Avaya Bcm50 Users Manual
2015-06-01
: Avaya Avaya-Bcm50-Users-Manual-736309 avaya-bcm50-users-manual-736309 avaya pdf
Open the PDF directly: View PDF
.
Page Count: 1
| Download | |
| Open PDF In Browser | View PDF |
BCM50 Administration Guide
BCM50 3.0
Business Communications Manager
Document Status:Standard
Document Number: NN40020-600
Document Version: 02.03
Date: January 2010
Copyright © 2007-2010 Nortel Networks, All Rights Reserved
All rights reserved.
The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied
warranty. Users must take full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Nortel Networks.
Trademarks
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
Microsoft, MS, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation.
All other trademarks and registered trademarks are the property of their respective owners.
3
Task List
Getting started with BCM50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Overview of BCM50 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
BCM50 Management Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
BCM50 Security Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
BCM50 Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
To set system access control policies ...........................................................................85
To set credential complexity ..........................................................................................85
To set lockout policy for failed logins .............................................................................86
To set password expiry policy .......................................................................................87
To set password history.................................................................................................87
To set the authentication method ..................................................................................88
To configure an authentication server in Element Manager ..........................................88
To set the idle session timeout ......................................................................................92
To upload a Web Server Certificate ..............................................................................92
To transfer an SSH Key-Pair .........................................................................................93
Managing BCM50 Accounts and Privileges . . . . . . . . . . . . . . . . . . . . . . . . 95
To add a new user account .........................................................................................119
To modify a user account ............................................................................................120
To add callback for a dial-up user ...............................................................................120
To add NAT rules for a dial-up user ............................................................................121
To add Telset access for a user ..................................................................................121
To delete a user account .............................................................................................122
To change a user’s password......................................................................................122
To change the current user’s password ......................................................................122
To create a group ........................................................................................................123
To delete a group ........................................................................................................123
To modify group privileges ..........................................................................................124
To add a user account to a group................................................................................124
To delete a user account from a group........................................................................124
To release a locked-out user .......................................................................................125
To enable or disable an account immediately .............................................................126
To enable or disable an account on a timed basis ......................................................126
To enable/disable exclusive access ............................................................................127
Using the BCM50 Hardware Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
To view or update information about the BCM50 main chassis ..................................130
To view or update BCM50 system expansion information ..........................................132
To view or update other information about the BCM50 main unit ...............................133
To view information about attached devices ...............................................................134
To view additional information about the BCM50 hardware inventory ........................136
Managing BCM50 with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
BCM50 Administration Guide
4
Task List
To configure the BCM50 SNMP agent ........................................................................140
To configure BCM50 SNMP settings ...........................................................................140
To add an SNMP manager to the BCM50 SNMP manager list ...................................141
To delete an SNMP manager ......................................................................................142
To delete a community string value .............................................................................143
To add a service access point .....................................................................................144
To view details associated with a service access point ...............................................145
To delete a service access point .................................................................................145
To modify a trap destination ........................................................................................147
Using the BCM50 Fault Management System . . . . . . . . . . . . . . . . . . . . . 149
To view an alarm .........................................................................................................153
To acknowledge an alarm ...........................................................................................153
To clear the alarm log ..................................................................................................154
To include or omit acknowledged alarms in the Alarm Banner ...................................156
To specify the alarm set ..............................................................................................157
To clear an alarm from the alarm set...........................................................................157
To reset the Status LED ..............................................................................................158
To enable or disable SNMP traps for alarms...............................................................159
To enable or disable viewing of selected alarms in the Alarms table ..........................159
To view settings for the alarm set................................................................................159
To test an alarm...........................................................................................................160
Using the BCM50 Service Management System . . . . . . . . . . . . . . . . . . . 161
To view details about services.....................................................................................163
To restart a service......................................................................................................164
Monitoring BCM50 System Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
To configure monitoring mode .....................................................................................166
To configure logging attributes ....................................................................................167
To view the QoS monitoring information .....................................................................168
To refresh the QoS monitor data .................................................................................168
To access UPS Status.................................................................................................169
To access the NTP Metrics .........................................................................................169
Monitoring BCM50 Telephony Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
To enable Activity Reporter Basic ...............................................................................172
To disable Activity Reporter Basic ...............................................................................172
To view Trunk Module status.......................................................................................172
To disable or enable a B channel setting ....................................................................174
To provision a PRI B-channel......................................................................................175
To enable the internal CSU .........................................................................................176
To check the performance statistics ............................................................................176
To check the CSU alarms............................................................................................177
To check carrier failure alarms ....................................................................................177
To check bipolar violations ..........................................................................................177
To check short-term alarms .........................................................................................178
To check defects .........................................................................................................178
To view CSU Alarm History .........................................................................................178
To access the CbC limit metrics ..................................................................................179
To access the Hunt Group metrics ..............................................................................181
To access PSTN Fallback metrics...............................................................................182
NN40020-600
Task List
5
To configure PVQM threshold settings ........................................................................184
To access PVQM metrics ............................................................................................187
BCM50 Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
To install BCM Monitor separately from BCM50 Element Manager ............................192
To remove BCM Monitor .............................................................................................192
To start BCM Monitor without the Element Manager...................................................193
To start BCM Monitor from the Element Manager .......................................................193
To connect to a different BCM50 .................................................................................193
To configure static snapshot settings ..........................................................................194
To save a static snapshot ............................................................................................196
To configure dynamic snapshot settings .....................................................................197
To disable monitoring of UIP messages......................................................................204
To log UIP data............................................................................................................204
To view UIP log files ....................................................................................................205
To configure timeout settings ......................................................................................205
To expand a UIP message ..........................................................................................206
To clear UIP message details......................................................................................206
To view all lines ...........................................................................................................207
To view the date and time of minimum and maximum values .....................................210
To reset the minimum and maximum values for a statistic..........................................210
To ping a device ..........................................................................................................211
To perform a trace route ..............................................................................................212
To view Ethernet activity..............................................................................................213
To reboot the BCM50 ..................................................................................................214
To perform a warm reset of BCM50 telephony services .............................................214
To perform a cold reset of BCM50 telephony services................................................215
To set Release Reasons .............................................................................................215
Backing Up and Restoring BCM50 Data . . . . . . . . . . . . . . . . . . . . . . . . . . 217
To perform an immediate backup to the BCM50 .........................................................221
To perform an immediate backup to your personal computer .....................................222
To perform an immediate backup to a network folder .................................................223
To perform an immediate backup to a USB storage device ........................................224
To perform an immediate backup to an FTP server ....................................................224
To perform an immediate backup to an SFTP server..................................................225
To view scheduled backups ........................................................................................227
To perform a scheduled backup to the BCM50 ...........................................................227
To perform a scheduled backup to a network folder ...................................................228
To perform a scheduled backup to a USB storage device ..........................................230
To perform a scheduled backup to an FTP server ......................................................231
To perform a scheduled backup to an SFTP server ....................................................232
To modify a scheduled backup ....................................................................................233
To delete a backup schedule.......................................................................................234
To restore data from the BCM50 .................................................................................237
To restore data from your personal computer .............................................................237
To restore data from a network folder .........................................................................238
To restore data from a USB storage device ................................................................240
To restore data from an FTP server ............................................................................241
To restore data from an SFTP server ..........................................................................242
To restore the factory configuration .............................................................................243
BCM50 Administration Guide
6
Task List
Managing BCM50 Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
To perform an immediate log transfer to a USB storage device..................................249
To perform an immediate log transfer to your personal computer...............................249
To perform an immediate log transfer to a network folder ...........................................250
To perform an immediate log transfer to an FTP server..............................................251
To perform an immediate log transfer to an SFTP server ...........................................252
To perform a scheduled log transfer to a storage location ..........................................253
To modify a scheduled log transfer .............................................................................254
To delete a scheduled log transfer ..............................................................................255
To use the BCM50 Web Page to transfer log files to other destinations .....................256
To extract log files using the Element Manager ..........................................................257
To specify retrieval criteria...........................................................................................259
To filter information in the Retrieval Results table .......................................................260
To view log details for multiple log records..................................................................260
Accounting Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Managing BCM50 Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
To obtain updates from the Nortel Technical Support Web page................................265
To view details about software updates in progress....................................................267
To apply an update from your personal computer .......................................................269
To apply a software update from a USB storage device .............................................270
To apply an update from a network folder ...................................................................271
To apply an update from an FTP server......................................................................272
To apply an update from an HTTP server ...................................................................273
To create a scheduled software update ......................................................................276
To modify a scheduled software update......................................................................277
To delete a scheduled software update.......................................................................278
To view the software update history ............................................................................278
To remove a software update......................................................................................279
To view the BCM50 software inventory .......................................................................280
Management Information Bases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
To access MIB files from the BCM50 Web Page ........................................................283
To access MIB files from the Nortel Customer Service Site ........................................283
List of BCM50 alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
NN40020-600
7
Contents
Chapter 1
Getting started with BCM50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Symbols and conventions used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
How to get Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 2
Overview of BCM50 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
About BCM50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
BCM50 hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
BCM50 applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Management Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
BCM50 interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
WAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Chapter 3
BCM50 Management Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
BCM50 web page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
BCM50 Management Environment and Applications . . . . . . . . . . . . . . . . . . . . . . . . . 33
Managing BCM50 with Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Managing BCM50 with Telset administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Managing BCM50 Voicemail and ContactCenter: CallPilot Manager . . . . . . . . . . 34
Managing Digital Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Programming telephone sets: Desktop Assistant portfolio . . . . . . . . . . . . . . . . . . 35
Performing initialization: Startup Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Monitoring BCM50: BCM Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Managing BCM50 remotely with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Element Manager setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Element Manager window attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Element Manager panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Effective use of Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
BCM50 Administration Guide
8
Contents
Element Manager data features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Element Manager application logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
BCM50 integrated launch of related applications . . . . . . . . . . . . . . . . . . . . . . . . . 64
BCM50 feature licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
BCM50 Help system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Menu bar Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Field-level Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Context-sensitive Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
BCM50 common file input/output processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Comparison of data repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Chapter 4
BCM50 Security Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
System security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Secure network protocols and encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Security audits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Security certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Site authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Additional security capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Chapter 5
BCM50 Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Security Policies panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Configuring system security policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Entry Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Local Authentication Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Authentication Service Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Session Management Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
SSL and SSH Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Setting system access control policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Setting credential complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Setting lockout policy for failed logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Setting password expiry policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Setting password history policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Setting the authentication method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Configuring an authentication server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Setting the idle session timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Uploading a Web Server Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Transferring an SSH Key-Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
NN40020-600
Contents
9
Chapter 6
Managing BCM50 Accounts and Privileges . . . . . . . . . . . . . . . . . . . . . . . . 95
Managing user accounts and user groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
User accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Default passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Default groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Default access privileges excluding set-based privileges . . . . . . . . . . . . . . . . . . . 99
Telset access security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Telset group access privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Blocking user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Accounts and Privileges panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Current Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
View by Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
View by Account: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
View by Account: Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
View by Account: History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
View by Account: Group Membership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
View by Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
View by Groups: General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
View by Groups: Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Configuring user accounts, user groups and privileges . . . . . . . . . . . . . . . . . . . . . . . 118
Adding a new user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Modifying a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Adding callback for a dial-up user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Adding NAT rules for a dial-up user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Adding Telset access for a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Deleting a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Changing a user’s password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Changing the current user’s password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Creating a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Deleting a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Modifying group privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Adding a user account to a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Deleting a user account from a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Re-enable a locked-out user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Enabling and disabling an account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Enabling and disabling exclusive access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Chapter 7
Using the BCM50 Hardware Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
About the BCM50 Hardware Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Viewing and updating information about the BCM50 system . . . . . . . . . . . . . . . . . . 130
BCM50 Administration Guide
10
Contents
Viewing and updating information about the BCM50 main unit . . . . . . . . . . . . . 130
Viewing and updating BCM50 system expansion information . . . . . . . . . . . . . . 131
Viewing and updating other information about the BCM50 system . . . . . . . . . . 132
Viewing information about devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Viewing additional information about the BCM50 hardware inventory . . . . . . . . . . . 134
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Chapter 8
Managing BCM50 with SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Overview of BCM50 support for SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Configuring routers to use Element Manager with SNMP . . . . . . . . . . . . . . . . . . . . . 138
Configuring SNMP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Configuring general SNMP settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Configuring SNMP community strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Configuring service access points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Configuring SNMP trap destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Viewing and modifying SNMP trap destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Auto-SNMP dial-out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Alarm severity levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Chapter 9
Using the BCM50 Fault Management System . . . . . . . . . . . . . . . . . . . . . . 149
Overview of BCM50 fault management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
About BCM50 alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Alarms and log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Alarm severities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Administering alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Using the Alarms Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Using the Alarm Banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Using the alarm set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Alarms and LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Using SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Configuring alarm settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Chapter 10
Using the BCM50 Service Management System . . . . . . . . . . . . . . . . . . . . 161
Overview of the BCM50 service management system . . . . . . . . . . . . . . . . . . . . . . . 161
BCM50 services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Starting, stopping, and restarting services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Chapter 11
Monitoring BCM50 System Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
About the system metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
NN40020-600
Contents
11
QoS Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
UPS Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
NTP Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Chapter 12
Monitoring BCM50 Telephony Metrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Telephony Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Activity Reporter Basic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Trunk Module Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Viewing Performance History information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Viewing D-Channel information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Disabling or enabling a B channel setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Provisioning a PRI B-channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Trunk Module CSU statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Enabling the internal CSU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Checking trunk module alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
CbC limit metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Hunt Group Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
PSTN Fallback Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Proactive Voice Quality Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Chapter 13
BCM50 Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
About BCM Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Installing BCM Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Connecting to a BCM50 system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Using BCM Monitor to analyze system status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Static snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Dynamic snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
BCM Info tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Media Card tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Voice Ports tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
IP Devices tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
RTP Sessions tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
UIP tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Line Monitor tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Usage Indicators tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Using statistical values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Trace Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Ethernet Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
BCM50 Administration Guide
12
Contents
Diagnostic settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Chapter 14
Backing Up and Restoring BCM50 Data . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Overview of backing up and restoring data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Backup and restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Viewing backup and restore activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
About backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
BCM50 backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Backup destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Performing immediate backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Performing an immediate backup to the BCM50 . . . . . . . . . . . . . . . . . . . . . . . . 221
Viewing and performing scheduled backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Modifying and deleting scheduled backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Restoring BCM50 system data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Effects on the system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Chapter 15
Managing BCM50 Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Overview of BCM50 logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Log types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Overview of transferring and extracting log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Transferring log files using the BCM50 Element Manager . . . . . . . . . . . . . . . . . 248
Performing immediate log archive transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Performing scheduled log transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Transferring log files using the BCM50 Web page . . . . . . . . . . . . . . . . . . . . . . . 255
Extracting log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Viewing log files using the Log Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Retrieval Results area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Log Details area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Viewing log files using other applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Chapter 16
Accounting Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Overview of accounting management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
About Call Detail Recording . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Using Call Detail Recording . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
CDR Toolkit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
Chapter 17
Managing BCM50 Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Overview of BCM50 software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
NN40020-600
Contents
13
Obtaining software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Viewing software updates in progress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Applying software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Creating and modifying scheduled software updates . . . . . . . . . . . . . . . . . . . . . 274
Viewing a history of software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Removing software updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
Viewing the inventory of BCM50 software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Appendix A
Management Information Bases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
About SNMP MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
MIB file descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Accessing, compiling, and installing MIB files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Small Site Common MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Small Site Events MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Appendix B
List of BCM50 alarms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
List of BCM50 alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
BCM50 Administration Guide
14
Contents
NN40020-600
15
Chapter 1
Getting started with BCM50
This section contains information on the following topics:
•
•
•
•
•
•
“About this guide” on page 15
“Audience” on page 17
“Acronyms” on page 17
“Symbols and conventions used in this guide” on page 19
“Related publications” on page 20
“How to get Help” on page 21
About this guide
The BCM50 Administration Guide describes how to manage and maintain BCM50 systems at the
Release 3.0 level using Business Element Manager.
Purpose
The concepts, operations, and tasks described in the guide relate to the FCAPS (fault,
configuration, accounting, performance, and security) management features of the BCM50
system. This guide also describes additional administrative tasks, such as log management,
backups, software updates, monitoring, and inventory management. Use the Element Manager to
perform these administrative tasks.
In brief, the information in this guide explains:
•
•
•
•
•
•
•
•
Network structure and concepts
Management tools
Fault management & monitoring
Performance management
Security administration
Backup management
Software updates
Inventory management
Organization
This guide is organized for easy access to information that explains the administrative concepts,
operations and procedures associated with using the BCM50 management application.
BCM50 Administration Guide
16
Chapter 1 Getting started with BCM50
The tasks described in this guide assume that you are using the Element Manager with full
administrative privileges. If you do not have full administrative privileges, you may see only a
subset of the tasks and panels described in this guide.
Table 1 BCM50 Administration Guide organization
Chapter
Contents
Chapter 2, “Overview of BCM50
Administration
This chapter introduces management concepts and techniques.
Chapter 3, “BCM50 Management
Environment
This chapter contains information on the different tools available
to manage your BCM50. It also describes the Element Manager
application in detail.
Chapter 4, “BCM50 Security
Fundamentals
This chapter provides on overview of security on the BCM50
system using Element Manager.
Chapter 5, “BCM50 Security Policies
This chapter describes the system-wide security policies that you
can set on the BCM50 using Element Manager.
Chapter 6, “Managing BCM50 Accounts This chapter describes Accounts and Privileges, which allow you
and Privileges
to manage user accounts and access through Element Manager.
Chapter 7, “Using the BCM50 Hardware This chapter describes how to use the Hardware Inventory, which
Inventory
displays information about the BCM system, such as connected
expansion units, populated Media Bay Modules (MBMs) and
attached telephone devices.
Chapter 8, “Managing BCM50 with
SNMP
This chapter describes the management of the BCM50 using
SNMP. SNMP is a set of protocols for managing complex
networks. SNMP-compliant devices, called agents, store data
about themselves in Management Information Bases (MIBs) and
provide this data to SNMP requesters.
Chapter 9, “Using the BCM50 Fault
Management System
This chapter contains information about managing alarms
generated by the system and administering alarm settings.
Chapter 10, “Using the BCM50 Service
Management System
This chapter describes how to use Element Manager to view and
administer the services that run on the system.
Chapter 11, “Monitoring BCM50 System This chapter describes how to use Element Manager to view
Metrics
detailed information about the performance of the system and of
system resources.
Chapter 12, “Monitoring BCM50
Telephony Metrics
This chapter describes how to use Element Manager to view
detailed information about the performance of telephony
resources.
Chapter 13, “BCM50 Utilities
This chapter contains information about the utilities that are part of
the Element Manager. Several utilities are provided to allow
partners and customers to monitor and analyze the system.
Chapter 14, “Backing Up and Restoring This chapter provides information about how to back up and
BCM50 Data
restore data from the system.
Chapter 15, “Managing BCM50 Logs
This chapter contains information about viewing and managing
log files generated by the BCM50.
Chapter 17, “Managing BCM50
Software Updates
This chapter contains information about managing software
updates.
Chapter 16, “Accounting Management
This chapter describes the management of accounting records in
the BCM50. Account management uses the Call Detail Recording
(CDR) application to record call activity. Each time a telephone
call is made to or from a BCM, detailed information about the call
can be captured in a CDR file.
NN40020-600
Chapter 1 Getting started with BCM50
17
Table 1 BCM50 Administration Guide organization
Chapter
Contents
Appendix A, “Management Information
Bases
This appendix contains information about how to install and use
Management Information Bases (MIBs) if you use SNMP to
manage your system.
Appendix B, “List of BCM50 alarms
This appendix contains a list of alarms generated by the BCM50
system.
Audience
The BCM50 Administration Guide is directed to network administrators responsible for
maintaining BCM networks that include BCM50 devices. This guide is also useful for network
operations center (NOC) personnel supporting a BCM50 managed services solution. To use this
guide, you must:
•
•
•
be an authorized BCM50 administrator within your organization
know basic Nortel BCM50 terminology
be knowledgeable about telephony and IP networking technology
Acronyms
The following is a list of acronyms used in this guide.
Table 1 List of acronyms
Acronym
Description
3DES
Triple Data Encryption Standard
AES
Analog Encryption Standard
AIS
Alarm Indication Signal
BCM
Business Communications Manager
BRI
Basic Rate Interface
CbC
Call by Call
CDR
Call Detail Recording
CFA
Carrier Failure Alarms
CLID
Calling Line Identification
CPE
Customer Premises Equipment
CSU
Channel Service Unit
DES
Digital Encryption Standard
DHCP
Dynamic Host Configuration Protocol
DN
Directory Number
DNIS
Dialed Number Idenification Service
DTM
Digital Trunk Module
BCM50 Administration Guide
18
Chapter 1 Getting started with BCM50
Table 1 List of acronyms
Acronym
Description
ES
Errored Seconds
HTTP
Hypertext Transfer Protocol
IP
Internet Protocol
ISDN
Integrated Switched Digital Network
LAN
Local Area Network
MBM
Media Bay Module
MIB
Management Information Base
MGS
Media Gateway Server
MOS
Mean Opinion Score
MPS
Media Path Server
NAT
Network Address Translation
NCM
Network Configuration Manager
NOC
Network Operations Center
NTP
Network Time Protocol
OOF
Out of Frame
PPP
Point-to-Point Protocol
PRI
Primary Rate Interface
PBX
Private Branch Exchange
PSTN
Public Switched Telephone Network
PVQM
Proactive Voice Quality Monitoring
QoS
Quality of Service
RAI
Remote Alarm Indication
RTP
Real-time Transport Protocol
SFTP
Secure File Transfer Protocol
SNMP
Simple Network Management Protocol
SSH
Secure Shell
SSL
Secure Socket Layer
UAS
Unavailable Seconds
UPS
Universal Power Supply
USB
Universal Serial Bus
VoIP
Voice over Internet Protocol
VLAN
Virtual Local Area Network
VPN
Virtual Private Network
WAN
Wide Area Network
NN40020-600
Chapter 1 Getting started with BCM50
19
Symbols and conventions used in this guide
These symbols are used to highlight critical information for the BCM50 system:
Caution: Alerts you to conditions where you can damage the equipment.
Danger: Alerts you to conditions where you can get an electrical shock.
Warning: Alerts you to conditions where you can cause the system to fail or work
improperly.
Note: A Note alerts you to important information.
Tip: Alerts you to additional information that can help you perform a task.
!
Security note: Indicates a point of system security where a default should be changed,
or where the administrator needs to make a decision about the level of security required
for the system.
Warning: Alerts you to ground yourself with an antistatic grounding
strap before performing the maintenance procedure.
Warning: Alerts you to remove the BCM50 main unit and expansion
unit power cords from the ac outlet before performing any maintenance
procedure.
BCM50 Administration Guide
20
Chapter 1 Getting started with BCM50
These conventions and symbols are used to represent the Business Series Terminal display and
dialpad.
Convention
Example
Used for
Word in a special font (shown in
the top line of the display)
Pswd:
Command line prompts on display telephones.
Underlined word in capital letters
(shown in the bottom line of a two
line display telephone)
PLAY
Display option. Available on two line display
telephones. Press the button directly below the
option on the display to proceed.
Dialpad buttons
£
Buttons you press on the dialpad to select a
particular option.
These text conventions are used in this guide to indicate the information described:
Convention
Description
bold Courier
text
Indicates command names and options and text that you need to enter.
Example: Use the info command.
Example: Enter show ip {alerts|routes}.
italic text
Indicates book titles
plain Courier
text
Indicates command syntax and system output (for example, prompts
and system messages).
Example: Set Trap Monitor Filters
FEATURE
HOLD
RELEASE
Indicates that you press the button with the coordinating icon on
whichever set you are using.
Related publications
Related publications are listed below. To locate specific information, you can refer to the
Master Index of BCM50 Library (NN40020-100).
BCM50 Installation Checklist and Quick Start Guide (NN40020-308)
BCM50 Installation and Maintenance Guide (NN40020-302)
Keycode Installation Guide (NN40010-301)
BCM50 Device Configuration Guide (NN40020-300)
BCM50 Networking Configuration Guide (NN40020-603)
BCM50 Telset Administration Guide (NN40020-604)
BCM50 Telephony Device Installation Guide (NN40020-309)
NN40020-600
Chapter 1 Getting started with BCM50
21
CallPilot Telephone Administration Guide (NN40090-500)
CallPilot Contact Center Telephone Administration Guide (NN40040-600)
BCM50 LAN CTE Configuration Guide (NN40020-602)
BCM50 Call Detail Recording System Administration Guide (NN40020-605)
Digital Mobility System Installation and Configuration Guide (NN40020-306)
How to get Help
This section explains how to get help for Nortel products and services.
Getting Help from the Nortel Web site
The best way to get technical support for Nortel products is from the Nortel Technical Support
Web site:
http://www.nortel.com/support
This site provides quick access to software, documentation, bulletins, and tools to address issues
with Nortel products. More specifically, the site enables you to:
•
download software, documentation, and product bulletins
•
search the Technical Support Web site and the Nortel Knowledge Base for answers to
technical issues
•
sign up for automatic notification of new software and documentation for Nortel equipment
•
open and manage technical support cases
Getting Help over the phone from a Nortel Solutions Center
If you don’t find the information you require on the Nortel Technical Support Web site, and have a
Nortel support contract, you can also get help over the phone from a Nortel Solutions Center.
In North America, call 1-800-4NORTEL (1-800-466-7835).
Outside North America, go to the following Web site to obtain the phone number for your region:
http://www.nortel.com/callus
Getting Help from a specialist by using an Express Routing Code
To access some Nortel Technical Solutions Centers, you can use an Express Routing Code (ERC)
to quickly route your call to a specialist in your Nortel product or service. To locate the ERC for
your product or service, go to:
http://www.nortel.com/erc
BCM50 Administration Guide
22
Chapter 1 Getting started with BCM50
Getting Help through a Nortel distributor or reseller
If you purchased a service contract for your Nortel product from a distributor or authorized
reseller, contact the technical support staff for that distributor or reseller.
NN40020-600
23
Chapter 2
Overview of BCM50 Administration
The BCM50 Administration Guide describes the tools available with which to administer, or
manage BCM50 systems. This section is an introduction to the BCM system and its management
model.
The administration overview information is divided into three categories:
•
•
•
•
About BCM50
BCM50 Management Model
BCM50 Management Interfaces
BCM50 Administration Guide overview
About BCM50
The BCM50 system provides private network and telephony management capability to small and
medium-sized businesses.
The BCM50 system:
•
•
integrates voice and data capabilities, IP Telephony gateway functions, and data-routing
features into a single telephony system
enables you to create and provide telephony applications for use in a business environment
Business Element Manager is the primary management application for BCM50 systems. Formerly
known as the BCM Element Manager, the Business Element Manager manages BCM systems as
well as other devices in Nortel’s SMB portfolio. The Business Element Manager encompasses not
only telephony programming, but also backup management, software update management, and log
management. For more information about the Business Element Manager, see “BCM50
Management Environment” on page 31.
The BCM50 system includes the following key components:
•
•
hardware
applications
BCM50 hardware
The BCM50 system includes the following key elements:
•
•
•
BCM50 main units
BCM50 expansion unit
BCM50 media bay modules (MBM):
— Analog direct inward dialing (ADID)
— BRIM
BCM50 Administration Guide
24
Chapter 2 Overview of BCM50 Administration
—
—
—
—
—
—
—
—
—
—
CTM4/CTM8
DTM
GATM4/GATM8
4x16
ASM8
ASM8+, GASM
DSM16+/DSM32+
G4x16/G8x16
ADID4/ADID8
R2MFC
Main units
The main hardware component in the BCM50 system is the main unit. The six BCM50 models are
divided into two series: standard and BRI. The BRI (or b) series main units include BRI ports that
replace the four analog lines on the standard series. The two series are as follows:
•
Standard series
• BCM50 main unit (with Telephony only)
The BCM50 main unit provides call processing and simple data networking functions. It
provides connections for 12 digital phones, 4 PSTN lines, 4 analog station ports, and 4
connections for auxiliary equipment (auxiliary ringer, page relay, page output, and music
source). The BCM50 main unit does not have a router, but it does have 4 LAN ports: one
is the OAM port for technicians, and the other three are for basic LAN connectivity.
•
BCM50a main unit (with ADSL router)
The BCM50a main unit provides all of the same core functionality as the BCM50 main
unit, and it also has an integrated ADSL router for advanced data applications.
•
BCM50e main unit (with Ethernet router)
The BCM50e main unit provides all of the same core functionality as the BCM50 main
unit, and it also has an integrated Ethernet router for advanced data applications.
•
BRI series (b series)—available only in EMEA and APAC regions
• BCM50b main unit
The BCM50b main unit provides similar functionality to the BCM50 main unit. The
difference is that the BCM50b main unit has two integrated BRI ports that replace the four
analog lines on the RJ-21 telephony connector.
•
BCM50ba main unit (with ADSL router)
The BCM50ba main unit provides similar functionality to the BCM50a main unit. The
difference is that the BCM50ba main unit has two integrated BRI ports that replace the
four analog lines on the RJ-21 telephony connector.
•
NN40020-600
BCM50be main unit (with Ethernet router)
Chapter 2 Overview of BCM50 Administration
25
The BCM50be main unit provides similar functionality to the BCM50e main unit. The
difference is that the BCM50be main unit has two integrated BRI ports that replace the
four analog lines on the RJ-21 telephony connector.
All of the BCM50 main units provide call processing and data networking functions. They also
provide connections for telephones, as well as LAN and WAN connections. You can install
MBMs to provide connections for Public Switched Telephone Network (PSTN) lines. For detailed
information about the main units, see the BCM50 Release 3.0 Installation and Maintenance Guide
(NN40020-302).
Expansion units and media bay modules (MBMs)
In addition to the main unit, the BCM50 system can have up to two BCM50 expansion units. An
expansion unit connects to the main unit and provides additional functionality.
The BCM50 expansion unit is designed to accomodate one media bay module (MBM) that enables
you to connect addtional telephony equipment to the BCM50 system. The MBMs connect with
external devices to implement various types of voice trunks and stations. For detailed information
about expansion units and MBMs, see the BCM50 Release 3.0 Installation and Maintenance
Guide (NN40020-302).
BCM50 applications
BCM50 supports many high-value applications.
You enable applications by entering the appropriate keycodes. Some applications are:
•
•
•
•
•
•
•
•
Voice Messaging for standard voicemail and autoattendant features
Unified Messaging providing integrated voicemail management between voicemail and
common email applications
Fax Suite providing support for attached analog fax devices
Voice Networking features
LAN CTE
Digital Mobility (additional hardware is required)
Meet-me Conferencing
Activity Reporter Basic
Management Model
Whether BCM50 is being installed as a standalone element, is part of a network of many BCM50s,
or is part of a network encompassing both BCM50s and other devices, it is necessary to be able to
perform a range of administrative tasks to keep the system (or systems) providing the services
which they were deployed to provide.
The individual or organization responsible for performing the administration of the system needs
to be able to do some or all of the following types of tasks:
BCM50 Administration Guide
26
Chapter 2 Overview of BCM50 Administration
•
•
•
•
•
•
•
•
•
•
monitor to validate that the system is healthy. For example, power is available, services are
running, CPU and memory are within a normal operating envelope
monitor for fault conditions
monitor link status and utilization
system programming is consistent with the requirements of the services
backups are being kept of the configuration
review logs of operational information
retrieve and view logs containing diagnostic information in the event of a system issue
manage system inventory
manage software updates
make changes to the system configuration to change service definitions or add users including
adding new features through the application of keycodes
The descriptions and procedures in this guide will assist the administrator in performing these
tasks.
The following management model demonstrates how BCM50 manageability is achieved by
breaking the management functions into layers.
At the base of the model is the element itself. In order to be a manageable system, the element
must provide not only the ability to configure services, but must also regulate access to the system
by administrative users, generate alarms in the event of issues, support the easy addition of new
features through the application of keycodes, provide a means for making a backup of the
configured data, and other administrative functions.
The management tools at the next layer provide a user interface to control these functions for a
selected BCM50 device. The primary management application for BCM50 is the Element
Manager, complemented by other management applications as explained in “BCM50
Management Environment and Applications” on page 33. For BCM releases prior to 4.0, the
management application is Unified Manager.
If the BCM50 is one of a number of elements in a network, network management tools at the
network management layer facilitate monitoring and management across the network. Nortel
provided tools such as Enterprise Network Management System (ENMS) for network monitoring,
and third party tools supporting multi-vendor networks, can only deliver their value if the managed
element itself has provided for the right functions at the manageable systems layer.
Also at the network layer, system and configuration management tools can provide support for
tasks such as bulk distribution of selected configuration information, network wide inventory
management and network wide backup management. The Network Configuration Manager
(NCM) server-based management application provides these and other capabilities for managing a
network of up to 2000 BCM50 devices. For more information about NCM, please consult the
NCM User documentation.
NN40020-600
Chapter 2 Overview of BCM50 Administration
27
Figure 1 BCM50 network management model
Network Management Layer
•
•
•
•
•
Event & Alarm Mgmt
Infrastructure access
Performance & optimization
Communications
QoS Monitoring
System & Config
Management Layer
• Multi-site configuration
• Asset inventory mgmt
• Bulk MACs
Element Management Tools
•
•
Troubleshoot events & alarms
Backup & restore
•
•
Add features with keycodes
Configuration & administration
Manageable Systems & Endpoints
•
•
•
User applications & capabilities
Event / alarm generation
System data / traffic
•
•
•
User access
Threshold settings
Keycodes
“BCM50 enterprise network model” on page 28 shows an example BCM50 enterprise network,
illustrating the various communications between the BCM50 end devices and management
applications managing end devices. The diagram also shows that the physical enterprise network,
conceptually, is segmented into domains.
The Network Operations Center (NOC) domain represents the tools, equipment and activities used
to analyze and maintain the operation of a network of BCM50 devices. Element Manager and
Network Configuration Manager are the management applications which allow the network
administrators working in the NOC domain to perform the administrative functions. The
management application workstations can be physically distributed across different enterprise sites
if they are networked via an IP network as represented by the cloud in the middle of the figure.
The BCM network domain represents one or more BCM50s located a different sites in the network
connected through an enterprise LAN to one or more management application workstations. The
WAN represents an adjacent network, external to the LAN.
The VoIP and Wireless VoIP domains represent terminating IP devices.
BCM50 Administration Guide
28
Chapter 2 Overview of BCM50 Administration
Figure 2 BCM50 enterprise network model
NOC Domain
Network
Configuration
Manager (NCM)
BCM Network Domain
NCM
Server
Network
Solutions
VoIP
Wireless VoIP
NCM
Database
Element Manager
Workstation
WAN
SNMP Network
Manager
Workstation
PSTN
V.90
Modem
SNMP Network
Manager Server
Remote
Dialup
BCM50 interfaces
The BCM50 network can be distributed geographically across different sites. The network
administrator must be able to remotely access each BCM50 in the network. BCM50 offers
alternatives for connecting to the BCM50 devices depending on the network configuration and
telephony resources available with a given system.
LAN
A Local Area Network (LAN) is a communications network that connects workstations and
computers within a confined geographical area. Often the customer LAN has access to a router,
forming a connection to the Internet.
NN40020-600
Chapter 2 Overview of BCM50 Administration
29
A network administrator can connect to and manage a BCM50 via an IP over LAN interface. If the
administrator is accessing the BCM50 system from an external network, then a connectivity path
would need to be provided from the corporate LAN network to the customer's WAN network or to
the customer's ISP provider over another device such as a router elsewhere on the customer's
premises.
Dialup
The modem supports callback for management user access to the BCM50. It can be used to
support auto-dialout on SNMP traps, as well as automated sending of Call Detail Records (CDR)
to a remote CDR collection point.
Due to modest dialup speeds, the administrator will find that the Element Manager panels take
longer to load than if the Element Manager is directly connected through the OAM port or over a
high bandwidth connection.
Configuration backups can be less than 1 Mbyte in size, however if voicemail greetings and
messages are included they could grow considerably larger. If the performance being realized over
the modem does not meet expectations, the administrator may choose to run backups to the local
hard drive or a USB memory device.
For more information on modem configuration see the BCM50 Networking Configuration Guide
(NN40020-603).
WAN
A Wide Area Network (WAN) is a communications network that covers a wide geographic area,
such as state or country. A WAN usually consists of two or more local-area networks (LANs).
Computers connected to a wide-area network are often connected through public networks, such as
the telephone system, or can be connected through private leased lines.
Management access over dial or BRI ports
You can remotely manage the BCM50 using ISDN BRI. Dial-over-ISDN is supported for any type
of BRI/PRI Media Bay Module (MBM) in an expansion chassis, and is also supported on the main
unit for the BCM50b-series models. On the BCM50b-series only, RJ-45 ports provide connectivity
for BRI trunks from the PSTN.
Protocols
Several protocols are used in the day to day management of a network of BCM50s. These include:
•
•
SNMP (simple network management protocol): Simple Network Management Protocol is the
Internet standard protocol for network management software. It monitors devices on the
network, and gathers device performance data for management information (data)bases
(“MIB”).
HTTPS: A secure version of HTTP implemented using the secure sockets layer, SSL,
transmitting your communications in an encrypted form. HTTPS is used between the Element
Manager and the BCM.
BCM50 Administration Guide
30
Chapter 2 Overview of BCM50 Administration
•
•
FTP (file transfer protocol): FTP is a protocol used to transfer files over a TCP/IP network
(Internet, Unix). FTP allows you to log into FTP servers, list directories, and copy files from
other workstations.
SSH and other protocols are also used for certain tasks. These are covered in the section
“Secure Network Protocols and Encryption” in “Secure network protocols and encryption” on
page 74.
NN40020-600
31
Chapter 3
BCM50 Management Environment
This chapter contains information on the different tools available for managing your BCM50
system. It also describes the Element Manager application in detail. It includes the following
sections:
•
•
•
•
•
•
“BCM50 web page”
“BCM50 Management Environment and Applications” on page 33
“Element Manager” on page 36
“BCM50 feature licensing” on page 65
“BCM50 Help system” on page 66
“BCM50 common file input/output processes” on page 68
BCM50 web page
The BCM50 web page facilitates the download of applications, documentation, and other
information necessary for running the BCM50 and its services. You connect to the BCM50 web
page by typing the IP address of your BCM50 device into your browser. A valid user name and
password are required in order to access the web page.
There are two default user accounts configured on the BCM50 at time of shipping: the nnadmin
user account and the nnguest user account. See Chapter 6, “Managing BCM50 Accounts and
Privileges,” on page 95 for information on user accounts and security.
You can choose to make the nnguest account available to general users. This account can be
configured to provide users with access to download end-user documents and applications that
they require from the BCM50 web page.
The BCM50 web page contains the following links:
•
•
•
•
•
Quick Link - Provides links to frequently used applications, including Mailbox Manager,
Activity Reporter Basic, and CallPilot Manager.
User Applications - Applications listed in Table 2 that are available to the end users of the
BCM50.
Business Applications - Applications listed in Table 2 that are available to business users
of the BCM50.
Administrator Applications - Applications listed in Table 2 that are available to BCM50
administrators.
Documentation - Documentation for the BCM50 end users to explain the end-user
applications and BCM50-specific tasks.
BCM50 Administration Guide
32
Chapter 3 BCM50 Management Environment
The applications available from the BCM50 webpage are supported on Windows XP, Windows
2000 Pro, and Windows Vista operating systems. Some applications, such as BCM Monitor, are
also supported on a Citrix operating system.
Table 2 Applications available on BCM50 web page
Application
User
Administrator
Mailbox Manager
Y
Y
Desktop Assistant Pro
Y
Y
CallPilot Unified Messaging
Y
Y
Personal Call Manager
Y
Y
LAN CTE Client
Y
Y
IP Software Phone 2050*
Y
Y
Mobile Voice Client 2050
Y
Y
Nortel VPN Client*
N
Y
Activity Reporter Basic
N
Y
Activity Reporter
N
Y
Reporting for Contact Center
N
Y
Contact Center Reporting
Server
N
Y
Multimedia Contact Center
N
Y
IP View Softboard
N
Y
User Applications
Business Applications
Reporter Applications
Contact Center Applications
Administrator Applications
Administrator Management Tools
CallPilot Manager
N
Y
Business Element Manager
N
Y
Desktop Assistant Pro AE
N
Y
NCM for BCM
N
Y*
BCM Monitor
N
Y
CDR Clients
N
Y
BCM MIBs
N
Y
SSH Client (PuTTY)
N
Y
BCM Logs
N
Y
Digital Mobility Controller
N
Y
Digital Mobility Service Tool
N
Y
RADIUS Dictionary
Digital Mobility Tools
NN40020-600
Chapter 3 BCM50 Management Environment
33
Table 2 Applications available on BCM50 web page (Continued)
Application
User
Administrator
Startup Profile Template
N
Y
Factory Default Programming
Record
N
Y
Templates
* Provides a description of the application and information about where to find it.
Administrator documentation is provided in English. User documentation is provided in the
following languages:
•
•
•
•
•
•
•
•
•
•
English
French
Danish
German
Spanish
Dutch
Italian
Norwegian
Swedish
Portuguese
BCM50 Management Environment and Applications
A number of tools are available to help manage your BCM50. This section describes the following
tools:
•
•
•
•
•
•
•
•
“Managing BCM50 with Element Manager”
“Managing BCM50 with Telset administration” on page 34
“Managing BCM50 Voicemail and ContactCenter: CallPilot Manager” on page 34
“Managing Digital Mobility” on page 34
“Programming telephone sets: Desktop Assistant portfolio” on page 35
“Performing initialization: Startup Profile” on page 35
“Monitoring BCM50: BCM Monitor” on page 36
“Managing BCM50 remotely with SNMP” on page 36
BCM50 Administration Guide
34
Chapter 3 BCM50 Management Environment
Managing BCM50 with Element Manager
The primary management application for configuring and administering the BCM50 system is the
BCM Element Manager. The BCM Element Manager is a client-based management application
that runs on a Windows computer, or on a Citrix server. The BCM Element Manager allows for
connection to BCM50 devices over an IP network. It is used to configure, administer, and monitor
BCM50 devices. See “Element Manager” on page 36 for more information about the BCM
Element Manager.
You can download the BCM Element Manager application from the BCM50 web page. See
“BCM50 web page” on page 31 for a description of the BCM50 web page. The procedure
“Installing Element Manager on a Windows operating system” on page 37 provides detailed steps
for downloading and installing the BCM Element Manager on a Windows computer.
Managing BCM50 with Telset administration
While BCM Element Manager is the primary management application, BCM50 also supports the
programming of telephony and applications areas of BCM50 through set-based administration.
This allows installers, already familiar with this interface, to perform programming from the
keypad of any telephone connected to the BCM50 device. This alleviates the need for access to a
computer at the customer site. For more information about using Telset programming on the
BCM50, refer to the following documents:
•
•
•
BCM50 Telset Administration Guide (NN40020-604)
CallPilot Telephone Administration Guide (NN40090-500)
Contact Center Telephone Administration Guide (NN40040-600)
Managing BCM50 Voicemail and ContactCenter: CallPilot Manager
The integrated voicemail and contact center applications are managed using CallPilot Manager,
which can be launched from Element Manager. This is the same application used to manage
voicemail and contact center applications for the BCM Release 3 software stream. For more
information about using CallPilot Manager, refer to the CallPilot documentation on the BCM50
web page.
CallPilot Manager can be launched only by users with sufficient security privileges. BCM50
administrators must assign privileges. See Chapter 6, “Managing BCM50 Accounts and
Privileges,” on page 95 for more information on security privileges.
Managing Digital Mobility
Digital mobility is managed using applications that you can download from the BCM50 webpage.
Two applications are available:
•
•
Digital Mobility Controller (DMC) OAM program
Digital Mobility Service Tool
NN40020-600
Chapter 3 BCM50 Management Environment
35
You can use the DMC OAM program to configure, operate, and administer the wireless system
through the DMC. Use the Digital Mobility Service Tool to program repeaters and adjust handsets.
For more information about these applications, see the Digital Mobility System Installation and
Configuration Guide (N0000623).
Programming telephone sets: Desktop Assistant portfolio
Element Manager supports the programming of button functions for the digital and IP telephone
sets. Some administrators may want to use the Desktop Assistant family of products to complete
the customization of button programming and generate labels for the telephone sets. The Desktop
Assistant family of applications can be downloaded from the BCM50 web page. Documentation
for these applications is included within the application interface.
The Desktop Assistant family of products consists of:
•
•
Desktop Assistant Pro
Desktop Assistant Pro AE
For more information about Desktop Assistant tools, see the BCM50 Device Configuration Guide
(NN40020-300).
Note: You require a LAN CTE keycode to operate Desktop Assistant Pro and
Desktop Assistant Pro AE. See the LAN CTE Configuration Guide
(NN40020-602) for more information about installing and using LAN CTE.
Performing initialization: Startup Profile
The Startup Profile is a template that can be edited using Microsoft Excel. It is used to accelerate
the initial installation programming of system-level parameters. It helps bring the BCM50 element
to a basic operational and ready-to-customize state without using either BCM Element Manager or
Telset administration.
The administrator must fill out the Startup Profile template, save it onto a USB storage device and
insert the storage device into the USB port of the BCM50 before the initial start-up. On start-up the
BCM50 reads the information, and starts up with the correct system parameters and feature
licensing already in place.
Some of the parameters included in the Startup Profile are:
•
•
•
•
•
•
•
system name
system profile such as country, telephony template and key voicemail attributes
system IP parameters
system level telephony attributes that automatically create default system DNs
feature licensing
user accounts
modem status
For detailed information on the Startup Profile, see the BCM50 Installation and Maintenance
Guide (NN40020-302).
BCM50 Administration Guide
36
Chapter 3 BCM50 Management Environment
Monitoring BCM50: BCM Monitor
BCM Monitor is a monitoring and diagnostics tool that can monitor BCM systems. It is installed
as part of the BCM Element Manager installation. See Chapter 13, “BCM50 Utilities,” on page
191 for information about the BCM Monitor for BCM50.
Managing BCM50 remotely with SNMP
Simple Network Management Protocol is a standard for network management. BCM50 supports a
number of standard MIBs, including:
•
•
•
•
•
MIB II RFC 1213
Entity MIB RFC 2737
Host MIB RFC 2790
IF-MIB (RFC2863)
SNMP-Framework-MIB (RFC2261)
SNMPv1, v2c and v3 are supported, as well as SNMP traps.
See Chapter 8, “Managing BCM50 with SNMP,” on page 137 for more information about using
Element Manager with SNMP.
Element Manager
The BCM Element Manager is a client-based management application that runs on a Windows
computer or on a Citrix server. The Element Manager allows for connection to BCM50 devices
over an IP network. It is used to configure, administer, and monitor BCM50 devices.
The BCM Element Manager allows you to connect to the BCM50 devices to be managed either
through an IP network connection, or through the craftsperson OAM port on BCM50 devices that
include a craftsperson port.
This section includes the following information on how to install and use BCM Element Manager:
•
•
•
•
•
•
•
NN40020-600
“Element Manager setup” on page 37
“Element Manager window attributes” on page 42
“Element Manager panels” on page 51
“Effective use of Element Manager” on page 52
“Element Manager data features” on page 53
“Element Manager application logging” on page 63
“BCM50 integrated launch of related applications” on page 64
Chapter 3 BCM50 Management Environment
37
Element Manager setup
You must perform a series of tasks before you can begin using BCM Element Manager. This
section contains the following procedures for preparing BCM Element Manager for use:
•
•
•
•
•
•
•
“Installing Element Manager on a Windows operating system”
“Installing Element Manager in a Citrix environment”
“Accessing BCM50 using Element Manager” on page 39
“Adding a BCM50 to the Network Element tree” on page 40
“Finding Network Elements” on page 41
“Disconnecting from an element” on page 42
“Closing the Element Manager” on page 42
Installing Element Manager on a Windows operating system
You can download the BCM Element Manager application from the BCM50 web page and install
it on your computer at any time. However, you cannot connect to a BCM50 with BCM Element
Manager until the BCM50 main unit is installed and running.
The BCM Element Manager has the following system requirements:
•
•
•
Windows: Windows 2000 Pro, Windows XP, or Windows Vista (Business, Ultimate, and
Enterprise versions)
RAM: minimum 256 MB, recommended 512 MB
free space: 150 MB
To install Element Manager on your computer:
1
Connect to the BCM50 web page:
— If the BCM50 is installed on the network use a browser and type in the BCM50 IP address
as the URL in the following format:
http://xxx.xxx.xxx.xxx
— If the BCM50 is installed but not yet configured, connect directly to the BCM50 through
the OAM port and, using a browser, type the following:
http://10.10.11.1/
2
Enter the user name and password to be authenticated on the BCM50 web page. See Chapter
6, “Managing BCM50 Accounts and Privileges,” on page 95 for information on default user
and passwords.
3
Select the Administrator Applications link.
4
Select the Business Element Manager link from the Administrator Applications web page.
5
Select the Download Element Manager link from Element Manager download page.
6
Select the Open button on the File Download dialog box to download and install the BCM50
Element Manager on your computer.
7
Follow the prompts to install the Element Manager and BCM Monitor on your computer.
BCM50 Administration Guide
38
Chapter 3 BCM50 Management Environment
If an older version of Element Manager is already installed on your computer, you can choose
to update the existing installation, or perform a new installation. If you choose to perform a
new installation, you can copy the existing resources to the new installation, including the
device tree, cartridges, and user preferences.
BCM Monitor replaces any older versions of BCM Monitor already installed on your
computer.
8
Once the BCM50 Element Manager is installed, find the BCMEM.exe icon where you
installed it. Nortel recommends that you use the default location. The default installation
location is
C:\Program Files\Nortel\BCM50\BCMElementManager\bin\. Double-click on the
BCMEM.exe icon to launch the Element Manager.
9
When the initial Element Manager window appears, take some time to orient yourself with the
various parts of the basic display. Refer to “Element Manager window attributes” on page 42.
10 Next steps:
•
•
If the BCM50 you want to connect to is installed and has been booted up (both LEDs should
be solid green), connect your computer to either the craftsperson OAM port on the BCM50, or
to the IP network that connects to the BCM50.
Set up the BCM50 as a device in the Network Elements tree. See “Adding a BCM50 to the
Network Element tree” on page 40 for information.
Installing Element Manager in a Citrix environment
You can run Element Manager in a Citrix environment, using the following software:
•
•
•
Windows 2000 Server SP4 (fully patched)
Citrix Metaframe XP Feature Release 3
Citrix Program Neighborhood Version 7.0
When you run Element Manager in a Citrix environment, the Element Manager is installed on a
Citrix server. Users then run Citrix Program Neighborhood to connect to the server and launch the
Element Manager.
Element Manager is designed for single-user environments. A single installation of Element
Manager will extend the same user preferences to any Citrix user, including the device list and any
saved passwords. Citrix administrators can ensure a secure environment by using one of the
following approaches:
•
•
install a copy of Element Manager for each user or group of users in different folders, with
Windows permissions set for the folder to control access
in cases where a shared device tree is permitted, ensure that users do not save passwords, but
instead enter a password each time they connect
To install Element Manager on a Citrix server:
1
From the Citrix server, connect to the BCM50 web page:
— If the BCM50 is installed on the network use a browser and type in the BCM50 IP address
as the URL in the following format:
NN40020-600
Chapter 3 BCM50 Management Environment
39
http://xxx.xxx.xxx.xxx
— If the BCM50 is installed but not yet configured, connect directly to the BCM50 through
the OAM port and, using a browser, type the following:
http://10.10.11.1/
2
Enter the user name and password to be authenticated on the BCM50 web page. See Chapter
6, “Managing BCM50 Accounts and Privileges,” on page 95 for information on default user
and passwords.
3
Select the Administrator Applications link.
4
Select the BCM50 Element Manager link from the Administrator Applications web page.
5
Select the Download Element Manager link from Element Manager download page.
6
Select the Open button on the File Download dialog box to download and install the BCM50
Element Manager on your computer.
7
Put the Citrix server in install mode by selecting Add/Remove Programs > Add New
Program > CD or Floppy, or by entering the change user/install command from the
DOS prompt.
8
Follow the prompts to install the Element Manager and BCM Monitor on your computer.
If an older version of Element Manager is already installed on your computer, you can choose
to update the existing installation, or perform a new installation. If you choose to perform a
new installation, you can copy the existing resources to the new installation, including the
device tree, cartridges, and user preferences.
BCM Monitor replaces any older versions of BCM Monitor already installed on your
computer.
9
Put the Citrix server in execute mode by closing the After Installation window, or by entering
the change user/execute command from the DOS prompt.
10 Publish the Element Manager application to make it available to the users using
standard Citrix application publishing.
Accessing BCM50 using Element Manager
The first time BCM Element Manager opens it displays two panels. The Element Navigation Panel
located on the left, enables you to create a definition within Element Manager for each BCM50 to
be managing using BCM Element Manager. You can then use the icons for the elements defined
within the Element tree to perform various functions associated with that element, such as
connecting to the element or viewing log files associated with that element.
BCM50 Administration Guide
40
Chapter 3 BCM50 Management Environment
Creating folders for network elements
Before you add a BCM50 to the network element tree, you can create folders and subfolders to
organize the devices in your network.
1
While disconnected from the BCM50 device, click the New Folder icon on the task bar. You
can also right-click on Network Elements in the Network Element Navigation panel, and
select New Folder.
2
Right-click on the new folder and select Rename.
3
Enter a name for the folder.
Adding a BCM50 to the Network Element tree
Before you can connect to a BCM50, you must define it in Element Manager as a Network
Element.
1
Select Network Elements from the Network Element Navigation panel, or, if you have
defined subfolders, select the subfolder where you want to save the device.
You can define subfolders by right-clicking on Network Elements and selecting New Folder.
If you want to move devices between folders they must be deleted from the old folder and
recreated in the new folder.
2
Select Network from the menu bar or right-click on the folder heading.
3
Select New Network Element > Business Communications Manager.
4
In the Business Communications Manager Entry dialog box, enter the IP address for the
new network element.
5
Enter the Read-Write Community String, if it is present.
The Read-Write Community String is only present if SNMP is enabled. SNMP is disabled
by default. The default SNMP Read-Write Community String is public. Contact your
system administrator to find out the correct SNMP community string to use. See Chapter 8,
“Managing BCM50 with SNMP,” on page 137 for more information about SNMP community
strings.
6
Click OK to exit the dialog box.
An icon representing the newly defined element with its associated IP address appears on the
Network Elements tree.
Note: If you want to change the IP address to a name or other type of
identification, triple-click the IP address or right-click once on the IP address.
Once the field becomes editable, type in the new information.
Refer to Element Manager window attributes on page 42 for a detailed description of the common
Element Manager window elements.
Next steps: Proceed to Connecting to a BCM50 element on page 41.
NN40020-600
Chapter 3 BCM50 Management Environment
41
Finding Network Elements
You can search for a group of BCM50s located on the same subnet by using Find Network
Elements. This function uses SNMP to search for all of the BCM50s in the specified IP address
range and add them to the Element Navigation tree. Only BCM50s with SNMP enabled will be
detected. This tool saves time when trying to quickly populate Element Manager with previously
deployed BCM50s for the first time.
Use the following procedure to find network elements:
1
Right-click the Network Elements icon in the Element Navigation Panel.
2
Select Find Network Elements > Business Communications Manager.
The Network Device Search dialog box appears.
3
Enter the Start of IP Address range and press the tab key.
4
Enter the End of IP Address range and press the tab key.
5
Enter your user name in the User ID field and press the Tab key.
6
Enter your password in the Password field.
7
Click on the OK button
The Element Manager searches for the IP addresses specified in the range.
•
•
If the search is successful, the BCM50s found within the IP address range are added to
Network Elements tree in the Element Navigation Panel.
If the search is unsuccessful a Network Elements dialog box appears stating No network
elements found.
Connecting to a BCM50 element
Use the following steps to connect to your BCM50 once it is defined in the Element Manager:
1
On the Network Elements tree, select the element to which you wish to connect by selecting
the IP address or element name as it appears in the Network Element tree.
Login fields appear in the Information panel.
2
Enter your log in credentials for the BCM50 to which you are trying to connect.
3
Perform one of the following tasks to connect to the BCM50:
•
•
Click the Connect icon on the Icon toolbar
Right-click on the IP address or element name and select Connect
The Element Manager attempts to connect to the selected element.
— If the connection is successful, Element Manager opens the Configuration and
Administration tabs associated to the selected device. See “Element Manager panels”
on page 51 for an explanation of the Element Manager screen layout.
— If the Element Manager fails to connect, an error message appears, describing the
connection problem. Correct the problem and perform the steps again. If you have a
recurring problem, contact Nortel Support for help in resolving the problem.
BCM50 Administration Guide
42
Chapter 3 BCM50 Management Environment
Disconnecting from an element
You can disconnect Element Manager from a BCM50 by using one of the following:
•
•
Disconnecting in the Element Navigation Panel on page 42
Disconnecting through the menu bar on page 42
Disconnecting in the Element Navigation Panel
1
Right-click the IP address that you want to disconnect, in the Network Element Navigation
Panel.
2
Select Disconnect.
3
Click Yes in the Confirmation dialog box to confirm the disconnect request.
Disconnecting through the menu bar
1
Click Session on the menu bar.
2
Select the IP address of the device you want to disconnect.
3
Select Disconnect from the list of tasks that are displayed.
4
Click Yes in the Confirmation dialog box to confirm the disconnect request.
Warning: Clicking the X box on the upper right corner causes the Element
Manager application to close and all current sessions with BCM50 devices are
terminated. Do not click on the X box to disconnect Element Manager from its
current session.
Closing the Element Manager
To close the Element Manager select File > Exit, or click on the X box on the upper right corner of
the window. Close all active sessions before you close the Element Manager application.
Element Manager window attributes
The initial Element Manager window has several attributes that appear regardless of whether the
Element Manager is actively connected to a network element. Although all of the network
elements appear, some of the menu options may not be available for the selected device,
depending on the device’s state.
The following sections describe the menus and information available on the Element Manager
panel:
•
•
•
•
•
Initial panel details on page 43
Information displayed for unconnected elements on page 46
Information displayed for connected elements on page 47
Configuration task navigation panel details on page 48
Administration task navigation panel details on page 50
NN40020-600
Chapter 3 BCM50 Management Environment
43
For information about navigating the panels and tables of the Element Manager, see Element
Manager data features on page 53.
Initial panel details
Figure 3 on page 43 shows the initial panel of a newly-installed Element Manager. At this point,
no network elements have been defined, and the Element Manager is not connected to any
elements.
Figure 3 Element Manager Window - no defined Elements
Table 3 lists and describes the initial Element Manager window.
Table 3 Initial Element Manager window attributes
Element
Description
Title bar
When you connect to a device, this area indicates the type of device (Nortel
Networks BCM50 Element Manager - Network Elements) and the IP address for
the connected device.
Menu bar
The items on the menu bar are static, however, some items may be greyed out
at various stages.
File
This menu provides two selections:
• Exit: a standard exit prompt that closes the Element Manager application.
You can also click on the X box on the upper right corner of the window or
click Ctrl-X
• View Network Element Logs: opens a dialog box that allows you to search for
and to view logs that are available for the connected element.
BCM50 Administration Guide
44
Chapter 3 BCM50 Management Environment
Table 3 Initial Element Manager window attributes (Continued)
View
This menu provides three selections:
• Preferences: Allows you to choose a different appearance for the Element
Manager window.
• Network Elements: Enabled by default. If you uncheck this setting, the
Network Elements panel closes (far left panel). This does not disconnect any
connected device.
• Refresh (F5): Allows you to refresh the data shown on the window.
Network
This menu is not available when a connected device is selected.
When the Network Elements folder icon is selected in the Network Elements tree
the following options are available:
• New Folder: Allows you to create a new folder on the Network Elements tree.
Folders allow you to organize your devices.
• New Network Element: Allows you to create a new entry under the Network
Elements tree. This menu item opens up a dialog box that allows you to
enter access parameters for a new Business Communications Manager
device to which you want to connect. Once you have connected to the
device, this information is saved by Element Manager and the device
remains present in the Network Elements tree. Required information is the IP
address for the device with which you want to connect.
• Find Network Elements: Opens a search dialog box that allows you to do
search for devices within a range of IP addresses by using an SNMP query.
This function only locates BCM50s that have SNMP turned on (by default,
SNMP is turned off).
When an unconnected device is selected in the network element tree, the
following options are available under the Network selection:
• Delete: Allows you to delete the original entry in the Element Manager
network element tree and create a new instance of a network element in the
tree with a new IP address. If the IP address of the device changes, you
must delete the original entry in the Element Manager network element tree
and create a new instance of a network element in the tree with a new IP
address.
• Connect: When selected, Element Manager attempts to open a connection
to the selected element. You can also connect to a network element by
right-clicking on the selected element.
• Webpage: When selected, shows the web page for the selected device.
• Validate Device: When selected, interogates the device and check for any
changes.
Session
Allows you to select actions for any of the network elements to which there is a
currently active Element Manager session. If there are no active Element
Manager sessions, then this selection will be greyed out.
• Show: If multiple devices are connected, allows you to easily select one of
the connected elements from the presented list and switch the active
Element Manager view to that element.
• Disconnect: Allows you to disconnect from the device. A warning dialog box
is presented asking if you really want to disconnect from the device. You can
also disconnect from a device by right-clicking on the device in the network
element tree and selecting "Disconnect". The Element Manager remains
open.
• Save Programming Record: Allows you to save programmed information in
either Microsoft Excel format or HTML.
NN40020-600
Chapter 3 BCM50 Management Environment
45
Table 3 Initial Element Manager window attributes (Continued)
Tools
This selection provides a point from which tools relevant to the selected element
can be launched. This prompt is only active when a connected device is selected
on the Network Elements tree.
• BCM Monitor: This is a separate application, which can be installed at the
same time as Element Manager and provides a number of panels that
display current system operational information.
Help
Provides information to assist in using the Element Manager.
• PDF Documents: Provides a link to the documentation interface, on the
Business Communications Manager web page, where you can find various
PDF books describing the BCM50system and programming.
• Contents: Provides a link to the help system.
Note: A brief function description appears when you mouse over field
headings. You can also access help contents by clicking on a heading and
pressing F1. Refer to “BCM50 Help system” on page 66 for more details on
Element Manager help available.
• Application Log: Collects messages generated by the Element Manager
during normal operations.
• Customer Support: Provides a link to a Nortel Networks customer support
web site.
• About: Provides information about the Element Manager, such as the
Element Manager Release level.
Icon Toolbar
Icons are available if the Network Elements folder is at the top of Network
Elements tree or if an unconnected device is selected.
• Exit: Click this icon to exit BCM.
• Cut: Select a network element and click this icon to mark that netowrk
element for cutting.
• Copy: Select a network element and click this icon to mark that netowrk
element for copying.
• Paste: With no network element selected, click this button to paste a cut or
copie network element into the list of available network elements.
• Webpage: Click this button to show the web page for the selected device.
• Validate Device: Click this button to interogate the device and check for any
changes.
• Connect: Connects the Element Manager to the selected device.
• Delete: Allows you to delete the selected device from the Network Elements
tree.
• New Folder: Adds a new folder under the Network Elements tree. This icon
only works when the Network Elements title is selected.
BCM50 Administration Guide
46
Chapter 3 BCM50 Management Environment
Table 3 Initial Element Manager window attributes (Continued)
Network Elements
navigation panel
This panel contains the Network Element Navigation tree which displays devices
and groups of devices (folders).
• The following actions are available in the Network Element navigation panel:
Add items: Add Network Elements or folders by right-clicking, or use the
selections under the Network menu or the Icon tool bar.
Delete items: Select the device or folder and right-click, or use the selections
under the Network menu or the Icon toolbar.
Connect/Disconnect: Select the device and right-click, or use the selections
under the Network menu or the Icon tool bar.
• The following actions are available if you right-click on an network element
listed in the Network Element Navigation tree.
Connected items - Disconnect or view logs
Unconnected items - Connect, delete, or view logs
• You can rename a folder or a network element by triple-clicking it or by
right-clicking the network element and updating the name when the name
field opens for editing.
Information panel
The information in the Information panel changes depending on what is selected
in the Network Elements tree.
• If a network element is selected that is not connected: The information panel
shows the network element connection login information. Refer to
Information displayed for unconnected elements on page 46.
• If a network element is selected to which there is an Element Manager
connection: The task panel opens and shows Configuration and
Administration tabs. Refer toInformation displayed for connected elements
on page 47 for an example of the presentation of the information by Element
Manager.
Status bar
The bottom bar of the Element Manager window displays the current status of
the selected item.
Expansion Arrows
Clicking on these arrows will either expand or collapse the panels within the
Element Manager window. These arrows appear on all panels that have
sub-panels that can be expanded or collapsed.
Information displayed for unconnected elements
When you select a device in the Network Element tree to which there is currently no active
Element Manager connection, a panel is shown with a number of fields relevant to the selected
device. Some of this information does not appear until you have successfully connected to the
element with Element Manager.
Figure 4 on page 47 shows the right-hand panel in Element Manager when an unconnected
network element is selected.
The fields on this panel are described in Table 4.
NN40020-600
Chapter 3 BCM50 Management Environment
47
Figure 4 Information display for unconnected network element
Table 4 Unconnected network element information
Field
Description
IP Address
The IP address of the selected device.
Read-Write Community String
The current community string for the selected device (shown if SNMP is
enabled).
User Name
Name of an authorized BCM50 user account.
Password
A valid password associated to the User Name.
Information displayed for connected elements
BCM Element Manager displays two panels to the right of the Network Elements navigation panel
once a BCM50 element has been connected:
•
•
Task Navigation panel
Information panel
Figure 5 shows the panels displayed in the Element Manager when it is connected to a BCM50.
The Task Navigation panel contains the Configuration tab and the Administration tab. See
“Configuration task navigation panel details” on page 48 for information contained in the
Configuration navigation tree. See “Administration task navigation panel details” on page 50 for
information contained in the Administration navigation tree.
BCM50 Administration Guide
48
Chapter 3 BCM50 Management Environment
Figure 5 Element Manager window when connected to a BCM50
Configuration task navigation panel details
The Configuration task navigation panel contains the Configuration task tree that allows you to set
up and configure your BCM50 and the attached devices.
Table 5 lists the tasks in the Configuration task tree and describes the task functions available
within the information panel when the task is selected.
Table 5 Configuration task navigation panel headings
Navigation tree heading
Description
Weclome
View information about the current user session, such as account
notifications, user ID, and authentication method.
System
Identification
View system information.
Date and Time
View and set current date and time including selection of time source.
Keycodes
Retrieve, view, and manage keycodes.
IP Subsystem
View information about the IP subsystem.
Administrator Access
Accounts and Privileges
Manage users, groups, and privileges.
Security policies
Manage passwords and other security policies, including authentication
methods.
SNMP
Manage SNMP settings, and trap destinations.
Resources
Application Resources
NN40020-600
Reserved resources as well as resources in use.
Chapter 3 BCM50 Management Environment
49
Table 5 Configuration task navigation panel headings (Continued)
Media Gateways
Manage level of Echo cancellation and T.38 UDP redundancy for all
media gateways.
Port Ranges
Add or delete Ports for IP Telephony.
Telephony Resources
Manage location, type and status of both physical and virtual modules
including media gateways, IP trunks, and Sets.
Dial Up Interfaces
View and modify settings for dial up interfaces, such as types,
protocols, and modem parameters.
Telephony
Global Settings
Feature Settings
Manage feature settings and timers.
Advanced Feature
Settings
Manage SWCA, ONN Blocking, Silent Monitor and Call Log Space.
IP Terminal Features
Add or delete features and view List of Key Labels.
System Speed Dial
Manage speed dial numbers with bypass restrictions.
CAP Assignment
View Cap number and set DN.
Sets
Active Sets
Manage line access, capabilities, preferences, and restrictions of set
DNs
Active Application
DNs
Manage line access, capabilities, preferences, and restrictions of
application DNs
Inactive DNs
Manage line access, capabilities, preferences, and restrictions of
inactive DNs
All DNs
Manage line access, capabilities, preferences, and restrictions on all
system DNs
Lines
Active Physical Lines
Manage active physical line parameters
Active VoIP Lines
Manage active VoIP line parameters
Target Lines
Manage target line parameters
Inactive Lines
Manage inactive line parameters
All Lines
Manage all lines
Loops
View type, protocol, sampling, ONN blocking for BRI lines
Scheduled Services
Manage scheduled service and list of possible services
Dialing Plan
General
Manage settings, access codes and direct dial sets
DNs
Manage DNs
Public Network
Manage settings, DN lengths, and carrier codes
Private Network
Manage settings, MCDN, VoIP IDs, ETSI
Line Pools
View pool and access code
Routing
Ring Groups
Add or delete routes and destination codes
Manage group membership and line settings.
Call Security
BCM50 Administration Guide
50
Chapter 3 BCM50 Management Environment
Table 5 Configuration task navigation panel headings (Continued)
Restriction Filters
Add or delete restrictions and exceptions for restrictions.
Remote Access
Packages
Add or delete line pool access.
Class of Service
Manage passwords for class of service as well as restrictions.
Hospitality
Manage general administration, wake-up call settings, call restrictions,
and room settings.
Hunt Groups
Manage group members and line assignment.
Call Detail Recording
Manage report options and data file transfer settings.
Data Services
DHCP Server
Manage general DHCP server settings, IP ranges, and lease info.
Router
Configure router settings.
Applications
Voice Messaging/Contact
Center
Record remote voice mail system access numbers or connect to local
CallPilot applications. Launch CallPilot Manager.
Meet-Me Conferencing
Configure the Meet-Me Conferencing application and set class of
service controls.
LAN CTE
Manage clients, add or delete privileges.
Music
Manage music settings.
Administration task navigation panel details
The Administration task navigation panel contains the Administration task tree that provides
access to the BCM50 that allows you to monitor and maintain your BCM50.
Table 6 lists the tasks in the Administration task tree and describes the task functions available
within the information panel when the task is selected.
Table 6 Administration task navigation panel headings
Navigation tree heading
Description
General
Alarms
View alarm details, clear alarm log or reset LEDs
Alarm Settings
View alarm details and test alarms
SNMP Trap Destinations
Add, delete or modify trap destinations
Service Manager
Start, stop or restart Services (only use this feature when directed
by Nortel Networks support, as improper use can affect system
operation)
Hardware Inventory
Manage general information for attached BCM50 systems and
devices
System Metrics
QoS Monitor
Manage Quality of Service monitor modes, logging and mean
opinion scores
UPS Status
Manage uninterrupted power supply status, events and metrics
NTP Metrics
Manage network time protocol metrics synchronization details
NN40020-600
Chapter 3 BCM50 Management Environment
51
Table 6 Administration task navigation panel headings (Continued)
Telephony Metrics
Activity Reporter Basic
Enable the collection of data and set the collection time
Trunk Module Metrics
Run loopback test on trunk modules
CbC Limit Metrics
View (Call by Call) logs of denied calls
Hunt Group Metrics
Reset metrics by hunt group
PSTN Fallback Metrics
Reset PSTN fallback metrics
PVQM
View voice quality metrics.
Utilities
BCM Monitor
Launch BCM Monitor
Ping
Send an ICMP packet to the selected switch to see if it is
reachable on the network
Trace Route
Perform a trace route to specified IP address
Ethernet Activity
View Ethernet activity on ports
Reset
Perform a reboot of BCM50 or either a warm or cold reset of
telephony services or router
Diagnostic Settings
Set release reasons for ISDN or VoIP calls
Backup and Restore
Backup
Perform immediate or scheduled backups
Restore
Restore Administration or Configuration settings
Logs
Log Management
Perform immediate or scheduled log transfers. Types of logs are
configuration change, security, alarm, system, and component
diagnostic
Software Management
Software Updates
Scheduled updates, cancel updates in progress or retrieve new
updates
Software Update History
View details of software updates and remove updates
Software Inventory
View software details
Element Manager panels
The BCM50 Element Manager Configuration and Administration trees group the various tasks and
functions required to configure the BCM50 or perform administrative tasks. When either the
Configuration tab or the Administration tab is selected, the associated task tree provides access to
the information required to complete the tasks. For example, all tasks in the Configuration tab are
configuration tasks, organized by workflow. Various types of administrative tasks are presented in
the Administration tab, such as monitoring alarms or performing backups.
Some tasks have multiple tabs within the Information panel. Information on the panels may be
grouped by related information or tasks.
BCM50 Administration Guide
52
Chapter 3 BCM50 Management Environment
Repetitive information such as line programming, DN programming, and system speed dial is
displayed in table format in the Element Manager. These tables allow you to change the data
display, apply filtering, sort data, or copy information between cells. If there is additional
information or configuration details available for a selected item in the table, an associated details
panel for the selected row appears below the table.
In some cases, further panels can appear beside the main table. This is the case for restriction
filters, for example, where there are three side-by-side panels that are programmed in a progressive
order from left to right.
Tabs that do not apply to a selected item appear greyed out and behind the active tabs.
You can select fields that are not read-only and enter new data either from your keyboard or by
using the drop-down box that appears when a field is selected. Data entered in these fields take
immediate effect, unless otherwise noted on the panel or in pop-up confirmation dialog boxes.
Refer to “Element Manager data features” on page 53 for details about navigating and changing
information.
Effective use of Element Manager
This section describes how Element Manager interacts with data to help the BCM50 administrator
better understand how to interact with the Element Manager.
The view users see depends on the group to which they belong. They may not be able to see all
Element Manager trees or panels. Users assigned to the nnadmin group will have administrator
privileges and can view all panels and trees available through Element Manager. See the Chapter
6, “Managing BCM50 Accounts and Privileges,” on page 95 for more information on grouping
users and assigning privileges.
The BCM50 retrieves task bullet data in real time and in sequential order. Once you select a task
bullet, Element Manager searches for the data to populate the panels and any associated detail subpanels or tables for the task. The first search must complete before Element Manager can start the
search for the data required for the second selected task. The first task data request is not cancelled
by the second task data request. You should only select a second task after the first task request is
completed.
Although there is some data caching done, larger tables take longer to load, as do panels with more
information in them.
Field data is committed by using add or modify buttons in panels that contain the buttons. For
panels without a Commit button use the tab or space keys to leave the field after the data has been
filled in to commit the data.
Administrators have the ability to lock out other users for a maximum of 240 minutes from
Element Manager by using the Enable Exclusive Access function in the Administrator Access >
Accounts and Privileges > Current Account tab. This ensures that there are no other users
creating changes at the same time as the administrator. See Chapter 6, “Managing BCM50
Accounts and Privileges,” on page 95 for more information on how to use Enable Exclusive
Access.
NN40020-600
Chapter 3 BCM50 Management Environment
53
Element Manager data features
The Element Manager arranges repetitive information, such as lines programming, device record
(DN record) programming, and system speed dials into tables of information. You can manipulate
these tables in terms of data display and filtering, sorting and copying information between cells.
Other information that only requires one or two fields is arranged on composite panels that may
have more than one sub-panel. Each sub-panel includes related information.
This section provides the following descriptions:
•
•
•
•
Adding, deleting, and modifying table information on page 53
Copying table information on page 54
Rearranging table information on page 56
Using your keyboard to move around a table on page 59
Adding, deleting, and modifying table information
Some tables automatically list all available records, such as the restriction filters. These are tables
where the number of entries is restricted by the BCM50. Other tables allow you to add or delete
entries. These tables have an Add and Delete button under the table.
When you click the Add button, an add dialog box appears that allows you to enter basic
information, such as a name or DN. When you click OK, the new listing appears on the table, with
the default settings.
To modify table settings: click on the fields that you want to change and use the list to choose a
new setting, or type in the setting. If information in the table is used by more than one panel, a
Modify button may appear. Click on this button to bring up a dialog box where you can change
information, as required.
To delete table settings: click on the row you want to delete from the table, then click the Delete
button. You can select one line, or you can use the Shift or Ctrl buttons to delete a group of entries.
Figure 6 shows examples of how to select table entries for deletion.
BCM50 Administration Guide
54
Chapter 3 BCM50 Management Environment
Figure 6 Deleting table entries
Select one
entry
Use Control key
to select several
entries
Use Shift key
select range
Copying table information
You can copy table information using the copy and paste method on tables that require a large
amount of propagation of duplicate data. For example, tables within the Sets and Lines task tree
items contain the copy and paste functionality.
Use the following steps to copy data within a table:
1
Select the row from table that you want to copy by clicking on it.
2
Press the Copy button
3
Select the row or rows to which you want to paste the information.
You can select multiple rows to paste data in by pressing either the Shift or Ctrl key.
4
Press the Paste button
Either the Paste Set Data or the Paste Line Data dialog box appears depending on whether you
are copying data within the Sets or Lines task tree items. The check boxes within these dialog
boxes change depending on the data selected to copy. Table 7 shows the possible check boxes
that can appear and what type of data will be copied when they are selected
5
Check the check boxes for the types of data that you would like to copy to the selected rows.
6
Select OK to paste the information.
NN40020-600
Chapter 3 BCM50 Management Environment
55
The rows are updated with copied data.
Table 7 Paste Data
Check box title
Settings copied
Control set (Lines, Sets)
•
Control set from the copied
source into the selected
row
Restrictions (Lines, Sets)
•
•
•
•
Set restrictions
Set lock
Allow Last Number Redial
Allow Saved Number
Redial
Allow Link
Line/set restrictions
•
•
Settings not copied
•
•
•
•
•
•
Direct-dial set designation
(which set is the D-Dial set)
CAP/TAP assignment
ExtraDial set designation
Service mode ringing set
designation
Prime set designation for a
line
Hunt group appearance
Trunk Data (Lines, Sets)
•
Data in common between
the copied and pasted
trunks.
•
Data can be copied
between two different trunk
cartridge types
Telco data (Lines, Sets)
•
•
Call Log set (Logging set)
1stDisplay
•
•
Log password
Log space
Buttons (Sets)
•
All programmable set
buttons from the copied set
into the selected row’s
programmable buttons.
Line access (Sets)
•
•
•
•
•
Line assignment
Line pool access
Prime line designation
Number of intercom keys
Answer DNs (unless
Answer button DN is same
as telephone to which is
being copied)
•
Private line appearances
BCM50 Administration Guide
56
Chapter 3 BCM50 Management Environment
Table 7 Paste Data (Continued)
Check box title
Settings copied
Capabilities (Sets)
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
User Preferences (Sets)
•
•
•
•
•
Call Forward No Answer
•
(DN + delay + setting)
•
Call Forward Busy (DN
+setting)
•
DND on busy
Handsfree setting
Handsfree answerback
Pickup group
Paging zone
Paging
Direct-dial (which set is
reached by the D-Dial digit)
Priority calling
Hotline
Auxiliary ringer
Allow redirect
Redirect ring
ATA settings (except Use
ringback setting)
Set name
Use ringback setting under
ATA settings
SM Supervisor
Language choice
Ring type
Calls log options (Auto
logging)
Display contrast
Dialing options (automatic,
pre-dial, standard)
External autodial button
assignments
Internal autodial button
assignments
Programmable button
assignments
Ring volume
User speed dial
CAP/KIM module memory
button
Rearranging table information
There are two ways of changing table information layout:
•
•
Rearranging columns on page 57
Rearranging lines on page 57
NN40020-600
Settings not copied
•
•
•
•
•
•
Chapter 3 BCM50 Management Environment
57
Rearranging columns
You can move columns in a table if you want to temporarily display information in a different
way. Changes to the table layouts are not saved. If you leave the panel, the columns return to the
default order.
To move a column, click and hold the column heading and drag and drop it to another location on
the table.
Figure 7 shows a step-by-step example of how to move a column within a table.
Figure 7 Changing the order of columns in a table
Click and hold on the
column you want to move.
Drag the column to a new position
Column is in new position.
Rearranging lines
If you want to sort table data to make it easier to find information, use the right-click function on
table column headings to open a Sort dialog box. The Sort dialog box allows you to choose how a
table sorts lines of data.
Figure 8 on page 58 shows the Sort dialog box.
Table 8 lists and describes the fields and buttons in the Sort dialog box.
BCM50 Administration Guide
58
Chapter 3 BCM50 Management Environment
Figure 8 Sort dialog box
Table 8 Sort dialog box fields
Attribute
Value
Description
Sort By
Ascending/descending
Choose the column to uses for
sorting table data. This is the
first column the data set is
sorted by.
Then By
None,
Ascending/descending
Choose the column to uses for
sorting table data. This is the
second column the data set is
sorted by.
Then By
None,
Ascending/descending
Choose the column to uses for
sorting table data. This is the
third column the data set is
sorted by.
Table 9 Sort dialog box buttons
Actions
Description
OK
Changes are accepted and the
dialog box closes.
Apply
The table rearranges, based
on the selections, but the
dialog box does not close.
Cancel
No changes are made to the
sort order.
Help
Help link to this page.
NN40020-600
Chapter 3 BCM50 Management Environment
59
Using your keyboard to move around a table
Use the key or the directional arrow keys on your keyboard to move around a table.
Each press moves the cursor to the field to the right. At the end of a
line, the next line is highlighted and the cursor continues moving to
the right.
Each press moves the cursor to the field to the left. At the beginning
of a line, the previous line is highlighted and the cursor continues
moving to the left from the far-right field.
Navigation tree: Moves cursor up/down one heading.
Non-table panels: Moves cursor up/down one heading.
Selected table: moves up/down one line.
Moves cursor to the left/right of the cell. Note that this only works on
the currently-selected line.
Moves forward through the list.
Selected field: brings up the drop-down box icon or the rotary list
icon.
Check box: selects or clears the check box.
Saving programming records
You can create a programming file that contains the current settings of all or part of your Element
Manager data. These files can be saved in either HTML or Excel spreadsheet format. You can
access the programming record in the same way you access any other HTML file or by using
Excel, version 2002 or later, for the spreadsheet format.
A programming record that contains the factory default settings is available in Excel format from
the BCM web page.
Note: It may take several hours to save programming records, depending on the
size of the system. Nortel recommends that you saving programming records
during periods of low system use.
BCM50 Administration Guide
60
Chapter 3 BCM50 Management Environment
Figure 9 shows an example of a programming record saved in HTML format and Figure 10 on
page 61 shows an example of a programming record saved in Excel spreadsheet format.
Figure 9 Programming record in HTML format
NN40020-600
Chapter 3 BCM50 Management Environment
61
Figure 10 Programming record in an Excel spreadsheet
To create this file, you use the Save Programming Record command on the Session menu. The
Save Programming Record provides four menu options.
Figure 11 shows the menu options available.
Figure 11 Session selections for saving programming records
BCM50 Administration Guide
62
Chapter 3 BCM50 Management Environment
Use the following steps to save the data programming:
1
Select the item on the task navigation panel for which you want to save the data into an HTML
report or Excel workbook. An item can be a task item, task bullet, or a folder.
2
Click on Session > device IP address > Save Programming Record > Save Selected Data.
A Save dialog box appears.
Figure 12 Save dialog box
3
In the Save: field choose the path where you want the file stored.
4
In the Files of type: field, choose the format in which you want to save the data (HTML or
Microsoft Excel spreadsheet).
5
Enter a File name. Nortel recommends that you make the current date and system name part of
the file name.
6
Click on Save.
Note: The Save All Data selection can take up to 45 minutes to complete. Your
computer must stay connected to the element during this time, as the Save All
Data function is actively writing into the file specified until the function is
complete.
NN40020-600
Chapter 3 BCM50 Management Environment
63
Element Manager application logging
This section describes the logging performed by Element Manager to generate a record of its tasks.
There is usually no need to monitor Element Manager log activities. However, the log files are
available for troubleshooting should issues arise within the Element Manager operations.
When you select File > View Network Element Logs, you are prompted to open a log file in the
Log Browser. You can use the Log Browser to sort the events in the Application Log.
The BCM50 Element Manager Logs panel has three parts:
•
•
•
Retrieval Criteria - This panel allows you to specify logging criteria, to clear the defined
parameters of a selected criteria, clear all retrieval criteria, retrieve logs based on the specified
criteria, or stop logging.
Retrieval Results - This panel allows you to filter the results shown by retrieving logs based on
selected severity level check boxes.
Log Details - shows the details of the logged message.
You can show or hide the retrieval criteria and log detail panels by clicking on the expansion arrow
beside the panel heading.
See Figure 13 on page 64 for the Application log panel.
BCM50 Administration Guide
64
Chapter 3 BCM50 Management Environment
Figure 13 Application log panel
BCM50 integrated launch of related applications
BCM50 Voicemail and CallCenter applications are managed by CallPilot Manager, and real-time
system activity is monitored with the BCM Monitor. All of these applications can be launched
through buttons provided at an appropriate location in the Element Manager. You can specify
whether you want to pass logon credentials to applications launched from the Element Manager
under View > Preferences > Tool Launch. When you pass logon credentials to these
applications, you do not need to re-enter your password when the BCM Element Manaager
launches them. These applications also have application-based Help systems.
You can launch CallPilot Manager by clicking by the Launch CallPilot Manager button under
Configuration Task > Applications > Voice Messaging/Contact Center.
The Launch CallPilot Manager button is only visible in Element Manager to groups with the
CallCenter privilege assigned to them.
Figure 14 Launch CallPilot Manager button
You can access the BCM Monitor through the Launch BCM Monitor button under
Administration Task > Utilities > BCM Monitor, or you can choose Tools > BCM Monitor.
Figure 15 on page 65 shows the location of the Launch BCM Monitor button.
NN40020-600
Chapter 3 BCM50 Management Environment
65
Figure 15 Launch BCM Monitor button
BCM50 feature licensing
You require a keycode to enable software features on the BCM. The keycode is a 24-digit code
that authenticates the feature or bundle of features you purchased for your BCM50.
To obtain and load a keycode you require the following:
•
•
authorization code for the desired feature to demonstrate proof of ownership
system ID of the system to which you want to apply the new feature
The authorization code is a six-digit code you receive for each of the features you purchase. The
authorization code can be found on the label affixed to the “Keycode information sheet” on the last
page of the Keycode Installation Guide (NN40010-301).
Figure 16 on page 66 shows the Element Manager keycode panel. See the Keycode Installation
Guide (NN40010-301) for details on BCM50 keycodes.
Note: You receive one keycode whether you purchase one feature or a bundle of
features. You receive an authorization code for each feature you purchase. For
example, if you have one feature, you receive one authorization code and one
keycode. If you purchase four features, you receive four authorization codes and
one keycode.
BCM50 Administration Guide
66
Chapter 3 BCM50 Management Environment
Figure 16 BCM50 Keycode panel
BCM50 Help system
The following types of help information are available to you in Element Manager to help you
understand how to program your BCM50:
•
•
•
“Menu bar Help” on page 66
“Field-level Help” on page 67
“Context-sensitive Help” on page 68
Menu bar Help
The menu bar help provides access to the entire Help system, which includes online help and user
manuals in PDF. Table 10 shows the help elements available from menu bar Help.
Figure 17 on page 67 shows the pull-down menu from the Help on the menu bar.
NN40020-600
Chapter 3 BCM50 Management Environment
67
Table 10 Element Manager help elements
Help menu option
Description
Contents
Opens a browser window that shows the help information by contents or index
and allows a search.
Customer Support
Opens a browser to a Nortel Networks customer support web site
About
Provides information about the Element Manager software, such as the build
number.
Figure 17 BCM50 Element Manager menu bar help
Field-level Help
When you position the cursor over a field, a pop-up box provides a brief description of the
information required in the field.
Figure 18 shows an example of a field-level help pop-up box.
Figure 18 Field-level Help
BCM50 Administration Guide
68
Chapter 3 BCM50 Management Environment
Context-sensitive Help
You can view context-sensitive Help by clicking on a navigation tree heading, tab heading, or field
heading of a connected BCM50 device and pressing the F1 function key. This help opens an
HTML page containing overview information or panel descriptions specific to the selected
heading. Once the HTML help module opens, it also provide links to tasks and other features
related to the panel function.
Figure 19 on page 68 shows the HTML page opened when context-sensitive help is selected.
Figure 19 Context-sensitive HTML page
BCM50 common file input/output processes
Many BCM50 tasks require task data to be transferred, to or retrieved from, different destinations
or sources. BCM50 can use the following data repositories when transferring or retrieving task
data:
•
•
•
•
BCM50
personal computer
network folder
FTP server
NN40020-600
Chapter 3 BCM50 Management Environment
•
•
•
69
SFTP server
USB storage device
HTTP/HTTPS server
Table 11 shows the data repositories that can be used for transferring task data to or from your
BCM50 device during a task that requires data input or output.
Table 11 Task data source and destination repositories
Task Data
Repository
Backup and
Restore
Logs
Software
Updates
Keycodes
BCM50
Y
N
N
N
Personal computer
Y*
Y*
Y
Y
Network folder
Y
Y
Y
Y
FTP
Y
Y
Y
N
SFTP
Y
Y
N
N
USB storage device
Y
Y
Y
N
HTTP/HTTPS
Server
N
N
Y
N
* Available only for On Demand request of a task; not available for tasks to be run at a later time.
Comparison of data repositories
Each data repository has its advantages and disadvantages. Use this table to determine which data
repository solution matches your priorities. For example, if security is a primary concern for you,
consider setting up an SFTP or HTTPS server. If you are looking for a data repository solution that
is easy to implement, the BCM50, a personal computer, and a USB drive are all relatively easy to
set up.
Table 12 Comparison of data repository solutions
Task Data
Repository
Ease of Use
Speed
Security
BCM50
H
H
M
Personal computer
H
L/M/H
M
Network folder
M
L/M/H
M
USB
H
H
L
FTP
M
M
L
SFTP
L
L
H
HTTP/HTTPS
L
M
L/H
The following sections contain information to help you choose the best data repository solution for
your environment and provide tips for implementation.
BCM50 Administration Guide
70
Chapter 3 BCM50 Management Environment
The BCM50
Storing information on the BCM50 is quick and easy, but does not protect your data in the event of
damage to the BCM50. It makes an ideal solution in small environments where the BCM50 is the
only computer on site, and where no network resources are available.
Personal computer
Storing information on a personal computer is a safe option either for short-term storage, or for
environments where only one computer is used to access Element Manager. The speed of
transferring information to or from a personal computer is based on the speed of the network.
Similarly, the security of the transfer is based on the security of the network. While this is a good
solution for on-demand transfers, it is not an option for scheduled tasks.
Network folder
A network folder is the only solution that covers backups, logs, software updates, and keycodes.
You must make sure that the folder is set up as a shared Windows resource and the BCM50 is
properly configured to have write access to the network folder. For information on setting up a
network folder, contact your network administrator. Saving information to a network folder can
take a significant amount of time. The speed and security of the transfer are based on the speed and
security of the network. See Table 13 for the information required to use a network folder.
Table 13 Configure Network Folder attributes
Attribute
Action
Network Folder
Enter the hostname or IP address of the network folder.
User Name
Enter the user name associated with the network folder.
Password
Enter the password associated with the network folder.
Directory
Enter the path to the subdirectory, as applicable.
FTP servers
Storing information on an FTP server is similar to storing information in a network folder. It offers
a centrally accessible way to store BCM50 data. The speed of transferring to an FTP server is
based on the speed of your network. Transfers to an FTP server generally have a low level of
security, unless the transfer is set up to run through a VPN.
See Table 14 for the information required to use an FTP server.
Table 14 Configure FTP server attributes
Attribute
Action
FTP or server
Enter the hostname or IP address of the FTP server.
User Name
Enter the user name associated with the FTP server.
Password
Enter the password associated with the FTP server.
Directory
Enter the path to the subdirectory, as applicable.
NN40020-600
Chapter 3 BCM50 Management Environment
71
SFTP servers
The process of using an SFTP server is similar to the process for using an FTP server. However, an
SFTP server has a greater level of security than an FTP server, and more credentials are required to
use an SFTP server. You must set up and manage security keys and certificates, including
generating a SSH key, which you must then install on the SFTP server. For information on using
SFTP servers and generating SSH keys, see Chapter 5, “BCM50 Security Policies,” on page 79.
See Table 15 for the information required to use an SFTP folder.
Table 15 Configure FTP or SFTP Server attributes
Attribute
Action
FTP or SFTP Server
Enter the hostname or IP address of the SFTP server.
User Name
Enter the user name associated with the SFTP server.
Password
Enter the password associated with the SFTP server.
Directory
Enter the path to the subdirectory, as applicable.
USB storage device
Storing information to a USB storage device is a very quick way of saving information, as the
transfers occur much more quickly than network or FTP transfers, depending on the speed of the
USB drive. The USB storage device must be connected to the BCM50. The backup and log
information can be saved only to the top level of the USB storage drive file hierarchy. Transfers
from the BCM50 to a USB storage device are relatively secure, but a USB storage device is small
and can be stolen easily if it is not in a secure location. The USB storage device must be formatted
as a FAT32 drive. The following USB storage devices have been tested and are supported:
•
•
•
•
•
•
SanDisk 512 MB Cruzer Mini USB 2.0 Flash Drive
SanDisk 256 MB Cruzer Mini USB 2.0 Flash Drive
Lexar 512 MB Jumpdrive Sport 2.0/Rubber C
Kingston 256 MB 2.0 DataTraveler Memory (DataTraveler PLUS)
Kingston DataTraveler USB FlashDrive 256 (DataTraveler ELITE)
Apacer 256 MB USB 2.0 HT202 Handy Drive
If your USB storage device is not on this list and you are encountering problems transferring
information to or from the BCM50 device, Nortel recommends using one of the devices listed
here.
BCM50 Administration Guide
72
Chapter 3 BCM50 Management Environment
HTTP/HTTPS server
HTTP and HTTPS servers are available as an option only for software updates. It can be a good
solution if you have many BCM50s that require software updates from a centralized location. See
Table 16 for the information required to use an HTTP or HTTPS server.
Table 16 Configure HTTP or HTTPS server attributes
Attribute
Action
HTTP Server
Enter the hostname or IP address of the HTTP server.
User Name
Enter the user name associated with the HTTP server.
Password
Enter the password associated with the HTTP server.
Directory
Enter the path to the subdirectory, as applicable.
Use HTTPS
Specify whether the server requires SSL
NN40020-600
73
Chapter 4
BCM50 Security Fundamentals
This chapter provides an overview of the BCM50 security policies, and outlines considerations
that network administrators should take into account when setting security policies.
Once you are familiar with the security fundamentals of the BCM50 system, you can establish
system-wide security policies and maintain access security on your system using settings on the
Element Manager. Chapter 5, “BCM50 Security Policies,” on page 79 provides procedures for
setting system-level security that applies to all configured users, for installing the web server
certificate, and for downloading the SSH key-pair. You can then configure accounts and
privileges. Chapter 6, “Managing BCM50 Accounts and Privileges,” on page 95 provides
procedures for managing access to both the Element Manager and to the telset configuration
menus.
This chapter provides an overview of the following topics:
•
system security considerations
•
secure network protocols and encryption
•
security audits
•
firewalls
•
security certificate
•
site authentication
System security considerations
To define security parameters for the system and for users, you must consider what level of
security you need to meet your network security standard. Note that the default security settings
are not set to their maximum secure settings and can be changed to suit your specific requirements.
!
Security Note: Nortel recommends changing all default system passwords after the
system is up and running and operation is verified.
Considerations
Consider the following:
•
Do you want administrative users to be able to access the system through the telset
configuration menus?
BCM50 Administration Guide
74
Chapter 4 BCM50 Security Fundamentals
•
How much access to the Element Manager interface are users allowed?
Access is based on user privileges defined through user group membership. There is one
default Element Manager administrator account, nnadmin. This account has a default telset
user ID and password. There is also a read-only guest default account (nnguest), which does
not have a default telset user ID and password. You can delete the guest account to increase
security if you wish.
•
Do you need to have a temporary account that expires?
•
How long do you want the Element Manager to remain open if there is no input from the user?
•
How long do you want a user account to be locked out after a specified number of incorrect
passwords are entered?
•
How complex do you want user IDs and passwords to be in terms of length and character
requirements?
•
Do you want modem access to use callbacks?
•
Do you require the added security of a private SSL certificate?
Core system configuration, such as resources and network management should be
restricted to an administrator-level account.
Use the group profiles to define other levels of users with access to the headings that
are specific to their task.
This also helps to prevent overlap programming if more than one person is using the
interface at the same time.
!
Dial-in access: Restrict this user group to users who require this interface. If modem
access is not required, the modem interface can be disabled to provide further security.
Note: There is also a Nortel support default user which cannot be
deleted or modified. This account is set up to allow Nortel
troubleshooting technicians to access areas of the system that are not
available to other users. You can change the default challenge key, but be
sure to retain a record of the change so that support technicians can
access your system. For more information, talk to your Nortel service
representative.
Secure network protocols and encryption
The BCM50 uses the following network protocols for Operation, Administration and Maintenance
(OAM) in a secured mode:
•
CIM/XML is the main management protocol used by the BCM50 and is only available
through an authenticated and authorized SSL connection. User access is controlled, based on
assigned privilege levels.
NN40020-600
Chapter 4 BCM50 Security Fundamentals
•
Multiple data transfer protocols are supported for the various applications including, SCP,
SAMBA, and FTP.
•
SSH is used by customer support personnel for troubleshooting purposes only. There are
special authentication parameters for this interface.
75
Security audits
A security log file is created at system startup to record user logins and transactions. This log is
rolled each day and kept until the maximum log size is reached. When the maximum size is
reached, the oldest record is deleted to make room for the newest record. For information about
managing logs, see Chapter 15, “Managing BCM50 Logs,” on page 245.
Administrators can view security logs using the Log Management capabilities found under the
Administration tab.
Each security log record contains:
•
the time of the event
•
the user ID
•
a summary of the action performed in the configchange.systemlog
Firewalls
Secured communications over a WAN require firewall protection. Depending on the hardware
being used and the type of security being employed, specific firewall rules must be set to enable
communication between the BCM50e/a models and the Element Manager.
If the firewall is enabled, add the following rule:
•
Source address: Element Manager IP address or “Any.” This is the IP address of the system
that the Element Manager resides on.
•
Destination address: BCM LAN IP address.
•
Service type: TCP:5989, 443 and 80 (port number for CIM/XML, https, and http)
•
Action: forward
You must configure these services for NAT: OpenWbem, HTTPs, HTTP, and CIM/XML.
Configure them using the following rules:
Table 2
Rule
Services
Name
OpenWbem
HTTP
HTTPS
CIM/XML
Start Port
5989
80
443
5989
BCM50 Administration Guide
76
Chapter 4 BCM50 Security Fundamentals
Table 2
Rule
Services
End Port
5989
80
443
5989
Server IP Address
BCM50 LAN IP
address
BCM50 LAN IP
address
BCM50 LAN IP
address
BCM50 LAN IP
address
Security certificate
The BCM50 is delivered with a generic SSL security certificate. The self-signed certificate that is
included in BCM50 enables SSL encryption functionality, providing the necessary encryption
keys.
There is also a facility to generate SSH certificates which are required in the setup of a SSH server
if SCP is used as a transfer method.
Understanding BCM50 SSL certificate properties
When you first log on to the Element Manager, a security alert appears, which indicates site
validation of the default certificate.
This security alert does not appear if you:
•
•
add a site-specific certificate
suppress the message on your client browser
If you want a site-specific certificate, obtain a site certificate for your system from a CA
(Certificate Authority) vendor. Certificate files must use the .PEM format. When you are provided
with a certificate and a private security key, these must be installed on the BCM50.
!
Security note: Ensure that you maintain a copy of your certificate and private security
keys in a secure place, preferably offsite. This provides you with a backup if your system
ever requires data re-entry.
Site authentication
Site authentication is not provided with the generic SSL certificate. This means that the generic
SSL certificate is not signed by a recognized signing authority.
However, the SSL certificate used by the http server may be upgraded to a customer’s private SSL
certificate, which offers site certification along with the encryption. Site authentication requires
system-specific information such as an IP address, company name, and so on. A site-specific
certificate ensures that when users point their web browser at the SSL web interface, the user is no
longer asked to accept the certificate.
If the default BCM50 generic SSL certificate is used, the user is prompted to accept an unsigned
NN40020-600
Chapter 4 BCM50 Security Fundamentals
77
Additional security capabilities
In addition to the policies described in this chapter, the BCM provides security capabilities such as
NAT, VPN, DoS alert, data communication, DHCP, VLAN, and PPP. This section lists the panels
in the Element Manager where you can configure additional security functions, such as username
and passwords.
Configuration panels
•
SNMP
•
NTP
•
Modem
•
PPP
•
Certificates
•
Telephony scheduled services
•
Telephony call security
•
Hospitality
•
Call Detail Recording
•
DHCP server
•
Router
•
Voice messaging
•
LAN CTE
Administration panels
•
Alarms
•
Alarm settings
•
SNMP trap destinations
•
Service manager
•
Backup and Restore
•
Logs
•
Software Management
Applications panels
•
Desktop Assistant
•
DA Pro
•
i2050 software phone
•
Personal Call Manager
•
LAN CTE Client
•
CDR, BCM Monitor
BCM50 Administration Guide
78
Chapter 4 BCM50 Security Fundamentals
•
NCM
NN40020-600
79
Chapter 5
BCM50 Security Policies
The BCM50 Security Policies panel allows you to establish system-wide security policies. This
chapter describes the security policies that you can configure through the Element Manager.
!
Security Note: This symbol is used throughout this section to indicate areas of possible
security concern, primarily in regard to default settings that could pose a security risk if
they are not changed.
The information in this chapter is organized as follows:
•
Security Policies panel on page 79 describes the fields on the Security Policies panel
•
Configuring system security policies on page 84 provides procedures for setting system-level
security that applies to all configured users, for installing the web server certificate, and for
downloading the SSH key-pair
Security Policies panel
The fields that make up the Security Policies panel are described in this section. When you set
security policies, they apply to the entire BCM50 system rather than to individual users.
BCM50 Administration Guide
80
Chapter 5 BCM50 Security Policies
Figure 20 Security Policies panel
The following table describes the fields on this panel:.
Table 17 Security Policies fields
Attribute
Value
Description
Disable telset login
check box
When selected, specifies when users cannot access the system
through any telset interface. Default: unchecked
Tip: If this is enabled, and DHCP changes the system IP
address, you can determine the new IP address by way of the
OAM port.
Disable post-login
message
check box
When checked, specifies that the post-login security warning
will not open on login. Default: not checked
Post login message
text
Displays the post-login security warning. The warning can be
edited to customize the message for your system.
Entry Policy tab
Nortel Support
NN40020-600
Chapter 5 BCM50 Security Policies
81
Table 17 Security Policies fields (Continued)
Attribute
Value
Challenge key
Show/Hide
Description
Specifies an alphanumeric key. This key is part of the access
information your service technician requires to remotely access
your system. Default: trust no one.
If you change the default string, retain a record of the new string
so that Nortel Technical Support can access your system
during a support service call.
This key must be at least one character long to allow Nortel
support operation.
check box
When checked, displays asterisks to hide the characters used
in the challenge key. Default: not checked.
Local Authentication Policy tab
Credential Complexity
Credential Type
Element Manager:
Alphanumeric
Telset: Numeric
Specifies the variety of characters an alphanumeric password
must have. The required number of each type is defined by the
complexity level.
Note: User IDs are not case-sensitive.
Telset interface passwords must be numerical. Password
complexity for these passwords defines how many unique digits
are required.
Minimum User ID
length
Element Manager:
Alphanumeric 1-32
Telset: Numeric 1-16
Specifies the minimum number of characters that the system
requires for each type of credential.
Minimum password
length
Element Manager:
Alphanumeric 1-32
Telset: Numeric 1-16
Specifies the minimum number of characters that must be
entered for a new password.
Note: Alphanumeric passwords are case-sensitive.
Note: This setting must be the same as or greater than the
complexity level setting.
Example: If you have a complexity level of two, two different
types of characters or two unique numbers, the password must
be at least two characters long.
Password
Complexity Level
(Element Manager)
0
1
2
3
4
Defines the number of character types required for an
alphanumeric password. Default: 3
0: No complexity checks
1: only one character type is required
2: at least two character types are required
3: at least three character types are required.
4: all four character types are required
Note: A password complexity higher than 0 will ensure that the
user name is not used as the password. Check minimum length
setting to ensure that it is equal to or greater than the
complexity level.
Password complexity consists of the following types:
• upper case alphabet (English)
• lower case alphabet (English)
• westernized Arabic numbers
• non-alphanumeric characters ($, !, %, ^, period, comma)
BCM50 Administration Guide
82
Chapter 5 BCM50 Security Policies
Table 17 Security Policies fields (Continued)
Attribute
Value
Description
Password
Complexity Level
(telset interface)
1
2
3
4
5
Specifies the number of unique digits that must be part of a
telset password:
0: No complexity checks
1: one unique digit
2: two unique digits
3: three unique digits
4: four unique digits
5: prevent consecutive numbering
Note: A password complexity higher than 0 will ensure that the
user name is not used as the password. Check the minimum
length setting to ensure that it is equal to or greater than the
complexity level.
Lockout on Failed Logon
Enable lockout
check box
When checked, specifies that enable lockout rules apply to
users.
Lockout counter
digits
Specifies the number of times the user can attempt to enter an
invalid password before the user is locked out. Default: 25; for
increased security, set this number to 5.
Lockout duration
(min)
minutes
Specifies the amount of time after the user is locked out before
they are allowed to login again. Reset the lockout counter to
zero. Default: 30
Lockout counter
reset
minutes
Specifies the number of minutes after a lockout before the
lockout counter is automatically reset to zero. Default: 30
Example: If the lockout counter reset is set at 30 minutes and a
user enters invalid passwords, but does not reach the lockout
counter threshold, then waits 30 minutes before trying again,
the lockout counter resets and begins counting from 1 again.
If the user enters invalid passwords until the lockout counter
threshold is reached, the Lockout duration determines when the
user can sign back onto the system.
Enable password
expiry
check box
When checked, specifies that the account will expire at a
specified time.
Days before
password expire
up to 256
Enter the number of days the a password can remain valid
before it must be changed.
Password Expiry
Warning days before
password expire
Enter the number of days prior to password expiry that a user
will receive notification.
Password History
Enable password
history
checkbox
When checked, the BCM stores a list of previously used
passwords and prevents users from re-using them.
Password history
length
numeric value
Enter the number of previously used passwords to be stored
and checked for this account to prevent password re-use.
Authentication Service Policy tab
NN40020-600
Chapter 5 BCM50 Security Policies
83
Table 17 Security Policies fields (Continued)
Attribute
Value
Description
Account
management
drop down menu
Specifies the method used for authenticating users when they
log in. Options are Local Authentication and RADIUS. If
RADIUS is selected, you must also select the Enabled check
box.
Server priority
Primary
Secondary
Specifies which RADIUS server will be used as the primary
server for authentication, and which server will be used as a
secondary server to authenticate users when the primary server
is unavailable.
Server name
alphanumeric
Name of the RADIUS server.
Server IP address
IP address of the RADIUS server.
Server Port
numeric
Port number of the RADIUS server.
Server shared secret alphanumeric
Key required for the BCM to communicate with the RADIUS
server. Nortel recommends that the key be at least 64
characters in length.
Server message
timeout
numeric
Length of time to wait for the server to respond to a request for
authentication before timing out. Nortel recommends a setting
of 2.
Server retries
numeric
Number of times to retry connecting with the primary server
before using an alternate means of authenticating the user.
Nortel recommends a setting of 2.
Enabled
checkbox
When selected, specifies that RADIUS authentication will be
used. You must also select this check box before the BCM will
use RADIUS authentication.
Session Management Policy tab
Session time out
(min.)
minutes
Specifies the number of minutes a logged-in user account can
be inactive before the system ends the session and logs out the
account. If this field is left blank, the session is only ended when
the user logs off.
User ID
Read-only
Displays the user ID of the active session.
IP address
Read-only
Displays the IP address of the active session.
Login date
Read-only
Displays the login date of the active session.
Active sessions
SSL and SSH Policy tab
SSL
Install Web Server
Certificate (SSL)
Button
Downloads application security certificates to the server where
SSH is running to ensure a secure copy connection for
operations like backup and restore, upgrades and patches.
alphanumeric
Displays an indentifier for the application security certificate.
SSH
Fingerprint
BCM50 Administration Guide
84
Chapter 5 BCM50 Security Policies
Table 17 Security Policies fields (Continued)
Attribute
Value
Description
Button
Opens the file system browser to allow a system-specific
security certificate and the accompanying Private key to be
selected for SSL.
Button
Downloads a public security certificate or an SSH key-pair to an
SFTP server.
Generate new SSH
key-pair
Transfer Public Key
Configuring system security policies
This section provides procedures for setting system-level security that applies to all configured
users, for installing the web server certificate, and for downloading the SSH key-pair. Use the tabs
on the security policies panel to perform the following procedures.
Entry Policy tab
Use the Entry Policy tab to perform the following procedure:
•
“Setting system access control policies” on page 85
Local Authentication Policy tab
Use the Local Authentication Policy tab to perform the following procedures:
•
“Setting credential complexity” on page 85
•
“Setting lockout policy for failed logins” on page 86
•
“Setting password expiry policy” on page 87
•
“Setting password history policy” on page 87
Authentication Service Policy tab
Use the Authentication Service Policy tab to perform the following procedures:
•
“Setting the authentication method” on page 87
•
“Configuring an authentication server” on page 88
Session Management Policy tab
Use the Session Management Policy tab to perform the following procedure:
•
“Setting the idle session timeout” on page 92
NN40020-600
Chapter 5 BCM50 Security Policies
85
SSL and SSH Policy tab
Use the SSL and SSH Policy tab to perform the following procedures:
•
“Uploading a Web Server Certificate” on page 92
•
“Transferring an SSH Key-Pair” on page 93
Setting system access control policies
Setting system access control policies allows the administrator to set system access rules.
To set system access control policies
1
Select Configuration > Administrator Access > Security Policies > Entry Policy.
2
Click in the Disable post-login message box to prevent the Warning message from opening
after login. Leave this box unchecked if you want the Warning delivered.
3
Enter a new warning in the Post-login message box, or leave the default warning in the box.
4
Click in the Disable telset login box to prevent users from having administrating the system
through any telset interface.
5
Use the default Nortel Challenge Key, or enter a new one. If you enter a new Nortel
Challenge Key, make a record of the challenge key you use. Check the Show/Hide box if you
want to display asterisks rather than the characters used in the Challenge Key.
Setting credential complexity
Setting credential complexity allows the administrator to define the rules for password length and
password complexity.
To set credential complexity
1
Select Configuration > Administrator Access > Security Policies > Local Authentication
Policy.
2
In the Credential Complexity section, under the Credential Type column, select the
credential type.
3
Under the Minimum User ID Length column, enter the required number of characters or
digits for a user’s ID.
4
Under the Minimum Password Length column, enter the required number of characters or
digits for the user’s password.
5
Under the Password Complexity Level column, enter a number from 1 to 5 that represents
the password complexity level requirement, or enter 0 if no complexity check is required. For
an alphanumeric password, the level is from 0 to 4. For a numeric password, the level is from 0
to 5.
BCM50 Administration Guide
86
Chapter 5 BCM50 Security Policies
Variable Table
Variable
Value
Complexity Level (Element
Manager)
0: no complexity checks
1: only one character type is required
2: at least two character types are required
3: at least three character types are required.
4: all four character types are required
A password complexity higher than 0 will ensure
that the user name is not used as the password.
The four character types are:
• lowercase letters
• uppercase letters
• numbers
• !^,.@#$%& and spaces
Complexity Level (Telset)
0: no complexity checks
1: one unique digit
2: two unique digits
3: three unique digits
4: four unique digits
5: prevent consecutive numbering (For example,
1935 or 8634971 are valid passwords. Passwords
such as 1234, 3456, 2468, 8642,8765, or 9753
would be invalid.)
Setting lockout policy for failed logins
Setting Lockout on Failed Login allows the administrator to set lockout rules. Administrators can
unlock accounts that have been locked out; see “Re-enable a locked-out user” on page 125 for
more information.
To set lockout policy for failed logins
1
Select Configuration, Administrator Access, Security Policies > Local Authentication
Policy.
2
In the Lockout on Failed Login section, select the Enable lockout check box to enable
lockout capabilities.
3
In the Lockout counter box, enter a number that represents the number of times a user can try
to login with an incorrect password.
4
In the Lockout duration box, enter the number of minutes the user is locked out after the
Lockout counter threshold is reached.
5
In the Lockout counter reset box, enter the number of minutes to wait to reset the Lockout
counter.
NN40020-600
Chapter 5 BCM50 Security Policies
87
Setting password expiry policy
Use this procedure to enable a password expiry policy.
To set password expiry policy
1
Select Configuration, Administrator Access, Security Policies > Local Authentication
Policy.
2
In the Days before password expire box, enter the number of days that a password can be
used before it expires.
3
In the Warning days before password expire box, enter the number of days prior to password
expiry that the user will receive a notification.
4
Select the Enable checkbox to enable the password expiry policy.
Setting password history policy
You can use the password history feature to prevent users from re-using the same password.
Administrators can configure the number of previous passwords to store and check.
To set password history
1
Select Configuration, Administrator Access, Security Policies > Local Authentication
Policy.
2
In the Password history section, select the Enable Password History box.
3
In the Password history length box, enter the number of previous passwords to store and
check for an account.
Setting the authentication method
By default, users are authenticated on the local BCM50 system. In a network with mutliple
BCM50 systems, you can choose to authenticate users on a centralized server using RADIUS
(Remote Authentication Dial In User Service).
The BCM RADIUS client is compliant with the RADIUS protocol described in RFC 2865, and
supports the following authentication and authorization functions:
•
ACCESS-REQUEST messages
•
ACCESS-ACCEPT messages
•
ACCESS-REJECT messages
Other functions, such as challenge key and accounting messages, are not supported.
If you use RADIUS for authenticating and authorizing users, and the RADIUS servers are not
in-service or are out-of-contact, the BCM will revert to using local authentication.
BCM50 Administration Guide
88
Chapter 5 BCM50 Security Policies
When you select RADIUS as the authentication method, user IDs and passwords will be
authenticated on the RADIUS server for the following tasks:
•
administration of the BCM using Element Manager
•
access to the BCM website
•
access to the BCM Monitor
•
dial-in access to the BCM using modem or ISDN
•
Contact Centre administration
•
BCM Amp configuration
•
CTE DA ProAE
•
telset administration
•
IP set registration
•
voicemail and web-based administration
•
Call Detail Recording functionality
To set the authentication method
1
Select Configuration, Administrator Access, Security Policies > Authentication Service
Policy.
2
From the Account Management drop-down menu, select Local Authentication or RADIUS.
If you select RADIUS, follow the procedure for “Configuring an authentication server” on
page 88.
Configuring an authentication server
To authenticate users on a centralized RADIUS server, you must configure the server using
Element Manager.
To configure an authentication server in Element Manager
1
Select Configuration, Administrator Access, Security Policies > Authentication Service
Policy.
2
Select a server to be the primary authentication server. Click in each column of the table to
enter the following attributes:
Column
Value
Server name
Name of the server to be used for authentication
Server IP address
IP address of the server to be used for
authentication
Server Port
Port number of the server to be used for
authentication
NN40020-600
Chapter 5 BCM50 Security Policies
Shared Secret
Key required for the BCM to communicate with
the authentication server
Server Message Timeout
Length of time to wait for the server to respond to
a request for authentication before timing out
Server Retries
Number of times to retry connecting with the
primary server before using an alternate means of
authenticating the user.
Enabled
Check to enable the use of a RADIUS server
authentication.
3
89
Repeat step 2 to configure the secondary server.
Vendor specific attributes
The BCM requires Vendor Specific Attributes (VSAs) to be present in RADIUS client requests.
The BCM Webpage provides a RADIUS dictionary that defines the Nortel-specific attributes. The
attributes in the dictionary are defined for a Funk RADIUS server; however, the RADIUS client in
BCM complies with RFC 2865 and can be used on other RADIUS servers.
Note: For more information on the RADIUS server and the PassGo RADIUS server, refer to the
documentation provided by the respective manufacturers.
Note: For more information on Microsoft Inbuilt IAS (Internet Authentication Service), refer the
apprpriate Microsoft documentation.
In an ACCESS-REQUEST message, the BCM will look for the attributes listed in Table 18.
Table 18 Attributes in an ACCESS-REQUEST message
Attribute Name
Description
NAS Identifier
The hostname of the BCM (string)
IP
The IP address of the BCM
Calling Station ID
The IP address/DN of the client attempting the
request
In an ACCESS-ACCEPT message, the BCM will look for the attributes listed in Table 19.
BCM50 Administration Guide
90
Chapter 5 BCM50 Security Policies
Table 19 Attributes in an ACCESS-ACCEPT message
Attribute Name
Value
Description
RADIUS attribute type
26
Vendor specific attribute
Vendor type
562
Northern Telecom (Nortel)
Vendor attribute type
166
BCM privilege level of the user
being authenticated. Enter this
level as a hex integer.
Privilege level
0-48 (see
Table 20)
Privilege level of user, entered in
big endian (network byte order).
BCM requires the RADIUS server to provide one or more privilege levels when the user
authentication is accepted. Table 20 lists the privilege levels. These must be provided as a 32-bit
integer in big endian format (network byte order).
NN40020-600
Chapter 5 BCM50 Security Policies
91
Table 20 Privilege levels
Privilege name
Value
Description
VoiceMailAdmin
0
Voice Mail Administrator
Contact Center
1
MMCC - Administrator
SBAInstaller
2
Set Based Administrator Level 4
SBASystemCoord
3
Set Based Administrator Level 3
SBASystemCoordBasic
4
Set Based Administrator Level 2
SBABasic
5
Set Based Administrator Level 1
Security
6
Security Administrator
CTEApp
7
LAN CTE DA Pro AE User
SBA - IP Set Registration
8
IP set registration privilege - from
IP telephone sets
Application - BCMMonitor
9
BCM Monitor user
CDRApp
10
CDR Application Privilege
Modem Login
11
Dial-in PPP user
GuestLogin
12
Access to BCM Web pages - user
level
AdminDownload
13
Administrative application
download
ExclusiveAccess
14
Access to the BCM when exclusive
access flag enabled.
Admin
16
Access to the BCM configuration.
DataAdmin
17
Access to the data portion of CIM/
XML interface.
RemoteAccess
18
Access to remote access fields of
BCM configuration.
Guest
19
Access to all of the BCM
configuration for read-only access.
VoiceAdmin
20
The ability to administer the
telephony portion of the BCM
configuration.
BackupOperator
21
The ability to backup a BCM.
RemoteMonitoring
22
The ability to remotely connect to
and manage the BCM configuration
(ie. SNMP configuration).
SoftwareUpgrade
23
The ability to upgrade the BCM.
AlarmViewer
24
The ability to view the alarm
screen.
BCM50 Administration Guide
92
Chapter 5 BCM50 Security Policies
Operational Logs
26
The ability to download operational
logs.
Diagnostic Logs
27
Full access to download any logs.
ISDN - Dial-in
30
The ability to use ISDN for dial-in.
WAN - Dial-in
32
The ability to use WAN for dial-in
PPP access.
System - Serial Port
36
The ability to configure the BCM
through the serial port.
CLI access
37
The ability to access to CLI
Business Web Access
46
The ability to access Business Web
Set Programming Privilege
47
The ability to set programmes
Remote Modem Enablement 48
The ability to enable remote
modem.
Setting the idle session timeout
You can use the idle session timeout feature to automatically log out users who have been inactive
for a specified period of time. Follow this procedure to specify the period of time before inactive
sessions are timed out.
To set the idle session timeout
1
Select Configuration, Administrator Access, Security Policies > Session Management
Policy.
2
In the Session timeout box, enter the number of minutes to wait after a period of inactivity
before the session times out.
Uploading a Web Server Certificate
This procedure allows you to upload a private security certificate to replace the generic web
certificate provided with BCM50. Using a custom site-specific certificate, you can have site
validation which will eliminate the security warnings.
For further information about security certificates, see “Security certificate” on page 76.
To upload a Web Server Certificate
1
Select Configuration, Administrator Access, Security Policies > SSL and SSH Policy.
2
In the SSL section, click the Install Web Server Certificate button.
3
On the Transfer Certificate browse panel, locate and select the security certificate file.
4
Click the Transfer Certificate button.
5
On the Transfer Private Key browse panel, locate and select the private key file.
NN40020-600
Chapter 5 BCM50 Security Policies
6
Click the Transfer Private Key button.
7
On the Install Web Server certificate window, click OK to install the certificate.
93
Transferring an SSH Key-Pair
Transferring an SSH Key-Pair allows the administrator to download a public security certificate or
an SSH key-pair. The new certificate must be installed on each sftp server the BCM50
communicates with to ensure a secure connection for operations like backup and restore, and
software updates.
To transfer an SSH Key-Pair
1
Select Configuration, Administrator Access, Security Policies > SSL and SSH Policy.
2
In the SSH section, click the Generate New SSH Key-pair button.
The new key is put on the computer running BCM50.
3
Click the Save button.
4
For SSH Key-pair, click the Transfer Public Key button.
5
On the Save dialog box, locate and select the public key file.
6
Click Save to transfer the files.
BCM50 Administration Guide
94
Chapter 5 BCM50 Security Policies
NN40020-600
95
Chapter 6
Managing BCM50 Accounts and Privileges
BCM50 Accounts and Privileges allows you to establish accounts and access privileges for users
of the BCM50 systemThe information in this chapter is organized as follows:
•
Managing user accounts and user groups on page 95 provides information about user accounts,
passwords, and privileges.
•
Accounts and Privileges panel on page 109 describes the fields on the Accounts and Privileges
panel.
•
Configuring user accounts, user groups and privileges on page 118 provides procedures for
managing access to both the Element Manager and to the telset configuration menus.
!
Security Note: This symbol is used throughout this section to indicate areas of possible
security concern, primarily in regard to default settings that could pose a security risk if
they are not changed.
Managing user accounts and user groups
This section contains information on the following topics:
•
User accounts on page 95
•
Default passwords on page 97
•
Default groups on page 97
•
Default access privileges excluding set-based privileges on page 99
•
Telset access security on page 107
•
Blocking user accounts on page 108
User accounts
User accounts are defined by:
•
a unique user ID that is visible only to authenticating services; Element Manager IDs are
alphanumeric, and Telset IDs are numeric
•
a unique user name assigned for either or both the Element Manager and telset configuration
that has a minimum length that you define when you set up the security policies
•
a unique password assigned for any user ID that is defined. Either password must satisfy the
Password Policy settings for the system that you define when you set up the security policies.
•
a list of group attributes which allow the user specific access privileges in the system
BCM50 Administration Guide
96
Chapter 6 Managing BCM50 Accounts and Privileges
After you create an account, you can assign groups to that account. Groups are sets of privileges
based on user tasks or roles. For example, if you have a user who is responsible for remote
monitoring, you can create an account for that user and then assign a group to the account; the
group that you assign would contain the appropriate privileges for that role. The BCM has default
groups available, but you can refine the privileges available within a group to suit the needs of
your network. In this example, you could assign the default group called Remote Monitoring,
which would allow the user to do such things as view metrics and alarms.
You can create up to 200 accounts that require privileges in Element Manager, such as IPSec and
PPP. This number does not include accounts supported for voicemail users, and contact center
agents.
The User ID of the account profiles created through the set based interface cannot be modified
through the Element Manager.
Two default user accounts are provided:
•
The nnadmin account is read only and cannot be deleted or disabled
•
The nnguest account provides customers with web-only access. All access to the Apache web
server requires a valid administrator username and password
Auditing for user accounts includes:
•
•
•
•
•
creation date, time, and the user ID that created the account
modify date, time, and the user ID that modified the account
expiry date and time, if enabled
login history, including failed attempts and the date and time of the last successful attempt
an audit log that tracks logged-in user transactions, including user account changes
Remote users can have a callback number assigned as well. This feature allows authentication of
remote users calling in through a modem. After authentication, the BCM50 will call the user back
at the number specified.
Nortel recommends that each user have a separate user account (User Name) with a unique
password. These are set up by a user with administrator privileges in the Element Manager. The
password only shows up as asterisks on the Element Manager panel. If the password is lost, the
administrator can reset the password for the user by re-entering the password in the user account.
Each user can access their own user information and change their password. User accounts can be
disabled, either manually or through dated expiry.
On the telset administration menu (F9*8), only the administrator (SBAInstaller) can enable or
disable the telset user IDs and modify or delete telset user passwords.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
97
Default passwords
The following table lists the available default passwords for the Element Manager interface, the
telset interface, and the voice mail interface.
Table 21 Default passwords
User ID
Default
password
Telset ID
Default telset
Function
password
Available at
startup?
nnadmin
PlsChgMe!
738662
266344
Read-only installer/system
administrator
yes
nnguest
nnguest
Read-only web-only access
yes
738266
266344
Set-based installer level
no
738727
727587
Set-based administration
no
738236
23646
Set-based coordinator functions
no
738227
22742
Set-based basic access
no
voicemailadmin
PlsChgMe!
738862
266344
Voicemail admin*
no
–
setup
–
–
Router
no
*This account is not created by default. You must add a voicemail account using F9*8.
New accounts are created from the startup profile with a default password of Time4Chg!
!
Security note: The default Administrator password has full access to the system. The
default password should be changed as soon as the initial system setup is complete and
system function is verified.
Default groups
The BCM50 comes with a number of default read-only groups that provide a predetermined set of
access privileges. You can assign additional privileges to groups. Table 22 lists the default
privilege levels for each default group, which are described in “Default access privileges
excluding set-based privileges” on page 99 and “Telset access security” on page 107.
Table 22 Default user account groups
Group Name
Privileges
Notes
SBA Installer
SBAInstaller
IP Set Registration
SBA - Installer group access privileges on page 108
IP Set Registration access privileges on page 100
SBA Coordinator+
SBASystemCoord
SBA - System Coordinator+ group access privileges on page 108
SBA Coordinator
SBASystemCoordBasic SBA - System Coordinator group access privileges on page 108
Guests
Guests access privileges on page 103
SBA Basic
SBABasic
Voice & Contact Center VoiceMailAdmin
Group
SBA - Basic group access privileges on page 108
Only access to voicemail/contact center administration if this is
the only group assigned to a user account.
Voice Mail & Contact Center access privileges on page 99.
BCM50 Administration Guide
98
Chapter 6 Managing BCM50 Accounts and Privileges
Table 22 Default user account groups (Continued)
Group Name
Privileges
Notes
Contact Center
Contact Center
Only access to the Contact Centre application is available if this
is the only group assigned to a user account.
Contact Center access privileges on page 100
CDR Application
CDRApp
Only access to the call detail record functions is available if this is
the only group assigned to a user account.
CDR Appl access privileges on page 101
CTE Application
CTEAppl
CTE Appl access privileges on page 100
BCM Monitor
Application
BCMMonitorAppl
BCMMonitor Appl access privileges on page 101
Administrator
IP Set Registration
BCMMonitorApp
CDRApp
PPP
AdminDownload
Exclusive Access
Admin
DataAdmins
Remote Access
Voice Admins
Backup Operators
Software Upgrade
Alarm Viewer
SBA Installer
Security
CTE Appl
Operational Logs
Diagnostic Logs
VoiceMail and Contact
Center
Network IPSec
Modem dial out
ISDN dial in
ISDN dial out
WAN dial in
WAN dial out
PPOE dial in
PPOE dial out
IP Set Registration access privileges on page 100
BCMMonitor Appl access privileges on page 101
CDR Appl access privileges on page 101
PPP Access access privileges on page 101
Admin Download access privileges on page 101
Exclusive Access access privileges on page 102
Admin access privileges on page 102
DATA Admins group access privileges on page 102
Remote Access access privileges on page 103
Voice Admins access privileges on page 103
Backup Operators access privileges on page 104
Software Upgrade access privileges on page 104
Alarm Viewer access privileges on page 105
SBA - Installer group access privileges on page 108
Security access privileges on page 100
CTE Appl access privileges on page 100
Operational Logs access privileges on page 105
Diagnostic Logs access privileges on page 105
Voice Mail & Contact Center access privileges on page 99
Network IPSec access privileges on page 105
Modem dial out access privileges on page 105
ISDN dial in access privileges on page 105
ISDN dial out access privileges on page 106
WAN dial in access privileges on page 106
WAN dial out access privileges on page 106
PPPoE dial in access privileges on page 106
PPPoE dial out access privileges on page 106
Data Admin
DATAAdmins
DATA Admins group access privileges on page 102
Remote Access
PPP
RemoteAccess
PPP Access access privileges on page 101
Remote Access access privileges on page 103
Guest
Guests
Guests access privileges on page 103
Voice Admin
IP Set Registration
VoiceAdmins
Alarm Viewer
IP Set Registration access privileges on page 100
Voice Admins access privileges on page 103
Alarm Viewer access privileges on page 105
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
99
Table 22 Default user account groups (Continued)
Group Name
Privileges
Notes
Power Users
IP Set Registration
DATAAdmins
VoiceAdmins
Alarm Viewer
VoiceMail and Contact
Center
IP Set Registration access privileges on page 100
DATA Admins group access privileges on page 102
Voice Admins access privileges on page 103
Alarm Viewer access privileges on page 105
Voice Mail & Contact Center access privileges on page 99
Backup Operators
Security
BackupOperators
Security access privileges on page 100
Backup Operators access privileges on page 104
Security
Security
AdminDownload
Alarm Viewer
Diagnostic Logs
Operational Logs
Security access privileges on page 100
Admin Download access privileges on page 101
Alarm Viewer access privileges on page 105
Diagnostic Logs access privileges on page 105
Operational Logs access privileges on page 105
Admin Download
AdminDownload
Admin Download access privileges on page 101
Guest Download
GuestDownload
Can access the BCM50 web page for application downloads and
user documentation.
Guest Download access privileges on page 101
Remote Monitoring
Remote Monitor
Alarm Viewer
Operational Logs
Remote Monitoring access privileges on page 104
Alarm Viewer access privileges on page 105
Operational Logs access privileges on page 105
Default access privileges excluding set-based privileges
The group privileges further refine access availability to groups and users. You can assign more
than one privilege to a group and more than one group to a user account. The group with the most
privileges defines what the user can access.
For instance, the Admin group has all privileges, therefore, if this group is assigned to the user, any
other group assignments with less access are superseded.
The default privileges are arranged as profiles with access privileges. Access privileges for each
profile are listed in the sections below.
Voice Mail & Contact Center access privileges
•
SBA -Voice Mail
•
EM - CONFIG - Administrator Access - Current User
•
EM - CONFIG - Applications - Voice Messaging
EM - CONFIG - Applications - Contact Center
•
Web Documentation - User Documentation
•
BCM50 Applications - Applications - CallPilot Manager
•
Web - User Applications
BCM50 Administration Guide
100
Chapter 6 Managing BCM50 Accounts and Privileges
Contact Center access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
BCM50 Applications - Applications - CallPilot Manager
•
Web - User Applications
Security access privileges
•
EM - CONFIG - Administrator Access - Current User
•
EM - CONFIG - Administrator Access - Accounts and Privileges
•
EM - CONFIG - Administrator Access - Security Policies
•
EM - CONFIG - Administrator Access - SNMP
•
EM - CONFIG - Administrator Access - Dial In
•
EM - CONFIG - Administrator Access - Dial Out
•
EM - CONFIG - Telephony - Call Security
•
EM - ADMIN - General - Alarm
•
EM - ADMIN - General - Alarm Setting
•
EM - ADMIN - General - SNMP Trap Setting
•
EM - ADMIN - General - Service Manager
•
EM - ADMIN - Utilities - Reset
•
EM - ADMIN - Software Management - Software Inventory Panel (read-only)
•
Web Documentation - User Documentation
•
Diagnostic Logs - Diagnostic Log Transfer - Diagnostic Only component logs
•
SSL Certificate Transfer - Certificate Transfer - SSL Certificate & SSH Key upload /
download
•
Web - User Applications
CTE Appl access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
BCM50 Applications - Applications - CTE DA Pro AE
•
Web - User Applications
IP Set Registration access privileges
•
SBA - IP Set Registration
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
101
BCMMonitor Appl access privileges
•
EM - CONFIG - Administrator Access - Current User
•
EM - ADMIN - Utilities - BCM Monitor
•
Web Documentation - User Documentation
•
BCM50 Applications - Applications - BCM Monitor
•
Web - User Applications
CDR Appl access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
BCM50 Applications - Applications - Call Detail Recording
•
Web - User Applications
PPP Access access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
RAS - Applications - PPP
•
Web - User Applications
Guest Download access privileges
•
Web Documentation - User Documentation
•
Web Application Download - Web Download - Callpilot Unified Messaging
•
Web Application Download - Web Download - Desktop Assistant
•
Web Application Download - Web Download - Desktop Assistant Pro
•
Web Application Download - Web Download - 2050 Soft Phone
•
Web Application Download - Web Download - Personal Call Manager
•
Web Application Download - Web Download - Lan CTE Client
Admin Download access privileges
•
Web Documentation - User Documentation
BCM50 Administration Guide
102
Chapter 6 Managing BCM50 Accounts and Privileges
•
Web Documentation - Admin Documentation
•
Web Application Download - Web Download - Element Manager
•
Web Application Download - Web Download - NCM for BCM50
•
Web Application Download - Web Download - Callpilot Unified Messaging
•
Web Application Download - Web Download - Desktop Assistant
•
Web Application Download - Web Download - Desktop Assistant Pro
•
Web Application Download - Web Download - 2050 Soft Phone
•
Web Application Download - Web Download - Personal Call Manager
•
Web Application Download - Web Download - Lan CTE Client
•
Web Application Download - Web Download - BCM Monitor
•
Web Application Download - Web Download - CDR Client Wrapper Utility
•
Web Application Download - Web Download - SSH
Exclusive Access access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
Admin access privileges
•
all privileges
DATA Admins group access privileges
•
EM - CONFIG - System - IP Subsystem
•
EM - CONFIG - Administrator Access - Current User
•
EM - CONFIG - Administrator Access - Dial In
•
EM - CONFIG - Administrator Access - Dial Out
•
EM - CONFIG - Resources - Media Gateways
•
EM - CONFIG - Data Services- DHCP Server Settings
•
EM - CONFIG - Data Services- Class 1 Router
•
EM - ADMIN - General - Alarm
•
EM - ADMIN - General - Alarm Setting
•
EM - ADMIN - Utilities - BCM Monitor
•
EM - ADMIN - Utilities - Ping
•
EM - ADMIN - Utilities - Trace Route
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
•
Web Documentation - User Documentation
•
Web - User Applications
103
Remote Access access privileges
•
EM - CONFIG - Administrator Access - Current User
•
EM - CONFIG - Administrator Access - SNMP
•
EM - CONFIG - Administrator Access - Dial In
•
EM - CONFIG - Administrator Access - Dial Out
•
EM - ADMIN - General - SNMP Trap Destinations
•
Web Documentation - User Documentation
Guests access privileges
•
Read-only access to all but Utilities, Backup and Restore, and Log Management
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
Voice Admins access privileges
•
EM - CONFIG - System - Identification
•
EM - CONFIG - System - Time and Date
•
EM - CONFIG - System - Keycodes
•
EM - CONFIG - System - IP Subsystem
•
EM - CONFIG - Administrator Access - Current User
•
EM - CONFIG - Resources - all
•
EM - CONFIG - Telephony - all
•
EM - CONFIG - Data Services - DHCP Server Setting
•
EM - CONFIG - Applications - LAN CTE
•
EM - CONFIG - Applications - Voice Messaging
•
EM - CONFIG - Applications - Contact Center
•
EM - ADMIN - General - Alarm
•
EM - ADMIN - General - Alarm Setting
•
EM - ADMIN - Utilities - Inventory
•
EM - ADMIN - General - Alarm
•
EM - ADMIN - General - Alarm Setting
BCM50 Administration Guide
104
Chapter 6 Managing BCM50 Accounts and Privileges
•
EM - ADMIN - System Status - Qos Monitor
•
EM - ADMIN - System Status - NTP Metrics
•
EM - ADMIN - Telephone Metrics - all
•
EM - ADMIN - Utilities - BCM Monitor
•
EM - ADMIN - Utilities - Reboot
•
EM - ADMIN - Software Management - all as read only
•
Web Documentation - User Documentation
Backup Operators access privileges
•
EM - CONFIG - Administrator Access - Current User
•
EM - ADMIN - Backup and Restore - Admin - Backup
•
EM - ADMIN - Backup and Restore - Admin - Restore
•
Web Documentation - User Documentation
•
Web - User Applications
Remote Monitoring access privileges
•
EM - CONFIG - Administrator Access - Current User
•
EM - ADMIN - General - Alarm as read only
•
EM - ADMIN - General - Alarm Setting as read only
•
EM - ADMIN - General - SNMP Trap Destinations
•
EM - ADMIN - General - Service Manager as read only
•
EM - ADMIN - General - Inventory as read only
•
EM - ADMIN - System Status - Qos Monitor
•
EM - ADMIN - System Status - UPS Metrics as read only
•
EM - ADMIN - System Status - NTP Metrics as read only
•
EM - ADMIN - Telephone Metrics - all
•
EM - ADMIN - Utilities - BCM Monitor
•
Web Documentation - User Documentation
•
Web - User Applications
Software Upgrade access privileges
•
EM - CONFIG - Administrator Access - Current User
•
EM - ADMIN - Utilities - Reboot
•
EM - ADMIN - Software Management - all
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
•
Web Documentation - User Documentation
•
Web - User Applications
105
Alarm Viewer access privileges
•
EM - CONFIG - Administrator Access - Current User
•
EM - ADMIN - General - Alarm
•
EM - ADMIN - General - Alarm Setting
•
EM - ADMIN - General - Inventory
•
Web Documentation - User Documentation
•
Web - User Applications
Operational Logs access privileges
•
Web Documentation - User Documentation
•
EM - ADMIN - Log Management- Operational Logs
•
Web - User Applications
Diagnostic Logs access privileges
•
Web Documentation - User Documentation
•
EM - ADMIN - Log Management- Diagnostic Logs
Network IPSec access privileges
•
EM - CONFIG - Administrator Access - Current User
•
RAS - Application - IPSec
Modem dial out access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
•
PPP dial out via analog modem
ISDN dial in access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
BCM50 Administration Guide
106
Chapter 6 Managing BCM50 Accounts and Privileges
•
PPP dial in via ISDN
ISDN dial out access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
•
PPP dial out via ISDN
WAN dial in access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
•
PPP dial in via analog WAN
WAN dial out access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
•
PPP dial out via WAN
PPPoE dial in access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
•
PPP dial in via PPPoE
PPPoE dial out access privileges
•
EM - CONFIG - Administrator Access - Current User
•
Web Documentation - User Documentation
•
Web - User Applications
•
PPP dial out via PPPoE
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
107
Telset access security
You can use the Telset administration interface (FEATURE 9*8) to activate or deactivate the telset
default access user accounts. You can also use this interface to change the password for these
accounts. For further information about using telset features, see the Telset Admin Guide.
The Telset group privileges apply specifically to the following telset interfaces:
•
•
•
FEATURE 9*8 (Administrator access only)
FEATURE **266344 (**CONFIG) (telephony interface)
FEATURE 983 (CallPilot interface)
These interfaces are meant to be used only as supplementary configuration portals. You can also
block access to these interfaces when you set up the system Security Policies.
Table 23 Default Telset access
Configuration Heading
Parameters
Comments
System
ID
A read-only field in Feature 9*8 used for
keycode entry.
Region
Uses Feature ** PROFILE on the set. See
Norstar documentation.
IPADDRESS
Dynamic
Address
Subnet
Dfltgwy
License
FILE
Keycode data
Uses Keycodes that can be entered one at a
time through Feature 9*8 .
TelephonyStartup
Template
Uses Feature ** STARTUP on telset within 15
minutes of a bootup of BCM. See Norstar
documentation.
StartDN
Uses Feature ** STARTUP on telset within 15
minutes of a bootup of BCM. See Norstar
documentation.
ATTENDANTDN
Uses Feature 983 the first time you initialize
CallPilot. See CallPilot documentation.
UISTYLE
Uses Feature 983 the first time you initialize
CallPilot. See CallPilot documentation.
LANGUAGE
Uses Feature 983 the first time you initialize
CallPilot. See CallPilot documentation.
VOICEMAILSTARTUP
BCM50 Administration Guide
108
Chapter 6 Managing BCM50 Accounts and Privileges
Telset group access privileges
There are four set-based group access privileges. These are listed in order of greatest to least
access privileges with SBA - Installer being the group with the greatest privileges.
SBA - Installer group access privileges
•
SBA - Feature 9*8
•
SBA - Installer Rights
•
IP Set Registration (when IP set registration is configured and a global password setting is
used)
•
EM - CONFIG - Administrator Access - Accounts and Privileges - Current User
•
Web Documentation - User Documentation
•
BCM50 Applications - User Applications
SBA - System Coordinator+ group access privileges
•
SBA - Coordinator Plus Rights
•
EM - CONFIG - Administrator Access - Accounts and Privileges - Current User
•
Web Documentation - User Documentation
•
BCM50 Applications - User Applications
SBA - System Coordinator group access privileges
•
SBA - Coordinator Rights
•
EM - CONFIG - Administrator Access - Accounts and Privileges - Current User
•
Web Documentation - User Documentation
•
BCM50 Applications - User Applications
SBA - Basic group access privileges
•
SBA - Basic Rights
•
EM - CONFIG - Administrator Access - Accounts and Privileges - Current User
•
Web Documentation - User Documentation
•
BCM50 Applications - User Applications
Blocking user accounts
There are different ways that you can block user access to the system based on your security and
administrative requirements.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
109
•
Primarily, you can block unauthorized access by ensuring that you change all default
passwords once the system is set up and verified.
•
You can also block user access by simply changing the password. Note that you must retain a
record of the password, since this information is not displayed either on the Element Manager
panel or in the programming record file.
•
You can increase the complexity required for both Element Manager and telset passwords to
make it more difficult for unauthorized users to inadvertently guess the correct password.
Complexity is increased by increasing the type of characters that are required and by
increasing the minimum length of the password.
•
You can set up the system to lock out a user if the password is entered incorrectly a
(configurable) number of times. You can unlock the account through the user account record,
or the user can wait for the lockout timer to run out before attempting to log on again. The user
account shows the last time a user failed to logon.
•
You can set a user account to automatically expire on a given date.
•
You can manually disable the account. If the user is currently logged in, this takes effect at the
next log-in.
•
If you only want to decrease the amount of system access, you can delete groups and reassign
groups with lower access privileges to the user account.
The administrator performing maintenance tasks can lock the system during the duration of the
maintenance. Any user already logged in remains logged in, but would not be able to log in again
until the Exclusive Access timer runs out.
Accounts and Privileges panel
This section describes the tabs and fields available on the Accounts and priveleges panel.
Current Account
The Current Account context panel provides a summary of user information about the person
currently signed into the Element Manager.
BCM50 Administration Guide
110
Chapter 6 Managing BCM50 Accounts and Privileges
Figure 21 Accounts and Privileges: Current Account panel
Table 24 describes each field on the Current Account context panel.
Table 24 Current Account fields
Attribute
Value
Description
Account Notifications
read-only
This field displays account notifications, such as notifications
of password expiries.
User ID
read-only
A read-only field that can only be changed on the user
accounts panel by a user with administrator privileges
Password
alphanumeric
Requires a password entry that contains all the security
requirements. Refer to “Setting credential complexity” on page
85.
Note: Changes to the password take effect at the next login.
Telset user ID
read-only
A read-only field, and can only be changed on the user
accounts panel by a user with administrator privileges
Telset password
numeric
Requires a numeric password entry that is unique for each
user. These strings must satisfy the security requirements.
Refer to “Setting credential complexity” on page 85.
Note: This password takes effect at the next login.
Last Successful log-in
read-only
A read-only field that indicates the last date and time the user
account was used to log on to the system.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
111
Table 24 Current Account fields (Continued)
Attribute
Value
Description
Account Management
read-only
Displays the method used to authenticate the user session:
local authentication, or centralized authentication through a
RADIUS server.
read-only
Displays the date and time of the last failed login.
Failed Login History
Last failed login
From
Displays the interface from which the login was attempted.
Failed Telset Login History
Last failed login
read-only
From
Exclusive access time
remaining
Displays the date and time of the last failed login by a Telset
user.
Displays the interface from which the login was attempted.
numeric
minutes
Specifies the amount of time left before other users are
allowed to log on to the system. Visible only to users with
administrator-level privileges.
Buttons
Enable Exclusive Access
This button is visible only to users with exclusive access
privileges. Opens the Enable Exclusive Access dialog box
from which you enter the amount of time that you want to have
exclusive access to the system. Exclusive Access does not
disable the access of users who are currently logged in.
Disable Exclusive Access
Stops the exclusive access timer and allow other users back
onto the system. This button is visible only to users with
exclusive access privileges.
BCM50 Administration Guide
112
Chapter 6 Managing BCM50 Accounts and Privileges
View by Accounts
The View by Accounts context panel contains the table that defines individual user accounts. On
these panels, you define how the system identifies the user. You also define what privileges the
user has by assigning the user to groups.
You can add, delete, or modify user account information from this panel. When you add or modify
a user, you can enter a password for both the Element Manager interface and the telset interface.
Figure 22 Accounts and Privileges, View by Accounts context panel
Table 25 describes each field on the View by Accounts panel.
Table 25 View by Accounts fields
Attribute
Value
Description
User ID
alphanumeric
Displays the accounts by User ID
Telset User ID
numeric
Displays the accounts by Telset User ID
Locked Out
checkbox
Indicates whether or not the user has been locked out. When
checked, the user cannot access the system. This field
becomes checked when a user enters an incorrect password
too many times, and the system locks the user account.
The user either has to wait for the lockout timer to run out, or
an administrator can unlock the user’s access using
“Re-enable a locked-out user” on page 125.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
113
Table 25 View by Accounts fields
Attribute
Value
Description
Locked Out Telset
checkbox
Indicates whether or not the user has been locked out. When
checked, the user cannot access the system. This field
becomes checked when a user enters an incorrect password
too many times, and the system locks the user account.
The user either has to wait for the lockout timer to run out, or
an administrator can unlock the user’s access using
“Re-enable a locked-out user” on page 125.
Disabled
checkbox
Indicates whether a user account has been disabled. When
checked, the user cannot access the system. This field
becomes checked when the account expiry date is reached.
Refer to “Enabling and disabling an account” on page 126.
Buttons
Add
Opens the Add Account dialog box
Delete
Deletes the selected user account
Modify
Opens the Modify Account dialog box
Security note: You cannot delete the nnadmin user; therefore, ensure that you change
the default password as soon as possible after system setup. Keep a record of the
password in a safe place.
!
If you select a user on the Users list, two more panels appear in the lower frame:
•
•
The General panel allows you to see the current status of the account. See “View by Account:
General” on page 113
The Group Membership panel allows you to associate the account to group profiles, which
determines what type of access the user has. See “View by Account: Group Membership” on
page 115.
View by Account: General
The General panel provides user account information and account control settings.
Table 26 describes each field on this panel.
Table 26 View by Accounts: General fields
Attribute
Description
Value
Description
alphanumeric
Displays the descriptive name and information for the user or the user
function. This field may be left blank.
Account Expriy
Enable account expiry check box
When selected, specifies that the user account is scheduled to
automatically expire at the specified date and time.
Account will be
disabled on
Specifies the date and time when the user account will expire. The
pull-down menu opens a calendar.
date
BCM50 Administration Guide
114
Chapter 6 Managing BCM50 Accounts and Privileges
Table 26 View by Accounts: General fields (Continued)
Attribute
Value
Description
Account Textual Credentials
Change password on
login
check box
When selected, forces a user to change his or her password when
logging in.
Password expiry
drop-down menu
Specifies the date to force a password change.
Account Telset Credentials
Change password on
login
check box
When selected, forces a Telset user to change his or her password
when logging in.
Password expiry
drop-down menu
Specifies the date to force a Telset password change.
View by Account: Remote Access
The Remote Access panel provides callback settings for verifying user information, as well as
configuration of NAT rules for dial-up users.
Table 27 describes each field on this panel.
Table 27 View by Accounts: Remote Access
Attribute
Value
Description
Modem Callback
Number
telephone #
Specifies the number the system will call to verify the dial-up user
access
Modem Callback
Passcode
User ID
Specifies the passcode the system uses to confirm the callback is
legitimate
ISDN Callback
Number
telephone #
Specifies the number the system will call to verify the ISDN user access
ISDN Callback
Passcode
User ID
Specifies the passcode the system uses to confirm the callback is
legitimate
IP address
Specifies the PPP IP address of the BCM when connecting with analog
modem or ISDN terminal adaptors.
Rule 1: Dial-in Side
IP address
Enter an IP address on a dial-in interface to be translated.
LAN Side
IP address
Enter an IP address on the local LAN to use when translating the dial-in
address in Rule 1.
Rule 2: Dial-in Side
IP address
Enter an IP address on a dial-in interface to be translated.
LAN Side
IP address
Enter an IP address on the local LAN to use when translating the dial-in
address in Rule 2.
Rule 3: Dial-in Side
IP address
Enter an IP address on a dial-in interface to be translated.
LAN Side
IP address
Enter an IP address on the local LAN to use when translating the dial-in
address in Rule 3.
Rule 4: Dial-in Side
IP address
Enter an IP address on a dial-in interface to be translated.
IP Address
BCM IP Address
NAT Rules*
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
115
Table 27 View by Accounts: Remote Access (Continued)
Attribute
Value
Description
LAN Side
IP address
Enter an IP address on the local LAN to use when translating the dial-in
address in Rule 4.
*Multicast IP addresses cannot be used for NAT rules.
View by Account: History
The History panel provides user account and login histories and account control settings.
Table 28 describes each field on this panel.
Table 28 View by Accounts: History fields
Attribute
Value
Description
Account created
Created by
read-only
Specifies the date that the user record was added.
Specifies the userID of the person who added the user account.
Last Modified
Modified by
read-only
Specifies the date the user record was last modified.
Specifies the userID of the person who last modified the account.
Last successful login
read-only
Specifies the date the user last successfully logged on to either the
Element Manager.
Failed login count
read-only
Specifies the number of times the user tried and failed to log on before
successfully logging in or being locked out. If the count matches the
failed login threshold, a value of true is displayed in the Locked Out
column on the Accounts table.
Last failed login
read-only
Specifies the date that the user last tried and failed to logon.
From
read-only
Element Manager: Displays the IP address of the Element Manager
Last successful login
read-only
Specifies the date the user last successfully logged on to Telset.
Failed login count
read-only
Specifies the number of times the user tried and failed to log on before
successfully logging in or being locked out. If the count matches the
failed login threshold, a value of true is displayed in the Locked Out
column on the Accounts table.
Last failed login
read-only
Specifies the date that the user last tried and failed to logon.
From
read-only
Telset: Displays the DN of the telephone used to log into the system.
Account history
Login history
Telset login history
View by Account: Group Membership
The Group Membership panel allows you to associate the user account with one or more
functional groups. The user will have all the privileges assigned to each group that is added to the
list.
BCM50 Administration Guide
116
Chapter 6 Managing BCM50 Accounts and Privileges
Table 29 describes each field on this panel.
Table 29 Group membership fields
Attribute
Value
Description
Account is
Member of
Groups
Default groups
Lists groups the user is a member of. Refer to “Default groups”
on page 97 for a list of the default groups and the privileges
associated with each.
Note: Groups are added, modified or deleted from the “View by
Groups” on page 116 panel.
Buttons
Add
Opens the Add Account dialog box. Choose the group or
groups with the appropriate access privileges for the user.
Note: You cannot add user accounts to groups with read-only
privileges.
Delete
Deletes the user account from the selected group.
View by Groups
The View by Groups panel allows you to add or delete members from group profiles.
The Groups panel lists all the groups currently available in the system.
Table 30 describes each field on this panel.
Table 30 View by Groups fields
Attribute
Description
Groups
Lists all the defined groups. Refer to “Default groups” on page 97 for a list of the
default groups and the privileges associated with each.
Buttons
Add
Opens the Add Group dialog box. Allows the creation of custom groups that provide
combinations of privileges not covered by the default groups.
Delete
Opens the Confirm Delete dialog box. Allows for the deletion of any group, with the
exception of the Admin Group.
For more details about groups, refer to the panels described in “View by Groups: General” on page
116.
View by Groups: General
For a selected entry in the Groups table (“View by Groups” on page 116), you can use the General
details panel to define which system privileges are assigned to this group, and to users assigned
with this group.
This panel also provides status information for the group.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
117
Table 31 describes each field on this panel.
Table 31 View by Groups: General panel fields
Attribute
Value
Description
Group created
Created by
read-only
Specifies the date the group account was created
Specifies the user who created the account
Last modified
Modified by
read-only
Specifies the last date the group account was changed
Specifies the user who performed the changes
Group History
Privileges: Group Privileges
Privilege
read-only
Lists the system access privileges that are allowed to members of the
selected group
Actions:
Add
Opens the Add Privilege to Group dialog box. Allows the privilege to be
added to the group
Delete
Opens the Confirm Delete dialog box. Allows the privilege to be deleted
from a group
BCM50 Administration Guide
118
Chapter 6 Managing BCM50 Accounts and Privileges
View by Groups: Members
For a selected group in the Groups table (“View by Groups” on page 116), you can use the
Members panel to assign the group to existing user accounts and to view which accounts have the
selected group assigned.
Table 32 describes each field on this panel.
Table 32 View by Groups: Group Membership fields
Attribute
Value
Description
Description
read-only
Lists the user accounts in the selected group.
User ID
alphanumeric
Displays the accounts by User ID.
Telset User ID
numeric
Displays the accounts by Telset User ID.
Buttons:
Add
Opens the Add Account to Group dialog box. Allows the user account to
be added to the selected group.
Delete
Deletes the selected user account from the selected group.
Configuring user accounts, user groups and privileges
User Management provides procedures for managing access to both the Element Manager and to
the telset configuration menus. You can control when users can log on, how much they can see,
and what they can do within the configuration menus.
This section provides the following procedures:
•
“Adding a new user account” on page 119
•
“Modifying a user account” on page 119
•
“Adding callback for a dial-up user” on page 120
•
“Adding NAT rules for a dial-up user” on page 120
•
“Adding Telset access for a user” on page 121
•
“Deleting a user account” on page 121
•
“Changing a user’s password” on page 122
•
“Changing the current user’s password” on page 122
•
“Creating a group” on page 123
•
“Deleting a group” on page 123
•
“Modifying group privileges” on page 123
•
“Adding a user account to a group” on page 124
•
“Deleting a user account from a group” on page 124
•
“Re-enable a locked-out user” on page 125
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
•
“Enabling and disabling an account” on page 126
•
“Enabling and disabling exclusive access” on page 127
119
Adding a new user account
Administrators can create user accounts when the BCM is configured to authenticate users locally.
After you create a new user account, you can assign groups to that account. Groups are sets of
privileges based on user tasks or roles. For information about creating groups and assigning groups
to accounts, see “Creating a group” on page 123 and “Adding a user account to a group” on page
124.
To add a new user account
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Account
tab.
2
Click the Add button.
3
In the Add Account dialog box, enter a description of the account in the Description field.
4
Enter the user’s identifier in the User ID field.
5
In the User password field, enter the user’s password.
6
In the Confirm password dialog box, enter the user’s password again.
7
In the Telset password field, enter the telset password for the user.
8
In the Confirm password dialog box, enter the user’s password again.
9
If the user is connecting through a modem, enter the number the system dials to contact the
client modem in the Modem Callback Number field and enter a passcode in the Modem
Callback Passcode field. Ensure you include the correct routing codes.
10 If the user is connecting through ISDN, enter the number the system dials to contact the client
in the ISDN Callback Number field and enter a passcode in the ISDN Callback Passcode
field.
11 Select the Change Password on Login checkbox to force a password change when the user
logs into Element Manager.
12 Select the Change Password on Login Telset checkbox to force a password change when the
user logs into Telset.
13 Click OK to save the user account.
After the account is created, the user can change their own password through the Current Account
panel. Refer to “Changing the current user’s password” on page 122.
Modifying a user account
As an administrator, you can modify user accounts.
BCM50 Administration Guide
120
Chapter 6 Managing BCM50 Accounts and Privileges
To modify a user account
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Account
tab.
2
Select an existing user on the Accounts table and click the Modify button.
3
On the Modify Account dialog box, make the changes you require.
4
If callback for dial-up users is required, see “Adding callback for a dial-up user” on page 120.
5
If telset access is required, see “Adding Telset access for a user” on page 121.
6
Click OK to save the user account.
Adding callback for a dial-up user
As an administrator, you can provide callback access to a user who is accessing the system through
a dial-up connection.
Callback security
If a user is connecting to the system using a modem, you can enhance your access
security by assigning that person a specific user account that prompts the system to
acknowledge the user, then hang up and dial back the user at a designated telephone
number, before allowing the person to have access to the system.
!
To add callback for a dial-up user
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Account,
Remote Access tab.
2
Select an existing user on the Accounts table.
3
If the user is connecting through a modem, enter the number the system dials to contact the
client modem in the Modem Callback Number field and enter a passcode in the Modem
Callback Passcode field. Ensure you include the correct routing codes.
4
If the user is connecting through ISDN, enter the number the system dials to contact the client
in the ISDN Callback Number field and enter a passcode in the ISDN Callback Passcode
field.
5
Click OK.
Adding NAT rules for a dial-up user
As an administrator, you can add Network Address Translation (NAT) rules for a user who is
accessing the system through a dial-up connection. When you add a NAT rule, your network can
use one set of IP addresses for internal traffic and a second set of IP addresses for external traffic.
This translation provides security for your LAN by hiding the IP addresses of devices on your
network from external computers. The procedure in this section allow you to configure NAT on
dial-up interfaces.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
121
Note: When you set NAT rules for a dial-up user, the NAT rule overrides the Allow Network Access
setting. For information about the Allow Network Access setting, see “Configuring dial-in parameters” in
the BCM50 Networking Configuration Guide. You will also need to configure the dial-in PC with a subnet
route to be able to connect to the BCM50 over a PPP interface.
To add NAT rules for a dial-up user
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Account,
Remote Access tab.
2
Select an existing user on the Accounts table.
3
Click Modify.
4
In the Rule 1: Dial-in Side field, enter the IP address to be translated from.
You cannot use a multicast address when you create NAT rules.
5
In the LAN Side field to the right, enter the IP address on the local LAN to be translated to.
You cannot use a multicast address when you create NAT rules.
6
Repeat steps 3 and 4 to create addition rules.
7
Click OK.
Adding Telset access for a user
As an administrator, you can provide an existing user with access to the system through a
set-based connection.
To add Telset access for a user
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Account
tab.
2
Select an existing user on the Accounts table and click the Modify button.
3
In the Telset User ID field, enter the user’s identifier.
4
In the Telset Password field, enter the user’s telset password.
5
Re-enter the telset password in the Confirm Password dialog box.
6
Click OK.
Deleting a user account
As an administrator, you can delete user accounts when they are not needed.
BCM50 Administration Guide
122
Chapter 6 Managing BCM50 Accounts and Privileges
To delete a user account
1
Select Configuration, Administrator Access, Accounts and Privileges, and click the View
by Account tab.
2
Select a user on the Users table.
3
Click the Delete button.
4
In the confirmation box, click Yes to remove the user account from the system.
Changing a user’s password
As an administrator, you can change a user’s forgotten password, or reset the user password for
each user to enforce regular password-change policy. You can also force a password change when
the user logs in.
Security note: An integral part of your system security is password management. This
includes changing default passwords after the system is installed. To further increase
access security, minimize the number of user accounts, especially the administrator
accounts, and change passwords regularly.
\
!
To change a user’s password
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Account
tab.
2
Select the user record from the table and click Modify.
3
In the Modify Account window, delete the asterisks in the Password or Telset password
field.
4
Enter a new password and click OK.
5
Re-enter the password in the Confirm Password dialog box.
6
Provide the user with this password and request that they change it as soon as possible through
the Current User panel (“Current Account” on page 109) or click on Change Password on
Login to make a password change mandatory.
Changing the current user’s password
As a user or an administrator, you must change your password periodically.
To change the current user’s password
1
Select Configuration, Administrator Access, Accounts and Privileges, Current Account
panel.
2
Select the password field that needs to be changed.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
123
3
Enter a new password that conforms with the system password policies, which are defined by
the administrator during system setup.
A confirmation dialog box appears.
4
In the confirmation dialog box, enter the new password again.
5
Click OK.
The password takes effect the next time you log in.
Creating a group
As an administrator, you can create new groups to satisfy organizational requirements.
To create a group
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Groups
tab.
2
Click the Add button.
3
In the Add Group dialog box, enter a name for the new group.
4
Click OK.
5
Select the new group from the Groups list.
6
In the Group Privileges area, click the Add button.
7
In the Add Privilege to Group dialog box, select one or more group privileges to assign to the
group and click OK. See “Default groups” on page 97 and “Default access privileges
excluding set-based privileges” on page 99 for more information.
8
Populate the group using “Adding a user account to a group” on page 124.
Deleting a group
As an administrator, you can delete groups as organizational requirements change.
To delete a group
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Groups
tab.
2
Select a group and click the Delete button.
3
Click Yes on the confirmation box to remove the groups from the list.
Modifying group privileges
Only user-created groups can be modified; default group privileges cannot be modified.
BCM50 Administration Guide
124
Chapter 6 Managing BCM50 Accounts and Privileges
To modify group privileges
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Groups
tab.
2
Select a group and then click the General tab.
3
To remove privileges, click on the Group Privileges tab, select one or more group privileges
to delete from the existing group, and click Delete. A confirmation dialog box appears; click
Yes to delete the selected items.
4
To add privileges, click on the Group Privileges tab, select one or more group privileges to
add to the existing group, and click the Add button. See “Default groups” on page 97 and
“Default access privileges excluding set-based privileges” on page 99 for more information.
5
Click Yes on the confirmation box to remove the groups from the list.
Adding a user account to a group
As an administrator, you can add user accounts to one or more groups to satisfy access
requirements.
To add a user account to a group
1
Select Configuration, Administrator Access, Accounts and Privileges, and click the View
by Accounts tab.
2
Select a user account and then click the Group Membership tab.
3
Click the Add button.
4
In the Add Account to Group dialog box, select one or more groups.
5
Click OK.
Deleting a user account from a group
As an administrator, you can remove user accounts from a group to limit a user’s access.
To delete a user account from a group
1
Select Configuration, Administrator Access, Accounts and Privileges, and click the View
by Accounts tab.
2
Select a user account and then click the Group Membership tab.
3
Select one or more groups on the Accounts in the Member of Groups table.
4
Click the Delete button.
5
Click OK on the confirmation box to remove the groups from the list.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
125
Re-enable a locked-out user
As the administrator you can re-enable a locked-out user when the user has exceeded the login
retry threshold.
The system shows an enabled check box under the Locked Out column on the Users table.
To release a locked-out user
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Accounts
tab.
2
Select the user record with the Locked Out status check box checked.
3
Click the Locked out check box to clear it.
BCM50 Administration Guide
126
Chapter 6 Managing BCM50 Accounts and Privileges
Enabling and disabling an account
As the administrator, you can enable or disable accounts on an immediate basis or a timed basis.
Security note: Remember to disable unused accounts.
!
To enable or disable an account immediately
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Accounts
tab.
2
Select the user you want to disable/enable on the Accounts table.
3
Under the Disabled column, either check (disable) or clear (enable) the check box for the user.
The change will apply to the user’s next login.
To enable or disable an account on a timed basis
1
Select Configuration, Administrator Access, Accounts and Privileges, View by Accounts
tab.
2
Select the user you want to disable/enable on the Accounts table.
3
Click in the Account will be disabled field, and choose the date and time the account is to be
disabled.
4
On the General panel, ensure that Enable account expiry is selected.
NN40020-600
Chapter 6 Managing BCM50 Accounts and Privileges
127
Enabling and disabling exclusive access
As the administrator, you can enable or disable exclusive access for special activities or
maintenance. The administrator performing maintenance tasks can lock the system during the
maintenance period. When you enable exclusive access, this capability prevents new logins but
does not affect existing logins. This functionality is available to administrators only.
To enable/disable exclusive access
1
Select Configuration, Administrator Access, Accounts and Privileges, Current Account
tab.
2
Click Enable Exclusive Access.
3
In the Enable Exclusive Access dialog box, select a duration in minutes from the drop-down
box that represents the amount of time you want to have exclusive access to the system.
The timer begins to count down. When it reaches zero, exclusive access ends.
4
If you no longer need exclusive access, click Disable Exclusive Access to stop the timer and
end exclusive access.
BCM50 Administration Guide
128
Chapter 6 Managing BCM50 Accounts and Privileges
NN40020-600
129
Chapter 7
Using the BCM50 Hardware Inventory
This chapter describes how to use the BCM50 Hardware Inventory. The Hardware Inventory task
in the Element Manager displays information about the BCM50 system, including:
•
•
•
connected expansion units
populated Media Bay Modules (MBMs)
attached telephone devices
You can view the information in the Hardware Inventory remotely, using Simple Network
Management Protocol (SNMP) management systems and the Entity Management Information
Base (MIB), RFC2737.
About the BCM50 Hardware Inventory
The BCM50 Hardware Inventory panel provides information about the BCM50 physical system.
There are three tabs on the main Hardware Inventory panel:
Table 3 Hardware Inventory panel
Tab
Description
BCM50 System
Provides information about the key components of the BCM50.
For more information, see “Viewing and updating information
about the BCM50 system” on page 130.
Devices
Provides information about any non-BCM50 components
connected to the system. For more information, see “Viewing
information about devices” on page 133.
Additional information
Provides manufacturer details about the BCM50. For more
information, see “Viewing additional information about the
BCM50 hardware inventory” on page 134.
Note: You can also add information about certain devices, such as an asset ID and
location information, to facilitate tracking of the BCM50 hardware inventory in
asset management systems.
Note: You can save all of the information configured and displayed on the
Hardware Inventory panels as a programming record. See “Saving programming
records” on page 59 for information about how to generate this record.
BCM50 Administration Guide
130
Chapter 7 Using the BCM50 Hardware Inventory
Viewing and updating information about the BCM50 system
You can view and update certain information about the BCM50 main unit using the System tab on
the Hardware Inventory panel. The System tab is divided into three areas:
•
•
•
Main unit
BCM50 system expansion
Other Information
You can save inventory information to a file using the Programming Record. See “Saving
programming records” on page 59.
Viewing and updating information about the BCM50 main unit
You can view information about the BCM50 main unit, such as the Nortel part number, the
System ID, and other information. See Table 33.
Note: Fields marked with an asterisk (*) can also be remotely queried by SNMP
using the Entity MIB.
Table 33 BCM50 main unit fields
Field Name
Field Description
System*
Nortel BCM50 Communications
An arbitrary string that uniquely
identifies the Physical Element and Server
serves as the Element's key
Read
Type*
The type of the physical entity
Chassis
Read
System name*
A user-friendly name for the object
System name of the BCM50
Read
System ID
A unique string that identifies this
specific instance of the element
System ID which is Mac #1
Read
Model*
A textual description of the object
example ‘BCM50 Telephony Only’ Read
Serial number
The serial number to the BCM50
unit
Nortel System Serial Number
Read
Initially zero
Write
Customer asset ID* Customer-defined tracking number
Field Value
Read/Write
You can add or update the customer asset ID associated with the BCM50 main unit.
To view or update information about the BCM50 main chassis
1
In the BCM Element Manager, connect to a BCM50 device.
2
Select Administration, General, Hardware Inventory.
The Hardware Inventory panel opens and displays the BCM50 System tab.
3
View the information displayed in the BCM50 main unit area.
4
If you want to add or update the asset ID for the BCM50 main unit, enter an asset ID in the
Customer Asset ID field.
NN40020-600
Chapter 7 Using the BCM50 Hardware Inventory
131
Figure 23 Hardware Inventory
Viewing and updating BCM50 system expansion information
The BCM50 system expansion area in the System tab provides information about the expansion
unit connected to the BCM main unit, if any. If an expansion unit is present and populated with an
MBM, this information is also provided.
Table 34 provides information about the fields in the BCM50 system expansion area.
Note: Asterisk (*) items can also be remotely queried by SNMP using the Entity
MIB.
Table 34 Expansion unit area and Fiber expansion media bay module area
Column Name
Column Description
Column Value
Read/Write
Expansion Chassis
Lists the number of the expansion 1 or 2
chassis.
Read
Present
Indicates if an expansion unit to
main unit is present
Yes (if checked)
Read
Asset ID*
Customer defined tracking
number
Initially zero
Write
Field Replaceable
Indicates if the unit is considered
field replaceable by the
manufacturer.
True (if checked)
Read
BCM50 Administration Guide
132
Chapter 7 Using the BCM50 Hardware Inventory
Table 34 Expansion unit area and Fiber expansion media bay module area
Column Name
Column Description
Column Value
Read/Write
MBM
Use the drop-down menu to
Drop-down menu
identify the type of MBM, such as
whether it is a DSM16 or DSM32.
Write
MBM Asset ID
Enter the asset ID of the MBM.
Numeric
Write
MBM Field
Replaceable
Indicates if the unit is considered
field replaceable by the
manufacturer.
True (if checked)
To view or update BCM50 system expansion information
1
In the BCM Element Manager, connect to a BCM50 device.
2
Select Administration, General, Hardware Inventory.
The Hardware Inventory panel opens, and displays the BCM50 System tab.
3
View the information displayed in the BCM50 System Expansion area .
4
To update information about the expansion chassis, click the Present checkbox to indicate that
an expansion chassis is installed, and enter an ID in the Asset ID field.
5
To update information about the media bay modules, enter an ID in the MBM Asset ID field.
Viewing and updating other information about the BCM50 system
The Other Information area in the System tab displays other information associated with this
particular BCM system, such as:
•
•
the name of the administrator and their contact information
the location of the BCM50 system
You can add or update this information. The date on which this information is updated is displayed
BCM50 area, in accordance with “LastChangeTime” of the Entity MIB.
Table 35 lists the fields displayed in the Other Information area.
Table 35 Other Information fields
Field Name
Field Description
Field Value
Read/Write
Owner name
The owner’s name or any other
information, such as the administrator’s
name and contact information
Up to 256 characters
Write
Location of this
system
The location of the system
Up to 256 characters
Write
Last change to this Date and time when the information was example ‘2004-04-16 09:
panel
last modified
12:00”
NN40020-600
Read
Chapter 7 Using the BCM50 Hardware Inventory
133
To view or update other information about the BCM50 main unit
1
In the BCM50 Element Manager, connect to a BCM50 device.
2
Select Administration, General, Hardware Inventory.
The Hardware Inventory panel opens. The BCM50 System tab is displayed.
3
View the information displayed in the Other Information area.
4
If you want to add or update information about the owner or administrator of the BCM50
system, enter information in the Owner Name field.
5
If you want to add or update information about the location of BCM50 system, enter
information in the Location of the System field.
Viewing information about devices
The Devices tab displays information about all devices attached to the BCM50. These devices may
include:
•
•
•
digital sets
analog devices
IP sets, including IP clients
You can view all Directory Numbers (DNs) and the type of set associated with the DN. Table 36
lists the fields in the Attached Devices table.
Note: DNs of type “Analog” are not necessarily be populated with a physical
telephone device.
Table 36 Attached Devices fields
Header Name
Header Description
Field Value
Read/Write
DN
Directory Number
In accordance with DN numbering system Read
Model
Type of device or set
example T7316 or I2004
Read
BCM50 Administration Guide
134
Chapter 7 Using the BCM50 Hardware Inventory
Figure 24 Hardware Inventory Devices tab
To view information about attached devices
1
In the BCM50 Element Manager, connect to a BCM50 device.
2
Select Administration, General, Hardware Inventory.
The Hardware Inventory panel opens.
3
Click the Devices tab.
4
View the information displayed in the Attached Devices table.
Viewing additional information about the BCM50 hardware
inventory
The Additional Information tab displays additional information about the BCM50 main unit, such
as:
•
•
•
details about the manufacturer and the manufacture date
hardware version details
serial number details
You require this information only when a field issue requires the identification of certain systems.
NN40020-600
Chapter 7 Using the BCM50 Hardware Inventory
135
Table 37 lists the fields displayed in the Additional Information tab. Items marked as read-only are
detected by the BCM. For items that are not auto-detected, the Element Manager provides
checkboxes, pull-down menus, and fields that the administrator can populate to indicated that
these resources are present.
Note: Asterisk (*) items can also be remotely queried by SNMP using the Entity
MIB.
Table 37 Additional BCM50 main unit Information fields
Field Name
Read/Write
Manufacturer*
Read
Manufacture date
Read
Manufacturing information
Read
Hardware version*
Read
CSC CPC Code
Read
CSC serial number
Read
CSC hardware version
Read
Hard disk drive description
Read
Hard disk drive PEC order code
Read
Hard disk drive serial number
Read
Hard disk drive firmware version
Read
Router CDC CPC code
Read
Router CDC PEC order code
Read
Router CDC serial number
Read
Router CDC hardware version
Read
BRI CDC CPC code
Read
BRI CDC PEC order code
Read
BRI CDC serial number
Read
BRI CDC hardware version
Read
BCM50 Administration Guide
136
Chapter 7 Using the BCM50 Hardware Inventory
Figure 25 Hardware Inventory Additional Information tab
To view additional information about the BCM50 hardware
inventory
1
In the BCM50 Element Manager, connect to a BCM50 device.
2
Select Administration, General, Hardware Inventory.
The Hardware Inventory panel opens.
3
Click the Additional Information tab.
The Additional Information tab opens.
4
View the information displayed in the Additional BCM50 Main Unit Information area.
NN40020-600
137
Chapter 8
Managing BCM50 with SNMP
SNMP (Simple Network Management Protocol) is a set of protocols for managing complex
networks. SNMP-compliant devices, called agents, store meta-data in Management Information
Bases (MIBs) and provide this data to SNMP requesters.
You can use external SNMP clients, such as HP OpenView, to monitor the BCM50 system by
means of read-only SNMP requests.
This chapter provides information about:
•
•
•
BCM50 support for SNMP
configuring BCM50 SNMP settings
using SNMP to send traps
Overview of BCM50 support for SNMP
This chapter provides information about SNMP support provided by the BCM50 main unit.
The BCM50 main unit supports the following versions of SNMP:
•
•
•
SNMP v1 — the first implementation of SNMP; this version supports such protocols as IP
SNMP v2C — provides improved efficiency and error handling
SNMP v3 — provides improvements in security and privacy
Using the Element Manager, you can select which versions of SNMP you want the BCM50 agent
to support. For more information, see “Configuring SNMP settings”.
Management Information Bases provide access to the managed objects of a system and specify the
format of traps. BCM50 supports the following MIBs:
•
•
•
•
•
•
RFC 1213 — MIB II
RFC 2863 — Interface MIB
RFC 2737 — Entity MIB
RFC 2790 — Host MIB
RFC 2261 — SNMP framework
SmallSiteEvent MIB for traps
BCM50 units equipped with an integrated router (BCM50e, BCM50a, BCM50be, and BCM50ba)
also support RFC 1231 — MIB-II and a private MIB. For more information, see the BCM50
Networking Configuration Guide (NN40020-603).
For information about supported MIBs, how to install MIBs, and how to view SNMP traps, see
“Management Information Bases” on page 281.
BCM50 Administration Guide
138
Chapter 8 Managing BCM50 with SNMP
BCM50 supports read-only SNMP requests, even for SNMP variables that display as read-write.
BCM50 does not support configuration operations through SNMP. Variables that are not
supported are displayed as “0”.
Configuring routers to use Element Manager with SNMP
Before you use the BCM for SNMP management, you must ensure that the BCM and the optional
integrated router are configured to allow SNMP queries to be received and responded to. You will
need to correctly configure NAT and Firewall settings for the router. For information on using the
router web-based interface to modify these settings, see the BCM50 Installation Guide and the
BCM50 Networking Guide. The sections below provide an overview of configuring the router to
enable SNMP management.
Connecting through the WAN
In this scenario, the LAN is configured as a private network with no public access. Before
beginning configuration, ensure that both the BCM50 and the SNMP Management Station are
working correctly. If you are using the BCM50a or BCM50e, only SNMPv1 is supported. If you
are using an external router, you can use those versions of SNMP supported by that router. To
enable SNMP, you must configure firewall settings, add NAT rules, and configure the SNMP port.
Configuring firewall settings
If the firewall is enabled on the router, several rules must be added so that the SNMP Management
Station and the BCM50 can communicate. If you are using a BCM50a or BCM50e, these settings
are configured in the Router manager. The first rule allows WAN to WAN communication:
•
•
•
•
Source address: Management station’s IP Address, or “any”
Destination address: Router’s WAN IP Address
Service Type: SNMP (TCP/UDP: 163)
Action: forward
The second rule allow WAN to LAN communication:
•
•
•
•
Source address: Management station’s IP Address, or “any”
Destination address: BCM50 LAN IP Address. This is the IP Address listed in Element
Manager under System/IP Subsystem/General Settings.
Service Type: SNMP (TCP/UDP: 161)
Action: forward
Adding NAT rules
In the NAT section of the router configuration, create a rule with the following settings:
•
•
Start port: 161
End port: 161
NN40020-600
Chapter 8 Managing BCM50 with SNMP
•
139
Server IP address: The BCM50 LAN IP address.
This rule means that all TCP/IP traffic to port 161, which is the BCM50’s SNMP agent port, will
be forwarded to the BCM50 for processing.
Configuring the SNMP router port
By default, both the BCM50 and the BCM50 router attempt to use port 161 for SNMP. This causes
a conflict. In the router configuration, access the Remote Management section, and the SNMP tab
to change this.
Change the communities to public, and set the SNMP Service Port to163. If the trap needs to be
enabled, set it to the SNMP management station IP address. Otherwise, set it to public.
The SNMP management station can now connect to the BCM50 LAN through port 161 and to the
router through port 163.
Connecting through the LAN
An SNMP management station that is configured on the LAN can access the BCM50 and Router
SNMP directly by using the LAN addresses of the BCM50 and BCM50 router.
An SNMP management station that is connected to the OAM LAN cannot access the router
SNMP, as there is no relay on the BCM50.
Configuring SNMP settings
You can use the Element Manager to configure the BCM50 SNMP agent. You can configure:
•
•
•
•
general SNMP settings
community strings
service access points
SNMP trap destinations
You can save a record of SNMP settings using the programming record. For more information, see
“Saving programming records” on page 59.
Configuring general SNMP settings
You can configure general SNMP settings, including:
•
•
•
•
enabling and disabling the SNMP agent
enabling and disabling versions of the SNMP agent
defining access permissions
adding and deleting SNMP management stations
BCM50 Administration Guide
140
Chapter 8 Managing BCM50 with SNMP
You can create a list of SNMP managers who are permitted to query the BCM50 system by
specifying their IP addresses. If you have specified SNMP managers, the BCM50 SNMP agent
will respond only to SNMP requests from those IP devices.
To configure the BCM50 SNMP agent
1
Start the Element Manager.
2
In the Network Element navigation panel, select a BCM element.
3
Log on to the BCM50 by clicking the Connect button.
4
When the Element Manager has connected to the device, click the Configuration tab in the
Task panel.
5
Open the Administrator Access folder, and then click SNMP.
6
Click the General tab.
The General panel is displayed.
7
Configure the SNMP Agent settings.
Table 38 SNMP Agent Settings
Attribute
Action
Engine ID
The engine ID is the SNMP agent’s engine ID. This field is read-only and is for
information purposes only.
Port Number
The port number is a read-only field that shows the SNMP agent’s local port number.
The port number is 161.
To configure BCM50 SNMP settings
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the General tab.
The General panel is displayed.
4
In the SNMP Settings area, click the Modify button.
The Modify SNMP Settings dialog box opens.
NN40020-600
Chapter 8 Managing BCM50 with SNMP
5
141
Configure SNMP settings.
Table 39 Configure SNMP Settings Attributes
Attribute
Action
Enable SNMP Agent
Select whether to enable or disable the SNMP agent by selecting the check
box.
Minimum Required Security
Select the minimum required security for SNMP. Options are: AuthNoPriv
or NoAuthNoPriv. Valid for SNMP v3.
SNMP Version Support
Select the appropriate version from the drop-down list.
The following combinations of SNMP versions are allowed:
— Option 1: SNMP v1, SNMP v2 and SNMP v3.
— Option 2: SNMP v3 only. This option provides more stringent security protection than
option 1 does.
— Option 3: SNMP v2 and SNMP v1.
6
Click the OK button.
Adding an SNMP manager to the BCM50 SNMP manager list
Note: If you configure an SNMP manager with an IP address of 0.0.0.0, the
SNMP agent will respond to SNMP queries from all stations.
Caution: If you add more than five SNMP management stations, the SNMP
service may degrade system performance.
To add an SNMP manager to the BCM50 SNMP manager list
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the General tab.
The General panel is displayed.
4
In the SNMP Manager List area, click the Add button.
The Add Manager dialog box opens.
BCM50 Administration Guide
142
Chapter 8 Managing BCM50 with SNMP
5
Configure the manager list attributes.
Table 40 SNMP Manager Attributes
Attribute
Action
Manager IP
Address
Enter the IP address of the SNMP manager that you want to authorize to query the
BCM50 system.
The IP address must correspond to the PC where the SNMP manager software is
installed. Do not use the dynamic IP address that the PC receives when the dial-up link
activates (when the BCM50 initiates dialing). Using the dynamic IP address causes the
removal of the required static route.
The format for the IP address is X.X.X.X:P, where P is the port.
Setting the IP address to 0.0.0.0 authorizes all SNMP managers to query the system.
6
Click the OK button.
To delete an SNMP manager
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the General tab.
The General panel is displayed.
4
In the SNMP Manager List area, select a manager in the Manager IP Address table.
5
Click the Delete button.
A confirmation message opens.
6
Click the Yes button.
The manager is removed from the Manager IP Address table.
Configuring SNMP community strings
An SNMP community string is a value, similar to a user ID or a password, that allows access to a
device's statistics. SNMP managers send a community string along with each SNMP request. If the
community string is correct, the BCM50 responds with the requested information. If the
community string is incorrect, the BCM50 discards the request and does not respond.
Community strings are used for SNMP v1 and v2C only.
BCM50 ships from the factory with community strings set. It is standard practice for network
managers to change all the community strings to prevent outsiders from seeing information about
the internal network. Before you can send SNMP messages to an SNMP workstation, you must
configure community strings.
NN40020-600
Chapter 8 Managing BCM50 with SNMP
143
You can define the value of a community string, as well as the type of access. You can also delete
a community string.
Caution: Although there is no limit for the number of SNMP communities that
you can set, Nortel recommends that you limit the number of SNMP communities
to a maximum number of 5. Limiting the number of SNMP communities will
reduce degradation of system performance.
To add a community string
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the Community Strings tab.
The Community Strings panel is displayed.
4
Click the Add button.
The Add Community String dialog box is displayed.
5
Specify the community string attributes.
Table 41 SNMP Community String Attributes
Attribute
Action
Community String
Enter the entry name used as a key to uniquely identify an individual community entry
on the SNMP agent.
Type of Access
Specify the read and write access for this community. Available options are Read Only
and Read/Write.
6
Click the OK button.
The community string is added to the Community Strings table.
To delete a community string value
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the Community Strings tab.
The Community Strings panel is displayed.
4
In the Community Strings table, select the community string that you want to delete.
5
Click the Delete button.
A confirmation message is displayed.
6
Click Yes.
The community string is removed from the Community Strings table.
BCM50 Administration Guide
144
Chapter 8 Managing BCM50 with SNMP
Configuring service access points
Service access points are associated with the enhanced security and privacy features of SNMP v3.
The Service Access Point tab is not visible if SNMPv3 is not selected on the SNMP General
Settings tab.
You can view and configure the following parameters associated with service access points.
•
•
•
•
•
•
the user name associated with the service access point
the authentication protocol
the type of access
the encryption protocol
the authentication pass phrase
the privilege pass phrase
You can add, modify, and delete service access points.
To add a service access point
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the Service Access Points tab.
The Service Access Points panel is displayed.
4
Click the Add button.
The Add Service Access Point dialog box opens.
5
Configure the Add Service Access Point attributes.
Table 42 Add Service Access Point Attributes
Attribute
Action
User Name
Enter the name of the user associated with the service access point.
Authentication
Protocol
Select the authentication protocol. Options are: None, MD5, SHA.
Type of Access
Select the type of access. Options are: Read Only and Read/Write.
Encryption Protocol
Select the encryption. Options are: None, DES, 3DES, AES.
Authentication Pass
Phrase
Enter the Authentication pass phrase for the service access point. Press
the Tab key when you have entered the phrase.
Privilege Pass Phrase Enter the Privilege pass phrase for the service access point. Press the Tab
key when you have entered the phrase.
Engine ID
NN40020-600
Enter an engine ID when you add a user that will be used for SNMP v3
communications. The engine ID is made up of hexidecimal digits with a
colon separating each digit.
Leave the engine ID blank when you add a user that will have access to the
MIB, or in the case of SNMP v3 MIB queries.
Chapter 8 Managing BCM50 with SNMP
6
145
Click the OK button.
The service access point is added to the Service Access Point table.
To view details associated with a service access point
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the Service Access Points tab.
The Service Access Points panel is displayed.
4
Select a service access point in the Service Access Points table.
Details are displayed in the Details pane.
To delete a service access point
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the Service Access Points tab.
The Service Access Points panel is displayed.
4
In the Service Access Points table, select a service access point.
5
Click the Delete button.
A confirmation dialog box opens.
6
Click the Yes button.
The selected service access point is deleted from the Service Access Points table.
Configuring SNMP trap destinations
An SNMP trap is a signal that tells the SNMP manager that an event has occurred on the system.
The SNMP system enables SNMP traps to be generated based on all or some events and alarms
generated on the BCM50 system. Any information that is displayed in the Alarms panel can
generate an SNMP trap. For information about the Alarms panel, see “Using the Alarms Panel” on
page 152.
BCM50 alarms that meet the SNMP trap criteria are forwarded to the SNMP trap reporting
interface according to defined trap community strings. SNMP trap notifications are displayed in
your SNMP trap software.
SNMP traps are generated by the BCM50 if you have enabled SNMP for specific BCM50 alarms.
You configure SNMP settings using the Alarm Settings task in the Element Manager.
You can configure the following attributes associated with a trap destination:
•
•
•
•
the name of the trap destination
the host address of the trap destination
the port
the SNMP version
BCM50 Administration Guide
146
Chapter 8 Managing BCM50 with SNMP
•
•
the community string (for SNMP v1 and v2C only)
the user name (for SNMP v3 only)
For information about administering SNMP trap destinations, see “Viewing and modifying SNMP
trap destinations”.
Note: You can configure and administer SNMP trap destinations in both the
Configuration tab and the Administration tab of the Element Manager. This
allows operators who manage BCM50 faults to configure SNMP trap destinations
without having to access the SNMP settings on the Configuration panel. SNMP
must be enabled on the SNMP General panel if you want to configure and use
SNMP trap destinations from the SNMP Trap Destinations panel on
Administration panel.
To add a trap destination
1
Click the Configuration tab.
2
Open the Administrator Access folder, and then click SNMP.
3
Click the SNMP Trap Destinations tab.
The SNMP Trap Destinations panel is displayed.
4
Click the Add button.
The Add Trap Destination dialog box opens.
5
Configure the Add Trap Destination attributes.
Table 43 Add Trap Destination Attributes
Attribute
Action
Name
Enter a name for the trap.
Host
Enter the IP address of the trap destination.
Port
Enter the UDP port number from which the trap will be sent. The default
value is 162.
SNMP Version
Select the version of the SNMP Agent for the trap. Options are: v1/v2C,
and v3.
Community String
Enter the community string to use for the SNMP trap.
User Name
For v3 only, enter the user name for the SNMP trap.
6
Click the OK button.
The new trap destination is displayed in the Trap Destinations table.
Note: When the SNMP agent is restarted, the System Uptime is reset. The SNMP
agent is restarted whenever you reboot the system, make an SNMP configuration
change, or enable/disable the SNMP agent.
NN40020-600
Chapter 8 Managing BCM50 with SNMP
147
Viewing and modifying SNMP trap destinations
Once you have configured SNMP settings, you can view and administer SNMP trap destinations.
You can modify SNMP trap destinations.
Note: You can configure and administer SNMP trap destinations in both the
Configuration tab and the Administration tab of the Element Manager. This
allows operators who manage BCM50 faults to configure SNMP trap destinations
without having to access the SNMP settings on the Configuration panel. SNMP
must be enabled on the SNMP General panel if you want to configure and use
SNMP trap destinations from the SNMP Trap Destinations panel on
Administration panel.
To modify a trap destination
1
Select Configuration>Administrator Access > SNMP > SNMP Trap Destinations or
Administration > General > SNMP Trap Destinations..
2
In the Trap Destinations table, select a trap destination.
3
Click the Modify button.
The Modify Trap Destination dialog box opens.
4
Configure the Modify Trap Destination attributes.
Table 44 Modify Trap Destination Attributes
Attribute
Action
Name
Enter a name for the trap.
Host
Enter the IP address of the trap destination.
Port
Enter the UDP port number from which the trap will be sent. The default
value is 162.
SNMP Version
Select the version of the SNMP Agent for the trap. Options are: v1/v2C,
and v3.
Community String
Enter the community string to use for the SNMP trap.
User Name
For v3 only, enter the user name for the SNMP trap.
5
Click the OK button.
The modified trap destination is displayed in the Trap Destinations table.
BCM50 Administration Guide
148
Chapter 8 Managing BCM50 with SNMP
Auto-SNMP dial-out
The auto-SNMP dial-out service allows you to use an analog modem or ISDN channel to deliver
alarms to a specified destination.
Note: If the line is busy or if the modem cannot connect for any reason, the alarm
will not be delivered to the destination. If you are using SNMP v3, the modem
will re-attempt the connection three times.
For information about how to configure a dial-up interface as a primary connection for
auto-SNMP dial-out, refer to the BCM50 Networking Configuration Guide (NN40020-603).
Alarm severity levels
The terminology used for alarm severity levels in the Alarms panel and in SNMP traps is not the
same. Table 45 lists Alarms panel terminology and the equivalent SNMP trap type.
Table 45 Terminology used for alarm severity levels
Alarm Banner
SNMP Trap Type
Critical
Error
Major
Error
Minor
Warning
Warning
Information
Information
Information
While the BCM50 fault management system denotes the source of an alarm as “ComponentID”,
the SNMP system denotes the sources of this information as a trap of source “eventSource”.
NN40020-600
149
Chapter 9
Using the BCM50 Fault Management System
This chapter contains information about managing alarms generated by the BCM50 system and
administering alarm settings.
The chapter provides information about the following:
•
•
•
•
•
•
an overview of BCM50 fault management tools
an overview of BCM50 alarms
alarms and log files
administering alarms
configuring alarm settings
alarm severities
For a complete list of alarms generated by the BCM50 system, as well as information about
resolving the alarm, see the “List of BCM50 alarms” on page 287.
Overview of BCM50 fault management
You can view and manage real-time alarms generated by the BCM50 system. Alarms arise from
components that are running on the system; these alarms indicate faults or informational
conditions that may require resolution from the system administrator. Examples of alarm
conditions include:
•
•
a T1 circuit on the system is down
a service running on the BCM50 has been stopped by an administrator
Alarm information can be delivered to you by any of the following means:
•
•
•
•
•
the Alarms Panel in the BCM50 Element Manager
the Alarm Banner in the BCM50 Element Manager
core telephony alarms show on the alarm set
Simple Network Management Protocol (SNMP) traps for remote management of faults
LEDs on the BCM50 main unit
You can manage alarms and alarm information by:
•
•
configuring alarm settings, for example filtering alarms so that only the desired subset of
alarms are displayed in the BCM50 Element Manager Alarms Panel or sent as SNMP traps
administering alarms, for example acknowledging selected alarms and clearing the alarm log
You can keep a record of alarm settings using the programming record. For information about
using the programming record, see “Saving programming records” on page 59.
BCM50 Administration Guide
150
Chapter 9 Using the BCM50 Fault Management System
About BCM50 alarms
Alarms are generated by software components that are running on the BCM50 system, and cover
BCM50 services and applications.
Each component has a range of alarm IDs, so that each BCM50 alarm has a unique alarm ID.
Table 46 lists the components and the alarm ID ranges.
Table 46 BCM50 components and Alarm ID ranges
BCM50 Component
Alarm ID Range
Core Telephony
0–999
Operating System
1000—1999
Software Updates
2000—2999
Persistent Data Repository
5000—5999
Date and Time
6000—6999
Modem Call Control
8000—8999
Service Manager
10000—10999
Platform Status Monitor
11000—11999
Backup and Restore
12000—12999
UPS
13000—13999
Configuration Change
16000—16999
System Set Based Admin
17000—17999
Startup Profile
19000—19999
System Authentication
30000—30999
Keycodes
31000—31999
Media Services Manager
40000—40999
CTE
41000—41999
Call Detail Recording
42000—42999
Voice CTI
43000—43999
Unistim Terminal Proxy Server
50000—50999
PVQM
50501—50999
VoIP Gateway
51000—51999
Media Path Server
52000—52999
Media Gateway Server
53000—53999
IP Telephony Provider
56000—56999
Survivable Remote Gateway
57000—57999
LAN Driver
60000—60999
NN40020-600
Chapter 9 Using the BCM50 Fault Management System
151
Alarms and log files
All alarms that appear in the BCM50 Element Manager Alarms Panel are logged in the
alarms.systemlog file. This file is capped at 1 MB in size; when the file reaches this size, a new
alarms.systemlog file is started. The BCM50 keeps the current file as well as three previous files.
The file is also capped and a new file is started when the BCM50 system is rebooted.
You can retrieve the alarms.systemlog files (the current file plus the three previous files) from the
BCM50 system using the Log Management task in the BCM50 Element Manager. You can view
the files using the BCM50 Log Browser. For more information, see Chapter 15, “Managing
BCM50 Logs,” on page 245.
Note: When you retrieve a log, a high level of CPU usage may occur. This level
of CPU is normal during a log retrieval operation.
Alarm severities
Alarm severities are as follows:
Table 47 Alarm Severities
Alarm Severity
Description
Critical
Immediate corrective action is required due to conditions such as loss of
service, loss of bandwidth, outage, loss of data, and/or functionality
Major
Urgent corrective action is required due to conditions such as pending loss
of service, outage, loss of data, and/or functionality
Minor
Corrective action is required to prevent eventual service-affecting
degeneration
Warning
Indicates the detection of a potential or impending service-affecting
condition and that some diagnostic action is required
Information
Indicates audit-type information, such as configuration changes
By default, alarms are displayed in the Alarm Banner. The BCM50 sends SNMP traps for alarms
with a severity of Major and Critical. The only exception is PVQM alarms; for these alarms, the
BCM sends SNMP traps for all severity levels.
Table 48 provides the default mapping of each severity level against the Alarms Panel, alarms set,
LEDs, and SNMP.
Table 48 Default mapping of severity levels
Alarm Severity
Alarms Panel
LEDs
SNMP
Alarm Set (core telephony
alarms only)
Critical
Yes
Yes
Yes
Yes
Major
Yes
Yes
Yes
Yes
Minor
Yes
No
No
No
BCM50 Administration Guide
152
Chapter 9 Using the BCM50 Fault Management System
Table 48 Default mapping of severity levels
Alarm Severity
Alarms Panel
LEDs
SNMP
Alarm Set (core telephony
alarms only)
Warning
Yes
No
No
No
Information
Yes
No
No
No
Administering alarms
Alarm information can be delivered to you by any of the following means:
•
•
•
•
•
the Alarms Panel in the BCM50 Element Manager
the Alarm Banner in the BCM50 Element Manager
the alarm set (core telephony alarms only)
Simple Network Management Protocol (SNMP) traps for remote management of faults
LEDs on the BCM50 main unit
Using the Alarms Panel
You can view real-time alarm information using the Alarms Panel in the BCM50 Element
Manager. Each alarm has a unique identifier. Alarms are displayed in the Alarms table, sorted by
date and time by default, with the newest at the top of the table. The Alarms table displays from 50
to 400 alarms. For information about modifying the maximum number of alarms that are
displayed, see “Configuring alarm settings”.
The Alarms table contains the following elements:
•
•
•
•
•
•
Time — the date and time of the alarm
Alarm ID — the unique alarm ID associated with the alarm
Severity — the severity of the alarm (Critical, Major, Minor, Warning, and Information)
Problem Description — a description of the alarm condition
Component ID — the process that has generated the alarm, in a 3-part DN format. The
component ID always identifies the system as a BCM, includes the name of the system that
generated the alarm, and identifies the component that generated the alarm. In this way, remote
monitoring stations can easily identify what type of system generated an SNMP trap and
which system generated the trap.
Alarm Acked — indicates whether the alarm has been acknowledged in the BCM Element
Manager
When you select an alarm in the table, a Details panel is displayed for the selected alarm. The
Details panel displays the following information:
•
•
•
Time — the date and time of the alarm
Problem Description — a description of the alarm condition
Problem Resolution — the course of action for the alarm
NN40020-600
Chapter 9 Using the BCM50 Fault Management System
153
You can acknowledge an alarm to indicate that the alarm has been taken care of. You can specify
whether to include acknowledged alarms in the Alarm Banner so that the alarm count remains
concise. For more information about the Alarm Banner, see “Using the Alarm Banner” on page
154.
To view an alarm
When you view an alarm on the alarms panel, you can change the order of the columns in the table
and you can sort alarms. For example, you may want to sort alarms by Component ID and Alarm
ID.
1
Click the Administration tab.
2
Open the General folder, and then click the Alarms task.
The Alarms page opens.
3
In the Alarms Panel table, select an alarm.
The Alarm Details panel displays below the Alarms table.
4
To change the order of columns in the Alarm table, select a column and drag it left or right to
the desired location, and release it.
5
To view a column by ascending or descending order, click the column heading.
6
To sort columns, right-click a column heading.
The Sort dialog box opens.
7
Sort columns as required, and then click the OK button.
The columns in the Alarm table are sorted according to your specifications.
To acknowledge an alarm
1
Click the Administration tab.
2
Open the General folder, and then click the Alarms task.
The Alarms panel opens.
3
In the Alarms table, select the alarm you want to acknowledge.
The Alarm Details panel is displayed below the Alarms table.
4
On the Alarms Details panel, click the Acknowledge Alarm button.
A check box appears in the Alarm ACKed column in the Alarms table for this alarm.
Acknowledging the alarm does not clear the alarm; it indicates only that the alarm has been noted.
BCM50 Administration Guide
154
Chapter 9 Using the BCM50 Fault Management System
Clearing the alarm log
Caution: Clearing the alarm log clears the alarms in the Alarms Panel, as well as
from BCM memory. Therefore, alarms will no longer be available for viewing by
any other BCM Element Manager clients connected to the BCM. To view alarms,
access the Alarm log.
To clear the alarm log
1
Click the Administration tab.
2
Open the General folder, and then click the Alarms task.
The Alarms panel opens.
3
On the Alarms panel, click the Clear Alarm Log button.
The Alarms table is cleared. Any new alarms will be displayed after the next alarm polling
interval.
Using the Alarm Banner
You can use the Alarm Banner in the BCM50 Element Manager to view current alarm counts and
recent alarm activity on the BCM50 system. The Alarm Banner appears on the bottom-right corner
of the BCM50 Element Manager window. The Alarm Banner is visible at all times, so you do not
have to navigate to the Alarms panel to view alarms. If you notice a change in alarm conditions in
the Alarm Banner — for example a red spike in the Critical category — you can navigate to the
Alarms Panel to view the actual alarm.
NN40020-600
Chapter 9 Using the BCM50 Fault Management System
155
Figure 26 Alarm Banner
The Alarm Banner provides counts of Critical, Major, Minor, and Warning alarms; Information
alarms are not included. You can specify whether to include acknowledged alarms in the Alarm
Banner.
Each alarm severity counter has a graph, which represents a data sample of the last 20 polling
intervals. The graph has a color to indicate a data change. The colors are as follows:
Table 49 Alarm graph colors
Color
Indicates
Green
There are no alarms of this severity, or there are
alarms of this severity but the count has decreased
since the last polling interval.
Yellow
There are alarms of this severity, but they are older
than at least 1 polling interval.
Red
A new alarm has occurred since the last polling
interval.
The system polls for new alarms every 30 seconds by default.
If you clear the alarm log from the BCM50 Element Manager, the alarms displayed on the Alarm
Banner are also cleared and reset to 0.
BCM50 Administration Guide
156
Chapter 9 Using the BCM50 Fault Management System
To include or omit acknowledged alarms in the Alarm Banner
Select or clear the Include ACKed Alarms check box in the Alarm Banner.
Using the alarm set
You can view core telephony alarms on a telephone set on the BCM50 system. This allows a
system administrator to monitor alarm activity without having a BCM50 Element Manager and a
personal computer.
You can specify the telephone to serve as the alarm set in the BCM50 Element Manager. The
telephone set used for alarms must have a 2-line display and three soft keys.
The alarm set displays an alarm as follows:
XXXXX-YYYY
Where XXXXX is the alarm ID and YYYY is additional alarm information.
The following options are available when an alarm is generated to the alarm set:
•
•
Time — indicates the date and time when the alarm occurred
Clear — use this soft key to remove the alarm from the alarm set.
Note: Clearing an alarm from the alarm set does not change the status of alarms
on the BCM50 Element Manager or reset the LEDs on the front panel of the unit.
Note: When an alarm is dislayed on the alarm set, it remains visible until you
clear the alarm using a softkey on the alarm set. More recent alarms will not be
displayed until the current alarm is cleared on the alarm set.
Figure 27 shows an example of an alarm on the alarm set.
NN40020-600
Chapter 9 Using the BCM50 Fault Management System
157
Figure 27 Alarm set alarm
To specify the alarm set
1
Click the Configuration tab.
2
Open the Telephony folder.
3
Open the Global Settings folder, and then click the Feature Settings task.
The Feature Settings page opens.
4
In the Feature Settings area, enter the DN of the telephone set that you want to use for the
alarm set in the Alarm Set field.
To clear an alarm from the alarm set
On the alarm set, press the Clear soft key. The alarm is cleared from the alarm set.
Note: Clearing an alarm from the alarm set does not change the status of alarms
on the BCM50 Element Manager or reset the LEDs on the front panel of the unit.
Alarms and LEDs
When an alarm condition occurs on the system, the Status LED on the front of the BCM50 main
unit changes to reflect the alarm condition. In normal operation, both LEDs are green. All alarms
with a severity of Major and Critical change the Status LED to solid red on the BCM50 front
panel, except in the event of a Failed Startup Profile, which is indicated by a flashing red LED.
BCM50 Administration Guide
158
Chapter 9 Using the BCM50 Fault Management System
Using the BCM50 Element Manager, you can reset the Status LEDs on the front panel of the
BCM50 to a normal state.
Note: Once the Status LED has changed to red in response to a Critical or Major
alarm condition, it remains in the alarmed state until you reset it using the BCM50
Element Manager.
To reset the Status LED
1
Click the Administration tab.
2
Open the General folder, and then click the Alarms task.
The Alarms panel opens.
3
On the Alarms panel, click the Reset LEDs button.
The Status LED on the front panel of the BCM50 is reset from red to normal operation green.
Using SNMP traps
You can use an SNMP trap manager to remotely monitor BCM50 alarms via SNMP traps. A trap
is an indication from the BCM50 system to configured trap managers that an alarm has occurred in
the BCM50 system. Any BCM50 alarm can generate an SNMP trap.
If you want the BCM50 to send SNMP traps, you must first configure the SNMP agent using the
BCM50 Element Manager. You must enable an SNMP agent and then configure how the system
handles SNMP trap notifications. For information about configuring SNMP settings, see
“Configuring SNMP settings” on page 139.
The BCM50 system uses the Small Site Events Management Information Base (MIB) for alarms.
The trap format is specified in this MIB. You capture and view traps using any standard SNMP
fault monitoring framework or trap watcher. For information about the Small Site Events MIB, see
“Management Information Bases” on page 281.
By default, the BCM50 sends SNMP traps for alarms with a severity of Major and Critical. The
only exception is PVQM alarms; for these alarms, the BCM send SNMP traps for all severity
levels. You can change the default alarms that are set for SNMP to limit the volume and type of
SNMP information, and to control essential information that is transferred on the network. For
information about how to change the default alarms, see “To enable or disable SNMP traps for
alarms” on page 159.
Configuring alarm settings
Although the BCM50 system provides a default mapping of alarms that are displayed in the
Alarms table and that are sent as an SNMP trap, you may want to monitor additional alarms using
either of these means, or you may want to reduce the number of alarms that are displayed in the
Alarms table or sent via SNMP traps.You can specify how each alarm is handled, according to
your business requirements.
You can specify the following settings for alarms:
NN40020-600
Chapter 9 Using the BCM50 Fault Management System
•
•
•
•
159
the maximum number of alarms to display in the Alarms Panel (from 50 to 400)
whether to enable or disable SNMP traps for selected alarms; by default, all Critical and Major
alarms are sent as SNMP traps if you have specified one or more trap destinations
whether to display selected alarms in the Alarms table; by default all Critical, Major, Minor,
and Warning alarms are displayed in the Alarms table
whether to display selected alarms on the alarm set; by default, only core telephony Critical
and Major alarms are sent to this set
You can also test a selected alarm. This allows you to test whether the LED or SNMP traps are
functioning as expected. Testing an alarm generates an alarm in the system. Alarms generated
using the Test Alarm feature are identified in the Alarms table by the words “Test Event” in the
alarm Problem Description field.
For information about using SNMP to monitor the BCM50 system, see Chapter 8, “Managing
BCM50 with SNMP,” on page 139.
To enable or disable SNMP traps for alarms
1
Click the Administration tab.
2
Open the General folder, and then click the Alarm Settings task.
The Alarm Settings panel opens.
3
In the Alarms table, select an alarm.
4
In the Enable SNMP Trap column, select or clear the check box to enable or disable SNMP
traps for the selected alarm. If you select the check box for a selected alarm, an SNMP trap
will be generated if that particular alarm condition occurs.
To enable or disable viewing of selected alarms in the Alarms
table
1
Click the Administration tab.
2
Open the General folder, and then click the Alarm Settings task.
The Alarm Settings panel opens.
3
In the Alarms table, select an alarm.
4
In the Enable GUI View column, select or clear the check box to enable or disable a view of
the selected alarm in the Alarms Panel. If you clear the check box for a selected alarm, the
alarm will not be displayed in the Alarms table if that particular alarm condition occurs in the
system.
To view settings for the alarm set
1
Click the Administration tab.
2
Open the General folder, and then click the Alarm Settings task.
The Alarm Settings panel opens.
3
In the Alarms table, select an alarm.
BCM50 Administration Guide
160
Chapter 9 Using the BCM50 Fault Management System
4
The Enable Alarm Set column indicates whether the alarm will display on the alarm set.
To test an alarm
1
Click the Administration tab.
2
Open the General folder, and then click the Alarm Settings task.
The Alarm Settings panel opens.
3
In the Alarms table, select an alarm.
4
Click the Test Alarm button.
In the Alarms table, “Test Event” is displayed in the alarm Problem Description field.
NN40020-600
161
Chapter 10
Using the BCM50 Service Management System
You can use the Element Manager to view and administer the services that run on the BCM50
system.
This chapter provides:
•
•
•
an overview the BCM50 service management system
a list of BCM50 services
information about how to start, stop, and restart BCM50 services
Overview of the BCM50 service management system
You can view details about the services that run on the BCM50 system, including:
•
•
•
the name of a service
whether a service is enabled to automatically start up
the status of the service running on the BCM50
You can also administer services by starting, stopping, and restarting certain services.
Caution: Use the BCM50 Services Manager only as directed by Nortel Technical
Support. Improper use of the BCM50 Services Manager may adversely affect
system operation.
You can keep a record of BCM50 services using the programming record. For more information,
see “Saving programming records” on page 59.
BCM50 services
Table 50 lists BCM50 services.
Table 50 BCM50 Services
Service Name
Description
BCMInventoryProvider Agent
Cimom Provider
BCMPerfMonProviderAgent
Cimom Provider
BCMSystemProviderAgent
Cimom Provider
BCMUPSProviderAgent
Cimom Provider
BCMWebProviderAgent
Cimom Provider
BCM_DCMProviderAgent
Cimom Provider
BCM50 Administration Guide
162
Chapter 10 Using the BCM50 Service Management System
Table 50 BCM50 Services
Service Name
Description
BCM_Doorphone
Doorphone Service
BCM_HostProviderAgent
Cimom Provider
BCM_IPMusicProviderAgent
Cimom Provider
BCM_LicenseProviderAgent
Cimom Provider
BCM_LogProviderAgent
Cimom Provider
BCM_MIB2ProviderAgent
Cimom Provider
BCM_SNMPProviderAgent
Cimom Provider
BCM_SRGProviderAgent
Cimom Provider
BCM_SecurityProvider Agent
Cimom Provider
BCM_TimeServiceProviderAgent
Cimom Provider
BCM_TimeZoneSettingProviderAgent
Cimom Provider
BackupRestoreProviderAgent
Cimom Provider
BriSW
BRI software
CDRProviderAgent
Cimom Provider
CDRService
Call Detail Recording Service
CallPilotProviderAgent
Cimom Provider
Core Tel
Core Telephony
CoreTelProviderAgent
Cimom Provider
Cte
Computer Telephony Engine
DHCPProviderAgent
Cimom Provider
DiaLogger
System Logging Mechanism
Echo Server
echo service
HGMetrics Reporter
Hunt Group Metrics
IpTelProviderAgent
Cimom Provider
LanCteProviderAgent
Cimom Provider
LANProviderAgent
Cimom Provider
Msm
Media Services Manager
MsmProviderAgent
Cimom Provider
NnuScheduler
System Scheduler
Pdrd
Persistence Data Repository Service
SoftwareUpdateProviderAgent
Cimom Provider
SyslogListener
Syslog Receiver
UftpServer
UFTP Server
WANFailoverProvider Agent
Cimom Provider
WANServiceMgr
WAN Service
btraceserver
Plug-in for Authentication and Routing Management for
BT
NN40020-600
Chapter 10 Using the BCM50 Service Management System
163
Table 50 BCM50 Services
Service Name
Description
core_file_monitor
core file monitoring service
crond
Cron Scheduler
cti server
CTI service
feps
Functional Endpoint Proxy Server (VoIP Gateway)
httpd
HTTP Daemon
lms
Line Monitor Server
mgs
Media Gateway Server
modemcc
modem service
mib2agt
MIB II service
mps
IP Telephony—Media Path
owcimomd
Open Wbem Cimom Server Daemon
psm
—
qmond
QoS Monitor
securityservice
Authentication and Authorization
srg
SRG service
ssba
System Set Based Admin Service (Feature 9*8)
sshd
Secure Shell Daemon
tmwservice
Time Service
utps
UniSTIM Terminal Proxy Server (IP Sets)
voicemail
Voicemail Process
To view details about services
1
Start the BCM50 Element Manager.
2
In the Element pane, select an element.
3
Click the Connect button.
The Task pane is displayed.
4
Click the Administration tab.
5
Open the General folder, and then click the Service Manager task.
The Service Manager page opens. Services are displayed in the Services table.
BCM50 Administration Guide
164
Chapter 10 Using the BCM50 Service Management System
Starting, stopping, and restarting services
You can stop any of the services that are running on the BCM50 system.
Caution: Use the BCM50 Services Manager only as directed by Nortel Technical
Support. Improper use of the BCM50 Services Manager may adversely affect
system operation.
To stop a service
1
Click the Administration tab.
2
Open the General folder, and then click the Service Manager task.
The Service Manager page opens. Services are displayed in the Services table.
3
In the Services table, select a service.
4
Click the Stop button.
A confirmation dialog box opens.
5
Click Yes.
In the Services table, Stopped is displayed in the Status column for the stopped service.
To restart a service
1
Click the Administration tab.
2
Open the General folder, and then click the Service Manager task.
The Service Manager page opens. Services are displayed in the Services table.
3
In the Services table, select a stopped service.
4
Click the Restart button.
A confirmation dialog box opens.
5
Click Yes.
In the Services table, Running is displayed in the Status column for the restarted service.
NN40020-600
165
Chapter 11
Monitoring BCM50 System Metrics
You can use the Element Manager to view detailed information about the performance of the
BCM50 and about the performance of system resources. This chapter provides information about
using system metrics.
About the system metrics
Using the Element Manager, you can monitor overall system performance and other
performance-related information.
You monitor system status using the following tools:
•
•
•
QoS Monitor
UPS Status
NTP Metrics
QoS Monitor
QoS Monitor monitors the quality of service (QoS) of IP trunk services. The tool periodically
monitors the delay and packet-loss of IP networks between two peer gateways. The main objective
of the QoS Monitor is to allow new IP telephony calls to fall back to the PSTN if the voice quality
of the IP network falls below the specified transmit threshold.
For information about setting the transmit threshold, see the BCM50 Networking Configuration
Guide (NN40020-603). You can set the threshold in the Element Manager in the Telephony
Resources panel.
Configuring the QoS Monitor
You configure the QoS Monitor using the QoS Monitor panel on the Administration tab. You can
configure the following:
•
•
the monitoring mode
logging parameters
BCM50 Administration Guide
166
Chapter 11 Monitoring BCM50 System Metrics
To configure monitoring mode
1
On the Navigation tree, click the Administration tab, System Metrics, and QoS Monitor.
2
From the Monitoring Mode drop-down menu, select a monitoring mode.
Table 51 Monitoring Mode options
Attribute
Action
Disabled
—
Enabled in Link-Monitor Mode
Continuously test the connection between the BCM50 and remote
endpoints.
Enabled in QoS-Monitor Mode
Select this option if you want to calculate MOS values for each
endpoint, determine whether the connection has fallen below a
specific threshold, send MOS scores to FCAPS applications, and
create a log history of the MOS scores.
NN40020-600
Chapter 11 Monitoring BCM50 System Metrics
167
Figure 28 QoS Monitoring mode
To configure logging attributes
1
On the Navigation tree, click the Administration tab, System Metrics, and QoS Monitor.
2
Configure logging attributes.
Table 52 Logging attributes
Attribute
Action
Enable Logging
Enable the check box if you want to enable the logging of MOS
scores.
Maximum log file size
Enter a value for the maximum size of the log file, from 1 to 10240
kilobytes (KB). The default is 10 KB.
Logging Frequency
Enter the time interval between each MOS log: 1 to 1440 minutes.
The default is 1 minutes.
3
Press the Tab key to save the settings.
BCM50 Administration Guide
168
Chapter 11 Monitoring BCM50 System Metrics
To view the QoS monitoring information
The Mean Opinion Scores table displays the current network quality described as a Mean Opinion
Score (MOS) for each IP destination. You can view the MOS mapping. Unlike the BCM 3.x where
both transmit and receive values were reported, the QoS Monitor collects only the transmit values.
Table 53 lists the fields displayed in the Mean Opinion Score table.
Table 53 Mean Opinion Score descriptions
Attribute
Description
Name
Displays the name of the Remote Gateway
IP Address
Displays the IP address of the Remote Gateway
QoS Indicator
Displays a text description of the current MOS value. The MOS values can be Poor,
Fair, Good or Excellent.
G.711
Displays the current MOS value calculated when using a G.711 aLaw codec to
transmit VoIP packets to this Remote Gateway.
The MOS can be a value from 0.00 to 5.00, where 0.00 is the worst score (Poor)
and 5.00 is best score (Excellent).
G.723-5.3kbit/s
Displays the current MOS value calculated when using a G.723 5.3 kbit/s codec to
transmit VoIP packets to this Remote Gateway.
The MOS can be a value from 0.00 to 5.00, where 0.00 is the worst score (Poor)
and 5.00 is best score (Excellent).
G.723-6.3kbit/s
Displays the current MOS value calculated when using a G.723 6.3 kbit/s codec to
transmit VoIP packets to this Remote Gateway.
The MOS can be a value from 0.00 to 5.00, where 0.00 is the worst score (Poor)
and 5.00 is best score (Excellent).
G.729
Displays the current MOS value calculated when using a G.729 codec to transmit
VoIP packets to this Remote Gateway.
The MOS can be a value from 0.00 to 5.00, where 0.00 is the worst score (Poor)
and 5.00 is best score (Excellent).
G.729A
Displays the current MOS value calculated when using a G.729A codec to transmit
VoIP packets to this remote Gateway.
The MOS can be a value from 0.00 to 5.00, where 0.00 is the worst score (Poor)
and 5.00 is best score (Excellent).
To refresh the QoS monitor data
To update the MOS table with the most current values, select View > Refresh, press F5, or select
the Refresh icon from the toolbar.
UPS Status
The BCM50 can support an Uninterruptible Power Supply (UPS) device to ensure continuous
operation during power interruption and failure conditions. The UPS feature provides power
source monitoring and battery backup so that critical system functionality required to maintain and
provide warning time to either correct the problem or to activate a contingency plan for impacted
services is possible. UPS is described in the BCM50 Installation and Maintenance Guide
(NN40020-302), and the BCM50 Installation Checklist and Quick Start Guide (NN40020-308).
NN40020-600
Chapter 11 Monitoring BCM50 System Metrics
169
The UPS connects and communicates with the BCM50 through USB. Enabling the UPS feature
requires plugging the UPS USB cable into the BCM50 USB connector before powering up the
BCM50. The UPS must be present during the boot up process for the BCM50 to function.
This section provides the procedure that describes how “To access UPS Status”.
To access UPS Status
1
To access the UPS Status, open the Element Manager, click the Administration tab, click
System Status in the directory tree, and then click UPS Status.
The UPS Status then displays.
The UPS Status panel confirms that a UPS is connected including model and serial number, its
current status, and provides a read out of the current values. Additionally, an indication is
given whether the value is within the normal range or not.
The UPS Status panel tracks occurrences of alarms pertaining to UPS operation. These alarms are
also sequentially viewable in the Alarm panel. The metrics correspond to alarms in the BCM50
and appear in the alarm panel as well.
2
To check the metrics of the UPS, click the Metrics tab. It displays the information on the
panel.
NTP Metrics
Using Network Time Protocol (NTP), you can configure the time on the BCM50 indirectly from a
single time server. NTP is a network protocol designed to synchronize the clocks of computers
over an IP network. The NTP Metrics provide an overview of the integrity of the NTP time source.
Note: If the BCM50 clock control has not been configured to use NTP
(Configuration>System>Date & Time), then the NTP Metrics panel displays no
data.
This section provides the procedure “To access the NTP Metrics”.
To access the NTP Metrics
1
Open the Element Manager, click the Administration tab, click System Status and then
select NTP Metrics in the navigation tree.
2
The NTP Metrics panel displays the following information:
Table 54 NTP Statistics
Parameter Name
Description
Last Synchronized
When the last synchronization occurred
Minimum time difference (s)
The minimum time change that occurred since NTP was running
BCM50 Administration Guide
170
Chapter 11 Monitoring BCM50 System Metrics
Table 54 NTP Statistics
Parameter Name
Description
Maximum time difference (s)
The maximum time difference that occurred since NTP was running
Last Synchronization Status
The results of the last synchronization: successful or unsuccessful. If
unsuccessful the reason for the failure is given: failed to contact, or failed
security check. A status of Not Running indicates that NTP is not
configured.
NN40020-600
171
Chapter 12
Monitoring BCM50 Telephony Metrics
You can use the Element Manager to view detailed information about the performance of the
BCM50 and about the performance of system resources.
This chapter provides information about telephony metrics.
Telephony Metrics
The following sections provide a general overview of the Element Manager Telephony Metrics.
The Telephony Metrics folder groups together a number of BCM50 system status tracking
different aspects of Telephony services.
This overview describes the following general process information:
•
•
•
•
•
•
“Activity Reporter Basic” on page 171
“Trunk Module Metrics” on page 172
“CbC limit metrics” on page 178
“Hunt Group Metrics” on page 180
“PSTN Fallback Metrics” on page 182
“Proactive Voice Quality Management” on page 183
Activity Reporter Basic
Activity Reporter Basic allows you to monitor the performance of the BCM. You can use the
Activity Reporter Basic to generate the following reports:
•
•
•
•
telephone call activity
custom call routing activity
voice mail receive statistics
hunt group performance
When you enable Activity Reporter Basic, the BCM automatically generates reports and updates
them each night. The reports reflect the performance of the BCM during the past four days. The
panel displays the date and time of the most recent report.
This section provides the following procedures:
•
•
“To enable Activity Reporter Basic”
“To disable Activity Reporter Basic”
BCM50 Administration Guide
172
Chapter 12 Monitoring BCM50 Telephony Metrics
To enable Activity Reporter Basic
1
In the Element Manager, select the Administration tab, then click the Telephony Metrics >
Activity Reporter Basic in the navigation tree.
The Activity Reporter Basic panel displays.
2
Select the Enable Daily Data Collection checkbox to activate Activity Reporter Basic.
3
In the Collection Time drop-down menu, select a time to generate daily reports. The default
time is 12:30 am.
To disable Activity Reporter Basic
1
In the Element Manager, select the Administration tab, then click the Telephony Metrics >
Activity Reporter Basic in the navigation tree.
The Activity Reporter Basic panel displays.
2
De-select the Enable Daily Data Collection checkbox to disable Activity Reporter Basic.
Trunk Module Metrics
When you need to find out information about a trunk module, you can determine the status of any
of the settings under the trunk modules headings. To correct a problem you may need to enable or
disable a port, a module, or an entire bus.
This section provides the following procedures:
•
•
•
•
“To view Trunk Module status” on page 172
“Disabling or enabling a B channel setting” on page 174
“Provisioning a PRI B-channel” on page 174
“Trunk Module CSU statistics” on page 175
To view Trunk Module status
The Trunk Module Metrics panel allows you to view the status of digital trunk modules as well as
identify any device or lines connected to the system. This allows you to isolate any malfunctioning
part of the system. In addition, you can use the Trunk Module selection to disable and enable
modules and devices.
Use this procedure to display module type, the number of sets connected to the module, the
number of busy sets and the module state:
1
On the Element Manager navigation tree, select Administration > Telephony Metrics >
Trunk Module Metrics.
The window displays the expansion locations for the modules connected to the system.
2
Select the module that you want to view. For example, Expansion 1. See Figure 29.
NN40020-600
Chapter 12 Monitoring BCM50 Telephony Metrics
173
Figure 29 Viewing Trunk Module metrics
3
Click Start Loopback Test button to start the network test without having to remove the
BCM50.
4
Select a loopback type. The options are:
•
•
•
•
5
payload
line
card edge
continuity
Click Stop Loopback Test when done the test of the network.
When you click on a module in the process above, a new menu appears, Details for Module:
with the following tabs:
•
•
•
•
•
•
CSU Alarms
CSU Alarm History
Performance
Performance History
D-Channel
B-Channels
BCM50 Administration Guide
174
Chapter 12 Monitoring BCM50 Telephony Metrics
Viewing Performance History information
The Performance History tab displays the performance information over 15-minute intervals
collected in the past 24 hours. The performance information collected includes the number of
errored seconds, severely errored seconds, and unavailable seconds over each 15-minute interval.
1
On the navigation tree, click Administration, Telephony Metrics, Trunk Module Metrics.
2
Click the Performance History tab to view metrics information.
Viewing D-Channel information
This tab displays trunk module metrics for the D-channel. D-channel metrics display when a BRI
trunk module is configured on the system.
1
On the navigation tree, click Administration, Telephony Metrics, Trunk Module Metrics.
2
Click the D-channel tab to view metrics information.
Disabling or enabling a B channel setting
If you need to isolate a problem, you may need to turn off individual port channels, rather than the
entire module.
To disable or enable a B channel setting
1
On the navigation tree, click Administration > Telephony Metrics > Trunk Module
Metrics.
The window displays Expansion 1 or Expansion 2.
2
Click heading of the bus you want to view. For example, click Expansion 1.
3
Click the tab in the lower menu marked B-Channels.
4
Click the B channel you want to enable or disable (B1 or B2).
5
Then select Enable or Disable.
If you are disabling the channel, you are prompted by a dialog box to confirm your action. The
State field indicates the mode of operation for the port. If the port is enabled, this field is blank
unless a device is physically connected.
Provisioning a PRI B-channel
When you purchase PRI from your service provider, you can request the number of B-channels
that are allocated for you to use. For example, you may want to use only 12 B-channels. If you do
not have all of the PRI B channels, disable all the B-channels that you do not need.
Nortel recommends that the number of lines that are deprovisioned on a DTM (configured as PRI)
be the same as the number of B-channels that are disabled. For example, if the DTM is on
Expansion 1, when B-channels 13-23 are disabled, you should deprovision lines 77 to 87.
NN40020-600
Chapter 12 Monitoring BCM50 Telephony Metrics
175
To provision a PRI B-channel
1
Choose Administration, Telephony Metrics, Trunk Module Metrics.
2
Choose an expansion module.
3
Choose B channels.
A list of the B channels on this module appears.
4
Click a channel, for example, B 01
The display shows the status of the PRI channel.
5
On the Configuration menu, click Enable or Disable to change the setting for the channel.
Trunk Module CSU statistics
Each trunk module has an internal channel service unit (CSU). When enabled, the internal CSU
monitors the quality of the received T1 signal and provides performance statistics, alarm statistics,
and diagnostic information.
Trunk modules must be individually programmed to establish parameters for collecting and
measuring transmission performance statistics by the CSU.
For more information, refer to:
•
•
•
•
•
•
•
•
•
“Statistics collected by the system” on page 175
“Enabling the internal CSU” on page 176
“To check the performance statistics” on page 176
“To check the CSU alarms” on page 177
“To check carrier failure alarms” on page 177
“To check bipolar violations” on page 177
“To check short-term alarms” on page 178
“To check defects” on page 178
“CbC limit metrics” on page 178
Statistics collected by the system
The system accumulates three performance parameters:
•
•
•
errored seconds (ES)
severely errored seconds (SES)
unavailable seconds (UAS)
These parameters are defined according to TIA-547A. Errored seconds are enhanced to include
control slip (CS) events. Only near-end performance data is recorded.
The internal CSU continuously monitors the received signal and detects four types of transmission
defects:
•
any active carrier failure alarms (CFA), such as loss of signal (LOS), out of frame (OOF),
alarm indication signal (AIS), and remote alarm indication (RAI)
BCM50 Administration Guide
176
Chapter 12 Monitoring BCM50 Telephony Metrics
•
•
•
the number of bipolar violations that occurred in the last minute
any defects that occurred in the last minute, such as loss of signal (LOS), out of frame (OOF),
and alarm indication signal (AIS)
the number of milliseconds of short-term alarms in the last minute, such as loss of signal
(LOS), out of frame (OOF), alarm indication signal (AIS), and remote alarm indication (RAI).
A short term alarm is declared when the detected defects persist for tens of milliseconds.
A carrier failure alarm (CFA) is a duration of carrier system outage. CFA types reported can be
mapped to CFAs defined in TIA-547A and TR62411 as shown in Table 55.
Table 55 Carrier failure alarms
Business Communications
Manager
TIA-547A
TR62411
LOS CFA
RED CFA
RED CFA
OOF CFA
RED CFA
RED CFA
AIS CFA
RED CFA
AIS CFA
RAI CFA
YELLOW CFA
YELLOW CFA
The criteria for declaring and clearing the alarms is selectable to meet those in TIA-547A or
TR64211. You can also view Carrier Failure Alarms as Core Telephony Alarms in the Alarm
Viewer.
Enabling the internal CSU
Use the following procedure to enable the internal CSU to gather performance statistics for your
T1 lines or PRI with public interface.
To enable the internal CSU
1
Choose Configuration, Resources, Telephony Resources.
The window displays the expansion modules.
2
Choose the appropriate expansion module. For example, select Expansion 1.
3
For the selected module, choose the Trunk Module Parameters tab.
4
In the T1 Parameters section, select the Internal CSU check box to enable the Internal CSU.
To check the performance statistics
1
Choose Administration, Telephony Metrics, Trunk Module Metrics.
2
Choose the appropriate expansion module that contains the module that you want to check.
3
Choose Performance tab.
NN40020-600
Chapter 12 Monitoring BCM50 Telephony Metrics
177
4
The Current interval displays the duration of the current 15-minute interval of the selected
card, the number of errored seconds (ES), the number of severely errored seconds (SES) and
the number of unavailable time seconds (UAS).
5
Click the 24-hour summary heading for an overall summary of the previous 24 hours.
The Number of intervals, Errored Seconds, Severely Errored Seconds, Unavailable Seconds
appear in the summary.
6
Click the Reset Statistics button to reset any new settings.
The system displays a message indicating that this will remove all of the statistics.
7
Select OK to erase all the current statistics and begin collecting statistics again.
Checking trunk module alarms
To check the CSU alarms
1
Choose Administration, Telephony Metrics, Trunk Module Metrics.
2
Choose an expansion module.
3
Click the CSU Alarms tab.
The display shows all the active alarms of the types LOS (loss of signal), OOF (out of Frame),
RAI (Remote alarm indicator) or AIS (Alarm indication signal). For more information on
these types of transmission defects, refer to “Statistics collected by the system” on page 175.
To check carrier failure alarms
1
Choose Administration, Telephony Metrics, Trunk Module Metrics.
2
Choose an expansion module.
3
Click the CSU Alarm History tab.
The display shows LOS (loss of signal), OOF (out of Frame), AIS (Alarm indication signal),
and RAI (Remote alarm indicator). For more information on these types of transmission
defects, refer to “Statistics collected by the system” on page 175.
4
Choose the type of alarm you wish to view. For example, LOS (Loss Of Signal).
5
Click the drop-down menu to select a time period.
The display shows the Start time of the period.
To check bipolar violations
1
Choose Administration, Telephony Metrics, Trunk Module Metrics.
2
Choose an expansion module.
3
Click the CSU Alarms tab.
The display shows the number of bipolar violations that occurred in the last minute.
BCM50 Administration Guide
178
Chapter 12 Monitoring BCM50 Telephony Metrics
To check short-term alarms
1
Choose Administration, Telephony Metrics, Trunk Module Metrics.
2
Choose an expansion module.
3
Click the CSU Alarms tab.
The display shows the short term alarms and the number of milliseconds (not necessarily
contiguous) that were active in the last minute.
To check defects
1
Choose Administration > Telephony Metrics > Trunk Module Metrics.
2
Choose a an expansion module.
3
Click the CSU Alarms tab.
The display shows the first type of defect and the number of milliseconds (not necessarily
contiguous) the hardware reported in the last minute.
To view CSU Alarm History
1
Choose Administration, Trunk Modules.
2
Choose an expansion module.
3
Click the CSU Alarm History tab.
The display shows all the alarms
4
To view a specific alarm, click the Alarm Name.
The display shows all the occurrences of that Alarm
CbC limit metrics
Call-by-call service (CbC) on public PRI protocol (NI-2) allows a PBX to use channels more
effectively by expanding or contracting the number of channels available to different call types
such as INWATS, OUTWATS, Foreign Exchange (FX), and tie lines.
The call-by-call service is a method of offering and receiving services to Customer Premises
Equipment (CPE) on ISDN PRI without the use of dedicated circuits (i.e. interface or B-channels).
The Call-By-Call service conveys signaling information over an ISDN Primary Rate Interface
(PRI) that indicates, on a per-call basis, the specific service type required to complete the call.
Although PRI-MCDN and IP trunks do not have multiple call types, CbC limits can be used on
these trunks to limit the number of incoming or outgoing trunks that may be in use simultaneously.
Once the feature is configured, use the CbC Limit metrics panel to monitor denied call activity for
each service on each line pool.
NN40020-600
Chapter 12 Monitoring BCM50 Telephony Metrics
179
PRI lines that support call-by-call services have maximum and minimum call limits for each
service. Use this panel to view reports for the services. These limits are set as part of the
numbering plan programming.
This section provides the “To access the CbC limit metrics” procedure.
To access the CbC limit metrics
1
To access the CbC metrics, in the Element Manager, click the Administration tab, click the
Telephony Metrics and then CbC Limit Metrics in the navigation tree.
2
To assess the capacity of the PRI call services on your system, on the Call by Call Metrics
table, select the line pool for which you want to view CbC traffic. See Figure 30.
Figure 30 Call By Call limit metrics
The denied call details for each type of service supported by the line pool is displayed. See
Figure 31 on page 180.
BCM50 Administration Guide
180
Chapter 12 Monitoring BCM50 Telephony Metrics
Figure 31 Denied calls details
Table 56 describes each field on the two CbC metrics panels.
Table 56 Details for a Line Pool
Attribute
Value
Call By Call Limit Metrics table
Line Pool
Read-only. The pool of lines that call-by-call limits are applied
to.
Calls denied because CbC limits were exceeded table
Service Type
Read-only. The type of service that the limits apply to.
INCOMING due to Outgoing
Min.
Read-only. The number of incoming calls that have been
blocked due to the call-by-call limits.
due to Incoming Max.
Read-only. The number of incoming calls that have been
blocked due to the call-by-call limits.
Outgoing due to Incoming Min. Read-only. The number of outgoing calls that have been
blocked due to the call-by-call limits.
due to Outgoing Max.
Read-only. The number of outgoing calls that have been
blocked due to the call-by-call limits.
Actions
Clear
To clear the table so you can start a monitoring period:
1. Click on the Action menu item.
2. Select Clear.
3. Close the panel.
4. If you determine that the call denials are too numerous,
increase lines that support the affected service type.
Hunt Group Metrics
Hunt groups provide a service where incoming calls ring on a targeted group of telephones called a
Hunt group. When you designate a Hunt group, you define the group as a unique Directory
Number (DN). This DN receives and distributes calls to the telephones assigned to the group.
NN40020-600
Chapter 12 Monitoring BCM50 Telephony Metrics
181
This section provides the procedure for “To access the Hunt Group metrics”.
Note: You can include Hunt Group hourly metrics files with the CDR data files
when the are transferred to the central server. For more information on
configuring this option, refer to the Call Detail Recording System Configuration
Guide (NN40020-605).
To access the Hunt Group metrics
To access the Hunt Group metrics to evaluate total call processing by hunt group member:
1
In the Element Manager, select the Administration tab, then the Telephony Metrics and
Hunt Group Metrics in the navigation tree. See Figure 32 on page 181.
Figure 32 Hunt Group Metrics Table
Table 57 describes each field on the panel.
Table 57 Hunt Group Metrics fields
Attribute
Value
Hunt Groups table
Hunt group name
Read-only
Name of hunt group
Name
Read-only
Name entered on DN record
BCM50 Administration Guide
182
Chapter 12 Monitoring BCM50 Telephony Metrics
Table 57 Hunt Group Metrics fields (Continued)
Attribute
Value
Total calls
Read-only
Total number of calls
Answered: Total
Read-only
Total number of answered calls
Answered Average%
Read-only
Average number of answered calls
Answered: Average time (s)
Read-only
Average answer time in seconds
Abandoned: Total
Read-only
Total number of abandoned calls
Abandoned: Average%
Read-only
Average number of abandoned calls
Busy: Total
Read-only
Total number of busy calls
Busy: Average%
Read-only
Average number of busy calls
Overflow: Total
Read-only
Total number of overflow calls
Overflow: Average%
Read-only
Average number of overflow calls
Time in Queue:
Read-only
Time in queue
Last Reset time
Read-only
Time and date format depends country profile of
system.
Reset
1. On the Hunt Groups table, select the hunt group member for which
you want to reset the metrics.
2. In the lower frame, click the Reset button.
Details
PSTN Fallback Metrics
When trunks are out of service, traffic can be switched to PSTN fallback lines. You can view how
many fallback attempts and fallback failures occur within a specific period using the PSTN
Fallback Metrics panel.
This section provides the procedure “To access PSTN Fallback metrics”.
To access PSTN Fallback metrics
1
In the Element Manager, select the Administration tab, then click the Telephony Metrics and
PSTN Fallback Metrics in the navigation tree.
The PSTN Fallback metrics display immediately. See Figure 33 on page 183.
NN40020-600
Chapter 12 Monitoring BCM50 Telephony Metrics
183
Figure 33 Fallback Metrics panel
Table 58 describes each field on the panel.
Table 58 PSTN Fallback Metrics fields
Attribute
Value
Description
Last reset time
This is the date and time the metrics table was last reset.
Fallback requests
The number of calls that were not able to route through the
preferred trunk.
Fallback failures
The number of calls that were not able to route through the
fallback trunk.
Note: If there is no fallback trunk assigned, all fallback
requests will fail.
Actions
Reset
Click this button to clear out the metrics table.
The Last reset time will display the current date and time.
Proactive Voice Quality Management
Proactive Voice Quality Management (PVQM) metrics allow you to monitor the quality of VoIP
calls. You can also use the PVQM metrics to diagnose infrastructure problems in your network.
BCM50 Administration Guide
184
Chapter 12 Monitoring BCM50 Telephony Metrics
You can use PVQM to configure and report threshold violations for the following voice quality
metrics:
•
•
•
•
packet loss—packets lost in transit due to errors or network failures
inter arrival jitter—the variable delay on a packet as it traverses a network
round trip delay
listening R—the transmission quality as experienced by the user; this metric reflects the
segment of the call that is carried over the RTP session
There are two thresholds for PVQM metrics: Warning, and Unacceptable. A violation of the
Warning threshold indicates that the voice quality is reduced but is still within an acceptable range.
A violation of the Unacceptable threshold indicates a severe degradation in voice quality.
PVQM is fully supported on Phase 2 IP sets. Phase 1 IP sets support only the following PVQM
metrics: packet loss, inter arrival jitter, and rould trip delay. Table 59 lists the IP Phones that
support PVQM.
Table 59 PVQM support
IP Set Type
Description
IP Phone 2001
Phase 2 firmware
IP Phone 2002
Phase 1 and Phase 2 firmware
IP Phone 2004
Phase 1 and Phase 2 firmware
IP Phone 2050 v2
PC-based soft client
IP Phone 2007
Phase 2 firmware
IP Phone 1120E
Phase 2 firmware
IP Phone 1140E
Phase 2 firmware
This section provides procedures “To configure PVQM threshold settings” and “To access PVQM
metrics”, and also provides information about PVQM alarms.
To configure PVQM threshold settings
1
In the Element Manager, select the Administration tab, then click the Telephony Metrics >
PVQM > Threshold Settings in the navigation tree.
The Proactive Voice Quality Monitoring panel displays. See Figure 33 on page 183.
NN40020-600
Chapter 12 Monitoring BCM50 Telephony Metrics
185
Figure 34 PVQM panel
2
Configure the threshold value for each PVQM metric. The options are:
•
•
•
•
warning (desktop)
warning (soft client)
unacceptable (desktop)
unacceptable (soft client)
Note: The term “desktop” indicates IP sets that are desktop models. The term
“soft client” indicates IP sets that are software applications, such as the 2050 and
the 2050MVC. Since desktop IP sets may provide better voice quality than
software-based IP sets, you can specify different threshold levels for each type of
IP set.
BCM50 Administration Guide
186
Chapter 12 Monitoring BCM50 Telephony Metrics
Table 62 describes the settings.
Table 60 PVQM threshold settings
Default Value
for
Unacceptable
thresholds
Metric
Description
Packet Loss Rate
The fraction of RTP data
0-100
packets from the source lost
since the beginning of the call,
expressed as a percentage.
1%
5%
Inter-arrival Jitter
The inter-arrivak time of
incoming RTP packets, as
defined in RFC 1889.
Expressed in milliseconds.
0-1000
50 ms
500 ms
RTCP Round Trip
Delay
The round trip time of
incoming RTP packets, as
defined in RFC 1889.
Measured in milliseconds.
0-1000
300 ms
500 ms
Listening R Factor
A scale from 0 (lowest quality) 0-100
to 100 (highest quality)
according to ITU-T G.107.
65
n/a
3
Value Range
Default Value
for Warning
thresholds
Configure the polling interval.
PVQM alarms
If an alarm is generated to report a threshold violation, additional information is included in
the alarm to indicate the source of the alarm and provide other troubleshooting information.
Table 61 lists the abbreviations used in the alarm text to present this additional information.
Table 61 PVQM alarm information
Abbreviation
Attribute
Value
Description
cT
codec type
alphanumeric
Vocoder type used on this call
eT
endpoint type
S or D
S indicates softclient
D indicates desktop
nLR
network loss rate
percentage, scaled by Rate of network packet loss
256 (e.g. 354 = 1.4%)
dR
average discard rate
percentage, scaled by Average rate of discards due to jitter
256
bD
burst loss density
percentage, scaled by Density of lost and discarded
256
packets during burst periods
bL
burst length
milliseconds
gD
gap loss density
percentage, scaled by Density of lost and discarded
256
packets during gap periods
gL
average length of gap
milliseconds
NN40020-600
Average length of bursts
average length of gap
Chapter 12 Monitoring BCM50 Telephony Metrics
187
Table 61 PVQM alarm information
Abbreviation
Attribute
Value
Description
eSD
end system delay
milliseconds
Average end system delay on the
call
aNL
noise level
dBm
Measured received silent period
noise level
aSP
average signal level
dBm
Measured received signal level
during talk spurts
rTT
local round trip time
average
1/65536 of a second
Average round trip time on the call
For a list of the alarms generated by PVQM threshold violations, refer to About BCM50 alarms on
page 150 and List of BCM50 alarms on page 287.
To access PVQM metrics
1
In the Element Manager, select the Administration tab, then click the Telephony Metrics and
PVQM > Metrics in the navigation tree.
The PVQM metrics panel displays.
BCM50 Administration Guide
188
Chapter 12 Monitoring BCM50 Telephony Metrics
Figure 35 PVQM Metrics panel
Table 62 describes each field on the panel.
Table 62 PVQM Metrics fields
Attribute
Value
Description
Number of connections
Displays the total number of connections by IP sets on the
system since the last reset. This count includes non-interactive
features such as dial tones, call progress tones, and music on
hold.
Last rest
Displays the time of the last reset.
Most recent date and time
Displays the time of the most recent threshold violation.
Most recent DN
Displays the DN of the most recent threshold violation.
Desktop count
Displays the number of times a desktop client violated a
threshold.
Soft client count
Displays the number of times a soft client violated a threshold.
Mean time between
violations (MTBV) for
desktop
Displays the mean time between threshold violations of a
particular metric for desktop clients (measured in seconds).
Mean time between
violations (MTBV) for soft
client
Displays the mean time between threshold violations of a
particular metric for soft clients (measured in seconds).
NN40020-600
Chapter 12 Monitoring BCM50 Telephony Metrics
189
Table 62 PVQM Metrics fields
Attribute
Value
Description
Actions
Reset Metrics
Click this button to clear out the metrics table.
The Last reset time will display the current date and time.
BCM50 Administration Guide
190
Chapter 12 Monitoring BCM50 Telephony Metrics
NN40020-600
191
Chapter 13
BCM50 Utilities
This chapter contains information about the utilities that are part of the Element Manager. These
utilities provide information about the BCM50 system, so that you can monitor and analyze
system status and performance.
BCM50 utilities are:
•
•
•
•
•
•
BCM Monitor
Ping
Trace Route
Ethernet Activity
Reset
Diagnostic Settings
About BCM Monitor
BCM Monitor is a stand-alone diagnostic application that the system administrator can use to view
real-time system and IP telephony information about BCM50 systems.
BCM Monitor is included with the installation of the Element Manager. You do not need to
download the utility, unless you are an administrative user who requires access to only this
management tool and you do not have or require the Element Manager.
Using BCM Monitor, you can monitor the following:
•
•
•
•
•
•
overall system status
IP telephony functions of the BCM50 system, including IP device activity and VoIP session
information
utilization of resources
operation of telephony applications (for example, Voice Mail and Contact Center)
lines
PRI, BRI, and IP trunks
You use BCM Monitor from a remote PC that has IP connectivity to the monitored system. You
can open multiple instances of BCM Monitor on a single PC to monitor several remote BCM50
systems at the same time.
BCM Monitor supports BCM50 release 2.0 and later. You can use BCM Monitor with BCM
releases 2.5 and 2.5 FP1, but these releases provide only limited support for certain diagnostic
queries and unsupported information elements appear as “N/A” in BCM Monitor panels.
When BCM Monitor connects to a BCM system that does not support a particular information
element, this is indicated by “N/A” in the relevant BCM Monitor panels.
BCM Monitor does not require significant hard disk space or memory on the client PC.
BCM50 Administration Guide
192
Chapter 13 BCM50 Utilities
The following operating systems support BCM Monitor:
•
•
•
•
Windows Vista (Business, Ultimate, and Enterprise versions)
Windows 2000
Windows XP
Citrix
Installing BCM Monitor
BCM Monitor is included with the installation of the BCM50 Element Manager. You do not need
to download and install the utility separately, unless you are an administrative user who requires
access to only this management tool and you do not have or require the BCM50 Element Manager.
If you do require BCM Monitor separately from the Element Manager, you install the application
from the BCM50 Web page.
To install BCM Monitor separately from BCM50 Element Manager
1
On the BCM50 Web Page, click the Administrator Applications link.
The Administrator Applications page opens.
2
Click the BCM Monitor link.
The BCM Monitor page opens.
3
Click the Download BCM Monitor link.
4
Select a folder where you want to store the BCM Monitor install file, and then click the Save
button, or click the Run button to run the install file directly from the web page.
5
If you selected Save in step 5, go to the folder where you saved the BCM Monitor install file,
and then double-click the BCMMonitor.exe icon.
6
Follow the instructions on the installation wizard.
To remove BCM Monitor
1
In Windows, click the Start button.
2
Select Control Panel.
3
Double-click the Add or Remove Programs icon.
4
Select BCM Monitor, and then click the Change/Remove button.
5
Follow the on-panel removal instructions.
Connecting to a BCM50 system
For security reasons, the user on the computer on which the BCM Monitor runs must be
authenticated by the BCM50 system.
NN40020-600
Chapter 13 BCM50 Utilities
193
To start BCM Monitor without the Element Manager
1
Double-click the BCM Monitor shortcut on your desktop or find BCM Monitor in your
Start/Programs menu.
The Enter Logon Information window opens.
2
In the System Name or IP Address field, enter the system name of the BCM50 you want to
monitor.
3
In the Connect As field, enter your BCM50 user name.
4
In the Password field, enter the password associated with your BCM50 user name.
5
Click the Connect button.
The BCM Monitor panel opens.
To start BCM Monitor from the Element Manager
1
Click the Administration tab.
2
Open the Utilities folder, and then click BCM Monitor.
The BCM Monitor panel opens.
3
Click the Launch BCM Monitor button.
BCM Monitor opens and connects to the same BCM50 that the Element Manger is currently
connected to.
Note: You can also launch the BCM Monitor from within the Element Manager
by selecting Tools > BCM Monitor.
Disconnecting BCM Monitor from a BCM50
On the File menu of the BCM Monitor, select Disconnect from BCM.
BCM Monitor disconnects from the BCM50 system and clears all the fields.
Note: If you do not want to connect to another BCM50 system, close the BCM
Monitor application. This terminates the application and disconnects BCM
Monitor from the BCM50 system.
To connect to a different BCM50
1
On the File menu of the BCM Monitor, select Disconnect from BCM.
BCM Monitor disconnects from the BCM50 system and clears all fields.
2
On the File menu of the BCM Monitor, select Connect to BCM.
The Enter Logon Information window opens.
3
In the System Name or IP Address field, enter the system name of the BCM50 you want to
monitor.
4
In the Connect As field, enter your BCM50 user name.
BCM50 Administration Guide
194
Chapter 13 BCM50 Utilities
5
In the Password field, enter your password.
6
Click the Connect button.
The BCM Monitor panel opens.
Using BCM Monitor to analyze system status
System Administrators and support personnel can use BCM Monitor to obtain real-time
troubleshooting data about the BCM system and to save data to generate system utilization and
traffic reports.
BCM Monitor tabs provide information about the following:
•
•
•
•
•
the overall BCM50 system
utilization of resources
operation of telephony applications (for example, Voice Mail, and Contact Center)
lines
PRI, BRI, and IP trunks
You can capture information about the BCM50 system by using:
•
•
static snapshots
dynamic snapshots
Static snapshots
You can capture an instantaneous snapshot of system information in a text file. You specify which
BCM Monitor tab you want to capture and then save the information to the .txt file. The file name
embeds the time, date, and BCM50 name information so that you can view the data using
Microsoft Word or another application at another time.
Before you start a snapshot, you must configure static snapshot settings.
To configure static snapshot settings
1
On the File menu, select Snapshot Settings.
The Snapshot Settings panel opens.
2
Click the Static Snapshot Settings tab.
3
In the Path and Filename area, enter the filename for the static snapshot in the Output
Filename field. For additional options, click the Arrow button to the right of the Output
Filename field.
NN40020-600
Chapter 13 BCM50 Utilities
4
195
Configure the Output Filename attributes.
Table 63 Output filename attributes
Attribute
Action
Auto-Increment Counter
Automatically increments the filename so that subsequent files do not
overwrite earlier files. Adds to the filename in the Output
Filename field.
BCM Name
Adds the name of the BCM to the filename. Position your cursor in the
filename field where you want the name to be added. Adds
to the filename in the Output Filename field.
Time
Adds the time to the filename. Position your cursor in the filename field
where you want the name to be added. Adds Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Warning : Invalid secondary xref table Page Mode : UseOutlinesEXIF Metadata provided by EXIF.tools