
Selecting and deselecting table items
To select an item from a table in SREM, click on the table row to highlight
that item. To select multiple items in a table, or to deselect a row that is
highlighted, hold the Ctrl key and select the desired table row.
Copying, cutting, and pasting values
Fields that are editable can use the standard copy, cut, and paste short-cut
keys, although these options are not present in the Edit menu.
—End—
•
To copy selected values, press Ctrl-C.
•
To cut selected values (where applicable), press Ctrl-X.
•
To paste existing values into editable fields, press Ctrl-V.
Managing changes within the SREM
There are two ways to save and apply changes made in the SREM:
individually for each screen, or as a group of all unapplied changes made
during the session.
This section covers the following tasks:
•
"Applying and saving individual changes" (page 50)
•
"Applying and saving groups of changes" (page 51)
•
"Applying and saving individual changes" (page 50)
•"Applying and saving groups of changes" (page 51)
Applying and saving individual changes
To apply apply and save individual changes in SREM immediately after they
are made, complete the following process:
Click Apply on the toolbar to send changes to the device.
Changes to the active SREM screen are sent to and stored on the
device, but are not yet made permanent.
2
Click Commit on the toolbar to make all applied changes permanent
on the device.
Changes are now permanent and take full effect. In some cases, you
may need press Rediscover to view updated information in SREM.
—End—
Applying and saving groups of changes
To apply and save many changes in the SREM at one time, update the
values for fields on multiple screens or devices before accessing the
Change Manager to view and apply the changes.
Note: If the Show Uncommited Changes option is enabled, a dialog
box will appear each time you attempt to leave a screen with unapplied
changes. For more information, see "Configuring SREM settings" (page
40) "Configuring SREM settings" (page 40).
Use the following procedure to open and access the Change Manager:
The Statistics Manager icon appears in color if there are any log files
or general statistics being tracked. See "Screen icons" (page 34)
"Screen icons" (page 34) for more information about the Statistics
Manager icon.
Each list entry in the Statistics Manager allows you to complete any
of the following tasks:
•
Click Start to enable Auto Refresh and Logging for the selected
list item.
•
Click Stop to disable Auto Refresh and Logging for the selected
list item.
•Click Remove to disable Auto Refresh and Logging for the
selected list item, and remove that item from the Statistics
Manager.
NN47230-301 02.01 Standard
1.6.1 16 July 2007
Page 54
54 Chapter 3 Using SREM
•
Select Auto Refresh or Logging for any list item to toggle that
setting.
Note: To view additional details about any of the statistics being
tracked, double-click the Statistics Manager list item. SREM
displays the screen where the selected statistic is tracked and
configured.
Using the Log Browser tool
To easily browse log files generated by SREM, a Log Browser tool is
available. To access and use the Log Browser, perform the following steps:
StepAction
—End—
1
Select Tools > Launch Log Browser from the SREM menu.
The Log Browser tool appears (Figure 29 "Log Browser" (page 54)).
Note: When using Log Browser, the Retrieval Criteria and
Details sections can be viewed or hidden by clicking the small
arrows beside the section name. Hide these sections as
necessary to see the entire Log Browser tool on systems with
low screen resolution.
2
Select File > Open > Open NSNAS Log File from the Log Browser
menu.
A dialog box appears, allowing you to specify a log file on the current
system.
3
Select the Nortel SNAS 4050 log file to view.
The Retrieval Criteria list displays Attributes that can be used to
limit log results that are displayed.
4
Check to ensure the Retrieval Criteria section is in Definition View.
The Definition View (shown in the figure below Figure 30 "Retrieval
Criteria — Definition View" (page 55)) allows you to specify attributes
and attribute values to sort and view the log entries.
Publication: NN47230-301
Document status: Standard
Document version: 02.01
Document date: 16 July 2007
To provide feedback or report a problem in this document, go to
Sourced in Canada and the United States of America.
The information in this document is subject to change without notice. Nortel Networks reserves the right to make changes in design
or components as progress in engineering and manufacturing may warrant.
*Nortel, Nortel Networks, the Nortel logo and the Globemark are trademarks of Nortel Networks.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.