Product Description: Esight V300R002C01
Product Description: Esight V300R002C01
Product Description: Esight V300R002C01
V300R002C01
Product Description
Issue 01
Date 2016-04-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://e.huawei.com
Purpose
This document describes the product positioning, architecture, functions, and applications of
eSight and provides configuration requirements and technical counters for eSight.
This document helps you understand eSight functions and basic operations in eSight.
Intended Audience
This document is intended for:
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.
Contents
3 Deployment Mode.....................................................................................................................185
3.1 Standalone Mode........................................................................................................................................................ 186
3.2 Distributed Deployment Mode................................................................................................................................... 186
3.3 Two-Node Cluster Deployment Mode........................................................................................................................188
5 Configuration............................................................................................................................. 196
5.1 Software Configuration Requirements....................................................................................................................... 197
5.2 Hardware Configuration Requirements......................................................................................................................199
5.3 Client Configuration Requirements............................................................................................................................212
5.4 Network Bandwidth Requirements............................................................................................................................ 213
6 Technical Counters....................................................................................................................215
7 Standard and Protocol Compliance....................................................................................... 216
A Glossary......................................................................................................................................217
1.1 Positioning
1.2 Features
1.1 Positioning
The eSight system is a new-generation comprehensive operation and maintenance solution
developed by Huawei for the network infrastructure, unified communications, telepresence
conferencing, video surveillance, and data center in enterprises. eSight supports unified
monitoring and configuration management over devices of various types and from various
vendors, monitors and analyzes network and service quality, and delivers unified management
over and association analysis among enterprise resources, services, and users. Meanwhile,
eSight offers a flexible and open platform for enterprises to customize software development
and build an intelligent management system tailored to individual needs.
1.2 Features
Lightweight and Web-Based Client
The B/S architecture allows you to access eSight anywhere and anytime using a standard web
browser. Only the server software needs to be updated during system upgrade or maintenance,
reducing the costs and workload involved in system maintenance and upgrades, and therefore
lowering customers' total cost of operation (TCO).
The B/S architecture also has the advantages of the distributed feature, you can perform
operations like querying and browsing anywhere anytime.
Southbound Interfaces
eSight supports the SNMP, Telnet/sTelnet, FTP/SFTP/FTPS, TR069, Huawei MML, SMI-S,
Modbus southbound and HTTPS interfaces.
Type Description
SNMP The SNMP interfaces help achieve basic management functions such as
interfaces automatic NE discovery, service configuration data synchronization, fault
management, and performance management.
Telnet/STelnet Telnet and Secure Shell Telnet (STelnet) interfaces are basic NE
interfaces management interfaces used for remote NE login and management.
NOTE
The Telnet protocol transfers communication data in plaintext, which is risky. You
are advised to use it together with other secure protocols such as SSH.
TFTP/FTP/ FTP, SFTP, and FTPS interfaces are used to back up NE data.
SFTP/FTPS NOTE
interfaces FTP is an insecure protocol. SFTP and FTPS are recommended because they are
secure.
SMI-S The eSight supports storage device access and management through
Interface standard SMI-S interface, providing resource monitoring, performance
analysis, and fault monitoring of storage devices.
Modbus The Modbus protocol allows controllers from different vendors to form
Interface industrial networks and support centralized monitoring.
HTTPS eSight obtains host, server CPU, memory, network port rate, and disk
Interface usage information through the HTTPS protocol, to support host and
server management.
eSight Compact 100 rack servers This edition provides only simple management
(server) and 5 frame functions for servers, including device
blade servers management, configuration deployment, and
stateless computing. It neither provides additional
components nor support service expansion.
eSight Standard 5000 NEs This edition manages a wide array of network
devices and supports various service components
that can be selected based on the site
requirements.
To add new functions, develop new function plug-in packages and deploy them in eSight. To
manage new devices, simply add new NE adaptation packages. Function plug-in packages
and NE adaptation packages are deployed in the eSight OSGi container as bundles (plug-ins).
System Reliability
In order to improve system reliability, eSight supports automatic restart when a process
exception occurs, and supports data backup and restore.
l Automatic Restart when Exception
The maintenance tool can monitor eSight processes. When the maintenance tool detects
that these processes are unexpectedly terminated, the maintenance tool automatically
restarts the eSight processes, which keeps the system running properly in unattended
mode and reduces the fault recovery time.
l Data Backup and Restore
The eSight supports automatic and manual data backup and restore. The eSight can
automatically back up data in a preset backup period. Alternatively, users can manually
back up data any time. Users can save the backup data to an external device. The restore
mechanism allows users to restore the system using the latest backup data if the system
breaks down or an upgrade fails.
Security
The eSight provides security mechanisms in terms of system, network, data, and operation
and maintenance.
Network The network security l Routers are deployed to separate local area
security mechanism ensures that networks from external networks, enhancing
the switches, routers, data communication security.
and firewalls are l A network firewall is configured for the eSight,
running properly. ensuring network security.
l Rights accessible to external systems are
controlled and managed.
Scalable Architecture
The eSight provides a scalable architecture to expand the management capacity by adding
servers. This architecture allows old hardware to be used to expand a live network, which
ensures smooth expansion with the existing investment.
Integration Capability
The eSight is based on open buses, open interfaces, and information modeling. It supports
heterogeneous system integration and can be quickly interconnected with a third-party
system. eSight can provide alarm, performance, link, and resource information to upper-layer
operations support systems (OSSs) through northbound interfaces.
NOTE
User Management
eSight provides the following user management functions:
l Creating and deleting users
A newly installed eSight provides only one default user admin who has all operation and
management rights. Other users are directly or indirectly created by the admin user.
Users can be created one by one or in batches
l Querying and modifying user attributes
User attributes include the user name, password, roles, description, and access control.
– To successfully log in to an eSight client and perform maintenance and
management operations, users must obtain a correct user name and password.
– User passwords are stored in the database and encrypted using SHA256, an
irreversible encryption algorithm.
– User passwords can be reset by the administrator or be changed.
NOTE
Users in the Administrators role or with the user management rights can assign MOs and
operations to other users.
Rights- and domain-based management unifies device and function management. Specifically,
MOs are assigned based on devices; operation rights are assigned based on functions on
devices.
User Authentication
The eSight uses three modes to authenticate users: local authentication, Remote
Authentication Dial In User Service (RADIUS) authentication, and Lightweight Directory
Access Protocol (LDAP) authentication.
l Local authentication: User management, authentication, and security policies are all
controlled by the eSight server. The eSight uses this mode by default. For details about
this mode, see the "Local Authentication" section.
l RADIUS authentication: When a user logs in, the eSight verifies and authenticates the
login request through the RADIUS server, finds the role of the user based on the user
group obtained from the RADIUS server, and authorizes the user. For details about this
mode, see the "RADIUS Authentication" section.
l LDAP authentication: When a user logs in, the eSight verifies and authenticates the login
request through the LDAP server, finds the role of the user based on the user group
obtained from the LDAP server, and authorizes the user. LDAP authentication is similar
to RADIUS authentication except that the two modes use different authentication
protocols. For details about this mode, see the "LDAP Authentication" section.
Local Authentication
In the local authentication mode, user security management ensures the security of the eSight
on multiple levels, including the local user management, rights management, password policy,
account policy, login control, and automatic client logout. Password and account policies,
after being configured, take effect on all eSight users.
l Password policy
– Minimum password length (8 characters by default)
– Maximum attempts to enter the password the same as old passwords (3 attempts by
default)
– Maximum number of occurrences of a character in a password (3 times by default)
– Minimum time interval between password change attempts (5 minutes by default)
– At least one special character in a password (not limited by default)
– Password validity period, including the number of days (90 days by default) within
which a password is valid and the time (7 days by default) when the eSight sends a
warning before a password expires
l Account policy
– Minimum length of a user name (6 characters by default)
– Account invalidation: the number of days (60 days by default) within which an
account is inactive
– Account locking: the maximum number of failed login attempts (5 attempts by
default) within a certain period (10 minutes by default) before an account is
automatically locked (for 30 minutes by default)
l Login control
Login control includes time and IP address control.
– Time control specifies the time during which users can log in. Users cannot log in to
the eSight beyond the specified time.
– IP address control specifies the IP addresses that the eSight clients can use to log in
to the eSight server. IP address control prevents those who steal user names and
passwords from logging in to the eSight server and therefore further enhances the
eSight security.
l Automatic client logout
To prevent other users from performing unauthorized operations, the eSight allows users
to set the client to be automatically logged out. If a user does not perform any operations
within a specified period of time, the client is automatically logged out.
RADIUS Authentication
When RADIUS authentication is adopted, the administrator does not need to create a user
account on the eSight in advance. The user account for logging in to the eSight is an existing
account that can pass the authentication of the RADIUS server.
When a user enters the user name and password, the security process of the eSight server
sends the user name and password to the RADIUS server. If the user is authenticated by the
RADIUS server, the security process obtains the user group of the user from the RADIUS
server, finds the matched role on the eSight, and authorizes the user.
NOTE
Before using the RADIUS authentication mode, ensure that the name of the role defined on the eSight is
the same as that defined in the account database of the RADIUS server. In addition, ensure that the
account to be authorized is added to a user group.
LDAP Authentication
As a distributed client/server system protocol, LDAP is used in the VPN and WAN to control
user access to the network and prevent unauthorized users from accessing the networks.
The LDAP authentication mode is similar to the RADIUS authentication mode, but they have
different authentication protocols. The LDAP authentication mode supports the following
features that are not supported by RADIUS authentication:
l Common mode (encryption-free), secure sockets layer (SSL) mode, and transport layer
security (TLS) mode for communication between the eSight and LDAP servers.
l Multiple LDAP authentication servers.
For the LDAP authentication process, see Figure 2-3.
Security Log
Security logs record the security operations that are performed on the eSight client, such as
logging in to the server, changing passwords, creating users, and logging out of the server.
You can query security logs to understand the information about eSight security operations.
System Log
System logs record the events that occur on the eSight. For example, the eSight runs
abnormally, the network is faulty, and the eSight is attacked. System logs help analyze the
operating status of the eSight and rectify faults.
You can query system logs to understand the information about eSight system operations.
Operation Log
Operation logs record the operations that are performed on the eSight, such as adding a
monitoring view and modifying the resource manager.
You can query operation logs to understand the information about user operations.
Adding NEs
l Auto Discovery for NEs:sets the eSight to automatically discover NEs. You can set the
eSight to automatically search for NEs in a specified network segment and adds the
found NEs.
eSight supports SNMP, UC-SNMP, UC-TR069, UC-TCP, ICMP, SMI-S, TLV, and REST
protocols.
l Adding a single NE: This mode applies to the scenario in which you want to add a few
NEs with IP addresses and protocols available.
l Exporting NEs: You can record NE information to an .xls file and export the NEs to the
eSight. This mode improves work efficiency for adding a large number of NEs.
You can view the basic information and protocol information about an NE.
l Adjusts the relationships between NEs and subnets or between subnets.
You can adjust the relationships between NEs and subnets or between subnets if the
network structure changes.
Group Management
Creating a Group
You can create a group and add NEs in different subnets to the group, which is considered as
one object. You can assign the object (a group of NEs) to a user, which achieves NE
assignment in batches.
l Viewing groups
You can learn group details.
l Modifying groups
You can modify groups to meet management requirements.
l Deleting groups
You can delete groups that are not required by the system.
Device Resources
l You can search for device resources based on the network service classification, such as
network devices, storage devices, unified communication devices, hosts and eLTE
devices.
l You can perform service operations for a single device or devices in batches, such as
deleting, setting protocol parameters, synchronizing devices, or moving to another
subnet.
l By default, devices under a single subnet can be managed. With configuration, devices
under multiple subnets can be managed.
l By default, management clients under a single subnet can log in to eSight. With
configuration, management clients under multiple subnets can be log in to eSight.
Alarm Severity
There are four alarm severities: critical, major, minor, and warning, as shown in Table 2-1.
You can take different measures for different severities of alarms.
Alarm Status
l Alarm acknowledgment and clearance.
– Alarm acknowledgment: A user has tracked or handled an alarm.
– Alarm clearance: When the fault triggering an alarm is rectified, the device
recovers. The alarm status changes to cleared.
l Alarm status classification
Alarms can be classified into different status based on whether the alarms are cleared or
acknowledged. Table 2-2 describes the four alarm status.
l Status Change
Table 2-3 describes the alarm status change description.
Clearance status change If the condition that generated the alarm disappears, and
the device becomes normal, the device reports a clear
alarm and the alarm status is changed from uncleared to
cleared.
The following sections describe eSight alarm functions based on the flowchart.
Alarm Synchronization
After generating an alarm, a device reports the alarm to the eSight within less than 10s and the
eSight then displays the alarm in the alarm list. After communication between the eSight and
an NE recovers from an interruption, or the eSight is restarted, some alarms on the NE are not
reported to the eSight. The NE alarms on the eSight are different from the actual alarms on
the NE. In the case, you need to synchronize alarms to ensures that the eSight displays the
current operating status of the NE correctly.
Alarms are synchronized according to the following rules:
l If an alarm is cleared from an NE but remains uncleared on the eSight, the alarm will be
cleared from the eSight.
l If an alarm is present on an NE but absent on the eSight, the alarm will be added to the
eSight.
Alarm Masking
l Users can set alarm masking rules to mask unimportant alarms. Alarm masking rules
include the date, time, alarm source, and alarm name.
l While an NE is being repaired, tested, or deployed, the NE may report a large number of
alarms which can be ignored. In this case, you need to mask these alarms so that the
eSight neither displays nor saves them.
based alarm filter function. Specifically, the eSight allows users to set alarm filter templates
with common filter criteria such as the location, type, and network layer of devices that
generate alarms. The templates facilitate alarm queries.
On the eSight, users can monitor alarms by severity or device.
l By severity: Users can monitor network-wide alarms of each severity. For details, see the
"Alarm Monitoring by Severity" section.
l By device: Users can view alarms of network-wide devices. For example, a user can
view all current alarms of a device or a type of device. For details, see the "Alarm
Monitoring by Device" section.
Alarm panel The alarm panel displays the total number of current alarms of
each severity on an MO. It provides an overall view of system
faults and can serve as the monitoring board.
Alarm sound Users can specify sounds for alarms of different severities. After
an alarm is generated, the sound box on an eSight client plays the
specified sound.
Current-alarm list Users can set filter criteria and enter keywords to search for alarms
that have not been acknowledged or cleared.
Table 2-5 lists the functions on the Current Alarms page, which are marked by numbers in
Figure 2-7.
1 The following global operation buttons in this area take effect on all selected
alarms:
l Lock/Unlock
Users can click Lock or Unlock to specify whether newly generated alarms
are added to the current-alarm list. In the lock state, newly generated alarms
are not added to the current-alarm list; acknowledged and cleared alarms are
not added to the historical-alarm list before the current-alarm list is unlocked.
l Export
Users can click Export to export alarm information, which helps diagnose
faults and back up data.
l Acknowledge
Users can click Acknowledge to acknowledge alarms. Acknowledged alarms
can be ignored by other users.
l Clear
Users can click Clear to manually clear the alarms that cannot be
automatically cleared or do not exist on devices.
l Remark
Users can click Remark to enter information, for example, alarm handling
progress and status.
2 Users can select or set filter criteria to browse desired current alarms.
The eSight provides the following six default filter criteria:
l Alarm alarms
l Unacknowledged critical alarms
l Unacknowledged major alarms
l Uncleared critical alarms
l Uncleared major alarms
l Alarms generated during the past 24 hours.
Users can set desired filter criteria in the Selected area.
4 Users can locate the object that generates an alarm in the topology view.
5 Users can perform other operations on an alarm, for example, setting alarm
masking rules and redefining alarm severities.
Alarm Analysis
By querying and analyzing historical alarms and events and masked alarms, users can learn
the alarm status of a device and improve device performance accordingly. The eSight can
collect alarm statistics based on the statistical conditions that are set by users. The statistical
conditions include the subnet or device, alarm or event name, first generation time, and alarm
severity. Users can use some of these conditions to collect alarm statistics.
Alarm Handling
l Viewing alarm details
Users can click a current, historical, or masked alarm in the alarm list to view the alarm
details in the Alarm Details dialog box. Alarm details include the alarm name, handling
suggestions, and location information.
l Acknowledging and clearing alarms
Figure 2-7 show the buttons for acknowledging and clearing alarms.
l Adding alarm maintenance experience
In the Alarm Details dialog box, users can add alarm maintenance experience for
maintenance personnel to refer to when they handle the same alarm in the future.
By default, the eSight offers the following global collection tasks to collect performance data
about network-wide devices:
On the page where performance counter data is displayed, you can also view historical
performance data and check statistical diagrams about historical data.
Users can modify indicators on the historical data page. Users can drag the time slider to
change the time range of the curve in the chart. Users can also change the page layout and set
the quantity of columns (1, 2, or 3) to be displayed on the page.
Users can save indicator and layout configurations to the favorites folder, from which users
can directly display historical curves of specific indicators without entering the overview
page.
My Favorites
You can organize and manage your concerned data through the My Favorites function.
Overview data, historical performance data, and real-time performance data can be saved to
my favorites.
Term Description
Subnet Smaller networks divided from a large network based on the region or device type
to simplify network management.
l Delete a subnet
You can delete a subnet that does not need to be managed by the eSight.
Portlet Management
Portlets are views that display devices and network-wide device status in lists, curves, and bar
charts. Portlets are displayed in areas of a home page.
l Creating a user-defined portlet
You can integrate third-party interfaces to the eSight home page to monitor them.
l Displaying and hiding a portlet
You can display only the portlets that you concern on a home page and hide those that
you do not concern.
l Manually updating portlet data or setting the period for updating portlet data
You can update monitoring data in real time.
l Zooming in on and zooming out of a portlet
You can zoom in on and out of a portlet as required.
screens and the high resolution meet user requirements and facilitate centralized monitoring,
presentation, and reporting.
l The screen layout (number of horizontal screens x number of vertical screens, for
example, 2 x 2) can be set.
l The resolution (horizontal pixel x vertical pixel, for example, 1680 x 1050) of each
screen can be set.
l Big screen monitoring views can be created.
l Monitoring views can be displayed in a big screen.
Administrator names vary with databases. The administrators for different databases are as
follows:
root: MySQL database administrator
sa: SQL Server database administrator
system: Oracle database administrator
– Changes the password of a NMS database user commonuser.
The maintenance tool can record a maximum of 20000 operation logs. When there are more than
20000 operation logs, the maintenance tool automatically deletes the earliest 1000 logs.
Obtaining an ESN
You can obtain an ESN from the eSight client. The ESN is required when you apply for a new
license.
Revoking a License
When the ESN changes or the network is adjusted, you can revoke the current license and use
the generated invalidity code to apply for a new license.
NOTE
Only the user with the Revoke License permission can revoke the current license.
A trial license cannot be revoked.
NOTE
Only the users with the Update License permission can import license files.
installed through a single mouse click. The Veritas software and Oracle database can be
installed jointly.
Functions
l View
– Basic Information: provides an overview of NE management, including basic
information about an NE, KPIs, top N alarms, and interface traffic.
– Device Panel: displays an NE in graphics.
– Alarm List: displays an NE's active alarms.
– Performance Status: displays an NE's performance counters.
l Device Configure
– WEB NMS: displays the web management page provided by an NE.
– Service Configuration: uses an intelligent configuration tool to configure an NE.
– Interface Manager: lists an NE's interfaces and allows you to enable or disable an
interface and suppress or allow an alarm.
– IP Addresses: lists an NE's IP addresses.
– Configuration Files: allows you to view and back up an NE's configuration files.
l Protocol Parameters
– Telnet Parameters: allows you to modify an NE's Telnet parameters.
– SNMP Parameters: allows you to modify an NE's SNMP parameters.
– NetConf Parameters: allows you to modify an NE's NetConf parameters.
Interface status polling: Queries device interface status at regular intervals and perceives the
status change of device interfaces, independent of device Trap to report interface status
change that trigger alarms. The device and link status on the topology management and IP
topology management pages are updated based on alarms.
IP address polling: Queries device interface IP addresses at regular intervals, perceives the
interface IP address change, refreshes the IP topology, and generates IP address change
identifiers.
Device status polling: Queries the online and offline status of devices through ICMP Ping,
perceives the device status change, generates alarms when devices go offline abnormally, and
refreshes devices on the topology management and IP topology management pages.
Electronic Labels
You can search for and export electronic labels of devices.
NOTE
Electronic labels are used to identify devices. They are used in network design, planning, and
maintenance, asset management (including spare part management), order, account management,
settlement, investment tracing, and warranty.
You can also manage configuration changes. eSight automatically compares the differences
between backup and original configuration files to obtain configuration changes and notifies
you of the changes by email.
l Configuration file
You can back up the configuration file of a specified device, configure a configuration
file as a baseline version, use the backup configuration file to replace the existing
configuration, and view the configuration on a device.
Configuration files that have been backed up to a local disk can be viewed online.
You can view, compare, and delete configuration files that are backed up on a local computer.
The file comparison function allows you to compare configuration files backed up on the
eSight server.
l Configuration change
After a configuration file is backed up, eSight automatically compares the differences
between backup and original configuration files to obtain configuration changes. You can
check the detailed configuration changes, including adds, deletes, and modifies.
NE Type Customization
When a non-predefined device type is added to eSight, the device type is shown as unknown.
eSight allows you to view only basic information about unknown devices. Management
capabilities, for example, alarm functions, are not provided. You must customize the device
type so that eSight can display the device information and monitor alarms and performance
counters of the device.
When you delete a user-defined alarm's parameters, eSight does not delete the alarm's
historical information. eSight's alarm module, however, no longer parses or displays the
alarm.
eSight allows you to modify the alarm severity, event type, alarm cause, handling method,
details, and fault locating parameters.
l Alarm Severity: severity of an alarm. There are four alarm severities: warning, minor,
major, and critical. They are the same as those defined in the alarm module.
l Notification Type: alarm category. There are three alarm categories: clear alarm, fault
alarm, and event.
l Event type: alarm type. The following alarms are available: communications alarm,
equipment alarm, processing error alarm, QoS alarm, environmental alarm, integrity
alarm, operational alarm, physical resource alarm, and security alarm.
l SNMP Version: SNMP version supported by a device. eSight supports SNMPv1 and
SNMP v2c/v3.
l Generic, Specific, and Enterprise ID: key parameters for locating an SNMP v1 alarm.
l Alarm OID: identifier of an SNMP v2c/v3 alarm, which is the same as the trap OID in
an alarm packet.
l Alarm Cause: possible cause of an alarm.
l Clearance Suggestion: method of clearing an alarm.
l Details: indicates alarm details.
l New Parameter: parameter for locating the fault that causes an alarm.
NE Panel Customization
By default, eSight displays default NE panels for user-defined devices. You can upload a
device photo or high-fidelity picture to customize the NE panel. An NE panel includes
information about the frame, board, subcard, and ports. After customization, the device photo
or high-fidelity picture is displayed when you open the NE panel.
Telnet Customization
With Telnet customization, you can customize Telnet parameters for different device types.
Telnet parameters include basic Telnet information and privilege mode information. Basic
Telnet information include prompts for the login user name and password, login failure, and
command delivery; exit commands; and remarks. Privilege mode information include
privilege commands, privilege password prompts, More prompts, output control commands,
interactive selection prompts, interactive selection commands, failure prompts, and failure
troubleshooting.
After Telnet parameters are customized, you can test the Telnet connectivity to devices. The
system can read customized Telnet parameters to manage and back up configuration files,
deliver configuration commands through the smart configuration tool, and configure and
parse services.
Whitelist
You can configure a whitelist that contains authorized IP addresses and MAC addresses.
When the configuration takes effect, eSight checks whether a discovered terminal is
authorized. If not, eSight records its details for you to acknowledge the unauthorized terminal.
l Check for the ports connecting to multiple MAC addresses to detect devices accessing
eSight with the same port.
l Check for duplicate MAC addresses to detect MAC address theft.
l Check for duplicate IP addresses to detect IP address theft.
Unauthorized Access
eSight detects unauthorized terminal access based on the IP and MAC address whitelists
configured. With unauthorized access management, you can:
l View unauthorized access logs and unauthorized terminal details.
l Export unauthorized terminal details.
l Acknowledge unauthorized terminals.
Remote Notification
You can configure eSight to send an email notification upon detecting unauthorized terminal
access.
Link Discovery
Currently, eSight supports automatic link discovery based on the MAC forwarding table and
interface IP address using the LLDP protocol, and allows users to manually adjust links.
Display Rule
On the display rule page, you can select fields required for link name rules and tips rules. Tips
are displayed for links in the topology.
Link Deletion
The link deletion function applies to the following scenarios:
l Users want to hide a link in the physical topology and prevent it from being displayed
during automatic and manual discovery.
l An incorrect link exists in the topology and needs to be hidden.
Users can delete a link from the physical topology and link management page. Users can also
restore deleted links on the page for viewing deleted links.
Term Description
Layer-2 Network device running on the data link layer of an Open System
device Interconnection/Reference Model (OSI/RM) network.
Topology View
l The IP topology management page offers a tree structure on the left and a topology pane
on the right. Topology objects are organized hierarchically by subnet.
l eSight allows you to zoom in or zoom out in a topology view. Meanwhile, an aerial view
is provided for you to understand the entire topology structure.
l You can view the alarm status of devices and links. Detailed device or link information is
displayed in a tip when you bring focus to the device or link.
A template is used to configure the same services for multiple NEs in batches. A planning
table is used to configure similar services for multiple NEs in batches. You can receive task
execution results by email for periodical delivery tasks.
Task Monitoring
The task monitoring submodule manages all device upgrade tasks and refreshes the upgrade
task in real time.
l The current version supports software upgrade of fit APs and displays the main menu
and authentication processing when the WLAN service component is installed.
l Users can upgrade one or more fit APs. If selected fit APs are of the same type and
belong to the same AC, only one task is created, improving efficiency and reducing the
load of Telnet connection channels.
l The status of upgrade tasks is refreshed in real time. Users can re-execute failed tasks.
Wizard-based Upgrade
The wizard-based upgrade allows users to create upgrade tasks following a wizard.
l The three-step wizard allows users to create upgrade tasks and check task summary
information.
l Users can continue to create upgrade tasks or go to the task monitoring page to check
task execution information.
l At the step for selecting an upgrade version, a link for creating a version is added,
increasing the ease of operations.
Version Management
The version management submodule allows users to manage device software mapping files
by device type.
MIB Compiling
You can compile a MIB file and store the compiled file to a specified directory.
MIB Loading
You can upload, compile, load, unload, and delete MIB nodes, and create directories for MIB
nodes.
MIB Operation
After you enter device IP addresses in IP address text boxes, you can use the MIB tool to
perform Get/GetNext/Walk/TableView operations over SNMP-compliant devices.You can
click Stop to stop data acquisition.
Service Management
The WLAN Manager supports wizard-based service configuration. Based on AP planning
sheets, the WLAN Manager delivers and deploys AP services end to end, which improves the
deployment efficiency (approximately 90% compared to manual deployment).
Configuration Management
An AC controls and manages APs on WLAN. With AC management, you can connect an AP
to WLAN in any of the following modes: confirm AP identities, add an AP in offline mode,
and add an AP to the whitelist.
l AC information
On the AC management page, you can set the source port, AP authentication mode,
country code and forwarding type.
l AP
An AP functions as a bridge to convert frames transmitted between wireless terminals
and a LAN. On eSight, you can configure basic AP information, manage radios, and bind
an extended service set (ESS) profile to a radio when creating an AP. You can also
import APs in batches from a predefined table and bind profiles to APs in batches. eSight
allows you to reboot APs, recover APs and replace APs.
l AP whitelist
You can configure a whitelist to allow authorized APs to go online. The AP whitelist
contains the MAC address and serial numbers of authorized APs. When the AC uses a
MAC address or an SN for authentication and automatically discovers that the MAC
address or SN of an AP is in the whitelist, the AP automatically goes online.
l Unauthorized AP
The Unauthorized AP page displays APs whose MAC addresses or SNs are not in the
whitelist. On this page, you can acknowledge unauthorized APs in batches to add them
to the whitelist. Then, APs in the whitelist are brought online.
l AP region
APs are added to different regions to reduce the time spent in adjusting AP parameters
and the impact of AP parameter adjustment on user access. Each AP region has a name,
a deployment mode, an alias, and a default region, and eSight allows you to tune radio
frequency (RF) of APs.
l AP blacklist
Network administrators can add MAC addresses of APs to an AP blacklist, preventing
unauthorized APs from going online.
l User blacklists
Network administrators can add MAC addresses of wireless users to a user blacklist,
preventing unauthorized users from connecting to APs. Network administrators can also
blacklist unauthorized users and configure the AP countermeasure mode to user
blacklist. The system performs countermeasure against devices from the user blacklist.
l SSID whitelist
Network administrators can configure SSID whitelists to detect unauthorized devices in
a more accurate and efficient manner. SSIDs that exist in surrounding environments but
have no impact on the wireless network quality are added to the whitelist and will not be
recognized as unauthorized devices.
The profile management function allows you to configure NE predefined profiles.
l AP profile
You can specify the maximum transmission unit of the AP Ethernet port and configure
log backup.
l Radio profile
The radio profile is used to specify parameters such as the radio type, rate, power, and
whether to occupy a channel during wireless transmission.
l ESS profile
The ESS profile is a set of service parameters, such as SSID, Service VLAN,
DataTraffer ESSIf, Access Max User, and WLAN User Access Security Manager.
After an ESS profile is bound to a specified radio on an AP, the service parameters are
applied to a virtual access point (VAP), a wireless service functional entity.
Network Monitoring
This function allows you to view information such as all physical resources, unauthorized
APs, resource statistics, and performance counters.
l Physical resources
AC: AC status, name, type, IP address, AP authentication mode, forwarding type, and
country code
AP: AP status, name, type, SN, MAC address, IP address, AC name, home region,
location, bound radio profile, and bound ESS profile
Client: user's MAC address, IP address, user name, AC name, AP name, radio ID, and
service set identifier (SSID)
SSID: AC name, ESS profile, number of fit APs, number of VAPs, and number of clients
User access history: user name, MAC address, access AP, access AC, access result, and
detailed access result
Region: region name, total number of APs, total number of online APs, and total number
of clients.
l Resource statistics
Network overview: line chart for online users, top SSID user statistics and AP resource
statistics.
l Performance statistics
Terminals associated with APs, AP physical resources, AP traffic, radio traffic, and real-
time client traffic performance statistics
l Client access history query
eSight periodically parses logs to extract the login information and saves the log
information into the database in batches, allowing users to view historical data about user
access.
l Spectrum Analysis
After the AP radio spectrum function is enabled on devices, users can view the signal
interference information around APs in eSight. Users can judge the channel quality and
surrounding interference sources on spectrum charts. Spectrum charts include real-time,
depth, channel quality, channel quality trend, and device percentage charts.
1. View the hotspot location and radio signal coverage in the location topology and mark
conflict regions.
2. Pre-deploy APs, view the simulated radio coverage, and review the actual radio coverage
after APs get online.
3. Map settings: Hide and display nodes in regions by filter criteria. Filter criteria include
unauthorized AP, unauthorized user, unauthorized Ad Hoc, unauthorized bridge, and
interferer. Unauthorized APs can be displayed based on finer-grained rules.
4. If the location AP license is applied and location is enabled in a region, the locations of
users, unauthorized APs, and interference are refreshed in the topology at regular
intervals.
WIDS Management
With Wireless Intrusion Detection Systems (WIDS) management, eSight monitors and
recognizes unauthorized devices, clients, interference, and attacks based on user-defined
rules, sends remote alarm notifications, and offers protection measures.
1. Support the statistics, display, and countermeasure of unauthorized devices.
2. Support the display, countermeasure, and suppression access protection of unauthorized
devices.
3. Support the statistics and display of unauthorized Wi-Fi interference.
4. Support the statistics, display, and countermeasure of attacks.
5. Classify unauthorized APs into: rogue, suspected-rogue, adjacent, suspected-adjacent,
and interferer. Supported rules include adjacent or same frequency interference, signal
strength, SSID (fuzzy or regular expression), number of detected APs, and attack.
Fault Diagnosis
1. WLAN user fault diagnosis: Diagnoses network quality for online users in terms of
users, SSIDs, APs, and ACs. If detecting any exception, the system displays potential
problems and gives suggestions for users to rectify the exception.
Report Management
eSight provides predefined reports for AP uplink interface traffic, channel usage, online radio
users, online wireless users, Top N user access failures, and Top N user login counts and
provides fast reports and predefined reports for AP association statistics, AP traffic statistics,
and AP rate statistics.
You can immediately or periodically start energy saving tasks, or disable wireless signals.
Service Deployment
eSight offers graphical, wizard-based, and end-to-end service deployment capabilities and
helps you easily and quickly deploy new VPN services, add VPN access points, and adjust
existing VPN services, improving service maintenance efficiency. eSight allows you to deploy
services in the Full-mesh, Hub-Sopke, MCE, and customized networking types, and deploy
OSPF, ISIS, static, and EBGP routing protocols between PEs and CEs.
Automatic Discovery
eSight discovers MPLS VPN services automatically in the following network schemes: Full-
Mesh, Hub-Spoke, Multi-VPN-Instance CE (MCE), HoVPN, inter-AS Option A, and inter-
AS Option B. Figure 3 shows the page for discovering MPLS VPNs automatically.
Quick Diagnosis
eSight offers one-click fault diagnosis to diagnose faults by segment (PE-PE, PE-CE, CE-CE,
and PE-remote CE) and layer (L3 routing and MPLS forwarding layer) using multiple
approaches (ping, trace, and routing collection). eSight provides the causes to faults after
diagnosis, allowing you to quickly locate faults.
Service Report
eSight offers statistical reports on interface traffic, VRF traffic, and VRF routing. Interface
traffic reports allow you to learn about the historical interface data about each VPN service.
VRF traffic reports allow you to learn about the distribution of VPN traffic on each PE. VRF
routing reports allow you to learn about the routing change information about CE access of a
VPN service. In terms of traffic and routing, the preceding three reports offer data reference
for you to perform some operations, such as capacity expansion.
Automatic Discovery
eSight automatically discovers MPLS tunnels on the network, including MPLS TE and LDP
tunnels.
Tunnel Monitoring
eSight supports active-standby and bypass protection for MPLS TE dynamic tunnels and
monitors Static-CR signaling-based static tunnels. The following tunnel information is
monitored: tunnel backup status, running status, and tunnel alarms.
eSight supports interaction between MPLS tunnels and L3VPN services and allows you to
check VPN services carried on MPLS TE tunnels.
Tunnel Topology
eSight manages and monitors MPLS tunnels through tunnel topology and allows you to check
the following:
l MPLS capabilities of MPLS TE tunnels and interfaces, DS-TE information, and link
bandwidth.
l MPLS capabilities of MPLS LDP virtual tunnels and interfaces.
Quick Diagnosis
eSight provides MPLS Tunnel quick diagnosis function, eSight can diagnose route
forwarding, label forward, and tunnel configuration at tunnel nodes. If a fault occurs, eSight
can diagnose and locate tunnel faults and give detailed diagnosis results. as shown in Figure
MPLS Tunnel quick diagnosis
Dashboard
The SLA dashboard globally monitors SLA tasks and displays the recent smart policy tasks,
SLA test instance indicators, and minimum SLA compliance. You can add and delete
dashboards and filter SLA tasks on the dashboard.
Quick Diagnosis
Quick diagnosis supports the function of checking the SLA service quality without creating
any task.
Historical Data
Historical service quality data such as the overall compliance and the data of a single counter
is displayed in graphs.
Figure 2-56 Page for viewing the historical data of multiple tasks
SLA Reports
You can export and print the SLA Service Quality Report, SLA Task Counter Reports, and
TopN SLA Compliance Report.
Service Diagnosis
With service diagnosis, eSight detects network quality and displays collected data (such as the
delay, jitter, packet loss rate, and DSCP value) by segment, helping you to assess service
quality. eSight locates the network where a quality problem occurs based on statistical data,
helping users rectify faults and ensuring service smoothness.
Template Management
eSight offers default network service quality assessment standards. You can also customize
standard templates based on your site requirements.
(1) Telepresence diagnosis configuration template used to assess the network quality of
telepresence systems.
(2) Desktop cloud diagnosis configuration template used to assess the network quality of
desktop cloud systems.
Service Diagnosis
eSight diagnoses the network service quality and allows users to efficiently locate network
faults and assess network quality. Before performing service diagnosis, select the
corresponding template.
To perform telepresence diagnosis, select a telepresence diagnosis template.
Diagnosis results are displayed by segment. Each record in the table indicates network
conditions between source and destination devices.
Dashboard
The QoS dashboard displays the top 5 or 10 tasks with the highest QoS performance counters,
which helps you find regions with excessively high traffic.
QoS Configuration
Viewing QoS configuration of the devices.
Historical Data
Historical QoS traffic data shows the change of QoS traffic.
Configuration Management
eSight NTA allows users to configure devices, interfaces, protocols, applications, DSCPs, IP
groups, application groups, interface groups, and DSCP groups.
l Collector configuration
Allows users to view the IP address and status of the current collector and set the TopN
count for interface session collection (Top30 by default). After the traffic forensics
function is enabled, the original flow files of the collector are uploaded to the analyzer.
l Device configuration
Displays all devices that report traffic. Users can monitor specific devices.
l Interface configuration
Displays network-wide interfaces with network traffic. Users can configure the interface
incoming traffic rate, outgoing traffic rate, and sampling rate to ensure network traffic
data correctness. The sampling rate on eSight and devices must be set to the same value
to show the actual network traffic.
l Protocol configuration
Allows users to monitor specific protocols.
l Network application:
Lists 543 frequently-used network applications and classifies them into Layer 4, Layer 7,
protocol, and user-defined applications. Users can define important applications.
– Layer 4 application: A network application identified by one or more groups of
fixed network protocols and communication ports.
– Layer 7 application: A network application with random ports and identified by the
packets at the application layer.
– Protocol application: A network application identified by protocols rather than
ports.
– User-defined application: A network application that is added by users and can be
defined in terms of the protocol (UDP/TCP), port range, and IP address range.
l DSCP configuration
Lists 64 frequently-used DSCPs and allows users to rename DSCPs.
l IP group configuration
Groups IP addresses that have certain common attributes, which helps users to view
traffic information about IP address groups.
l Application group configuration
Groups user-concerned applications and helps users to view traffic information about
application groups.
l DSCP group configuration
Groups DSCPs and helps users to view traffic information about DSCP groups.
l Interface group configuration
Groups related interfaces and helps users to view traffic information about interface
groups.
l Alarm configuration
Specifies the thresholds for triggering alarms for certain applications, hosts, and DSCP
rates and the conditions for clearing the alarms.
Traffic Dashboard
NTA provides the traffic dashboards function and displays the real-time entire-network traffic.
l The dashboard offers rankings about the interface traffic, interface utilization, device
traffic, application traffic, host traffic, DSCP traffic, and session traffic.
l You can customize the display format and content. The following operations are
available: Tool tips, links, switching between figures and tables, maximize, and
minimize.
Traffic Analysis
eSight NTA offers drill-down network traffic analysis capabilities. Users can view more
details about traffic step by step. eSight NTA allows users to view details traffic information
about devices, interfaces, applications, DSCPs, hosts, sessions, interface groups, IP groups,
and application groups.
Users can view network-wide traffic information. The following figure takes example of
application traffic analysis.
Users can view drill-down data. The following figure takes example of interface traffic
analysis.
l Supports multiple modes to display the traffic data: Pie, Chart, Table, Line, Graph, and
Region.
l Supports multiple summary types: Application summary, Session summary, DSCP
summary, Source host summary, Destination host summary, and Interface summary.
l Supports multiple filtering conditions: by source address, by destination address, by
application, and by DSCP.
l The report system can generate instant reports and periodical reports.
– Instant report
After you perform a task manually, the instant report statistics is displayed. After
the task is performed successfully, the status is displayed on the page. You can open
the report to view detailed traffic statistics.
– Periodical report
After the system performs a task at an interval specified by the user, traffic statistics
of this specified period is displayed.
l Supports batch report export.
l Sends reports by email.
Traffic Forensics
When detecting abnormal traffic in the network, the system allows users to obtain original
traffic data which helps users to locate the network fault.
The system displays traffic forensics results by seven key fields. For example, users can check
whether viruses exist by comparing protocols, ports, and packet rates, and check whether
protocol attack threats exist by TCP flags.
Traffic Alarm
You can create threshold alarms for seven traffic types, including the application, server, and
session. When the traffic has reached the threshold for specified times within a specified time
segment, an alarm is automatically generated. When the traffic meets alarm clearance
conditions within a specified time segment, the alarm is automatically cleared. eSight can
notify you of alarm generation or clearance by email.
You can manage (create, copy to create, delete, enable, and disable) threshold alarms on the
traffic threshold alarm configuration page. You can choose the objects to monitor, and set the
alarm severity, threshold, and repetition times based on the historical traffic data.
You can check traffic alarms on the current alarm page, and go to the traffic analysis page to
view traffic details within the time segment when alarms are generated.
l You can search for VLAN resources by criteria, such as VLAN ID and VLANIF
interface existence.
l You can create VLANs in batches and deliver created VLANs to selected devices.
l You can delete VLANs. If the ID of the VLAN is the PVID of a port, the PVID of this
port will be restored to 1 after the VLAN is deleted.
l You can search for VLAN devices by subnet, device type, device name, and device IP
address.
l You can configure port VLANs and deliver the configurations to selected ports.
l You can go to the device management page to manage the VLAN of a single device.
VLAN Topology
eSight offers a unified topology view of network-wide VLAN devices and links.
l You can check the device interface types and VLAN details about the two sides of a link,
and check VLAN packets that are allowed to pass on the link.
l You can search for devices and links by VLAN ID, and check devices and links that
allow the pass of a VLAN.
l You can directly add a device to or remove a device from a VLAN.
l You can create VLANs on and delete VLANs from a single device.
l When you delete a VLAN: If the ID of the VLAN is the PVID of a port, the PVID of this
port will be restored to 1 after the VLAN is deleted.
l You can bulk modify VLAN parameters for multiple ports under a device.
l You can create VLANIF on and delete VLANIF from a single device.
l You can manage voice VLANs on a single device and set communication parameters for
voice VLANs on the device. the parameters include the lifecycle, protocol priority
(802.1P/DSCP), source MAC address and mask for voice streams, and port used to
receive voice streams.
Device-level Measurement
iPCA-capable devices are deployed on the enterprise campus network. iPCA can be
performed on these devices and Layer 2 direct links between the devices. eSight provides a
network topology to show whether unicast IP packets are lost in this area in real time. If
packet loss occurs, eSight can show the device where packets are lost, the packet loss ratio,
and the number of lost packets. eSight provides the following iPCA functions:
1. Displays the latest packet loss measurement result of the devices and links in the
topology view.
2. Reports an alarm when the device or link packet loss measurement result exceeds the
preset threshold.
Network-level Measurement
The branch networks of an enterprise are connected through a carrier's network. The egress
device of each branch functions as a CE to connect to the carrier's network. The enterprise
needs to evaluate service quality on the carrier's network. When service quality degrades, the
enterprise network administrator needs to check whether the problem is caused by the carrier's
network. iPCA network-level monitoring is deployed on the egress devices of the campus
network to monitor service quality of the carrier's network.
2. If packet loss occurs between the Telepresence server and terminal, check which node or
link has lost the packets.
3. Check the packet loss measurement results of devices on the service forwarding path to
quickly locate the faulty node.
eSight SVF management manages the SVF capabilities of agile switches and CE switches to
implement device monitoring, user management, and service deployment on SVF networks.
An SVF network is displayed as one device in the topology and panel, which facilitates
centralized management of device running information and alarms on the entire network. The
information includes the running status of parent and client devices and connection status of
links between SVF members.
On an SVF network with agile switches deployed, eSight can also monitor the running status
of APs in a centralized manner.
eSight SVF management allows administrators to create, modify, and delete SVF service
templates.
l Service Deployment
eSight SVF management allows administrators to create different configuration matrices for
different configuration scenarios. Administrators can deploy, undeploy, and modify services
in the configuration matrices.
In the configuration matrices, administrators can apply created templates to port groups or
device groups by service configuration scenario to quickly deploy SVF services.
l ONU port communication status monitoring: Monitor ONU Ethernet port status to
indirectly monitor the communication status of terminals mounted to the ONU.
l ONU monitoring: ONU faults are primarily power off and board faults.
Monitor ONU running status (the port running status): online, power off, short fiber,
offline. Board faults will be reflected on the port.
l Line monitoring:
Line faults are frequently-used GPON faults, including fiber cut and optical module
fault.
– Monitor the operating environment of an optical module: power voltage, current,
and temperature, and the power of an optical module
– Monitor line quality: LOFI alarm quantity, number of blocks uncorrected by the
upstream FEC, number of BIP error frames, frame loss rate, and bit error rate
– Monitor the OLT UNI port status.
l OLT monitoring: The OLT is placed in the customer's equipment room and has relatively
few faults, primarily board faults. These faults can be monitored through the port status.
l OLT upstream port monitoring: Links between the OLT and switches monitor the link
traffic, for example, high bandwidth usage or packet loss arising from capacity
expansion.
Overview
eSight displays PON-related overview in graphics. The current version displays ONU status
statistics in a pie chart.
ONU Topology
Users can click the PON port of the OLT to display connection relationships under the PON
port. This feature intuitively displays OLT ports and ONU status (online, offline, and alarm)
to users.
PON Portal
eSight allows users to customize the PON service portal and intuitively displays performance
indicators for users to learn about the running status of PON services. Indicators include:
TopN OLT Ethernet port receive/transmit bandwidth usage, TopN OLT Ethernet port receive/
transmit packet loss, total number of OLTs and resource status quantity, total number of
ONUs and resource status quantity, and TopN LOFI alarms.
Signaling Tracing
Signaling tracing is used to trace and monitor the protocol messages, connection of port
signaling links, and service flows dynamically and in real time. With signaling tracing, users
can know the signaling cooperation, facilitating fault location.
Trunk Tracing
With trunk tracing, users can learn about trunk information in real time.
Automatic NE Connection
With this function, eSight automatically creates NE connections in the topology.
Overview
The IPSec VPN overview provides you visibility into overall IPSec VPN services, including
the number of IPSec tunnels, received and sent packet rates, traffic rates, and packet loss
ratios of an IPSec tunnel or all IPSec tunnels, number of remote access users in an IPSec
tunnel, and service alarm list, as shown in Figure 1 IPSec VPN overview.
Discovering Services
Huawei eSight automatically discovers IPSec VPN services of some or all devices on the
Hub-Spoke and Site-to-Site networks. During discovery, services are grouped by
network. Figure 2 IPSec VPN service discovery shows service discovery.
service link names in the topology. Figure 7 IPSec VPN service name modification
shows service name modification.
l Viewing topology
In a service list, you can click the topology link of a service to view the IPSec VPN
topology.
l Viewing alarms
If the alarm status of a service is abnormal, you can click the alarm link to view the
alarm information about devices at both tunnel ends.
Service Topology
The service topology provides you visibility into IPSec VPN services. The display of an
IPSec VPN service topology supports the following scenarios:
l Hub-Spoke or Site-to-Site networking
l Interworking services
l Hot standby and active/standby switchover
The service topology displays global device parameters and provides links to different
information, such as service discovery, alarm lists, service lists, service diagnosis, real-time
performance, and device management.
The service topology provides complete tooltip information. Each device node, service link,
subnet, or backup link has its tooltip information, including the basic information and latest
performance data.
The service topology supports device management by subnet. Subnet management includes
importing physical subnets, creating, modifying, or deleting subnets, moving devices to other
subnets, and adding devices to subnets.
Figure 10 IPSec VPN service topology shows service topology.
Monitoring Alarms
The alarm status in a service or service group list shows the generation and rectification of a
service fault. The service link in the topology displays the alarms of different severities in
different colors. After identifying a service fault, you can access the alarm list to view detailed
alarm information and locate the fault.
Monitoring Performance
The global and IPSec VPN performance monitoring functions provide you visibility into
traffic of network devices and services, including the packet rate, traffic rate, packet loss ratio,
number of tunnels, and number of remote access users. Figure 11 IPSec VPN service
performance monitoring shows real-time performance monitoring.
Service diagnosis covers the interface status at both tunnel ends, whether IPSec policies are
applied to an interface, integrity of IPSec policy configuration, IKE negotiation result, and
IPSec negotiation result.
Basic Configuration
l Security policy authorization management
You can query the devices that the Secure Center is authorized to manage through
licenses.
The Secure Center can check whether the security policies configured on the eSight are
risky. If you select to synchronize firewall data before executing the analysis task, the
Secure Center can analyze the risks of security policies configured on the firewalls.
Using a risk analysis algorithm and based on the specified risk analysis rules, the Secure
Center determines a device with high, medium, or low risks. In addition to default user-
defined risk rules, you can create user-defined risk rules. The Secure Center can analyze
the policy risks of up to 20 devices each time. The analysis result is displayed using a
grouping histogram to show top 5 devices and the number of high-risk, medium-risk, and
low-risk policies and using tables to show the number of high-risk, medium-risk, and
low-risk policies of all selected devices.
The Secure Center provides a default IPS policy template and supports user-defined
signatures.
l Policy query
You can query policy deployment status and policy context (interzone policy priorities) on the
Security Policy page. Top policies are matched first.
l Policy deployment
The Secure Center supports centralized and batch policy deployment. After centralized policy
configuration is complete, you can select physical or virtual firewalls and click Deploy to
deliver security policies in batches, greatly reducing O&M workload.
l Policy discovery
The Secure Center supports centralized and batch policy discovery. You can synchronize
policies configured on managed devices to the eSight.
l Policy removal
The Secure Center supports centralized and batch policy removal. When the network is
reconstructed or migrated, you can remove unneeded policies by one-click to secure
enterprise information.
The Secure Center provides a default IPS policy template and supports user-defined
signatures.
You can query policy deployment status and policy context (interzone policy priorities) on the
Security Policy page. Top policies are matched first.
The Secure Center supports centralized and batch firewall security policy deployment for
NGFW firewalls. After centralized policy configuration is complete, you can select physical
or virtual firewalls and click Quick Deploy to deliver security policies in batches, greatly
reducing O&M workload.
When creating an access authentication policy, you must select an AAA template, a user
permission template, and an 802.1x template as well as the bound device or device group.
The Secure Center supports manual or periodic consistency audit on access authentication
policies configured for switches. The audit result can be exported as a report. You can also
view details about consistency comparison.
AR Policy Management
l AR security policy configuration
The Secure Center supports centralized and batch configuration of security policies for
Huawei ARs.
You can use the quick deployment function to deploy an interzone policy to multiple ARs
when creating the interzone policy or deploy policies in batches after the interzone policy is
created.
ACL Management
l Basic ACL configuration
You can create, delete, copy, and modify basic ACLs.
eSight LogCenter, however, can address the preceding problems. It can collect log files in
diverse modes, including SYSLOG, SESSION, SFTP, FTP (both static and dynamic), and
WMI (supported only on the Windows operating system). After logs are collected from
application systems and NEs, eSight LogCenter can classify, filter, consolidate, analyze, store,
and monitor the logs. These functions enable administrators to manage massive logs in a more
efficient manner to keep abreast of the running conditions of network and security NEs, learn
Internet user behaviors, and quickly identify and eliminate security threats.
In addition to unified log management, eSight LogCenter generates alarms in real time when
detecting exceptions from logs.
NAT-based Traceability
eSight LogCenter provides Network Address Translation (NAT)-based traceability of Internet
user behaviors. When tracing Internet user behaviors, eSight LogCenter collects session logs
from network and security NEs such as MA5200G, NE40E/80E, and USG firewalls. Then
eSight LogCenter analyzes the logs in combination with user data sources (such as the AAA
server) to obtain NAT information. NAT information includes the destination IP address,
destination port, source IP address, and protocol.
NOTE
To use these functions, users must have the UC Device Manager installed.
Device Management
l Device Information
Used to view detailed IP PBX information, including the system, license, version, and
patch information.
l Ping Test
Used to test the network connection status between the IP PBX and other devices in the
network.
l Tracing Signaling
Used to trace protocol messages, connection of port signaling links, and service flows in
real time, which helps to quickly locate faults.
l Traffic Statistics
Used to collect statistics on the number of global Real-Time Transfer Protocol (RTP)
messages, number of SIP sessions, number of SIP sessions on the outgoing trunk,
number of SIP sessions on the incoming trunk, and duration of a SIP session.
l Command Tree
Used to display common IP PBX commands in tree structure.
l Configuration Backup and Restore
Used to back up and restore the IP PBX configuration data.
l Operation Log
Used to record user operations and results.
l Run Log
Used to record logs of the info, warning, and error levels during the IP PBX operation.
l Device Panel
The IP PBX panel provides a simulation graphical user interface (GUI) where you can
manage IP PBX's components, for example, boards.
l Trunk Tracing
Used to query the number of trunks that are occupied in real time and the number of
trunks that were occupied during a historical period, which facilitates trunk monitoring
and expansion.
l DSP Tracing
Used to query the number of DSP resources that are occupied in real time and the
number of DSP resources that were occupied during a historical period.
l Patch Management
Used to view, load, activate, deactivate, save, delete, and refresh patches of the IP PBX
boards.
Service Management
PBX Resource Statistics contains PRA Resource Statistics, User Resource Statistics, and DSP
Resource Statistics.
Configuration Management
You can configure SIP trunks, active and standby servers, and software parameters for IP
PBXs in batches.
Alarm Management
For details, see Alarm Management in Functions and Features.
Performance Management
For details, see Performance Management in Functions and Features.
Introduction
The U2900 series consist of the U2980 and U2990. Two types of NEs are mounted to the
U2900, that is, Common Desktop Environment (CDE) and UAP. When you add a U2900 on
eSight, the CDE and UAP are added automatically.
Device Management
eSight enables you to view the following information on either simulated panel:
l Real-time status of boards and USM servers
l Time sequence of a Circuit Interface Unit (CIU) board
For more information about the device panel of U2900, please see the Product Documentation
of U2900.
Certificate Management
When any certificate updates or a customer wants to use their own certificates, upload the
new certificates. The U29XX certificate management function allows you to replace the built-
in certificate files of the eSight. After certificates are updated on the eSihgt, U2900 series
devices obtain the new certificates from the eSightr.
Alarm Management
For details, see Alarm Management in Functions and Features.
Performance Management
For details, see Performance Management in Functions and Features.
Alarm Management
For details, see Alarm Management in Functions and Features.
Device Management
Device management includes Basic Settings, LAN, Voice Settings and Alarm
Management.
Configuration Management
eSight enables you to upgrade EGWs in batches. You can upgrade EGWs immediately or at a
scheduled time.
Alarm Management
For details, see Alarm Management in Functions and Features.
Device Management
l Basic Configuration
– Network Parameters
Used to set the IAD network parameters, including Device IP, Subnet mask,
Gateway, and DNS.
– NMS
Used to set the parameters for connecting IADs to the eSight, including the eSight
IP address, Read/Write community, Port, and Handshake interval.
– Device Time
Used to set the IAD time. You can manually set the IAD time or set the IAD time to
the current time of the eSight.
l Advanced Configuration
– Protocol Change
Used to change the protocol type used by IADs.
– Trap Function
Used to set whether to allow IADs to report Trap messages to the eSight.
– RTCP Alarm Threshold
Used to set the Real-Time Transport Control Protocol (RTCP) alarm threshold.
– Port Lock Threshold
Used to set the duration between the time when the port lock alarm is generated and
the time when the port lock alarm is reported.
l Service Configuration
– Service Configuration (MGCP)
Service Configuration (MGCP) includes Fax Parameters, DTMF Digit Collection,
MGCP Authentication, MGCP Parameters, MGC, MG Interface Parameters,
TOS/COS and Port Attributes.
– Service Configuration (SIP)
Service Configuration (SIP) includes Digitmap, Proxy Server, Voice Parameters,
Fax Parameters, DTMF Digit Collection, Local switching, Local-Switching Route
and so on.
l System Tool
– Versions
Used to query the IAD version information.
– Ping Test
Used to check whether the IAD can ping the destination IP address.
– Configuration Backup and Restore
Used to back up and restore the IAD configuration data.
– SIP User Info Backup and Restore (using SIP protocol)
Used to back up and restore the SIP user information.
– DSP Channel Status
Used to view the DSP channel status.
– MG Link Status
Used to view the MG link status.
– Port Statistics
Used to view the status of all IAD service ports.
– Configuration Saving
Used to save the IAD configurations.
– Configuration Restore
Used to restore IAD configurations.
– Device Restart
Used to restart the IAD.
Configuration Management
l Batch Configuration
With the batch configuration function, you can set a parameter in multiple IADs to the
same value. The following items can be configured in batches: network parameters,
protocol change, proxy servers, network management system (NMS) parameters, saving
configuration, read community and write community.
l Upgrade
– Manual upgrade
Users can manually upgrade IADs one by one and in batches on eSight. All the
IADs can be upgraded using the host software, except for the IAD132E (T) that
must be upgraded using the Complex Programmable Logic Device (CPLD)
software. Users can upgrade IADs immediately or at a scheduled time on eSight.
– Automatic upgrade
After the automatic upgrade function is enabled, the IAD periodically detects the
upgrade file on the File Transfer Protocol (FTP) server and automatically upgrades
the software. This function simplifies the upgrade of a large number of IADs.
Alarm Management
For details, see Alarm Management in Functions and Features.
Performance Management
For details, see Performance Management in Functions and Features.
Device Management
Device management includes Manage Service and Alarm Management.
Alarm Management
For details, see Alarm Management in Functions and Features.
Creating an UC subnet
After UC subnets are created, the eSight automatically adds an UC device to the matching
subnet.
Device Management
eSight provides configuration management (including database, service, and system
configuration management) for the AA, OBG, Call AS, PGM and so on.
l Managing the BMP
The eSight provides the alarm management and BMP manager functions for the BMP.
– BMP System: Opens the BMP Manager page.
– Database Config: Configures information about the BMP database to be connected.
The Database Config is used to connect the database of BMP, and synchronize the
user name from the BMP to eSight.
– Operation Log and Security Log: Queries BMP operation logs and security logs.
Logs that have been recorded in the database are queried. If no log has been
recorded in the database, no data will be found.
l Managing the AA
The eSight provides the configuration management, alarm management, and
performance management functions for the AA.
AA Config: Adds, modifies, deletes, synchronizes, imports, or exports AA configuration
information.
l Managing the Call AS
The details of Call AS manager functions as following:
– CTD_AnncFileName: Adds, modifies, deletes, synchronizes, imports, or exports
voice files.
– CalleePAS and CallerPAS: Processes CTD service internal logic.
– Default Language: Sets the default language.
– ESG Service Name: Configures the ESG service name.
– Max Call Time: Configures the maximum call duration.
– Head Route Value: Configures the route header. Enter the route header in the same
format of the default route header.
l Managing the PGM
The eSight provides the configuration management, alarm management, and
performance management functions for the PGM.
Sevice Management
l Business Trace
After creating a message tracing task for managed objects, a user can trace the messages
between the managed objects, and view tracing results in figures and tables. You can
trace messages in the User Trace and Scene Trace modes.
l Terminal Voice Quality
Terminal voice quality evaluates IP phone (eSpace 7910, eSpace 7950 and eSpace 8950)
and eSpace Desktop voice quality. The evaluation result can be displayed on the eSight
as reports, helping locate and rectify faults.
l Monitoring service status
The function is used to monitor the running status of all eSpace UC solution NEs and the
database, helping locate and rectify onsite faults.
l Collecting service logs
The eSight can collect logs of eSpace UC solution NEs to help maintenance personnel
analyze and locate faults.
SSO
eSight supports the SSO function. If users have logged in to the BMP, they can log in to
eSight directly without being authenticated.
Alarm Management
For details, see Alarm Management in Functions and Features.
Performance Management
For details, see Performance Management in Functions and Features.
Topology Management
For details, see Topology Management in Functions and Features.
Managed Objects
l BMP
The Business Management Platform (BMP) provides unified service management for
eSpace UC clients. It supports a wide array of services. After logging in to the BMP, the
enterprise administrator can maintain enterprise information and register and deregister
enterprise members.
l Portal
The Portal is designed for enterprise users who have registered with eSpace UC. After
logging in to the Portal, enterprise users can maintain their personal information and
configure service functions such as Do-Not-Disturb (DND), call transfer, and advanced
secretary.
l MAA
The Multimedia Authentication Answer (MAA) connects third-party clients, especially
mobile clients, to ASs and provides the following functions:
– Interface conversion: The MAA converts various interface messages from eSpace
UC's ASs into Transmission Control Protocol (TCP) interface messages and sends
them to third-party clients.
– Client session maintenance: After third-party clients connect to the MAA, the MAA
generates a session for each client and maintains the session status based on the
client status.
– Service processing: The MAA processes service logic, such as the logic for
heartbeat mechanism, reconnection after a short disconnection, and IM timeout
processing.
– TCPAdapter: A mobile terminal service module. It maintains sessions between the
UC system and mobile terminals and processes TCP messages received from
mobile terminals.
l AA
The Access Agent (AA) is responsible for eSpace Desktop access and authentication.
eSpace Desktop obtains login information from the AA and invokes the AA interface to
gain access to services such as calling, instant messaging, and conferencing.
l OBG
The Open Business Gateway (OBG) provides a service openness and integration
platform. It connects to or integrates with the IT, Social Networking Site (SNS), and
Internet systems of enterprises.
l Call AS
The Call AS is a core component of eSpace UC and provides call control and service
processing capabilities.
l PGM
– MESSAGE
The MESSAGE carries out messaging services and provides a uniform and
integrated message processing center. Thus, users can experience uniform
messaging services. As a messaging platform independent of services, the
MESSAGE processes basic message flows. The basic message flows include the
following: Message accessing, Protocol adapting, Message storing, Service
triggering and Message scheduling.
– Presence
The Presence publishes and subscribes to presence information of each presentity as
well as update presence information status in real time.
– Group
The Group is a server that manages resource lists. Physically, the Group is an
independent server or a two-node cluster.
– AP
The AP consists of the APService and PolicyService. The AP accesses,
authenticates, and dispatches XCAP messages, and allows you to query route
information.
The PGM cooperates with eSpace UC clients to provide the following functions:
– Presence: The real-time status of each enterprise user is displayed on the UC client
so that users can view their contact status in real time. Based on a contact's status,
such as online, offline, busy, or away, an enterprise user can select a proper way to
reach the contact.
– Instant messaging: An enterprise user can send an instant message to an individual
contact, contacts in a contact group, or contacts in a temporary group.
– Enterprise address book (also known as the corporate directory): The enterprise
address book contains the contact information of departments and employees. The
enterprise administrator manages and maintains the enterprise address book on the
BMP.
– Personal address book: An enterprise user has a personal address book to store
contact information. The user manages and maintains the personal address book on
the UC client.
l Meeting AS
The Meeting AS is a meeting control server that provides meeting control and
management functions.
l Meeting MS
The Meeting MS is a video and data meeting application server that provides multimedia
meeting capabilities, including video, screen sharing, file transfer, whiteboard, and text
chatting services.
l SEE
The SEE allows network protocols to be accessed. The SEE loads and executes all types
of service logic.
Creating an UC subnet
After UC subnets are created, the eSight automatically adds meeting applications devices to
the matching subnet.
Device Management
l Managing the Meeting AS
The eSight provides the alarm management, performance management and Meeting AS
manager functions for the Meeting AS.
Meeting AS manager functions: The eSight allows you to configure the following related
to the Meeting AS: AS global parameters, Meeting global parameters, Call global
parameters, Call billing parameters, CSipServer module, Database parameters, IVR
parameters, FTP parameters, Meeting MS parameters, Resource parameters and SIP
head and protocol stack parameters.
l Managing the eConf Portal
The eSight provides the alarm management and performance management functions for
the eConf Portal.
l Managing the Meeting MS
The eSight provides the alarm management and performance management functions for
the Meeting MS.
Alarm Management
For details, see Alarm Management in Functions and Features.
Topology Management
For details, see Topology Management in Functions and Features.
Managed Objects
l Meeting AS
As the core component in the eSpace Meeting system, the Meeting AS controls and
connects other components in the system, manages all meeting services, functions as a
bridge between multiple meeting systems to expand the meeting capacity, connects a
gateway to transmit voice data, read license information, generates meeting event detail
records (EDRs), and provides interfaces for external components.
l eConf portal
The eConf portal allows enterprise users to create instant conferences and scheduled
conferences, and to manage those conferences. When creating a conference, users can set
conference information including the topic, duration, and participants. Two types of
conferences are supported: voice conference and multimedia conference.
l Meeting MS
The Meeting MS provides multimedia conference functions in the eSpace Meeting
system, including text, voice, and video communication, desktop sharing, file transfer,
and e-whiteboard.
Creating a CC subnet
After CC subnets are created, the eSight automatically adds a CC device to the matching
subnet.
Device management
l CTI device management: managing CTIs in the aspect of CTI Netent Management, CTI
Web Connect, alarm management, and performance management.
l BIR, CMS and eSpace Agent Desktop device management: managing BIRs, CMSs and
eSpace Agent Desktops in the aspect of alarm management.
Alarm Management
For details, see Alarm Management in Functions and Features.
Performance Management
For details, see Performance Management in Functions and Features.
Topology Management
For details, see Topology Management in Functions and Features.
Managed Objects
l BIR
BIR, a report system deployed in browser/server (B/S) mode, provides complete and
flexible web-based report application services such as generating, distributing, and
managing reports. It supports manual report and periodic report generation,
comprehensive report distribution, and powerful data collection.
l CMS
CMS is an integral part of the eSpace CC solution and provides quality management and
monitoring functions.
l CTI
The CTI combines telephony and data communications technologies to distribute various
call types to the appropriate users.
Managed Objects
l VTM Manager
The VTM Manager, a component of the Virtual Teller Center (VTC), is used to remotely
monitor, maintain, and manage VTM terminals. It provides VTM terminal status
information and service reports.
l VTC
The VTC provides remote virtual teller services for customers. The VTC system
includes a MCC module and a MCMS module. The MCC controls calls and provides
interfaces for information query; The MCMS is used by inspectors to monitor tellers,
check teller service quality, and manage the system.
Device Management
Device management includes Basic configuration and Alarm Management.
Configuration Management
eSight provides the system, network, and routing configuration functions for SBCs. SBCs can
be restarted one by one or in batches on eSight.
Upgrade Management
eSight enables users to bulk upgrade SBCs immediately or at a scheduled time.
Alarm Management
For details, see Alarm Management in Functions and Features.
Introduction
eSight monitors voice quality of the following gateways and terminals:
l Gateways
eSpace U1981, eSpace U1980, eSpace U1960, eSpace U1930, eSpace U1910,
SoftCo9500, SoftCo5500, and IAD1224.
l Terminals
eSpace Desktop, eSpace 7910, eSpace 7950 and eSpace 8950.
l Data sampling
eSight enables you to view the calling and called numbers that are involved in a call with
the maximum or minimum MOS, time delay, jitter, or packet loss rate.
l Report export
eSight enables you to export data from the Report Data and Report View tab pages.
l Data viewing
eSight provides the Detailed Data and Report View tab pages for you to view the voice
quality, MOS, time delay, jitter, and packet loss rate. eSight enables you to query data
depending on the calling or called area, device, number, and time range.
l Data sampling
eSight enables you to view the calling and called numbers that are involved in a call with
the maximum or minimum MOS, time delay, jitter, or packet loss rate.
l Report export
eSight enables you to export data from the Detailed Data and Report View tab pages.
eSight enables users to upload a certificate to the eSight. Devices can obtain the uploaded
certificate from the eSight.
NOTE
It is recommended that the default certificate and pubic/private key pair be replaced with the certificate
and public/private key pair provided by the enterprise after the eSight is installed.
eSight provides certificate management for multiple devices including the eSpaceU29XX
series, IP phones, eSpace Desktops. For details about device models, see the eSight
Specification List.
NOTE
To use these functions, users must have the Telepresence Device Manager installed.
Device Management
l TE
Basic configuration, User settings, SIP parameter, Network configuration, SNMP
parameter, Audio parameter, Network address book
l MCU
– System configuration: Set device time, Automatic Restart Configuration, RTP
configuration, FTP configuration, Qos configuration, DNS configuration
– Network configuration: Network configuration, SNMP configuration, Trap
configuration
Service Management
eSight collects and processes data about devices in the telepresence system so that the
administrator can learn about the device status and network conditions of the telepresence
system.
l Configuration SMC
You can configure SMC network connections on eSight to implement the network
diagnosis functions for the telepresence system.
l Network Diagnostics before Meeting
You can perform network connection diagnosis for the MCU of a scheduled meeting
room.
l Conference Network Diagnostics
eSight obtains route information from the MCU and collects statistics on the devices that
support network connection diagnosis along the route.
Alarm Management
For details, see Alarm Management in Functions and Features.
Managed Objects
l Terminal
In the telepresence system, terminals are endpoints that encode and decode audio and
video signals.
l MCU
The Multipoint Control Unit (MCU) is used for terminal access, video exchange, audio
mixing, data processing, and signaling exchange.
l TP
TP is a telepresence product developed by Huawei. It uses high-definition video
encoding and digital image stitching technologies, bringing true-to-life widescreen video
images. It also adopts professional multi-channel audio capture and reproduction
technologies to achieve superior surround sound localization. Using the TP, users can
enjoy remote conferencing with life-size participant display and face-to-face experience.
l GK
The gateway keeper (GK) is a core component of the telepresence system. It is located at
the network control layer to manage nodes including the MCU, terminals, and gateways.
Node management functions provided by the GK include address resolution, domain
management, access control, registration management, call management, bandwidth
management, and route management.
NOTE
If you use the telepresence conference diagnosis, the function depends on the network base management
module and the SLA module.
Connection Configuration
Users can configure SMC network connections on eSight to implement the network diagnosis
functions for the telepresence system.
Meeting Management
eSight obtains meeting information from the SMC and displays the information on the client.
Route Management
eSight obtains route information from the devices and collects statistics on the switches and
routers that support network connection diagnosis along the route.
and performance data management. Users can view the performance and alarm data of
surveillance devices to learn about the device running status and quickly locate faults.
NOTE
To use these functions, users must have the IVS Device Manager installed.
Creating a subnet
l eSpace IVS solution
After IVS unified access agents are created, the eSight automatically adds an IVS device
(MAU, MPU, MTU, TAU, VMU and VCN3000)to the matching IVS unified access
agent.
l eSpace CAD solution
Create a default subnet on the eSight after configuring the IP address of an CAD so that
the CAD can use eSight functions.
Device Management
Device management includes configuration management, alarm management and
performance management.
Alarm Management
For details, see Alarm Management in Functions and Features.
Performance Management
For details, see Performance Management in Functions and Features.
Managed Objects
l eSpace IVS solution:
– MAU: the main control unit of the intelligent analysis subsystem in the eSpace IVS
solution. The MAU manages intelligent analysis tasks and reports the analysis
results to eSight.
– MBU: a media backup unit in the eSpace IVS solution.
– MPU: a media processing unit in the eSpace IVS solution.
– MTU: a media transcoding unit in the eSpace IVS solution that is responsible for
transcoding and distributing media data.
Configuration Management
eSight enables users to configure the configuration files for IVS application modules. It
forwards configurations to specific modules through configuration interfaces on the UOA to
ensure data synchronization with the modules.
eSpace IVS solution application modules include the OMU, DCG, SCU, MU, PCG, MAUS,
SMU and VCN3000. For detailed module information, see the eSpace IVS Product
Documentation.
eSpace CAD solution application modules include the CAD Appserver, AAG, DAG, KBS
and SNS. For detailed module information, see the eSpace CAD Product Documentation.
Report Management
Users can create and manage immediate and periodic report tasks on the report management
page.
l Immediate report task
Users need to manually run an immediate report task. Once an immediate task is
executed, a report reflecting the statistics at that time is generated. Users can click the
View Report Details button to open the generated report. When viewing the report,
users also can export it in a file of the specified format if needed.
l Periodic report task
The system runs a periodic report task automatically based on the specified period of
time. Once a periodic task is executed, a report reflecting the statistics within the
specified period of time is generated and saved on eSight. Users can view and manage all
reports generated by a periodic report task.
NOTE
The management functions that the eSight provides vary depending on IP phone models. The following
describes all the functions.
Automatic Deployment
l Automatically delivering configuration files
Once you create a subnet, you can create a configuration file for the subnet. Then, the
eSight can automatically deliver the configuration file to an IP phone when the IP phone
is added to the subnet.
l Automatically upgrading version files
After uploading IP phone version files on the eSight, IP phones that are added to the
eSight using the automatic deployment function automatically compare their own
versions with those in the corresponding version files on the eSight. If the versions are
different, the IP phones automatically upgrade their version files.
Device Management
You can perform operations such as Device Restart, fault information collection and web
management for an IP phone on the eSight.
Service Management
Managing IP phone voice quality:
Configuration Management
l Terminal upgrade management
– Configuration File Management
Configuration file management allows you to modify common parameters in the
configuration file template to batch modify IP phone configuration parameters.
Set Configuring Policy to Full or Specified item based on the site requirements.
– Associate Configuration Files with Subnets
This function allows you to associate a configuration file with multiple subnets.
You can select the configuration file that a subnet is to associate with based on the
site requirements.
– Configuring the Upgrade Path
To prevent misoperations in the version upgrade, eSight provides the version
mappings that are not supported by different models of IP phones.
– Version Management for IP Phone Upgrade
This function allows you to upload manual version files or autodeploy version files
for a model of IP Phone.
– Upgrade Management
After version files and configuration files for IP phones are uploaded to the file
server, you can use the manual upgrade management provided by the eSight to
upgrade the version files and configuration files in batches.
– Setting Upgrade Parameters
You can set upgrade parameters for IP phones to specify the concurrent number of
the file server, number of automatic upgrade attempts, upgrade timeout period, and
concurrent number of subnets. This prevents the batch upgrade of IP phones from
occupying too much resources and causing service exceptions.
l Access Scan
When a great number of IP phones connect to the eSight, the eSight uses the access scan
function to send auto-configuration server (ACS) addresses and certificate paths to the IP
phones. After IP phones automatically update their configurations based on the
information received from the eSight, the IP phones automatically connect to
corresponding IP phone subnets.
NOTICE
The access scan function applies to eSpace 7910 IP phones and eSpace 7950 IP phones with
the version V100R001C02 or later, and eSpace 8950 IP phones with all versions.
Monitoring Principle
database application devices provide the SNMP agent. Once the SNMP agent is started on
database application devices, eSight can monitor these devices.
On the network, the SNMP Agent and eSight server are the key components for monitoring
peripheral devices.
l SNMP agent: collects the alarm and performance data of peripheral devices and reports
the data to the eSight server.
l eSight server: stores the alarm and performance data of peripheral devices and displays
the data on the eSight client.
l Client: displays the alarm and performance data reported by peripheral devices.
l Peripheral device: collects and reports its own alarm and performance data to the eSight
server through the SNMP agent.
l Overview
– Displays basic server information and health status.
l Component information
– Displays basic component information and health status.
– The device view visually displays server rack graphs and displays basic server
information and health status.
l Tool
– Tools offer KVM and virtual media functions.
Alarm Monitoring
Alarms can be forwarded through emails and repeated alarms can be consolidated.
Performance Analysis
eSight analyzes the following performance counters: network port performance, server power
consumption, CPU usage, and memory usage. Users can create analysis tasks to analyze
performance counters within a specific time segment.
eSight manages alarms in SNMP mode. The following figure describes third-party alarms.
Quick Start
Stateless computing offers quick start, guiding users to define server configurations for logic
servers. The configurations can be loaded to activate specific servers.
Pool Configuration
A pool defines the network adapter, HBA card, and ID information, and dynamically manages
IDs.
Adapter
An adapter defines the HBA, CNA, and RAID configuration. Creating a profile requires
existing adapter information to define adapter information inside a logic server.
BIOS Policy
Users can define BIOS policies. Creating a profile requires an existing BIOS policy to define
BIOS information inside a logic server.
Profile
Users can use a profile to freely combine hardware configuration information, including BIOS
policy and adapter information, to form an available server with new configuration.
Device Set
A device set is used to manage devices that support stateless computing. Users can use device
sets to associate devices and profiles. After device sets are activated, hardware configuration
information in the profiles are applied to devices.
Device Group
Users can divide devices in to a group where devices share the same profile, loading server
configurations in batches.
Configuration Template
A configuration template is used to quickly create configuration files.
Quick Start
Stateless computing offers quick start, guiding users to define server configurations for logic
servers. The configurations can be loaded to activate specific servers.
Pool Configuration
A pool defines the network adapter, HBA card, and ID information, and dynamically manages
IDs.
l File storage: Shows logical mappings among front-end ports of NAS engines, NAS
engine nodes, file storage pools, data disks, and LUNs and disks of storage units.
l File storage: capacity usage management of storage devices, file storage pools, data
disks, and unshared file systems
l Host path view: Monitors physical storage paths and displays complete paths among
hosts, host disks, HBA ports, switches (ports), front-end disk array ports, disk array
controllers, disk arrays, and volumes (LUNs).
Preset report
Preset performance and capacity reports help users view storage system performance quickly
and periodically. Storage system-level performance overview shows the performance statistics
of LUNs, ports, controllers, and file systems in the latest 24 hours, 7 days, or 30 days. Object-
level performance overview shows the performance statistics of disks, ports, CPUs, LUNs,
and file systems in the latest 24 hours, 7 days, or 30 days, and sort the statistics by IOPS,
bandwidth, and delay. Resource utilization of file systems, storage pools, and thin LUNs in
the latest 24 hours, 7 days, or 30 days can be displayed.
Customized report
Customized performance and capacity reports meet the needs of the customer. Storage system
performance overview shows the performance overview of LUNs, controllers, ports, and
disks in a past period of time. Object-level performance details show the performance
statistics of ports, controllers, LUNs, disks, CPUs, file systems, or storage pools in the past
period of time. Storage system and object-level capacity utilization reports show the capacity
usage of storage systems, file systems, storage pools, or thin LUNs in a past period of time.
Task report
Customized reports along with periodic implementation policies periodically show
performance and capacity statistics.
Capacity summary shows the capacity usage of virtualization servers' data storage and disks.
Capacity trend forecast provides the capacity usage trend in the next one month.
Capacity trend forecast provides the capacity usage trend in the next one month.
Quick Start
Quick Start guides you through the configuration of MicroDC racks and devices. You can
perform data configuration step by step or import a configuration file. With Quick Start, you
can quickly complete MicroDC configuration and maintenance.
Unified NE Management
eSight provides a unified interface to implement monitoring and maintenance of the
MicroDC.
l View
– Basic information: provides the basic MicroDC information, uninterruptible power
supply (UPS) list, rack list, and the last 10 active alarms.
– Performance measurement: provides information about the top 5 racks sorted by
front door temperature, rear door temperature, and humidity respectively, and top 5
UPSs sorted by power consumption.
– Alarm list: displays the active alarms of all NEs in the MicroDC.
l Device topology
– eSight provides an intuitive view of MicroDC racks and implements configuration
and management of the racks.
Physical Topology
eSight provides an intuitive view of MicroDC racks and implements configuration and
management of the racks. You can also view alarms of racks and devices on this device
topology. The intuitive device topology simplifies O&M operations and increases the O&M
efficiency.
l Monitoring
– Device presentation: displays all MicroDC devices and rack locations visually.
– Alarm monitoring: displays alarms of devices in different colors.
– Video monitoring: provides web network management links through the camera
icons on the device topology. You can view video monitoring information in real
time or replay the video monitoring information.
l Management
– Rack configuration: allows you to add or delete a rack and provides a configuration
wizard to help you add racks and devices.
– Device configuration: allows you to install, uninstall, or remove devices.
– Accessory configuration: allows you to install, uninstall, or remove accessories.
MicroDC accessories include the battery pack, power distribution box (PDB), and
UPS.
Batch Import
eSight provides the batch import function, which allows you to import the MicroDC rack and
device configuration information. After the configuration information is imported, the system
automatically creates a MicroDC, adds racks and devices to the MicroDC, and generates a
device topology. With the batch import function, you can deploy the MicroDC by simply
clicking the mouse. This function greatly increases the deployment efficiency.
L1 Resource Management
eSight provides basic management of L1 devices. L1 devices include environment monitoring
units (EMUs) and MicroDC cameras.
l View
– Basic information: displays basic NE information. The EMU monitors power
supply information, such as the input/output voltage, input/output frequency, active
power output, load ratio, power supply mode, battery voltage, and battery remaining
capacity. Environment indicator information includes the cabinet front/rear door
temperature, cabinet humidity, cabinet front/rear door status, internal/external
smoke sensor, water sensor, and motion detection information.
– Alarm list: displays active alarms of the current NE.
l Configuration
– Web network management: allows you to configure L1 devices.
l Protocol parameters
– SNMP parameter setting: allows you to set or modify SNMP parameters.
Resource Management
The eSight Infrastructure Manager provides the following resource management functions:
l Lists the information about the selected managed devices and their sub managed devices
in three modes.
– All: lists all managed devices.
– Management domain: lists all managed domains under the selected node.
– Physical device: lists all devices in the selected management domain.
l Displays different managed devices with different icons.
l Allows you to add and delete management domains and change management domains
properties.
l Allows you to query management domains based on names or types.
l Allows you to create management domains one by one or in batches.
View Management
The eSight Infrastructure Manager provides views displaying the positions and operating
status of all the devices in the data center. This function allows you to monitor the devices in
real time.
Video Management
The video management develops the following functions:
Report Management
The eSight Infrastructure Manager presents reports in graphics, such as curves, histograms,
and pie charts.
l The eSight Infrastructure Manager allows you to export reports as an Excel or PDF file
and print reports for analysis.
l The eSight Infrastructure Manager allows you to modify the report storage capacity and
upload customer logos.
l The eSight Infrastructure Manager generates reports based on tasks, saves periodic
reports in a report storage disk, and sends reports by email as configured.
Access Control
The eSight Infrastructure Manager provides an access control system that manages access
controllers and access control card holders of cabinet-level access controllers.
l The access management function enables you to configure IP addresses for access
controllers and configure the management server.
l The time management function enables you to manage the access control in the specified
time periods or holidays.
NOTE
The cabinet-level door status sensor does not support the time management function.
l The user management function enables you to manage the users and user groups.
Temperature Map
The overall temperature distribution of the equipment room is clearly displayed.
The cold and the hot spots can be effectively identified:
l The analyses of temperature distributions on top, middle, and bottom levels are
available.
l Place the mouse where you want to query and temperature and related device
information can be displayed.
l The top 5 high temperatures and top 5 low temperatures can be analyzed.
Linkage Control
The following two linkage controls are available:
l Modular data center skylight ceiling linkage control
l Container data center humidifier linkage control.
CPE Management
eSight offers a unified portal to manage CPEs.
l Viewing basic CPE information
Users can view basic information about CPEs.
Batch Configuration
Users can set parameters for devices in batches.
Batch Upgrade
Users can upgrade the CPE firmware versions in batches instantly or as scheduled. Users can
also customize upgrade policies when the current and target versions of NEs are the same
during PnP-based deployment. The number of upgrade tasks that can be concurrently
executed is controlled by the file server egress bandwidth.
Alarm Management
eSight allows users to manage the following CPE alarms:
l High temperature
l Low temperature
l Lower computer disconnection
l Lower computer quantity threshold-crossing
l LAN port upstream exception
l Weak wireless signal
l Unauthorized access
l Other alarms
Performance Management
eSight supports real-time and periodical collection and displays the following indicators about
the CPE:
LAN port rate, receive signal strength indicator, reference signal receiving power, and
downstream signal-to-noise ratio.
Device Access
Users can add a single eNodeB, import a file to add eNodeBs in batches, or use eSight to
automatically discover eNodeBs that are running on the network. Users can also manage the
eNodeB connection status and management status in the topology or on the device overview
page.
Alarm Management
In addition to all the alarm management functions mentioned in 2.1.4 Alarm Management,
eSight also allows users to manually and automatically synchronize current alarms, and clear
specific current alarms for devices.
Performance Management
By default, eSight offers key, major, and minor performance indicator templates. After
devices are connected to eSight, collection tasks about key performance indicators (KPIs) are
automatically added to collect performance data about network-wide devices.
eSight supports 15 key performance counter templates, including eNodeB, link, RRU, board,
cell, port, and carrier; and automatically creates one-hour performance collection tasks when
eNodeBs are created. Users can also manually create and delete periodical detection tasks for
eNodeBs at an interval less than one hour.
Topology Management
In addition to all the functions mentioned in 2.1.6 Topology Management, eSight also offers
the following topology management functions for eNodeBs:
l Displays virtual connections between eNodeBs and eCNSs in the physical topology.
l Updates the eNodeB connection and alarm status in the physical topology in real time.
l Allows users to right-click an eNodeB to display the following functions: configuration
synchronization, alarm browsing, NE details, web network management, and MML
client.
NE Manager
Users can use the NE manager to comprehensively manage eNodeBs. eSight calculates the
NE health based on the following factors and displays the health information on the NE
manager:
l NE connection status
l Ratio of the unreachable duration to the total managed duration
l Ratio of critical and major alarms to the total alarms
l Number of current alarms
l Performance alarms
l CPU usage
The NE manager allows users to manage:
l Version files
MML Client
The MML client allows users to deliver MML commands to NEs of the same type and
version on eSight. The MML client offers a function-specific command navigation tree,
allows users to filter, search for, and sort NEs, supports MML command association and
online help, and records executed historical commands. Before executing a command that
may have severe negative effects, the MML Client informs users of possible execution results
and executes the command only after the users confirm the operation.
eSight displays command execution results in real time.
Device Access
Because the number of eCNSs is small, eCNSs can be imported in batches, but do not support
automatic discovery. Users can also manage the eCNS connection status and management
status in the topology or on the device overview page.
Alarm Management
For eLTE eCNSs, eSight supports all the alarm management functions mentioned in 2.1.4
Alarm Management but does not support the following functions: manually and
automatically synchronize current alarms, and clearing specific current alarms for devices.
Topology Management
In addition to all the functions mentioned in 2.1.6 Topology Management, eSight also offers
the following topology management functions for eCNSs:
l Displays virtual connections between eNodeBs and eCNSs in the physical topology.
l Updates the eCNS connection and alarm status in the physical topology in real time.
l Allows users to right-click an eCNS to display the entries for current alarms and the
MML Client.
NE Manager
The NE manager enables in-depth management over eNodeBs, calculates NE health status by
the alarm severity and number of current alarms, and displays NE monitoring status.
The NE manager allows users to check current and historical alarms about devices.
MML Client
The MML client allows users to deliver MML commands to NEs of the same type and
version on eSight. The MML client offers a function-specific command navigation tree,
allows users to filter, search for, and sort NEs, supports MML command association and
online help, and records executed historical commands. Before executing a command that
may have severe negative effects, the MML Client informs users of possible execution results
and executes the command only after the users confirm the operation.
eSight displays command execution results in real time.
Office AD Script
SharePoint Ping
WebLogic Telnet
Integration
SNMP
MSMQ
DNS
IBM
WebSphere MQ FTP/SFTP
Network
service
The following describes how to manually add a resource and discover resources in batches.
l Manually adding a resource
When manually adding a resource, select any resource type listed in Figure 1 Manually
adding a resource.
2.11.6 SLA
With SLA management, eSight provides a clear overview for administrators about the running
status of the overall service system, such as the downtime, availability, mean time to repair
(MTTR), and mean time between failures (MTBF).
l Customized report
You can create report templates for different purposes. To generate a report, click the
report generation button in the report template. The system then automatically generates
a report as specified.
When creating a report template, you can set the report title, statistical period, data
source (indicating the resources to be monitored, such as network devices, servers, and
databases), and statistical indicators (select only the most frequently used and most
concerned ones).
After a report template is created, you can click the report generation button in it. The
system then automatically generates a report as specified, showing the maximum,
minimum, and average values for each indicator.
l Top N Report
Multiple Top N reports are available, covering the ICMP response delay, ICMP packet
loss rate, CPU usage, memory usage, system load, database increment, database buffer
hit rate, and tablespace data increase. You can also create a Top N report by specifying
statistical criteria, such as the data source, number of data items, and time segment.
l Availability report
The availability report collects statistics on availability of all monitored resources in a
specified time segment. The statistics include the continuous running time, downtime,
number of shutdown times, proper running percentage, MTTR, and MTBF. In this
report, the resources can be sequenced by an indicator in ascending or descending order.
In this way, you can locate the lowest-availability resource at a glance.
3 Deployment Mode
eSight supports two networking modes: standalone deployment, and hierarchical deployment.
3.1 Standalone Mode
3.2 Distributed Deployment Mode
3.3 Two-Node Cluster Deployment Mode
NOTE
The deployment of a distributed UC device manager is similar to the deployment of the main
eSight server. The deployment involves a server, multiple clients, and other network devices.
You can deploy multiple distributed UC device manages, as shown in Figure 3-3.
You can set a floating IP address between the active and standby servers. In this case, devices
do not need to reconnect to eSight after active and standby switchover.
4 Networking Mode
Table 4-1 lists Huawei and non-Huawei devices that can be managed by eSight.
Domain Device
Domain Device
NOTE
For details about mapping relationships between eSight and devices, see Device Versions in the release
notes delivered with the version.
In an enterprise park, employees working in branches and partners outside the core network
need to connect to the enterprise park network through a wide area network (WAN) or the
Internet. The eSight intelligent management platform provides integrated management for
multiple systems and unified management for IT and IP devices. Figure 4-1 shows a typical
network for eSight solution in an enterprise park.
eSight offers server management. It is recommended that the eSight server offer at least two
network ports for server management and that one management VLAN is planned for device
management. One network port is used for basic device management and stateless computing,
and connected to the management VLAN. The VLAN ID ranges from 2 to 4094. The other
network port is used for server deployment and connected to the default VLAN.
You can add lower-level eSights to the upper-level eSight and provide links to lower-level
eSights. When you click a link, a new browser window opens, displaying the login page of a
lower-level eSight.
5 Configuration
NOTICE
l The languages for the operating system must be Simplified Chinese or English. The
languages for the operating system, database, and eSight must be the same.
l In a distributed deployment mode, operating systems on the primary and secondary hosts
must be the same, and no database is required on the secondary host.
l The secondary host where LogCenter is installed supports only Windows. The secondary
host where the UC Device Manager is installed supports only SUSE Linux.
NOTE
l Only the SUSE Linux + Oracle combination is supported when managed devices range from 5001 to
20, 000.
l Certain components do not support all OS+DB combinations. For details, see Table 5-1.
eSight Smart √ √ √
Reporter
eSight WLAN √ √ √
Manager
eSight Network √ √ √
Traffic Analyzer
Manager
eSight LogCenter √ √ ×
Log Manager
eSight Telepresence √ √ √
Device Manager
eSight Server √ √ √
Deployment
Manager
NOTE
NOTE
l The management node quantity is calculated as follows: IP phone 1:4, eLTE terminal 1:5, eNodeB
device 2:1, eCNS device 20:1, high-end storage device 160:1, mid-range storage device 40:1, low-
end storage device 10:1, hierarchical storage device 10:1, rack server 2:1, blade server 40:1,
application objects 2:1, 288 big data storage nodes are equivalent to one high-end storage device. If
the number of big data storage nodes is not the integral multiple of 288, the result of Number of big
data storage nodes/288 is rounded up to an integer, other device 1:1.
201-500 l CPU: 2 x
nodes dual-core 2
(managem GHz or above
ent l Memory:
platform 6GB
+ device
managem l Disk space:
ent, 200GB
excluding NOTE
value- A PC server is
recommended.
added
componen
ts)
2001-500 l CPU: 2 x --
0 nodes quad-core 2
GHz or above
l Memory:
16GB
l Disk space:
500GB
NOTE
A PC server is
recommended.
201-500 l CPU: 2 x
nodes dual-core 2
(managem GHz or above
ent l Memory:
platform 6GB
+ device
managem l Disk space:
ent, 200GB
excluding NOTE
value- A PC server is
recommended.
added
componen
ts)
2001-500 l CPU: 2 x --
0 nodes quad-core 2
GHz or above
l Memory:
16GB
l Disk space:
500GB
NOTE
A PC server is
recommended.
0-2000 nodes l CPU: 2 x six-core Huawei Tecal RH2288H VMWare ESXI 5.0
CPUs, 2.5 GHz or V2,BC1M55SRSG,eSig l CPU: 2 x six-core
above ht Server(2*E5-2630 2.5 GHz or above
l Memory: 16GB V2,4*8GB,3*300GB
SAS 2.5,4*GE LOM, l Memory: 24GB
l Disk space: 1*4*GE NIC,SR320BC l Disk space:
300GB +BBU,2*460W PS) 600GB
NOTE
l Windows Server
A PC server is
recommended. 2008 R2 Standard
(64-bit) + MySQL
5.5 (attached in
the eSight
software package)
NOTE
l When the eSight server is planned to manage over 5000 devices, the NTC server must be deployed
on a different host from the eSight server.
l When the eSight Network Traffic Analyzer is planned to manage over 100 devices, the NTC server
must be deployed on a different host from the eSight server.
NOTE
l When the eSight server is planned to manage over 5000 devices, the NTC server must be deployed
on a different host from the eSight server.
l When the eSight Network Traffic Analyzer is planned to manage over 100 devices, the NTC server
must be deployed on a different host from the eSight server.
l When NTC and eSight platform are deployed on different servers, the database is not required to be
installed on the NTC server, but the operating systems must be the same on the NTC and the eSight
servers.
Table 5-5 eSight basic management + storage report+ network traffic analysis(primary server)
Manageme Minimum Delivery Server VM
nt Scale Configuration Configuration Configuratio
n
Table 5-6 eSight basic management + LogCenter log management (primary server)
Management Minimum Delivery Server VM
Scale Configuration Configuration Configuration
Table 5-8 Integrated deployment of all components (basic management, storage report,
network traffic analysis, LogCenter, infrastructure management, and application management)
Distributed Server
Table 5-9 Configuration requirements for the distributed server where the NTC is deployed
Table 5-10 Configuration requirements for the distributed server where the log collector is
deployed
Manageme Minimum Delivery Server VM
nt Scale Configuration Configuration Configuration
Table 5-11 Configuration requirements for the distributed server where the Distributed UC
Device Manager is deployed
Manageme Minimum Delivery Server VM
nt Scale Configuration Configuration Configuration
NOTE
The eSight Facilities Infrastructure Manager does not support Firefox 27 and Chrome 29. Use
Internet Explorer 9 or Internet Explorer 10 for it.
l Memory: 1 GB or above
The method for calculating network bandwidth required in the eSight system is as follows:
Total bandwidth between eSight and devices = Device management bandwidth + Additional
bandwidth for terminal upgrade + Additional bandwidth for network traffic + Additional
LogCenter bandwidth + Additional bandwidth for deploying the operating system for servers
The planned bandwidth for each terminal upgrade is 256 kbit/s. In the formula, Y/10 indicates that
10% terminals are concurrently upgraded. eSight allows users to upgrade 100 terminals at the
same time, requiring 25.6 Mbit/s.
l Additional bandwidth for network traffic:
N x 400 bit/s
NOTE
l In the formula, N indicates the number of flows and its unit is flow/s.
l The bandwidth for a flow is calculated as follows: (1500/30) x 8 bit/s = 400 bit/s. Here, 1500
indicates that the average size of a NetStream packet is 1500 bytes, and 30 indicates that a
NetStream packet has about 30 flows.
l 10000 flows require a bandwidth of 3.8 Mbit/s.
l Additional LogCenter bandwidth (between the LogCenter collector and devices)
– Integrated deployment of the collector and eSight: 1.5 Mbit/s (300 bytes per syslog
and 150 bytes per session log)
– Distributed deployment 1 (see Table 5-10): 24 Mbit/s
– Distributed deployment 2 (see Table 5-10): 36 Mbit/s
l Additional bandwidth for deploying the operating system for servers
15 Mbit/s
NOTE
eSight allows users to load and deploy the operating system mirroring file through PXE.
Deploying the operating system for each server requires 1.5 Mbit/s. eSight allows users to deploy
the operating system for a maximum of 10 servers at the same time, requiring 15 Mbit/s.
6 Technical Counters
eSight can manage a maximum of 20,000 NEs and allows a maximum of 100 online clients
concurrently. The technical counters for eSight are as follows.
A Glossary
A
AC See access controller.
ACL See access control list.
AP See access point.
ATAE See Advanced Telecommunications Application Environment.
Advanced A carrier-class processing platform that is designed to meet the service application
Telecommunications requirement of high performance, high specialization, and high integration.
Application
Environment (ATAE)
access control list A list of entities, together with their access rights, which are authorized to access a
(ACL) resource.
access controller (AC) A device that controls and manages all associated access points (APs) in a WLAN. An
AC can work with the authentication server to provide the authentication service for
WLAN users.
access point (AP) Any entity that has station functionality and provides access to the distribution
services, via the wireless medium (WM) for associated stations.
administrator A user who has authority to access all EMLCore product management domains. This
user has access to the entire network and all management functions.
alarm A message reported when a fault is detected by a device or by the network
management system during the device polling process. Each alarm corresponds to a
clear alarm. After a clear alarm is received, the corresponding alarm is cleared.
B
B/S browser/server
BBU See backup battery unit.
BGP Border Gateway Protocol
BIOS See basic input/output system.
backup A periodic operation performed on data stored in a database for the purposes of
recovering the data if an error occurs. The backup also refers to the data
synchronization between active and standby boards.
backup battery unit A battery module that can supplies power for a controller enclosure in a short time
(BBU) when the system is powered off.
basic input/output Firmware stored on the computer motherboard that contains basic input/output control
system (BIOS) programs, power-on self test (POST) programs, bootstraps, and system setting
information. The BIOS provides hardware setting and control functions for the
computer.
C
CAD See computer-assisted dispatch.
CC See conference call.
CLI command-line interface
CPLD complex programmable logical device
CPU See central processing unit.
central processing unit The computational and control unit of a computer. The CPU is the device that
(CPU) interprets and executes instructions. The CPU has the ability to fetch, decode, and
execute instructions and to transfer information to and from other resources over the
computer's main data-transfer path, the bus.
certificate The certificate, also called the digital certificate, establishes the association between
the user identity and user public key. The certificate is issued by the third-party
authority, and provides identity authentication for the communications parties.
cluster A computer technology that integrates a set of loosely connected servers to work
together so that in many respects they can be viewed as a single system. A cluster is
used to improve system stability, reliability, data processing capability, and service
capability. For example, a cluster is used to reduce single-point failures, share storage
resources, load balances, and improve system performance.
computer-assisted In the ECC solution of the Enterprise Unified Communications and Collaboration
dispatch (CAD) (UC&C) Product Line, the Computer-Assisted Dispatch (CAD) system is the core
module of the ECC system, which is responsible for the incident receiving, handling,
and dispatching.
conference call (CC) A conference by telephone in which three or more parties in different locations
participate by using a central switching unit.
configuration data A command file defining hardware configurations of an NE. With this file, an NE can
collaborate with other NEs in a network. Therefore, configuration data is the key
factor that determines the operation of an entire network.
configuration file A file that contains machine-readable operating specifications for a piece of hardware
or software or that contains information on another file or on a specific user, such as
the user's login ID.
D
DB database
DC data center
E
EPS events per second
ESN See equipment serial number.
Ethernet A LAN technology that uses the carrier sense multiple access with collision detection
(CSMA/CD) media access control method. The Ethernet network is highly reliable
and easy to maintain. The speed of an Ethernet interface can be 10 Mbit/s, 100 Mbit/s,
1000 Mbit/s, or 10,000 Mbit/s.
Extensible Markup A specification developed by the World Wide Web Consortium (W3C). XML is a
Language (XML) pared-down version of Standard Generalized Markup Language (SGML), designed
especially for Web files. It allows designers to create their own customized tags,
enabling the definition, transmission, validation, and interpretation of data between
applications and between organizations.
encryption A function used to transform data so as to hide its information content to prevent it's
unauthorized use.
equipment serial A string of characters that identify a piece of equipment and ensures correct allocation
number (ESN) of a license file to the specified equipment. It is also called "equipment fingerprint".
F
FTP File Transfer Protocol
FTPS See File Transfer Protocol over SSL.
File Transfer Protocol An extension to the commonly used File Transfer Protocol (FTP) that adds support for
over SSL (FTPS) the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic
protocols.
firewall A combination of a series of components set between different networks or network
security domains. By monitoring, limiting, and changing the data traffic across the
firewall, it masks the interior information, structure and running state of the network
as much as possible to protect the network security.
floating IP address An IP address that a high availability (HA) system uses to communicate with the
external system. The active server and standby server have separate IP addresses. For
example, the IP address of the active server is IP1 and the IP address of the standby
server is IP2. When communicating with the external client, the active or standby
server uses IP3, and IP3 is bound to the network adapter of the active server. At this
time, the active server has two IP addresses, namely IP1 and IP3. The standby server
has only IP2, therefore, it does not provide services to the external client. When an
active/standby switchover occurs, the active server releases IP3, and IP3 is bound to
the network adapter of the standby server. This is called floating.
G
GE Gigabit Ethernet
GUI graphical user interface
gateway A device that connects two network segments using different protocols. It is used to
translate the data in the two network segments.
H
HA system high availability system
HTTP See Hypertext Transfer Protocol.
HTTPS See Hypertext Transfer Protocol Secure.
Hypertext Transfer An application-layer protocol used for communications between web servers and
Protocol (HTTP) browsers or other programs. HTTP adopts the request-response mode. A client sends a
request to the server. The request consists of two parts: request header and MIME-like
message. The request header contains request method, uniform resource locator
(URL), and protocol version. The MIME-like message contains request modifiers,
client information, and possible body content. Upon receiving the request, the server
responds with a status line. The status line includes the message's protocol version, a
success or error code, and a MIME-like message, which contains server information,
entity meta-information, and possible entity-body content. For details about HTTP, see
RFC2616.
Hypertext Transfer An HTTP protocol that runs on top of transport layer security (TLS) and Secure
Protocol Secure Sockets Layer (SSL). It is used to establish a reliable channel for encrypted
(HTTPS) communication and secure identification of a network web server. For details, see
RFC2818.
I
IAD See integrated access device.
ICMP See Internet Control Message Protocol.
ID See identity.
IOPS input/output operations per second
IP Internet Protocol
IP address A 32-bit (4-byte) binary number that uniquely identifies a host connected to the
Internet. An IP address is expressed in dotted decimal notation, consisting of the
decimal values of its 4 bytes, separated with periods; for example, 127.0.0.1. The first
three bytes of the IP address identify the network to which the host is connected, and
the last byte identifies the host itself.
Internet Control A network layer protocol that provides message control and error reporting between a
Message Protocol host server and an Internet gateway.
(ICMP)
identity (ID) The collective aspect of the set of characteristics by which a thing is definitively
recognizable or known.
integrated access An access node that can simultaneously deliver Class 5 switch voice services, packet
device (IAD) voice services, and data services (through LAN ports) over a single WAN link. IADs
provide a common platform that enables service providers to deliver voice and data
over a single access network, reducing the cost of co-located equipment in the Telco
central office and allowing service providers to minimize transport spans.
K
KVM See keyboard, video, and mouse.
keyboard, video, and A hardware device installed in the integrated configuration cabinet. KVM serves as
mouse (KVM) the input and output device for the components inside the cabinet. It consists of a
screen, a keyboard, and a mouse.
L
L3VPN Layer 3 virtual private network
LAN See local area network.
LDAP See Lightweight Directory Access Protocol.
LDP Label Distribution Protocol
LLDP See Link Layer Discovery Protocol.
Lightweight Directory A network protocol based on TCP/IP, which allows access to a directory system agent
Access Protocol (DSA). It involves some reduced functionality from X.500 Directory Access Protocol
(LDAP) (DAP) specifications.
Link Layer Discovery The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE
Protocol (LLDP) 802.1ab. Using the LLDP, the NMS can rapidly obtain the Layer 2 network topology
and changes in topology when the network scales expand.
license A permission that the vendor provides for the user with a specific function, capacity,
and duration of a product. A license can be a file or a serial number. Usually the
license consists of encrypted codes. The operation authority granted varies with the
level of the license.
local area network A network formed by the computers and workstations within the coverage of a few
(LAN) square kilometers or within a single building, featuring high speed and low error rate.
Current LANs are generally based on switched Ethernet or Wi-Fi technology and run
at 1,000 Mbit/s (that is, 1 Gbit/s).
log collector A subsystem of eLog, used to format, classify, filter, merge, measure, store, and query
logs.
M
MAC See Media Access Control.
MAC address A link layer address or physical address. It is six bytes long.
MGCP See Media Gateway Control Protocol.
MIB See management information base.
MML man-machine language
MPLS See Multiprotocol Label Switching.
MPLS TE multiprotocol label switching traffic engineering
MPLS VPN See multiprotocol label switching virtual private network.
Media Access Control A protocol at the media access control sublayer. The protocol is at the lower part of
(MAC) the data link layer in the OSI model and is mainly responsible for controlling and
connecting the physical media at the physical layer. When transmitting data, the MAC
protocol checks whether to be able to transmit data. If the data can be transmitted,
certain control information is added to the data, and then the data and the control
information are transmitted in a specified format to the physical layer. When receiving
data, the MAC protocol checks whether the information is correct and whether the
data is transmitted correctly. If the information is correct and the data is transmitted
correctly, the control information is removed from the data and then the data is
transmitted to the LLC layer.
Media Gateway A protocol that defines a type of call control structure. It is a standard protocol for
Control Protocol handling the signaling and session management needed during a multimedia
(MGCP) conference. In the structure defined by MGC, call control is separated from service
bearer. Being independent of the Media Gateway (MG), the call control function is
processed by the external call control unit, known as Media Gateway Controller
(MGC) or Call Agent (CA). The MG needs to execute the command issued by the
MGC. By nature, MGCP is a master/slave protocol.
Multiprotocol Label A technology that uses short tags of fixed length to encapsulate packets in different
Switching (MPLS) link layers, and provides connection-oriented switching for the network layer on the
basis of IP routing and control protocols.
management A type of database used for managing the devices in a communications network. It
information base comprises a collection of objects in a (virtual) database used to manage entities (such
(MIB) as routers and switches) in a network.
multiprotocol label An Internet Protocol (IP) virtual private network (VPN) based on the multiprotocol
switching virtual label switching (MPLS) technology. It applies the MPLS technology for network
private network routers and switches, simplifies the routing mode of core routers, and combines
(MPLS VPN) traditional routing technology and label switching technology. It can be used to
construct the broadband Intranet and Extranet to meet various service requirements.
N
NAT See Network Address Translation.
NE network element
NIC network interface card
NTA See network traffic analyzer.
NTC See network traffic collector.
NetStream As a measurement and release technique based on network stream information,
NetStream can categorize and measure the traffic on the network and the utilization of
resources. It performs management and charging for various services and based on
different QoS.
Network Address An IETF standard that allows an organization to present itself to the Internet with far
Translation (NAT) fewer IP addresses than there are nodes on its internal network. The NAT technology,
which is implemented in a router, firewall or PC, converts private IP addresses (such
as in the 192.168.0.0 range) of the machine on the internal private network to one or
more public IP addresses for the Internet. It changes the packet headers to the new
address and keeps track of them via internal tables that it builds. When packets come
back from the Internet, NAT uses the tables to perform the reverse conversion to the IP
address of the client machine.
network traffic Network traffic analysis tool that obtains statistical data from the NTC (Network
analyzer (NTA) Traffic Collector). The statistical data is a basis for flow evidence, capacity planning,
and attack detection.
network traffic Application running in Unix or Windows, which is responsible for receiving and
collector (NTC) processing UDP packets from the NTE (Network Traffic Exporter). Then it sends
statistical data to the NTA for further analysis.
O
O&M operation and maintenance
OAM See operation, administration and maintenance.
OID object identifier
OPEX operating expense
OSPF See Open Shortest Path First.
OSS operations support system
Open Shortest Path A link-state, hierarchical interior gateway protocol (IGP) for network routing that uses
First (OSPF) cost as its routing metric. A link state database is constructed of the network topology,
which is identical on all routers in the area.
operation, A set of network management functions that cover fault detection, notification,
administration and location, and repair.
maintenance (OAM)
P
P2P See point-to-point service.
PBX private branch exchange
PC personal computer
PRA primary rate access
PVID See port VLAN ID.
PXE See preboot execution environment.
ping A method used to test whether a device in the IP network is reachable according to the
sent ICMP Echo messages and received response messages.
point-to-point service A service between two terminal users. In P2P services, senders and recipients are
(P2P) terminal users.
port VLAN ID (PVID) A default VLAN ID of a port. It is allocated to a data frame if the data frame carries
no VLAN tag when reaching the port.
preboot execution A technology that enables computers to boot from the network. This technology is the
environment (PXE) successor of Remote Initial Program Load (RPL). The PXE works in client/server
mode. The PXE client resides in the ROM of a network adapter. When the computer is
booted, the BIOS invokes the PXE client to the memory, and the PXE client obtains
an IP address from the DHCP server and downloads the operating system from the
remote server using TFTP.
Q
QoS See quality of service.
quality of service A commonly-used performance indicator of a telecommunication system or channel.
(QoS) Depending on the specific system and service, it may relate to jitter, delay, packet loss
ratio, bit error ratio, and signal-to-noise ratio. It functions to measure the quality of the
transmission system and the effectiveness of the services, as well as the capability of a
service provider to meet the demands of users.
R
RADIUS See Remote Authentication Dial In User Service.
RADIUS An authentication mode in which the BRAS sends the user name and the password to
authentication the RADIUS server by using the RADIUS protocol. The RADIUS server
authenticates the user, and then returns the result to the BRAS.
RAID redundant array of independent disks
RSA See Rivest-Shamir-Adleman.
RTCP See Real-Time Transport Control Protocol.
RTP See Real-Time Transport Protocol.
Real-Time Transport A protocol used to monitor data delivery. RTCP enables the receiver to detect if there
Control Protocol is any packet loss and to compensate for any delay jitter.
(RTCP)
Real-Time Transport A protocol defined by the IETF for transmitting audio and video streams. RTP is
Protocol (RTP) based on UDP. In the RTP header, a time stamp is defined to ensure that audio and
video data can be transmitted and synchronized in real time. H.323 is based on RTP.
Remote Authentication A security service that authenticates and authorizes dial-up users and is a centralized
Dial In User Service access control mechanism. As a distributed server/client system, RADIUS provides
(RADIUS) the AAA function.
Rivest-Shamir- An asymmetric cryptographic algorithm, which is recommended by Public-Key
Adleman (RSA) Cryptography Standards (PKCS) and widely used in electronic commerce. The RSA
algorithm is developed based on the fact that it is easy to multiply two large prime
numbers but difficult to factoring their product. Therefore their product is used as the
encryption key. The RSA algorithm can resist all known password attacks. It has been
recommended as the public key encryption standard by International Organization for
Standardization (ISO).
rights- and domain- A function of the NMS for authority management. With this function, you can:
based management
l Partition and control the management authority.
l Manage device nodes and service data by region.
l Grant different management and operation rights to users for different regions.
S
SAN See storage area network.
SAS serial attached SCSI
SATA Serial Advanced Technology Attachment
SDK software development kit
SFTP See Secure File Transfer Protocol.
SIP Session Initiation Protocol
SLA See service level agreement.
SNE See service network engine.
SNMP See Simple Network Management Protocol.
SQL See structured query language.
SSH See Secure Shell.
SSID service set identifier
SSL See Secure Sockets Layer.
SSO See single sign-on.
STelnet Secure Shell Telnet
Secure File Transfer A network protocol designed to provide secure file transfer over SSH.
Protocol (SFTP)
Secure Shell (SSH) A set of standards and an associated network protocol that allows establishing a secure
channel between a local and a remote computer. A feature to protect information and
provide powerful authentication function for a network when a user logs in to the
network through an insecure network. It prevents IP addresses from being deceived
and simple passwords from being captured.
Secure Sockets Layer A security protocol that works at a socket level. This layer exists between the TCP
(SSL) layer and the application layer to encrypt/decode data and authenticate concerned
entities.
Simple Network A network management protocol of TCP/IP. It enables remote users to view and
Management Protocol modify the management information of a network element. This protocol ensures the
(SNMP) transmission of management information between any two points. The polling
mechanism is adopted to provide basic function sets. According to SNMP, agents,
which can be hardware as well as software, can monitor the activities of various
devices on the network and report these activities to the network console workstation.
Control information about each device is maintained by a management information
block.
security Protection of a computer system and its data from harm or loss. A major focus of
computer security, especially on systems accessed by many people or through
communication lines, is preventing system access by unauthorized individuals.
service level agreement A service agreement between a customer and a service provider. SLA specifies the
(SLA) service level for a customer. The customer can be a user organization (source domain)
or another differentiated services domain (upstream domain). An SLA may include
traffic conditioning rules which constitute a traffic conditioning agreement as a whole
or partially.
service network engine An integrated intelligent network (IN) service development platform with good
(SNE) openness, powerful expansion capability, and advanced structure. This platform
provides a flexible telecom component library and powerful telecom service
development and operating environment; thereby supporting the development of
various services. Through the SNE, users can conveniently and quickly develop and
deploy telecom services.
single sign-on (SSO) A property of access control over multiple related but independent software systems.
With this property, a user logs in once and gains access to all systems without being
prompted to log in again at each of them.
storage area network An architecture to attach remote computer storage devices such as disk array
(SAN) controllers, tape libraries and CD arrays to servers in such a way that to the operating
system the devices appear as locally attached devices.
structured query A programming language widely used for accessing, updating, managing, and
language (SQL) querying data in a relational database.
subnet An abbreviation for subnetwork. A type of smaller networks that form a larger
network according to a rule, for example, according to different districts. This
facilitates the management of the large network.
T
TCP See Transmission Control Protocol.
TCP/IP Transmission Control Protocol/Internet Protocol
TFTP See Trivial File Transfer Protocol.
U
UDP See User Datagram Protocol.
URI See uniform resource identifier.
URL See uniform resource locator.
User Datagram A TCP/IP standard protocol that allows an application program on one device to send
Protocol (UDP) a datagram to an application program on another. UDP uses IP to deliver datagrams.
UDP provides application programs with the unreliable connectionless packet delivery
service. That is, UDP messages may be lost, duplicated, delayed, or delivered out of
order. The destination device does not actively confirm whether the correct data
packet is received.
uniform resource A uniform resource identifier (URI) is a member of this universal set of names in
identifier (URI) registered namespaces and addresses referring to registered protocols or namespaces.
URI is used to locate available resources on the Web, including HTML documents,
images, video clips, and programs.
uniform resource An address that uniquely identifies a location on the Internet. A URL is usually
locator (URL) preceded by http://, as in http://www.microsoft.com. A URL can contain more details,
such as the name of a hypertext page, often with the file name extension .html or .htm.
V
VLAN virtual local area network
VM virtual machine
VMM virtual machine manager
VPN virtual private network
VRF VPN routing and forwarding
VoIP See Voice over Internet Protocol.
Voice over Internet A value-added service technology for IP calls. The VoIP service is a new IP telecom
Protocol (VoIP) service. It can run on fixed and mobile networks and support flexible access points.
Fees for VoIP subscribers are relatively low. Calls between VoIP subscribers who
belong to the same carrier are free of charge.
X
XML See Extensible Markup Language.