eSight
V300R002C01
Operation Guide
Issue
01
Date
2016-04-30
HUAWEI TECHNOLOGIES CO., LTD.
Copyright © Huawei Technologies Co., Ltd. 2016. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address:
Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website:
http://e.huawei.com
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
i
eSight
Operation Guide
About This Document
About This Document
Related Versions
This document describes basic concepts and operations of eSight. This document includes
operation processes on security management, resource management, topology management,
report management, service management and so on.
This document guides you to use eSight.
Intended Audience
The intended audiences of this document are:
l
Huawei technical support engineers
l
Partner technical support engineers
l
Enterprise administrators
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
Indicates an imminently hazardous situation which, if not
avoided, will result in death or serious injury.
Indicates a potentially hazardous situation which, if not
avoided, could result in death or serious injury.
Indicates a potentially hazardous situation which, if not
avoided, may result in minor or moderate injury.
Indicates a potentially hazardous situation which, if not
avoided, could result in equipment damage, data loss,
performance deterioration, or unanticipated results.
NOTICE is used to address practices not related to personal
injury.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
ii
eSight
Operation Guide
About This Document
Symbol
Description
Calls attention to important information, best practices and
tips.
NOTE is used to address information not related to
personal injury, equipment damage, and environment
deterioration.
GUI Conventions
Convention
Description
Boldface
Buttons, menus, parameters, tabs, window, and dialog titles
are in boldface. For example, click OK.
>
Multi-level menus are in boldface and separated by the ">"
signs. For example, choose File > Create > Folder.
Command Conventions
The command conventions that may be found in this document are defined as follows.
Issue 01 (2016-04-30)
Convention
Description
Boldface
The keywords of a command line are in boldface.
Italic
Command arguments are in italic.
[]
Items (keywords or arguments) in square brackets [ ] are
optional.
{ x | y | ... }
Alternative items are grouped in braces and separated by
vertical bars. One is selected.
[ x | y | ... ]
Optional alternative items are grouped in square brackets
and separated by vertical bars. One or none is selected.
{ x | y | ... } *
Alternative items are grouped in braces and separated by
vertical bars. A minimum of one or a maximum of all can
be selected.
[ x | y | ... ] *
Optional alternative items are grouped in square brackets
and separated by vertical bars. A maximum of all or none
can be selected.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
iii
eSight
Operation Guide
About This Document
Change History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Updates in Issue 01 (2016-04-30)
This issue is the first official release.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
iv
eSight
Operation Guide
Contents
Contents
About This Document.....................................................................................................................ii
1 Quick Start...................................................................................................................................... 1
1.1 Security Precautions....................................................................................................................................................... 2
1.2 Client Running Environment Required for the eSight................................................................................................... 2
1.3 Setting the Client Web Browser..................................................................................................................................... 3
1.3.1 Setting the Internet Explorer 9 Web Browser..............................................................................................................3
1.3.2 Setting the Mozilla Firefox 27 Web Browser............................................................................................................ 11
1.4 Logging In to and Out of the eSight............................................................................................................................. 12
1.5 Viewing the eSight Home Page.................................................................................................................................... 13
1.6 Viewing the eSight Version Information...................................................................................................................... 15
2 Managing Licenses...................................................................................................................... 16
2.1 Basic Concepts of License Management......................................................................................................................17
2.2 Overview...................................................................................................................................................................... 17
2.3 Obtaining an ESN......................................................................................................................................................... 18
2.4 Applying for a License................................................................................................................................................. 22
2.4.1 Applying for a Commercial License in Deployment and Capacity Expansion Scenarios........................................ 22
2.4.2 Applying for a Commercial License in Case of a Version Change........................................................................... 23
2.4.3 Applying for a Commercial License in Case of an ESN Change..............................................................................25
2.5 Importing a License File...............................................................................................................................................26
2.6 Querying License Information About the eSight......................................................................................................... 29
3 Discovering Devices................................................................................................................... 32
3.1 Basic Concepts of Resource Management................................................................................................................... 34
3.2 Overview...................................................................................................................................................................... 34
3.3 Methods and Protocols Used for Discovering Devices................................................................................................ 35
3.3.1 Methods and Protocols Used for Adding Network Devices......................................................................................35
3.3.2 Methods and Protocols Used for Adding Storage Devices....................................................................................... 36
3.3.3 Methods and Protocols Used for Adding Servers..................................................................................................... 40
3.4 Configuring Protocol Parameters on Devices.............................................................................................................. 41
3.4.1 Setting Protocol Parameters for Network Devices.................................................................................................... 41
3.4.1.1 Setting SNMP Parameters on Devices................................................................................................................... 41
3.4.1.2 Setting Trap Parameters on Devices.......................................................................................................................46
3.4.2 Configuring FC Switch Parameters........................................................................................................................... 48
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
v
eSight
Operation Guide
Contents
3.4.2.1 Configuring Qlogic Switch Parameters.................................................................................................................. 48
3.4.2.2 Configuring Brocade Switch Parameters............................................................................................................... 50
3.4.3 Setting Server Protocol Parameters........................................................................................................................... 58
3.4.3.1 Setting SNMP Parameters...................................................................................................................................... 58
3.4.3.2 Setting IPMI Parameters.........................................................................................................................................61
3.5 Creating a Default Subnet.............................................................................................................................................61
3.6 Configuring Protocol Template on eSight.................................................................................................................... 63
3.6.1 Creating an SNMP Protocol Template...................................................................................................................... 63
3.6.2 Creating a Telnet Protocol Template......................................................................................................................... 66
3.7 Auto Discovery for Devices......................................................................................................................................... 68
3.8 Managing Discovery Tasks...........................................................................................................................................77
3.9 Adding Devices in Batches...........................................................................................................................................81
3.9.1 Adding Network Devices in Batches.........................................................................................................................81
3.9.2 Adding Storage Devices in Batches.......................................................................................................................... 84
3.9.3 Adding Server Information in Batches...................................................................................................................... 85
3.10 Adding a Single Device.............................................................................................................................................. 86
3.10.1 Adding a Single Network Device............................................................................................................................ 86
3.10.2 Adding a Single Storage Device..............................................................................................................................89
3.10.2.1 About Protocol......................................................................................................................................................89
3.10.2.2 Adding a Single Unified Storage Device............................................................................................................. 90
3.10.2.3 Adding a Single Massive Storage Device.......................................................................................................... 100
3.10.2.4 Adding a Single Data Protection........................................................................................................................ 107
3.10.2.5 Adding a Single Third Party Storage Device......................................................................................................113
3.10.2.6 Adding a Single Fibre Channel Switch.............................................................................................................. 122
3.10.3 Adding a Single Server..........................................................................................................................................129
3.11 Creating a Group.......................................................................................................................................................134
3.11.1 Creating a Device Group....................................................................................................................................... 134
3.11.2 Creating an Interface Group.................................................................................................................................. 136
3.12 Adjusting Resources................................................................................................................................................. 138
3.13 Exporting Resources.................................................................................................................................................139
3.13.1 Exporting NE Information.....................................................................................................................................139
3.13.2 Exporting the Asset............................................................................................................................................... 140
4 Setting Topology....................................................................................................................... 141
4.1 About Topology.......................................................................................................................................................... 142
4.2 Overview.................................................................................................................................................................... 143
4.3 Setting Up the Physical Topology.............................................................................................................................. 144
4.4 Creating a Custom Topology...................................................................................................................................... 148
5 Setting Alarm Monitoring....................................................................................................... 150
5.1 About Alarm............................................................................................................................................................... 152
5.2 Overview.................................................................................................................................................................... 155
5.3 Setting Remote Alarm/Event Notification................................................................................................................. 157
5.4 Setting Alarm Monitoring Rules................................................................................................................................ 162
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
vi
eSight
Operation Guide
Contents
5.5 Setting Storage Device Alarm Threshold................................................................................................................... 166
5.6 Setting Cloud Service Alarm Notification..................................................................................................................166
5.7 Setting Cloud Service Site Information......................................................................................................................167
6 Setting Performance Monitoring............................................................................................169
6.1 About Performance.....................................................................................................................................................170
6.2 Overview.................................................................................................................................................................... 172
6.3 Setting a Performance Data Collection Task.............................................................................................................. 173
6.4 Setting Performance Monitoring on the Home Page..................................................................................................175
7 Setting the Home Page............................................................................................................. 176
8 Monitoring the Network.......................................................................................................... 180
8.1 Monitoring Methods................................................................................................................................................... 181
8.2 Monitoring the Network Running Status in Topologies.............................................................................................183
8.3 Monitoring Network Faults Through Alarms.............................................................................................................187
8.4 Monitoring Performance.............................................................................................................................................192
8.5 Big Screen Monitoring............................................................................................................................................... 193
9 Managing Network Devices and Services............................................................................195
9.1 Managing Network Devices....................................................................................................................................... 196
9.1.1 Querying an NE....................................................................................................................................................... 196
9.1.1.1 Querying Basic Information................................................................................................................................. 196
9.1.1.2 Viewing the Device Panel.....................................................................................................................................198
9.1.1.3 Querying the Alarm List.......................................................................................................................................200
9.1.1.4 Querying Performance Status............................................................................................................................... 201
9.1.1.5 Viewing the VS Management Information...........................................................................................................202
9.1.1.6 Viewing Power Management................................................................................................................................203
9.1.2 Configuring an NE...................................................................................................................................................204
9.1.2.1 Logging In to Web NMS...................................................................................................................................... 204
9.1.2.2 Setting Protocol Parameters..................................................................................................................................205
9.1.2.2.1 Setting NE Telnet Parameters on eSight............................................................................................................205
9.1.2.2.2 Setting NE SNMP Parameters on eSight...........................................................................................................207
9.1.2.2.3 Setting NE Netconf Parameters on NE..............................................................................................................210
9.1.2.2.4 Setting NE Netconf Parameters on eSight.........................................................................................................214
9.1.2.3 Managing Interfaces............................................................................................................................................. 217
9.1.2.3.1 Understanding an Interface................................................................................................................................217
9.1.2.3.2 Configuring Interfaces....................................................................................................................................... 217
9.1.2.3.3 Querying Interface Parameters.......................................................................................................................... 220
9.1.2.4 Querying IP Addresses......................................................................................................................................... 221
9.1.2.5 Restoring a Configuration File............................................................................................................................. 222
9.1.2.6 Managing Netconf Configuration.........................................................................................................................224
9.1.3 Physical Resource Management.............................................................................................................................. 225
9.1.4 Link Management....................................................................................................................................................227
9.1.4.1 Discovering Links Automatically.........................................................................................................................227
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
vii
eSight
Operation Guide
Contents
9.1.4.2 Manually Creating Links...................................................................................................................................... 232
9.1.5 Electronic Labels Management............................................................................................................................... 234
9.2 SVF Management....................................................................................................................................................... 235
9.2.1 Example for Configuring the Access Layer for a Wired Campus Network Using eSight...................................... 235
9.3 Network Device Configuration Management.............................................................................................................247
9.3.1 Smart Configuration Tool........................................................................................................................................ 248
9.3.1.1 Overview.............................................................................................................................................................. 248
9.3.1.2 Functions.............................................................................................................................................................. 248
9.3.1.3 Template Management and Delivery....................................................................................................................249
9.3.1.3.1 Process Introduction.......................................................................................................................................... 249
9.3.1.3.2 Creating a Template...........................................................................................................................................250
9.3.1.3.3 Delivering a Template........................................................................................................................................253
9.3.1.4 Plan Sheet Management and Delivery..................................................................................................................255
9.3.1.4.1 Process Introduction.......................................................................................................................................... 255
9.3.1.4.2 Exporting a Plan Sheet...................................................................................................................................... 256
9.3.1.4.3 Delivering a Plan Sheet..................................................................................................................................... 258
9.3.1.5 Viewing Delivery Records....................................................................................................................................260
9.3.1.6 Examples.............................................................................................................................................................. 261
9.3.1.6.1 Example: Delivery by Template........................................................................................................................ 261
9.3.1.6.2 Example: Delivery by Plan Sheet...................................................................................................................... 263
9.3.2 Device Configuration File Management................................................................................................................. 264
9.3.2.1 Overview of Device Configuration File Management Operations.......................................................................264
9.3.2.2 Setting System Parameters................................................................................................................................... 265
9.3.2.2.1 Setting Backup Parameters................................................................................................................................ 265
9.3.2.2.2 Setting Email Notification................................................................................................................................. 267
9.3.2.3 Backing Up NE Configuration Files.................................................................................................................... 268
9.3.2.3.1 Backing Up NE Configuration Files Automatically..........................................................................................268
9.3.2.3.2 Backing Up NE Configuration Files Manually................................................................................................. 270
9.3.2.4 Managing NE Configuration Files....................................................................................................................... 271
9.3.2.4.1 Viewing an NE Configuration File.................................................................................................................... 271
9.3.2.4.2 Comparing NE Configuration Files...................................................................................................................272
9.3.2.4.3 Browsing the Backup NE Configuration File List............................................................................................ 274
9.3.2.4.4 Setting NE Configuration Files to the Baseline File......................................................................................... 275
9.3.2.4.5 Checking the Configuration File Change.......................................................................................................... 276
9.3.2.5 Restoring NE Configuration Files........................................................................................................................ 277
9.3.3 MIB Management....................................................................................................................................................279
9.3.3.1 MIB Principle....................................................................................................................................................... 279
9.3.3.1.1 SNMP Management Model............................................................................................................................... 279
9.3.3.1.2 MIB Classification.............................................................................................................................................281
9.3.3.2 About MIB Management......................................................................................................................................281
9.3.3.3 Function Panorama............................................................................................................................................... 282
9.3.3.4 Typical Configuration Example............................................................................................................................283
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
viii
eSight
Operation Guide
Contents
9.3.3.4.1 Querying Device Information Using a Non-Pre-Integrated MIB File...............................................................284
9.3.3.4.2 Querying Device Information Using a Pre-Integrated MIB File.......................................................................286
9.3.3.5 Connecting Devices.............................................................................................................................................. 287
9.3.3.6 Querying MIB Nodes........................................................................................................................................... 289
9.3.3.7 MIB File Management..........................................................................................................................................290
9.3.3.7.1 Compiling MIB Files.........................................................................................................................................290
9.3.3.7.2 Loading MIB Files.............................................................................................................................................293
9.3.3.8 Obtaining Device Data......................................................................................................................................... 295
9.4 User-Defined Device Management............................................................................................................................ 297
9.4.1 Basic Concepts of User-Defined Devices Management..........................................................................................297
9.4.2 Overview of user-defined device management ...................................................................................................... 298
9.4.3 User-defined Device Functions............................................................................................................................... 299
9.4.4 Discovering a User-defined Device.........................................................................................................................303
9.4.4.1 Creating a User-Defined Device Manually.......................................................................................................... 303
9.4.4.2 User-Defined Device Auto-Discovery................................................................................................................. 307
9.4.4.3 Importing User-Defined Devices Manually in Batches........................................................................................316
9.4.5 Customizing the Vendor Name and NE Type..........................................................................................................319
9.4.6 NE Management Capability.................................................................................................................................... 321
9.4.6.1 Customizing SNMP Alarm Parameters................................................................................................................ 321
9.4.6.2 Customizing Performance Counters..................................................................................................................... 324
9.4.6.3 Customizing a Device Configuration File............................................................................................................ 326
9.4.6.4 Customizing the Device Panel..............................................................................................................................328
9.4.6.5 Customizing Telnet Parameters............................................................................................................................ 331
9.4.7 Checking the Network Status of User-Defined Devices......................................................................................... 333
9.4.7.1 Performing a Ping Test......................................................................................................................................... 333
9.4.7.2 Performing a Trace Test........................................................................................................................................334
9.4.7.3 Query Basic Interface Information....................................................................................................................... 336
9.4.7.4 Viewing IP Address List.......................................................................................................................................337
9.4.8 Invoking the Web NMS of User-Defined Devices.................................................................................................. 338
10 Managing Storage....................................................................................................................340
10.1 Storage Devices Management................................................................................................................................. 341
10.1.1 Managing Unified Storage.....................................................................................................................................341
10.1.1.1 Managing All Unified Storage Devices..............................................................................................................341
10.1.1.2 Viewing the Summary of Disk Arrays................................................................................................................342
10.1.1.3 Viewing the Summary of VISs........................................................................................................................... 344
10.1.1.4 Viewing the Summary of Unified Storages........................................................................................................ 345
10.1.1.5 Viewing Health Status Information.................................................................................................................... 347
10.1.1.6 Managing Storage Resource............................................................................................................................... 351
10.1.1.7 Managing Mappings........................................................................................................................................... 354
10.1.1.8 Viewing SAN Service Free Space...................................................................................................................... 356
10.1.1.9 Viewing NAS Service Free Space...................................................................................................................... 359
10.1.1.10 Viewing Free Space of a Hard Disk Area.........................................................................................................361
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
ix
eSight
Operation Guide
Contents
10.1.1.11 Viewing Free Space of a VIS System...............................................................................................................361
10.1.1.12 Viewing Storage Device Effect Range............................................................................................................. 363
10.1.1.13 Viewing Disk Effect Range.............................................................................................................................. 364
10.1.1.14 Configuring Reporter Access Parameters.........................................................................................................365
10.1.1.15 Configuring Protocol Parameters and Event Notification................................................................................ 366
10.1.2 Managing Massive Storage Systems .................................................................................................................... 367
10.1.2.1 Managing All Massive Storage Devices............................................................................................................ 367
10.1.2.2 Viewing Summary of an OceanStor 9000 Storage System................................................................................ 368
10.1.2.3 Viewing Summary of the UDS........................................................................................................................... 369
10.1.2.4 Viewing Summary of a CSS............................................................................................................................... 370
10.1.2.5 Viewing Summary of a CSE...............................................................................................................................371
10.1.2.6 Viewing Summary of a N8000........................................................................................................................... 372
10.1.2.7 Managing Storage Resources............................................................................................................................. 374
10.1.2.8 Managing Mappings........................................................................................................................................... 380
10.1.2.9 Viewing NAS Service Free Space...................................................................................................................... 381
10.1.2.10 Viewing SAN Service Free Space.................................................................................................................... 383
10.1.2.11 Viewing Disk Array Effect Range.................................................................................................................... 386
10.1.2.12 Viewing Disk Effect Range.............................................................................................................................. 387
10.1.2.13 Configuring Reporter Access Parameters.........................................................................................................387
10.1.2.14 Configuring Device Management URL for Massive Storage.......................................................................... 388
10.1.2.15 Configuring Protocol Parameters and Event Notification................................................................................ 388
10.1.3 Managing Data Protections................................................................................................................................... 388
10.1.3.1 Managing All Data Protections.......................................................................................................................... 389
10.1.3.2 Viewing the Summary of a VTL........................................................................................................................ 389
10.1.3.3 Viewing the Summary of a HDP........................................................................................................................ 390
10.1.3.4 Viewing Node Information................................................................................................................................. 391
10.1.3.5 Configuring Protocol Parameters and Event Notification.................................................................................. 392
10.1.4 Managing Third Party Storage Systems................................................................................................................ 393
10.1.4.1 Managing All Third Party Storages....................................................................................................................393
10.1.4.2 Viewing Summary of a Third Party Storage System..........................................................................................394
10.1.4.3 Viewing Free Space of a Storage Device........................................................................................................... 396
10.1.4.4 Viewing Free Space of Disks..............................................................................................................................397
10.1.4.5 Viewing Free Space of Block Storage Pools or Storage Pools...........................................................................397
10.1.4.6 Viewing Free Space of LUNs............................................................................................................................. 399
10.1.4.7 Viewing Free Space of the Inspur AS400...........................................................................................................400
10.1.4.8 Viewing Free Space of the Sugon DS600...........................................................................................................401
10.1.4.9 Configuring Device Management URL for Third Party Storage....................................................................... 404
10.1.4.10 Configuring Protocol Parameters..................................................................................................................... 404
10.1.5 Managing Fibre Channel Switches........................................................................................................................404
10.1.5.1 Managing All Fibre Channel Switches...............................................................................................................405
10.1.5.2 Viewing the Summary........................................................................................................................................ 406
10.1.5.3 Viewing Port Information................................................................................................................................... 407
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
x
eSight
Operation Guide
Contents
10.1.5.4 Viewing Zone Information................................................................................................................................. 408
10.1.5.5 Configuring Protocol Parameters and Event Notification.................................................................................. 408
10.2 Managing Custom Storages......................................................................................................................................409
10.2.1 Customizing Alarm Parameters.............................................................................................................................409
10.2.1.1 Obtaining Alarm Customization Parameters...................................................................................................... 409
10.2.1.2 Creating Alarm Parameter Customization..........................................................................................................413
10.2.1.3 Importing Customized Information About Alarm Parameters in Batch.............................................................414
10.2.1.4 Modifying Alarm Parameter Customization...................................................................................................... 416
10.2.1.5 Viewing All Alarm Parameter Customization....................................................................................................416
11 Managing Servers.................................................................................................................... 418
11.1 Overview of Server Operations................................................................................................................................ 419
11.2 Managing Rack Servers............................................................................................................................................ 421
11.2.1 Viewing All Servers...............................................................................................................................................422
11.2.2 Moving a Server.....................................................................................................................................................424
11.2.3 Deleting a Server................................................................................................................................................... 424
11.2.4 Setting a Server Name........................................................................................................................................... 424
11.2.5 Controlling Power..................................................................................................................................................425
11.2.6 Configuring the UID Indicator.............................................................................................................................. 425
11.3 Managing Blade Servers...........................................................................................................................................426
11.3.1 Viewing All Servers...............................................................................................................................................428
11.3.2 Moving a Server.....................................................................................................................................................429
11.3.3 Deleting a Server................................................................................................................................................... 429
11.3.4 Setting a Server Name........................................................................................................................................... 429
11.3.5 Managing Blades................................................................................................................................................... 430
11.4 Managing High-Density Servers.............................................................................................................................. 432
11.4.1 Viewing All Servers...............................................................................................................................................433
11.4.2 Moving a Server.....................................................................................................................................................434
11.4.3 Deleting a Server................................................................................................................................................... 434
11.4.4 Managing Blades................................................................................................................................................... 434
11.5 Managing Storage Servers........................................................................................................................................ 437
11.5.1 Viewing All Servers...............................................................................................................................................438
11.5.2 Moving a Server.....................................................................................................................................................439
11.5.3 Deleting a Server................................................................................................................................................... 439
11.5.4 Setting a Server Name........................................................................................................................................... 440
11.5.5 Controlling Power..................................................................................................................................................440
11.6 Managing Third-Party Servers..................................................................................................................................441
11.6.1 Viewing All Servers...............................................................................................................................................442
11.6.2 Moving a Server.....................................................................................................................................................443
11.6.3 Deleting a Server................................................................................................................................................... 443
11.6.4 Setting a Server Name........................................................................................................................................... 444
11.7 Service Settings.........................................................................................................................................................444
11.7.1 Configuring the Automatic Detection Service.......................................................................................................444
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
xi
eSight
Operation Guide
Contents
11.8 Managing Custom Servers........................................................................................................................................445
11.8.1 Customizing Device Information...........................................................................................................................445
11.8.1.1 Viewing All Device Information Customization................................................................................................ 445
11.8.1.2 Creating Device Information Customization......................................................................................................446
11.8.1.3 Deleting Device Information Customization......................................................................................................447
11.8.1.4 Modifying Device Information Customization...................................................................................................447
11.8.2 Customizing Alarm Parameters............................................................................................................................. 447
11.8.2.1 Viewing All Alarm Parameter Customization.................................................................................................... 447
11.8.2.2 Creating Alarm Parameter Customization..........................................................................................................448
11.8.2.3 Importing Customized Information About Alarm Parameters in Batch.............................................................453
11.8.2.4 Deleting Alarm Parameter Customization..........................................................................................................454
11.8.2.5 Modifying Alarm Parameter Customization.......................................................................................................454
12 Managing Disaster Recovery System.................................................................................. 456
13 Security Management............................................................................................................. 458
13.1 Basic Concepts of Security Management................................................................................................................. 460
13.2 Overview.................................................................................................................................................................. 465
13.3 Security Policy Management....................................................................................................................................466
13.3.1 Setting an Account Policy..................................................................................................................................... 467
13.3.2 Setting a Password Policy......................................................................................................................................468
13.3.3 Setting an Access Control Policy.......................................................................................................................... 469
13.3.4 Setting the Client to Be Logged Out Automatically..............................................................................................471
13.3.5 Changing the Password of an eSight User.............................................................................................................471
13.4 Creating Users and Assigning Rights....................................................................................................................... 472
13.4.1 Creating a Role...................................................................................................................................................... 472
13.4.2 Creating Users....................................................................................................................................................... 478
13.5 Setting Authentication Server...................................................................................................................................482
13.6 Online User Management......................................................................................................................................... 485
13.6.1 Viewing Online Users............................................................................................................................................485
13.6.2 Forcing a User to Log Out..................................................................................................................................... 486
13.7 Setting eSight Data Overflow Dump........................................................................................................................487
13.8 Querying Logs.......................................................................................................................................................... 489
13.9 Example: Typical Security Management Operations............................................................................................... 491
14 Alarm Reference...................................................................................................................... 495
14.1 eSight Alarm Reference............................................................................................................................................496
14.1.1 ALM-17434 The report storage usage has exceed 80%........................................................................................496
14.1.2 ALM-80001 Automatic backup failed.................................................................................................................. 496
14.1.3 ALM-80002 Veritas Resource Fault......................................................................................................................500
14.1.4 ALM-80003 Exceeded the Threshold of the Veritas Replication Buffer (Major).................................................501
14.1.5 ALM-80004 Veritas in the Healing State.............................................................................................................. 502
14.1.6 ALM-80005 Veritas Heartbeat Interruption.......................................................................................................... 503
14.1.7 ALM-80006 Veritas Replication Interruption....................................................................................................... 505
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
xii
eSight
Operation Guide
Contents
14.1.8 ALM-80007 Frozen Veritas Resource Groups...................................................................................................... 507
14.1.9 ALM-80008 Temporary Veritas Licenses............................................................................................................. 509
14.1.10 ALM-80009 Faulty Veritas Software Process..................................................................................................... 510
14.1.11 ALM-80010 Exceeded the Threshold of the Veritas Replication Buffer (Critical).............................................511
14.1.12 ALM-19660817 Registration failure of the trap IP address with the device.......................................................513
14.1.13 ALM-80001001 The connection to the log collector is interrupted.................................................................... 513
14.1.14 ALM-505001001 CPU Usage Is High................................................................................................................ 515
14.1.15 ALM-505001003 Disk Usage Is High.................................................................................................................518
14.1.16 ALM-505001101 Database Usage Is High..........................................................................................................521
14.1.17 ALM-505001102 NMS Processes Exit Unexpectedly........................................................................................ 524
14.1.18 ALM-505001105 Dump failed............................................................................................................................ 526
14.1.19 ALM-505001106 Login Attempts Reach the Maximum Value.......................................................................... 527
14.1.20 ALM-999999992 The license will expire........................................................................................................... 528
14.1.21 ALM-999999993 The license has expired.......................................................................................................... 529
14.1.22 ALM-999999994 The license resource overs the threshold................................................................................531
14.1.23 ALM-999999995 The license is invalid.............................................................................................................. 532
14.1.24 ALM-999999999 Communication Between NMS And NE Is Abnormal.......................................................... 534
15 FAQs...........................................................................................................................................537
15.1 Browser.....................................................................................................................................................................538
15.1.1 What Do I Do If a Dialog Box Fails to Be Closed After the eSight Client Opened Using Mozilla Firefox Is
Logged Out Automatically?............................................................................................................................................. 538
15.1.2 What Do I Do If the Page Goes Blank When I Repeatedly Add a Subnet on the eSight Client Opened Using
Internet Explorer 8?.......................................................................................................................................................... 538
15.1.3 What Do I Do If the Browser Does Not Respond When I Switch Between Multiple Tab Pages on the eSight
Opened Using Internet Explorer 9?.................................................................................................................................. 539
15.1.4 What Do I Do If a Message Indicating Slow Response from the Browser Is Displayed After I Log In to the
eSight Using Internet Explorer 8?.................................................................................................................................... 539
15.1.5 What Do I Do When Internet Explorer 8 Runs Slowly During Script Execution?............................................... 540
15.1.6 What Do I Do If the Forward and Back Buttons Become Unavailable On the eSight Client Opened Using
Windows Internet Explorer?.............................................................................................................................................540
15.1.7 What Do I Do If the eSight Client Fails to Be Opened in IPv6 Mode Using Mozilla Firefox?............................540
15.1.8 What Do I Do If the Page Is Not Properly Displayed When I Use Internet Explorer on Windows 2008 to Access
the eSight.......................................................................................................................................................................... 541
15.1.9 What Do I Do If the Home Page Does Not Respond After I Log In to the eSight?..............................................541
15.1.10 What Do I Do If Firefox Browser and Flash Plug-in Download Failure During eSight Login Using Internet
Explorer 9 on Windows Server 2008................................................................................................................................542
15.1.11 How Do I Address the eSight Login Failure Due to Firefox Browser Proxy Setting?........................................544
15.1.12 What Do I Do When the Copy Button Is Unavailable on the Alarm Details Page Using Firefox?.................. 546
15.1.13 What Do I Do When the Security Warning Dialog Box Is Displayed?............................................................ 547
15.1.14 What Do I Do If the Topology Management Page Displayed in Full Screen Mode Does not Respond After I
Perform Operations on It?................................................................................................................................................ 550
15.1.15 What Do I Do If a PopVideo Icon Is Displayed When I Open the eSight Topology Management Page?......... 551
15.1.16 What Do I Do If a Dialog Box Is Displayed When I Re-log In to a Client After the eSight Upgrade?..............552
15.1.17 What Do I Do If Files Failed to be Downloaded Using the Internet Explorer?.................................................. 553
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
xiii
eSight
Operation Guide
Contents
15.1.18 What Do I Do When a Page Error Message Is Displayed When I Attempt to Close the Change Password Page
in Internet Explorer 9?...................................................................................................................................................... 555
15.1.19 How Do I Solve the Problem When Data Fails to Be Downloaded from eSight?.............................................. 557
15.1.20 What Do I Do If Files Failed to be Downloaded Using Internet Explorer?........................................................ 559
15.1.21 What Do I Do If a Message Indicating Unsupported Browser Is Displayed When I Log in to the eSight on
Internet Explorer 10?........................................................................................................................................................ 562
15.2 Login.........................................................................................................................................................................562
15.2.1 What Do I Do If the eSight Displays a Security Certificate Error During Login?................................................562
15.2.2 What Do I Do If the eSight Displays a Security Warning Message During Login? ............................................ 570
15.2.3 What Do I Do When a Message Is Displayed Indicating the System Internal Error?...........................................575
15.2.4 What Do I Do If I Forget the Password When I Attempt to Log In to the eSight?............................................... 576
15.2.5 How Do I Cancel the Advance Warning of Password Expiration and Mandatory Password Change.................. 576
15.2.6 How Do I Do When the eSight Login Page Is Not Displayed on the Current Host in the Windows Server 2008
R2 Operating System?...................................................................................................................................................... 578
15.2.7 How Do I Solve the Service Session Failure That Occurs When I Log In to eSight?.......................................... 581
15.2.8 Login to the eSight Failed and the User Is Locked............................................................................................... 581
15.2.9 Login Page of the eSight Client or Maintenance Tool Displays Blank Using Internet Explorer on Windows
Server 2008.......................................................................................................................................................................582
15.2.10 What Do I Do If the Home Page Does Not Respond After I Log In to the eSight?............................................585
15.2.11 What Do I Do When the Bad Gateway Error (Error Code: 502) Is Displayed During the eSight Access?........585
15.2.12 Users Fail to Log In to eSight After the IP Address of the eSight Server Changes............................................ 586
15.2.13 Subsequent Login Attempts Fail When the User Does Not Normally Exit the Single User Mode.................... 586
15.3 GUI........................................................................................................................................................................... 587
15.3.1 What Do I Do When a Few English Fields Cannot Be Displayed Completely or When English Letters Overlap
on the eSight GUI in the Firefox?.................................................................................................................................... 587
15.3.2 What Do I Do When the Font Format Is Incorrect on the eSight GUI in the Firefox?......................................... 593
15.3.3 What Do I Do If an Installation Failure Message Is Displayed When I Am Installing the Adobe Flash Player?
.......................................................................................................................................................................................... 594
15.3.4 What Do I Do If the eSight Interface Layout Is Incorrect After Login?............................................................... 595
15.3.5 What Do I Do If a Message Indicating that the Flash Plugin Is Crashed Is Displayed When I Use the Firefox to
access an eSight Flash Page?............................................................................................................................................597
15.3.6 When the System Displays an Incorrect Import Path During Operations on eSight in Internet Explorer............ 597
15.3.7 What Do I Do If the Page Does Not Respond After the Topology View Enters the Idle State for a Long Period of
Time?................................................................................................................................................................................ 600
15.3.8 When Internet Explorer 8 Displays a Message Indicating that No Alarm Sound Is Selected...............................601
15.3.9 What Do I Do If Diagrams Are Not Displayed When I Use the eSight on Internet Explorer 8?..........................602
15.3.10 When the Disk Space of the eSight Server Is Fully Occupied, eSight Runs Abnormally.................................. 602
15.3.11 What Do I Do When Some eSight Functions Are Not Available in a Browser?.................................................603
15.4 System Function....................................................................................................................................................... 607
15.4.1 Resource Management.......................................................................................................................................... 607
15.4.1.1 What Do I Do If I Failed to Obtain Information Using Trace Router on the eSight Running on Linux?........ 607
15.4.1.2 What Do I Do When an eSight Opened Using Windows Internet Explorer Failed to Connect to a Device in
Telnet Mode?.................................................................................................................................................................... 608
15.4.1.3 How Do I Solve the Problem That Internet Explorer 8 Displays a Confirmation Dialog Box When a Large
Number of NEs Are Discovered?..................................................................................................................................... 609
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
xiv
eSight
Operation Guide
Contents
15.4.1.4 What Do I Do When an Invalid Session Is Displayed After I Click Complete During Automatic NE Addition?
.......................................................................................................................................................................................... 610
15.4.1.5 How Do I Locate the Fault When Failing to Add NEs?.....................................................................................612
15.4.1.6 What Are eSight Network Device Polling Types and Principles?..................................................................... 614
15.4.1.7 Which SNMP Version Is Used When eSight Collects Device Interface Traffic?.............................................. 615
15.4.1.8 Can Devices Be Added on eSight Through the SNMP v2c When Only the Write Community Name Rather
Than the Read Community Name Is Configured?........................................................................................................... 616
15.4.1.9 Can Device Icons on the Topology Page Restore to the Normal Color After a Fault Recovery?......................616
15.4.1.10 Can eSight Correctly Parse Device Alarms Only After the trap source Command Is Configured on Devices?
.......................................................................................................................................................................................... 617
15.4.1.11 How Does eSight Ensure that Data in the eSight Database Is the Same as the Device Resources Data? Is
SNMP or Telnet Used for Device Resources Synchronization?...................................................................................... 617
15.4.1.12 Can the eSight Manage Devices on the Public Network?................................................................................ 617
15.4.1.13 Why Is the Number of Links in the Topology View Larger than the Number of Physical Links on the
Network?.......................................................................................................................................................................... 618
15.4.1.14 How Do I Enable the Telnet Client in the Windows Vista, Windows 2008, Windows 7, or Linux Operating
System?.............................................................................................................................................................................618
15.4.1.15 NEs Fail to Be Added to eSight........................................................................................................................619
15.4.1.16 eSight Discovers a Link Between Two Devices Not Directly Connected........................................................619
15.4.1.17 Users Fail to Add the USG6650 Using SNMP.................................................................................................620
15.4.1.18 Synchronization of the Device's Management Interface Fails......................................................................... 620
15.4.2 Topology Management.......................................................................................................................................... 622
15.4.2.1 Why Does It Take 2 to 3 Minutes for the Device Color in the eSight Topology to Refresh After the Device
Powers Off?...................................................................................................................................................................... 622
15.4.2.2 Which Types of Links Does eSight Support?.....................................................................................................622
15.4.2.3 Can eSight Automatically Add LLDP Links After LLDP Is Configured on the Devices That Have Been Added
to eSight?.......................................................................................................................................................................... 623
15.4.2.4 Can LLDP and IP Links Be Automatically Added to the eSight After Devices Are Added to the eSight? Can
Automatically Added Links Be Deleted?......................................................................................................................... 623
15.4.2.5 Can IP Links Be Automatically Added to the eSight After LLDP is Enabled on the Devices?........................ 623
15.4.2.6 Should NTDP Be Enabled for the eSight to Discover LLDP Links?.................................................................624
15.4.2.7 What Do I Do If the Link Status on eSight Is Not Refreshed After a Device Is Restarted or Wakened?..........624
15.4.2.8 How Do I Solve the Problem that Links Cannot Be Discovered?......................................................................624
15.4.2.9 Why Is the Color of Device Icons on the Topology Page Updated 2 or 3 Minutes After the Devices Are
Powered Off?.................................................................................................................................................................... 627
15.4.2.10 eSight Cannot Discover Links Between Huawei and Cisco Devices? How Do I Solve this Problem?...........628
15.4.2.11 After a User Changes the Connection Interface on an S-series Switch, the Link Status Is Displayed as Faulty
(in Red) on the eSight Network Topology........................................................................................................................628
15.4.3 Fault Management................................................................................................................................................. 629
15.4.3.1 How Do I Solve the Problem When eSight Fails to Receive Alarms Reported from Devices?........................ 629
15.4.3.2 The Interface Status Is null When eSight Receives a Link Down Alarm from a Third-Party Device.............. 630
15.4.3.3 Why Only NMS Alarms Rather than NE Alarms Are Displayed on eSight...................................................... 630
15.4.3.4 How to Configure Commands on Devices to Enable the NMS to Parse Device Alarms?.................................631
15.4.3.5 eSight Cannot Receive Alarms from Devices.................................................................................................... 631
15.4.3.6 eSight Cannot Receive Alarms from Devices After SNMPv3 and Trap Parameters Are Configured...............631
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
xv
eSight
Operation Guide
Contents
15.4.3.7 Why Device Alarms Are Displayed in the Alarm List But the Number of Device Alarms Is Zero on the TopN
Alarm Page on the eSight Homepage? What Are the Sequence Rules for TopN Alarms?..............................................632
15.4.3.8 How Do I Disable Alarms Generated During Interface Polling?....................................................................... 632
15.4.3.9 What Do I Do If the Connection Between a SMS Modem and the Server Fails?..............................................632
15.4.4 Performance Management..................................................................................................................................... 633
15.4.4.1 Why Is Data Displayed on eSight Different from Data Displayed on Devices?................................................633
15.4.4.2 Why No Alarm Is Triggered When the Counter Value Exceeds the Alarm Threshold?.................................... 633
15.4.4.3 Is Performance Task Controlled by a License?.................................................................................................. 634
15.4.4.4 What Is the Collection Interval of a Performance Task?.................................................................................... 634
15.4.4.5 Can Monitored Performance Counters Be Displayed on the NE Manager Page?............................................. 634
15.4.4.6 Can eSight Automatically Create Performance Tasks? For What Performance Counters?............................... 634
15.4.4.7 Certain Performance Counters Are Lost After a Performance Collection Task Is Executed............................. 634
15.4.4.8 Why Cannot I View the Real-Time Performance Data of Some Counters?.......................................................635
15.4.4.9 Why Device TCP and UDP Data Is Not Displayed on the Historical Performance Data Statistics Page?........636
15.4.4.10 How Do I Mask Bandwidth Usage Alarms from Specified Devices?..............................................................636
15.4.4.11 How Do I Handle a Performance Indicator Collection Exception?..................................................................636
15.4.4.12 During indicator collection for interface traffic, why the status and collection results for some devices are
"unknown exception"?......................................................................................................................................................637
15.4.4.13 Why Cannot I Select Measurement Object When Creating a Task to Monitor the Server's Storage Space
Usage?.............................................................................................................................................................................. 637
15.4.4.14 Failed to Create a Performance Task for a ZTE Device, Displaying That Measurement Object Cannot Be
Selected.............................................................................................................................................................................637
15.4.5 Big-Screen Monitor............................................................................................................................................... 638
15.4.5.1 How Do I Set View Rotation in a Big Screen?...................................................................................................638
15.4.6 License...................................................................................................................................................................645
15.4.6.1 Is the ESN Case-sensitive for License Application............................................................................................645
15.4.6.2 Is the MAC Address Case-sensitive for ESN Generation?................................................................................ 645
15.4.7 What Can I Do When I Fail to Back Up Cisco Configuration Files?................................................................... 645
15.4.8 What Can I Do When Configuration File Backup Through SNMPv3 Fails?....................................................... 646
15.4.9 eSight Fails to Back Up Configuration Files of Cisco Devices............................................................................ 646
15.4.10 Storage Management........................................................................................................................................... 647
15.4.10.1 How Do I Troubleshoot Invalid or Slow Reporting of Messages from Storage Device Components?........... 647
15.4.10.2 eSight Reports User Account Lockout When Discovering a Storage Device..................................................648
15.4.10.3 Why Is a Storage Device Offline After Being Discovered Based on the SNMP Protocol?.............................649
15.4.10.4 Faults May Fail to Be Located if Logs Are Printed Too Quickly.................................................................... 649
15.4.10.5 Discovery of Devices by IP Address Segment Takes a Long Period of Time................................................. 650
15.4.10.6 No Data Is Unavailable in the Statistical Object Lists of Storage Devices...................................................... 650
15.4.10.7 How Can I Troubleshoot the Unavailability of the Device Management Function Caused by Outdated JRE of
Firefox 27......................................................................................................................................................................... 651
15.4.10.8 What Can I Do If No Data Is Displayed When Performance Statistics Is Checked?.......................................652
15.4.10.9 Failed to Obtain Storage Device Details.......................................................................................................... 652
15.4.10.10 How Can I Troubleshoot the Unavailability of Ports Within the Range of 8000-8090, 7890, 8901 Specified
in the Listening Port Matrix When eSight Is Running Normally.....................................................................................653
15.4.11 Server Management............................................................................................................................................. 654
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
xvi
eSight
Operation Guide
Contents
15.4.11.1 eSight Failed to Receive Device Alarms from a Managed Server................................................................... 654
15.4.11.2 eSight Ran Slowly or Stopped Responding......................................................................................................655
15.4.11.3 Failed to Switch from the eSight to the Management WebUI of a Third-Party Server....................................655
15.4.11.4 Failed to Add a Server on eSight After the Server IP Address Is Changed..................................................... 656
15.4.11.5 eSight Failed to Add a Server........................................................................................................................... 656
15.4.11.6 Alarms Configured to Be Masked Are Still Displayed on the Current Alarms Page.......................................659
15.4.11.7 Data Loss During Real-Time Performance Collection of a Server.................................................................. 659
15.5 Others........................................................................................................................................................................660
15.5.1 How Do I Prevent Home Page Settings from Being Replaced?............................................................................660
15.5.2 How Do I Install an SSL Certificate for the Email Server?.................................................................................. 660
15.5.3 eSight System Becomes Faulty After the Database User Password Is Changed Using a Database Tool............. 661
15.5.4 How Do I Prevent Problems Caused by eSight Server System Time Change?.................................................... 663
A Glossary......................................................................................................................................664
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
xvii
eSight
Operation Guide
1 Quick Start
1
Quick Start
About This Chapter
This topic describes how to quickly use eSight, including precautions, running environment
requirements, setting the client web browser, logging in to or out of eSight, and eSight user
interface.
1.1 Security Precautions
To ensure normal operation of eSight, observe the following precautions.
1.2 Client Running Environment Required for the eSight
A personal computer (PC) must meet requirements of the client running environment so that
users can operate the Intelligent Enterprise Management Platform (eSight) properly.
1.3 Setting the Client Web Browser
Before using a web browser to log in to eSight, set the web browser to ensure the normal
display of pages and improve browsing effects.
1.4 Logging In to and Out of the eSight
This topic describes how to log in to and log out of the eSight.
1.5 Viewing the eSight Home Page
This topic describes the eSight home page, common page elements, and online help for you to
quickly master eSight.
1.6 Viewing the eSight Version Information
This topic describes how to view the eSight version information.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
1
eSight
Operation Guide
1 Quick Start
1.1 Security Precautions
To ensure normal operation of eSight, observe the following precautions.
l
Do not change the eSight server time when eSight is running.
Before changing the eSight server time, stop the eSight service and database. After the
time is changed, restart eSight.
l
Do not change the host name and IP address of the eSight server time when eSight is
running.
Before changing the host name and IP address of the eSight server time, close the eSight
service. After the host name and IP address are changed, restart eSight.
l
Back up the database at regular intervals to minimize the loss that is caused by system
exceptions.
l
Change the passwords for the eSight server operating system, database, and eSight.
1.2 Client Running Environment Required for the eSight
A personal computer (PC) must meet requirements of the client running environment so that
users can operate the Intelligent Enterprise Management Platform (eSight) properly.
Table 1-1 describes the client running environment required for the eSight.
Table 1-1 Client running environment required for the eSight
Configuratio
n Item
Minimum Configuration Requirements
Hardware
configuration
requirements
Intel(R) Pentium(R) Dual CPU E2180 @ 2.00GHz, 2 GB
Operating
system
Windows 7 or Windows Server 2008
Browser
Internet Explorer 9, Internet Explorer 10, Firefox 27, and Chrome 29 are
recommended.
NOTE
The eSight Facilities Infrastructure Manager does not support Firefox 27, or
Chrome 29. Use Internet Explorer 9 or Internet Explorer 10 for it.
Issue 01 (2016-04-30)
Adobe Flash
Player
11.8 or later
Resolution
The recommended resolution width is 1280.
NOTE
During eSight login, the system displays a message when Adobe Flash Player is
not installed or the Adobe Flash Player version is earlier than 11.8. In this case,
install or upgrade Adobe Flash Player as prompted.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
2
eSight
Operation Guide
1 Quick Start
1.3 Setting the Client Web Browser
Before using a web browser to log in to eSight, set the web browser to ensure the normal
display of pages and improve browsing effects.
1.3.1 Setting the Internet Explorer 9 Web Browser
If Internet Explorer 9 is used to log in to eSight, set Internet Explorer 9 before your login.
Procedure
Step 1 Open the browser.
Step 2 Add the URLs for accessing eSight as trusted websites.
If the security level of the browser is set too high, the browser displays a security warning
when you access eSight.
1.
On the menu bar of Internet Explorer, choose Tools > Internet Options (If the menu bar
is unavailable, press Alt to display it.).
2.
In the Internet Options dialog box, select the Trusted sites icon on the Security tab
page, and click Sites.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
3
eSight
Operation Guide
1 Quick Start
3.
Issue 01 (2016-04-30)
In the Trusted sites dialog box, enter the eSight website address in the Add this website
to the zone text box, and click Add to add the website to the list of trusted websites.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
4
eSight
Operation Guide
1 Quick Start
NOTE
The websites for accessing the eSight over Hypertext Transfer Protocol (HTTP) or Hypertext
Transfer Protocol Secure (HTTPS) must be added to the list of trusted websites.
For example, if the IP address of eSight is 10.10.10.10, you must add both http://10.10.10.10 and
https://10.10.10.10 as trusted websites.
4.
Click Close.
Step 3 Set the Internet Explorer security level.
1.
On the menu bar of Internet Explorer, choose Tools > Internet Options.
2.
In the Internet Options dialog box, click the Security tab and select Trusted sites.
3.
In the Security level for this zone area, set the security level to Medium.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
5
eSight
Operation Guide
1 Quick Start
4.
Click OK.
Step 4 Set the compatibility view of Internet Explorer.
1.
On the menu bar of Internet Explorer, choose Tools > Compatibility View Settings
from the main menu.
2.
In the Compatibility View Settings dialog box, deselect Include updated website lists
from Microsoft, Display intranet sites in Compatibility view, and Display all
websites in Compatibility View.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
6
eSight
Operation Guide
1 Quick Start
3.
Click Close.
Step 5 Enable Cookies and set the web browser mode.
1.
On the menu bar of Internet Explorer, choose Tools > Developer Tools.
2.
In the Developer Tools window, click Cache and deselect Disable Cookies.
3.
Set the web browser mode.
In the Developer Tools window, click Browser Mode and select Internet Explorer 9.
4.
Close the Developer Tools window.
Step 6 Optional: (Recommended) Set the web page display mode to achieve optimal browsing
effects.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
7
eSight
Operation Guide
1 Quick Start
1.
On the menu bar of Internet Explorer, choose Tools > Internet Options.
2.
In the Tabs area, click Settings.
3.
In the Tabbed Browsing Settings dialog box, set When a pop-up is encountered to
Let Internet Explorer decide how pop-ups should open.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
8
eSight
Operation Guide
1 Quick Start
4.
Click OK.
5.
In the Internet Options dialog box, click OK.
Step 7 Perform the following operation in the Windows Server 2008 R2 environment.
1.
2.
Set Binary and script behaviors to Enable; otherwise, the portlet background of the
home page is displayed in red after you log in to eSight.
a.
On the menu bar of Internet Explorer, choose Tools > Internet Options.
b.
In the Internet Options dialog box, click the Security tab.
c.
On the Security tab page, click Custom level....
d.
In the Security Settings - Internet Zone dialog box, set Binary and script
behaviors to Enable.
Disable the enhanced security configuration of Internet Explorer, otherwise, the browser
displays an empty page instead of the login page.
NOTE
The Windows Server 2008 R2 operating system enforces high security requirements. By default,
the enhanced security configuration of Internet Explorer is enabled for both administrative and
common users. The security level of Internet Explorer is set to the highest and cannot be adjusted.
Therefore, the login page cannot be displayed properly.
Issue 01 (2016-04-30)
a.
Right-click Computer on the desktop and choose Manage from the shortcut menu.
b.
In the Server Manager dialog box that is displayed, click Configure IE ESC.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
9
eSight
Operation Guide
1 Quick Start
c.
In the dialog box that is displayed, set Administrator and Users to Off, and click
OK.
Step 8 Restart the browser.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
10
eSight
Operation Guide
1 Quick Start
1.3.2 Setting the Mozilla Firefox 27 Web Browser
If Mozilla Firefox 27 is used to log in to eSight, set Mozilla Firefox 27 before your login.
Procedure
Step 1 Open the browser.
Step 2 Enable cookies in Mozilla Firefox
1.
On the menu bar of Mozilla Firefox, choose Tools > Options.
2.
In the Options window, click Privacy.
3.
Choose User custom settings for history and select Accept cookies from sites.
4.
Click OK.
Step 3 Optional: (Recommended) Set the web page display mode to achieve optimal browsing
effects.
1.
On the menu bar of Mozilla Firefox, choose Tools > Options.
2.
In the Options window, click Tabs and select Open new windows in a new tab instead
and Warn me when opening multiple tabs might slow down Firefox.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
11
eSight
Operation Guide
1 Quick Start
3.
Click OK.
Step 4 Restart the browser.
----End
1.4 Logging In to and Out of the eSight
This topic describes how to log in to and log out of the eSight.
Prerequisite
eSight works in browser/server mode, the connection between the current personal computer
(PC) and the eSight server is normal, and the eSight server works properly.
Logging In to the eSight
Step 1 Open a browser window. In the address bar, type http://eSight server IP address:eSight server
port number/(for example, http://10.10.10.1:8080/), and press Enter.
NOTE
l The default port number of the eSight is 8080.
l Login addresses can be IPv6 addresses, for example, http://[1001::10:10:10:20]:8080/
l If a message indicating a security certificate problem is displayed, perform the operations described
in 15.2.1 What Do I Do If the eSight Displays a Security Certificate Error During Login? to
address the problem.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
12
eSight
Operation Guide
1 Quick Start
Step 2 Enter the User name and Password.
NOTE
l After you log in to the eSight the first time, change the password as prompted. Remember the new
password. If the password of the admin user is lost, you need to re-install the eSight to restore the
initial password.
l When the password will expire, you are prompted to change the password within the password
expiration warning days.
Step 3 Click Log In.
----End
Logging Out of the eSight
Step 1 Click
in the upper right corner of the eSight.
----End
1.5 Viewing the eSight Home Page
This topic describes the eSight home page, common page elements, and online help for you to
quickly master eSight.
eSight Home Page
Figure 1-1 shows the eSight home page.
Figure 1-1 eSight home page
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
13
eSight
Operation Guide
1 Quick Start
Area
Description
1. Main menu
Provides main entries for accessing various eSight functions.
2. Alarm
indicator area
Displays the numbers and severities of alarms, where the numbers of
critical, major, minor, and suggestion alarms that are not cleared and alarms
that are cleared are displayed from left to right.
3. Common
information
and buttons
Displays the following common information about eSight from left to right:
l User name: Account that currently logs in to eSight.
l
l
(Sitemap): Click to display a navigation page generated based on
the eSight structure, framework, and content. You can use the sitemap to
quickly locate the entry of each eSight function.
l
(Help): Click to view help information if you encounter any
problems when using eSight.
l
4. Home page
customization
area
(Logout): Click to log out of eSight or switch login accounts.
(About): Click to view eSight version information.
The home page displays device status data using portlets to enable users to
detect and process abnormal device status in a timely manner and ensure
that devices run properly.
You can click Customize to customize the layout of and data displayed on
the home page based on network requirements. For details, see 7 Setting
the Home Page.
5. Statistical
area
Displays statistics about device status and services in charts based on your
customization, including average CPU usage TopN and average memory
usage TopN.
Common Page Elements
Figure 1-2 shows common page elements in eSight.
Figure 1-2 Common page elements in eSight
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
14
eSight
Operation Guide
1 Quick Start
Element
Description
1. Left
You can access the left navigation tree for a function by choosing the
navigation tree function from the main menu.
Using the left navigation tree, you can access operation pages for the
function.
2. Page
You can perform operations supported by eSight on each page.
Online Help
By clicking
, you can view eSight online help, as shown in Figure 1-3.
Figure 1-3 eSight online help
1.6 Viewing the eSight Version Information
This topic describes how to view the eSight version information.
Procedure
Step 1 Click
in the upper right corner of the eSight.
Step 2 In the About dialog box that is displayed, view the eSight version information.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
15
eSight
Operation Guide
2 Managing Licenses
2
Managing Licenses
About This Chapter
A license file controls resources and functions of the eSight. You can check the license
validity to ensure proper running of the eSight.
2.1 Basic Concepts of License Management
Before performing license management operations, you need to be familiar with the basic
concepts about license management, such as license file and ESN. Understanding these
concepts helps you avoid errors when performing license management operations.
2.2 Overview
This topic describes the license management operations performed in different operation and
maintenance (O&M) scenarios. You can perform operations based on actual O&M scenarios.
2.3 Obtaining an ESN
This topic describes how to obtain an equipment serial number (ESN) of the eSight server to
apply for a license when the license on the eSight becomes invalid, expires, or fails to meet
the network management requirements.
2.4 Applying for a License
This topic describes how to apply for a license in different scenarios.
2.5 Importing a License File
When the current eSight license is invalid, expires, or cannot meet network management
requirements, you must import a new license to the eSight to ensure normal services of the
eSight.
2.6 Querying License Information About the eSight
You can regularly query the validity period and resource usage of a license to ensure proper
running of the eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
16
eSight
Operation Guide
2 Managing Licenses
2.1 Basic Concepts of License Management
Before performing license management operations, you need to be familiar with the basic
concepts about license management, such as license file and ESN. Understanding these
concepts helps you avoid errors when performing license management operations.
Table 2-1 License management concepts
Concept
Description
Equipment Serial Number
(ESN)
A string of characters that identify a piece of equipment and
ensures correct allocation of a license file to the specified
equipment. It is also called "equipment fingerprint".
license file
The license file is an authorization for the capacity,
functions, and validity period of the installed software. The
license file is a .dat file that is generated using the special
encryption tool according to the contract, and is delivered
electronically. The customer needs to load the license on the
device or software before the functions supported by the
license are applicable.
license certificate
Huawei license certificate is in electronic or printed format
and made together with the sales contract. The certificate
contains information such as product name, authorization
ID, and validity period. The printed certificates are
delivered with the products. The electronic certificate in
PDF format is sent to the customers' email boxes by the
license management system.
revocation code
A character string that is generated after the invalidity
command is executed. The character string can be used to
change the ESN at the license website. After the invalidity
command is executed, the license file is invalid.
2.2 Overview
This topic describes the license management operations performed in different operation and
maintenance (O&M) scenarios. You can perform operations based on actual O&M scenarios.
Before performing license management operations, you are advised to learn concepts related
to license management, for example, license file and ESN. Understanding these concepts
helps you avoid errors when performing license management operations.
Figure 2-1 shows the overview of license management operations.
NOTE
This topic describes the common license management operations. For more information about license
operations, see the eSight License User Guide.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
17
eSight
Operation Guide
2 Managing Licenses
Figure 2-1 Overview of license management operations
2.3 Obtaining an ESN
This topic describes how to obtain an equipment serial number (ESN) of the eSight server to
apply for a license when the license on the eSight becomes invalid, expires, or fails to meet
the network management requirements.
Prerequisites
l
You have the Update License operation rights.
l
You have obtained the message authentication code (MAC) address of the eSight server.
NOTE
The eSight uses the character string generated after the MAC address is encrypted and converted
as the unique ESN.
Procedure
l
Obtain an ESN on the License Management page when the eSight license is available.
NOTE
For a high availability (HA) system, you need to obtain the ESNs of the primary and secondary
servers and separate them with a comma (,) to obtain a license for the HA system.
Issue 01 (2016-04-30)
a.
Choose System > Administration > License Management from the main menu.
b.
On the License Management page, click Obtain ESN.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
18
eSight
Operation Guide
2 Managing Licenses
c.
In the Obtain ESN dialog box, record the generated ESN to apply for a license.
n
Obtain the ESN by selecting the MAC address.
NOTE
You can use this method to obtain the ESN of the current logged-in server only. Obtain
the ESNs of other servers by entering their MAC addresses.
n
1)
Click Select network adapters. In the drop-down list, select a MAC
address to generate an ESN. The MAC addresses provided in the dropdown list are the MAC addresses of the eSight servers.
2)
Click Generate ESN.
Obtain the ESN by entering the MAC address.
1)
Click Enter a MAC address, and enter a MAC address of the eSight
server.
2)
Click Generate ESN.
The generated ESN is displayed in ESN generated as follows on the top of the
page.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
19
eSight
Operation Guide
2 Managing Licenses
l
Obtain an ESN on the license interceptor page when the eSight license is unavailable.
NOTE
If the current license is about to expire or is invalid, the license interceptor page is displayed after
login.
NOTE
For a high availability (HA) system, you need to obtain the ESNs of the primary and secondary
servers and separate them with a comma (,) to obtain a license for the HA system.
Issue 01 (2016-04-30)
a.
Access the eSight login page, and log in to eSight. The license interceptor page is
displayed when the license is invalid or expires.
b.
On the displayed page, click here.
c.
On the displayed page, click here next to If no license file is available.
d.
On the displayed page, enter User name and Password, click Query Mac.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
20
eSight
Operation Guide
2 Managing Licenses
e.
Record the generated ESN to apply for a license.
n
Obtain the ESN by selecting the MAC address.
NOTE
You can use this method to obtain the ESN of the current logged-in server only. Obtain
the ESNs of other servers by entering their MAC addresses.
n
1)
Click Select network adapters. In the drop-down list, select a MAC
address to generate an ESN. The MAC addresses provided in the dropdown list are the MAC addresses of the eSight servers.
2)
Click Generate ESN.
Obtain the ESN by entering the MAC address.
1)
Click Enter a MAC address, and enter a MAC address of the eSight
server.
2)
Click Generate ESN.
The generated ESN is displayed in ESN generated as follows on the top of the
page.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
21
eSight
Operation Guide
2 Managing Licenses
2.4 Applying for a License
This topic describes how to apply for a license in different scenarios.
2.4.1 Applying for a Commercial License in Deployment and
Capacity Expansion Scenarios
If you purchase eSight for the first time or perform capacity expansion, use the activation
code to apply for a commercial license.
Prerequisites
You must have the Guest permission of the ESDP platform to apply for a commercial license.
You can obtain the Guest permission of the ESDP platform after applying for an account at
Huawei's official website.
Procedure
Step 1 Obtain a license certificate.
NOTE
The paper license entitlement certificate is delivered with the product, while the electronic copy is directly
sent to the mailbox of the distributor that has signed contracts with Huawei. If you do not have the paper or
electronic certificate, contact Huawei's channel partner and provide your contract number to activate the
password.
Step 2 Obtain an ESN of the eSight server.
Step 3 Log in to ESDP (http://app.huawei.com/isdp) and choose License Activation > Password
Activation.
Step 4 Enter activation password.
1.
Read the preceding information, and choose I have read the preceding information
carefully.
2.
Enter activation password in the Password text box.
The password can be found in the license entitlement certificate. See the figure on the
right.
3.
Click Add to add more entitlements to activate them in batches.
4.
Click Next.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
22
eSight
Operation Guide
2 Managing Licenses
Step 5 Fill in the ESN or click
to select an existing device (NE).
NOTE
Separate multiple ESNs by comma.
Step 6 Click Next. After the activation information is verified, click Confirm Activation.
Step 7 In the dialog box that is displayed, click Confirm.
The activation task is submitted, the Operation Record page is displayed, and the task name
is Activate License By Password.
Step 8 Download License.
l
Website
You can check the task progress on the Operation Record page. After the task status is
changed to Success, you can download the license.
l
Mailbox
After the task is executed, the system sends an email to your registered mailbox and you
can download the license from the attachment.
----End
2.4.2 Applying for a Commercial License in Case of a Version
Change
When certain eSight versions are changed, you need to apply for a new commercial license.
Prerequisites
You must have the Guest permission of the ESDP platform to apply for a commercial license.
You can obtain the Guest permission of the ESDP platform after applying for an account at
Huawei's official website.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
23
eSight
Operation Guide
2 Managing Licenses
Context
The following table lists version changes that require license upgrade.
NOTE
A version change refers to the upgrade of the eSight software version without capacity expansion. If the
upgrade involves capacity expansion, you can obtain the license by referring to 2.4.1 Applying for a
Commercial License in Deployment and Capacity Expansion Scenarios.
Source Version
Target Version
Description
eSight V200R003
eSight V300R001
and later
Requires license update.
eSight V300R001
eSight V300R002
and later
Requires license update if the target version
involves storage devices.
Does not require license update if the target
version excludes storage devices.
NOTICE
During version upgrade from V300R001 to
V300R002, contact Huawei technical support to
obtain the license file if S5500T or Oceanstor
9000 is involved.
Procedure
Step 1 Obtain the original license file.
Obtain the original license file from the customer. If the original license file is lost, you can
obtain a .dat file with a file name like license.20140425.171431.460.dat from eSight
installation directory\AppBase\etc\license.
Step 2 Log in to ESDP (http://app.huawei.com/isdp) and choose License Commission And
Maintenance > Version Change.
Step 3 Read the version change carefully, choose I read and agree to the above, and click Next.
Step 4 Select the target version.
1.
Click Upload File to upload the license file of old version.
After the file is uploaded, the current product version is automatically filled out.
2.
Click Select to choose the target product version.
3.
Click Confirm and Generate License.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
24
eSight
Operation Guide
2 Managing Licenses
Step 5 Click Download to save the license file to your computer.
----End
2.4.3 Applying for a Commercial License in Case of an ESN
Change
When the ESN is changed because an auxiliary, such as a network adapter, is changed on the
eSight server, eSight displays a message indicating that the license is invalid. In this case, you
can change the ESN and obtain a new license file.
Prerequisites
You must have the Guest permission of the ESDP platform to apply for a commercial license.
You can obtain the Guest permission of the ESDP platform after applying for an account at
Huawei's official website.
Context
l
After the ESN is changed, the license will expire in 60 days.
l
The license obtained by using the revocation code and ESN has the same resource items
and function items as the invalid license.
Procedure
Step 1 Obtain the revocation code of the current license file.
1.
Choose System > Administration > License Management from the main menu.
2.
Click Revoke License on the License Management Page.
NOTE
3.
–
An expired license or a license in trial state cannot be revoked.
–
After a license is revoked, the license will expire in 60 days.
–
After you revoke a license on a login server, a license interceptor page is displayed for other login
users to ask the users to update the license.
In the dialog box that is displayed, click OK.
The revocation code is displayed in the Revocation Code area.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
25
eSight
Operation Guide
2 Managing Licenses
NOTE
If you cannot obtain a revocation code, contact Huawei technical support and provide the original and
new ESNs to obtain a new license file. You can obtain the original ESN from the original license file.
Product=eSight Solution
Feature=Service
Esn="REMtRDItRkMtMDMtRTYtMjA="
Attrib="COMM, NULL, NULL, NULL, NULL, NULL"
Version=V300R001
Libver=1.2
Step 2 Obtain an ESN of the eSight server.
Step 3 Log in to ESDP (http://app.huawei.com/isdp) and choose License Commission And
Maintenance > ESN Change > ESN Change.
Step 4 Choose ESN Change with Revocation Code, enter the revocation code, and click Validate
Revocation Code.
After the revocation code is verified, the system displays the device information of the
original ESN.
Step 5 Enter the new ESN and click Save. In the dialog box that is displayed, click OK.
Step 6 Choose My Task > Operation Record to view the ESN change task. Click Download to
download the license file to your computer.
----End
2.5 Importing a License File
When the current eSight license is invalid, expires, or cannot meet network management
requirements, you must import a new license to the eSight to ensure normal services of the
eSight.
Prerequisite
l
You have the operation rights for Update License.
l
A new license is obtained.
Precautions
If you want to uninstall the eSight, back up the license.dat file in eSight installation directory/
AppBase/etc/license. If you want to reinstall the eSight, reimport the backup license. That is,
you do not need to apply for the license again.
Procedure
l
Import a license file from the license management page when the eSight license is
available.
a.
Issue 01 (2016-04-30)
Choose System > Administration > License Management from the main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
26
eSight
Operation Guide
2 Managing Licenses
b.
On the License Management page, click Import License.
c.
In the Import License dialog box, click
select a license file.
next to the License file text box and
NOTE
When Internet Explorer is used to upload files, the complete path (for example, D:\A\A
\A.xls) cannot exceed 255 characters. Otherwise, target files cannot be uploaded.
l
d.
Click Upload.
e.
Confirm the expiration date of the license and check whether its function items and
resource items are correct. Click Apply.
Import a license file from the license interceptor page when the eSight license is
unavailable.
NOTE
If the current license is about to expire or is invalid, the license interceptor page is displayed after
login.
Issue 01 (2016-04-30)
a.
Access the eSight login page, and log in to eSight. The license interceptor page is
displayed when the license is invalid or expires.
b.
On the displayed page, click here.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
27
eSight
Operation Guide
2 Managing Licenses
c.
On the displayed page, click here next to If a license file is available.
d.
On the displayed page, enter User name and Password.
e.
Click
next to the License file text box and select a license file.
NOTE
When Internet Explorer is used to upload files, the complete path (for example, D:\A\A
\A.xls) cannot exceed 255 characters. Otherwise, target files cannot be uploaded.
f.
Click Upload.
g.
Confirm the expiration date of the license and check whether its function items and
resource items are correct. Click Apply.
----End
Operation Result
After a license is imported successfully, log in to the eSight as a user with the administrator
rights. Choose System > Administration > License Management from the main menu. On
the license management page, the basic license information, resource control information, and
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
28
eSight
Operation Guide
2 Managing Licenses
function control information is consistent with that of the newly loaded license, and the
license revocation code is empty.
2.6 Querying License Information About the eSight
You can regularly query the validity period and resource usage of a license to ensure proper
running of the eSight.
Prerequisites
You have imported a license file into the eSight.
Context
Table 2-2 describes the license information.
Table 2-2 License information
Item
Attribute
Description
Example
Basic License
Information
Validity period
Date when the license
file expires.
2014-05-01
Reminding days
ahead
A 60-day grace period
is provided after
license expiration. The
system generates an
alarm The license will
expire to notify users
every day since 15
days before the
deadline of the grace
period. If you log in to
the eSight during this
period, the eSight
client will prompt you
to update the license.
The default value is 15.
Resource Name
Name of the resource
for license file
management.
Maximum of eSight
Network Device
Manager Nodes
License Usage
Resource usage for
license management.
30/2000
An alarm is generated
if the resource usage
exceeds the specified
alarm threshold.
80%
Resource
Control
Major Alarm
Threshold
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
For example, if the
expiry date is May 1,
2014, the eSight
reminds you of the
license expiry on June
16, 2014.
indicates that the
number of resources
managed by the license
is 2000, and 30
resources are used.
29
eSight
Operation Guide
2 Managing Licenses
Item
Attribute
Description
Example
Function
Control
Function Name
Functions provided by
the eSight.
eSight SLA Manager
Function
Supported or Not
Whether the function
is supported by the
license file.
Yes
Revocation Code
Function of revoking
the current license to
obtain the license
revocation code,
which, together with
the equipment serial
number (ESN), can be
used to apply for a
new license. This
function applies to the
scenario in which the
eSight detects that the
license file does not
match the server
network card during
the license validity
period.
LIC20120705010B010:
1AD3C655F6D8A5A43
552A307CA4BC76977
9BF4C
Revocation
Code
Procedure
Step 1 Choose System > Administration > License Management from the main menu.
In the License Management page, view the basic license information, resource control,
function control and revocation code.
If the current license will be expired, you need to import a new valid license in time. For
details about how to import a license, see 2.5 Importing a License File.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
30
eSight
Operation Guide
2 Managing Licenses
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
31
eSight
Operation Guide
3 Discovering Devices
3
Discovering Devices
About This Chapter
You can add devices to the eSight for management.
3.1 Basic Concepts of Resource Management
Before performing resource management operations, you need to be familiar with the basic
concepts about resource management. Understanding these concepts helps you avoid errors
when performing resource management operations.
3.2 Overview
The overview of resource management operations helps to learn the entire procedure for
managing resources, and create, maintain, and adjust resources, such as subnets, in the
topology.
3.3 Methods and Protocols Used for Discovering Devices
Before connecting devices to the eSight, you need to learn about the methods and protocols
used for discovering devices.
3.4 Configuring Protocol Parameters on Devices
Before creating a device on the eSight, you must set the protocol parameters on the device.
3.5 Creating a Default Subnet
Except the IP phones, CC applications, UC applications and IVS applications, other devices
and applications can be managed in the general subnet.
3.6 Configuring Protocol Template on eSight
Before automatically discovering devices set protocol template on eSight.
3.7 Auto Discovery for Devices
This function is used to add all devices in a network segment to eSight in batches, which
improves work efficiency.
3.8 Managing Discovery Tasks
The eSight can discover devices in a specified network segment or with specified IP addresses
through tasks. Managing discovery tasks properly helps increase efficiency and accuracy of
discovering devices. For example, if an excluded network segment or IP address is set, the
devices in the network segment or with the IP address are automatically skipped when devices
are automatically discovered.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
32
eSight
Operation Guide
3 Discovering Devices
3.9 Adding Devices in Batches
When a large number of devices need to be added to the eSight, you can collect the device
data, record the data into a template file, and then import the file to the eSight to add the
devices in batches. This helps improve your work efficiency.
3.10 Adding a Single Device
You can manually add a small number of devices to the eSight if you have obtained the device
Internet Protocol (IP) address and protocol information.
3.11 Creating a Group
eSight supports device and interface group management to divide devices and interfaces to
groups, facilitating management and operations.
3.12 Adjusting Resources
When the network structure changes, you can adjust resources (mainly refer to subnets and
devices) as required.
3.13 Exporting Resources
eSight allows users to export NE information and assets information.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
33
eSight
Operation Guide
3 Discovering Devices
3.1 Basic Concepts of Resource Management
Before performing resource management operations, you need to be familiar with the basic
concepts about resource management. Understanding these concepts helps you avoid errors
when performing resource management operations.
Table 3-1 describes the basic concepts about resource management.
Table 3-1 Basic concepts
Concept
Description
Resource
The eSight manages various resources, such as devices and subnets.
NE
An NE is an entity that contains hardware and software. The eSight
supports only virtual NEs.
Subnet
A large network is divided into several smaller networks based on a
specific rule (by region or device type), which facilitates network
management. In the eSight, these smaller networks are called subnets.
Device
A device is an actual physical device, and its basic information includes
the Internet Protocol (IP) address, port number, user name, and password.
Group
A group incorporates managed objects. Multiple devices in different
subnets can be added to a group and assigned to a user for management.
3.2 Overview
The overview of resource management operations helps to learn the entire procedure for
managing resources, and create, maintain, and adjust resources, such as subnets, in the
topology.
Before performing resource management operations, you need to be familiar with the basic
concepts about resource management, such as subnets and devices. See 3.1 Basic Concepts
of Resource Management. Understanding these concepts helps you avoid errors when
performing resource management operations.
Figure 3-1 shows the overview of resource management operations.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
34
eSight
Operation Guide
3 Discovering Devices
Figure 3-1 Overview of resource management operations
3.3 Methods and Protocols Used for Discovering Devices
Before connecting devices to the eSight, you need to learn about the methods and protocols
used for discovering devices.
3.3.1 Methods and Protocols Used for Adding Network Devices
Before connecting network devices to the eSight, you need to learn about the methods of
adding devices to the eSight.
Table 3-2 lists types of methods of connecting the network devices to the eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
35
eSight
Operation Guide
3 Discovering Devices
Table 3-2 Methods to add network devices as well as used protocols
Device/
Application
Type
Can Be Automatically Discovered? (Y/N)
Network
device
Discovering
Through IP
Network Segment
and Protocol
Discover
ing By
ARP
Discover
ing By
Route
SNMP
Protocol
ICMP
SNMP
Protocol
SNMP
Protocol
Y
(Recomm
ended)
Y
(Recomm
ended for
devices
without
SNMP
parameter
s
configure
d)
Y
Y
Can Be
Added
in
Batches?
(Y/N)
Can Be
Added
One by
One?
(Y/N)
Y
Y
NOTE
IP
addresse
s of
access
devices
cannot
be used
as "seed
IP
addresse
s" to
discover
other
devices.
3.3.2 Methods and Protocols Used for Adding Storage Devices
Before connecting to the devices, you need to learn about the methods of adding devices to
the eSight.
Table 3-3 lists types of devices that can be connected to the eSight, specific device names,
and methods of adding the devices to eSight.
Table 3-3 Methods to add devices and applications as well as used protocols
Issue 01 (2016-04-30)
Dev
ice
Device
Name
Can Be Automatically Discovered? (Y/N)
SNMP
Protoc
ol
SMI-S
Protoc
ol
TLV
Protoc
ol
REST
Protoc
ol
Unif
ied
Stor
age
OceanStor
S2600(V1R2
/V1R5)
N
Y
N
N
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
SNMP
+Telne
t
Protoco
l
Can
Be
Adde
d in
Batch
es?
(Y/N)
Can
Be
Adde
d
One
by
One?
(Y/N)
N
Y
Y
36
eSight
Operation Guide
3 Discovering Devices
Dev
ice
Issue 01 (2016-04-30)
Device
Name
Can Be Automatically Discovered? (Y/N)
SNMP
+Telne
t
Protoco
l
Can
Be
Adde
d in
Batch
es?
(Y/N)
Can
Be
Adde
d
One
by
One?
(Y/N)
SNMP
Protoc
ol
SMI-S
Protoc
ol
TLV
Protoc
ol
REST
Protoc
ol
OceanStor
S5000(V1R5
C02)
N
Y
N
N
N
Y
Y
OceanStor
S5000(V1R1
)
Y
N
N
N
N
Y
Y
OceanStor T
series(V1R1/
V1R2/V1R5)
N
Y
N
N
N
Y
Y
OceanStor T
series(V2R1)
N
N
Y
N
N
Y
Y
OceanStor T
series(V2R2)
N
N
N
Y
N
Y
Y
6800
V3/5800
V3/5600
V3/5500
V3/5300
V3/2800
V3(V3)
N
N
N
Y
N
Y
Y
OceanStor
HVS85T/
OceanStor
HVS88T(V1
R1C99)
N
N
Y
N
N
Y
Y
OceanStor
18500/
OceanStor
18800/
OceanStor
18800F(V1R
1) and
OceanStor
HVS85T/
OceanStor
HVS88T(V1
R1C00)
N
N
N
Y
N
Y
Y
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
37
eSight
Operation Guide
3 Discovering Devices
Dev
ice
SNMP
+Telne
t
Protoco
l
Can
Be
Adde
d in
Batch
es?
(Y/N)
Can
Be
Adde
d
One
by
One?
(Y/N)
N
N
Y
Y
N
N
N
Y
Y
Y
N
N
N
Y
Y
N
Y
N
N
N
Y
Y
OceanStor
9000
Y
N
N
N
N
Y
Y
OceanStor
UDS(V1R2)
N
N
N
Y
N
Y
Y
OceanStor
CSS/
OceanStor
CSE
Y
N
N
N
N
Y
Y
Data
Prot
ectio
n
OceanStor
VTL6900
N
N
Y
N
N
Y
Y
OceanStor
HDP3500E
Y
N
N
N
N
Y
Y
Thir
d
Part
y
Stor
age
NetApp(399
2/3994/
FAS3160/98
0C)
N
Y
N
N
N
Y
Y
Inspur(AS40
0)
N
N
N
N
Y
Y
Y
Mas
sive
Stor
age
Issue 01 (2016-04-30)
Device
Name
Can Be Automatically Discovered? (Y/N)
SNMP
Protoc
ol
SMI-S
Protoc
ol
TLV
Protoc
ol
REST
Protoc
ol
OceanStor
Dorado
5100(V1R1C
00)
N
Y
N
OceanStor
Dorado 2100
G2(V1R1)
N
Y
OceanStor
VIS6000/
OceanStor
VIS6000T
N
OceanStor
N8000
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
38
eSight
Operation Guide
3 Discovering Devices
Dev
ice
Issue 01 (2016-04-30)
Device
Name
Can Be Automatically Discovered? (Y/N)
SNMP
+Telne
t
Protoco
l
Can
Be
Adde
d in
Batch
es?
(Y/N)
Can
Be
Adde
d
One
by
One?
(Y/N)
SNMP
Protoc
ol
SMI-S
Protoc
ol
TLV
Protoc
ol
REST
Protoc
ol
Inspur(AS20
00(OEM
NetApp
7900)/
AS1000–
G6(OEM
NetApp
5480)/
AS1000–
G3(OEM
NetApp
4980))
N
Y
N
N
N
Y
Y
DFT(GS399
2(OEM
NetApp
3992))
N
Y
N
N
N
Y
Y
EMC(CX3/
CX4)
N
Y
N
N
N
Y
Y
IBM(DS810
0)
N
Y
N
N
N
Y
Y
HP(EVA)
N
Y
N
N
N
Y
Y
Sugon(DS83
48(OEM
NetApp
3994)/
DS8340(OE
M NetApp
3992)/
DS800–
F10(OEM
NetApp
4980)/
DS800–
F20(OEM
NetApp
4988))
N
Y
N
N
N
Y
Y
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
39
eSight
Operation Guide
3 Discovering Devices
Dev
ice
FC
swit
ch
Device
Name
Can Be Automatically Discovered? (Y/N)
SNMP
+Telne
t
Protoco
l
Can
Be
Adde
d in
Batch
es?
(Y/N)
Can
Be
Adde
d
One
by
One?
(Y/N)
SNMP
Protoc
ol
SMI-S
Protoc
ol
TLV
Protoc
ol
REST
Protoc
ol
Sugon(DS60
0–F20(OEM
Infortrend)/
DS600–
F10(OEM
Infortrend))
Y
N
N
N
N
Y
Y
Brocade
(SilkWorm
series/
48000/DCX
4S)
N
Y
N
N
N
Y
Y
HUAWEI
SNS
series(V1R2)
N
Y
N
N
N
Y
Y
Qlogic
Y
N
N
N
N
Y
Y
HUAWEI
SNS
series(V1R1)
Y
N
N
N
N
Y
Y
NOTE
l The OceanStor 18000 device port is 8088.
l The OceanStor HVS85T/OceanStor HVS88T(V1R1C00) device port is 443.
3.3.3 Methods and Protocols Used for Adding Servers
This topic describes the methods for adding servers to the eSight.
Table 3-4 lists the server types and methods for adding servers to the eSight.
Table 3-4 Methods to add servers and applications as well as used protocols
Server Type
Rack server
Issue 01 (2016-04-30)
Can Be Automatically
Discovered by Network
Segment? (Y/N)
SNMP
IPMI
Y
Y
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Can Be
Added in
Batches?
(Y/N)
Can Be
Added One
by One?
(Y/N)
Y
Y
40
eSight
Operation Guide
3 Discovering Devices
Server Type
Can Be Automatically
Discovered by Network
Segment? (Y/N)
Can Be
Added in
Batches?
(Y/N)
Can Be
Added One
by One?
(Y/N)
SNMP
IPMI
Blade server
Y
N
Y
Y
High-Density server
Y
Y
Y
Y
Storage server
N
Y
Y
Y
Third-Party server
Y
Y
Y
Y
3.4 Configuring Protocol Parameters on Devices
Before creating a device on the eSight, you must set the protocol parameters on the device.
3.4.1 Setting Protocol Parameters for Network Devices
This topic describes how to set protocol parameters for network devices.
3.4.1.1 Setting SNMP Parameters on Devices
Configuration commands vary according to the device model and version. This topic uses
Huawei S9700 V200R003C00 as an example to list basic commands for setting SNMP
parameters on a device.
Procedure
l
Scenario 1: The device uses the SNMPv1/v2c protocol.
NOTICE
SNMPv1 and SNMPv2c have security risks; therefore, SNMPv3 is recommended for
device discovery.
a.
Run the system-view command to enter the system view.
b.
Optional: Run the snmp-agent command to enable the SNMP agent.
By default, the SNMP agent is disabled. Executing the snmp-agent command with
any parameter enables the SNMP agent. This step is optional.
c.
Run the snmp-agent sys-info version { { v1 | v2c }* } command to set the SNMP
version to SNMPv1 or SNMPv2c.
By default, SNMPv3 is enabled.
After SNMPv1 or SNMPv2c is enabled, managed devices support both
SNMPv1/v2c and SNMPv3, and can be monitored and managed by NMSs that
comply with SNMPv1/v2c and SNMPv3.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
41
eSight
Operation Guide
3 Discovering Devices
d.
Configure a read or write community name and the management information base
(MIB) view that the community can access, and create an MIB view.
i.
Configure a read or write community name and the MIB view that the
community can access.
snmp-agent community { read | write } { community-name | cipher
community-name } [ mib-view view-name ]*
NOTE
l { community-name | cipher community-name }: specifies a read or write
community name, which is saved in ciphertext in the configuration file. To
enhance security, you can set the cipher parameter to display the community name
in ciphertext. In this case, you must keep the community name secure since you
cannot obtain it on the device if you forget it.
l view-name: specifies the MIB view that a community can access. When a read or
write community name is configured, the community can access the Viewdefault
view by default.
ii.
Optional: Create an MIB view.
Run the snmp-agent mib-view { included | excluded } view-name oid-tree
command.
NOTE
l view-name: specifies an SNMP view name.
l oid-tree: specifies an object identifier (OID) MIB sub-tree of an MIB object. The
value is a string, which can be the OID or name of a variable, such as 1.4.5.3.1 or
system.
The default view is Viewdefault, and the default OID tree is internet. This view allows
you to operate nodes under the internet MIB sub-tree (whose MIB node is internet
and OID is 1.3.6.1). Therefore, this step is optional.
Operations vary according to the scenario, as described in Table 3-5.
Table 3-5 Using SNMPv1/v2c to configure the MIB view that a community can
access
Applic
ation
Scenar
io
Issue 01 (2016-04-30)
(Recommended) LLDP is
required in eSight to discover
device links.
LLDP is not required in eSight to
discover device links.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
42
eSight
Operation Guide
3 Discovering Devices
Proce
dure
Set the MIB view that the
community can access to isoview. This view allows you to
operate nodes under the iso MIB
sub-tree (whose OID is 1). The
procedure is as follows:
1. In the step of configuring a
read or write community
name and the MIB view that
the community can access,
set view-name to
Viewdefault.
iso-view.
By default, a community can
access the Viewdefault view.
Therefore, the following steps are
optional.
1. In the step of configuring a
read or write community
name and the MIB view that
the community can access, set
view-name to Viewdefault.
2. In the step of creating an MIB
view, set command parameters
as follows:
2. In the step of creating an
MIB view, set command
parameters as follows:
l { included | excluded }:
Set it to included.
l { included | excluded }:
Set it to included.
l view-name: Set it to
Viewdefault.
l oid-tree: Set it to internet.
l view-name: Set it to isoview.
l oid-tree: Set it to iso.
e.
Run the following commands to enable the device to report alarms to eSight.
i.
Run the snmp-agent trap source interface-type interface-number command to
specify the source interface (device's management interface) for sending trap
messages. The IP address of the source interface must be the same as that
added to eSight.
ii.
Run the snmp-agent trap enable command to enable the function of sending
trap messages.
iii. Run the snmp-agent target-host trap address udp-domain ip-address
command to set the destination address for receiving trap messages. The
destination address is the IP address of eSight.
Verify the result of setting SNMP parameters.
l
–
Run the display snmp-agent sys-info version command to verify the SNMP
version.
–
Run the display snmp-agent community [ read | write ]* command to verify the
SNMP read or write community name.
–
Run the display snmp-agent mib-view command to verify SNMP MIB view
information.
Scenario 2: The device uses the SNMPv3 protocol.
a.
Run the system-view command to enter the system view.
b.
Optional: Run the snmp-agent command to enable the SNMP agent.
By default, the SNMP agent is disabled. Executing the snmp-agent command with
any parameter enables the SNMP agent. This step is optional.
c.
Issue 01 (2016-04-30)
Optional: Run the snmp-agent udp-port port-num command to modify the port
used by the SNMP agent to communicate with NMSs.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
43
eSight
Operation Guide
3 Discovering Devices
By default, the SNMP agent uses port 161 to communicate with NMSs. This step is
optional.
d.
Optional: Run the snmp-agent sys-info version v3 command to set the SNMP
version.
By default, SNMPv3 is enabled. This step is optional.
e.
Configure an SNMP user group and create an MIB view.
i.
Configure an SNMP user group.
snmp-agent group v3 group-name [ authentication | privacy ] [ read-view
read-view ] [ write-view write-view ] [ notify-view notify-view ]
○
○
ii.
Rules for specifying the authentication and privacy parameters:
○
Specifying neither authentication nor privacy: Disable both
authentication and encryption. This setting is applicable when the
network environment is safe and administrators are fixed.
○
Specifying the authentication parameter: Enable authentication but
not encryption. This setting is applicable when the network
environment is safe, but many administrators exist and the
administrators frequently perform crossover operations on the
device. Authentication ensures that only authorized administrators
can access the device.
○
Specifying the privacy parameter: Enable both authentication and
encryption. This setting is applicable when the network environment
is not safe and administrators frequently perform crossover
operations on the device. Authentication ensures that only
authorized administrators can access the device, and encryption
ensures that network data is transmitted after being encrypted to
prevent network data theft and key data leakage.
Rules for specifying the read-view, write-view, and notify-view
parameters:
○
By default, the read view for an SNMP user group is Viewdefault,
and no write view or notify view is specified for the group.
○
Set the read-view parameter to a read view name. This setting is
applicable when an NMS has read-only permission in a specified
view (for example, when the administrator level is low).
○
Set the write-view parameter to a write view name. This setting is
applicable when an NMS has read and write permission in a
specified view (for example, when the administrator level is high).
○
Set the notify-view parameter to a notify view name. This setting is
applicable when you need to filter some important alarms or
irrelevant alarms by specifying the MIB node used by the managed
device to send alarms to an NMS. After the notify-view parameter is
set, only alarms that match the MIB node specified by the parameter
can be sent to the NMS.
Optional: Create an MIB view.
Run the snmp-agent mib-view { included | excluded } view-name oid-tree
command.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
44
eSight
Operation Guide
3 Discovering Devices
NOTE
l view-name: specifies an SNMP view name.
l oid-tree: specifies an object identifier (OID) MIB sub-tree of an MIB object. The
value is a string, which can be the OID or name of a variable, such as 1.4.5.3.1 or
system.
The default view is Viewdefault, and the default OID tree is internet. This view allows
you to operate nodes under the internet MIB sub-tree (whose MIB node is internet
and OID is 1.3.6.1). Therefore, this step is optional.
To enable eSight to manage devices in a more comprehensive and in-depth manner,
perform the operations described in Table 3-6 based on the site requirements.
Table 3-6 Using SNMPv3 to configure the MIB view that views for an SNMP user
group can access
Applic
ation
Scena
rio
(Recommended) eSight can
receive alarms properly and use
LLDP to discover device links.
eSight can receive alarms
properly.
Proce
dure
Set the MIB view that a read view,
write view, and notify view can
access to iso-view. This view
allows you to operate nodes under
the iso MIB sub-tree (whose OID
is 1). The procedure is as follows:
Set the MIB view that a read view,
write view, and notify view can
access to Viewdefault. The
procedure is as follows:
1. In the step of configuring an
SNMP user group, set readview, write-view, and notifyview to iso-view.
2. In the step of creating an MIB
view, set command parameters
as follows:
l { included | excluded }:
Set it to included.
1. In the step of configuring an
SNMP user group, set readview, write-view, and notifyview to Viewdefault.
2. Optional: In the step of
creating an MIB view, set
command parameters as
follows: (The Viewdefault
view is created by default.
Therefore, this step is
optional.)
l view-name: Set it to isoview.
l { included | excluded }:
Set it to included.
l oid-tree: Set it to iso.
l view-name: Set it to
Viewdefault.
l oid-tree: Set it to internet.
f.
Run the snmp-agent usm-user v3 user-name [ group group-name | acl acl-name ]
* command to configure an SNMPv3 user.
The user-name value must be the same as the Security name value configured on
SNMP Template Resources in eSight.
g.
Issue 01 (2016-04-30)
Optional: Run the snmp-agent usm-user v3 user-name authentication-mode
{ md5 | sha } [ cipher password ] command to configure an authentication
password for the SNMPv3 user.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
45
eSight
Operation Guide
3 Discovering Devices
The authentication-mode and password values must respectively be the same as
the Authentication protocol and Authentication Password values configured on
SNMP Template Resources in eSight.
h.
Optional: Run the snmp-agent usm-user v3 privacy-mode {des56 | aes128 |
aes192 | aes256 | 3des } [ cipher password ] command to configure an encryption
password for the SNMPv3 user.
The privacy-mode and password values must respectively be the same as the
Privacy protocol and Privacy Password values configured on SNMP Template
Resources in eSight.
i.
Run the following commands to enable the device to report alarms to eSight.
i.
Run the snmp-agent trap source interface-type interface-number command to
specify the source interface (device's management interface) for sending trap
messages. The IP address of the source interface must be the same as that
added to eSight.
ii.
Run the snmp-agent trap enable command to enable the function of sending
trap messages.
iii. Run the snmp-agent target-host trap address udp-domain ip-address
params securityname securityname v3 command to set the destination
address for receiving trap messages. The destination address is the IP address
of eSight, and securityname must be the same as usm-user.
Verify the result of setting SNMP parameters.
–
Run the display snmp-agent sys-info version command to verify the SNMP
version.
–
Run the display snmp-agent group command to verify user group information.
–
Run the display snmp-agent usm-user command to verify user information.
–
Run the display snmp-agent mib-view command to verify SNMP MIB view
information.
----End
3.4.1.2 Setting Trap Parameters on Devices
The trap receiver in eSight starts by default and receives trap messages from devices. Devices
use trap packets in SNMP to proactively send fault information to eSight. Only after the
function of sending trap packets is enabled and the trap target host is configured on a device,
eSight can monitor fault information for the device. Configuration commands vary according
to the device model and version. This topic uses Huawei S9700 V200R003C00 as an example
to list basic commands for setting trap parameters on a device.
Prerequisites
The trap receiver has started in eSight, which is the default setting.
Procedure
Step 1 Run the following command to enter the system view:
system-view
Step 2 Run the following command to enable the information center function:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
46
eSight
Operation Guide
3 Discovering Devices
info-center enable
Step 3 Run the following command to enable the function of sending trap packets:
snmp-agent trap enable
Step 4 Run the following command to set the trap target host according to Table 3-7:
snmp-agent target-host trap address udp-domain ip-address [ udp-port port-number]
params securityname security-string [ v1 | v2c | v3 [ authentication | privacy ] ]
Table 3-7 Parameter description
Parameter
Description
ip-address
Specifies the IP address of the target host that receives
SNMP trap packets, that is, the IP address of eSight.
NOTE
The IP address specified by ip-address and the user name
specified by security-string together identify a target host.
udp-port port-number
Specifies the port used by eSight to receive trap packets.
The default value is 162.
NOTICE
This port must be the same as the port configured in eSight for
receiving trap packets from managed devices (default value:162);
otherwise, eSight cannot receive trap packets from devices.
params securityname
security-string
Specifies a security user name displayed in eSight.
l SNMPv3: Set securityname to a user name, which
must be the same as the usm-user value specified
when you set SNMPv3 parameters on the device.
l SNMPv1 and SNMPv2c: eSight does not need to be
authenticated based on securityname to receive alarm
information from all alarm hosts. This parameter is
mainly used to distinguish multiple alarm hosts with
the same IP address.
v1 | v2c | v3
Specifies the SNMP version. If the SNMP version is not
specified, SNMPv1 is used by default. The SNMP version
must be the same as that used by devices; otherwise,
eSight cannot receive trap packets from devices.
SNMPv3 provides higher security than SNMPv1 and
SNMPv2c. Therefore, you are advised to use SNMPv3.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
47
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
authentication | privacy
Specifies the packet security mode. Only SNMPv3
supports this parameter.
When configuring the security level of an alarm host,
ensure that the security level is not lower than that of the
user specified by securityname; otherwise, the alarm host
cannot send alarms properly.
A user supports the following security levels in
descending order:
l Level 1: privacy (Both authentication and encryption
are enabled.)
l Level 2: authentication (Only authentication is
enabled.)
l Level 3: none (Neither authentication nor encryption
is enabled.)
The security level of the alarm host must be greater than
or equal to that of the user. That is, if the security level of
the user is 1, the security level of the alarm host must be
1; if the security level of the user is 2, the security level of
the alarm host can be 1 or 2.
----End
3.4.2 Configuring FC Switch Parameters
For the eSight to discover FC switches, first complete required configurations on the FC
switches. The following explains how to configure an FC switch before performing device
discovery.
3.4.2.1 Configuring Qlogic Switch Parameters
For the eSight to discover FC switches, first complete required configurations on the FC
switches. The following explains how to configure an FC switch before performing device
discovery.
Procedure
Step 1 Configure an IP address for the Qlogic FC switch.
1.
2.
On the CLI of the switch, run the admin start to open Admin session.
For example, run the set setup system ipv4 command to configure IPv4 parameters.
SNS2120 (admin) #> set setup system ipv4
A list of attributes with formatting and current values will follow.
Enter a new value or simply press the ENTER key to accept the current value.
If you wish to terminate this process before reaching the end of the list
press 'q' or 'Q' and the ENTER key to do so.
Current Values:
EthIPv4NetworkEnable
True
EthIPv4NetworkDiscovery Static
EthIPv4NetworkAddress
xxx.xxx.xxx.xxx
EthIPv4NetworkMask
xxx.xxx.xxx.xxx
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
48
eSight
Operation Guide
3 Discovering Devices
EthIPv4GatewayAddress
xxx.xxx.xxx.xxx
New Value (press ENTER to accept current value, 'q' to quit, 'n' for none):
EthIPv4NetworkEnable
(True / False)
:True
EthIPv4NetworkDiscovery (1=Static, 2=Bootp, 3=Dhcp, 4=Rarp) :1
EthIPv4NetworkAddress
(dot-notated IP Address)
:192.168.24.130
EthIPv4NetworkMask
(dot-notated IP Address)
:255.255.0.0
EthIPv4GatewayAddress (dot-notated IPv4 Address)
:192.168.0.1
Do you want to save and activate this system setup? (y/n): [n] y
Step 2 Run the set setup services command to enable the SNMP Agent function. Examples are as
follows.
SNS2120 (admin) #> set setup services
A list of attributes with formatting and current values will follow.
Enter a new value or simply press the ENTER key to accept the current value.
If you wish to terminate this process before reaching the end of the list
press 'q' or 'Q' and the ENTER key to do so.
PLEASE NOTE:
----------* Further configuration may be required after enabling a service.
* If services are disabled, the connection to the switch may be lost.
* When enabling SSL, please verify that the date/time settings
on this switch and the workstation from where the SSL connection
will be started match, and then a new certificate may need to be
created to ensure a secure connection to this switch.
TelnetEnabled
(True / False) [True ]
SSHEnabled
(True / False) [True ]
GUIMgmtEnabled
(True / False) [True ]
SSLEnabled
(True / False) [False]
EmbeddedGUIEnabled
(True / False) [True ]
SNMPEnabled
(True / False) [True ]
NTPEnabled
(True / False) [False]
CIMEnabled
(True / False) [True ]
FTPEnabled
(True / False) [True ]
MgmtServerEnabled
(True / False) [True ]
CallHomeEnabled
(True / False) [True ]
Do you want to save and activate this services setup? (y/n): [n] y
Step 3 Run the following command to enable the switch to support the SNMP protocol. After the
command execution, the switch can receive SNMP requests of all versions.
Run the set setup snmp common command, set the SNMPv3Enabled parameter is True to
activate SNMP V3. Examples are as follows.
SNS2120 (admin) #> set setup snmp common
A list of attributes with formatting and current values will follow.
Enter a new value or simply press the ENTER key to accept the current value.
If you wish to terminate this process before reaching the end of the list
press 'q' or 'Q' and the ENTER key to do so.
Current Values:
SnmpEnabled
True
Contact
<sysContact undefined>
Location
<sysLocation undefined>
ReadCommunity
public
WriteCommunity
private
AuthFailureTrap False
ProxyEnabled
True
SNMPv3Enabled
False
New Value (press ENTER to not specify value, 'q' to quit):
SnmpEnabled
(True / False)
:
Contact
(string, max=64 chars) :
Location
(string, max=64 chars) :
ReadCommunity
(string, max=32 chars) :
WriteCommunity
(string, max=32 chars) :
AuthFailureTrap (True / False)
:
ProxyEnabled
(True / False)
:
SNMPv3Enabled
(True / False)
: t
Do you want to save and activate this snmp setup? (y/n): [n] y
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
49
eSight
Operation Guide
3 Discovering Devices
Step 4 Create parameters for discovering switch SNMP V3.
Run the snmpv3user add command to Creating an SNMP user account, examples are as
follows.
SNS2120 (admin) #> snmpv3user add
A list of SNMPV3 user attributes with formatting and default values as
applicable will follow.
Enter a new value OR simply press the ENTER key where-ever allowed to
accept the default value.
If you wish to terminate this process before reaching the end of the list,
press "q" or "Q" and the ENTER OR "Ctrl-C" key to do so.
Username
(8-32 chars)
: snmpuser1
Group
(0=ReadOnly, 1=ReadWrite) [ReadOnly ] : 1
Authentication (True/False)
[False
] : t
AuthType
(1=MD5, 2=SHA)
[MD5
] : 1
AuthPhrase
(8-32 chars)
: ***********
Confirm AuthPhrase
: ***********
Privacy
(True/False)
[False
] : t
PrivType
(1=DES)
[DES
] : 1
PrivPhrase
(8-32 chars)
: ********
Confirm PrivPhrase
: ********
Do you want to save and activate this snmpv3user setup ?
(y/n): [n] y
SNMPV3 user added and activated.
Step 5 Run the admin stop command to exit from Admin session.
Step 6 Run the quit command to quit the current network settings.
----End
3.4.2.2 Configuring Brocade Switch Parameters
Install the switch management software named Brocade Network Advisor and configure
switches for the eSight to discover Brocade Fibre Channel switches.
Prerequisites
The Brocade Network Advisor software package has been downloaded from the Brocade
official website.
Context
The eSight connects to Brocade Network Advisor to manage Brocade switches. It uses the
SMI-S agent function. Before managing Brocade switches, obtain the Brocade Network
Advisor installation package from the Brocade official website.
NOTICE
Use individual mailboxes to register with the Brocade official website and ensure that your
account information is true. Otherwise, the download fails.
The software name is shown in the red square in the following figure.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
50
eSight
Operation Guide
3 Discovering Devices
Figure 3-2 Brocade Network Advisor software package name
Procedure
l
Install Brocade Network Advisor.
a.
Decompress the software package, start install.exe in directory
na1220_brocade_windows\Windows, and install the software as instructed.
Unless otherwise specified, keep the default settings.
b.
Go to the Select Install Folder page and select the path of the installation file, as
shown in Figure 3-3.
Figure 3-3 Select Install Folder page
c.
Issue 01 (2016-04-30)
On the Package page, select SMI Agent Only, as shown in Figure 3-4.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
51
eSight
Operation Guide
3 Discovering Devices
Figure 3-4 Package page
d.
Issue 01 (2016-04-30)
On the Server IP Configuration page, set the IP address to the IP address of the
operating system running on the PC where Brocade Network Advisor resides. If
you do not want to change the IP address, keep the default value, as shown in
Figure 3-5.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
52
eSight
Operation Guide
3 Discovering Devices
Figure 3-5 Server IP Configuration page
e.
On the Server Configuration page, enter the port. If you do not want to change the
port, keep the default value, as shown in Figure 3-6.
Figure 3-6 Server Configuration page
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
53
eSight
Operation Guide
3 Discovering Devices
f.
On the SMI Agent Configuration page, select the management module, as shown
in Figure 3-7.
Figure 3-7 Server Configuration page
g.
l
Keep the default settings of other parameters and click Finish.
Configure switch parameters.
a.
Choose Start > Server Management Console. The Server Management Console
page is displayed, as shown in Figure 3-8.
Figure 3-8 Server Management Console page
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
54
eSight
Operation Guide
3 Discovering Devices
b.
Click Configure SMI Agent. The page shown in Figure 3-9 is displayed.
Figure 3-9 Configuration page
c.
In the dialog box that is displayed, enter your user name and password and click
Login. The page shown in Figure 3-10 is displayed.
The default user name is administrator and the password is password.
Figure 3-10 Configuration tool page
d.
Click Fabric Discovery. The page shown in Figure 3-11 is displayed.
NOTE
If nothing is displayed after you click Fabric Discovery, the JRE may have not been
installed. Install JRE 1.7 and try again. If a 64-bit operating system is used, install 64-bit
JRE 1.7.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
55
eSight
Operation Guide
3 Discovering Devices
Figure 3-11 Discover Fabrics page
e.
Click Add, enter the name and IP address of the switch, user name, and password,
click OK to add the switch to the agent. The page shown in Figure 3-12 is
displayed.
Figure 3-12 Configuration information page
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
56
eSight
Operation Guide
3 Discovering Devices
f.
Click OK. The dialog box shown in Figure 3-13 is displayed.
Figure 3-13 Successful configuration page
g.
Log in to the eSight and configure Brocade switch parameters, as shown in Figure
3-14.
Figure 3-14 Configuring Brocade switch parameters
NOTE
l Set the IP address to the IP address of the agent's operating system instead of the switch's
IP address. Set the protocol to SMI-S and the user name and password to those for using
the agent.
l If Enable SSL is selected during the installation, SSL must be enabled during parameter
discovery. Set the port to the one configured during software installation (port 5989 is
enabled and port 5988 is disabled by default).
h.
l
Issue 01 (2016-04-30)
Click OK.
Set alarm reporting.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
57
eSight
Operation Guide
3 Discovering Devices
To ensure that the eSight can receive the alarms reported by a Brocade switch, you must
manually add the eSight trap information to the Brocade switch. The operations are as
follows:
a.
Run the Web Tools of the Brocade switch and choose Manage > Switch Admin.
b.
In the Switch Administration dialog box that is displayed, click the SNMP tab.
For alarm reporting over SNMPv1, configure the SNMPv1 CommunityTrap
Recipient list. Add the eSight IP address to the Recipient option in the SNMPv1
Community/Trap Recipient list and click Apply. The configuration is completed.
If the option is unavailable, log in to the Brocade switch as user root and run the
following command to enable SNMPv1: snmpconfig --enable snmpv1
When using SNMPv1, deselect Enable Authentication trap, as shown in Figure
3-15.
Figure 3-15 Switch Administration dialog box
----End
3.4.3 Setting Server Protocol Parameters
This topic describes how to set protocol parameters on servers. After the setting, you can use
the parameter settings to enable the eSight to access and manage the servers.
3.4.3.1 Setting SNMP Parameters
Simple Network Management Protocol (SNMP) parameters ensure that servers can properly
communicate with the eSight. You need to set SNMP parameters for rack servers, third-party
servers, blade servers, and high-density servers.
Prerequisites
You have logged in to the iMana 200 web user interface (WebUI) on the target server. For
details, see the xxxxx Server iMana User Guide released with the server.
NOTE
xxxxx indicates a server model.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
58
eSight
Operation Guide
3 Discovering Devices
Context
You can modify SNMP parameters based on site requirements. The following SNMP
parameters are required for the eSight to access a server:
l
SNMPv1 and SNMPv2c
–
Port
–
Read community
–
Write community
NOTE
SNMPv1 and SNMPv2c are disabled on a server by default because they may cause security risks due
to defects in their security mechanisms. If you need to enable SNMPv1 or SNMPv2c, perform the steps
described in this topic.
l
SNMPv3
–
Port
–
Username
–
Authentication protocol
–
Authentication password
–
Data encryption protocol
–
Data encryption password
NOTE
The procedure in this topic describes how to set Port, Username, Authentication password, and Data
encryption password. The other parameters are described as follows:
l Authentication protocol is not configurable. The default value of this parameter for a server is
HMACMD5.
l Data encryption protocol is not configurable. The default value of this parameter for any other
server except the E9000 is DES. The default value of this parameter for the E9000 is AES.
l The values of Authentication password and Data encryption password are the target user
password changed in Step 5.2.
Procedure
Step 1 In the navigation tree, choose Configuration > Service.
The Service page is displayed.
Step 2 Determine whether to enable SNMPv1 or SNMPv2c.
l
If yes, go to Step 3.
l
If no, go to Step 5.
Step 3 Enable SNMPv1 or SNMPv2c.
1.
Select the check box next to the target SNMP version in the SNMP Service area.
2.
Click OK.
The message "Operation performed successfully." is displayed.
Step 4 Modify SNMPv1 or SNMPv2c parameters.
1.
Set SNMP community names in the SNMP Community area.
a.
Issue 01 (2016-04-30)
Enter the name of the SNMP community that has read-only permission in the Readonly community name text box.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
59
eSight
Operation Guide
3 Discovering Devices
b.
Enter the name of the SNMP community that has read and write permission in the
Read/Write community name text box.
c.
Click OK.
The message "Operation performed successfully." is displayed.
2.
Change the SNMP port number.
a.
In the Services Configuration area, select the check box next to the SNMP Agent
service to enable the SNMP service.
b.
Enter the SNMP port number in the Port text box.
NOTE
A server provides port 161 for the SNMP service by default. You can select the Default check
box to use the default SNMP port number.
c.
Click OK.
The message "Operation performed successfully." is displayed.
Step 5 Modify SNMPv3 parameters.
1.
Change the SNMP port number.
a.
In the Services Configuration area, select the check box next to the SNMP Agent
service to enable the SNMP service.
b.
Enter the SNMP port number in the Port text box.
NOTE
A server provides port 161 for the SNMP service by default. You can select the Default check
box to use the default SNMP port number.
c.
Click OK.
The message "Operation performed successfully." is displayed.
2.
On the Local User page, modify user parameters.
a.
In the navigation tree, choose Configuration > User.
b.
Click Local User on the right.
The Local User page is displayed.
c.
In the user list, select the user to be modified and click .
d.
On the Modify User Information page, modify basic information about the user.
e.
n
Enter your password in the Current User Password text box.
n
Enter the name of the target user in the User Name text box.
n
Select the check box next to Change Password, and enter the new password
for the target user in the New Password text box.
n
Enter the new password for the target user again in the Confirm Password
text box.
Click OK.
The Local User page is displayed, and user information is modified successfully.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
60
eSight
Operation Guide
3 Discovering Devices
3.4.3.2 Setting IPMI Parameters
Intelligent Platform Management Interface (IPMI) parameters ensure that servers can properly
communicate with the eSight. You need to set IPMI parameters for rack servers, third-party
servers, high-density servers, and storage servers.
Prerequisites
You have logged in to the iMana 200 web user interface (WebUI) on the target server. For
details, see the xxxxx Server iMana User Guide released with the server.
NOTE
xxxxx indicates a server model.
Context
The IPMI parameters Username and Password are required for the eSight to access a server.
You can set the IPMI parameters based on site requirements.
Procedure
Step 1 Open the Local User page.
1.
In the navigation tree, choose Configuration > User.
2.
Click Local User on the right.
The Local User page is displayed.
Step 2 Modify user parameters.
1.
In the user list, select the user to be modified and click .
2.
In the Modify User Information dialog box, modify basic information about the user.
3.
–
Enter your password in the Current User Password text box.
–
Enter the name of the target user in the User Name text box.
–
Select the check box next to Change Password, and enter the new password for the
target user in the New Password text box.
–
Enter the new password for the target user again in the Confirm Password text
box.
Click OK.
The Local User page is displayed, and user information is modified successfully.
----End
3.5 Creating a Default Subnet
Except the IP phones, CC applications, UC applications and IVS applications, other devices
and applications can be managed in the general subnet.
Prerequisites
You have the resource operation rights.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
61
eSight
Operation Guide
3 Discovering Devices
Context
l
You can create lower-level subnets in a subnet.
l
You can move devices to a newly created subnet by referring to 3.12 Adjusting
Resources.
l
It is recommended that a subnet consist of a maximum of 10 layers to prevent
performance problems.
l
It is recommended that a subnet contain a maximum of 500 devices.
Procedure
Step 1 Choose Resource > Add Resource > Add Subnet from the main menu.
Step 2 Set Subnet name and Description, chooseParent object, on the Default Subnet page.
Step 3 Click OK.
NOTE
If the subnet is created successfully, it is displayed in the Subnet list.
----End
Follow-up Procedure
Once a subnet is created, you can modify its information or delete it from the eSight.
Choose Resource > Resources Group > Subnet from the main menu. The Subnet page is
displayed.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
62
eSight
Operation Guide
3 Discovering Devices
Task
Procedure
View subnet
information
On the eSight, you can view subnet information.
1. In the Subnet page, set search criteria and click
.
2. Click the name of the subnet. The eSight displays all information
about the subnet.
Modify subnet
information
On the eSight, you can modify the attributes of a subnet, such as the
subnet name.
1. In the managed object list on the right of the Subnet page, click
the Operation column where the target subnet is located.
in
2. On the page for modifying subnet information, modify the
configuration parameters of the subnet.
3. Then click OK.
Delete a
subnet
You can delete the subnets that will not be managed by the eSight.
1. In the managed object list on the right of the Subnet page, delete
subnets.
To delete a subnet, click
subnet is located.
in the Operation column where the
NOTE
If there are devices or subnets under a subnet, you cannot delete the subnet.
2. In the Confirm dialog box, click Yes.
3.6 Configuring Protocol Template on eSight
Before automatically discovering devices set protocol template on eSight.
3.6.1 Creating an SNMP Protocol Template
eSight can communicate with NEs over SNMP. You can configure frequently used SNMP
parameters as a template so that you can use a predefined parameter template for subsequently
connected devices. This improves the efficiency.
Context
eSight offers the following default SNMP templates:
l
SNMPv1: DefaultSNMPV1
l
SNMPv2c: DefaultSNMPV2c
l
SNMPv3: DefaultSNMPV3
Default SNMP templates cannot be modified or deleted.
NOTE
For default SNMPv1 and SNMPv2c templates, the read community name is public and the write community
name is private.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
63
eSight
Operation Guide
3 Discovering Devices
NOTICE
SNMPv1 and SNMPv2c have security risks; therefore, SNMPv3 is recommended for device
discovery.
You are not advised to use the default SNMPv3 protocol template where authentication and
proprietary protocols are None. Create an SNMP protocol template where authentication and
proprietary protocols are enabled, and ensure that authentication and proprietary passwords be
a string of at least 8 characters, containing at least one uppercase letter, one lowercase letter,
and one digit.
Procedure
Step 1 Choose Resource > Add Resource > Protocol Template from the main menu.
Step 2 Click Create.
Step 3 Click Add on the SNMP Protocol Template page.
Step 4 Set parameters as planned and click OK.
If you need to configure parameters depending on the SNMP version, configure Template
name and Template name first, and then others.
Table 3-8 Parameter description
Para
meter
Issue 01 (2016-04-30)
SNMP
version
Description
S
N
M
Pv
1
SN
MP
v2c
SN
MP
v3
Param
eter
type
Y
Y
Y
SNMP protocol version. The optional values are SNMPv1,
SNMPv2c, and SNMPv3. Select SNMPv3 if the network has
higher security requirements.
Read
comm
unity
Y
Y
N
Read community name that is used by eSight to send a GET
request to an NE. The GET operation is allowed only when the
read community name is acknowledged by the NE.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
64
eSight
Operation Guide
3 Discovering Devices
Para
meter
SNMP
version
Description
S
N
M
Pv
1
SN
MP
v2c
SN
MP
v3
Write
comm
unity
Y
Y
N
Write community name that is used by eSight to send a SET
request to an NE. The SET operation is allowed only when the
write community name is acknowledged by the NE.
Port
(1-655
35)
Y
Y
Y
SNMP port on the NE.
Timeo
ut
period
(1-60s
)
Y
Y
Y
Maximum duration from the time when eSight sends a request
to an NE to the time when the NE responds.
Retrie
s
(1-20)
Y
Y
Y
Maximum number of times for eSight to resend a SET request
to an NE. When an NE does not respond after eSight has
resent a SET request for the maximum number of times, eSight
fails to send the request to this NE.
User
name
N
N
Y
User name used to log in to the NE.
Conte
xt
N
N
Y
Context engine name.
Engin
e ID
N
By default, this parameter is left blank. If you want to enter a
value for this parameter, ensure that the value is the same as
that on the NE.
N
Y
Context engine ID, which uniquely identifies an SNMP entity
in a management domain. In addition to controlling access to
managed objects, this engine ID is also used to schedule,
process, and authenticate SNMP messages. You can run the
display snmp-agent local-engineid command to view the
context engine ID on an NE.
NOTE
By default, an NE automatically generates a context engine ID using
its internal algorithm. The context engine ID contains the enterprise ID
and device information.
Authe
nticati
on
passw
ord
Issue 01 (2016-04-30)
N
N
Y
Set the authentication password if HMAC_MD5 or
HMAC_SHA is selected.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
65
eSight
Operation Guide
3 Discovering Devices
Para
meter
Encry
ption
passw
ord
SNMP
version
Description
S
N
M
Pv
1
SN
MP
v2c
SN
MP
v3
N
N
Y
Set the encryption password if CBC_DES or AES_128 is
selected.
----End
Follow-up Procedure
After a template is created, you can select a predefined SNMP template on the Auto
Discovery page for configuring it. For details, see Automatic Discovery.
3.6.2 Creating a Telnet Protocol Template
Before adding devices (also called NEs) to the eSight, you need to configure the protocol
parameters on the eSight. You can use a Telnet protocol template to add devices to improve
efficiency.
Procedure
Step 1 Choose Resource > Add Resource > Protocol Template from the main menu.
Step 2 Choose Protocol Template > Telnet Template Resources from the navigation tree on the
left.
Step 3 Click Create.
Step 4 Set parameters as planned to create the template.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
66
eSight
Operation Guide
3 Discovering Devices
Table 3-9 Telnet Parameter Description
Parameter
Description
Protocol type
Protocol type: The value can be Telnet or STelnet. STelnet is used in
scenarios demanding high security.
Authentication
mode
Authentication mode: authentication mode used by eSight to access
network elements.
Port
Communication port. By default, the Telnet port number is 23 and the
STelnet port number is 22.
Timeout
interval(s)
Period for waiting for a response after eSight sends a request to a
network element.
Privilege model
Privilege model: right for eSight to deliver commands to network
elements. When you select Privilege model and log in to a network
element using Telnet or STelnet, eSight switches to the corresponding
privilege model.
Privilege level
A larger value indicates a higher priority. Users can use only the
commands at the same or lower level than their own levels.
----End
Follow-up Procedure
You can perform the following operations on the Protocol Template page.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
67
eSight
Operation Guide
3 Discovering Devices
Maintaining the Protocol
Template
Procedure
Viewing a protocol template
Click
Deleting a protocol template
Click a protocol template and click Delete.
Copying a protocol template
Modifying a protocol template
.
Click a protocol template to be copied and click
Click
.
.
NOTE
After parameters in a template are modified, parameters on
devices related to the template are also modified. If you do not
want parameters on these devices to be modified
synchronously, cancel the relationship between the template
and devices before modifying the template.
Viewing devices related to a
template
After parameters in a template are modified, parameters
on devices related to the template are also modified.
1. Click the link in the related devices column.
2. View the list of devices related to the template on
the page that is displayed.
3. Optional: Click to cancel the relationship
between the template and a device.
3.7 Auto Discovery for Devices
This function is used to add all devices in a network segment to eSight in batches, which
improves work efficiency.
Prerequisites
l
You have the operation rights for Access Resource.
l
To ensure that eSight can automatically discover devices, you must set the
communication protocol parameters on those devices by referring to 3.4 Configuring
Protocol Parameters on Devices.
l
Before you start an automatic discovery task, check the Exclusion List so that all
devices that need to be discovered are automatically discovered. If a network segment or
IP address is set to an excluded network segment or IP address, it is skipped during auto
discovery. Specifically, choose Resource > Add Resource > Automatic Task
Management from the main menu. On the Exclusion List tab page, check the excluded
network segments or IP addresses.
Context
The auto discovery task that is being executed each time is displayed in the Task List of the
Automatic Task Management page. If you want to execute the task again, see Starting a
task in 3.8 Managing Discovery Tasks.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
68
eSight
Operation Guide
3 Discovering Devices
Procedure
Step 1 Before you start an automatic discovery task, check the Exclusion List. Choose Resource >
Add Resource > Auto Discovery from the main menu.
Step 2 Select an auto discovery mode.
NOTE
l The eSight provides four auto discovery modes: Network segment Discovery (simple), Network
segment Discovery (advanced), By ARP, and By route.
l You can click the button on the upper right corner to switch the auto discovery mode.
By default, the simple mode is provided, and the button name on the Auto Discovery page is Switch
to Another Mode. Click Switch to Another Mode to switch to the Select auto discovery mode
page. Select an auto discovery mode based on actual conditions.
Step 3 Set parameters of auto discovery tasks.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
69
eSight
Operation Guide
3 Discovering Devices
Auto Discovery Mode
Operation Method
By
network
segment:
discoveri
ng all
devices
in a
network
segment
On the Network segment Discovery (simple) page:
Simple mode
1. Expand Base Settings and set network segment
parameters.
a. Set IP Address Ranges Settings on the Base Settings
panel.
a. Set Start IP address and End IP address.
b. Click
. In the Select a subnet dialog box,
select a subnet.
next to a subnet to delete the
You can click
subnet.
c. Optional: Repeat the preceding steps to discover
devices in multiple network segment.
2. Expand Task Settings panel and set related parameters
for the auto discovery task.
a. In the Task Name text box, enter the name of the task.
You are advised to set the name to the current date and
time. For example, if the task is executed at 10: 00 in
the morning of June 26, 2013, set the task name to
201306261000.
b. Select the task type from the Type drop-down list box.
If you select Once, you must set Description.
If you select By hour, you must enter a value in the
Frequency text box, set Start time and Description,
and select the Instant execution.
If you select By day, By week, or By month, set
Start time for the auto discovery task, and select the
Instant execution.
3. Set SNMP protocol template.
a. On the SNMP protocol panel, click Select SNMP
Protocol Template.
b. In the Select Protocol Template dialog box, select a
saved SNMP template.
If no SNMP template is available, click Add
(Prerequisite: You have the operation rights for
Configure Protocol Template), and set an SNMP
template in the displayed dialog box.
NOTE
If Automatically match template is selected, existing SNMP
protocol templates are automatically matched during device
discovery.
4. Optional: Select Add the discovered objects
automatically to the NMS, the discovered devices are
automatically added.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
70
eSight
Operation Guide
3 Discovering Devices
Auto Discovery Mode
Operation Method
If Add the discovered objects automatically to the
NMS is not selected, you can select the discovered
devices to add after the auto discovery is complete.
5. Click Discovery.
During the discovery, you can click Stop Discovery on
the discovery task page to stop the auto discovery.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
71
eSight
Operation Guide
3 Discovering Devices
Auto Discovery Mode
Advanced
mode
Operation Method
On the Network segment Discovery (advanced) page:
1. Expand Base Settings and set network segment
parameters.
a. Set IP Address Ranges Settings on the Base Settings
panel.
a. Set Start IP address and End IP address.
b. Click
. In the Select a subnet dialog box,
select a subnet.
next to a subnet to delete the
You can click
subnet.
c. Optional: Repeat the preceding steps to discover
devices in multiple network segment.
2. Expand Advanced Settings and set parameters.
a. In the Maximum devices text box, set the maximum
number of devices that are automatically discovered.
b. Optional: In the Notify by email text box, enter the
email addresses of users to be notified of the auto
discovery task result.
3. Expand Task Settings panel and set related parameters
for the auto discovery task.
a. In the Task Name text box, enter the name of the task.
You are advised to set the name to the current date and
time. For example, if the task is executed at 10: 00 in
the morning of June 26, 2013, set the task name to
201306261000.
b. Select the task type from the Type drop-down list box.
If you select Once, you must set Description.
If you select By hour, you must enter a value in the
Frequency text box, set Start time and Description,
and select the Instant execution.
If you select By day, By week, or By month, set
Start time for the auto discovery task, and select the
Instant execution.
4. Expand Protocol Settings, select a protocol type and set
the protocol parameters.
NOTE
For details about the protocol type used in device discovery, see
3.3 Methods and Protocols Used for Discovering Devices.
5. Optional: Select Add the discovered objects
automatically to the NMS, the discovered devices are
automatically added.
If Add the discovered objects automatically to the
NMS is not selected, you can select the discovered
devices to add after the auto discovery is complete.
6. Click Discovery.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
72
eSight
Operation Guide
3 Discovering Devices
Auto Discovery Mode
Operation Method
During the discovery, you can click Stop Discovery on
the discovery task page to stop the auto discovery.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
73
eSight
Operation Guide
3 Discovering Devices
Auto Discovery Mode
Operation Method
By ARP: discovering all
devices directly or
indirectly connected to a
specified IP address (Seed
IP) based on the ARP table
of the Seed IP
Perform operations on the By ARP page.
1. Expand Base Settings and set basic parameters.
a. Select the number of hops from the Number of hops
drop-down list box.
NOTE
n
The eSight discovers devices hop by hop based on the
settings. The maximum value of Number of hops is 7. If
the value is set to 2, the eSight discovers level 1 devices
connected to the specified Seed IP, and then level 2
devices. The eSight stops auto discovery when all level 2
devices are discovered.
n
When the number of hops is large, the auto discovery
process consumes long time and high bandwidth, which
affects network performance.
b. Set Seed IP address.
NOTE
It is recommended that you set Seed IP address as the IP
address of a gateway or a layer 3 device (such as a router) to
discover more devices.
To set multiple seed IP addresses, click Add Other
Seed IP Addresses.
next to the target seed IP address to delete
Click
the seed IP address.
c. Click
a subnet.
. In the Select a subnet dialog box, select
2. Expand Advanced Settings and set parameters.
a. In the Maximum devices text box, set the maximum
number of devices that are automatically discovered.
b. Optional: In the Notify by email text box, enter the
email addresses of users to be notified of the auto
discovery task result.
3. Expand Task Settings panel and set related parameters
for the auto discovery task.
a. In the Task Name text box, enter the name of the task.
You are advised to set the name to the current date and
time. For example, if the task is executed at 10: 00 in
the morning of June 26, 2013, set the task name to
201306261000.
b. Select the task type from the Type drop-down list box.
If you select Once, you must set Description.
If you select By hour, you must enter a value in the
Frequency text box, set Start time and Description,
and select the Instant execution.
If you select By day, By week, or By month, set
Start time for the auto discovery task, and select the
Instant execution.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
74
eSight
Operation Guide
3 Discovering Devices
Auto Discovery Mode
Operation Method
4. Set SNMP protocol template.
a. On the SNMP protocol panel, click Select SNMP
Protocol Template.
b. In the Select Protocol Template dialog box, select a
saved SNMP template.
If no SNMP template is available, click Add
(Prerequisite: You have the operation rights for
Configure Protocol Template), and set an SNMP
template in the displayed dialog box.
NOTE
If Automatically match template is selected, existing SNMP
protocol templates are automatically matched during device
discovery.
5. Optional: Select Add the discovered objects
automatically to the NMS, the discovered devices are
automatically added.
If Add the discovered objects automatically to the
NMS is not selected, you can select the discovered
devices to add after the auto discovery is complete.
6. Click Discovery.
During the discovery, you can click Stop Discovery on
the discovery task page to stop the auto discovery.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
75
eSight
Operation Guide
3 Discovering Devices
Auto Discovery Mode
Operation Method
By route: discovering all
devices directly or
indirectly connected to a
specified IP address (Seed
IP) based on the route
table of the Seed IP
Perform operations on the By route page.
1. Expand Base Settings and set basic parameters.
a. Select the number of hops from the Number of hops
drop-down list box.
NOTE
n
The eSight discovers devices hop by hop based on the
settings. The maximum value of Number of hops is 7. If
the value is set to 2, the eSight discovers level 1 devices
connected to the specified Seed IP, and then level 2
devices. The eSight stops auto discovery when all level 2
devices are discovered.
n
When the number of hops is large, the auto discovery
process consumes long time and high bandwidth, which
affects network performance.
b. Set Seed IP address.
NOTE
It is recommended that you set Seed IP address as the IP
address of a gateway or a layer 3 device (such as a router) to
discover more devices.
To set multiple seed IP addresses, click Add Other
Seed IP Addresses.
next to the target seed IP address to delete
Click
the seed IP address.
c. Click
a subnet.
. In the Select a subnet dialog box, select
2. Expand Advanced Settings and set parameters.
a. In the Maximum devices text box, set the maximum
number of devices that are automatically discovered.
b. Optional: In the Notify by email text box, enter the
email addresses of users to be notified of the auto
discovery task result.
3. Expand Task Settings panel and set related parameters
for the auto discovery task.
a. In the Task Name text box, enter the name of the task.
You are advised to set the name to the current date and
time. For example, if the task is executed at 10: 00 in
the morning of June 26, 2013, set the task name to
201306261000.
b. Select the task type from the Type drop-down list box.
If you select Once, you must set Description.
If you select By hour, you must enter a value in the
Frequency text box, set Start time and Description,
and select the Instant execution.
If you select By day, By week, or By month, set
Start time for the auto discovery task, and select the
Instant execution.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
76
eSight
Operation Guide
3 Discovering Devices
Auto Discovery Mode
Operation Method
4. Set SNMP protocol template.
a. On the SNMP protocol panel, click Select SNMP
Protocol Template.
b. In the Select Protocol Template dialog box, select a
saved SNMP template.
If no SNMP template is available, click Add
(Prerequisite: You have the operation rights for
Configure Protocol Template), and set an SNMP
template in the displayed dialog box.
NOTE
If Automatically match template is selected, existing SNMP
protocol templates are automatically matched during device
discovery.
5. Optional: Select Add the discovered objects
automatically to the NMS, the discovered devices are
automatically added.
If Add the discovered objects automatically to the
NMS is not selected, you can select the discovered
devices to add after the auto discovery is complete.
6. Click Discovery.
During the discovery, you can click Stop Discovery on
the discovery task page to stop the auto discovery.
Step 4 Optional: Add a device to the eSight.
l
Add all discovered devices to the eSight.
Click Add All Discovered Devices to NMS to add all discovered devices to theeSight.
l
Add selected devices to the eSight.
a.
Select devices in the discovered device list.
Select a device type from the Filter by device type drop-down list box to add the
same type of devices.
b.
Click Add Selected Device to NMS.
Step 5 Optional: The Result column displays the progress.
After the task of adding devices is complete, the numbers of devices that are added
successfully or fail to be added are displayed. Click Successful or Failed to view details.
----End
3.8 Managing Discovery Tasks
The eSight can discover devices in a specified network segment or with specified IP addresses
through tasks. Managing discovery tasks properly helps increase efficiency and accuracy of
discovering devices. For example, if an excluded network segment or IP address is set, the
devices in the network segment or with the IP address are automatically skipped when devices
are automatically discovered.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
77
eSight
Operation Guide
3 Discovering Devices
Prerequisites
You have the operation rights for Access Resource.
Procedure
Step 1 Choose Resource > Add Resource > Automatic Task Management from the main menu.
Step 2 Perform operations on the Exclusion List, Task List, and Discovered Device List tab pages
as described in the table.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
78
eSight
Operation Guide
3 Discovering Devices
Tab Page
Description
Operation
Exclusion
List
Indicates the
network segments
or IP addresses that
are skipped during
device
automatically
discovery. After a
network segment or
IP address is set to
an excluded one,
subsequent
automatic
discovery tasks will
skip the network
segment or IP
address.
1. Click Add.
2. In the Add to Exclusion List dialog box, set the
network segments or IP addresses that are skipped
during device automatically discovery.
– Adding excluded network segments
Set Start IP Address, End IP Address, and
Description.
– Adding excluded IP addresses
Set Start IP Address and Description.
3. Click OK.
Follow-up Procedure
If you want to discover a network segment or IP
address, delete it from the exclusion list.
l Deleting all excluded network segments or IP
addresses: If you want to discover all networkwide devices, delete all excluded network
segments or IP addresses on each page.
Select the check box in the first column of the
exclusion list header on the current page and click
Delete.
l Deleting one or more excluded network segments
or IP addresses that are selected: If you want to
discover some network segments or IP addresses,
delete the network segments or IP addresses from
the exclusion list.
Select the check box in front of the desired
network segments or IP addresses and click
Delete.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
79
eSight
Operation Guide
3 Discovering Devices
Tab Page
Description
Operation
Task List
Manages automatic
discovery tasks that
are executed
periodically or nonperiodically. For
example, restart
automatic
discovery tasks.
l Starting a task
After devices are automatically discovered, you
can start the automatic discovery tasks again if
necessary.
Click the option button in front of a task name and
click Start.
NOTE
Before you start an automatic discovery task, check the
Exclusion List so that all devices that need to be
discovered are automatically discovered.
l Creating a task
You can create an automatic discovery task if the
current task list does not have one that meet
requirements.
Click Create. On the Automatic Discovery page,
create an automatic discovery task. For operation
details, see 3.7 Auto Discovery for Devices.
Follow-up Procedure
l Modifying a task
If you want to modify parameters of a task, you
can modify the task.
Click the option button in front of a task name and
click Modify. Modify parameters on the page for
setting automatic discovery tasks.
l Deleting a task
If you do not need an automatic discovery task if
it is complete, you can delete the task.
Click the option button in front of a task name and
click Delete.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
80
eSight
Operation Guide
3 Discovering Devices
Tab Page
Description
Operation
Discovery
Result List
Displays devices
that are discovered
after automatic
discovery tasks are
complete. You can
add devices to the
eSight.
Adding devices to the eSight
l Add all discovered devices to the eSight.
If all discovered devices need to be added to the
eSight, you can add them at a time.
Click Add All to add all discovered devices in the
discovery result list to the eSight.
l Adding selected devices to the eSight
If you want to add some devices to the eSight,
you can select some devices in the discovery
result list and add them to the eSight.
Select the check box in front of the desire devices
and click Add Selected.
Adding IP addresses to the excluding list
If you do not want to discover devices with a
specified IP address, you can add the IP address to
the exclusion list.
1. Select desired devices and click Add IP
Addresses to Exclusion List.
If you want to add the IP addresses of all
discovered devices to the exclusion list, select the
check box in the first column of the discovery
result list header.
If you want to add IP addresses of one or more
discovered devices to the exclusion list, select the
check boxes in front of the devices.
2. In the Confirm dialog box, click Yes.
3. In the Information dialog box, click OK.
----End
3.9 Adding Devices in Batches
When a large number of devices need to be added to the eSight, you can collect the device
data, record the data into a template file, and then import the file to the eSight to add the
devices in batches. This helps improve your work efficiency.
3.9.1 Adding Network Devices in Batches
You can import devices from an existing device list, which contains basic device information,
including the device IP address and protocol parameters such as the protocol type and version.
Prerequisites
l
eSight and devices can ping each other successfully.
l
You have the permission to perform the Access Resource operation.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
81
eSight
Operation Guide
3 Discovering Devices
l
Devices support SNMP, and the SNMP parameters have been correctly set on devices.
For details, see 3.4.1.1 Setting SNMP Parameters on Devices.
l
The SNMP parameter settings in eSight are the same as those on devices.
Background
When importing devices, note the following:
l
Use the template provided by eSight, and do not perform any modifications on the
template structure when entering data; otherwise, devices cannot be imported.
l
A maximum of 500 devices can be imported in a batch.
Manually importing NEs is to add NEs by importing the .xls template. Table 3-10 describes
every fields in Excel template.
Table 3-10 Excel template
SNMP version
Field name
Description
v2c
Read Community
This parameter must be the same as the read
community of the SNMP protocol, for example,
public.
Write Community
This parameter must be the same as the write
community of the SNMP protocol, for example,
private.
Security name
NE user name used for accessing the NE.
Authentication
protocol
A protocol used for message verification. You
can choose the HMACMD5 or HMACSHA
protocol or do not use any protocol. When you
use the HMACMD5 or HMACSHA protocol,
you must set an authentication password.
Privacy protocol
Encryption protocol used for data
encapsulation. You can choose the DES or AES
encryption protocol or do not use encryption.
When you use the DES or AES encryption
protocol, you must set an encryption password.
Port
This parameter must be the same as the port
number of the SNMP protocol, for example,
161.
v3
v2c/V3
NOTE
The SNMPv3 is recommended to enable higher security.
Procedure
Step 1 Choose Resource > Add Resource > Import Resource from the main menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
82
eSight
Operation Guide
3 Discovering Devices
Step 2 Click
and download the .xls template to the local computer.
Step 3 Open the template, fill in device information, and save the template.
Step 4 On the Import Device page, click
Excel file.
next to Upload Resource File and select the saved
Step 5 Click
to upload a file.
Device information and device check results are displayed on the right of the page. If Result
is empty, device check succeeds.
Step 6 Select a device and click Create.
The system starts to import the devices.
l
If the device is created successfully, the Result column is The resource is created
successfully.
l
If the device cannot be created, the reason for the failure is displayed in the Result
column. You can attempt to solve the problem and import devices again based on the
failure reason. If the fault persists, contact the technical support personnel.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
83
eSight
Operation Guide
3 Discovering Devices
----End
Follow-up Procedure
After devices are added to eSight, you can view loaded data using the physical resource
management function. For details, see 9.1.3 Physical Resource Management.
3.9.2 Adding Storage Devices in Batches
To add a batch of such devices to the eSight, you can enter the device information in an Excel
template and import the template to eSight. Then, the eSight adds the devices to the matching
subnets automatically.
Prerequisites
You have collected the device data.
Context
NOTICE
The batch import may take several minutes.
You need to configure jdk security parameters if you enable SSL for the first time. Run the
following command to configure the jdk security parameter. After the configuration, restart
the eSight process for the settings to take effect.
Windows: eSight installation directory/AppBase/tools/MD5Config/
it_common_MD5config.bat
The following command can automatically disable MD5.
Windows: eSight installation directory/AppBase/tools/MD5Config/
it_common_MD5revert.bat
Use the template provided by eSight, and do not perform any modifications on the template
structure when entering data; otherwise, devices cannot be imported.
Procedure
Step 1 On the menu bar, choose Resource > Add Resource > Import Resource.
Step 2 In the function pane, select Storage Device.
Step 3 In the Download template area, click the Excel file template.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
84
eSight
Operation Guide
3 Discovering Devices
The File Download dialog box is displayed.
Step 4 Click Save to save the Excel file template locally.
Step 5 In the configuration file template, enter discovery information about storage devices that need
to be batch imported and save the entered information as a configuration file.
NOTE
l Carefully read requirements and restrictions on the Instructions tab of the template and fill in the
contents based on the requirements in the template.
l The Type and Manufacturer content validity are not checked, the background configure the device
information from the configuration information when obtaining access device.
Step 6 On the import device page, click
next to Upload File and select the saved Excel file.
Step 7 Click Upload to upload the Excel file.
After the configuration file is uploaded, the information about storage devices that need to be
batch imported is displayed.
NOTE
If an entry of information is incorrectly entered, this entry is dimmed, and the error information is
displayed.
Step 8 Select the devices and click Create.
The system starts to import the devices.
l
If the device is created successfully, the Result column is the resource is created
successfully.
l
If some storage devices fail to be discovered, modify the information about those devices
and import and discover them again.
----End
3.9.3 Adding Server Information in Batches
You can import a configuration file for rapid deployment to create servers in batches,
improving operation efficiency.
Context
If you have no configuration file for import resource, click eSight Server Import Template
cn.xls to download the configuration template, and fill in the template by following the
instructions in the template.
Procedure
Step 1 On the menu bar, choose Resource > Add Resource > Import Resource.
The Import Resource page is displayed.
Step 2 In the Import Resource page, choose Server.
Step 3 Click
, select the file to be imported, and click Open.
Step 4 Click Upload.
A success message is displayed.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
85
eSight
Operation Guide
3 Discovering Devices
Step 5 Click OK.
Step 6 Click Finish.
----End
3.10 Adding a Single Device
You can manually add a small number of devices to the eSight if you have obtained the device
Internet Protocol (IP) address and protocol information.
3.10.1 Adding a Single Network Device
If you want a few different types of NEs to access the eSight, you can create these NEs one by
one.
Prerequisites
l
eSight and NEs can ping each other.
l
You have the permission to perform the Access Resource operation.
l
SNMP and Telnet (optional) parameters have been obtained to discover NEs based on
SNMP. ICMP parameters have been obtained to discover NEs based on ICMP.
l
When NEs are added to eSight by domain name, data on the DNS server is not
synchronized to eSight in real time. To ensure that the domain names on eSight are the
same as those on the DNS server, before adding NEs to eSight, perform the following
operations on the server on which eSight is installed.
–
When the server runs the Windows operating system:
i.
Choose Start > Run.
ii.
Enter cmd in the Run dialog box.
iii. Enter ipconfig/flushdns in the window that is displayed, and press Enter.
If Successfully flushed the DNS Resolver Cache. is displayed, data on the
DNS server is synchronized to eSight.
–
When the server runs the SUSE Linux operating system:
i.
Right-click on the desktop and select Open in Terminal.
ii.
Enter the following command in the Terminal dialog box.
# service nscd restart
Then press Enter.
If Starting Name Service Cache Daemon done is displayed, data on the DNS
server is synchronized to eSight.
If the configuration does not take effect, check the settings in /etc/nscd.conf.
Take nscd (GUN libc) 2.11.1 as an example. Check whether persistent services
in the /etc/nscd.conf file is set to no. If not, change the value to no.
Context
The Internet Control Message Protocol (ICMP) is a core protocol of the TCP/IP family, used
to deliver control messages between IP hosts and routers. Control messages refer to messages
indicating whether the network is connected, the host is reachable, or the rout is available.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
86
eSight
Operation Guide
3 Discovering Devices
Control messages do not transmit user data, but plays a significant role in data transmission.
ICMP NEs are classified into the following types: NEs that support the ICMP protocol (IP
address of an NE can be pinged) but not the SNMP protocol. NEs that support the ICMP
protocol, but the SNMP service is not enabled.
You can add an NE by IP address or domain name.
Procedure
l
Add an NE based on SNMP.
a.
Choose Resource > Add Resource > Add Resource from the main menu.
b.
On the current page, choose Network device and set the related parameters.
Protocol
Parameter
Description
SNMP
Edit SNMP
parameters
Manually set SNMP parameters to add the NEs.
Automatch
template
After this parameter is selected, eSight
automatically search Protocol Template Library
for parameter templates that match the NEs that
are being added to eSight.
Select
template
Select Telnet parameters that match NEs in
Protocol Template Library.
NOTE
Three
SNMP
versions
are
available:
SNMPv1,
SNMPv2c
, and
SNMPv3.
SNMPv1
and
SNMPv2c
have
security
risks;
therefore,
SNMPv3
is
recommen
ded for
device
discovery.
Telnet
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
87
eSight
Operation Guide
3 Discovering Devices
Protocol
c.
Parameter
Description
Edit Telnet
parameters
If you do not want to create a protocol template,
select this parameter and manually set Telnet
parameters to add the NEs.
Click OK.
NOTE
Click Apply to create more NEs.
l
n
If the NE is created successfully, the NE is displayed in the list.
n
If the NE cannot be created, the Error dialog box is displayed, indicating the
reason for the failure. Click OK to set the parameters again.
Add an NE based on ICMP.
NOTE
When the only management requirement is that the NEs remain online, this method is suitable.
Issue 01 (2016-04-30)
a.
Choose Resource > Add Resource > Add Resource from the main menu.
b.
On the current page, choose Network Device and then select ICMP.
c.
Configure the basic information and ICMP information.
n
Time-out period(s): Period for waiting for a response to a request that eSight
sends to an NE.
n
Retry times: Maximum number of times that eSight sends an operation
request to an NE when timeout occurs. After the maximum retry times, the
operation fails.
n
Device location: This parameter helps you to quickly learn about the device
location.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
88
eSight
Operation Guide
3 Discovering Devices
n
d.
Web NMS access: This parameter helps you to access the web NMS of an NE
after the NE is added to eSight.
Click OK.
NOTE
Click Apply to create more NEs.
e.
n
If the NE is created successfully, the NE is displayed in the list.
n
If the NE cannot be created, the Error dialog box is displayed, indicating the
reason for the failure. Click OK to set the parameters again.
Optional: Access the NMS in web mode.
i.
On the device resource page, click the target NE.
ii.
On the NE manager page, click the link next to Web Net Manage.
iii. Enter the user name and password.
----End
Related Operations
If an NE fails to be added, see How Do I Remove the Failure in Adding NEs in the FAQ.
3.10.2 Adding a Single Storage Device
You can manually add a small number of storage devices to the eSight if you have obtained
the storage device Internet Protocol (IP) address and protocol information.
3.10.2.1 About Protocol
Before connecting to the devices, you need to learn about the protocol.
Issue 01 (2016-04-30)
Protocol
Description
SSL
Secure Socket Layer, a security protocol that works at a socket level. This
layer exists between the TCP layer and the application layer to encrypt/
decode data and authenticate concerned entities.
SMI-S
SMI-S, or the Storage Management Initiative – Specification, is a storage
standard developed and maintained by the Storage Networking Industry
Association (SNIA).
SNMP
A network management protocol of TCP/IP. It enables remote users to view
and modify the management information of a network element. This
protocol ensures the transmission of management information between any
two points. The polling mechanism is adopted to provide basic function
sets. According to SNMP, agents, which can be hardware as well as
software, can monitor the activities of various devices on the network and
report these activities to the network console workstation. Control
information about each device is maintained by a management information
block.
Telnet
A standard terminal emulation protocol in the TCP/IP protocol stack. Telnet
allows users to log in to remote systems and use resources as if they were
connected to a local system. Telnet is defined in RFC 854.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
89
eSight
Operation Guide
3 Discovering Devices
Protocol
Description
TLV
An encoding type that features high efficiency and expansibility. It is also
called Code-Length-Value (CLV).
l T indicates that different types can be defined through different values.
l L indicates the total length of the value field.
l V indicates the actual data of the TLV and is most important.
TLV encoding features high expansibility. New TLVs can be added to
support new features, which is flexible in describing information loaded in
packets.
REST
Representational State Transfer (REST) is a style of software architecture
for distributed systems such as the World Wide Web. REST has emerged as
a predominant Web service design model. REST facilitates the transaction
between web servers by allowing loose coupling between different services.
3.10.2.2 Adding a Single Unified Storage Device
If you want a few unified storage devices to access the eSight, you can add unified storage
devices one by one.
Prerequisites
You have obtain the IP address, username and password of the device.
Context
NOTICE
The storage arrays use the MD5 to encrypt device users' passwords. There is a possibility that
device users' passwords are cracked and leaked.
You need to configure jdk security parameters if you enable SSL for the first time. Run the
following command to configure the jdk security parameter. After the configuration, restart
the eSight process for the settings to take effect.
Windows: eSight installation directory/AppBase/tools/MD5Config/
it_common_MD5config.bat
The following command can automatically disable MD5.
Windows: eSight installation directory/AppBase/tools/MD5Config/
it_common_MD5revert.bat
Before connecting to the devices, you need to learn about the specific device names, and
methods of adding the unified storage devices to eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
90
eSight
Operation Guide
Issue 01 (2016-04-30)
3 Discovering Devices
Device
Name
Can Be Automatically Discovered? (Y/N)
Can Be
Added
in
Batche
s?
(Y/N)
Can Be
Added
One by
One?
(Y/N)
SNMP
Protoco
l
SMI-S
Protoco
l
TLV
Protoco
l
REST
Protoco
l
SNMP
+Telne
t
Protoco
l
OceanStor
S2600(V10
0R002/
V100R005)
N
Y
N
N
N
Y
Y
OceanStor
S5000(V10
0R005C02)
N
Y
N
N
N
Y
Y
OceanStor
S5000(V10
0R001)
Y
N
N
N
N
Y
Y
OceanStor
T
series(V100
R001/
V100R002/
V100R005)
N
Y
N
N
N
Y
Y
OceanStor
T
series(V200
R001)
N
N
Y
N
N
Y
Y
OceanStor
T
series(V200
R002)
N
N
N
Y
N
Y
Y
6800
V3/5800
V3/5600
V3/5500
V3/5300
V3/2800
V3(V3)
N
N
N
Y
N
Y
Y
OceanStor
HVS85T/
OceanStor
HVS88T(V
100R001C9
9)
N
N
Y
N
N
Y
Y
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
91
eSight
Operation Guide
3 Discovering Devices
Device
Name
Can Be Automatically Discovered? (Y/N)
Can Be
Added
in
Batche
s?
(Y/N)
Can Be
Added
One by
One?
(Y/N)
SNMP
Protoco
l
SMI-S
Protoco
l
TLV
Protoco
l
REST
Protoco
l
SNMP
+Telne
t
Protoco
l
OceanStor
18500/
OceanStor
18800/
OceanStor
18800F(V1
00R001)
and
OceanStor
HVS85T/
OceanStor
HVS88T(V
100R001C0
0)
N
N
N
Y
N
Y
Y
OceanStor
Dorado
5100(V100
R001C00)
N
Y
N
N
N
Y
Y
OceanStor
Dorado
2100
G2(V100R
001)
N
Y
N
N
N
Y
Y
OceanStor
VIS6000/
OceanStor
VIS6000T
N
Y
N
N
N
Y
Y
NOTE
l The OceanStor 18000 device port is 8088.
l The OceanStor HVS85T/OceanStor HVS88T(V100R001C00) device port is 443.
Procedure
Step 1 Choose Resource > Add Resource > Add Resource from the menu bar.
Step 2 In the function pane, choose Storage Device > Unified Storage.
Step 3 In Basic Information, enter parameters of the storage device that you want to discover.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
92
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Subnet
Indicates the subnet to
which the storage device
belongs.
[Example]
Indicates the management
IP address of the storage
device.
[Value range]
IP
NOTE
When the high-end storage
devices are discovered, you
need set the IP address to
bearing device management IP
address. If OceanStor 18000
series devices are discovered,
the IP address is the SVP
server IP address.
Name
Set the name of the storage
device.
root
l From left to right, the
value of the first byte
ranges from 1 to 255.
l The values of the other
bytes range from 0 to
255.
[Example]
10.10.10.70
[Example]
storageA
NOTE
l The name is a string of 1
to 128 characters.
l The name contains letters,
digits, _, -, ., (, ) or space.
Step 4 In the Protocol area, select the protocol.
Step 5 Set the parameters following selected Protocol.
NOTE
l Select the device discovery protocol should be consistent and the device support.
l The certificate file of OceanStor VIS system is disabled to replace, could cause security risk when
adding a VIS device.
l
SMI-S
NOTE
Issue 01 (2016-04-30)
–
You are advised to set SSL to Enabled, when choose SMI-S in the Protocol.
–
Keep default values of Port and Namespace.
–
The Event Notification information is displayed, refer to SNMP protocol to set the
parameters.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
93
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Username
Indicates the user name of
the storage device
management system.
[Example]
admin
The default user name is
admin, and user admin can
create super
administrators.
Password
SSL protocol
NOTICE
Before setting SSL to
Enabled, check whether the
device you want to discover
supports the SSL mode. If
the device does not support
the SSL mode, the eSight
may not discover it.
Port
Indicates the password of
the storage device
management system.
[Example]
Indicates whether to
enable Secure Sockets
Layer (SSL) for the
storage device.
[Example]
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 5989
[Example]
password
Enabled
The value ranges from 1 to
65535.
5989
Namespace
l
Issue 01 (2016-04-30)
Namespace of the storage
device.
[Example]
interop
SNMP
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
94
eSight
Operation Guide
3 Discovering Devices
NOTE
–
You are advised to use the SNMPv3 protocol, and to use Authentication protocol:
HMAC_SHA; Privacy protocol: AES, when choose SNMP in the Protocol.
–
When the adding device support SNMPv3, you need to set the parameters of the Event
Notification.
Parameter
Description
Setting
Type
SNMP template used for
storage device
management, including
SNMPv3 and
SNMPv2c.
[Example]
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 161
[Example]
The Type is
SNMPv2c
Port
SNMPv3
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
Read
communit
y
Issue 01 (2016-04-30)
Read community name
that is used by eSight to
send a GET request to an
NE. The value must be
the same as the read
community name
configured on devices.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Example]
team1
95
eSight
Operation Guide
3 Discovering Devices
Parameter
The Type is
SNMPv3
Description
Setting
Write
communit
y
Write community name
that is used by eSight to
send a SET request to an
NE. The value must be
the same as the write
community name
configured on devices.
[Example]
Port
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 161
[Example]
team1
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
Username
Indicates the user name
specified in the SNMP
protocol, and must be the
same as that in the
SNMP parameters
configure for the storage
system.
[Example]
Context
name
Name of the
environment engine.
[Example]
Context
engine ID
Unique identifier of an
SNMP engine.
[Example]
admin
cd
-
This ID is used together
with the environment
name to determine an
environment that
uniquely identifies an
SNMP entity.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
96
eSight
Operation Guide
3 Discovering Devices
Parameter
Authentic
ation
protocol
Description
Setting
Protocol used for
verifying messages,
select HMAC_MD5,
HMAC_SHA or None.
[Example]
None
NOTE
You are advised to use the
HMAC_SHA protocol,
the HMAC_MD5 protocol
causes security risk.
Authentic
ation
password
If the HMAC_MD5 or
HMAC_SHA protocol
is selected, you need to
set the authentication
password.
[Example]
Privacy
protocol
Encryption protocol used
when encapsulating data,
select DES, AES or
None.
[Example]
-
None
– DES: indicates the
Data Encryption
Standard (DES),
which is an
international
encryption algorithm
with the key length of
56 characters.
– AES: indicates the
Advanced Encryption
Standard (AES).
There are three types
of key lengths,
including 128
characters, 192
characters, and 256
characters. These
types of key length
can provide the
security protection of
different levels.
NOTE
You are advised to select
the AES protocol, the AES
protocol has security more
than the DES protocol.
Privacy
password
Issue 01 (2016-04-30)
If the Privacy protocol
is DES or AES, you
need to set the data
encryption password.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Example]
-
97
eSight
Operation Guide
3 Discovering Devices
l
TLV
NOTE
The Event Notification information is displayed, refer to SNMP protocol to set the parameters.
Param
eter
Description
Setting
Userna
me
Indicates the user name of the
storage device management system.
[Example]
Passwo
rd
Indicates the password of the storage
device management system.
[Example]
Port
Port number used for accessing a
specific storage device.
[Value range]
Default port: 8080
[Example]
admin
password
The value ranges from 1 to 65535.
8080
l
REST
NOTE
The Event Notification information is displayed, refer to SNMP protocol to set the parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
98
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Username
Indicates the user name of the
storage device management
system.
[Example]
Indicates the password of the
storage device management
system.
[Example]
Port number used for accessing a
specific storage device.
[Value range]
Password
Port
Default port: 8088
admin
password
The value ranges from 1 to
65535.
[Example]
8088
Step 6 Click OK.
NOTE
l Click Apply to create more NEs.
l When adding the unified storage device, the process is displayed in the page, you can operate other
steps.
l
If the NE is created successfully, on the menu bar, choose Resource > Resource
Management > Storage Device > Unified Storage, the NE is displayed in the list.
l
If the NE cannot be created, the Error dialog box is displayed. Click OK to set the
parameters again.
----End
Follow-up Procedure
The access parameters and protocol parameters are required for the communication between
the eSight and NE. If the access parameters or protocol parameters of the NE changes,
synchronize the parameters of the eSight with that of the NE to ensure normal
communication, refer to 10.1.1.14 Configuring Reporter Access Parameters or 10.1.1.15
Configuring Protocol Parameters and Event Notification.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
99
eSight
Operation Guide
3 Discovering Devices
3.10.2.3 Adding a Single Massive Storage Device
If you want a few massive storage devices to access the eSight, you can add massive storage
devices one by one.
Prerequisites
You have obtain the IP address, user name and password of the device.
Context
NOTICE
The storage arrays use the MD5 to encrypt device users' passwords. There is a possibility that
device users' passwords are cracked and leaked.
You need to configure jdk security parameters if you enable SSL for the first time. Run the
following command to configure the jdk security parameter. After the configuration, restart
the eSight process for the settings to take effect.
Windows: eSight installation directory/AppBase/tools/MD5Config/
it_common_MD5config.bat
The following command can automatically disable MD5.
Windows: eSight installation directory/AppBase/tools/MD5Config/
it_common_MD5revert.bat
Before connecting to the devices, you need to learn about the specific device names, and
methods of adding the massive storage devices to eSight.
Issue 01 (2016-04-30)
Device
Name
Can Be Automatically Discovered? (Y/N)
SNMP
Protoco
l
SMI-S
Protoc
ol
TLV
Protoco
l
REST
Protoco
l
SNMP
+Telne
t
Protoco
l
OceanStor
N8000
N
Y
N
N
OceanStor
9000
Y
N
N
OceanStor
UDS(V100R
002)
N
N
OceanStor
CSS/
OceanStor
CSE
Y
N
Can Be
Added
in
Batche
s?
(Y/N)
Can Be
Added
One by
One?
(Y/N)
N
Y
Y
N
N
Y
Y
N
Y
N
Y
Y
N
N
N
Y
Y
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
100
eSight
Operation Guide
3 Discovering Devices
Procedure
Step 1 Choose Resource > Add Resource > Add Resource from the menu bar.
Step 2 In the function pane, choose Storage Device > Massive Storage.
Step 3 In Basic Information, enter parameters of the storage device that you want to discover.
Parameter
Description
Setting
Subnet
Indicates the subnet where
the storage device resides.
[Example]
Indicates the management
IP address of the storage
device.
[Value range]
IP
NOTE
When the OceanStor UDS
devices are discovered, you
need set the IP address to
bearing device management IP
address.
root
l From left to right, the
value of the first byte
ranges from 1 to 255.
l The values of the other
bytes range from 0 to
255.
[Example]
10.10.10.70
Name
Set the name of the storage
device.
[Example]
storageA
NOTE
l The name is a string of 1
to 128 characters.
l The name contains letters,
digits, _, -, ., (, ) or space.
Model
Set the model of a massive
storage device, you can
select UDS, CSS, CSE,
N8000 or OceanStor 9000.
[Example]
CSE
NOTE
The OceanStor 9000E is
belong to OceanStor 9000.
Step 4 Set the parameters following selected Model.
NOTE
Select the device discovery protocol should be consistent and the device support.
l
OceanStor UDS
NOTE
Issue 01 (2016-04-30)
–
The OceanStor UDS V100R002C00 does not support the Event Notification function.
–
The Event Notification information is displayed. Refer to SNMP protocol to set the
parameters.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
101
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Username
Indicates the user name of the
storage device management
system.
[Example]
Indicates the password of the
storage device management
system.
[Example]
Port number used for accessing a
specific storage device.
[Value range]
Password
Port
Default port: 28443
admin
password
The value ranges from 1 to
65535.
[Example]
28443
l
OceanStor CSS/OceanStor CSE/OceanStor 9000
NOTE
You are advised to use the SNMPv3 protocol, and to use Authentication protocol: HMAC_SHA;
Privacy protocol: AES, when choose SNMP in the Protocol.
Issue 01 (2016-04-30)
Parameter
Description
Setting
Type
SNMP template used for
storage device
management, including
SNMPv3 and
SNMPv2c.
[Example]
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
SNMPv3
102
eSight
Operation Guide
3 Discovering Devices
Parameter
The Type is
SNMPv2c
Port
Description
Setting
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 161
[Example]
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
The Type is
SNMPv3
Read
communit
y
Read community name
that is used by eSight to
send a GET request to an
NE. The value must be
the same as the read
community name
configured on devices.
[Example]
Write
communit
y
Write community name
that is used by eSight to
send a SET request to an
NE. The value must be
the same as the write
community name
configured on devices.
[Example]
Port
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 161
[Example]
team1
team1
The value ranges from 1
to 65535.
161
Attempts
Issue 01 (2016-04-30)
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Value range]
The value ranges from 1
to 20.
[Example]
10
103
eSight
Operation Guide
3 Discovering Devices
Parameter
Timeout
Description
Setting
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 60.
[Example]
10
Username
Indicates the user name
specified in the SNMP
protocol, and must be the
same as that in SNMP
parameters configured
for the storage device.
[Example]
Context
name
Name of the
environment engine.
[Example]
Context
engine ID
Unique identifier of an
SNMP engine.
[Example]
admin
cd
-
This ID is used together
with the environment
name to determine an
environment that
uniquely identifies an
SNMP entity.
Authentic
ation
protocol
Protocol used for
verifying messages,
select HMAC_MD5,
HMAC_SHA or None.
[Example]
None
NOTE
You are advised to use the
HMAC_SHA protocol,
the HMAC_MD5 protocol
causes security risk.
Authentic
ation
password
Issue 01 (2016-04-30)
If the HMAC_MD5 or
HMAC_SHA protocol
is selected, you need to
set the authentication
password.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Example]
-
104
eSight
Operation Guide
3 Discovering Devices
Parameter
Privacy
protocol
Description
Setting
Encryption protocol used
when encapsulating data,
select DES, AES or
None.
[Example]
None
– DES: indicates the
Data Encryption
Standard (DES),
which is an
international
encryption algorithm
with the key length of
56 characters.
– AES: indicates the
Advanced Encryption
Standard (AES).
There are three types
of key lengths,
including 128
characters, 192
characters, and 256
characters. These
types of key length
can provide the
security protection of
different levels.
NOTE
You are advised to select
the AES protocol, the AES
protocol has security more
than the DES protocol.
Privacy
password
l
If the Privacy protocol
is DES or AES, you
need to set the data
encryption password.
[Example]
-
OceanStor N8000
NOTE
Issue 01 (2016-04-30)
–
You are advised to set SSL to Enabled, when choose SMI-S in the Protocol.
–
Keep default values of Port and Namespace.
–
The Event Notification information is displayed. Refer to SNMP protocol to set the
parameters.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
105
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Username
Indicates the user name of
the storage device
management system.
[Example]
Indicates the password of
the storage device
management system.
[Example]
Indicates whether to
enable Secure Sockets
Layer (SSL) for the
storage device.
[Example]
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 5989
[Example]
Password
SSL protocol
NOTICE
Before setting SSL to
Enabled, check whether the
device you want to discover
supports the SSL mode. If
the device does not support
the SSL mode, the eSight
may not discover it.
Port
admin
password
Enabled
The value ranges from 1 to
65535.
5989
Namespace
Namespace of the storage
device.
[Example]
interop
Step 5 Click OK.
NOTE
Click Apply to create more NEs.
l
Issue 01 (2016-04-30)
If the NE is created successfully, on the menu bar, choose Resource > Resource
Management > Storage Device > Massive Storage, the NE is displayed in the list.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
106
eSight
Operation Guide
3 Discovering Devices
l
If the NE cannot be created, the Error dialog box is displayed. Click OK to set the
parameters again.
----End
Follow-up Procedure
The access parameters and protocol parameters are required for the communication between
the eSight and NE. If the access parameters or protocol parameters of the NE changes,
synchronize the parameters of the eSight with that of the NE to ensure normal
communication, refer to 10.1.2.13 Configuring Reporter Access Parameters or 10.1.2.15
Configuring Protocol Parameters and Event Notification.
3.10.2.4 Adding a Single Data Protection
If you want a few data protection devices to access the eSight, you can add data protection
devices one by one.
Prerequisites
You have obtain the IP address, user name and password of the device.
Context
NOTICE
The storage arrays use the MD5 to encrypt device users' passwords. There is a possibility that
device users' passwords are cracked and leaked.
You need to configure jdk security parameters if you enable SSL for the first time. Run the
following command to configure the jdk security parameter. After the configuration, restart
the eSight process for the settings to take effect.
Windows: eSight installation directory/AppBase/tools/MD5Config/
it_common_MD5config.bat
The following command can automatically disable MD5.
Windows: eSight installation directory/AppBase/tools/MD5Config/
it_common_MD5revert.bat
Before connecting to the devices, you need to learn about the specific device names, and
methods of adding the data protection devices to eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
107
eSight
Operation Guide
3 Discovering Devices
Device
Name
Can Be Automatically Discovered? (Y/N)
Can Be
Added
in
Batche
s?
(Y/N)
Can Be
Added
One by
One?
(Y/N)
SNMP
Protoco
l
SMI-S
Protoc
ol
TLV
Protoco
l
REST
Protoco
l
SNMP
+Telne
t
Protoco
l
OceanStor
VTL6900
N
N
Y
N
N
Y
Y
OceanStor
HDP3500E
Y
N
N
N
N
Y
Y
Procedure
Step 1 Choose Resource > Add Resource > Add Resource from the menu bar.
Step 2 In the function pane, choose Storage Device > Data Protection.
Step 3 In Basic Information, enter parameters of the storage device that you want to discover.
Parameter
Description
Setting
Subnet
Indicates the subnet where
the storage device resides.
[Example]
Indicates the management
IP address of the storage
device.
[Value range]
IP
root
l From left to right, the
value of the first byte
ranges from 1 to 255.
l The values of the other
bytes range from 0 to
255.
[Example]
10.10.10.70
Name
Indicates the name of the
storage device.
[Example]
storageA
NOTE
l The name is a string of 1
to 128 characters.
l The name contains letters,
digits, _, -, ., (, ) or space.
Model
Issue 01 (2016-04-30)
Indicates the model of the
storage device that discover
datastores. Possible values
are VTL and HDP.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Example]
VTL
108
eSight
Operation Guide
3 Discovering Devices
Step 4 Set the parameters following selected Model.
NOTE
Select the device discovery protocol should be consistent and the device support.
l
OceanStor VTL
NOTE
–
The OceanStor VTL device is discovered through non security channel, could cause the device
to sensitive information leakage.
–
The Event Notification information is displayed. Refer to SNMP protocol to set the
parameters.
Parameter
Description
Setting
Username
Indicates the user name of the
storage device management
system.
[Example]
Indicates the password of the
storage device management
system.
[Example]
Port number used for accessing a
specific storage device.
[Value range]
Password
Port
Default port: 19001
admin
password
The value ranges from 1 to
65535.
[Example]
19001
l
OceanStor HDP
NOTE
You are advised to use the SNMPv3 protocol, and to use Authentication protocol: HMAC_SHA;
Privacy protocol: AES, when choose SNMP in the Protocol.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
109
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Type
SNMP template used for
storage device
management, including
SNMPv3 and
SNMPv2c.
[Example]
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 161
[Example]
The Type is
SNMPv2c
Port
SNMPv3
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
Read
communit
y
Issue 01 (2016-04-30)
Read community name
that is used by eSight to
send a GET request to an
NE. The value must be
the same as the read
community name
configured on devices.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Example]
team1
110
eSight
Operation Guide
3 Discovering Devices
Parameter
The Type is
SNMPv3
Description
Setting
Write
communit
y
Write community name
that is used by eSight to
send a SET request to an
NE. The value must be
the same as the write
community name
configured on devices.
[Example]
Port
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 161
[Example]
team1
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
Username
Indicates the user name
specified in the SNMP
protocol, and must be the
same as that in SNMP
parameters configured
for the storage device.
[Example]
Context
name
Name of the
environment engine.
[Example]
Context
engine ID
Unique identifier of an
SNMP engine.
[Example]
admin
cd
-
This ID is used together
with the environment
name to determine an
environment that
uniquely identifies an
SNMP entity.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
111
eSight
Operation Guide
3 Discovering Devices
Parameter
Authentic
ation
protocol
Description
Setting
Protocol used for
verifying messages,
select HMAC_MD5,
HMAC_SHA or None.
[Example]
None
NOTE
You are advised to use the
HMAC_SHA protocol,
the HMAC_MD5 protocol
causes security risk.
Authentic
ation
password
If the HMAC_MD5 or
HMAC_SHA protocol
is selected, you need to
set the authentication
password.
[Example]
Privacy
protocol
Encryption protocol used
when encapsulating data,
select DES, AES or
None.
[Example]
-
None
– DES: indicates the
Data Encryption
Standard (DES),
which is an
international
encryption algorithm
with the key length of
56 characters.
– AES: indicates the
Advanced Encryption
Standard (AES).
There are three types
of key lengths,
including 128
characters, 192
characters, and 256
characters. These
types of key length
can provide the
security protection of
different levels.
NOTE
You are advised to select
the AES protocol, the AES
protocol has security more
than the DES protocol.
Privacy
password
Issue 01 (2016-04-30)
If the Privacy protocol
is DES or AES, you
need to set the data
encryption password.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Example]
-
112
eSight
Operation Guide
3 Discovering Devices
Step 5 Click OK.
NOTE
Click Apply to create more NEs.
l
If the NE is created successfully, on the menu bar, choose Resource > Resource
Management > Storage Device > Data Protection, the NE is displayed in the list.
l
If the NE cannot be created, the Error dialog box is displayed. Click OK to set the
parameters again.
----End
Follow-up Procedure
The protocol parameters are required for the communication between the eSight and NE. If
the protocol parameters of the NE changes, synchronize the parameters of the eSight with that
of the NE to ensure normal communication, refer to 10.1.3.5 Configuring Protocol
Parameters and Event Notification.
3.10.2.5 Adding a Single Third Party Storage Device
If you want a few third party devices to access the eSight, you can add third party devices one
by one.
Prerequisites
You have obtain the IP address, user name and password of the device.
l
For devices that have preset management functions, the supported protocols are
described in Table 3-11. For devices that do not have preset management functions, the
SMI-S protocol must be supported for the devices to connect to eSight.
l
For devices that have preset management functions, alarm monitoring can be performed
without alarm customization. For devices that do not have preset management functions,
alarm monitoring can be performed only after the SNMP protocol is available and alarm
customization is ready after the devices are connected to eSight. For details, see
Creating Alarm Parameter Customization or (Recommended) Importing
Customized Information About Alarm Parameters in Batches.
NOTE
You need to configure jdk security parameters if you enable SSL for the first time. Run the following
command to configure the jdk security parameter. After the configuration, restart the eSight process for
the settings to take effect.
Windows: eSight installation directory/AppBase/tools/MD5Config/it_common_MD5config.bat
The following command can automatically disable MD5.
Windows: eSight installation directory/AppBase/tools/MD5Config/it_common_MD5revert.bat
Context
Before connecting to the devices, you need to learn about the specific device names, and
methods of adding the third party storage devices to eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
113
eSight
Operation Guide
3 Discovering Devices
Table 3-11 Supported access protocols
Device Name
Issue 01 (2016-04-30)
Can Be Automatically Discovered? (Y/N)
SNMP
Protoc
ol
SMI-S
Protoc
ol
TLV
Protoc
ol
REST
Protoc
ol
SNMP
+Teln
et
Protoc
ol
Can
Be
Adde
d in
Batche
s?
(Y/N)
NetApp(3992/399
4/FAS3160/980C)
N
Y
N
N
N
Y
Y
Inspur(AS400)
N
N
N
N
Y
Y
Y
Inspur(AS2000(O
EM NetApp
7900)/AS1000–
G6(OEM NetApp
5480)/AS1000–
G3(OEM NetApp
4980))
N
Y
N
N
N
Y
Y
DFT(GS3992(OE
M NetApp 3992))
N
Y
N
N
N
Y
Y
EMC(CX3-10C/
CX3-20C/
CX3-20F/
CX3-40C/
CX3-80/CX4-120/
CX4-240/
CX4-480/
CX4-960)
N
Y
N
N
N
Y
Y
IBM(DS3300/
DS3400/DS3500/
DS4100/DS4300/
HuaWei S3000
(DS4700)/
DS4800/DS5020/
DS8100)
N
Y
N
N
N
Y
Y
HP (EVA4400
(HSV300)/
EVA6400/
MSA2000/P6500/
P2000G3/F200)
N
Y
N
N
N
Y
Y
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Can
Be
Added
One
by
One?
(Y/N)
114
eSight
Operation Guide
3 Discovering Devices
Device Name
Can Be Automatically Discovered? (Y/N)
SNMP
Protoc
ol
SMI-S
Protoc
ol
TLV
Protoc
ol
REST
Protoc
ol
SNMP
+Teln
et
Protoc
ol
Can
Be
Adde
d in
Batche
s?
(Y/N)
Sugon
(DS8348(OEM
NetApp 3994)/
DS8340(OEM
NetApp 3992)/
DS800–F10(OEM
NetApp 4980)/
DS800–F20(OEM
NetApp 4988))
N
Y
N
N
N
Y
Y
Sugon (DS600–
F20(OEM
Infortrend)/
DS600–F10(OEM
Infortrend))
Y
N
N
N
N
Y
Y
Hitachi (HUS
110/AMS
2100/AMS 1000)
N
Y
N
N
N
Y
Y
SUN (ST2540/
ST6130/ST6140/
ST6180/ST6540)
N
Y
N
N
N
Y
Y
Can
Be
Added
One
by
One?
(Y/N)
Procedure
Step 1 Choose Resource > Add Resource > Add Resource from the menu bar.
Step 2 In the function pane, choose Storage Device > Third Party Storage.
Step 3 In Basic Information, enter parameters of the storage system that you want to discover.
Issue 01 (2016-04-30)
Parameter
Description
Setting
Subnet
Indicates the subnet where
the storage device resides.
[Example]
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
root
115
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
IP
Indicates the management
IP address of the storage
system.
[Value range]
NOTE
If the third party storage
devices are discovered by
SMI-S protocol, you need set
the IP address to bearing
device management IP
address. It is the Provider
sever IP address.
l From left to right, the
value of the first byte
ranges from 1 to 255.
l The values of the other
bytes range from 0 to
255.
[Example]
10.10.10.70
Name
Set the name of the storage
device.
[Example]
storageA
NOTE
l The name is a string of 1
to 128 characters.
l The name contains letters,
digits, _, -, ., (, ) or space.
Manufacturer
Manufacturer of the third
party storage device.
[Example]
NetApp
Including EMC, HP, IBM,
Hitachi, NetApp, Sugon,
Inspur, DFT or Other.
Model
Model of the third party
storage device.
[Example]
DS600
NOTE
Sugon DS600 is discovered
based on the SNMP, and
Inspur AS400 is discovered
based on the SNMP and Telnet
protocol. Other third party
storage devices are discovered
based on the SMI-S protocol.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
116
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Alarm Proxy IP(Optional)
IP address is used to
transmit and report the
alarm to the eSight, it is the
eSight IP address of the
device in common.
[Value range]
NOTICE
l The following devices
need to configure the IP
address:
–
NetApp: NetApp
3992, NetApp 3994,
NetApp 4980, NetApp
4988, NetApp 5480,
and NetApp 7900
–
Inspur: AS2000(OEM
NetApp 7900),
AS1000–G6(OEM
NetApp 5480), and
AS1000-G3(OEM
NetApp 4980)
–
DFT: GS3992(OEM
NetApp 3992)
–
Sugon: DS8384(OEM
NetApp 3994),
DS8380(OEM NetApp
3992), DS800F10(OEM NetApp
4980), and DS800F20(OEM NetApp
4988)
l From left to right, the
value of the first byte
ranges from 1 to 255.
l The values of the other
bytes range from 0 to
255.
[Example]
10.10.10.70
l Please setting the correct
IP address to ensure the
eSight can receive the
alarm information. If the
IP address is not
configured, you can
configure the IP address in
the Settings > Protocol
Parameters page.
Step 4 In the Protocol area, select the protocol.
NOTE
Select the device discovery protocol should be consistent and the device support.
l
SMI-S
NOTE
Issue 01 (2016-04-30)
–
You are advised to set SSL to Enabled, when choose SMI-S in the Protocol.
–
Keep default values of Port and Namespace.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
117
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Username
Indicates the user name of
the storage device
management system.
[Example]
Indicates the password of
the storage device
management system.
[Example]
Indicates whether to
enable Secure Sockets
Layer (SSL) for the
storage device.
[Example]
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 5989
[Example]
Password
SSL protocol
NOTICE
Before setting SSL to
Enabled, check whether the
device you want to discover
supports the SSL mode. If
the device does not support
the SSL mode, the eSight
may not discover it.
Port
admin
password
Enabled
The value ranges from 1 to
65535.
5989
Namespace
l
Namespace of the storage
device.
[Example]
interop
SNMP
NOTE
You are advised to use the SNMPv3 protocol, and to use Authentication protocol: HMAC_SHA;
Privacy protocol: AES, when choose SNMP in the Protocol.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
118
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Type
SNMP template used for
storage device
management, including
SNMPv3 and
SNMPv2c.
[Example]
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 161
[Example]
The Type is
SNMPv2c
Port
SNMPv3
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
Read
communit
y
Issue 01 (2016-04-30)
Read community name
that is used by eSight to
send a GET request to an
NE. The value must be
the same as the read
community name
configured on devices.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Example]
team1
119
eSight
Operation Guide
3 Discovering Devices
Parameter
The Type is
SNMPv3
Description
Setting
Write
communit
y
Write community name
that is used by eSight to
send a SET request to an
NE. The value must be
the same as the write
community name
configured on devices.
[Example]
Port
Port number used for
accessing a specific
storage device.
[Value range]
Default port: 161
[Example]
team1
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
Username
Indicates the user name
specified in the SNMP
protocol, and must be the
same as that in the
SNMP parameters
configured for the
storage device.
[Example]
Context
name
Name of the
environment engine.
[Example]
Context
engine ID
Unique identifier of an
SNMP engine.
[Example]
admin
cd
-
This ID is used together
with the environment
name to determine an
environment that
uniquely identifies an
SNMP entity.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
120
eSight
Operation Guide
3 Discovering Devices
Parameter
Authentic
ation
protocol
Description
Setting
Protocol used for
verifying messages,
select HMAC_MD5,
HMAC_SHA or None.
[Example]
None
NOTE
You are advised to use the
HMAC_SHA protocol,
the HMAC_MD5 protocol
causes security risk.
Authentic
ation
password
If the HMAC_MD5 or
HMAC_SHA protocol
is selected, you need to
set the authentication
password.
[Example]
Privacy
protocol
Encryption protocol used
when encapsulating data,
select DES, AES or
None.
[Example]
-
None
– DES: indicates the
Data Encryption
Standard (DES),
which is an
international
encryption algorithm
with the key length of
56 characters.
– AES: indicates the
Advanced Encryption
Standard (AES).
There are three types
of key lengths,
including 128
characters, 192
characters, and 256
characters. These
types of key length
can provide the
security protection of
different levels.
NOTE
You are advised to select
the AES protocol, the AES
protocol has security more
than the DES protocol.
Privacy
password
Issue 01 (2016-04-30)
If the Privacy protocol
is DES or AES, you
need to set the data
encryption password.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
[Example]
-
121
eSight
Operation Guide
3 Discovering Devices
l
Telnet
NOTE
The Inspur AS400 is discovered on the Telnet protocol, could cause the device to sensitive
information leakage.
Parameter
Description
Setting
Username
Indicates the user name of the
storage device management
system.
[Example]
Indicates the password of the
storage device management
system.
[Example]
Password
admin
password
Step 5 Click OK.
NOTE
Click Apply to create more NEs.
l
If the NE is created successfully, on the menu bar, choose Resource > Resource
Management > Storage Device > Third Party Storage, the NE is displayed in the list.
l
If the NE cannot be created, the Error dialog box is displayed. Click OK to set the
parameters again.
----End
Follow-up Procedure
The protocol parameters are required for the communication between the eSight and NE. If
the protocol parameters of the NE changes, synchronize the parameters of the eSight with that
of the NE to ensure normal communication, refer to 10.1.4.10 Configuring Protocol
Parameters.
3.10.2.6 Adding a Single Fibre Channel Switch
If you want a few Fibre Channel switches to access the eSight, you can add Fibre Channel
switches one by one.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
122
eSight
Operation Guide
3 Discovering Devices
Prerequisites
l
You have obtain the IP address, user name and password of the device.
l
For the eSight to discover Fibre Channel switches, first complete required configurations
on the Fibre Channel switches. The following explains how to configure a Fibre Channel
switch before performing device discovery.
–
QLogic switch: Refer to 3.4.2.1 Configuring Qlogic Switch Parameters to
configure a Fibre Channel switch.
–
Brocade switch: Refer to 3.4.2.2 Configuring Brocade Switch Parameters to
configure a Fibre Channel switch.
NOTE
You need to configure jdk security parameters if you enable SSL for the first time. Run the following
command to configure the jdk security parameter. After the configuration, restart the eSight process for
the settings to take effect.
Windows: eSight installation directory/AppBase/tools/MD5Config/it_common_MD5config.bat
The following command can automatically disable MD5.
Windows: eSight installation directory/AppBase/tools/MD5Config/it_common_MD5revert.bat
Context
Before connecting to the devices, you need to learn about the specific device names, and
methods of adding the FC switches to eSight.
Device
Name
Can Be Automatically Discovered? (Y/N)
SNMP
Protoco
l
SMI-S
Protoc
ol
TLV
Protoco
l
REST
Protoco
l
SNMP
+Telne
t
Protoco
l
Brocade
(SilkWorm
series/
48000/DCX
4S)
N
Y
N
N
HUAWEI
SNS series
(V1R2)
N
Y
N
QLogic
Y
N
HUAWEI
SNS series
(V1R1)
Y
N
Can Be
Added
in
Batche
s?
(Y/N)
Can Be
Added
One by
One?
(Y/N)
N
Y
Y
N
N
Y
Y
N
N
N
Y
Y
N
N
N
Y
Y
Procedure
Step 1 Choose Resource > Add Resource > Add Resource from the menu bar.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
123
eSight
Operation Guide
3 Discovering Devices
Step 2 Choose Storage Device > FC Switches in the function panel.
Step 3 In Basic Information, enter parameters of the Fibre Channel switch that you want to
discover.
Parameter
Description
Setting
Subnet
Indicates the subnet where
the Fibre Channel switch
resides.
[Example]
Indicates the management
IP address of the Fibre
Channel switch.
[Value range]
IP
NOTE
l If the Brocade or Huawei
FC switches are
discovered by SMI-S
protocol, you need set the
IP address to bearing
device management Agent
sever IP address.
root
l From left to right, the
value of the first byte
ranges from 1 to 255.
l The values of the other
bytes range from 0 to
255.
[Example]
10.10.10.70
l Refer to 3.4.2.2
Configuring Brocade
Switch Parameters to
obtain the IP address of
Agent sever.
Name
Set the name of the Fibre
Channel switch.
[Example]
fcswitchA
NOTE
l The name is a string of 1
to 128 characters.
l The name contains letters,
digits, _, -, ., (, ) or space.
Factory
Vendor of the Fibre Channel
switch.
[Example]
Qlogic
l If Qlogic is selected, set
the SNMP protocol
parameters.
l If Brocade is selected,
set the SMI-S protocol
parameters.
l If Huawei is selected, set
the SNMP and SMI-S
protocol parameters.
Step 4 In the Protocol area, select the protocol.
NOTE
Add the Huawei switch in SNMP protocol, if the switch use the SNMPv2c protocol, you need to select
SNMPv2c protocol to discover the switch; if the switch use the SNMPv3 protocol, you need to select
SNMPv3 protocol.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
124
eSight
Operation Guide
3 Discovering Devices
l
SMI-S
NOTE
–
You are advised to set SSL to Enabled, when choose SMI-S in the Protocol.
–
Keep default values of Port and Namespace.
Parameter
Description
Setting
Username
Indicates the user name of
the Fibre Channel switch
management system.
[Example]
Indicates the password of
the Fibre Channel switch
management system.
[Example]
Indicates whether to
enable Secure Sockets
Layer (SSL) for the
storage device.
[Example]
Port number used for
accessing a specific Fibre
Channel switch.
[Value range]
Default port: 5989
[Example]
Password
SSL protocol
NOTICE
Before setting SSL to
Enabled, check whether the
device you want to discover
supports the SSL mode. If
the device does not support
the SSL mode, the eSight
may not discover it.
Port
admin
password
Enabled
The value ranges from 1 to
65535.
5989
Namespace
l
Issue 01 (2016-04-30)
Namespace of the Fibre
Channel switch.
[Example]
interop
SNMP
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
125
eSight
Operation Guide
3 Discovering Devices
NOTE
You are advised to use the SNMPv3 protocol, and to use Authentication protocol: HMAC_SHA;
Privacy protocol: AES, when choose SNMP in the Protocol.
Parameter
Description
Setting
Type
SNMP type for a Fibre
Channel switch. Possible
values are SNMPv3 and
SNMPv2c.
[Example]
Port number used for
accessing a specific
Fibre Channel switch.
[Value range]
Default port: 161
[Example]
The Type is
SNMPv2c
Port
SNMPv3
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
Issue 01 (2016-04-30)
Read
communit
y
Read community name
that is used by eSight to
send a GET request to an
NE. The value must be
the same as the read
community name
configured on devices.
[Example]
Write
communit
y
Write community name
that is used by eSight to
send a SET request to an
NE. The value must be
the same as the write
community name
configured on devices.
[Example]
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
team1
team1
126
eSight
Operation Guide
3 Discovering Devices
Parameter
The Type is
SNMPv3
Port
Description
Setting
Port number used for
accessing a specific
Fibre Channel switch.
[Value range]
Default port: 161
[Example]
The value ranges from 1
to 65535.
161
Attempts
Timeout
Times for sending an
SNMP operation. If this
number of times is
exceeded, the SNMP
operation will be
discarded.
[Value range]
Wait time after a
protocol message is sent.
[Value range]
The value ranges from 1
to 20.
[Example]
10
The value ranges from 1
to 60.
[Example]
10
Username
Indicates the user name
specified in the SNMP
protocol, and must be the
same as the in SNMP
parameters configured
for the system.
[Example]
Context
name
Name of the
environment engine.
[Example]
Context
engine ID
Unique identifier of an
SNMP engine.
[Example]
admin
cd
-
This ID is used together
with the environment
name to determine an
environment that
uniquely identifies an
SNMP entity.
Authentic
ation
protocol
Protocol used for
verifying messages,
select HMAC_MD5,
HMAC_SHA or None.
[Example]
None
NOTE
You are advised to use the
HMAC_SHA protocol,
the HMAC_MD5 protocol
causes security risk.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
127
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Authentic
ation
password
If the HMAC_MD5 or
HMAC_SHA protocol
is selected, you need to
set the authentication
password.
[Example]
Privacy
protocol
Encryption protocol used
when encapsulating data,
select DES, AES or
None.
[Example]
-
None
– DES: indicates the
Data Encryption
Standard (DES),
which is an
international
encryption algorithm
with the key length of
56 characters.
– AES: indicates the
Advanced Encryption
Standard (AES).
There are three types
of key lengths,
including 128
characters, 192
characters, and 256
characters. These
types of key length
can provide the
security protection of
different levels.
NOTE
You are advised to select
the AES protocol, the AES
protocol has security more
than the DES protocol.
Privacy
password
If the Privacy protocol
is DES or AES, you
need to set the data
encryption password.
[Example]
-
Step 5 Click OK.
NOTE
Click Apply to create more NEs.
l
Issue 01 (2016-04-30)
If the NE is created successfully, on the menu bar, choose Resource > Resource
Management > Storage Device > FC Switches, the NE is displayed in the list.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
128
eSight
Operation Guide
3 Discovering Devices
l
If the NE cannot be created, the Error dialog box is displayed. Click OK to set the
parameters again.
----End
Follow-up Procedure
The protocol parameters are required for the communication between the eSight and NE. If
the protocol parameters of the NE changes, synchronize the parameters of the eSight with that
of the NE to ensure normal communication, refer to 10.1.5.5 Configuring Protocol
Parameters and Event Notification.
3.10.3 Adding a Single Server
The eSight allows you to add the following servers one by one: storage servers, blade servers,
high-density servers, third-party servers, and rack servers.
Prerequisites
l
To use the performance collection function of eSight, you need to install the HostAgent
on a server before adding the server. For details about the installation method, see the
software installation guide of the server.
l
You have obtained the IP address, type, and communications protocol parameters of the
target server.
NOTE
l When adding a blade server, obtain the floating IP address of the HMM, which is used as the
IP address for accessing the blade server.
l When adding a rack server or high-density server, obtain the BMC management IP address,
which is used as the IP address for accessing the rack server or high-density server.
l
Before adding a third-party server, check the following:
–
Check the eSight specifications list and ensure that the server is supported by
eSight. If the server is not supported by eSight, ensure that the server supports IPMI
or SNMP.
NOTE
To add a server to eSight, the server must support IPMI or SNMP. To implement alarm
monitoring for a server, the server must support SNMP and alarm parameter customization
needs to be created on eSight based on alarm MIB information provided by the vendor.
–
When adding a third-party server using IPMI, you do not need to create device
information customization on eSight. Instead, enable IPMI on the third-party server
and use IPMI for server access.
–
Before adding a third-party server using SNMP, you need to create device
information customization for the server. For details, see 11.8.1.2 Creating Device
Information Customization.
To monitor alarms of a third-party server using SNMP, create alarm parameter
customization for the server. For details, see 11.8.2.3 Importing Customized
Information About Alarm Parameters in Batch (recommended) or 11.8.2.2
Creating Alarm Parameter Customization.
Context
SNMP and IPMI application scenarios:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
129
eSight
Operation Guide
3 Discovering Devices
l
Use IPMI when adding a V1 server.
l
Use SNMP when adding a V2 server.
l
Use only IPMI when adding a storage server.
l
Use only SNMP when adding a blade server.
NOTE
If a server supports both IPMI and SNMP, SNMP is preferred for adding the server.
Precaution
l
If the V1 server, storage server, or third-party server is discovered, register the trap IP
address in the BMC. Otherwise, alarms generated by the server cannot be reported to and
displayed in the eSight.
l
Before adding a server to the eSight, set the trap mode for the server to OID. Otherwise,
alarms generated by the servers cannot be reported to and displayed in the eSight.
l
The eSight cannot collect performance data for V1 servers.
Procedure
Step 1 On the menu bar, choose Resource > Add Resource > Add Resource.
The Add Resource page is displayed.
Step 2 In the Server list, select the server type that you want to add.
Step 3 In the Basic Information area, configure basic information about the server.
The basic information includes the server subnet, IP address, and name.
Step 4 (Optional) Select a protocol type for discovering servers, and set the protocol parameters.
1.
Select a protocol type for discovering servers.
NOTE
2.
–
Storage servers support only the Intelligent Platform Management Interface (IPMI).
–
Blade servers support only SNMP.
Set the protocol parameters.
–
Set the SNMP parameters.
The available SNMP versions are V1, V2c, and V3.
NOTICE
n
Before using SNMPv1 or SNMPv2c to discover a device, you must enable the
SNMP service of the required version in the BMC on the device.
n
When the read-only and read-write community names of the server to be added
are the same, use the SNMPv3 to discover the device.
If you use SNMPv1 or SNMPv2c to discover the device, the server fails to be
added.
n
Issue 01 (2016-04-30)
When the BMC trap version of the server to be added is V3, use SNMPv3 to
discover the device, and the user name must be the same as that in the BMC.
Otherwise, alarms generated by the server cannot be reported to and displayed in
the eSight.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
130
eSight
Operation Guide
3 Discovering Devices
n
The following table describes the SNMPv1 and SNMPv2c parameters.
Parameter
Description
Setting
SNMP Template
Specifies the SNMP
version for
communicating with a
server.
[Example]
DefaultSNMPV1
Select an option from
the drop-down list.
Retry times
Timeout period
Specifies the maximum
number of attempts to
resend an SNMP
request. If the
maximum number of
attempts is exceeded,
the SNMP request will
be discarded.
Specifies the maximum
time for waiting for a
response to an SNMP
request.
NOTE
You are advised to set
Timeout period to 10
seconds or longer to
avoid the situation where
component information
is in unknown state for a
long time after a server
is successfully
discovered by using the
SNMPv1 template.
Port
Specifies the port
number used for
servers to access each
other.
[Value range]
○
An integer ranging
from 1 to 20
○
Default value: 3
[Example]
3
[Value range]
○
An integer ranging
from 1 to 60
○
Default value: 5
[Example]
3
[Value range]
○
An integer ranging
from 1 to 65535
○
Default value: 161
[Example]
3
Read community
Issue 01 (2016-04-30)
Specifies the name of
the community that has
read permission.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
-
131
eSight
Operation Guide
3 Discovering Devices
n
Parameter
Description
Setting
Write community
Specifies the name of
the community that has
write permission.
-
The following table describes the SNMPv3 parameters.
Parameter
Description
Setting
SNMP template
Specifies the SNMP
version for
communicating with a
server.
[Example]
DefaultSNMPV3
Select an option from
the drop-down list.
Retry times
Timeout duration
Specifies the maximum
number of attempts to
resend an SNMP
request. If the
maximum number of
attempts is exceeded,
the SNMP request will
be discarded.
Specifies the maximum
time for waiting for a
response to an SNMP
request.
[Value range]
○
An integer ranging
from 0 to 20
○
Default value: 3
[Example]
3
[Value range]
○
An integer ranging
from 1 to 60
○
Default value: 5
[Example]
3
Port
Specifies the port
number used for
servers to access each
other.
[Value range]
○
An integer ranging
from 1 to 65535
○
Default value: 161
[Example]
3
Username
Issue 01 (2016-04-30)
Specifies the user name
for logging in to a
server.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
-
132
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Authentication protocol
Specifies a message
authentication protocol.
-
Authentication
password
Set an authentication
password if an
authentication protocol
is used. The
authentication
password is used for
accessing the device.
-
Data encryption
protocol
Specifies the
encryption protocol
used for encapsulating
data.
-
The value can be DES
or AES.
○
Data Encryption
Standard (DES) is
an international
universal encryption
algorithm. The key
length is 56 bits.
○
Advanced
Encryption
Standard (AES)
provides security
protection of
different levels. The
key length can be
128 bits, 192 bits,
or 256 bits.
NOTE
You are advised to select
theAES protocol, the
AES protocol has
security more than the
DES protocol.
Data encryption
password
–
Set a data encryption
password if an
encryption algorithm is
used. The data
encryption password is
used for accessing the
device.
-
Set the IPMI parameters.
The following table describes the IPMI parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
133
eSight
Operation Guide
3 Discovering Devices
Parameter
Description
Setting
Username
Specifies a server user
name.
-
Password
Specifies a server
password.
-
Step 5 Click OK.
A success message is displayed.
Step 6 Click OK.
----End
3.11 Creating a Group
eSight supports device and interface group management to divide devices and interfaces to
groups, facilitating management and operations.
3.11.1 Creating a Device Group
You can add multiple devices on different subnets to a group, so they can be assigned to and
managed by users as one object. This improves device management efficiency.
Context
l
eSight predefines some device groups. When the predefined device groups cannot meet
user requirements, you can create new device groups.
l
You can set dynamic rules when you create a device group. Devices that meet the
dynamic rules will be automatically added to the device group. You can also manually
add devices that do not meet the rules to the group.
l
When the device information changes, a device group is automatically updated. Devices
that do not meet the dynamic rules are removed from the device group and devices that
meet the dynamic rules are added to the device group.
NOTE
Devices that are manually added to the device group can only be removed from the group manually.
Procedure
Step 1 Choose Resource > Resources Group > Group Management from the main menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
134
eSight
Operation Guide
3 Discovering Devices
Step 2 Click
next to User Defined Group in the navigation tree to create a device group.
Step 3 Set basic information of the device group.
Specify a name and label for the device group and provide group description.
NOTE
Group label is the upper-level menu of device group, which is a collection of multiple device groups with the
same feature. A device label can contain multiple device groups.
Step 4 Set a dynamic rule for the device group.
1.
Click
2.
Set the rule name.
3.
Set the condition for a rule to take effect.
4.
in Dynamic Rules.
–
satisfy all conditions: A device can be added to a device group only when it meets
all dynamic conditions for the rule.
–
satisfy any condition: A device can be added to a device group when it meets any
dynamic condition for the rule.
Set a dynamic condition.
To set multiple dynamic conditions, click
next to a dynamic condition.
NOTE
l To set multiple dynamic rules, repeat the preceding operations.
l A device can be added to a device group when it meets any dynamic rule.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
135
eSight
Operation Guide
3 Discovering Devices
After dynamic rules are set, click Preview Rule-compliant Members. All the devices that
meet the rules are displayed in Rules' Member.
Step 5 Optional: Manually add members to a device group.
in Manually Add Members. In the dialog box that is displayed, select
Click
devices to be added to a group and click Confirm.
Step 6 Click Confirm. A device group is created.
----End
Related Operations
You can perform the following operations on the Group Management page.
Table 3-12 Operations on the Group Management page
Operation
Description
Modifying a device group
Select the device group to be modified in
the navigation tree, and click .
Deleting a device group
Select the device group to be deleted in the
navigation tree, and click .
3.11.2 Creating an Interface Group
You can add multiple interfaces on different devices to a group, so they can be assigned to and
managed by users as one object. This improves interface management efficiency.
Context
l
eSight predefines some interface groups. When the predefined interface groups cannot
meet user requirements, you can create new interface groups.
l
You can set dynamic rules when you create an interface group. Interfaces that meet the
dynamic rules will be automatically added to the interface group. You can also manually
add interfaces that do not meet the rules to the group.
l
When the device interface information changes, an interface group is automatically
updated. Interfaces that do not meet the dynamic rules are removed from the interface
group and interfaces that meet the dynamic rules are added to the interface group.
NOTE
Interfaces that are manually added to the interface group can only be removed from the group manually.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
136
eSight
Operation Guide
3 Discovering Devices
Procedure
Step 1 Choose Resource > Resources Group > Group Management from the main menu.
Step 2 Click
next to User Defined under Interface Group in the navigation tree to create an
interface group.
Step 3 Set basic information of the interface group.
Specify a name and provide description for the interface group.
Step 4 Set group conditions for the interface group.
1.
2.
Set the dynamic conditions to take effect.
–
satisfy all conditions: An interface can be added to an interface group only when it
meets all dynamic conditions for the rule.
–
satisfy any condition: An interface can be added to an interface group when it meets
any dynamic condition for the rule.
Set a dynamic condition.
To set multiple dynamic conditions, click
next to a dynamic condition.
After dynamic rules are set, click Preview All. All the interfaces that meet the rules are
displayed in Group Members.
Step 5 Optional: Manually add members to an interface group.
in Group Members. In the dialog box that is
Click
displayed, select interfaces to be added to a group and click Confirm.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
137
eSight
Operation Guide
3 Discovering Devices
Step 6 Click Confirm. An interface group is created.
----End
Related Operations
You can perform the following operations on the Group Management page.
Table 3-13 Operations on the Group Management page
Operation
Description
Modifying an interface group
Select the interface group to be modified in
the navigation tree, and click .
Deleting an interface group
Select the interface group to be deleted in
the navigation tree, and click .
3.12 Adjusting Resources
When the network structure changes, you can adjust resources (mainly refer to subnets and
devices) as required.
Prerequisites
You have the resource operation rights.
Procedure
l
Adjust a subnet.
a.
Issue 01 (2016-04-30)
Choose Resource > Resources Group > Subnet from the main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
138
eSight
Operation Guide
3 Discovering Devices
l
b.
On the Subnet page, select the subnet to be adjusted, and click Move Node.
c.
Select the target subnet on the Move Node page.
d.
Click OK.
Adjust a device.
a.
Choose Resource > Resource Management > Device Type from the main menu.
b.
Choose the device type in the navigation tree on the left.
c.
On the Device Management page, select the device and click Move.
d.
Select the target subnet on the Select Target Subnet page.
e.
Click OK.
----End
3.13 Exporting Resources
eSight allows users to export NE information and assets information.
3.13.1 Exporting NE Information
When the eSight is integrated into a third-party system, the third-party system must monitor
and manage the NEs managed by the eSight. You can use the eSight to export all managed
NEs and provide them to the third-party system. The third-party system can manually draw
topology views based on the NE information list, which facilitates monitoring of the NEs
managed by the eSight.
Prerequisites
You have the operation rights for Access Resource.
Procedure
Step 1 Enter http://eSight server IP address:eSight server port number/eam/neexport.action in the
address box of a browser and press Enter.
Step 2 In the File Download dialog box, click Save.
The default file name is allnodes.xlsx.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
139
eSight
Operation Guide
3 Discovering Devices
NOTE
If there are more than 50,000 records, divide the records into multiple files (files are named
allnodes_1.xlsx, allnodes_2.xlsxby…) by 50,000 records and compress the files into the allnodes.zip
file for users to download.
----End
3.13.2 Exporting the Asset
This operation allows you to export the device information.
Procedure
Step 1 On the menu bar, choose System > Administration > Asset Export.
Step 2 Select the device to export the asset.
Step 3 Click Export to export the device information.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
140
eSight
Operation Guide
4 Setting Topology
4
Setting Topology
About This Chapter
Topology management involves creating and managing the topology of the entire network.
The physical view shows the networking and running status of devices. The devices are
displayed in certain colors in the physical view, and their status is also displayed. This
information helps you monitor the entire network in real time.
4.1 About Topology
A topology view displays the distribution and state of network elements (NEs), subnets, and
links in graphs for you to learn the structure and monitor the running status of the entire
network in a visualized manner.
4.2 Overview
This topic describes the topology setting operations performed in different operation and
maintenance (O&M) scenarios. You can perform operations based on actual O&M scenarios.
4.3 Setting Up the Physical Topology
After network elements (NEs) and subnets are connected to the eSight using the resource
management function, they are automatically displayed in the physical topology. To
authentically represent the actual network structure, you need to adjust these topology objects
based on their real network locations, and create virtual NEs and virtual links to represent
those that are not managed by the eSight.
4.4 Creating a Custom Topology
The physical topology view shows the structure and running status of the entire network.
Network management personnel may want to focus on the network structure or monitor the
network running status in an area. They can create a custom topology by selecting some
topology objects to achieve precise monitoring and efficient operation and maintenance
(O&M).
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
141
eSight
Operation Guide
4 Setting Topology
4.1 About Topology
A topology view displays the distribution and state of network elements (NEs), subnets, and
links in graphs for you to learn the structure and monitor the running status of the entire
network in a visualized manner.
The eSight supports the physical topology and custom topology to suit different application
scenarios.
l
Physical topology: It shows the network structure and service relationships between
network entities.
l
Custom topology: Network management personnel select network entities within their
management scopes to configure custom topology views, which achieves precise
monitoring and efficient operation and maintenance (O&M).
A topology view consists of NEs, subnets, and links, as shown in Figure 4-1 and Table 4-1.
Figure 4-1 Topology objects
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
142
eSight
Operation Guide
4 Setting Topology
Table 4-1 Topology objects
Object
Description
NE
An NE is an entity that contains hardware and software.
NEs are classified into the following depending on whether
they can be directly managed by the eSight:
l Physical NE: Real network devices managed by the eSight.
After physical NEs are connected to the eSight, they are
automatically displayed in the physical topology. In
addition, you can view online status and alarm status of
physical NEs in topology views. LocalNMS is installed
eSight NE.
l Virtual NE: NEs that are manually created for showing the
entire network in a topology view. Virtual NEs are not
managed by the eSight. The runtime data of virtual NEs is
not displayed in topology views.
Subnet
A large network is divided into several smaller networks based
on a specific rule (by region or device type), which facilitates
network management.
Link
A link is the physical or logical connection between two
topology nodes. Links are classified into:
l Physical link: Communication links that actually exist
between NEs.
l Virtual link: Links that are manually created in a topology
view to show logical relationships between NEs.
You can view colors and information in a topology view to learn the running status of
physical NEs and links and to monitor networks. Before you view physical NEs, you are
on the toolbar to update basic NE information, including the NE names,
advised to click
NE IP addresses, NE coordinates, and NE icons.
l
The colors of physical NEs, links, and subnets help you determine whether they run
properly on the live network. Click
on the toolbar to view the meaning of each color.
l
Move the pointer to a topology object to view its real-time running status.
l
Right-click a topology object and choose shortcut menu items to view detailed device,
alarm, and performance information.
4.2 Overview
This topic describes the topology setting operations performed in different operation and
maintenance (O&M) scenarios. You can perform operations based on actual O&M scenarios.
Before performing topology setting operations, you are advised to learn concepts related to
topology management, for example, virtual NE, virtual link, and subnet. Understanding
these concepts helps you avoid errors when performing topology setting operations.
Figure 4-2 shows the overview of topology setting operations.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
143
eSight
Operation Guide
4 Setting Topology
Figure 4-2 Overview of topology setting operations
4.3 Setting Up the Physical Topology
After network elements (NEs) and subnets are connected to the eSight using the resource
management function, they are automatically displayed in the physical topology. To
authentically represent the actual network structure, you need to adjust these topology objects
based on their real network locations, and create virtual NEs and virtual links to represent
those that are not managed by the eSight.
Prerequisites
l
Objects have been connected to the eSight.
l
You have the operation rights for Modify Topology.
Context
The eSight does not provide any messages using the topology background. Do not believe any
operation instructions in the topology background if any to ensure system security.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
144
eSight
Operation Guide
4 Setting Topology
Procedure
Step 1 Obtain the completed network design.
A network is divided by following certain principles. For example:
l
By the area where devices are located
l
By device type
l
By device Internet Protocol (IP) address
l
By device owner
Step 2 Choose Monitor > Topology > Topology Management from the main menu.
Step 3 Arrange topology objects based on the network design. Then click
positions after the adjustment.
to save their new
Table 4-2 Arranging topology objects
Operation
Method
Adjusting the
locations of NEs and
subnets
l Drag objects if you only need to adjust them within the same
subnet.
l Use
and
to move objects if you need to adjust them
across subnets. Before pasting objects to another subnet,
double-click the subnet to open it.
Identifying topology
object scopes using
boxes
Identify topology object scopes using boxes with different shapes
and colors to clearly show the network structure. For example,
you can use this method to distinguish objects between different
campuses.
1. Click
on the toolbar.
2. Drag a shape to the topology view and set its attributes.
3. Drag topology objects to the shape. Adjust the layer
relationship between the shape and topology objects using the
shortcut menu as required.
NOTE
Do not enter personnel data or sensitive information, including accounts,
passwords, phone numbers, and emails. The topology objects with
annotations are visible to all users. Protect private information.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
145
eSight
Operation Guide
4 Setting Topology
Step 4 Create a virtual NE and virtual link.
To completely show the entire network, you can create virtual NEs and virtual links to
represent the objects that cannot be directly connected to the eSight.
Runtime data of virtual NEs and virtual links are not displayed.
Table 4-3 Creating a virtual object
Method
Operation
Creating a virtual NE
Creating virtual links
between NEs, between
subnets, and between
NEs and subnets
Creating virtual links
between NEs and
topology objects in a
subnet
Click
on the toolbar and choose
1. Click
on the toolbar and choose
.
.
2. Select NEs and subnets between which you want to set up
links.
1. Click
2. Click
in the upper right corner of a subnet to expand it.
on the toolbar and choose
.
3. Select NEs and topology objects in the subnet between which
you want to set up links.
NOTE
To cancel the creation, click
on the toolbar and choose an operation.
Step 5 Create a subnet.
NOTE
l You can create default subnets only.
l You can create subnets under a subnet.
l After a subnet is created, you can move NEs to the subnet.
l It is recommended that a subnet consist of a maximum of 10 layers to prevent performance problems.
l It is recommended that a subnet contain a maximum of 500 devices.
When NEs are connected to the eSight, subnets are automatically created in the topology
based on the subnet rule planned during resource access. If the planned subnet rule does not
meet requirements, manually create subnets in the topology.
1.
Click
2.
Select NEs that you want to add to a subnet and click
click
3.
on the toolbar and choose
.
. Double-click the subnet and
to paste the NEs to it.
After all desired NEs are added to the subnet, drag them to adjust their positions within
the subnet.
Step 6 Create a link.
NOTE
Only network devices are supported.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
146
eSight
Operation Guide
4 Setting Topology
A link is used to connect signaling points (SPs) and signaling transfer points (STPs) and
transmit signaling messages. Link status and details in the topology help users learn about the
network connection in a timely manner. eSight supports automatic link discovery and manual
link creation.
l
When an NE is created on eSight, eSight automatically discovers the link between the
NE and other NEs and adds the NE to the link topology.
l
Links on the live network are changing all the time. You must perform the Discover
Link operation before performing link management on eSight to enable eSight to
discover new links on the live network, ensuring data consistency of eSight and the live
network.
l
A link is used to connect signaling points (SPs) and signaling transfer points (STPs) and
transmit signaling messages.
–
General link: A general link identifies the logical connection relationship between
two managed objects.
–
IP link: An IP link is a Layer 3 link between devices. The IP addresses for
interfaces at both ends of a side-by-side link (a type of IP link) contain a 30-bit
subnet mask.
–
Layer 2 link: A Layer 2 link between devices can be displayed in the physical view.
eSight supports the following discovery methods.
Discovery
Method
Description
LLDP-based
A Link Layer Discovery Protocol (LLDP) link is a Layer 2
link that uses LLDP for discovery. LLDP is a Layer 2
discovery protocol defined in IEEE 802.1ab. eSight can use
LLDP to obtain information about Layer 2 neighboring
devices and detailed network topology information, which
helps to expand the network. In addition, eSight can use
LLDP to detect improper network configurations, which helps
the network administrator to optimize network configurations.
To use this discovery method, enable the LLDP function first.
CDP-based
Cisco Discovery Protocol (CDP) is used to discover links
among Cisco devices.
To use this discovery method, enable the CDP function first.
Based on the
MAC
forwarding table
1.
Issue 01 (2016-04-30)
Click
Links can be also discovery based on the MAC forwarding
table if LLDP or CDP is not enabled.
The detailed discovery rules are as follows:
n
Links are automatically discovered based on the MAC
forwarding table when devices are added to eSight. If links
between devices change, users can manually discover
links.
n
Only the situation in which one link exists between two
devices is supported. If the links between two devices are
more than one, links cannot be discovered.
in the toolbar and choose Create Link.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
147
eSight
Operation Guide
4 Setting Topology
2.
Choose a start topology object of the link in the physical view.
3.
Choose the target topology object from the topology navigation tree and click the object
in the physical view.
NOTE
If you create a link within the same subnet, you can directly choose the target topology object in the
physical view.
4.
In the dialog box that is displayed, set link parameters and click OK.
5.
In the dialog box that is displayed, click OK.
----End
4.4 Creating a Custom Topology
The physical topology view shows the structure and running status of the entire network.
Network management personnel may want to focus on the network structure or monitor the
network running status in an area. They can create a custom topology by selecting some
topology objects to achieve precise monitoring and efficient operation and maintenance
(O&M).
Prerequisites
You have the operation rights for Modify Topology.
Procedure
Step 1 Choose Monitor > Topology > Topology Management from the main menu.
Step 2 Create a custom topology view.
1.
In the navigation tree, click
2.
In the Manage Custom Topology dialog box, click Add to create a custom topology.
to the right of the Custom Topology node.
After a custom topology is created, you can click buttons in the Operation column to
modify or delete the topology.
Step 3 Add desired NEs and subnets to the custom topology.
1.
In the physical topology view, right-click the topology object which you want to add to
the custom topology, and choose Add Object to Custom View.
2.
In the Add Object to Custom View dialog box, select the custom topology to which you
want to add objects and click OK.
Step 4 Create links between the current custom topology view and other custom topology views.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
148
eSight
Operation Guide
4 Setting Topology
In a custom topology view to which objects have been added, you can view the link
relationships only between the added objects, but cannot view the link relationships between
these objects and objects outside the custom topology view. For example, you cannot view the
link relationship between an object in custom topology view A and an object in custom
topology view B. To address this problem, you can create a node in the current custom
topology view to represent another custom topology view and use virtual links to identify the
link relationships between objects in the two custom topology views.
Operation
Method
Create a node that represents
another custom topology view.
1. Click
on the toolbar and choose
.
2. After selecting a location, in the Create Node
dialog box, set parameters and click OK. The
node name must be the same as the name of the
named customer topology view.
3. Right-click a created node and choose Bind from
the shortcut menu. Then select the custom
topology view to be bound to the node. After they
are bound, double-click the node icon. The bound
custom topology view is displayed.
NOTE
Use virtual links to identify the
link relationships between objects
in the named custom topology
view and the current custom
topology view.
–
To change the topology view bound to a node, rightclick the node and choose Bind from the shortcut
menu. Then select another topology view.
–
If you want to retain only shortcut icons and delete
the links from the shortcut icons to other topology
views, right-click nodes and choose Unbind from
the shortcut menu. Shortcut icons are retained after
this operation.
1. Click
on the toolbar and choose
.
2. Select the node created in the previous step and
NEs or subnets that are linked to the named
custom topology view.
NOTE
To cancel the creation, click
choose an operation.
on the toolbar and
After the links and shortcut icons are created, you can view the networking relationships
between the topology objects and other custom topologies in the current custom topology
view. In addition, you can double-click the shortcut icons to quickly switch to desired custom
topologies.
Step 5 Click
to save the custom topology view.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
149
eSight
Operation Guide
5 Setting Alarm Monitoring
5
Setting Alarm Monitoring
About This Chapter
The eSight provides the functions of monitoring alarms, querying alarms or events, and
setting remote alarm notification to help you detect, identify, and troubleshoot the network or
device faults rapidly.
5.1 About Alarm
The eSight centralizes the monitoring of alarms from NEs and itself. On the eSight, network
maintenance personnel are able to quickly diagnose and rectify faults on networks.
Understanding alarm-related concepts helps network maintenance personnel quickly and
accurately monitor and handle alarms, thereby increasing operation and maintenance (O&M)
efficiency.
5.2 Overview
This topic describes the alarm management operations performed in different operation and
maintenance (O&M) scenarios. You can perform operations based on actual O&M scenarios.
5.3 Setting Remote Alarm/Event Notification
Network maintenance personnel cannot browse alarms or events on the eSight client when
they leave the office, for example, during private time or business trips. Remote alarm/event
notification enables network maintenance personnel to receive alarms and events sent from
the eSight in SMS messages or emails so that they can learn and handle alarms and events in
real time.
5.4 Setting Alarm Monitoring Rules
The eSight provides three types of monitoring rules. Understanding their application scenarios
and effects helps you properly set alarm monitoring rules, which improves monitoring and
alarm handling efficiency.
5.5 Setting Storage Device Alarm Threshold
This section describes how to set thresholds of performance indicators and capacity usage for
the device and its components. If the performance or capacity usage exceeds the specified
threshold, an alarm occurs.
5.6 Setting Cloud Service Alarm Notification
This operation allows you to configure the severity of alarms for which alarm notifications
need to be sent and the email addresses of the alarm notification recipients.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
150
eSight
Operation Guide
5 Setting Alarm Monitoring
5.7 Setting Cloud Service Site Information
After the remote maintenance function is enabled, you can set the site information to remotely
maintain site devices.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
151
eSight
Operation Guide
5 Setting Alarm Monitoring
5.1 About Alarm
The eSight centralizes the monitoring of alarms from NEs and itself. On the eSight, network
maintenance personnel are able to quickly diagnose and rectify faults on networks.
Understanding alarm-related concepts helps network maintenance personnel quickly and
accurately monitor and handle alarms, thereby increasing operation and maintenance (O&M)
efficiency.
Alarms and Events
Alarms are reported to the eSight upon status changes detected by NEs or the eSight in
abnormal conditions, and events are reported upon status changes in normal conditions. Table
5-1 is a comparison between the two concepts.
Table 5-1 Comparison between alarms and events
Concept
Descriptio
n
Common Ground
Difference
Alarm
Notification
generated
after an NE
or the
eSight
detects a
fault
NEs or the eSight
notifies users after
detecting status changes
on managed objects
(MOs).
NEs or the eSight reports alarms
after detecting faults or factors that
may cause faults.
Network entities may encounter the
following faults:
l Hardware fault: faults on the
physical resources of NEs
l Software fault: software bugs
l Function fault: issues caused by
function or non-hardware factors,
failures of certain functions on
some or all NEs caused by
overload, or communication
failures between NEs, between an
NE and an operating system
(OS), between OSs, or between
an NE and the eSight
Event
Issue 01 (2016-04-30)
Notification
generated
after an NE
or the
eSight
detects a
status
change in
normal
conditions
NEs or the eSight reports events after
detecting status changes in normal
conditions. Events convey key
information, including:
l Key maintenance operations,
such as uninstallation
l Runtime information, such as
active/standby switchovers in a
high availability (HA) system
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
152
eSight
Operation Guide
5 Setting Alarm Monitoring
Alarm Classification
Based on the locations where alarms are generated, alarms are classified into NE alarms and
NMS alarms.
l
NE alarms are generated when NEs become faulty.
l
NMS alarms are generated when connections between the eSight and NEs are interrupted
or the eSight itself becomes faulty.
Based on the clearance conditions, NE and NMS alarms are further classified as follows:
l
Automatically detected and automatically cleared (ADAC) alarm
Faults that are "Automatically Detected and Automatically Cleared" by the NEs or the
eSight when they occur and when they are repaired. After the faults are rectified, NEs or
the eSight report clear alarms. The alarms then change from uncleared alarms to cleared
alarms.
l
Automatically detected and manually cleared (ADMC) alarm
Faults that are Automatically Detected by the NEs or the eSight when they occur and
Manually Cleared by the operator when they are repaired.
Alarm Handling
The eSight receives tens of thousands of alarms, many of which do not concern users and do
not need to be handled. Network maintenance personnel need to take much time and efforts to
view and analyze all these alarms and therefore may make incorrect decisions and fail to
handle key alarms in a timely manner. To avoid these issues, the eSight provides two alarm
handling methods to reduce alarms, thereby freeing network maintenance personnel from
massive alarms and increasing alarm handling efficiency. Network maintenance personnel can
monitor handled alarms in the Current Alarms window.
l
Alarm merging
Alarm merging rule: If alarms have the same alarm source, location information, and
alarm identity (ID), the alarms are reported as only one record.
NOTE
Alarms about eLTE eNodeBs and eCNSs are distinguished by device serial number and do not support
alarm merging.
l
–
If a newly reported alarm corresponds to an uncleared alarm in the Current
Alarms window and the two alarms meet the merging rule, they will be merged
into one alarm whose number of occurrences increases by 1. If the corresponding
alarm is cleared, it will be moved to the Historical Alarms window and the new
alarm will be displayed in the Current Alarms window.
–
If a new alarm is reported and does not meet the merging rule, it is displayed as a
new record in the Current Alarms window.
Correlation analysis
Many alarms are logically correlated with each other. Therefore, Huawei predefines
alarm-specific correlation analysis rules proven by experience in the eSight. Based on
these rules, the eSight supports two types of alarms: root alarm, correlative alarm,
aggregation alarm, and single point alarm.
–
Root and correlative alarms
Based on the symptoms of multiple alarms that occur on a single NE or between
different NEs, the eSight automatically analyzes and establishes logical correlations
between the alarms and then identifies the root alarm, an alarm that causes the other
alarms. The alarm that causes multiple alarms is a root alarm and these multiple
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
153
eSight
Operation Guide
5 Setting Alarm Monitoring
alarms are correlative alarms. Network maintenance personnel only need to handle
the root alarm.
–
Aggregation and single point alarms
n
An NE may run abnormally after faults occur on other NEs. The eSight
generates an alarm for the affected NE and establishes correlations.
n
NEs define some alarms in fine granularities. The eSight combines some of
these fine-granularity alarms into one understandable alarm.
n
The eSight provides the alarm handling failure threshold. If this threshold is
exceeded, the eSight will generate a new alarm with correlations established.
n
If a fault produces a chain reaction on an NE, all the faults are combined into
one alarm.
In the preceding scenario, the new alarm is an aggregation alarm and the original
alarms related to the aggregation alarm are single point alarms.
Alarm Severity
Alarm severities indicate how serious faults are. Table 5-2 lists the severities in descending
order. You can use processing policies for different alarm severities and redefine alarm
severities.
Table 5-2 Alarm severity
Issue 01 (2016-04-30)
Alarm
Severity
Description
Handling
Critical
A critical alarm indicates that a
service-affecting fault has occurred
and a corrective action must be
taken immediately.
The alarm must be handled
immediately. Otherwise, the system
may break down.
Major
A major alarm indicates that a
service-affecting fault has occurred.
If the fault is not rectified
immediately, it will lead to a serious
result.
The alarm must be handled timely.
Otherwise, the important functions
will be affected.
Minor
A minor alarm indicates that a nonservice affecting fault has occurred
and that corrective action should be
taken to prevent a more serious
(service-affecting) fault. An alarm
of this severity can be reported
when the detected alarm condition
is not currently degrading the
capacity of the managed object.
Such alarms are used to remind the
maintenance personnel to efficiently
identify alarm causes and eliminate
possible faults.
Warning
A warning alarm indicates that a
potential or impending serviceaffecting fault has been detected
before it affects services.
The maintenance personnel can
learn the running status of the
network and equipment and handle
alarms based on the actual
situations.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
154
eSight
Operation Guide
5 Setting Alarm Monitoring
Alarm Status
Conforming to 3GPP regulations, the eSight provides two alarm operations, acknowledge and
clear. Alarm status varies with the operations, as listed in Table 5-3. Figure 5-1 shows the
relationships between alarm status.
Table 5-3 Alarm status
Acknowledgment Status
Clearance Status
Unacknowledged
Uncleared
Acknowledged
Cleared
Figure 5-1 Alarm status relationship
Based on whether alarms have been acknowledged and cleared, the eSight classifies alarms
into:
l
Current alarm: including uncleared and unacknowledged alarms, acknowledged but
unacknowledged alarms, cleared but unacknowledged alarms. Network maintenance
personnel need to pay close attention to these alarms. Current alarms can be monitored
and handled in the Current Alarms window.
l
Historical alarm: alarms that have been cleared and acknowledged. Historical alarms are
a data source for network performance optimization. Network maintenance personnel
may need to query and collect statistics on them.
NOTE
After an NE is deleted, its alarms are updated as follows:
l Its current alarms change to historical alarms.
l Masked alarms related to this NE are changed to cleared alarms.
l Alarms related to this NE are removed from the mask rules and remote notification rules.
5.2 Overview
This topic describes the alarm management operations performed in different operation and
maintenance (O&M) scenarios. You can perform operations based on actual O&M scenarios.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
155
eSight
Operation Guide
5 Setting Alarm Monitoring
Before performing alarm management operations, you must be familiar with the basic
concepts about alarm management. For details, see 5.1 About Alarm. Understanding these
concepts will help you avoid errors when performing alarm management operations.
The overview of alarm management operations includes E2E procedures and tasks in different
O&M scenarios, as shown in Figure 5-2.
Figure 5-2 Overview of alarm management operations
Table 5-4 lists some tasks. Other tasks are described in subsequent sections.
Table 5-4 Task
Issue 01 (2016-04-30)
Task
Prerequisite
Navigation Path
Set an
alarm
sound.
You have the
operation rights for
Alarm Settings.
Choose Monitor > Fault Management > Alarm
Settings from the main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
156
eSight
Operation Guide
5 Setting Alarm Monitoring
Task
Prerequisite
Navigation Path
Set alarm
overflow
dump.
You have the
operation rights for
Database
Overflow Dump.
Choose System > System Settings > Set Database
Overflow Dump from the main menu. In the
navigation tree in the left pane, choose Alarm
Database Dump
Query
events.
You have the
operation rights for
Browse Events.
Choose Monitor > Fault Management > Event
from the main menu.
Query
historical
alarms.
l You have the
operation rights
for Browse
Historical
Alarms.
Choose Monitor > Fault Management > Historical
Alarms from the main menu.
l Historical
alarms have not
been dumped.
Query
masked
alarms.
You have the
operation rights for
Browse Masked
Alarms.
Choose Monitor > Fault Management > Masked
Alarms from the main menu.
5.3 Setting Remote Alarm/Event Notification
Network maintenance personnel cannot browse alarms or events on the eSight client when
they leave the office, for example, during private time or business trips. Remote alarm/event
notification enables network maintenance personnel to receive alarms and events sent from
the eSight in SMS messages or emails so that they can learn and handle alarms and events in
real time.
Prerequisites
Table 5-5 lists the prerequisites for setting remote alarm/event notification.
Table 5-5 Prerequisites
Task
Prerequisite
Set a notification
template.
You have the operation rights for Alarm Settings.
Set a user group.
You have the operation rights for User Group Settings.
Set a notification rule.
You have the operation rights for Alarm Settings.
Context
Figure 5-3 shows the procedure for setting remote notification.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
157
eSight
Operation Guide
5 Setting Alarm Monitoring
Figure 5-3 Procedure for setting remote notification
NOTE
l You need to input calling number and email for sending remote alarm notification. Therefore, you
are obligated to take considerable measures, in compliance with the laws of the countries concerned
and the user privacy policies of your company, to ensure that the personal data of users is fully
protected.
l Personal data such as phone numbers and email addresses are anonymized in the eSight GUI and
encrypted in the eSight during batch data transmission to ensure data security.
Procedure
Step 1 Set the notification servers. Choose System > System Settings > Set Notified Server from
the main menu.
To ensure successful alarm/event notification by SMS message or email, set interworking
parameters for the email server, SMS server, and SMS modem on the eSight based on the site
conditions.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
158
eSight
Operation Guide
5 Setting Alarm Monitoring
Table 5-6 lists these setting tasks.
Table 5-6 Notification setting tasks
Issue 01 (2016-04-30)
Task
Description
Prerequisite
Navigatio
n Path
Important
Notes
Set the
email
server.
When the
email server
needs to send
emails,
interworking
parameters of
the email
server must be
set on the
eSight to
ensure
successful
communicatio
n between the
eSight and the
email server.
The eSight
supports only
SMTP email
servers.
(SMTP is an
acronym for
Simple Mail
Transfer
Protocol.)
l An SMTP email server has
been configured and is
properly connected to the
eSight.
In the
navigation
tree on the
left, choose
Email
Server.
To keep
emails
secure,
select
Secure
Sockets
Layer (SSL/
TLS) when
setting the
email
server.
l The email server Internet
Protocol (IP) address and
sender address are obtained.
l You have the operation rights
for Email Server Settings.
l If antivirus software is
installed on the eSight server,
ensure that email transmission
is not prohibited by the
software.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
159
eSight
Operation Guide
Issue 01 (2016-04-30)
5 Setting Alarm Monitoring
Task
Description
Prerequisite
Navigatio
n Path
Important
Notes
Set the
SMS
server.
When the
SMS server
needs to send
SMS
messages,
interworking
parameters of
the SMS
server must be
set on the
eSight to
ensure
successful
communicatio
n between the
eSight and the
SMS server.
l You have applied for an SMS
server account, and the SMS
server is properly connected to
the eSight.
In the
navigation
tree on the
left, choose
Short
Message
Server.
SMS
servers
from
different
carriers use
different
encoding
protocols. If
the
encoding
protocol is
SMPP3_3,
SMPP3_4,
SGIP or
SMGP data
is
transmitted
in plaintext
during
communicat
ion between
the eSight
and SMS
server due
to protocol
limitations.
Therefore,
data may
leak.
CMPPenabled
SMS
servers are
recommend
ed.
l The host name, port, code
protocol, and calling number
of the SMS server are
obtained.
l You have the operation rights
for SMS Settings.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
160
eSight
Operation Guide
5 Setting Alarm Monitoring
Task
Description
Prerequisite
Navigatio
n Path
Important
Notes
Set an
SMS
modem
.
When the
SMS modem
needs to send
SMS
messages,
interworking
parameters of
the SMS
modem must
be set on the
eSight to
ensure
successful
communicatio
n between the
eSight and the
SMS modem.
l An SMS modem has been
installed and commissioned.
In the
navigation
tree on the
left, choose
SMS
Modem.
-
l The following information
about the SMS modem has
been obtained: standard, baud
rate, and serial port connected
to the eSight. (Serial port
connections are secure
hardware-level connections.)
l You have the operation rights
for SMS Settings.
Step 2 Set a notification template. Choose Monitor > Fault Management > Alarm Settings from
the main menu. In the navigation tree on the left, choose Notification Template.
Define the key information to be conveyed in alarms and events, such as the alarm and event
names and time.
Step 3 Set a user group. Choose System > System Settings > Set Notified User from the main
menu. In the navigation tree on the left, choose User Group.
Set the user names, mobile phone numbers, and email addresses of recipients who will then
receive alarms and events from the eSight on their mobile phones and in their email boxes.
Step 4 Set a notification rule. Choose Monitor > Fault Management > Alarm Settings from the
main menu. In the navigation tree on the left, choose Notification Rule.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
161
eSight
Operation Guide
5 Setting Alarm Monitoring
Set the alarms and events to be sent to users. The eSight provides two approaches for this
setting: By Alarm Severity and By Alarm/Event. Select either method based on the site
requirements.
l
By Alarm Severity: If network maintenance personnel need to monitor the overall
running status of networks when they are away from sites, send alarms to them in
batches by alarm severity (such as Critical and Major). The personnel then can handle
the alarms in a timely manner to avoid loss.
l
By Alarm/Event: If network maintenance personnel need to ensure proper running of
key NEs when they are away from sites, send the alarms and events of these NEs to
them. The personnel then can detect issues and take measures in a timely manner.
A remote notification rule is enabled by default once it is created.
NOTE
Only the users who have management rights on all objects included in the rule can enable, disable,
modify, and delete the rule.
----End
5.4 Setting Alarm Monitoring Rules
The eSight provides three types of monitoring rules. Understanding their application scenarios
and effects helps you properly set alarm monitoring rules, which improves monitoring and
alarm handling efficiency.
Table 5-7 describes the tasks related to alarm monitoring rules.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
162
eSight
Operation Guide
5 Setting Alarm Monitoring
Table 5-7 Tasks related to alarm monitoring rules
Task
Description
Prerequisite
Navigation
Path
Important Notes
Set
alarm
maski
ng
rules.
To reduce the alarms
reported to the
eSight during
deployment,
commissioning, or
maintenance, set
alarm masking rules.
You have the
operation rights
for Alarm
Settings.
l Choose
Monitor
> Fault
Manage
ment >
Alarm
Settings
from the
main
menu. In
the
navigatio
n tree on
the left,
choose
Masking
Rule.
Only the users who
have management
rights on all objects
included in the rule can
enable, disable, modify,
and delete the rule.
l Choose
Monitor
> Fault
Manage
ment >
Current
Alarms
from the
main
menu.
Click
in the
Operatio
n column
where the
required
alarm is
located,
and
select Set
Alarm
Masking
Rule.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
163
eSight
Operation Guide
Issue 01 (2016-04-30)
5 Setting Alarm Monitoring
Task
Description
Set
autom
atic
ackno
wledg
ment
rules.
To efficiently handle
the alarms reported
to the eSight, users
can enable automatic
acknowledgment by
severity for the
eSight to
automatically
acknowledge cleared
alarms and then
move the alarms to
the list of historical
alarms. Users do not
need to handle these
alarms manually.
Prerequisite
Navigation
Path
Important Notes
Choose
Monitor >
Fault
Managemen
t > Alarm
Settings
from the
main menu.
In the
navigation
tree on the
left, choose
AutoAcknowledg
e Rule.
—
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
164
eSight
Operation Guide
5 Setting Alarm Monitoring
Task
Description
Set
severit
y
redefi
nition
rules.
To ensure proper
running of key
devices or devices in
key areas, redefine
alarm severities.
(For example,
escalate the severity
of a key alarm.)
Network
maintenance
personnel will
handle the alarms
prior to other alarms
and provide a highquality network
assurance service for
them. The
redefinition takes
effect only on
subsequently
reported alarms that
meet the redefinition
rules.
Prerequisite
Navigation
Path
Important Notes
l Choose
Monitor
> Fault
Manage
ment >
Alarm
Settings
from the
main
menu. In
the
navigatio
n tree on
the left,
choose
Severity
redefiniti
on rule.
Only the users who
have management
rights on all objects
included in the rule can
enable, disable, modify,
and delete the rule.
l Choose
Monitor
> Fault
Manage
ment >
Current
Alarms
from the
main
menu. In
the alarm
list of the
Current
Alarm
window,
click
in the
Operatio
n column
of the
required
alarm,
and
select Set
Severity
Redefinit
ion Rule.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
165
eSight
Operation Guide
5 Setting Alarm Monitoring
5.5 Setting Storage Device Alarm Threshold
This section describes how to set thresholds of performance indicators and capacity usage for
the device and its components. If the performance or capacity usage exceeds the specified
threshold, an alarm occurs.
Procedure
Step 1 On the menu bar, choose Monitor > Fault Management > Storage Threshold Setting.
Step 2 In the Alarm Threshold area, click Setting next to the device you want to modify.
Step 3 Set the threshold alarm status.
You can enable the threshold alarm function or disable the threshold alarm function.
Step 4 (Optional) Configure the alarm threshold.
If you do not need to change the threshold, skip the following steps.
Step 5 Click OK.
----End
5.6 Setting Cloud Service Alarm Notification
This operation allows you to configure the severity of alarms for which alarm notifications
need to be sent and the email addresses of the alarm notification recipients.
Procedure
Step 1 On the menu bar, choose Monitor > Fault Management > Alarm Settings.
Step 2 In the left navigation tree, choose Alarm Settings > Cloud Service Alarm Notification.
Step 3 Click View Contents to read the license agreement.
Step 4 Select I have read and agree to the license agreement.
Step 5 Set Remote Maintenance Status to Enable or Disable.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
166
eSight
Operation Guide
5 Setting Alarm Monitoring
l
If Remote Maintenance Status is set to Enable, you can remotely maintain site devices
after the site information is configured.
l
If Remote Maintenance Status is set to Disable, the remote maintenance function is
unavailable.
Step 6 Set Alarm Severity to Critical, Major, Minor, or Event.
Step 7 In Email, enter the email addresses of the alarm notification recipients.
Step 8 Click Apply. You have finished setting the remote maintenance notification.
----End
5.7 Setting Cloud Service Site Information
After the remote maintenance function is enabled, you can set the site information to remotely
maintain site devices.
Procedure
Step 1 On the menu bar, choose Monitor > Fault Management > Alarm Settings.
Step 2 In the left navigation tree, choose Alarm Settings > Cloud Service Site Information.
Step 3 Set the site information in the right function pane. The following table describes related
parameters:
NOTE
The device alarm information in the site will be sent to the customer 's phone and Email after you
configure the site information.
Issue 01 (2016-04-30)
Parameter
Description
Customer name
Name of the customer.
First customer
contacted person
Name of the contact person of the customer.
First customer
contacted phone
Phone number of the contact person of the customer.
First customer
contacted Email
Email address of the contact person of the customer.
Second customer
contacted person
Name of the second contact person of the customer.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
167
eSight
Operation Guide
5 Setting Alarm Monitoring
Parameter
Description
Second customer
contacted phone
Phone number of the second contact person of the customer.
Second customer
contacted Email
Email address of the second contact person of the customer.
Device location
Location where the customer's devices reside.
Step 4 Click Apply. You have finished setting the site information.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
168
eSight
Operation Guide
6 Setting Performance Monitoring
6
Setting Performance Monitoring
About This Chapter
Before monitoring performance data, you need to set performance monitoring, for example,
setting a performance data collection task and performance monitoring on the home page.
This allows you to take proper methods to efficiently monitor resource performance data.
6.1 About Performance
A resource has its performance counters defined to measure the performance. Through the
eSight, you can comprehensively monitor performance data of its managed resources and the
relationships between resource performance, make an all-round analysis and assessment on
resource performance data, and learn overall operating trends of a network in a timely manner
to better optimize the network. This ensures that the network runs in its optimal state.
6.2 Overview
This topic describes the performance management operations performed in different operation
and maintenance (O&M) scenarios. You can perform operations based on actual O&M
scenarios.
6.3 Setting a Performance Data Collection Task
By default, the eSight provides global settings for performance data collection tasks. You can
define a data collection task as required. Then the eSight will collect performance data
according to the defined task. You can query the performance data on the performance data
page.
6.4 Setting Performance Monitoring on the Home Page
By default, the eSight home page provides performance monitoring portlets. You can save a
historical performance view that concerns you as a home page portlet, which facilitates you in
monitoring historical performance on the home page.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
169
eSight
Operation Guide
6 Setting Performance Monitoring
6.1 About Performance
A resource has its performance counters defined to measure the performance. Through the
eSight, you can comprehensively monitor performance data of its managed resources and the
relationships between resource performance, make an all-round analysis and assessment on
resource performance data, and learn overall operating trends of a network in a timely manner
to better optimize the network. This ensures that the network runs in its optimal state.
Concept
Table 6-1 describes the basic concepts about performance management.
Table 6-1 Performance management concepts
Concept
Description
Performance counter
A performance counter is used to measure resource performance.
For example, devices, ports, central processing unit (CPU), and
memory are resources, and CPU usage and memory usage are
counters. Monitoring the performance counters helps detect
deterioration in the service processing performance and resolve
problems before faults occur.
Counter template
The same type of device has the same counters. You can flexibly
combine and place them into a counter template. You can use the
counter template to create a performance data collection task to
improve efficiency.
A counter template consists of counters and counter thresholds.
Counter threshold
Counter thresholds allow you to configure whether to report
alarms and the severities of the reported alarms.
When the value of a performance counter reaches a specified
threshold, the eSight generates a QoS alarm, indicating that
deterioration in the performance requires your attention. When the
value recovers within the range allowed, the eSight clears the QoS
alarm.
Issue 01 (2016-04-30)
Performance
collection task
A performance collection task is used to collect device
performance data. The eSight collects device performance data
based on collection task attributes and displays the performance
data in graphs, which facilitates performance data query and
analysis.
Measurement object
If there are multiple instances for a resource, the measurement
object defines which instance is measured. For example, if there
are multiple CPUs on a device, the measurement object defines
the CPU to be measured.
Collection object
A collection object is a physical or logical resource that is bound
to performance counters in a collection task.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
170
eSight
Operation Guide
6 Setting Performance Monitoring
Concept
Description
Collection period
A collection period is an interval at which performance data is
collected. For example, if the collection period is five minutes, the
eSight collects data for performance counters of a collection
object at an interval of five minutes.
Monitoring Process
Figure 6-1 shows the performance monitoring process. The two sides connected to the eSight
are users and resources.
Figure 6-1 Performance monitoring process
1. A user creates and
starts a performance
collection task.
After a user creates and starts a performance collection task on
the eSight client, the eSight collects device performance data
based on the task attributes.
2. The eSight collects
device performance data
based on the task
attributes
-
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
171
eSight
Operation Guide
6 Setting Performance Monitoring
3. The eSight displays
performance data and
alarms on the interfaces.
The eSight performance management center displays the
collected performance data on the eSight client, and displays
alarms generated based on the preset performance thresholds in
the current alarm list.
The real-time and historical performance data can be monitored
on the eSight client. For details, see 8.4 Monitoring
Performance.
6.2 Overview
This topic describes the performance management operations performed in different operation
and maintenance (O&M) scenarios. You can perform operations based on actual O&M
scenarios.
Before performing performance management operations, you need to be familiar with the
basic concepts about performance management, such as performance counter and counter
threshold. See 6.1 About Performance. Understanding these concepts will help you avoid
errors when performing performance management operations.
Figure 6-2 shows the overview of performance management operations.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
172
eSight
Operation Guide
6 Setting Performance Monitoring
Figure 6-2 Overview of performance management operations
6.3 Setting a Performance Data Collection Task
By default, the eSight provides global settings for performance data collection tasks. You can
define a data collection task as required. Then the eSight will collect performance data
according to the defined task. You can query the performance data on the performance data
page.
Procedure
Step 1 Choose Monitor > Performance Management > Monitoring Template from the main
menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
173
eSight
Operation Guide
6 Setting Performance Monitoring
Step 2 Optional: Set a monitoring template. Click Create. Complete the template settings on the
page that is displayed.
The same type of device has the same counters. You can flexibly combine and place them into
a counter template. You can use the counter template to create a performance data collection
task to improve efficiency. When the default counter templates provided by the eSight cannot
meet performance data collection requirements, you can create a counter template for a
performance data collection task.
NOTE
When a device is in the locked or disabled state, the eSight does not handle alarms of the device and
device alarms are not cleared or reported if you modify threshold conditions in an indicator template.
Step 3 Choose Monitor > Performance Management > Monitoring Settings from the main menu.
Step 4 Create a performance data collection task. Select a desired resource type and click Create.
Complete the task settings on the page that is displayed.
By default, the eSight provides global settings for performance data collection tasks. If the
global settings do not meet performance data collection requirements, create a performance
data collection task as required.
You can select resources by group when creating a performance data collection task. The
groups are divided when resources connect to the eSight. The eSight has the following four
recommended grouping methods:
l
By device type: Resources are grouped by device type.
l
By VIP user: Considering the importance of monitored devices, resources are grouped
by VIP user.
l
By area: Resources are grouped by monitored area.
l
By network layer: Resources are grouped by network layer, such as the access,
aggregation, and core network layers.
After you finish creating a performance data collection task, it is advisable to view data on the
Performance Data page after two data collection periods elapse. For example, if the data
collection period of a task is 5 minutes, it is a good idea to view data on the Performance
Data page after 10 minutes.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
174
eSight
Operation Guide
6 Setting Performance Monitoring
6.4 Setting Performance Monitoring on the Home Page
By default, the eSight home page provides performance monitoring portlets. You can save a
historical performance view that concerns you as a home page portlet, which facilitates you in
monitoring historical performance on the home page.
Procedure
Step 1 Optional: Save a historical performance view that is frequently queried as a home page
portlet.
1.
Choose Monitor > Performance Management > Performance Data from the main
menu.
2.
On the Overview tab page, choose a navigation node. In the right pane, set filter criteria
to filter out or search for a desired resource record.
3.
Select a resource record and click Historical Data to view its historical performance
data.
4.
in the upper left corner of each view. In the Save As Home Page Portlet
Click
dialog box, set the view name and description, and click OK.
The historical performance data view of the record will be displayed in the Customize
Homepage dialog box of the Home page.
Step 2 On the Home page, set a performance monitoring view.
1.
Choose Home from the main menu. Select a desired home page and click Customize in
the upper right corner.
2.
Click
of a desired portlet to display it on the home page.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
175
eSight
Operation Guide
7 Setting the Home Page
7
Setting the Home Page
The eSight can use portlets to display device status data and assign portlets to different home
pages. This helps you monitor key device status and detect abnormal devices and handle the
faults in a timely manner, which ensures normal device running.
Context
Portlets are views that display device and network-wide status in lists, curves, and bar charts.
Portlets are displayed in each area of a home page.
Creating a Home Page
If there are a lot of portlets need to be concerned, you can create a home page to display
portlets by some dimensions. This helps you monitor device status in an easy manner.
Procedure
Step 1 On the Home page, click
.
Step 2 In the Create Portal dialog box, set the name of the new home page and the portlets to be
displayed.
1.
Issue 01 (2016-04-30)
In the Create Portal dialog box, enter the name of the new home page.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
176
eSight
Operation Guide
7 Setting the Home Page
2.
Select the portlets to be displayed on each portlet tab page.
–
All portlets are displayed on the All tab. The default portlets are displayed on the
Alarms and Monitor tab. The customized portlets are displayed on the Custom
tab.
–
To search for the portlet, enter a keyword in the text box in
.
3.
Click
of a target portlet to display it in the new home page.
The icon is changed from
portlet.
to
. You can click
to cancel the display of the
Step 3 Optional: In the upper right corner of the Create Portal dialog box, select the layout mode of
the home page portlet.
Step 4 Click Close.
----End
Maintaining a Home Page
You can maintain a home page by performing operations listed in the following table.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
177
eSight
Operation Guide
7 Setting the Home Page
Task
Procedure
Displaying and hiding a portlet
You can display only the portlets that you concern on
a home page and hide those that you do not concern.
This enables you to discover and process abnormal
device status issues in a timely manner.
1. On the Home page, click Customize on the upper
right corner.
2. In the Customize Homepage dialog box, display
or hide a portlet.
of a target portlet to display it in the
l Click
home page.
The icon is changed from
to
.
l Click
of a target portlet to hide it from the
home page.
The icon is changed from
to
.
3. Click Close.
Modifying the home page name
After portlets on a home page change, you can modify
the home page name to re-identify the home page.
This allows you to quickly locate to the home page.
The Home name cannot be redefined.
1. Move the pointer to the name of a target home
page to display
2. Click
Displaying a home page on the
top
icon.
, and select Rename.
You can display a home page that you concern on the
top. This allows you to quickly locate to the home
page. You cannot display the Home page on the top.
1. Move the pointer to the name of a target home
page to display
2. Click
Deleting a home page
icon.
, and select Top.
You can delete redundant home pages. The Home
cannot be deleted.
1. Move the pointer to the name of a target home
page to display
2. Click
icon.
, and select Remove.
3. In the Confirm dialog box, click Yes.
Managing Portlets
You manage portlets by performing operations listed in the following table based on service
requirements.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
178
eSight
Operation Guide
7 Setting the Home Page
Task
Procedure
Periodically refreshing a portlet
You can define the interval for refreshing a portlet.
1. Move the pointer to the upper right corner of a
target portlet to display the tool icon.
2. Click , and select an interval from the Refresh
interval (mins) drop-down list.
3. Click Save.
Manually refreshing a portlet
Zooming in on and zooming out
of a portlet
Click
in the upper right corner of a target portlet
to refresh its data.
You can zoom in on or zoom out of a portlet.
1. Move the pointer to the upper right corner of a
target portlet to display the tool icon.
2. Zoom in on and zoom out of the portlet.
l Click
to maximize the portlet.
The icon is changed from
to
. You can
to restore the default size of the
click
portlet.
l Click
to minimize a portlet.
The icon is changed from
to
. You can
to restore the default size of the
click
portlet.
Closing a portlet
You can hide portlets that you do not concern from a
home page.
1. Move the pointer to the upper right corner of a
target portlet to display the tool icon.
2. Click
.
3. In the Confirm dialog box, click Yes.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
179
eSight
Operation Guide
8 Monitoring the Network
8
Monitoring the Network
About This Chapter
The primary objective of network operation and maintenance (O&M) is to monitor network
alarms and performance and locate and rectify faults in a timely manner. You can analyze
network alarms and performance to detect potential problems and take measures.
8.1 Monitoring Methods
The eSight provides various flexible centralized monitoring methods for you to monitor
networks. It shows network health and quality based on which you can perform O&M
efficiently.
8.2 Monitoring the Network Running Status in Topologies
eSight displays the network running status in different colors in physical and IP topologies.
This is the most frequently-used network monitoring approach for a majority of users.
8.3 Monitoring Network Faults Through Alarms
You can monitor alarms to detect, locate, and rectify network or device faults more quickly.
The eSight provides various alarm monitoring methods and multidimensional alarm data
statistics. You can select a proper alarm monitoring method to improve alarm monitoring
efficiency.
8.4 Monitoring Performance
On the eSight, you can view performance data and graphic performance trend views of
resources. The performance data provides a basis for network optimization, which facilitates
network O&M personnel in taking timely measures to avoid latent faults.
8.5 Big Screen Monitoring
In the scenarios such as operation and maintenance (O&M) centers and exhibition halls,
statistics collected and information monitored by eSight are displayed in big high-resolution
screens so as to facilitate centralized monitoring, presentation and reporting.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
180
eSight
Operation Guide
8 Monitoring the Network
8.1 Monitoring Methods
The eSight provides various flexible centralized monitoring methods for you to monitor
networks. It shows network health and quality based on which you can perform O&M
efficiently.
The eSight provides various monitoring methods, as shown in Figure 8-1 and Table 8-1.
Figure 8-1 Monitoring methods
Table 8-1 Monitoring method description
Issue 01 (2016-04-30)
Cla
ssifi
cati
on
Prin
cipl
e
Monitori
ng
Method
Description
Characteristi
cs
Navigation
Path
Mon
itore
d
obje
ct
Monitori
ng alarms
The eSight provides
management functions such as
monitoring network alarms,
querying alarms or events, and
setting remote alarm
notifications. These functions
help you quickly detect, locate,
and rectify network faults.
Network-wide
alarms can be
managed in a
centralized
manner.
Choose Monitor
> Fault
Management >
Current Alarms
from the main
menu.
Monitori
ng
performa
nce
The eSight provides functions
such as setting performance data
collection tasks and monitoring
historical or real-time network
performance (for example, CPU
and memory usage). These
functions help you learn network
performance trends, detect
potential problems in a timely
manner, and take measures. This
ensures normal and normal
network operation.
Network-wide
performance
can be
managed in a
centralized
manner.
Choose Monitor
> Performance
Management >
Performance
Data from the
main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
181
eSight
Operation Guide
8 Monitoring the Network
Cla
ssifi
cati
on
Prin
cipl
e
Monitori
ng
Method
Description
Characteristi
cs
Navigation
Path
Net
wor
kwide
mon
itori
ng
Home
page
monitori
ng
l You can monitor network
running status using portlets
on the home page, identify
the issues to be handled, and
set priorities for them.
The network
data shown by
portlets on the
home page
helps you
learn the alarm
and
performance
status of
network-wide
or key
resources.
Choose Home
from the main
menu.
eSight
supports highresolution
projection
screens (single
screen without
borders) and
big screens
joint by
television
screens
(multiple
screens with
borders).
When a big
screen is joint
by multiple
small screens
(units), it is
advisable to
set the number
of small
screens and
the resolution
of each small
screen based
on site
requirements.
Choose Monitor
> Monitor Tools
> Big Screen
Monitor from
the main menu.
l You can monitor the running
status of key resources.
l You can learn current
network components and
condition and report the
information to the superior
unit.
Big
screen
monitori
ng
Issue 01 (2016-04-30)
In the scenarios such as
operation and maintenance
(O&M) centers and exhibition
halls, statistics collected and
information monitored by eSight
are displayed in big highresolution screens so as to
facilitate centralized monitoring,
presentation and reporting.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
182
eSight
Operation Guide
8 Monitoring the Network
Cla
ssifi
cati
on
Prin
cipl
e
Monitori
ng
Method
Description
Characteristi
cs
Navigation
Path
Topology
monitori
ng
Topology monitoring provides
two methods: monitoring using
the physical topology and
monitoring using a custom
topology.
Topology
views are used
to
comprehensive
ly monitor the
entire network
and network
details, such as
the alarm and
performance
status of
network-wide
or key
resources.
Choose Monitor
> Topology >
Topology
Management
from the main
menu.
l The physical topology allows
you to view the entire
network, which allows you to
monitor NE running status
such as NE alarms and
performance data in a
centralized manner.
l A custom topology allows
you to monitor NE alarms
and performance in your
management scope, which
achieves precise monitoring
and efficient operation and
maintenance (O&M).
8.2 Monitoring the Network Running Status in Topologies
eSight displays the network running status in different colors in physical and IP topologies.
This is the most frequently-used network monitoring approach for a majority of users.
Checking the Networking
Step 1 Choose Monitor > Topology > Topology Management from the main menu.
Step 2 Check the networking in the Topology Management window.
----End
Checking the Network Running Status
I
n eSight, the color, running status, and judgment standard and rectification method for
abnormal status vary according to the topology object type.
Table 8-2 provides the mapping between running status and icon colors for subnets and
devices.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
183
eSight
Operation Guide
8 Monitoring the Network
Table 8-2 Mapping between running status and icon colors for topology objects
Running Status of a
Topology Object
Icon Color
Online
Green
Normal
Abnor
mal
Offline
Subnet
Device
Link
Green
Green
Unknow
n alarm
-
-
Blue
Suggesti
on alarm
Sky blue
Sky blue
-
Minor
alarm
Yellow
Yellow
-
Major
alarm
Orange
Orange
Orange
Critical
alarm
Red
Red
Red
Gray
Gray
Gray
Abnormal
Subnet
Running status of a subnet (physical subnet or IP subnet) reflects the running status of devices
on the subnet. Table 8-2 provides the mapping between running status and icon colors for
subnets.
The icon color of a subnet is the icon color of the device whose running status is the worst.
For example:
l
A subnet is in the offline state (the icon color is gray
are in the following states: offline (the icon color is gray
icon color is red
l
) when devices on the subnet
), critical alarm (the
), and unknown alarm (the icon color is blue
).
A subnet is in the critical alarm state (the icon color is red
) when devices on
) and
the subnet are in the following states: critical alarm (the icon color is red
suggestion alarm (the icon color is sky blue
).
When a device on the subnet is faulty, the subnet is faulty. The fault of the subnet is rectified
when the device fault is rectified. For details, see Device.
Device
l
In a topology, the icon color of a device reflects the running status of the device. Table
8-2 provides the mapping between running status and icon colors for devices.
When the running status of a device is abnormal, perform related operations based on the
following rules:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
184
eSight
Operation Guide
8 Monitoring the Network
a.
If the device icon is sky blue, yellow, orange, or red, handle the alarm as prompted.
b.
If the device icon is gray, perform further analysis according to Table 8-3.
Table 8-3 Possible causes and solutions for the offline state
l
Possible Cause
Solution
The device is powered off.
Power on the device.
The IP address of the device is
changed.
1. Delete the device.
2. Add the device to eSight again.
Users can move the mouse to a device in the topology to view details, such as device
name and IP address.
NOTE
If a device supports the display of performance data in the topology, create a performance collection
task of the device in advance, so that collected devices can be displayed.
Link
When devices are discovered and added to eSight, the links between devices are automatically
discovered and displayed in topologies. Table 8-4 lists the link support for devices on eSight.
NOTE
The following requirements must be met when the links between IP switches and devices are displayed.
l IP link management relies on terminal access components. The terminal access components must be
installed.
l After devices and the IP switches that are connected to the devices are discovered, the terminals
must be discovered on the entire network to ensure that links can be displayed.
l When the connections between the devices and switches are changed, you must periodically or
manually discover the terminals on the entire network to update the links in the topology.
Table 8-4 Link support for devices on eSight
Device Type
Description
Network device
Supports link display.
Links can be manually discovered for Huawei
devices.
UC&C device
Does not support link display.
Storage device
Supports link display.
Server
Supports link display.
NOTE
l Does not support link display of server daughter
cards.
l Does not support link display of the RH2285 V1,
XH620 V1, or T3000 server.
l Does not support link display of the E6000 or E9000
server.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
185
eSight
Operation Guide
8 Monitoring the Network
Device Type
Description
Host
Supports link display.
Computing virtualization device
Supports link display.
Links exist between virtual servers and machines
under FusionCompute, indicating affiliation
relationships.
MicroDC
Supports link display.
Supports automatic link discovery of CCUs and IP
cameras. Does not support automatic link discovery
of ECCs.
eLTE device
Does not support link display.
In a topology, the icon color of a link reflects the running status of the link. Table 8-2
provides the mapping between running status and icon colors for links.
The running status of a link is determined by the status (up or down) of the interfaces at the
two ends of the link. Table 8-5 provides the mapping among link running status, link icon
colors, and interface status.
Table 8-5 Mapping among link running status, link icon colors, and interface status
Link Running Status
Onlin
e
Normal
Abnor
mal
Icon Color
Green
Link Status and Interface
Status
Admin
Status
Operational
Status
up
up
Major
alarm
Orange
down
down
Critical
alarm
Red
up
down
When the running status of a link is abnormal, perform related operations based on the
following rules:
1.
2.
Issue 01 (2016-04-30)
If the link icon is orange or red, change the status of the interfaces at the two ends of the
link, that is, set Admin Status and Operational Status to up.
–
To set Admin Status to up, directly use eSight to set the status.
–
To set Operational Status to up, configure internal loopback for device ports or
directly connect a network cable to the device.
If the link color is gray, at least one of the two devices connected by the link is offline.
To rectify the fault, bring the offline device online. For details, see Table 8-3.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
186
eSight
Operation Guide
8 Monitoring the Network
Performing Quick Diagnosis
You can quickly diagnose the links and carried services between source and destination
devices.
NOTE
The quick diagnosis feature supports only network devices.
Prerequisites
An SLA task has been created and a source device has been configured with the SLA task.
Procedure
Step 1 Choose Monitor > Topology > Topology Management from the main menu.
Step 2 On the topology toolbar in the Physical topology window, choose
Diagnosis.
> Create Quick
Step 3 Select a source device in the topology.
Step 4 Select a destination device in the topology.
Step 5 Set the interface of the destination device.
Step 6 Click OK.
Step 7 Click Start diagnose. The implementation status, connectivity status, and other diagnosis
parameter values are displayed.
----End
8.3 Monitoring Network Faults Through Alarms
You can monitor alarms to detect, locate, and rectify network or device faults more quickly.
The eSight provides various alarm monitoring methods and multidimensional alarm data
statistics. You can select a proper alarm monitoring method to improve alarm monitoring
efficiency.
Monitoring Alarms
Table 8-6 describes the alarm monitoring methods.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
187
eSight
Operation Guide
8 Monitoring the Network
Table 8-6 Alarm monitoring methods
Task
Description
Prerequisite
Navigation Path
Monitor
alarms
in the
alarm
list of
the
Current
Alarms
window.
In the Current Alarms window,
set filter criteria or search out the
alarms that concern you and need
to be handled. The alarms that are
acknowledged and cleared are
automatically moved from the list
of current alarms to the list of
historical alarms.
You have the
operation rights
for Browse
Current Alarms.
Choose Monitor >
Fault Management
> Current Alarms
from the main menu.
Monitor
alarms
in the
alarm
panel of
the
Current
Alarms
window.
The alarm panel
l A topology
view has been
set up.
Choose Monitor >
Topology >
Topology
Management from
the main menu.
Monitor
alarms
in the
topolog
y view.
Characteristics: All current
alarms that occur on all NEs and
the eSight are monitored in real
time.
in the upper
right corner of the Current
Alarms window shows severityspecific statistics on uncleared
alarms and statistics on cleared
alarms. This helps you learn the
alarm handling progress.
Characteristics: The severityspecific statistics on uncleared
and cleared alarms are quickly
obtained and users can learn the
alarm handling progress.
In the physical topology or a
custom topology view, you can
learn the overall running status of
NEs and subnets from their colors
that indicate the highest severity
of alarms on the NEs and subnets.
You can right-click an NE or a
subnet and choose View Alarm
from the shortcut menu to view
current alarms.
l You have the
operation
rights for
Browse
Current
Alarms.
Characteristics: The overall
running status of networks is
monitored in a graphical and
intuitive way and the current
alarms can be queried.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
188
eSight
Operation Guide
8 Monitoring the Network
Task
Description
Prerequisite
Navigation Path
Monitor
alarms
in the
resource
view.
In the resource view, you can
view current alarms of resources
managed by the eSight to learn
the running status of these
resources and rectify faults in a
timely manner.
l You have the
operation
rights for
Access
Resource.
1. Choose Resource
> Resource
Management >
Device Type from
the main menu.
l The resource
management
window is
available for
the devices to
be viewed.
2. Choose device
type from the
navigation tree on
the left.
Characteristics: Current alarms
are monitored in the resource
view.
3. In the device list
on the right of the
Resource View
page, click device
name in the
Name column
where the target
device is located.
Query
events.
Query events.
You have the
operation rights
for Browse
Events.
Choose Monitor >
Fault Management
> Event from the
main menu.
Query
historica
l alarms.
Query historical alarms.
l You have the
operation
rights for
Browse
Historical
Alarms.
Choose Monitor >
Fault Management
> Historical Alarms
from the main menu.
l Historical
alarms have
not been
dumped.
Query
masked
alarms.
Query masked alarms.
You have the
operation rights
for Browse
Masked Alarms.
Choose Monitor >
Fault Management
> Masked Alarms
from the main menu.
Handling Alarms
Handle alarms based on the following process when alarms are detected.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
189
eSight
Operation Guide
8 Monitoring the Network
Figure 8-2 Alarm handling process
Step 1 Synchronize NE alarms manually. Choose Monitor > Fault Management > Alarm
Synchronism from the main menu.
If the eSight cannot receive alarms from an NE because of disconnection, manually
synchronize alarms from the NE.
Step 2 View the alarm details. Obtain key alarm information, including alarm names, handling
suggestions, and location information, to facilitate fault diagnosis and troubleshooting for
network maintenance personnel.
1.
Issue 01 (2016-04-30)
Choose Monitor > Fault Management > Current Alarms from the main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
190
eSight
Operation Guide
8 Monitoring the Network
2.
On the Current Alarms page, click the arrow before a target alarm to expand alarm
details.
NOTE
To view complete alarm details, click More.
Step 3 Acknowledge the alarm manually. In the alarm list of the Current Alarms window, select
one or more alarms and click Acknowledge.
To inform other users that an alarm is under someone's charge and avoid rework,
acknowledge the alarm before handling it.
After the alarm is acknowledged, the Acknowledged By column displays the user who
acknowledges the alarm.
Step 4 Rectify the fault.
Based on the repair suggestions in the alarm details and the running status of the eSight, you
can handle the alarm.
Step 5 Check the troubleshooting result.
l
ADAC alarm
The alarm is automatically cleared when the system detects the fault that causes the
alarm is rectified. After the fault is rectified, the alarm is automatically moved to the list
of historical alarms. Choose Monitor > Fault Management > Historical Alarms from
the main menu. You can find the alarm in the Historical Alarms window.
l
ADMC alarm
Manually clear the alarm when the fault that causes an alarm has been rectified. In the
alarm list of the Current Alarms window, select one or more alarms and click Clear.
The alarm is then moved to the Historical Alarms window if it has been acknowledged
or retained in the Current Alarms window with the background changed from white to
green if it has not been acknowledged.
Step 6 Record alarm handling experience.
After handling an alarm, record the handling experience in the knowledge base. If the same
type of alarm occurs again, personnel can handle it efficiently.
The eSight provides multiple navigation paths for recording alarm handling experience.
l
Choose Monitor > Fault Management > Alarm Settings from the main menu. In the
navigation tree on the left, choose Handling Experience.
l
On the Current Alarms or Historical Alarms page, click the arrow before a target
alarm to expand alarm details. Click
in the Handling experience area box.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
191
eSight
Operation Guide
8 Monitoring the Network
8.4 Monitoring Performance
On the eSight, you can view performance data and graphic performance trend views of
resources. The performance data provides a basis for network optimization, which facilitates
network O&M personnel in taking timely measures to avoid latent faults.
Querying Performance Data
On the performance data page, you can monitor network-wide performance data details, query
real-time and historical performance data of resources in a one-stop manner, and export
performance data. This allows you to achieve swift and comprehensive analysis on resource
performance.
Step 1 Choose Monitor > Performance Management > Performance Data from the main menu.
Step 2 Monitor network-wide resource performance. On the Overview tab page, choose a navigation
node. In the right pane, view performance data of each resource type to have an overview of
network-wide resource performance.
Step 3 Monitor resource performance that concerns users. On the Overview tab page, choose a
navigation node.
1.
In the right pane, set filter criteria to filter out or search for a desired resource record.
2.
Optional: Click Add to Favorites.
You can save frequently monitored resources to My Favorites by a mode, for example,
by group, to efficiently monitor resource performance data that you manage. For
example, to quickly check performance of devices in a president office, you can search
out the devices in the president office and add them to My Favorites. You can directly
view the performance on the My Favorites tab page.
3.
Select a resource record and click Realtime Detail or Historical Data to view its realtime or historical performance data.
NOTE
Some historical performance data may be dumped to a specified file directory, which will lead to
improper display of eSight data. For the triggering conditions of dumping performance data, see
13.7 Setting eSight Data Overflow Dump.
4.
Optional: Export performance data.
In the left pane, you can click the Overview tab page and choose any node from the
navigation tree. In the right pane, select records and click Realtime Detail or Historical
Data. Then export performance data that concerns you.You can export real-time and
historical performance data, which provides support for you to offer a performance
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
192
eSight
Operation Guide
8 Monitoring the Network
analysis report, comprehensively analyze resource performance trends, and summarize
network optimization solutions.
----End
Querying Performance Data on the Home Page
On the home page, you can monitor performance data overviews using graphs. This allows
you to quickly and efficiently learn the overall network performance.
Step 1 Choose Home from the main menu. Select a home page and query performance data that
concerns you.
----End
8.5 Big Screen Monitoring
In the scenarios such as operation and maintenance (O&M) centers and exhibition halls,
statistics collected and information monitored by eSight are displayed in big high-resolution
screens so as to facilitate centralized monitoring, presentation and reporting.
Context
After idle time setting is enabled on the eSight, the client automatically logs out if no
operation is performed on it in a specified period. Then the big screen displays the login page.
The navigation path for idle time setting is System > Administration > User Management >
Idle Time Setting.
Procedure
Step 1 Choose Monitor > Monitor Tools > Big Screen Monitor from the main menu.
(Total unit screens)and
(Unit screen
Step 2 In the upper right corner of the page, set
resolution).
eSight supports high-resolution projection screens (single screen without borders) and big
screens joint by television screens (multiple screens with borders). When a big screen is joint
by multiple small screens (units), it is advisable to set the number of small screens and the
resolution of each small screen based on site requirements.
For example, you can set the screen layout to 2*2 and the resolution to 1024*768. This means
that a big screen is divided into four small screens and the resolution of each small screen is
1024 x 768.
Step 3 Set the data to be displayed in the big screen.
1.
In the upper right corner of the big screen monitor view, click Customize.
2.
In the Customize View dialog box, click
or
to display the portlet or cancel it.
Step 4 Adjust portlet size as required and drag them to proper locations. Then click
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
.
193
eSight
Operation Guide
8 Monitoring the Network
Newly added portlets overlap. You need to use a pointer to drag them so that they are
displayed properly without overlapping.
Step 5 Click Show and press F11 to display the current view in a full screen.
Step 6 Optional: Create a big screen monitoring view.
Create a view only when the default view cannot meet all monitoring requirements. For
example, display portlets by some dimensions to facilitate monitoring.
in the upper part.
1.
On the big screen monitor page, click
2.
In the Create View dialog box, set the name of the new view and the portlets to be
displayed.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
194
eSight
Operation Guide
9
9 Managing Network Devices and Services
Managing Network Devices and Services
About This Chapter
eSight is developed by Huawei for the management of enterprise networks, such as enterprise
park, campus, branch, and data center networks. It implements unified management of and
intelligent interaction between enterprise resources, services, and users.
eSight network devices and services management capabilities include:
l
Manages the alarms, performance, configurations, and security of devices from multiple
vendors on a network in a unified manner.
l
Monitors and manages wireless local area networks (WLANs).
l
Monitors and manages Multiprotocol Label Switching (MPLS) virtual private networks
(VPNs).
l
Monitors and analyzes network quality through service level agreement (SLA) Manager
and Network Traffic Analyzer (NTA).
9.1 Managing Network Devices
You can manage networks devices, including viewing device information, configuring device
parameters, and configuring interfaces.
9.2 SVF Management
9.3 Network Device Configuration Management
The configuration management of network device includes smart configuration tool, device
configuration file management, MIB management, and NE software management.
9.4 User-Defined Device Management
When managing a network containing devices from multiple manufacturers, eSight allows
you to customize devices of the Huawei Device, H3C Device, Cisco Device, and Unknown
types to reduce operation and maintenance costs.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
195
eSight
Operation Guide
9 Managing Network Devices and Services
9.1 Managing Network Devices
You can manage networks devices, including viewing device information, configuring device
parameters, and configuring interfaces.
9.1.1 Querying an NE
This topic describes how to monitor an NE by querying the basic information, panels, and
alarm and performance of the NE.
9.1.1.1 Querying Basic Information
This topic describes how to view basic information about NEs.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 Query the basic information of the NE in the Basic Information pane on the right.
In the pane, you can perform the following operations.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
196
eSight
Operation Guide
9 Managing Network Devices and Services
Operation
Description
Modifying NE
information
Click Modify. In the window that is displayed, modify the NE basic
information and click OK.
NOTE
If the NE information fails to be modified, the possible causes are as follows:
The parameter value length exceeds the maximum allowed by the NE; the
SNMP parameters are set incorrectly.
Refreshing NE
status
Click Refresh. eSight synchronizes the basic information of the NE
and refresh the NE status.
Logging in to a
device
l Choose Telnet > TelnetClient to log in to the device through the
Telnet client of the operating system.
l Choose Telnet > WebTelnet to log in to the device through the
web page.
NOTE
l Configure the Telnet parameters before performing this step. For details,
see 9.1.2.2.1 Setting NE Telnet Parameters on eSight.
l If the Telnet client of the operating system cannot be invoked in the
browser, solve the problem by referring to 15.4.1.2 What Do I Do When
an eSight Opened Using Windows Internet Explorer Failed to
Connect to a Device in Telnet Mode?.
Performing Ping
test
Click Ping. In the window that is displayed, set the ping information.
After you click Ping, the test result is displayed in the Ping window
when the ping test is complete. The ping test is intended to verify the
connectivity between eSight and the device.
Performing Trace
test
Click Trace. In the displayed dialog box, view the test result. The
trace test is intended to verify the connectivity between eSight and
the device and trace the route information.
Synchronizing
device data
Click Synchronize Device Data to synchronize device data to
eSight. In the window that is displayed, you can view the detailed
information of the synchronized device.
Performing MIB
operations
Click MIB Management and perform related MIB operations for the
device on the page that is displayed.
NOTE
On the MIB management page, you can connect eSight to the device without
setting the IP address or SNMP parameters and perform the MIB operations
for the device.
Viewing detailed
device information
Click View and select an option from the drop-down list box to view
the corresponding detailed device information.
Turning on or off
the indicator
Click Light On to turn on the indicator on a device.
NOTE
l If a fault is detected in eSight, you can click this button to turn on the
indicator for the maintenance personnel to quickly locate the faulty device.
When the fault is rectified, you can click Light Off to turn off the
indicator.
l Only TOR switches CE5800 and CE6800 are supported.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
197
eSight
Operation Guide
9 Managing Network Devices and Services
Operation
Description
Viewing
performance KPIs
In the KPI pane, you can view the key performance information
about an NE.
Viewing the top 10
alarms
In the TOP 10 Alarms pane, you can view the top 10 alarms about
an NE.
Viewing the
interface traffic
In the Interface Flow pane, you can view the interface traffic about
an NE.
----End
9.1.1.2 Viewing the Device Panel
This topic describes how to view the slot, board, subcard, and port parameters on the device
panel.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose View > Device Panel.
Step 3 Move the cursor to a board, subcard, or port.eSight displays the parameter information of the
board, subcard, or port.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
198
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Optional: Click Zoom In, Zoom Out, Refresh, or Display Legend to implement
corresponding operations.
Step 5 Optional: Right-click a board, subrack, or port and perform any of the following operations:
l
Browsing alarms: View alarms on boards and ports of an NE and learn about the current
board and port operating status. For details, see 8.3 Monitoring Network Faults
Through Alarms.
l
Customizing a device panel: Draw a picture to customize a device panel. For details,
see 9.4.6.4 Customizing the Device Panel.
l
Binding a device panel: Bind a created device panel with an NE.
l
Viewing device information: View device information such as the device version, power
supply and fan, storage space, board, clock, and system resource usage.
l
Viewing board information: View board information such as the board, CPU usage,
memory, voltage, temperature, logs, and rated power.
l
Viewing and configuring ports: Enable and disable ports, view port info and view optical
module info.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
199
eSight
Operation Guide
9 Managing Network Devices and Services
NOTE
l You can view the preceding information of only Huawei devices.
l Telnet parameters must be set correctly for devices so that the preceding information can be viewed
properly.
----End
9.1.1.3 Querying the Alarm List
This topic describes how to view the NE alarm list to know the current alarm information.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
200
eSight
Operation Guide
9 Managing Network Devices and Services
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose View > Alarm List.
Step 3 In the Alarm List window, you can perform the other steps.
----End
9.1.1.4 Querying Performance Status
This topic describes how to view NE performance status to know the current performance
information.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose View > Performance Status.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
201
eSight
Operation Guide
9 Managing Network Devices and Services
----End
9.1.1.5 Viewing the VS Management Information
You can view the Virtual System (VS) management system to learn about the Admin-VS
management information about VS devices and port allocation information about VS devices.
Prerequisites
Admin-VS has been added to eSight.
Context
l
VS devices communicate with eSight through the Netconf protocol.
l
VS devices are divided into Admin-VS and VS. Admin-VS is used to manage VS
devices. Admin-V has permission to view information about VS devices under its
supervision, while VS devices do not have permission to view information about AdminVS or other VS devices.
l
The VS Management menu in the navigation tree is available only when users view
Admin-VS information, and is not available when users view VS information.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
202
eSight
Operation Guide
9 Managing Network Devices and Services
Step 2 Synchronize the VS management information.
1.
In the navigation tree on the left, choose VS Management > VS List.
2.
Click Synchronize. The VS management information is synchronized on the VS List
and Port List pages.
NOTE
Before synchronization, set Netconf parameters in the NMS same as these parameters on devices.
Otherwise, the synchronization fails. For details, see Set Netconf Parameters in the NMS.
Step 3 Check the VS list.
In the navigation tree on the left, choose VS Management > VS List and check the VS list.
NOTE
l If Admin-VS is added to eSight, VS devices under Admin-VS's supervision are displayed in the VS
list even though they are not added to eSight.
l If VS devices are added to eSight, Managed is displayed in the Network Management Status
column. If VS devices are not added, Unmanaged is displayed in the Network Management
Status column.
Step 4 Check the port list.
In the navigation tree on the left, choose VS Management > Port List and check the port list.
----End
9.1.1.6 Viewing Power Management
You can view the power usage of device's power modules to determine whether the current
network needs to be expanded or adjusted.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
203
eSight
Operation Guide
9 Managing Network Devices and Services
Context
Power over Ethernet (PoE) provides data signals and DC power supplies for IP-based
terminals such as the IP phone, access point (AP) of the wireless local area network (WLAN),
and network camera, without the need to modify the current Ethernet architecture. The PoE
technology ensures the security of the cabling structure and normal running of the network. In
addition, it lowers the costs to the maximum degree.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 Choose View > Power Management from the navigation tree.
----End
9.1.2 Configuring an NE
NE configuration includes the NE configuration method, protocol parameters, interfaces, and
restoration of the NE configuration file.
9.1.2.1 Logging In to Web NMS
The eSight provides the link to the web NMS so that you can configure the NE conveniently.
Prerequisites
The NE supports web NMS and the function has been enabled.
Procedure
Step 1 Access the NE manager page.
1.
Issue 01 (2016-04-30)
Choose Resource > Resources Management > Network Device from the main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
204
eSight
Operation Guide
9 Managing Network Devices and Services
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > Web NMS.
----End
9.1.2.2 Setting Protocol Parameters
To implement normal communication between eSight and an NE, you should set the protocol
parameters of eSight.
9.1.2.2.1 Setting NE Telnet Parameters on eSight
During site deployment and daily maintenance, the Telnet parameter settings must be the
same on eSight and devices.
Prerequisites
A device is added to eSight.
Context
l
You can set Telnet parameters for one or more devices in eSight.
l
To be consistent with parameters on devices, Telnet parameters are set and modified on
eSight and will not be delivered to devices.
l
Set Telnet parameters for one device.
Procedure
Issue 01 (2016-04-30)
a.
Choose Resource > Resource Management > Network Device from the main
menu.
b.
In the navigation tree, choose Network Device.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
205
eSight
Operation Guide
9 Managing Network Devices and Services
c.
Click the name of a device. The NE manager page is displayed.
d.
In the navigation tree, choose Protocol Parameters > Telnet Parameters.
e.
Set the parameters and click Test.
Table 9-1 Parameter Description
Parameter
Description
Protocol type
Protocol type: The value can be Telnet or STelnet. STelnet is
used in scenarios demanding high security.
NOTE
The Telnet protocol is insecure. STelnet is recommended because it is
secure.
f.
l
Authentication mode: authentication mode used by eSight to
access network elements.
Port
Communication port. By default, the Telnet port number is 23
and the STelnet port number is 22.
Timeout
interval(s)
Period for waiting for a response after eSight sends a request
to a network element.
Privilege model
Privilege model: right for eSight to deliver commands to
network elements. When you select Privilege model and log
in to a network element using Telnet or STelnet, eSight
switches to the corresponding privilege model.
Privilege level
A larger value indicates a higher priority. Users can use only
the commands at the same or lower level than their own
levels.
Click Apply when the test is successful.
Set Telnet parameters for multiple devices.
a.
Issue 01 (2016-04-30)
Authentication
mode
Choose Resource > Resource Management > Network Device from the main
menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
206
eSight
Operation Guide
9 Managing Network Devices and Services
b.
In the navigation tree, choose Network Device.
c.
In the device list, select one or more records, and click Set Protocol.
d.
Click Set Telnet Parameters.
e.
In the dialog box that is displayed, set the related parameters. For details, see Table
9-1.
f.
Click OK.
----End
9.1.2.2.2 Setting NE SNMP Parameters on eSight
During site deployment and daily maintenance, the SNMP parameter settings must be the
same on eSight and devices.
Prerequisites
l
A device is added to eSight.
l
SNMP parameter settings on the devices have been obtained. See Setting SNMP
Parameters.
l
eSight accesses a managed NE over SNMP.
Context
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
207
eSight
Operation Guide
9 Managing Network Devices and Services
l
When you manually create an SNMP NE or an SNMP NE is automatically created,
eSight adapts a specified NE by using the default SNMP profile to determine the SNMP
parameters supported by the managed NE.
l
If adaptation is successful, the default profile is the SNMP parameters for the NE
configured on eSight. The operations on the NE must be based on the SNMP parameters.
l
When the SNMP parameters for NE access change, the SNMP parameters for a specified
NE must be changed accordingly.
l
You can set SNMP parameters for one or more devices in eSight.
l
Set SNMP parameters for one device.
Procedure
a.
Choose Resource > Resource Management > Network Device from the main
menu.
b.
In the navigation tree, choose Network Device.
c.
Click the name of a device. The NE manager page is displayed.
d.
In the navigation tree, choose Protocol Parameters > SNMP Parameters.
e.
Set the parameters and click Test.
Table 9-2 Parameter Description
Issue 01 (2016-04-30)
Parameter
Description
SNMP version
Currently, the SNMPv1, SNMPv2c, and SNMPv3 versions are
supported. The SNMPv3 version is applied in the scenario
requiring high parameter security level.
Read
community
The read community name for eSight to send a read request to
an NE. The read operation is available when the read
community name is the same as that acknowledged by the NE.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
208
eSight
Operation Guide
9 Managing Network Devices and Services
f.
l
Issue 01 (2016-04-30)
Parameter
Description
Write
community
The write community name for eSight to send a write request
to an NE. The write operation is available when the write
community name is the same as that acknowledged by the NE.
Timeout
interval(s)
The time when eSight waits for a response for an operation
request.
Resending
times
he maximum number of times for eSight to resend an
operation requests when eSight configures SNMP parameters
for an NE in the case that the timer expires. If the actual
number of times exceeds this value, operation fails.
NE port
SNMP communication port of the NE.
Security name
NE user name used for accessing the NE.
Authentication
protocol
A protocol used for message verification. You can choose the
HMAC_MD5 or HMAC_SHA protocol or do not use any
protocol. When you use the HMAC_MD5 or HMAC_SHA
protocol, you must set an authentication password.
Privacy
protocol
Encryption protocol used for data encapsulation. You can
choose the CBC_DES or AES_128 encryption protocol or do
not use encryption. When you use the CBC_DES or AES_128
encryption protocol, you must set an encryption password.
Click Apply when the test is successful.
Set SNMP parameters for multiple devices.
a.
Choose Resource > Resource Management > Network Device from the main
menu.
b.
In the navigation tree, choose Network Device.
c.
In the device list, select one or more records, and click Set Protocol.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
209
eSight
Operation Guide
9 Managing Network Devices and Services
d.
Click Set SNMP Parameters.
e.
In the dialog box that is displayed, set the related parameters. For details, see Table
9-2.
f.
Click OK.
----End
9.1.2.2.3 Setting NE Netconf Parameters on NE
To centrally manage network devices with higher security and scalability on eSight, users can
set NE Network Configuration Protocol (Netconf) parameters and use the Netconf to ensure
the communication between eSight and devices.
Context
l
Due to the increasing network scale and complexity, simple management based on the
Simple Network Management Protocol (SNMP) cannot meet the requirements for
complex network management, particularly configuration management. To make up for
the defects of SNMP, Netconf came into being.
l
Netconf is a network configuration and management protocol based on the Extensible
Markup Language (XML). Netconf uses the client/server mode and Remote Procedure
Call (RPC) protocol to enable the communication between clients and the server.
Table 9-3 lists Netconf advantages compared with SNMP.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
210
eSight
Operation Guide
9 Managing Network Devices and Services
Table 9-3 Comparison between Netconf and SNMP
Feature
SNMP
Netconf
Configur
ation
manage
ment
SNMP does not provide
protection or locking
mechanism if more than one
users set the same
parameter.
Netconf provides protection and locking
mechanism, preventing conflicts arising from
multi-user operations.
Query
SNMP allows users to
operate one or more records
in a table, but requires
multiple interactions to
search for records.
Netconf allows users to directly operate all
configuration data in the entire network and
supports filtering.
Scalabili
ty
Poor scalability
Good scalability:
l The protocol model is defined by layers that
are independent from each other. The
expansion of a layer in the protocol
minimizes the impact on its upper-layer
protocol.
l The protocol uses XML encoding, making
the protocol scalable in terms of
management capabilities and system
compatibility.
Security
Take SNMPv3, the latest
SNMP version, as example.
In terms of security,
SNMPv3 supports only its
own definition and has no
room for scalability.
Netconf uses the existing security protocol to
ensure security and is not bound with a specific
security protocol. Netconf is more flexibly used
than SNMP.
NOTE
The Secure Shell (SSH) protocol is recommended for
the Netconf transport layer and carries XML
information.
Network
Enterprise A wants to add a CloudEngine 6800 to the network due to service growth. When
the hardware is deployed, Netconf parameters must be set to ensure the communication
between eSight and devices through the Netconf protocol. Figure 9-1 shows the network.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
211
eSight
Operation Guide
9 Managing Network Devices and Services
Figure 9-1 Simple network diagram
Configuration Roadmap
Use the following roadmap to set NE Netconf parameters.
No.
Procedure
Description
1
(Optional) Set the IP address for
the management network port of
the device.
Enable the reachability of layer 3 routing
between clients and the server. If the IP address
for the management network port of the device
has been set during hardware deployment, skip
this step.
2
(Optional) Set to support SSH
on the VTY user interface of the
device.
Manage and monitor users that log in through
the SSH protocol to ensure connection security.
If the support for SSH on the VTY user
interface of the device has been set during
hardware deployment, skip this step.
3
Deploy SSH on the device.
SSH supports four authentication modes: RSA,
password, password-rsa, and all.
1. Create an SSH user.
2. Generate a local RSA key
pair.
3. Set the SSH user
authentication mode.
4
Issue 01 (2016-04-30)
l The password authentication mode relies on
AAA. When a user logs in to the device
using the password or password-rsa
authentication mode, create a local user with
the same name in the AAA view.
4. Set the SSH user service
mode.
l The password-rsa authentication mode
combines password and RSA authentication.
The all authentication mode refers to either
password or RAS authentication.
Enable Netconf.
Enable eSight to connect devices through the
Netconf protocol.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
212
eSight
Operation Guide
9 Managing Network Devices and Services
Prerequisites
l
CloudEngine 5800, CloudEngine 6800, and CloudEngine 12800 support the Netconf
protocol.
l
Use telnet to set NE Netconf parameters.
Procedure
a.
Optional: Set the IP address for the management network port of the device.
<HUAWEI> system-view
[~HUAWEI] sysname netconf-agent
[~HUAWEI] commit
[~netconf-agent] interface meth 0/0/1
[~netconf-agent-meth0/0/1] ip address 10.1.1.1 24
[~netconf-agent-meth0/0/1] commit
[~netconf-agent-meth0/0/1] quit
b.
Optional: Set to support SSH on the VTY user interface of the device.
[~netconf-agent] user-interface vty 0 4
[~netconf-agent-ui-vty0-4] authentication-mode aaa
[~netconf-agent-ui-vty0-4] protocol inbound ssh
NOTE
When the login protocol is set to SSH, the device automatically disables the telnet function. To
enable SSH and telnet at the same time, set the parameter to protocol inbound all.
[~netconf-agent-ui-vty0-4] commit
[~netconf-agent-ui-vty0-4] quit
c.
Deploy SSH on the device.
i.
Create an SSH user.
# The user name is Client001 and password is huawei123.
[~netconf-agent] ssh
[~netconf-agent] aaa
[~netconf-agent-aaa]
[~netconf-agent-aaa]
[~netconf-agent-aaa]
[~netconf-agent-aaa]
ii.
user client001
local-user client001 password cipher huawei123
local-user client001 service-type ssh
commit
quit
Generate a local RSA key pair.
[~netconf-agent] rsa local-key-pair create
The key name will be: netconf-agent_Host
The range of public key size is (512 ~ 2048).
NOTE: If the key modulus is greater than 512,
It will take a few minutes.
Input the bits in the modulus [default = 512] :
[~netconf-agent] commit
When the local RSA key pair is generated, run the
display rsa local-key-pair public
command to view information about public keys in the local RSA key pair.
iii. Set the SSH user authentication mode.
[~netconf-agent] ssh user client001 authentication-type password
[~netconf-agent] commit
iv.
Set the SSH user service mode.
[~netconf-agent] ssh user client001 service-type snetconf
[~netconf-agent] commit
d.
Enable Netconf.
[~netconf-agent] snetconf server enable
[~netconf-agent] commit
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
213
eSight
Operation Guide
9 Managing Network Devices and Services
Follow-up Procedure
Refer to Setting NE Netconf Parameters on eSight, set NE Netconf Parameters, and
perform connectivity tests to verify the configuration.
9.1.2.2.4 Setting NE Netconf Parameters on eSight
During site deployment and daily maintenance, the Netconf parameter settings must be the
same on eSight and devices.
Prerequisites
l
Information about devices has been added to eSight.
l
Netconf parameter settings on the devices have been obtained. See Setting Netconf
Parameters on the NE Side.
l
You can set Netconf parameters for one or more devices in eSight.
l
Netconf parameters can be configured in eSight for the following devices: CloudEngine
5800, CloudEngine 6800 and CloudEngine 12800.
l
Due to the increasing network scale and complexity, simple management based on the
Simple Network Management Protocol (SNMP) cannot meet the requirements for
complex network management, particularly configuration management. To make up for
the defects of SNMP, Netconf came into being.
l
Netconf is a network configuration and management protocol based on the Extensible
Markup Language (XML). Netconf uses the client/server mode and Remote Procedure
Call (RPC) protocol to enable the communication between clients and the server.
Context
Table 9-4 lists Netconf advantages compared with SNMP.
Table 9-4 Comparison between Netconf and SNMP
Issue 01 (2016-04-30)
Feature
SNMP
Netconf
Configur
ation
manage
ment
SNMP does not provide
protection or locking
mechanism if more than one
users set the same
parameter.
Netconf provides protection and locking
mechanism, preventing conflicts arising from
multi-user operations.
Query
SNMP allows users to
operate one or more records
in a table, but requires
multiple interactions to
search for records.
Netconf allows users to directly operate all
configuration data in the entire network and
supports filtering.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
214
eSight
Operation Guide
9 Managing Network Devices and Services
Feature
SNMP
Netconf
Scalabili
ty
Poor scalability
Good scalability:
l The protocol model is defined by layers that
are independent from each other. The
expansion of a layer in the protocol
minimizes the impact on its upper-layer
protocol.
l The protocol uses XML encoding, making
the protocol scalable in terms of
management capabilities and system
compatibility.
Security
Take SNMPv3, the latest
SNMP version, as example.
In terms of security,
SNMPv3 supports only its
own definition and has no
room for scalability.
Netconf uses the existing security protocol to
ensure security and is not bound with a specific
security protocol. Netconf is more flexibly used
than SNMP.
NOTE
The Secure Shell (SSH) protocol is recommended for
the Netconf transport layer and carries XML
information.
Procedure
l
Issue 01 (2016-04-30)
Set Netconf parameters for one device.
a.
Choose Resource > Resource Management > Network Device from the main
menu.
b.
In the navigation tree, choose Network Device.
c.
Click the name of a device. The NE manager page is displayed.
d.
In the navigation tree, choose Protocol Parameters > Netconf Parameters.
e.
Set the parameters and click Test.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
215
eSight
Operation Guide
9 Managing Network Devices and Services
NOTE
l User name: Netconf user name of the device.
l Port: communication port number of the device. The default value is 22. You can run the
ssh server port 22 command to configure the port number on the device.
l Timeout interval (s): period for waiting for a response after eSight sends a request to an
NE. Set this parameter as required.
l
Issue 01 (2016-04-30)
f. Click Apply when the test is successful.
Set Netconf parameters for multiple devices.
a. Choose Resource > Resource Management > Network Device from the main
menu.
b.
c.
In the navigation tree, choose Network Device.
In the device list, select one or more records, and click Set Protocol.
d.
e.
Click Set Netconf Parameters.
In the dialog box that is displayed, set the related parameters.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
216
eSight
Operation Guide
9 Managing Network Devices and Services
NOTE
l User name: Netconf user name of the device.
l Port: communication port number of the device. The default value is 22. You can run the
ssh server port 22 command to configure the port number on the device.
l Timeout interval (s): period for waiting for a response after eSight sends a request to an
NE. Set this parameter as required.
f.
Click OK.
----End
9.1.2.3 Managing Interfaces
To manage a device, a user must know the basic information and state of the interfaces on the
device.
9.1.2.3.1 Understanding an Interface
This topic describes important parameters related to an interface.
Attribute
Description
Rate(bps)
Processing rate of the data packet passing
through an interface.
Admin Status
Physical state of an interface. Whether a
user disables the interface.
Operate Status
Logical state of an interface, the integration
of the management state and protocol state
of an interface. When either of the states is
down, the running state of the interface is
down.
MTU
Maximum transmission unit (MTU),
indicating the maximum size (in bytes) of
packets that pass the interface.
Duplex mode
l Full-duplex: indicating that the interface
can send and receive data at the same
time.
l Half-duplex: indicating that the interface
cannot send or receive data at the same
time.
NOTE
Only Huawei devices can be recognized by
eSight.
9.1.2.3.2 Configuring Interfaces
This topic describes how to activate, deactivate an interface, and modify the alias of the
interface.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
217
eSight
Operation Guide
9 Managing Network Devices and Services
Prerequisites
SNMP write permission is set. For details, see Setting SNMP Parameters.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > Interface Manager.
Step 3 Click Synchronize. The Progress dialog box is displayed. After the synchronization task is
complete, click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
218
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Click
to set parameters related to an interface.
NOTE
Some interfaces do not support blank aliases.
Step 5 Select multiple interfaces, and click Enable, Disable, Enable Alarm Shielding, or Disable
Alarm Shielding to implement operations in batches.
NOTE
l If an interface is configured with disabling alarm reporting, the interface does not report alarms
monitored by the interface to eSight.
l Only switches of the S series support the enabling and disabling of alarm reporting.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
219
eSight
Operation Guide
9 Managing Network Devices and Services
9.1.2.3.3 Querying Interface Parameters
eSight allows users to query interface information.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > Interface Manager.
Step 3 Set filter parameters at the top of the pane and click Search.
Step 4 On the lower part of the right pane of the window, view the interface parameters.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
220
eSight
Operation Guide
9 Managing Network Devices and Services
9.1.2.4 Querying IP Addresses
When performing service configuration and network planning, you must query the IP
addresses of an NE and the interface. eSight supports query of IP addresses of an NE and the
interface.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > IP Address.
Step 3 Click Synchronize. After the synchronization, in the displayed Progress window, view the
detailed information, and click OK to synchronize the IP address of the NE to eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
221
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Set filter parameters at the top of the pane and click Search. On the lower part of the right
pane of the window, view the IP address parameters of the interface.
----End
9.1.2.5 Restoring a Configuration File
eSight supports restoration of the configuration file of an NE. When data in the configuration
file is corrupted, you can protect the file by means of data restoration.
Prerequisites
SNMP write permission is set. For details, see Setting SNMP Parameters.
Procedure
Step 1 Access the NE manager page.
1. Choose Resource > Resources Management > Network Device from the main menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
222
eSight
Operation Guide
9 Managing Network Devices and Services
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > Configuration File.
Step 3 In the pane, you can perform the operations related to NE configuration files.
Operation
Description
Viewing an NE
Configuration File
You can view a backup NE configuration file and a configuration
file that is in use.
Click
file.
Comparing NE
Configuration Files
in Operation to view the corresponding configuration
You can know differences between NE configuration files by
comparing them.
Select two configuration files and click
comparing result.
Backing Up NE
Configuration Files
You can back up NE configuration files to the eSight server to
avoid NE data damage or loss due to upgrade, rollback, or other
exceptions.
Click
Restoring an NE
Configuration File
to back up NE configuration files.
When an NE is faulty, you can upload an NE configuration file to
the NE to restore NE configuration data.
Click
Setting an NE
Configuration File to
the Baseline File
to view the
in Operation to restore NE configuration data.
After a configuration file that is being used by an NE is backed up
to eSight, you can set the NE configuration file to the baseline file
for subsequent file restore.
Click
in Operation to set the NE configuration file to the
baseline file.
Importing NE
Configuration Files
Issue 01 (2016-04-30)
Click
to manage other local
configuration file which added to the configuration file list of
NMS server.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
223
eSight
Operation Guide
9 Managing Network Devices and Services
Operation
Description
Download an NE
Configuration File
Click
local.
in Operation to download the configuration file to the
----End
Follow-up Procedure
If you need to back up NE configuration files automatically and periodically, refer to 9.3.2.3.1
Backing Up NE Configuration Files Automatically.
9.1.2.6 Managing Netconf Configuration
Netconf ensures security and scalability. When the NMS is used to manage network devices,
you can use Netconf to ensure communication between the NMS and the devices. eSight
allows users to configure and manage devices through the Netconf protocol.
Prerequisites
l
Verify that the eSight FTP service is enabled. By default, the FTP service is enabled. For
details about FTP parameters, see eSight Administrator Guide.
l
Ensure that Netconf parameters on eSight and devices are consistent. For details, see
Setting NE Netconf Parameters and Setting NE Netconf Parameters on eSight.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > Netconf Configuration Manager.
Step 3 Configure the device based on the site requirements.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
224
eSight
Operation Guide
9 Managing Network Devices and Services
9.1.3 Physical Resource Management
The physical resource management function provides an entry for uniformly querying and
collecting assets statistics on the live network, providing references for maintenance,
reconstruction, and capacity expansion on the live network.
The physical resource management function manages the following objects: devices,
subracks, boards, subcards and ports.
Table 9-5 Device resources
GUI Entry
Operation
Description
1. Choose Resource
> Resource
Management >
Network Device
from the main
menu.
Set protocol
parameters.
l Set SNMP Parameters: Set SNMP
parameters of NEs on eSight in
batches.
l Set Telnet Parameters: Set Telnet
parameters of NEs on eSight.
l Set Netconf Parameters: Set
Nerconf parameters of NEs on eSight
in batches.
2. Choose Network
Device.
Process device
information.
l Synchronize: Synchronize device
data to eSight.
l Export: Export device information to
files.
l Delete: Delete one or more pieces of
data.
l Set Timezone: Set the time zone of
NEs on eSight.
l Move: Adjust the subnet to which the
NE belongs when the network
topology changes.
l Modify: Modify the asset
information of devices that have been
added to eSight.
l Import device information: Import
the asset information in batches for
devices that have been added to
eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
225
eSight
Operation Guide
9 Managing Network Devices and Services
GUI Entry
Operation
Quick entries
Description
l Locate in Topology: Click
in the
corresponding Operation column to
view the location of devices in a
topology view.
l Modify: You can click
to modify
remarks and maintain information of
device.
l Resources Details: You can click
to view device resource details.
l Delete NE: You can click
a device.
to delete
l Display the NE manager: You can
click Name of a device to display the
NE manager corresponding to the
device.
Table 9-6 Frame resources
GUI Entry
Operation
Description
1. Choose Resource
> Resource
Management >
Network Device
from the main
menu.
Process device
information.
Export: You can export frame
information to files.
Quick entries
Modify Remarks: You can click
modify frame remarks.
to
2. Choose Frame.
Table 9-7 Board resources
GUI Entry
Operation
Description
1. Choose Resource
> Resource
Management >
Network Device
from the main
menu.
Process device
information.
Export: exports board information to
files.
Quick entries
Modify Remarks: You can click
modify board remarks.
to
2. Choose Board.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
226
eSight
Operation Guide
9 Managing Network Devices and Services
Table 9-8 Subcard resources
GUI Entry
Operation
Description
1. Choose Resource
> Resource
Management >
Network Device
from the main
menu.
Process device
information.
Export: exports subcard information to
files.
Quick entries
Modify Remarks: You can click
modify subcard remarks.
to
2. Choose Subcard.
Table 9-9 Port resources
GUI Entry
Operation
Description
1. Choose Resource
> Resource
Management >
Network Device
from the main
menu.
Process device
information.
Export: exports port information to
files.
Quick entries
Modify Remarks: You can click
modify port remarks.
to
2. Choose Port.
9.1.4 Link Management
Link management enables you to query link status, and maintain network links. In addition,
links are displayed on topology view. You can learn structure change of the network topology
on the live network according to the link topology.
9.1.4.1 Discovering Links Automatically
Based on link status and details, you can learn about the network condition and connectivity
between signaling points in a timely manner.After devices are added to eSight, eSight
discovers Layer 3 links (that is, IP links), and uses the Link Layer Discovery Protocol
(LLDP), Cisco Discovery Protocol (CDP), MAC and ARP forwarding table to discover Layer
2 links. However, after devices are added to eSight, new links may be generated on the
network. To ensure that link data displayed in eSight keeps consistent with the actual link data
on the network, you are advised to discover links as described in this topic.
Prerequisites
The link discovery protocol has been enabled. You must enable different link discovery
protocols on devices from different vendors.
l
On devices that support LLDP (Huawei and non-Huawei devices excluding Cisco
devices), enable LLDP:
–
Issue 01 (2016-04-30)
(Recommended) To enable LLDP through eSight, skip this prerequisite.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
227
eSight
Operation Guide
9 Managing Network Devices and Services
–
l
To enable LLDP through devices, see Enabling LLDP for details.
On Cisco devices, enable CDP. By default, CDP is enabled on Cisco devices. If CDP is
disabled, enable CDP by referring to the Cisco device manual.
Besides, make sure that the Telnet parameters and SNMP parameters are set on both eSight
and NE.
Context
eSight discovers Layer 2 links in various ways, as described in the following table.
Table 9-10 Link discovery protocols/modes and their applicable devices
Protocol/
Mode
Applicable Device
LLDP
Huawei and non-Huawei devices (excluding Cisco devices) that support
LLDP
CDP
Cisco devices
MAC and ARP
forwarding
table
Devices that support neither LLDP nor CDP or have both LLDP and
CDP disabled
Procedure
Step 1 Choose Resource > Resource Management > Network Device from the main menu.
Step 2 In the navigation tree on the left, choose Link Management.
Step 3 Click Discover Link.
Step 4 Optional: In the search area in the left pane, enter the names of the devices at two ends of the
links to discover, and click
.
Step 5 In the left pane, select the devices at two ends of the links to discover.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
228
eSight
Operation Guide
9 Managing Network Devices and Services
Step 6 Optional: Select Deliver commands.
If LLDP has been enabled by referring to Prerequisites, skip this step.
l
Commands delivered in this step take effect only to Huawei's LLDP-compliant devices.
l
After this operation and link delivery are complete, you can click Delivery result to
view the command execution result.
Step 7 Click Discover.
Step 8 After link discovery is complete, view discovered links in the right pane of eSight.
----End
Result
l
l
Layer 2 links are discovered in eSight.
a.
Viewing links in the physical topology: Choose Monitor > Topology > Topology
Management from the main menu.
b.
Viewing links on the link management page: Choose Resource > Resource
Management > Network Device from the main menu. In the navigation tree on the
left, choose Link Management.
Layer 3 links (that is, IP links) are discovered in eSight.
a.
Viewing links in the IP topology: Choose Monitor > Topology > IP Topology
Management from the main menu.
b.
Viewing links on the link management page: Choose Resource > Resource
Management > Network Device from the main menu. In the navigation tree on the
left, choose Link Management.
Follow-up Procedure
You can perform operations listed in the following table after adding links.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
229
eSight
Operation Guide
9 Managing Network Devices and Services
Maintaining Links
Operation Method
Change the link
display rules
Change the link display rules.
1. In the Link Management window, click Display Rule to set
the display rule for a link.
l In Naming Rule, set the display fields of a link name.
l In Tip Rule, set the display fields of link tips.
NOTE
Tips are displayed on the topology management page. When you
place the cursor on a link for a while, the link details are displayed
as tips.
Export links
Export the link information in eSight to the client and save the
information as a file in Excel format.
l Choose Export > Export Selected. In the window that is
displayed, click Save.
l Choose Export > Export All. In the window that is displayed,
click Save.
Delete a link
If you do not want a link to display in the link list or topology,
delete the link.
1. In the Link Management window, select a link and click
Delete.
2. Click Yes.
Hide a link
If you do not want a link to display in the link list or topology, hide
the link.
The main difference between hiding and deleting a link is as
follows: During link discovery on eSight, deleted links will be
discovered to the link list or topology, while hidden links will not
be discovered.
1. In the Link Management window, select a link and click
Hide.
2. In the dialog box that is displayed, click Yes.
You can view hidden links by clicking View Hidden Link.
View hidden links
You can view hidden links or restore hidden links to the link list or
topology.
1. In the Link Management window, click View Hidden Link.
2. In the dialog box that is displayed, select a hidden link and
click Restore.
3. Click Yes.
You can view the restored link in the link list or topology.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
230
eSight
Operation Guide
9 Managing Network Devices and Services
Enabling LLDP
Configuration commands vary according to the device model and version. This topic uses
Huawei S9700 V200R003C00 as an example to list basic commands for enabling LLDP on a
device.
1.
Run the system-view command to enter the system view.
2.
Configure a read community name and set the MIB view that the community can access
to iso-view. This view allows you to operate nodes under the iso MIB sub-tree (whose
OID is 1). If the following configurations have been performed in Setting SNMP
Parameters on Devices, skip this step.
a.
Configure a read community name and set the MIB view that the community can
access to iso-view.
n
If the device uses SNMPv1 or SNMPv2c, run the following command to
configure the read community name and the MIB view that the community can
access:
snmp-agent community read community-name [ mib-view view-name ]
NOTE
Set mib-view to iso-view.
n
If the device uses SNMPv3, run the following command to configure the read
community name and the MIB view that the community can access:
snmp-agent group v3 group-name [ read-view read-view ]
NOTE
Set read-view to iso-view.
b.
Create an MIB view.
Run the snmp-agent mib-view { included | excluded } view-name oid-tree
command.
NOTE
l { included | excluded }: Set it to included.
l view-name: Set it to iso-view.
l oid-tree: Set it to iso.
3.
Enable LLDP in the system view. LLDP links can be discovered only when LLDP is
enabled.
Run the lldp enable command.
NOTE
LLDP can be enabled globally (that is, in the system view) or enabled on an interface.
4.
l
By default, LLDP is disabled globally. When LLDP is enabled globally, LLDP is enabled on
all interfaces by default.
l
Only when LLDP is enabled globally and on an interface at the same time, the interface can
send or receive LLDP packets.
Optional: Set the maximum size of an SNMP packet that the SNMP agent can send or
receive to 12,000 bytes. If you do not set the maximum size, large SNMP packets for
LLDP may be discarded. As a result, links cannot be discovered.
Run the snmp-agent packet max-size byte-count command.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
231
eSight
Operation Guide
9 Managing Network Devices and Services
NOTE
l This step is mandatory for Huawei devices.
l By default, the maximum size of an SNMP packet is 12,000 bytes.
9.1.4.2 Manually Creating Links
You can manually create links when the physical links between two devices cannot be added
to eSight using the Discovering Links Automatically mode, or virtual links are required to
display the logical relationship between topology objects.
Prerequisites
You have the operation rights for Link Configuration Operation Set.
Context
l
A link is used to connect signaling points (SPs) and signaling transfer points (STPs) and
transmit signaling messages.
–
General link: A general link differs from a physical link on the network and is used
to identify the logical relationship between two topology objects.
Two topology objects can be two subnets, two devices, or a subnet and a device.
Two devices can be two virtual device, two physical devices, and a virtual device
and a physical device.
–
IP link: An IP link is a Layer 3 link between devices. The IP addresses for
interfaces at both ends of a side-by-side link (a type of IP link) contain a 30-bit
subnet mask.
–
Layer 2 link: A Layer 2 link is a physical link between devices, and it actually
exists on the network.
Procedure
Step 1 Choose Resource > Resource Management > Network Device from the main menu.
NOTE
You can also create a link in the Topology Management.
Step 2 In the navigation tree on the left, choose Link Management.
Step 3 Click Create Link to create a link.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
232
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Set Link name, Link type, Source NE, Source Port, Destination NE, and Destination
Port, and click OK.
----End
Follow-up Procedure
You can perform operations listed in the following table after adding links.
Maintaining Links
Operation Method
Change the link
display rules
Change the link display rules.
1. In the Link Management window, click Display Rule to set
the display rule for a link.
l In Naming Rule, set the display fields of a link name.
l In Tip Rule, set the display fields of link tips.
NOTE
Tips are displayed on the topology management page. When you
place the cursor on a link for a while, the link details are displayed
as tips.
Export links
Export the link information in eSight to the client and save the
information as a file in Excel format.
l Choose Export > Export Selected. In the window that is
displayed, click Save.
l Choose Export > Export All. In the window that is displayed,
click Save.
Delete a link
If you do not want a link to display in the link list or topology,
delete the link.
1. In the Link Management window, select a link and click
Delete.
2. Click Yes.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
233
eSight
Operation Guide
9 Managing Network Devices and Services
Maintaining Links
Operation Method
Hide a link
If you do not want a link to display in the link list or topology, hide
the link.
The main difference between hiding and deleting a link is as
follows: During link discovery on eSight, deleted links will be
discovered to the link list or topology, while hidden links will not
be discovered.
1. In the Link Management window, select a link and click
Hide.
2. In the dialog box that is displayed, click Yes.
You can view hidden links by clicking View Hidden Link.
View hidden links
You can view hidden links or restore hidden links to the link list or
topology.
1. In the Link Management window, click View Hidden Link.
2. In the dialog box that is displayed, select a hidden link and
click Restore.
3. Click Yes.
You can view the restored link in the link list or topology.
9.1.5 Electronic Labels Management
Electronic labels are used in network design, planning, and maintenance, asset management
(including spare part management), order, account management, liquidation, invest tracing,
and warranty. eSight supports query and export of an electronic label.
Procedure
Step 1 Choose Resource > Resource Management > Network Device from the main menu.
Step 2 Choose Electronic Labels from the navigation tree on the left.
Step 3 Click Obtain Electronic label and select one or more NEs. Then click Obtain to view the
electronic labels of the physical resources.
NOTE
Obtaining network-wide electronic labels takes a long time. Perform this operation during off-peak
hours.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
234
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Export the electronic labels.
l
Choose Export > Export Selected. In the window that is displayed, click Save.
l
Choose Export > Export All. In the window that is displayed, click Save.
----End
9.2 SVF Management
9.2.1 Example for Configuring the Access Layer for a Wired
Campus Network Using eSight
Prerequisites
l
Devices have been added to eSight, and can successfully communicate with eSight.
l
Telnet parameters have been configured on eSight.
l
The LLDP protocol has been enabled on SVF-capable devices.
Networking Requirements
Company M has constructed a wired campus network on which many access devices are
deployed sparsely. It is difficult to manage and configure these access devices. The network
administrator Jack requires that he can uniformly manage and configure the access devices to
reduce management costs.
As shown in Figure 9-2, two switches at the aggregation layer form a cluster and function as
the parent devices to connect to multiple access switches (ASs).
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
235
eSight
Operation Guide
9 Managing Network Devices and Services
In this example, the S12708, S5700-28P-LI, and S2750-28TP-EI are used as the parent
device, level-1 AS, and level-2 AS respectively.
Figure 9-2 Configuring the access layer for a wired campus network
Configuration Roadmap
The configuration roadmap is as follows:
1.
Configure CSS on the parent devices to ensure high reliability of the super virtual fabric
(SVF) system.
2.
Configure SVF system capabilities.
a.
Create an SVF enabling template to enable SVF on the parent and configure the
SVF client management IP address pool, file server, and forwarding mode.
b.
Create an AS predeployment template to predeploy ASs on the SVF parent before
powering on them and add the ASs to a whitelist. After the ASs are powered on, the
SVF parent permits the ASs to access the SVF network.
c.
Create a level-1 AS fabric port template to set parameters for the fabric ports that
connect the SVF parent to level-1 ASs.
d.
Create a level-2 AS fabric port template to set parameters for the fabric ports that
connect level-1 ASs to level-2 ASs.
e.
Create a system configuration matrix to deploy the template instances to the SVF
parent.
3.
Clear the configurations of ASs, restart the ASs, and then connect the parent to level-1
ASs and level-1 ASs to level-2 ASs using cables.
4.
Configure SVF service capabilities.
Issue 01 (2016-04-30)
a.
Create port groups.
b.
Create user interface VLAN templates to set pass VLANs for user-side ports.
c.
Create a user interface service template to set network security parameters for userside ports.
d.
Create a service configuration matrix to deploy the template instances to the port
groups.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
236
eSight
Operation Guide
9 Managing Network Devices and Services
Data Plan
Table 9-11 Device group
Group Name
Device Name
Device IP
SVF Parent
SVF-S12708
10.137.240.114
Table 9-12 Port group
Group Name
Device
Port
PortGroup1
as1
ALL
PortGroup1
as2
ALL
PortGroup1
as4
ALL
PortGroup2
as3
ALL
PortGroup2
as5
ALL
Table 9-13 SVF enabling template
Instance Name
VLAN ID
IP Address
Mask
Temp1
11
192.168.11.1
24
Table 9-14 AS predeployement template
Issue 01 (2016-04-30)
Instance
Name
AS Name
AS Type
MAC Address
Whether the
AS Is Added
to Whitelist
ASTemp
as1
S5700-28P-LI-AC
0200-0000-0011
Yes
as2
S5700-28P-LI-AC
0200-0000-0022
Yes
as3
S5700-28P-LI-AC
0200-0000-0033
Yes
as4
S2750-28TP-EIAC
0200-0000-0044
Yes
as5
S2750-28TP-EIAC
0200-0000-0055
Yes
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
237
eSight
Operation Guide
9 Managing Network Devices and Services
Table 9-15 Level-1 AS fabric port template
Instance Name
Fabric Port ID
Eth-Trunk ID
GE Interface
Number
ParentToL1as
1
1
1/1/0/1
1
1
2/1/0/1
2
2
1/1/0/2
2
2
2/1/0/2
3
3
1/1/0/3
3
3
2/1/0/3
Table 9-16 Level-2 AS fabric port template
Instance
Name
AS Name
Fabric Port
ID
Eth-Trunk ID
GE Interface
Number
L2AS
1
4
4
0/0/23
1
4
4
0/0/24
3
5
5
0/0/23
3
5
5
0/0/24
Table 9-17 User interface VLAN template
Instance Name
Default VLAN
VLAN10
10
VLAN20
20
Table 9-18 User interface service template
Instance Name
User Access Port
AccessTemp
ON
Procedure
Step 1 For details on how to set up a cluster on the two switches that function as the parent devices,
see "CSS Configuration" in the S12700 Series Ethernet Switches Configuration Guide Device Management.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
238
eSight
Operation Guide
9 Managing Network Devices and Services
Step 2 Create a template instance and enable SVF on the parent device.
1.
Choose Configuration > Network Equipment > Service Configuration Management
from the main menu.
2.
Choose Template Management > Predefined from the navigation tree, choose SVF
Device Templates > SVF System Config > Enable SVF in Template, and click
Create.
3.
Set Instance Name to Temp1, set VLAN ID, IP Address, and Mask in the Configure
SVF Client Management Address Pool area to 11, 192.168.11.1, and 24 respectively,
and click Confirm. The Enable SVF template is displayed on the page.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
239
eSight
Operation Guide
9 Managing Network Devices and Services
Step 3 Create a template instance and set AS access parameters.
1.
Choose Template Management > Predefined from the navigation tree, choose SVF
Device Templates > SVF System Config > AS PreDeploy in Template, and click
Create.
2.
Set Instance Name to ASTemp and set other parameters as shown in the following
figure.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
240
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Create a template instance Level-1 AS Fabric Port.
1.
Choose Template Management > Predefined from the navigation tree, choose SVF
Device Templates > SVF System Config > Level-1 AS Fabric Port in Template, and
click Create.
2.
Set Instance Name to ParentToL1as, set other parameters as shown in the following
figure, and click Confirm. The Level-1 AS Fabric Port template is displayed on the
page.
Step 5 Create a template instance Level-2 AS Fabric Port.
1.
Issue 01 (2016-04-30)
Choose Template Management > Predefined from the navigation tree, choose SVF
Device Templates > SVF System Config > Level-2 AS Fabric Port in Template, and
click Create.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
241
eSight
Operation Guide
9 Managing Network Devices and Services
2.
Set Instance Name to L2AS, set other parameters as shown in the following figure, and
click Confirm. The Level-2 AS Fabric Port template is displayed on the page.
Step 6 Deploy the template instances to the parent device.
1.
Choose Service Config > SVF System Config from the navigation tree. The default
service configuration matrix is displayed.
2.
Click
3.
In the service configuration matrix, place the mouse in each blank cell, click
select the created template instances one by one, and click Confirm.
Issue 01 (2016-04-30)
next to Resources and select SVF-S12708 as the default SVF Parent.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
to
242
eSight
Operation Guide
9 Managing Network Devices and Services
4.
In the system configuration matrix, place the mouse in the lower right corner of each cell
with a template instance, and click
device.
to deploy the template instance to the parent
Step 7 After logging in to each AS through the CLI, you can run the reset saved-configuration
command to delete the AS configuration and then run the reboot command to restart the AS.
If a message is displayed asking whether you want to save the configuration, select N. And
then connect the parent to level-1 ASs and level-1 ASs to level-2 ASs using cables.
Step 8 Create port groups.
1.
Choose Resource > Resource Management > Network Device from the main menu.
Device resources on the entire network are displayed on the page.
2.
in the upper right corner of the page and set IP Address to 10.137.240.114.
Click
The SVF device with the specified IP address is displayed on the page.
3.
Click the device name link in Name to access the NE Manager of the device.
4.
Choose SVF Feature > AS Port from the navigation tree, and click Create Group.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
243
eSight
Operation Guide
9 Managing Network Devices and Services
5.
Set Group Name to PortGroup1, and click Confirm.
6.
Set Group Name to PortGroup2, and click Confirm.
7.
Enter as1 in the AS Name search box and click Search. Select all the ports of as1, click
Set Group, and select PortGroup1.
8.
Repeat the preceding step to add ports of as2 and as4 to PortGroup1, and ports of as3
and as5 to PortGroup2.
Step 9 Create user interface VLAN templates.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
244
eSight
Operation Guide
9 Managing Network Devices and Services
1.
Choose Configuration > Network Equipment > Service Configuration Management
from the main menu.
2.
Choose Template Management > Predefined from the navigation tree, choose SVF
Device Templates > SVF Service Config > User Interface VLAN in Template, and
click Create.
3.
Set Instance Name to VLAN10, set other parameters as shown in the following figure,
and click Confirm. The user interface VLAN template VLAN10 is displayed on the
page.
4.
Click Create, set Instance Name to VLAN20, set other parameters as shown in the
following figure, and click Confirm. The user interface VLAN template VLAN20 is
displayed on the page.
Step 10 Create a user interface service template.
1.
Issue 01 (2016-04-30)
Choose Template Management > Predefined from the navigation tree, choose SVF
Device Templates > SVF Service Config > User Interface Service in Template, and
click Create.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
245
eSight
Operation Guide
9 Managing Network Devices and Services
2.
Set Instance Name to AccessTemp, set other parameters as shown in the following
figure, and click Confirm. The user interface service template AccessTemp is displayed
on the page.
Step 11 Deploy the SVF user interface VLAN and service templates to port groups.
1.
Choose Service Config > SVF Port Config from the navigation tree. The default
service configuration matrix is displayed.
2.
Click
3.
In the service configuration matrix, place the mouse in each blank cell, click
select the created template instances one by one, and click Confirm.
Issue 01 (2016-04-30)
next to Resources, select PortGroup1 and PortGroup2, and click Confirm.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
to
246
eSight
Operation Guide
9 Managing Network Devices and Services
4.
In the service configuration matrix, place the mouse in the lower right corner of each cell
with a template instance, and click
to deploy the template instance to the port group.
----End
Result
After the SVF access layer configuration is complete, verify the configuration as follows:
l
Choose Monitor > Topology > Topology Management from the main menu. The SVF
topology
the SVF system.
l
is displayed. Double-click the icon to view the layout in
Choose Resource > Resource Management > Network Device from the main menu,
and select Access Users Management from the navigation tree. You can view the list of
online users on the page that is displayed.
9.3 Network Device Configuration Management
The configuration management of network device includes smart configuration tool, device
configuration file management, MIB management, and NE software management.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
247
eSight
Operation Guide
9 Managing Network Devices and Services
9.3.1 Smart Configuration Tool
This topic describes functions provided by the smart configuration tool and the procedure for
configuring the smart configuration tool.
9.3.1.1 Overview
This topic describes the Smart Configuration Tool operations.
Figure 9-3 shows the overview of Smart Configuration Tool operations.
Figure 9-3 Overview of Smart Configuration Tool Operations
9.3.1.2 Functions
When establishing network environment, you must configure a large number of network
elements (NEs). Generating scripts manually based on a network plan is time-consuming and
may contain errors. With the smart configuration tool, you can configure a template and plan
sheet, and send the same parameter settings to multiple NEs, greatly improving NE
configuration efficiency.
l
The smart configuration tool provides the template management function to quickly
generate templates. In a template, you can configure a same command for multiple NEs
in batches.
l
The smart configuration tool provides the plan sheet delivery function to deliver different
parameters for the same command to multiple NEs in batches.
Figure 9-4 shows the application scenario of the smart configuration tool.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
248
eSight
Operation Guide
9 Managing Network Devices and Services
Figure 9-4 Application scenario of the smart configuration tool
The smart configuration tool is used to make scripts and configure devices during site
deployment. It supports graphical command line interfaces (GCLIs).
9.3.1.3 Template Management and Delivery
The delivery by template function allows you to set mandatory parameters for common or
user-defined command lines and send the command lines to multiple devices.
9.3.1.3.1 Process Introduction
The delivery by template function allows you to set parameters for a common or user-defined
command line in a template and send the template to multiple devices.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
249
eSight
Operation Guide
9 Managing Network Devices and Services
Process Description
Figure 9-5 Process of delivery by template
Function Description
1.
2.
Template management
–
Predefined template: Displays predefined common templates.
–
User-defined template: Displays user-defined templates in the User-defined folder,
and allows you to create, copy, move, modify, and delete templates, and create
folders to classify templates to make the finding and management easy.
Delivery by template
–
Deploy: Select an existing template in the template base, set parameters, and send
the template to multiple devices.
–
To deliver a template, perform the following steps: select a template, set parameters,
select devices, and configure tasks.
9.3.1.3.2 Creating a Template
eSight provides multiple predefined templates. If the predefined templates cannot meet your
requirements, you can create templates as required.
Context
With eSight, users can create templates by manually creating templates or importing
templates.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
250
eSight
Operation Guide
9 Managing Network Devices and Services
Procedure
Step 1 Choose Configuration > Network Equipment > Smart Configuration Tool from the main
menu.
Step 2 In the navigation tree, click Template Deployment.
Step 3 Create a template.
l
Manually create a template.
a.
Click
, and select
creating a template is displayed.
. The page for
b.
Set Directory, Template name, Description, and Template Content.
NOTICE
When copying commands, ensure that the text does not contain formats, such as
hidden special characters. If a command contains any format, the system may fail to
recognize the command.
NOTE
Generally, prefix system-view to the Template Content value to enter the system view. You
do not need to enter quit to the Template Content value. The smart configuration tool will
automatically suffix quit based on command lines.
c.
Issue 01 (2016-04-30)
Click OK. The new template is displayed in the User-defined folder.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
251
eSight
Operation Guide
9 Managing Network Devices and Services
l
Import a template.
a.
on
Select a folder where a template is stored and click
the toolbar, and select
the folder.
, or click
in the Operation column of
NOTE
The selected folder must be User-defined or a folder under User-defined.
b.
In the Import Template dialog box, select the template to import.
NOTE
c.
n
Only exported templates can be imported.
n
The name of the imported template must be in the format of
Vendor_TemplateName_CommandTreeID. Otherwise, the template cannot be
imported.
Click OK. The template is imported and displayed in the selected folder.
NOTE
To export the template, click
in the Operation column of the imported template.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
252
eSight
Operation Guide
9 Managing Network Devices and Services
9.3.1.3.3 Delivering a Template
This topic describes how to deliver a template in eSight to specified devices.
Prerequisites
l
Devices to which commands are to be delivered have been added to eSight.
l
Telnet parameters have been set for devices to which commands are to be delivered. For
details, see Setting NE Telnet Parameters on eSight.
Procedure
Step 1 Choose Configuration > Network Equipment > Smart Configuration Tool from the main
menu.
Step 2 In the navigation tree, click Template Deployment, and select the template to be delivered.
NOTE
l To display all templates, click
l To hide all templates, click
Step 3 Click
.
.
. The page for delivering a template is displayed.
Step 4 Set parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
253
eSight
Operation Guide
9 Managing Network Devices and Services
1.
Set parameters in the command table.
2.
Click Next.
Step 5 Select devices.
1.
Click
.
2.
Select devices in the Select Device dialog box that is displayed.
3.
Click OK.
Step 6 Set task.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
254
eSight
Operation Guide
9 Managing Network Devices and Services
1.
Set related parameters.
NOTE
If you select Yes in Email notice area, set the email server. For details, see 5.3 Setting Remote Alarm/
Event Notification.
2.
Click Deploy.
3.
In the Confirm dialog box, click Yes.
On the current page, you can view the task execution progress and details about devices to
which the task is delivered. You can also view the task execution details on the Deploy
Records page.
----End
9.3.1.4 Plan Sheet Management and Delivery
You can use the plan sheet to deliver different parameters for the same command to multiple
network devices.
9.3.1.4.1 Process Introduction
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
255
eSight
Operation Guide
9 Managing Network Devices and Services
Process Description
Figure 9-6 Process of delivery by plan sheet
Function Description
1.
Importing a plan sheet
NOTE
Plan sheets can only be Excel 2003 files. Excel 2007 files and later versions are not supported
currently.
2.
Delivery by plan sheet
–
The delivery by plan sheet function allows you to set parameters in a plan sheet and
deliver the plan sheet to corresponding devices.
–
To deliver a plan sheet, perform the following steps: obtain a plan sheet, set
parameters, import the plan sheet, and configure tasks.
9.3.1.4.2 Exporting a Plan Sheet
This topic describes how to export a template. You can modify an exported template, and
import the template in Delivering a Plan Sheet.
Procedure
l
Export a template plan sheet.
a.
Issue 01 (2016-04-30)
Choose Configuration > Network Equipment > Smart Configuration Tool from
the main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
256
eSight
Operation Guide
9 Managing Network Devices and Services
b.
In the navigation tree, click Template Deployment, and search for a template to be
exported.
c.
Select the template, and click
.
The Export Plan Sheet dialog box is displayed.
l
Issue 01 (2016-04-30)
d.
Optional: Select the devices.
e.
Click OK. Save the plan sheet to a local computer.
f.
Close the Export Plan Sheet dialog box.
Export a command plan sheet.
a.
Choose Configuration > Network Equipment > Smart Configuration Tool from
the main menu.
b.
Choose Plan Sheet Deploy in the navigation tree.
c.
Click
next to Download command plan table template.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
257
eSight
Operation Guide
9 Managing Network Devices and Services
d.
Save the plan sheet to a local computer.
----End
9.3.1.4.3 Delivering a Plan Sheet
This topic describes how to deliver a plan sheet to multiple network devices.
Prerequisites
l
Devices to which commands are to be delivered have been added to eSight.
l
Telnet parameters have been set for devices to which commands are to be delivered. For
details, see Setting NE Telnet Parameters on eSight.
l
A network data plan sheet has been obtained.
NOTE
If a cell in a plan sheet indicates time, for example, 12:15, set the cell format to Text.
l
All mandatory parameters in the plan sheet have been set, and device names in the plan
sheet exist on eSight (if device names do not exist on eSight, the import fails).
Procedure
Step 1 Choose Configuration > Network Equipment > Smart Configuration Tool from the main
menu.
Step 2 In the navigation tree, click Plan Sheet Deployment. The wizard for delivery by plan sheet is
displayed.
Step 3 Click
or
and select the file to load in the dialog box that is displayed.
l
If you want to deliver different parameters of the same command line to different
devices, select
Issue 01 (2016-04-30)
as required,
.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
258
eSight
Operation Guide
9 Managing Network Devices and Services
l
If you want to deliver different command lines to different devices, select
.
Step 4 Click OK.
Information such as the device name, IP address, and device type in the plan sheet is
displayed.
Step 5 Click Next. The Set task page is displayed.
Step 6 Set task.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
259
eSight
Operation Guide
9 Managing Network Devices and Services
1.
Set parameters.
NOTE
If you select Yes in Email notice area, set the email server. For details, see 5.3 Setting Remote Alarm/
Event Notification.
2.
Click Deploy.
3.
In the Confirm dialog box, click Yes.
On the current page, you can view the task execution progress and details about devices to
which the task is delivered. You can also view the task execution details on the Deploy
Records page.
----End
9.3.1.5 Viewing Delivery Records
Delivery records enable you to view the execution status and result of all tasks.
Procedure
Step 1 Choose Configuration > Network Equipment > Smart Configuration Tool from the main
menu.
Step 2 Choose Deploy Records from the navigation tree on the left.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
260
eSight
Operation Guide
9 Managing Network Devices and Services
Step 3 On the Deploy Records page, double-click
in the Operation column of a specific task.
Step 4 View the detailed delivery records of the task.
The following table lists the operations that you can perform on the task delivery record page.
Operation
Description
Viewing the
configuration
commands
Click
in the View Configuration Command column and
view the delivered configuration command.
Viewing the delivery
results
Click
in the Template Result column and view the command
execution result.
Redelivering the failed
tasks
Exporting results
Click
failed tasks.
and redeliver the
Click
and save device execution
information to the local host.
----End
9.3.1.6 Examples
This topic describes two typical applications to help network administrators better understand
the smart configuration tool.
9.3.1.6.1 Example: Delivery by Template
This topic describes how to deliver the same parameters of the same commands to different
NEs by template.
Scenario
Ikarus is the network administrator in company M that has deployed a wireless network to
transform the existing network. When the hardware is deployed, to enable network
connection, Ikarus wants to configure the same parameters on the three ACs.
l
Issue 01 (2016-04-30)
Ikarus can choose to configure AC parameters on the three devices, which is
cumbersome and error-prone.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
261
eSight
Operation Guide
9 Managing Network Devices and Services
l
Ikarus can also choose to configure the same parameters on multiple devices in batches
by using template delivery, which also verifies delivered commands to ensure
configuration correctness.
Data Plan
Table 9-19 AC configuration information
Device IP
Device
Name
VlanIf
AP
Authentica
tion Mode
Forwardin
g Type
Country
Code
192.168.0.1
WLAN_AC
_01
vlanif88
No
ESS
CN
192.168.0.2
WLAN_AC
_02
vlanif88
No
ESS
CN
192.168.0.3
WLAN_AC
_03
vlanif88
No
ESS
CN
Procedure
Step 1 Choose Configuration > Network Equipment > Smart Configuration Tool from the main
menu.
Step 2 In the navigation tree, click Template Deployment, and select Huawei > VLAN
Configuration > Global VLAN Configuration template in the template table.
Step 3 Click
. The template delivery wizard is displayed.
Step 4 Modify the start and end VLAN IDs as required, and click Next.
NOTE
l Parameters marked with an asterisk (*) are mandatory. If a parameter marked with an asterisk (*) is
left blank, the template will not contain this command.
l The smart configuration tool provides default settings. You can modify parameters based on the site
scenario.
, select the devices whose IP addresses are 192.168.0.1, 192.168.0.2 and
Step 5 Click
192.168.0.3 from the device list in the Select Device dialog box that is displayed, and click
OK. Then click Next.
NOTE
l After selecting the devices, you can verify the commands. The verification takes a long period and
cannot be interrupted. Therefore, verify commands with caution.
l You can verify the command line syntax based on command sets even if the device is disconnected
from eSight.
Step 6 Set Task Name, select Instantly, Backup before deployment and Restore after failure, and
click Deploy.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
262
eSight
Operation Guide
9 Managing Network Devices and Services
Step 7 In the Confirm dialog box, click Yes.
Step 8 In the navigation tree, click Deploy Records. The task execution progress and details about
devices to which the task is delivered are displayed in the task list.
----End
9.3.1.6.2 Example: Delivery by Plan Sheet
This topic describes how to deliver different parameters of the same commands to different
NEs by plan sheet.
Scenario
Ikarus is the network administrator in company M that has deployed a wireless network to
transform the existing network. When the hardware is deployed, to enable network
connection, Ikarus wants to configure different parameters on the three ACs.
l
Ikarus can choose to configure AC parameters on the three devices, which is
cumbersome and error-prone.
l
Ikarus can also choose to configure different parameters on multiple devices in batches
by using plan sheet delivery, which also verifies delivered commands to ensure
configuration correctness.
Data Plan
Table 9-20 AC configuration information
Device IP
Device
Name
VlanIf
AP
Authentica
tion Mode
Forwardin
g Type
Country
Code
192.168.0.1
WLAN_AC
_01
vlanif88
MAC
ESS
CN
192.168.0.2
WLAN_AC
_02
vlanif101
MAC
ESS
CN
192.168.0.3
WLAN_AC
_03
vlanif102
MAC
ESS
CN
Configuration Roadmap
1.
Export a plan sheet.
2.
Modify the plan sheet.
3.
Deliver the plan sheet.
Procedure
Step 1 Export a plan sheet.
1.
Issue 01 (2016-04-30)
Choose Configuration > Network Equipment > Smart Configuration Tool from the
main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
263
eSight
Operation Guide
9 Managing Network Devices and Services
2.
In the navigation tree, click Template Deployment, choose Huawei > WLAN
Configuration > SPU, ACU2, AC6605 and AC6005 > V200R005 > V200R005C00 >
Configure AC in the template table.
3.
Click
4.
Click OK. Save the plan sheet to the local host.
.
Step 2 Modify the plan sheet.
Enter planned data in the plan sheet.
NOTE
Device names and IP addresses in the plan sheet must exist on eSight. If device names or IP addresses do not
exist on eSight, the import will fail.
Step 3 Deliver the plan sheet.
1.
Choose Configuration > Network Equipment > Smart Configuration Tool from the
main menu.
2.
In the navigation tree, click Plan Sheet Deployment. The wizard for delivery by plan
sheet is displayed.
3.
Click
is displayed.
4.
Click Import. Information such as the device name, IP address, and device type in the
plan sheet is displayed.
5.
Click Verify. The verification result is displayed.
6.
Click Next. The Set task page is displayed.
7.
Set Task Name, select Instantly, Backup before deployment and Restore after
failure, and click Deploy.
8.
In the Confirm dialog box, click Yes.
9.
In the navigation tree, click Deploy Records. The task execution progress and details
about devices to which the task is delivered are displayed in the task list.
and select the file to load in the dialog box that
----End
9.3.2 Device Configuration File Management
Device configuration files vary based on the service configuration on devices. To ensure the
security of device configuration files, eSight provides the functions of backing up and
restoring device configuration files.
9.3.2.1 Overview of Device Configuration File Management Operations
This topic describes the device configuration file management operations.
Figure 9-7 shows the overview of device configuration file management operations.
Figure 9-7 Overview of device configuration file management operations
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
264
eSight
Operation Guide
9 Managing Network Devices and Services
9.3.2.2 Setting System Parameters
You must set system parameters before backing up or restoring a device configuration file.
9.3.2.2.1 Setting Backup Parameters
In order to prevent data loss if the router restarts unexpectedly or powered off, device send
trap informations to NSM when configuration is changed. And then triggered the NSM to
save the device configuration file.
Prerequisites
1.
Trap parameters have been set to the NE side successfully, eSight can receive the
equipment alarm normally.
2.
Set the device save configuration files at regular intervals: set save-configuration
[ interval interval | cpu-limit cpu-usage | delay delay-interval] * .
Issue 01 (2016-04-30)
Parameter
Description
Value
interval interval
Specifies the interval for
saving configurations.
The value is an integer
ranging from 30 to 43200, in
minutes. The default value is
30.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
265
eSight
Operation Guide
9 Managing Network Devices and Services
Parameter
Description
Value
cpu-limit cpu-usage
Specifies the upper limit
of the CPU usage.
When automatic saving
is triggered by the
expiry of the timer, the
CPU usage is checked.
If the CPU usage is
higher than the set
upper limit, automatic
saving will be canceled.
The value is an integer
ranging from 1 to 60, in
percentage. The default value
is 50%.
delay delay-interval
Specifies a delay after
which the system
automatically backs up
configurations when the
system configurations
change.
The value is an integer
ranging from 1 to 60, in
minutes. The default value is
5. The value of delay-interval
must be smaller than the value
of interval.
Procedure
Step 1 Choose Configuration > Configuration Management > Configuration File Management.
Step 2 In the navigation tree on the left, choose Set System Parameters > Backup Parameters.
Step 3 Set Max. backup files.
NOTICE
l When the Max backup files value is lower than the number of existing backup files, eSight
automatically deletes the earliest backup NE configuration files. Exercise caution when
setting Max backup files.
l When the number of backup NE configuration files reaches the maximum, eSight deletes
the earliest backup NE configuration files by default.
Step 4 Enable or disable Alarm burst mode.
NOTE
1. When Alarm burst mode is enabled, the configuration file module automatically backs up device
configuration files when eSight receives configuration update alarms from devices.
2. When Alarm burst mode is disabled, the configuration file module does not back up device
configuration files when eSight receives configuration update alarms from devices.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
266
eSight
Operation Guide
9 Managing Network Devices and Services
Step 5 Enable or disable Configuration file's change burst alarm. When Configuration file's
change burst alarm is enabled, eSight will send a trap when configuration files are changed.
Step 6 Click Apply.
----End
9.3.2.2.2 Setting Email Notification
eSight will notify you of execution results by email when a periodic backup task is executed
or configuration file is changed.
Prerequisites
The email server has been configured. For details on how to configure an email server, see 5.3
Setting Remote Alarm/Event Notification.
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Step 2 In the navigation tree, choose Set System Parameters > Email Notification.
Step 3 Choose Backup Task Execution Result Notification, eSight will notify you of execution
results by email when a periodic backup task is executed.
Step 4 Choose Configuration File Change Notification, enter Email subject, choose Send time,
eSight will notify you of results by email when configuration file is changed.
Step 5 Click
group.
Issue 01 (2016-04-30)
. In the dialog box that is displayed, select a value for Recipient based on the user
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
267
eSight
Operation Guide
9 Managing Network Devices and Services
NOTE
Select Backup Task Execution Result Notification or Configuration File Change Notification, and then
you can select Recipient.
----End
9.3.2.3 Backing Up NE Configuration Files
You can back up NE configuration files to the eSight server to avoid NE data damage or loss
due to upgrade, rollback, or other exceptions.
9.3.2.3.1 Backing Up NE Configuration Files Automatically
eSight can automatically and periodically back up NE configuration files using backup tasks.
Prerequisites
l
The FTP service is configured and started. For details on how to configure the FTP
service, see eSight Administrator Guide.
l
SNMP write permission is set. For details, see Setting SNMP Parameters.
l
Parameters on NEs and eSight are set to the same values, ensuring normal
communication, for example, command delivery.
–
For Huawei devices (the device type is HuaweiDevice, except WS6603), ensure
that SNMP parameters on NEs and eSight are set to the same values. For details,
see 9.1.2.2.2 Setting NE SNMP Parameters on eSight.
–
For non-Huawei devices and WS6603, ensure that Telnet parameters on NEs and
eSight are set to the same values. For details, see 9.1.2.2.1 Setting NE Telnet
Parameters on eSight.
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Step 2 Choose Manage Config Files > Backup Tasks from the navigation tree on the left.
Step 3 Click Create to set backup task parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
268
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Select Send email and enter a recipient's email address. If multiple email addresses are
entered, separate them by comma (,).
Step 5 Click Add Device next to Apply to Device, select a device, and click OK to apply the backup
task to the device.
Step 6 Optional: Select a device in the Apply to Device pane as required and click Delete Device to
cancel the application of the backup task.
Step 7 Click OK.
----End
Follow-up Procedure
Operation
Method
Enable a backup
task
Select a backup task and click Enable.
Disable a backup
task
Select a backup task and click Disable.
Modify a backup
task
1. Click
in the Operation column where the required role
information is located.
2. n the displayed page, modify the backup task parameters.
3. Click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
269
eSight
Operation Guide
9 Managing Network Devices and Services
Operation
Method
Delete a backup
task
Select a backup task and click Delete to delete it.
Start backup
View backup
records
Click
in the Operation column where the required role
information is located.
If Latest Backup Result is Failure or Partially successful, click
Failure or Partially successful to view backup records. After faults
are rectified, select the device and click Back Up.
9.3.2.3.2 Backing Up NE Configuration Files Manually
You can back up NE configuration files manually for instant backup.
Prerequisites
l
The FTP service is configured and started. For details on how to configure the FTP
service, see eSight Administrator Guide.
l
SNMP write permission is set. For details, see Setting SNMP Parameters.
l
Parameters on NEs and eSight are set to the same values, ensuring normal
communication, for example, command delivery.
–
For Huawei devices (the device type is HuaweiDevice, except WS6603), ensure
that SNMP parameters on NEs and eSight are set to the same values. For details,
see 9.1.2.2.2 Setting NE SNMP Parameters on eSight.
–
For non-Huawei devices and WS6603, ensure that Telnet parameters on NEs and
eSight are set to the same values. For details, see 9.1.2.2.1 Setting NE Telnet
Parameters on eSight.
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Step 2 In the navigation tree on the left, choose Manage Configuration Files > Configuration
Backup Files.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
270
eSight
Operation Guide
9 Managing Network Devices and Services
Step 3 Select one or more devices and choose Backup from device > Backup Selected to back up
the device information; If you want to back up all devices, choose Backup from device >
Backup All. If you set search criteria, only the devices meeting the search criteria can be
backed up.
----End
Result
When the number of backup configuration files reaches the maximum, eSight discards the
earliest non-baseline configuration file by default.
9.3.2.4 Managing NE Configuration Files
This topic describes common operations for managing NE configuration files.
9.3.2.4.1 Viewing an NE Configuration File
This topic describes how to view a backup NE configuration file and a configuration file that
is in use.
Prerequisites
The configuration files of a device have been backed up.
Context
A backup file is in .cfg format.
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
271
eSight
Operation Guide
9 Managing Network Devices and Services
Step 2 In the navigation tree on the left, choose Manage Configuration Files > Configuration
Backup Files.
Step 3 View the latest backup configuration file. Click the link of the device name in the Last
Startup Configuration File or Last Running Configuration File column.
NOTE
If the configuration files of a device have not been backed up, the Last Startup Configuration File or Last
Running Configuration File column is empty and you need to manually back up the configuration files first.
For details, see 9.3.2.3.2 Backing Up NE Configuration Files Manually.
Step 4 View the backup NE configuration file.
1.
Click
2.
Click
on the right to access the NE configuration file management page.
to view the corresponding configuration file.
----End
Follow-up Procedure
next to a configuration file to download the configuration file to the local, click
Click
to manage other local configuration file which added to the configuration file list of NMS
server.
9.3.2.4.2 Comparing NE Configuration Files
You can know differences between NE configuration files by comparing them.
Prerequisites
An NE has two or more NE configuration files on eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
272
eSight
Operation Guide
9 Managing Network Devices and Services
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Step 2 In the navigation tree on the left, choose Manage Configuration Files > Configuration
Backup Files.
Step 3 Click
on the right to access the NE configuration file management page.
Step 4 Select two configuration files and click Compare to view the comparing result.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
273
eSight
Operation Guide
9 Managing Network Devices and Services
l
Select Display all or Display differences to customize result displaying.
l
In the lower part of the page, view Same lines, Modified lines, Added lines, and
Deleted lines to find differences between the two configuration files.
l
Click Previous Difference or Next Difference to highlight the previous or next
difference.
----End
9.3.2.4.3 Browsing the Backup NE Configuration File List
After backing up an NE configuration file, you need to browse all the NE's backup
configuration files to verify that the configuration file is backed up successfully.
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Step 2 In the navigation tree on the left, choose Manage Configuration Files > Configuration
Backup Files.
Step 3 Click
on the right and view backup NE configuration files on the file management page.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
274
eSight
Operation Guide
9 Managing Network Devices and Services
Follow-up Procedure
Click
on the right to access the NE configuration file management page, Select two
configuration files and click Compare to view the comparing result.
9.3.2.4.4 Setting NE Configuration Files to the Baseline File
After a configuration file that is being used by an NE is backed up to eSight, you can set the
NE configuration file to the baseline file for subsequent file restore.
Prerequisites
The NE configuration file is backed up to eSight successfully.
Context
By default, the firstly backed up NE configuration file is the baseline file. Each NE has only
one baseline file.
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Step 2 In the navigation tree on the left, choose Manage Configuration Files > Configuration
Backup Files.
Step 3 Set NE configuration files to baseline files.
l Set an NE configuration file to the baseline file:
a.
Issue 01 (2016-04-30)
Click
on the right to access the NE configuration file management page.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
275
eSight
Operation Guide
9 Managing Network Devices and Services
b.
Click
next to the configuration file. The value of File Type is changed to
Baseline, indicating that the configuration file is set to the baseline file successfully.
NOTE
Do not delete baselined configuration files to ensure normal NE data.
l
Optional: Set the latest backup configuration files on NEs to baseline files in batches:
a.
Select multiple NEs and click Set File as Baseline > Set File as Baseline Select.
b.
If the operation fails or partially fails, you can click Details in the Info dialog box
that is displayed to view the cause.
In the Info dialog box that is displayed, click OK.
c.
----End
9.3.2.4.5 Checking the Configuration File Change
In case of a configuration file change, users can check the change details recorded by eSight.
Prerequisites
The NE configuration file has been backed up on eSight.
Context
You can check the change details in either of the following ways:
l In case of a configuration file change, eSight generates an alarm. Users can check the
change details using the alarm module:
a.
b.
l
Choose Monitor > Fault Management > Current Alarms.
In the Operation column of the target alarm whose Alarm Name is Configuration
file changed, click
and choose Look config change.
In case of a configuration file change, users can also check the change details using the
configuration file module. The following describes how to check the change details
using the configuration file module.
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
276
eSight
Operation Guide
9 Managing Network Devices and Services
Step 2 In the navigation tree on the left, choose Manage Configuration Files > Configuration
Backup Files.
Step 3 In the Operation column of the target NE, click
displayed on the page in time order.
. The configuration change details are
Step 4 In the device change list, click a change record. The change details are displayed in the
Change Content area.
Step 5 In the device change list, click
of a change record. The two configuration files are
displayed in left-right comparison mode on the page, showing the detailed differences.
----End
Follow-up Procedure
On the page for viewing configuration files, select multiple NEs, click Export changes
details, select Export selected or Export all from the drop-down list box, set Statistical
region, and export the change details to a local disk.
9.3.2.5 Restoring NE Configuration Files
When an NE is faulty, you can upload an NE configuration file to the NE to restore NE
configuration data.
Prerequisites
l
eSight communicates with NEs normally.
l
The FTP service is configured and started. For details on how to configure the FTP
service, see eSight Administrator Guide.
l
The Telnet parameters on eSight and the NE are set to be the same.
l
SNMP write permission is set. For details, see Setting SNMP Parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
277
eSight
Operation Guide
9 Managing Network Devices and Services
Context
CAUTION
NE configuration file restore may result in service interruption.
Procedure
Step 1 Choose Configuration > Network Equipment > Configuration File Management from the
main menu.
Step 2 In the navigation tree on the left, choose Manage Configuration Files > Configuration
Backup Files.
Step 3 Restore NE configuration files.
NOTE
l This operation takes effect immediately without restarting the NE.
l After you perform the configuration file restoration operation, deleted and modified data is added to the
device and configuration data that exists on the device but is not included in the backup configuration file
still remains.
l
Restore an NE configuration file:
a.
Issue 01 (2016-04-30)
Click
on the right to access the NE configuration file management page.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
278
eSight
Operation Guide
9 Managing Network Devices and Services
b.
l
Select a configuration file to restore, click
, choose To Running or To Startup,
and change the running or startup configuration to the configuration in the selected
configuration file.
Optional: Restore NE configuration files in batches:
a.
Select multiple NEs, click Restore Device to Baseline, choose To Running or To
Startup, and change the running or startup configuration to the configuration in the
selected baseline configuration file.
b.
Click Yes in the Info dialog box that is displayed.
c.
In the Info dialog box that is displayed, click OK.
----End
Follow-up Procedure
Select multiple NEs, click Running to startup to change the running configuration to the
startup configuration directly.
9.3.3 MIB Management
Management information base (MIB) Management is a tool designed for managing MIBs.
This tool displays MIB nodes in a tree-structured hierarchy and supports common MIB
operations, including Get, GetNext, Walk, TableView, Stop, MIB file compiling, and MIB file
loading.
9.3.3.1 MIB Principle
This topic describes the MIB principles, including Simple Network Management Protocol
(SNMP) management model, MIB tree-structured hierarchy, and MIB classification.
9.3.3.1.1 SNMP Management Model
An SNMP system consists of four parts: network management system (NMS), agent,
managed object, and MIB. As the network management center, the NMS manages devices on
the network.
A managed device includes an agent that resides on the device, a MIB, and multiple managed
objects. The NMS interacts with an agent that resides on a managed device, instructing the
agent to perform operations on the MIB of the managed device. Figure 9-8 shows the SNMP
management model.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
279
eSight
Operation Guide
9 Managing Network Devices and Services
Figure 9-8 SNMP management model
The following describes the four parts in an SNMP system:
l
NMS
The NMS runs on the NMS server to manage and monitor network devices using SNMP.
– The NMS sends requests to the agent of a managed device for querying or
modifying one or more parameters.
– The NMS receives trap information actively sent from the agent of a managed
device to obtain the status of the managed device.
l
Agent
An agent is a process that runs on a managed device for maintaining data of the managed
device, responding to the requests sent from the NMS, and sending management data to
the NMS.
– An agent receives requests from the NMS, performs related operations on the MIB
tables, and sends the operation results to the NMS.
– When a device encounters a fault event or any other exceptions, the device actively
reports its status change to the NMS through the agent.
l
Managed object
A managed object is an object that is managed by the NMS. It can be a piece of
hardware (for example, an interface board) on a device or a collection of hardware or
software (for example, a routing selection protocol) and associated configuration
parameters. A device may have multiple managed objects.
l
MIB
A MIB is a database that specifies variables (information that can be queried and set by
an agent) maintained by a managed device. It defines a series of attributes for a managed
device, including the object name, object status, object access rights, and object data
type. The NMS communicates with the agent of a managed device using SNMP,
instructing the agent to perform MIB operations. In this way, the NMS is able to monitor
and manage the device.
The MIB hierarchy can be depicted as a tree with a nameless root in the uppermost, and
its tree structure is similar to that of a domain name system (DNS). A MIB is also called
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
280
eSight
Operation Guide
9 Managing Network Devices and Services
an object naming tree. Figure 9-9 shows a part of the MIB. An object identifier (OID)
identifies a managed object on the tree. For example, the OID of system on the tree is
1.3.6.1.2.1.1 and the OID of interface is 1.3.6.1.2.1.2.
Such an OID tree enables users to efficiently manage the stored management information
and to conveniently query information in batches.
During agent configuration, a MIB view can be used to limit the MIB objects that the
NMS can access. A MIB view is a MIB subset.
Figure 9-9 OID tree structure
9.3.3.1.2 MIB Classification
This topic describes the MIB classification.
MIBs can be classified into two types: public MIB and proprietary MIB.
l
Public MIB: generally defined by the Requirement For Comments (RFC) for structured
design and interface standardization processing for various public protocols. For
example, OSPF-MIB (RFC1850) and BGP4-MIB (RFC1657) are typical public MIBs.
Most of the equipment vendors provide RFC-compliant SNMP interfaces.
l
Proprietary MIB: a necessary supplement to public MIBs. When equipment vendors
develop their own proprietary protocols or unique functions, proprietary MIBs can be
used to improve the management functions of SNMP interfaces. In addition, proprietary
MIBs enable third-party NMS software to manage devices that use proprietary protocols
or have unique functions.
9.3.3.2 About MIB Management
This topic describes the home page and associated functions of MIB Management.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
281
eSight
Operation Guide
9 Managing Network Devices and Services
Home Page
1. Parameter setting
area
2. Shortcut operation
area
3. Operation result
display area
4. Search area
5. MIB tree
navigation area
6. Right-click menu
7. Node attribute
display area
8. Operation status
display area
Function
l
Verifies connectivity between network elements (NEs) and eSight.
l
Manages MIB files, including compiling and loading MIB files.
l
Supports common operations for obtaining MIB node data, including Get, GetNext,
Walk, TableView, and Stop.
9.3.3.3 Function Panorama
This topic provides the function panorama of MIB Management based on MIB application
scenarios.
Background
Before using MIB Management, learn about the MIB principles. For details, see 9.3.3.1 MIB
Principle.
Overview
Figure 9-10 shows the function panorama of MIB Management.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
282
eSight
Operation Guide
9 Managing Network Devices and Services
Figure 9-10 Function panorama
Recommended Procedure
Select operation procedures based on the site requirements.
Scenario 1: The MIB file you want to use has not been pre-integrated into eSight. For details
about how to check whether a MIB file is pre-integrated into eSight, see List of preintegrated MIB files.
1.
Obtain a source MIB file.
2.
Compile the MIB file. For details, see 9.3.3.7.1 Compiling MIB Files.
3.
Load the MIB file. For details, see 9.3.3.7.2 Loading MIB Files.
4.
Connect the device corresponding to the source MIB file. For details, see 9.3.3.5
Connecting Devices.
5.
Query MIB nodes of the device. For details, see 9.3.3.6 Querying MIB Nodes.
6.
Obtain the device data. For details, see 9.3.3.8 Obtaining Device Data.
Scenario 2: The MIB file you want to use has been pre-integrated into eSight.
1.
Connect the device corresponding to the MIB file. For details, see 9.3.3.5 Connecting
Devices.
2.
Query MIB nodes of the device. For details, see 9.3.3.6 Querying MIB Nodes.
3.
Obtain the device data. For details, see 9.3.3.8 Obtaining Device Data.
Scenario 3: You have no idea about whether the MIB file you want to use has been preintegrated into eSight.
1.
Connect a device. For details, see 9.3.3.5 Connecting Devices.
2.
Query MIB nodes of the device. For details, see 9.3.3.6 Querying MIB Nodes.
3.
Obtain the source MIB file of the device.
4.
Compile the MIB file. For details, see 9.3.3.7.1 Compiling MIB Files.
5.
Load the MIB file. For details, see 9.3.3.7.2 Loading MIB Files.
6.
Obtain the device data. For details, see 9.3.3.8 Obtaining Device Data.
9.3.3.4 Typical Configuration Example
This topic describes how to quickly query device information using pre-integrated and nonpre-integrated MIB files on eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
283
eSight
Operation Guide
9 Managing Network Devices and Services
9.3.3.4.1 Querying Device Information Using a Non-Pre-Integrated MIB File
This topic describes how to query device data using a MIB file that has not been preintegrated on eSight (Scenario 1 in the function panorama).
Scenario
The administrator John wants to query the access control list (ACL) group description of H3C
S8508-EI on MIB Management. Table 9-21 lists H3C S8508-EI parameters. The MIB file
corresponding to ACL group description has not been pre-integrated into eSight. Therefore,
John obtains the proprietary MIB files and associated mapping table. Table 9-22 lists the MIB
node parameters for ACL group description.
Table 9-21 Device parameters
Name
IP Address
Model
Vendor
SNMP Parameter
nanjing_S850
8
10.136.21.207
S8508-EI
H3C
l Protocol version:
SNMPv2c
l Read community
name: public
l Write community
name: private
l NE port: 161
l Timeout duration: 3
l Number of
retransmissions: 3
Table 9-22 MIB node parameters
Node Name
OID
MIB File
Description
hh3cAclNum
GroupDescrip
tion
1.3.6.1.4.1.25506.2.
8.1.2.1.4
l hh3c-acl.mib
Description of this ACL
group.
No.
Operation
Description
1
Compile MIB files.
Compile proprietary MIB files hh3c-oid.mib and
hh3c-acl.mib.
l hh3c-oid.mib
Configuration Process
The compiled files are displayed in the unloaded
MIB file list.
Issue 01 (2016-04-30)
2
Load MIB files.
Load the compiled MIB files to the MIB tree.
3
Connect the device.
Connect the device to MIB Management.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
284
eSight
Operation Guide
9 Managing Network Devices and Services
No.
Operation
Description
4
Obtain device MIB
data.
Obtain data of all leaf nodes under the current node
by the Walk operation.
Procedure
l
l
Compile MIB files.
a.
Choose Configuration > Network Equipment > MIB Management from the
main menu.
b.
Click
c.
On the MIB File Management page, click
d.
. On the page that is displayed, select
On the MIB File Management page, click
the MIB file hh3c-oid.mib and the MIB file directory h3c.
e.
Click Compile. The compiling result is displayed in the Compile result area.
f.
Compile the MIB file hh3c-acl.mib in the same way.
g.
Click OK. The MIB compiling page is closed.
.
Load MIB files.
a.
In List of Unloaded MIB Files, select HH3C-OID-MIB and HH3C-ACL-MIB
.
and click
b.
l
l
.
Verify that the MIB files are displayed in List of Loaded MIB Files and click
Close.
Connect the device.
a.
Enter the device IP address in the IP address text box.
b.
. On the page that is displayed, set SNMP parameters according to the
Click
information in Table 9-21 and click OK.
c.
Click
d.
When the message "Device connected successfully" is displayed, click OK.
.
Obtain MIB data.
a.
Enter the name or OID of the desired MIB node in
.
b.
. MIB Management quickly locates the MIB node on the MIB tree.
Click
Attribute values of this MIB node are displayed in the Properties area.
c.
Click
on the toolbar.
The table node data is displayed in the operation result area.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
285
eSight
Operation Guide
9 Managing Network Devices and Services
9.3.3.4.2 Querying Device Information Using a Pre-Integrated MIB File
This topic describes how to query device data using a MIB file that has been pre-integrated on
eSight (Scenario 2 in the function panorama).
Scenario
The administrator Jack wants to query the system OID information about Huawei S9306 on
MIB Management. Table 9-23 lists Huawei S9306 parameters. Table 9-24 lists the MIB node
parameters for the system OID information.
Table 9-23 Device parameters
Name
IP Address
Type
Vendor
SNMP Parameter
S9306-34
10.136.61.34
S9306
Huawei
l Protocol version:
SNMPv2c
l Read community
name: public
l Write community
name: private
l NE port: 161
l Timeout duration: 3
l Number of
retransmissions: 3
Table 9-24 MIB node parameters
Node Name
OID
MIB File
sysObjectID
1.3.6.1.2.1.1.2
RFC1213-MIB
No.
Operation
Description
1
Connect the device.
Connect the device to MIB
Management.
2
Obtain device MIB data.
Obtain data of sysObjectID by the Get
operation.
Configuration Process
Procedure
l
Connect the device.
a.
Issue 01 (2016-04-30)
Choose Configuration > Network Equipment > MIB Management from the
main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
286
eSight
Operation Guide
9 Managing Network Devices and Services
l
b.
Enter the device IP address in the IP address text box.
c.
Click
. On the page that is displayed, set SNMP parameters according to the
information in Table 9-23 and click OK.
d.
Click
e.
When the message "Device connected successfully" is displayed, click OK.
.
Obtain MIB data.
a.
Enter the name or OID of the desired MIB node in
.
b.
Click
. MIB Management quickly locates the MIB node on the MIB tree.
Attribute values of this MIB node are displayed in the Properties area.
c.
Click
on the toolbar.
The MIB node data is displayed in the operation result area.
----End
9.3.3.5 Connecting Devices
Before obtaining the MIB information about a device, connect the device to MIB
Management using SNMP.
Context
l
MIB Management can connect to a device using SNMP and obtain the MIB information
about the device. For details about the relationships between MIB and SNMP, see
9.3.3.1.1 SNMP Management Model.
l
Device connection can be used to test the connectivity between NEs and eSight.
Procedure
Step 1 Choose Configuration > Network Equipment > MIB Management from the main menu.
Step 2 Select a device to connect.
l
If the device has not been added to eSight, enter the IP address of the device in the IP
address text box.
l
If the device has been added to eSight, click
the device and click OK.
Step 3 Click
Issue 01 (2016-04-30)
. On the page that is displayed, select
. On the page that is displayed, set SNMP parameters and click OK.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
287
eSight
Operation Guide
9 Managing Network Devices and Services
Table 9-25 SNMP Parameter Description
Issue 01 (2016-04-30)
Parameter
Description
SNMP version
Currently, the SNMPv1, SNMPv2c, and SNMPv3 versions are
supported. The SNMPv3 version is applied in the scenario requiring
high parameter security level.
Read community
The read community name for eSight to send a read request to an NE.
The read operation is available when the read community name is the
same as that acknowledged by the NE.
Write community
The write community name for eSight to send a write request to an
NE. The write operation is available when the write community name
is the same as that acknowledged by the NE.
Timeout
interval(s)
The time when eSight waits for a response for an operation request.
Resending times
he maximum number of times for eSight to resend an operation
requests when eSight configures SNMP parameters for an NE in the
case that the timer expires. If the actual number of times exceeds this
value, operation fails.
NE port
SNMP communication port of the NE.
Security name
NE user name used for accessing the NE.
Authentication
protocol
A protocol used for message verification. You can choose the
HMACMD5 or HMACSHA protocol or do not use any protocol.
When you use the HMACMD5 or HMACSHA protocol, you must set
an authentication password.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
288
eSight
Operation Guide
9 Managing Network Devices and Services
Parameter
Description
Privacy protocol
Encryption protocol used for data encapsulation. You can choose the
DES or AES encryption protocol or do not use encryption. When you
use the DES or AES encryption protocol, you must set an encryption
password.
NOTE
Using AES is recommended because of its higher security than DES.
NOTE
l The parameters set here must be the same as those on the device; otherwise, the device fails to connect to
MIB Management.
l The SNMP parameter settings here are not saved to the database.
Step 4 Click
.
Step 5 When the message "Device connected successfully" is displayed, click OK.
----End
9.3.3.6 Querying MIB Nodes
After a device is connected, you can query information about MIB nodes of this device.
Prerequisites
A device has been connected to MIB Management. For details about how to connect a device,
see 9.3.3.5 Connecting Devices.
Context
l
MIB Management reads some common MIB nodes by default when a device is
connecting to MIB Management.
l
If the MIB nodes you want to query do not exist on the MIB tree, you need to compile
and load the desired MIB file. For details, see 9.3.3.7 MIB File Management.
l
If you are familiar with the positions of MIB nodes on the MIB tree:
Procedure
Issue 01 (2016-04-30)
a.
Choose Configuration > Network Equipment > MIB Management from the
main menu.
b.
Locate the desired MIB node from the MIB tree.
c.
Click the MIB node. Attribute values of this MIB node are displayed in the
Properties area.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
289
eSight
Operation Guide
9 Managing Network Devices and Services
l
If you have obtained the node name or OID:
a.
Choose Configuration > Network Equipment > MIB Management from the
main menu.
b.
Enter the name or OID of the desired MIB node in
.
c.
. MIB Management quickly locates the MIB node on the MIB tree.
Click
Attribute values of this MIB node are displayed in the Properties area.
----End
9.3.3.7 MIB File Management
MIB Management allows users to manage (compile and load) MIB files.
9.3.3.7.1 Compiling MIB Files
If the pre-integrated MIB files on MIB Management cannot meet your requirements, you can
compile and load a local MIB file to MIB Management. This topic describes how to compile
a MIB file.
Prerequisites
A source MIB file has been obtained.
List of pre-integrated MIB files
Issue 01 (2016-04-30)
MIB File
Description
HUAWEI-MIB
Huawei public MIB file, which defines public MIB nodes of
Huawei devices.
HUAWEI-BASE-TRAPMIB
Huawei alarm MIB file, which defines MIB nodes that
provide basic alarm information for DataComm.
CISCO-SMI
Cisco basic MIB file, which defines MIB nodes in the basic
structure of Cisco's MIB.
AGGREGATE-MIB
Aggregation MIB file, which defines MIB nodes that provide
device aggregation information.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
290
eSight
Operation Guide
9 Managing Network Devices and Services
MIB File
Description
BGP4-MIB
MIB file for Border Gateway Protocol 4 (BGP-4), which
defines MIB nodes related to BGP-4.
ENTITY-MIB
Entity MIB file, which defines MIB nodes that provide
device entity information.
BRIDGE-MIB
MAC forwarding MIB file, which defines MIB nodes that
provide device MAC forwarding information.
EtherLike-MIB
Ethernet management MIB file, which defines MIB nodes
that provide Ethernet-like information about each port.
IF-MIB
Public interface MIB file, which defines MIB nodes for
objects at the network interface layer.
LLDP-MIB
MIB file for Link Layer Discovery Protocol (LLDP), which
defines MIB nodes that provide LLDP configuration,
statistics, LAN system data, and remote system data.
RFC1065-SMI, RFC1155SMI, RFC1156-MIB, and
RFC1213-MIB
Public standard MIB files defined by RFC, which define
some basic and public MIB nodes.
SNMP-COMMUNITYMIB
SNMP community MIB file, which defines MIB nodes that
support all the three SNMP versions (SNMPv1, SNMPv2,
and SNMPv3).
SNMP-FRAMEWORKMIB
SNMP framework MIB file, which defines MIB nodes for
SNMPv3.
SNMPv2-MIB
SNMPv2 MIB file, which defines MIB nodes for SNMPv2.
SNMPv2-SMI
Basic MIB file of SNMPv2, which defines MIB nodes in the
basic structure of SNMPv2.
Procedure
Step 1 Choose Configuration > Network Equipment > MIB Management from the main menu.
Step 2 Click
.
Step 3 On the MIB File Management page, click
Issue 01 (2016-04-30)
.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
291
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 On the page that is displayed, click
the MIB file.
. Select the desired MIB file and the directory to store
NOTE
Batch compiling is not supported.
Step 5 Click Compile. The compiling result is displayed in the Compile result area.
l
If the compiling is successful, the compiled MIB file is automatically added to List of
Unloaded MIB Files.
l
If the compiling fails, select the specified MIB file based on the suggestions provided
and recompile the MIB file.
Step 6 Click OK. The MIB compiling page is closed.
----End
Follow-up Procedure
On the MIB File Management page, you can also perform the operations described in the
following table.
Issue 01 (2016-04-30)
Operation
Description
Creating MIB file
directories
If the preset directories in the MIB file list cannot meet your
requirements, you can manually create a directory to store
MIB files.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
292
eSight
Operation Guide
9 Managing Network Devices and Services
Operation
Description
Updating MIB files
After you perform operations on one or more MIB files, you
can update the MIB file list to the latest one.
Click
.
9.3.3.7.2 Loading MIB Files
If the MIB information you want to query belongs to a MIB file that is proprietary or not
loaded, you can load the corresponding MIB file that has been compiled to the MIB file list.
Then, the MIB information to query is displayed on the MIB tree.
Prerequisites
The MIB file to load has been compiled. For details about how to compile a MIB file, see
9.3.3.7.1 Compiling MIB Files.
Context
You can directly load MIB files in the unloaded MIB file list because these files have been
compiled.
Procedure
Step 1 Choose Configuration > Network Equipment > MIB Management from the main menu.
Step 2 Click
. The MIB File Management page is displayed.
Step 3 Load a MIB file.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
293
eSight
Operation Guide
9 Managing Network Devices and Services
l
Load selected: In List of Unloaded MIB Files, select one or more MIB files to load and
click
l
.
Load all: Click
.
A loaded MIB file is displayed in List of Loaded MIB Files
Step 4 Click Close.
----End
Follow-up Procedure
On the MIB File Management page, you can also perform the operations described in the
following table.
Operation
Description
Unloading MIB files
If you do not want some MIB information to be displayed on the
MIB tree, remove the corresponding MIB file.
l Unload all: Click
.
l Unload selected: In List of Loaded MIB Files, select one or
more MIB files to unload and click
.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
294
eSight
Operation Guide
9 Managing Network Devices and Services
Operation
Description
Deleting MIB files
If you want to delete a compiled MIB file, perform this operation.
In List of Unloaded MIB Files, select one or more MIB files to
delete and click
Updating MIB files
.
After you perform operations on one or more MIB files, you can
update the MIB file list to the latest one.
Click
.
9.3.3.8 Obtaining Device Data
You can perform operations such as Walk, Get, and GetNext on the MIB tree to obtain MIB
node data of a device, which helps you learn about the device's operating status in a timely
manner.
Prerequisites
l
MIB nodes of a device have been added to the MIB tree of MIB Management. For
details about how to add MIB nodes to the MIB tree, see 9.3.3.7.2 Loading MIB Files.
l
The device has been connected to MIB Management. For details about how to connect a
device to MIB Management, see 9.3.3.5 Connecting Devices.
Context
Table 9-26 MIB operations
Operation
Description
Get
Obtains data of a selected MIB node. This operation takes effect
only on leaf nodes.
GetNext
Obtains data of the lexicographically next MIB node.
Walk
Obtains data of all leaf nodes under the selected node.
TableView
Obtains data of a selected table node and displays the data in
format of a table in the operation result area. This operation takes
effect only on table nodes.
Stop
Stops time-consuming Walk and TableView operations.
Procedure
l
Obtain MIB node data by the Get or GetNext operation.
a.
Enter the name or OID of the desired MIB node in
.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
295
eSight
Operation Guide
9 Managing Network Devices and Services
b.
Click
. MIB Management quickly locates the MIB node on the MIB tree.
Attribute values of this MIB node are displayed in the Properties area.
c.
Obtain MIB node data.
n
By shortcut icon: Click
on the toolbar.
n
By right-click menu: Right-click a MIB node and choose Get from the
shortcut menu.
The MIB node data is displayed in the operation result area.
d.
Obtain data of the next MIB node.
n
By shortcut icon: Click
n
By right-click menu: Right-click a MIB node and choose GetNext from the
shortcut menu.
on the toolbar.
The MIB node data is displayed in the operation result area.
l
Obtain MIB node data by the Walk operation.
NOTE
The Walk operation is time-consuming because a lot of data is involved.
a.
Enter the name or OID of the desired MIB node in
.
b.
Click
. MIB Management quickly locates the MIB node on the MIB tree.
Attribute values of this MIB node are displayed in the Properties area.
c.
Obtain MIB node data.
n
Issue 01 (2016-04-30)
By shortcut icon: Click
on the toolbar.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
296
eSight
Operation Guide
9 Managing Network Devices and Services
n
By right-click menu: Right-click a MIB node and choose Walk from the
shortcut menu.
The MIB node data is displayed in the operation result area.
d.
l
Optional: To stop the Walk operation, click
on the toolbar.
Obtain table node data by the TableView operation.
a.
Enter the name or OID of the desired MIB node in
.
b.
. MIB Management quickly locates the MIB node on the MIB tree.
Click
Attribute values of this MIB node are displayed in the Properties area.
c.
Obtain table node data.
n
By shortcut icon: Click
on the toolbar.
n
By right-click menu: Right-click a table node and choose TableView from the
shortcut menu.
The table node data is displayed in the operation result area.
----End
9.4 User-Defined Device Management
When managing a network containing devices from multiple manufacturers, eSight allows
you to customize devices of the Huawei Device, H3C Device, Cisco Device, and Unknown
types to reduce operation and maintenance costs.
9.4.1 Basic Concepts of User-Defined Devices Management
eSight provides the functions such as monitoring performance, configuration files, topology,
NE panels, alarms, and resources of user-defined devices.
Performance Monitoring
l
Central Processing Unit (CPU) usage, including the board CPU.
l
Memory usage, including the board memory.
l
Device response time and percentage of devices that fail to reach the standard.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
297
eSight
Operation Guide
9 Managing Network Devices and Services
l
Indicator statistics based on the standard Management Information Base (MIB) of
RFC1213: IP packet statistics, interface packet statistics, routing address discard rate,
Transmission Control Protocol (TCP) packet statistics, User Datagram Protocol (UDP)
packet statistics, SNMP packet statistics, and Point-to-Point Protocol (PPP) packet
statistics.
l
Customized counters for monitoring performance of user-defined devices. You can
import counters by customization. eSight supports basic calculation formulas. Counters
are generated based on calculation for multiple MIB objects.
Configuration File Management
You can back up and restore configuration files by using scripts.
Topology Management
You can display the topology of user-defined devices. Different icons are displayed for
different types of devices for easy identification. You can perform different operations on
devices based on the device type.
NE Panel Management
eSight provides default images and displays panel information about network devices based
on the public MIB. eSight does not provide the high-fidelity panel function for non-network
devices such as printers, personal computers (PCs), and servers. You can customize the
functions of user-defined device panels. eSight provides the function of drawing profiles
based on the device photos or high-fidelity pictures so that the displayed panels look more
real. eSight provides the function of displaying private MIB information about non-Huawei
devices on panels. You can perform the operations such as activating an interface,
deactivating an interface, and querying alarm information on panels.
Alarm Management
eSight parses standard alarms reported by user-defined devices by default. You need to
customize private alarm parameters for private alarms reported by user-defined devices by
using the provided customization tool. eSight parses private alarms based on the private alarm
parameters.
Resource Management
eSight supports operations based on the standard MIB. eSight also provides the functions such
as managing interfaces, querying and modifying basic information about devices, and
querying IP address table (IPv4), IP routing table, and entity data based on the RFC1213. You
can customize basic information about the device manufacturer, logo, and device model.
9.4.2 Overview of user-defined device management
This topic describes the user-defined devices management operations.
Figure 9-11 shows the overview of user-defined device management operations.
Figure 9-11 Overview of user-defined device management operations
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
298
eSight
Operation Guide
9 Managing Network Devices and Services
9.4.3 User-defined Device Functions
eSight provides a management platform, allowing you to add devices supporting SNMP to
eSight. eSight provides complete management capabilities for pre-integrated devices. You can
customize user-defined devices (devices of the Huawei Device, H3C Device, Cisco Device,
and Unknown types) as required to manage and monitor them on eSight.
Application Scenario
The application scenario of user-defined devices is described as follows:
1.
Add all devices on the live network to eSight.
2.
Manage devices on eSight and determine whether the devices of the Huawei Device,
H3C Device, Cisco Device, and Unknown types need customization based on the
default functions provided by eSight.
3.
Perform simple customization (customize the manufacturer name and device type for a
device on eSight). Then eSight has general capabilities to manage the device.
4.
Collect related information and perform advanced customization for eSight to have
advanced capabilities to manage the device.
Customize other devices from different manufacturers flexibly on eSight for different
management capabilities. Then you can manage devices from all manufacturers on eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
299
eSight
Operation Guide
9 Managing Network Devices and Services
Figure 9-12 Application scenario
Default and Customizable Functions
Table 9-27 Default and customizable functions
Device
Default Functions After
Discovery
New Functions After
Customization
Huawei Device, H3C
Device, and Cisco Device
l Basic information
l Private alarm
l Device panel
l Performance indicator
l SNMP parameters
l Panel
l Public alarm (alarm
menu and NE manager)
l Topology icon
l IP address
l Interface manager
l Telnet parameters
l Performance indicator
l Configuration file
backup and restore
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
300
eSight
Operation Guide
9 Managing Network Devices and Services
Device
Default Functions After
Discovery
New Functions After
Customization
Unknown
l Basic information
l IP address
l Device panel
l Interface manager
l SNMP parameters
l Telnet parameters
l Alarm
l Performance indicator
l Topology icon
l Configuration file
backup and restore
After customizing a
device, you can back up
and restore the device's
configuration file. You
must restart the device
for the configuration file
to take effect.
User-defined Device Customization Based on Scenario
Table 9-28 User-defined device customization based on scenario
Customization
Item
Description
Information to
Collect
Application Scope
General management capabilities
IP address
Interface manager
Telnet parameters
Topology icon
Manufacturer name
and device type.
Workload: 0.2
person/day
For details, see 9.4.5
Customizing the
Vendor Name and
NE Type.
l Manufacturer
name (Only
Unknown is
available.)
l NE type
l NE category
Unknown
Unknown
Unknown
Huawei/H3C/Cisco/
Juniper/3Com/
Avaya/Boda/
Brocade/Cadant/
DigitalChina/EMC/
Extreme/F5/IBM/
Maipu/Motorola/
MOXA/Marconi/
RapidCity/
Ruijie/ZTE/
Unknown
Advanced management capabilities
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
301
eSight
Operation Guide
9 Managing Network Devices and Services
Customization
Item
Description
Information to
Collect
Application Scope
Alarm
Alarms for NE
monitoring and
management
l Trap OID of the
alarm to add
Huawei/H3C/Cisco/
Juniper/3Com/
Avaya/Boda/
Workload: 1 item/
hour
For details, see
9.4.6.1 Customizing
SNMP Alarm
Parameters.
Performance
Indicator
Performance
indicators supported
by devices of the
Huawei Device,
H3C Device, and
Cisco Device types
are the same as
those of predefined
devices from
Huawei, H3C, and
Cisco respectively.
l VB (MIB node
information)
NOTE
Obtain the preceding
information from the
manufacturer.
l Performance
indicator OID
l Formula
l Measurement
object index
NOTE
Obtain the preceding
information from the
manufacturer.
By default, devices
of the Unknown
type do not support
performance
indicators.
Therefore, you must
customize
performance
indicators for them.
Workload: 0.5 item/
hour
Brocade/Cadant/
DigitalChina/EMC/
Extreme/F5/IBM/
Maipu/Motorola/
MOXA/Marconi/
RapidCity/
Ruijie/ZTE/
Unknown
l Huawei/H3C/
Cisco/Juniper/
3Com/Avaya/
Boda/
Brocade/Cadant/
DigitalChina/EM
C/
Extreme/F5/IBM
/
Maipu/Motorola/
MOXA/Marconi/
RapidCity/
Ruijie/ZTE:
support
customization
but do not need
customization
unless otherwise
specified.
l Unknown: needs
customization.
For details, see
9.4.6.2 Customizing
Performance
Counters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
302
eSight
Operation Guide
9 Managing Network Devices and Services
Customization
Item
Description
Information to
Collect
Application Scope
Configuration
backup files
Devices only of the
Unknown type need
customization. After
customizing a
device, you can back
up and restore the
device's
configuration file.
(The displayed
operation result may
differ from the
actual result.)
l Backup
command
Unknown
l Restore
command
l Restart command
NOTE
Obtain the preceding
information from the
manufacturer.
Workload: 0.2
person/day
For details, see
9.4.6.3 Customizing
a Device
Configuration File.
NE panel
Devices of the
Huawei Device,
H3C Device, Cisco
Device, and
Unknown types can
be displayed on the
NE panel. (The
displayed device
panel may differ
from the actual
situation.)
l Actual
appearance
Huawei Device
l Device hierarchy
Cisco Device
H3C Device
l Device's
vendortype,
which is unique
identifier of each
device
l Start index
Workload: 1
person/day
For details, see
9.4.6.4 Customizing
the Device Panel.
9.4.4 Discovering a User-defined Device
eSight allows you to add a user-defined device to eSight using three methods and manage it
on eSight.
9.4.4.1 Creating a User-Defined Device Manually
If you want a few different types of NEs to access the eSight, you can create these NEs one by
one.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
303
eSight
Operation Guide
9 Managing Network Devices and Services
Prerequisites
l
eSight and NEs can ping each other.
l
You have the permission to perform the Access Resource operation.
l
SNMP and Telnet (optional) parameters have been obtained to discover NEs based on
SNMP. ICMP parameters have been obtained to discover NEs based on ICMP.
l
When NEs are added to eSight by domain name, data on the DNS server is not
synchronized to eSight in real time. To ensure that the domain names on eSight are the
same as those on the DNS server, before adding NEs to eSight, perform the following
operations on the server on which eSight is installed.
–
When the server runs the Windows operating system:
i.
Choose Start > Run.
ii.
Enter cmd in the Run dialog box.
iii. Enter ipconfig/flushdns in the window that is displayed, and press Enter.
If Successfully flushed the DNS Resolver Cache. is displayed, data on the
DNS server is synchronized to eSight.
–
When the server runs the SUSE Linux operating system:
i.
Right-click on the desktop and select Open in Terminal.
ii.
Enter the following command in the Terminal dialog box.
# service nscd restart
Then press Enter.
If Starting Name Service Cache Daemon done is displayed, data on the DNS
server is synchronized to eSight.
If the configuration does not take effect, check the settings in /etc/nscd.conf.
Take nscd (GUN libc) 2.11.1 as an example. Check whether persistent services
in the /etc/nscd.conf file is set to no. If not, change the value to no.
Context
The Internet Control Message Protocol (ICMP) is a core protocol of the TCP/IP family, used
to deliver control messages between IP hosts and routers. Control messages refer to messages
indicating whether the network is connected, the host is reachable, or the rout is available.
Control messages do not transmit user data, but plays a significant role in data transmission.
ICMP NEs are classified into the following types: NEs that support the ICMP protocol (IP
address of an NE can be pinged) but not the SNMP protocol. NEs that support the ICMP
protocol, but the SNMP service is not enabled.
You can add an NE by IP address or domain name.
Procedure
l
Add an NE based on SNMP.
a.
Issue 01 (2016-04-30)
Choose Resource > Add Resource > Add Resource from the main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
304
eSight
Operation Guide
9 Managing Network Devices and Services
b.
On the current page, choose Network device and set the related parameters.
Protocol
Parameter
Description
SNMP
Edit SNMP
parameters
Manually set SNMP parameters to add the NEs.
Automatch
template
After this parameter is selected, eSight
automatically search Protocol Template Library
for parameter templates that match the NEs that
are being added to eSight.
Select
template
Select Telnet parameters that match NEs in
Protocol Template Library.
Edit Telnet
parameters
If you do not want to create a protocol template,
select this parameter and manually set Telnet
parameters to add the NEs.
NOTE
Three
SNMP
versions
are
available:
SNMPv1,
SNMPv2c
, and
SNMPv3.
SNMPv1
and
SNMPv2c
have
security
risks;
therefore,
SNMPv3
is
recommen
ded for
device
discovery.
Telnet
c.
Click OK.
NOTE
Click Apply to create more NEs.
n
Issue 01 (2016-04-30)
If the NE is created successfully, the NE is displayed in the list.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
305
eSight
Operation Guide
9 Managing Network Devices and Services
n
l
If the NE cannot be created, the Error dialog box is displayed, indicating the
reason for the failure. Click OK to set the parameters again.
Add an NE based on ICMP.
NOTE
When the only management requirement is that the NEs remain online, this method is suitable.
a.
Choose Resource > Add Resource > Add Resource from the main menu.
b.
On the current page, choose Network Device and then select ICMP.
c.
Configure the basic information and ICMP information.
d.
n
Time-out period(s): Period for waiting for a response to a request that eSight
sends to an NE.
n
Retry times: Maximum number of times that eSight sends an operation
request to an NE when timeout occurs. After the maximum retry times, the
operation fails.
n
Device location: This parameter helps you to quickly learn about the device
location.
n
Web NMS access: This parameter helps you to access the web NMS of an NE
after the NE is added to eSight.
Click OK.
NOTE
Click Apply to create more NEs.
e.
n
If the NE is created successfully, the NE is displayed in the list.
n
If the NE cannot be created, the Error dialog box is displayed, indicating the
reason for the failure. Click OK to set the parameters again.
Optional: Access the NMS in web mode.
i.
Issue 01 (2016-04-30)
On the device resource page, click the target NE.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
306
eSight
Operation Guide
9 Managing Network Devices and Services
ii.
On the NE manager page, click the link next to Web Net Manage.
iii. Enter the user name and password.
----End
Related Operations
If an NE fails to be added, see How Do I Remove the Failure in Adding NEs in the FAQ.
9.4.4.2 User-Defined Device Auto-Discovery
This function is used to add all devices in a network segment to eSight in batches, which
improves work efficiency.
Prerequisites
l
You have the operation rights for Access Resource.
l
To ensure that eSight can automatically discover devices, you must set the
communication protocol parameters on those devices by referring to 3.4 Configuring
Protocol Parameters on Devices.
l
Before you start an automatic discovery task, check the Exclusion List so that all
devices that need to be discovered are automatically discovered. If a network segment or
IP address is set to an excluded network segment or IP address, it is skipped during auto
discovery. Specifically, choose Resource > Add Resource > Automatic Task
Management from the main menu. On the Exclusion List tab page, check the excluded
network segments or IP addresses.
Context
The auto discovery task that is being executed each time is displayed in the Task List of the
Automatic Task Management page. If you want to execute the task again, see Starting a
task in 3.8 Managing Discovery Tasks.
Procedure
Step 1 Before you start an automatic discovery task, check the Exclusion List. Choose Resource >
Add Resource > Auto Discovery from the main menu.
Step 2 Select an auto discovery mode.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
307
eSight
Operation Guide
9 Managing Network Devices and Services
NOTE
l The eSight provides four auto discovery modes: Network segment Discovery (simple), Network
segment Discovery (advanced), By ARP, and By route.
l You can click the button on the upper right corner to switch the auto discovery mode.
By default, the simple mode is provided, and the button name on the Auto Discovery page is Switch
to Another Mode. Click Switch to Another Mode to switch to the Select auto discovery mode
page. Select an auto discovery mode based on actual conditions.
Step 3 Set parameters of auto discovery tasks.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
308
eSight
Operation Guide
9 Managing Network Devices and Services
Auto Discovery Mode
Operation Method
By
network
segment:
discoveri
ng all
devices
in a
network
segment
On the Network segment Discovery (simple) page:
Simple mode
1. Expand Base Settings and set network segment
parameters.
a. Set IP Address Ranges Settings on the Base Settings
panel.
a. Set Start IP address and End IP address.
b. Click
. In the Select a subnet dialog box,
select a subnet.
next to a subnet to delete the
You can click
subnet.
c. Optional: Repeat the preceding steps to discover
devices in multiple network segment.
2. Expand Task Settings panel and set related parameters
for the auto discovery task.
a. In the Task Name text box, enter the name of the task.
You are advised to set the name to the current date and
time. For example, if the task is executed at 10: 00 in
the morning of June 26, 2013, set the task name to
201306261000.
b. Select the task type from the Type drop-down list box.
If you select Once, you must set Description.
If you select By hour, you must enter a value in the
Frequency text box, set Start time and Description,
and select the Instant execution.
If you select By day, By week, or By month, set
Start time for the auto discovery task, and select the
Instant execution.
3. Set SNMP protocol template.
a. On the SNMP protocol panel, click Select SNMP
Protocol Template.
b. In the Select Protocol Template dialog box, select a
saved SNMP template.
If no SNMP template is available, click Add
(Prerequisite: You have the operation rights for
Configure Protocol Template), and set an SNMP
template in the displayed dialog box.
NOTE
If Automatically match template is selected, existing SNMP
protocol templates are automatically matched during device
discovery.
4. Optional: Select Add the discovered objects
automatically to the NMS, the discovered devices are
automatically added.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
309
eSight
Operation Guide
9 Managing Network Devices and Services
Auto Discovery Mode
Operation Method
If Add the discovered objects automatically to the
NMS is not selected, you can select the discovered
devices to add after the auto discovery is complete.
5. Click Discovery.
During the discovery, you can click Stop Discovery on
the discovery task page to stop the auto discovery.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
310
eSight
Operation Guide
9 Managing Network Devices and Services
Auto Discovery Mode
Advanced
mode
Operation Method
On the Network segment Discovery (advanced) page:
1. Expand Base Settings and set network segment
parameters.
a. Set IP Address Ranges Settings on the Base Settings
panel.
a. Set Start IP address and End IP address.
b. Click
. In the Select a subnet dialog box,
select a subnet.
next to a subnet to delete the
You can click
subnet.
c. Optional: Repeat the preceding steps to discover
devices in multiple network segment.
2. Expand Advanced Settings and set parameters.
a. In the Maximum devices text box, set the maximum
number of devices that are automatically discovered.
b. Optional: In the Notify by email text box, enter the
email addresses of users to be notified of the auto
discovery task result.
3. Expand Task Settings panel and set related parameters
for the auto discovery task.
a. In the Task Name text box, enter the name of the task.
You are advised to set the name to the current date and
time. For example, if the task is executed at 10: 00 in
the morning of June 26, 2013, set the task name to
201306261000.
b. Select the task type from the Type drop-down list box.
If you select Once, you must set Description.
If you select By hour, you must enter a value in the
Frequency text box, set Start time and Description,
and select the Instant execution.
If you select By day, By week, or By month, set
Start time for the auto discovery task, and select the
Instant execution.
4. Expand Protocol Settings, select a protocol type and set
the protocol parameters.
NOTE
For details about the protocol type used in device discovery, see
3.3 Methods and Protocols Used for Discovering Devices.
5. Optional: Select Add the discovered objects
automatically to the NMS, the discovered devices are
automatically added.
If Add the discovered objects automatically to the
NMS is not selected, you can select the discovered
devices to add after the auto discovery is complete.
6. Click Discovery.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
311
eSight
Operation Guide
9 Managing Network Devices and Services
Auto Discovery Mode
Operation Method
During the discovery, you can click Stop Discovery on
the discovery task page to stop the auto discovery.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
312
eSight
Operation Guide
9 Managing Network Devices and Services
Auto Discovery Mode
Operation Method
By ARP: discovering all
devices directly or
indirectly connected to a
specified IP address (Seed
IP) based on the ARP table
of the Seed IP
Perform operations on the By ARP page.
1. Expand Base Settings and set basic parameters.
a. Select the number of hops from the Number of hops
drop-down list box.
NOTE
n
The eSight discovers devices hop by hop based on the
settings. The maximum value of Number of hops is 7. If
the value is set to 2, the eSight discovers level 1 devices
connected to the specified Seed IP, and then level 2
devices. The eSight stops auto discovery when all level 2
devices are discovered.
n
When the number of hops is large, the auto discovery
process consumes long time and high bandwidth, which
affects network performance.
b. Set Seed IP address.
NOTE
It is recommended that you set Seed IP address as the IP
address of a gateway or a layer 3 device (such as a router) to
discover more devices.
To set multiple seed IP addresses, click Add Other
Seed IP Addresses.
next to the target seed IP address to delete
Click
the seed IP address.
c. Click
a subnet.
. In the Select a subnet dialog box, select
2. Expand Advanced Settings and set parameters.
a. In the Maximum devices text box, set the maximum
number of devices that are automatically discovered.
b. Optional: In the Notify by email text box, enter the
email addresses of users to be notified of the auto
discovery task result.
3. Expand Task Settings panel and set related parameters
for the auto discovery task.
a. In the Task Name text box, enter the name of the task.
You are advised to set the name to the current date and
time. For example, if the task is executed at 10: 00 in
the morning of June 26, 2013, set the task name to
201306261000.
b. Select the task type from the Type drop-down list box.
If you select Once, you must set Description.
If you select By hour, you must enter a value in the
Frequency text box, set Start time and Description,
and select the Instant execution.
If you select By day, By week, or By month, set
Start time for the auto discovery task, and select the
Instant execution.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
313
eSight
Operation Guide
9 Managing Network Devices and Services
Auto Discovery Mode
Operation Method
4. Set SNMP protocol template.
a. On the SNMP protocol panel, click Select SNMP
Protocol Template.
b. In the Select Protocol Template dialog box, select a
saved SNMP template.
If no SNMP template is available, click Add
(Prerequisite: You have the operation rights for
Configure Protocol Template), and set an SNMP
template in the displayed dialog box.
NOTE
If Automatically match template is selected, existing SNMP
protocol templates are automatically matched during device
discovery.
5. Optional: Select Add the discovered objects
automatically to the NMS, the discovered devices are
automatically added.
If Add the discovered objects automatically to the
NMS is not selected, you can select the discovered
devices to add after the auto discovery is complete.
6. Click Discovery.
During the discovery, you can click Stop Discovery on
the discovery task page to stop the auto discovery.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
314
eSight
Operation Guide
9 Managing Network Devices and Services
Auto Discovery Mode
Operation Method
By route: discovering all
devices directly or
indirectly connected to a
specified IP address (Seed
IP) based on the route
table of the Seed IP
Perform operations on the By route page.
1. Expand Base Settings and set basic parameters.
a. Select the number of hops from the Number of hops
drop-down list box.
NOTE
n
The eSight discovers devices hop by hop based on the
settings. The maximum value of Number of hops is 7. If
the value is set to 2, the eSight discovers level 1 devices
connected to the specified Seed IP, and then level 2
devices. The eSight stops auto discovery when all level 2
devices are discovered.
n
When the number of hops is large, the auto discovery
process consumes long time and high bandwidth, which
affects network performance.
b. Set Seed IP address.
NOTE
It is recommended that you set Seed IP address as the IP
address of a gateway or a layer 3 device (such as a router) to
discover more devices.
To set multiple seed IP addresses, click Add Other
Seed IP Addresses.
next to the target seed IP address to delete
Click
the seed IP address.
c. Click
a subnet.
. In the Select a subnet dialog box, select
2. Expand Advanced Settings and set parameters.
a. In the Maximum devices text box, set the maximum
number of devices that are automatically discovered.
b. Optional: In the Notify by email text box, enter the
email addresses of users to be notified of the auto
discovery task result.
3. Expand Task Settings panel and set related parameters
for the auto discovery task.
a. In the Task Name text box, enter the name of the task.
You are advised to set the name to the current date and
time. For example, if the task is executed at 10: 00 in
the morning of June 26, 2013, set the task name to
201306261000.
b. Select the task type from the Type drop-down list box.
If you select Once, you must set Description.
If you select By hour, you must enter a value in the
Frequency text box, set Start time and Description,
and select the Instant execution.
If you select By day, By week, or By month, set
Start time for the auto discovery task, and select the
Instant execution.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
315
eSight
Operation Guide
9 Managing Network Devices and Services
Auto Discovery Mode
Operation Method
4. Set SNMP protocol template.
a. On the SNMP protocol panel, click Select SNMP
Protocol Template.
b. In the Select Protocol Template dialog box, select a
saved SNMP template.
If no SNMP template is available, click Add
(Prerequisite: You have the operation rights for
Configure Protocol Template), and set an SNMP
template in the displayed dialog box.
NOTE
If Automatically match template is selected, existing SNMP
protocol templates are automatically matched during device
discovery.
5. Optional: Select Add the discovered objects
automatically to the NMS, the discovered devices are
automatically added.
If Add the discovered objects automatically to the
NMS is not selected, you can select the discovered
devices to add after the auto discovery is complete.
6. Click Discovery.
During the discovery, you can click Stop Discovery on
the discovery task page to stop the auto discovery.
Step 4 Optional: Add a device to the eSight.
l
Add all discovered devices to the eSight.
Click Add All Discovered Devices to NMS to add all discovered devices to theeSight.
l
Add selected devices to the eSight.
a.
Select devices in the discovered device list.
Select a device type from the Filter by device type drop-down list box to add the
same type of devices.
b.
Click Add Selected Device to NMS.
Step 5 Optional: The Result column displays the progress.
After the task of adding devices is complete, the numbers of devices that are added
successfully or fail to be added are displayed. Click Successful or Failed to view details.
----End
9.4.4.3 Importing User-Defined Devices Manually in Batches
You can import devices from an existing device list, which contains basic device information,
including the device IP address and protocol parameters such as the protocol type and version.
Prerequisites
l
eSight and devices can ping each other successfully.
l
You have the permission to perform the Access Resource operation.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
316
eSight
Operation Guide
9 Managing Network Devices and Services
l
Devices support SNMP, and the SNMP parameters have been correctly set on devices.
For details, see 3.4.1.1 Setting SNMP Parameters on Devices.
l
The SNMP parameter settings in eSight are the same as those on devices.
Background
When importing devices, note the following:
l
Use the template provided by eSight, and do not perform any modifications on the
template structure when entering data; otherwise, devices cannot be imported.
l
A maximum of 500 devices can be imported in a batch.
Manually importing NEs is to add NEs by importing the .xls template. Table 9-29 describes
every fields in Excel template.
Table 9-29 Excel template
SNMP version
Field name
Description
v2c
Read Community
This parameter must be the same as the read
community of the SNMP protocol, for example,
public.
Write Community
This parameter must be the same as the write
community of the SNMP protocol, for example,
private.
Security name
NE user name used for accessing the NE.
Authentication
protocol
A protocol used for message verification. You
can choose the HMACMD5 or HMACSHA
protocol or do not use any protocol. When you
use the HMACMD5 or HMACSHA protocol,
you must set an authentication password.
Privacy protocol
Encryption protocol used for data
encapsulation. You can choose the DES or AES
encryption protocol or do not use encryption.
When you use the DES or AES encryption
protocol, you must set an encryption password.
Port
This parameter must be the same as the port
number of the SNMP protocol, for example,
161.
v3
v2c/V3
NOTE
The SNMPv3 is recommended to enable higher security.
Procedure
Step 1 Choose Resource > Add Resource > Import Resource from the main menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
317
eSight
Operation Guide
9 Managing Network Devices and Services
Step 2 Click
and download the .xls template to the local computer.
Step 3 Open the template, fill in device information, and save the template.
Step 4 On the Import Device page, click
Excel file.
next to Upload Resource File and select the saved
Step 5 Click
to upload a file.
Device information and device check results are displayed on the right of the page. If Result
is empty, device check succeeds.
Step 6 Select a device and click Create.
The system starts to import the devices.
l
If the device is created successfully, the Result column is The resource is created
successfully.
l
If the device cannot be created, the reason for the failure is displayed in the Result
column. You can attempt to solve the problem and import devices again based on the
failure reason. If the fault persists, contact the technical support personnel.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
318
eSight
Operation Guide
9 Managing Network Devices and Services
----End
Follow-up Procedure
After devices are added to eSight, you can view loaded data using the physical resource
management function. For details, see 9.1.3 Physical Resource Management.
9.4.5 Customizing the Vendor Name and NE Type
eSight cannot recognize vendor names and NE types of some non-Huawei devices. You must
customize the vendor name and NE type as required in eSight.
Procedure
Step 1 Choose System > Administration > Customize Network Device from the menu.
Step 2 In the navigation tree on the left, choose Basic NE Information > Vendor Information. The
Vendor Information page is displayed.
Step 3 Click Create, and customize vendor information in the new page.
Step 4 Click OK. The Vendor Information page is displayed.
Step 5 In the navigation tree on the left, choose Basic NE Information > NE Type Information.
The NE Type Information page is displayed.
Step 6 Add the NE type information in either of the following ways:
l
Issue 01 (2016-04-30)
Adding a single NE type
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
319
eSight
Operation Guide
9 Managing Network Devices and Services
a.
Click Create and set the parameters listed in Table 9-30.
Table 9-30 Parameters for adding an NE type
b.
l
Parameter
Description
NE Type
NE type, for example, S9312.
Vendor Name
Vendor name. Predefined and user-defined vendor names are
supported.
System OID
System OID, in the format X.X.X...X.
NE Category
NE category, for example, router or switch.
Web NMS URL
URL of a user-defined web NMS. To set this parameter, open
the web NMS, copy the URL on the home page, paste it
here, and replace the IP address and port number in the URL
with %IPAddress%. For example, set this parameter to
http://%IPAddress%/index.html.
NE Icon
NE icon.
Click OK.
Importing NE types in batches
a.
Click Import. Then click
next to Download Template and download the
template to an Excel file on the local host.
b.
Open the template, enter the NE type information according to Table 9-30, and save
it.
c.
On the page for importing NE information, click
select the Excel file, and click
d.
Issue 01 (2016-04-30)
next to Upload resource file,
to upload it.
Click Create.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
320
eSight
Operation Guide
9 Managing Network Devices and Services
----End
Follow-up Procedure
1.
Choose Resource > Resource Management > Device Type from the main menu.
2.
In the navigation tree on the left, choose Network Device, click a user-defined device in
the device list. The page for configuring the basic device information is displayed.
3.
Verify that the device type is customized successfully in the Model area.
9.4.6 NE Management Capability
9.4.6.1 Customizing SNMP Alarm Parameters
You can customize SNMP alarm parameters in eSight so that non-Huawei devices can report
SNMP alarms to eSight.
Context
You must obtain alarms' trap IDs and MIB node information for locating alarm parameters
from the manufacturer.
You can use a tool (for example, MIB Browser) to obtain alarm trap packets. According to the
packet structure, you can obtain parameters related to alarm customization.
SNMPv1 packet structure:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
321
eSight
Operation Guide
9 Managing Network Devices and Services
SNMPv2 packet structure:
Procedure
Step 1 Choose System > Administration > Customize Network Device from the menu.
Step 2 In the navigation tree on the left, choose NE Management Capability > Alarm Type.
Step 3 Customize an alarm.
1.
On the Alarm Type page, click Create. The Create Alarm Type tab page is displayed.
2.
Set the parameters for customizing alarms, and click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
322
eSight
Operation Guide
9 Managing Network Devices and Services
Table 9-31 Parameters for customizing alarms
Parameter
Description
SNMP Version
SNMP versions supported
by eSight, including
SNMPv1, SNMPv2c, and
SNMPv3.
l Set the alarm OID for
devices supporting
SNMPv2c or SNMPv3.
l For devices supporting
SNMPv1, set Generic,
Specific, and Enterprise
ID.
Generic
The combination of
Generic, Specific, and
Enterprise ID is the unique
identifier of an SNMPv1
alarm.
Specific
Enterprise ID
Alarm OID
Trap OID supporting
SNMPv2c, which is the
unique identifier of an
alarm.
New Parameter
Location Parameter Name
Name of an alarm location
parameter.
For example, Port index is
used to locate the port that
reports an alarm.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
323
eSight
Operation Guide
9 Managing Network Devices and Services
Parameter
Description
Location Parameter OID
MIB node of an alarm
location parameter.
Step 4 Customize a recovery alarm.
1.
On the Alarm Type page, click Create. The Create Alarm Type tab page is displayed.
2.
Set Vendor Name to the vendor of a device where an alarm is generated and
Notification Type to Recovery alarm.
3.
Click Select, select an alarm, and click OK.
4.
Set related parameters and click OK.
NOTE
–
If SNMP Version is set to SNMP v1, the Generic, Specific, and Enterprise ID parameters are
mandatory.
–
If SNMP Version is set to SNMP v2c/v3, the Alarm OID parameter is mandatory.
----End
Follow-up Procedure
When the user-defined alarm occurs on a device, choose Monitor > Monitor Management >
Current Alarms to view the alarm information.
9.4.6.2 Customizing Performance Counters
This topic describes how to customize performance counters, including device temperature
and interface packet error rate.
Context
l
User-defined device performance counter group: contains performance counters of
devices, for example, device temperature. The monitoring object is each device.
l
User-defined interface performance counter group: contains performance counters of
ports, for example, interface traffic. The monitoring object is interface.
NOTE
You must obtain the user-defined performance counter MIB information from manufacturers.
l The performance counter formula is an expression for computing performance counters for the MIB
object to be monitored.
l The expression consists of the MIB OID value, and any of the following characters: $ + - * / ==
period ' ( ) When customizing counters for user-defined devices, suffix .0 to the MIB OID. Two $
characters are used to quote an MIB OID. The single quotation mark (') follows the MIB OID,
indicating the last performance counter that a device reports to eSight (the reported performance
counter is used for difference calculation). The period value indicates the report interval. The
symbol == is used for judgment.
Procedure
Step 1 Choose System > Administration > Customize Network Device from the menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
324
eSight
Operation Guide
9 Managing Network Devices and Services
Step 2 In the navigation tree on the left, choose NE Management Capability > Performance
Indicator.
Step 3 Create a user-defined device, a user-defined interface, and a performance counter whose
monitoring objects are unspecified.
1.
Create user-defined device counters. Click Create, set Resource Type to Device and set
other device performance counters on the Create Performance Indicator page. Click
OK.
NOTE
Set Calculation Formula of a device performance counter to MIB ID followed by .0.
2.
Issue 01 (2016-04-30)
Create user-defined port counters. Click Create, set Resource Type to Interface and set
other device performance counters on the Create Performance Indicator page. Click
OK.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
325
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Create performance counter templates.
The performance counter templates are created respectively based on a user-defined device, a
user-defined interface, and a performance counter whose monitoring objects are unspecified
in the previous step. For details, see 6.3 Setting a Performance Data Collection Task.
Step 5 Create performance collection tasks.
The performance collection tasks are created respectively based on the performance counter
templates created in the previous step. For details, see 6.3 Setting a Performance Data
Collection Task.
----End
Follow-up Procedure
Choose Monitor > Performance Management > Historical Performance Data from the
main menu. Select performance counters and resources, and click Search. The historical
performance data is displayed in a line chart.
9.4.6.3 Customizing a Device Configuration File
You must customize restart commands and commands for backing up and restoring
configuration files for devices from different vendors as required.
Procedure
Step 1 Choose System > Administration > Customize Network Device from the menu.
Step 2 In the navigation tree on the left, choose NE Management Capability > Configuration File.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
326
eSight
Operation Guide
9 Managing Network Devices and Services
Step 3 Click Create, click Select next to NE Type, and select a desired device type.
Step 4 Set Backup Running command, Restore Running command, Backup StartUp command,
Restore StartUp command, and Restart command, and click OK.
Step 5 Create a backup task for the configuration file.
1.
Choose Configuration > Network Equipment > Configuration File Management
from the main menu.
2.
Choose Manage Config Files > Backup Tasks from the navigation tree on the left.
3.
Click Create and set parameters related to the backup task.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
327
eSight
Operation Guide
9 Managing Network Devices and Services
4.
Click Add Device next to Apply to Device, select the device type, and click OK to
apply the backup task to devices of this type.
NOTE
l When configuring the backup and restore functions for devices from non-Huawei vendors, you must
set Telnet parameters.
----End
9.4.6.4 Customizing the Device Panel
You can upload a device panel photo or draw a device panel in eSight to customize the device
panel.
Context
l
When customizing the device panel in the NE manager, you do not need to collect
devices' vendor type or start index.
l
Devices of the Unknown type have default device panels and do not support
customization. Currently, you can only customize the device panel for Huawei, Cisco,
and H3C devices in eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
328
eSight
Operation Guide
9 Managing Network Devices and Services
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose View > Device Panel.
Step 3 Customize a subrack.
1.
Right-click a subrack, and choose Create New Style.
2.
Set the subrack size. Click the slot icon
on the menu bar, drag it to the editor, and set
the slot image size based on the subrack image size.
3.
Drag the subrack icon
4.
(Optional) Click
, upload a subrack image from the local host, and select the
subrack image in the Extended Attributes area.
to the slot created in Step 3.2.
NOTE
When you want to log in to eSight using Internet Explorer 8, use Internet Explorer 8 official
version. If Internet Explorer 8 preview release is used to log in to eSight and upload an image, the
display of the image is incorrect and the system prompts an error.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
329
eSight
Operation Guide
9 Managing Network Devices and Services
5.
Drag the slot icon
to the subrack image, set the slot size and index ID based on the
site scenario. A slot must map a board.
6.
Click
7.
Click Finish in the upper right corner.
, set the subrack template name, and click Save.
Step 4 Customize a board and subcard.
The procedures for customizing a board and subcard are the same. The following describes
how to customize a board.
1.
On the Device Panel tab page in the NE manager, right-click a board, and choose Create
New Style.
2.
Drag the slot icon
size.
3.
Drag the board icon
4.
, upload a board image from the local host, and select the board
(Optional) Click
image in the Extended Attributes area.
to the editor, and set the slot image size based on the board image
to the slot created in Step 4.2.
NOTE
When you want to log in to eSight using Internet Explorer 8, use Internet Explorer 8 official
version. If Internet Explorer 8 preview release is used to log in to eSight and upload an image, the
display of the image is incorrect and the system prompts an error.
to
To ensure that the port layout is the same as that on the device, drag the slot icon
the board image, set the slot size and index ID, and arrange slots based on the port layout
on the device.
, set the board template name, and click Save.
5.
Click
6.
Click Finish in the upper right corner.
Step 5 Customize a port template.
1.
On the Device Panel tab page in the NE manager, right-click a port, and choose Create
New Style.
NOTE
When you move the pointer to a port, the port type is displayed in a tip. Create different port
templates for different port types.
2.
Drag the slot icon
size.
3.
Drag the port icon
4.
(Optional) Click
, upload a port image from the local host, and select the port image
in the Extended Attributes area.
to the editor, and set the slot image size based on the port image
to the slot created in Step 5.2.
NOTE
When you want to log in to eSight using Internet Explorer 8, use Internet Explorer 8 official
version. If Internet Explorer 8 preview release is used to log in to eSight and upload an image, the
display of the image is incorrect and the system prompts an error.
5.
Issue 01 (2016-04-30)
Click
, set the port template name, and click Save.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
330
eSight
Operation Guide
9 Managing Network Devices and Services
6.
Click Finish in the upper right corner.
----End
Follow-up Procedure
To verify the device panel customization, choose View > Device Panel in the NE manager to
refresh the device panel.
9.4.6.5 Customizing Telnet Parameters
Telnet return prompts of non-Huawei devices are different from those of Huawei devices. In
this case, the distribution may fail when eSight manages non-Huawei devices through Telnet.
To remove the differences between Huawei and non-Huawei devices, users can modify Telnet
return prompts of non-Huawei devices.
Context
l
During configuration file backup and smart configuration tool template distribution for
non-Huawei devices, eSight must execute Telnet commands to perform the operation. In
this case, Telnet parameter customization is required.
l
eSight pre-integrates Telnet parameters of seven vendors. Devices from the same vendor
may have different Telnet parameters due to device type and version differences. In this
case, Telnet parameter customization is also required.
Procedure
Step 1 Choose System > Administration > Customize Device from the main menu.
Step 2 In the navigation tree on the left, choose NE Management Capability > Telnet
customization. The pre-integrated Telnet parameters of different vendors are displayed on the
page.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
331
eSight
Operation Guide
9 Managing Network Devices and Services
Step 3 Click Customize.
1.
In the Basic Settings area, select Vendor/Device Type and set other parameters.
2.
Expand the Advanced Settings tab and enter related commands in the privileged mode.
Step 4 Click OK.
----End
Follow-up Procedure
Customized Telnet parameters are displayed on the Telnet parameter page. You can also
perform the following operations on the Telnet parameter page.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
332
eSight
Operation Guide
9 Managing Network Devices and Services
Operation
Procedure
Modifying
customized Telnet
parameters
Restoring default
Telnet parameters
Deleting
customized device
types
Click
in the Operation area.
NOTE
Modifying preset Telnet parameters may influence adapted devices and
functions. Therefore, you are advised to add customized Telnet parameters
rather than modify preset Telnet parameters.
Click
Click
.
. Default device types cannot be deleted.
9.4.7 Checking the Network Status of User-Defined Devices
You can check the network status of user-defined devices periodically to obtain the status of
communication between eSight and user-defined devices in real time.
9.4.7.1 Performing a Ping Test
Perform a Ping test on a user-defined device in the NE manager to check the communication
status of eSight and the device.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose View > Basic Information. In the pane on the right,
click Ping.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
333
eSight
Operation Guide
9 Managing Network Devices and Services
Step 3 In the displayed Ping window, set the Ping test parameters and click Ping.
Step 4 In the Ping window, view the Ping test result and click Close.
----End
9.4.7.2 Performing a Trace Test
Perform a Trace test on a user-defined device in the NE manager to check the communication
status of eSight and the device.
Procedure
Step 1 Access the NE manager page.
1.
Issue 01 (2016-04-30)
Choose Resource > Resources Management > Network Device from the main menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
334
eSight
Operation Guide
9 Managing Network Devices and Services
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose View > Basic Information. In the pane on the right,
click Trace.
Step 3 In the displayed Trace window, view the Trace test result.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
335
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Click Close.
----End
9.4.7.3 Query Basic Interface Information
eSight allows users to query interface information.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > Interface Manager.
Step 3 Set filter parameters at the top of the pane and click Search.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
336
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 On the lower part of the right pane of the window, view the interface parameters.
----End
9.4.7.4 Viewing IP Address List
When performing service configuration and network planning, you must query the IP
addresses of an NE and the interface. eSight supports query of IP addresses of an NE and the
interface.
Procedure
Step 1 Access the NE manager page.
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > IP Address.
Step 3 Click Synchronize. After the synchronization, in the displayed Progress window, view the
detailed information, and click OK to synchronize the IP address of the NE to eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
337
eSight
Operation Guide
9 Managing Network Devices and Services
Step 4 Set filter parameters at the top of the pane and click Search. On the lower part of the right
pane of the window, view the IP address parameters of the interface.
----End
9.4.8 Invoking the Web NMS of User-Defined Devices
eSight supports invocation of the Web NMS function of user-defined devices. eSight can
configure services of user-defined devices on the Web NMS page.
Prerequisites
The type of devices is customized.
The user-defined device supports the Web NMS and the Web NMS has been configured when
you customize the NE type on eSight.
Context
NOTE
Huawei frame-type switches and routers do not support the Web NMS function and services of the
devices must be configured by using the smart configuration tool.
Procedure
Step 1 Access the NE manager page.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
338
eSight
Operation Guide
9 Managing Network Devices and Services
1.
Choose Resource > Resources Management > Network Device from the main menu.
2.
Choose Network Device from the navigation tree on the left.
3.
Click the NE name.
Step 2 In the navigation tree on the left, choose Device Config > Web NMS.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
339
eSight
Operation Guide
10 Managing Storage
10
Managing Storage
About This Chapter
By managing storage, you can manage all storage devices in order to understand all of the
storage device information monitored by the eSight.
10.1 Storage Devices Management
By doing so, you can view all storage devices in order to understand all of the storage device
information monitored by the eSight.
10.2 Managing Custom Storages
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
340
eSight
Operation Guide
10 Managing Storage
10.1 Storage Devices Management
By doing so, you can view all storage devices in order to understand all of the storage device
information monitored by the eSight.
10.1.1 Managing Unified Storage
This chapter describes how to manage summary, storage resources, mappings, free space, and
current alarms of unified storage.
10.1.1.1 Managing All Unified Storage Devices
This section describes how to manage all unified storage devices, including viewing unified
storage device information and querying and refreshing new unified storage devices.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, query information about a unified storage device.
l
Choose the subnet you want to query in the Subnet. Click Search to query information
of corresponding unified storage devices in the subnet.
l
Enter a unified storage device name you want to query in the Name. Click Search to
query information of the corresponding unified storage device.
l
Enter a IP address you want to query in the IP address. Click Search to query
information about the corresponding unified storage device.
l
Enter a model you want to query in the Model. Click Search to query information about
the corresponding storage system.
NOTE
You can manage the device in the list as follows.
l Moving device
1. Select a device that you want to move and click Move.
2. In the Select Subnet dialog box, select a subnet to which you want to move the host and click
OK.
l Deleting device
1. In the host list, click the name of a host that you want to delete and click Delete.
2. In the dialog box that is displayed, click OK.
l Exporting device, the VIS devices does not support this function.
1. In the host list, click the name of a host that you want to delete and click Export.
2. In the dialog box that is displayed, input the file name and click OK.
Step 3 In the Unified Storage area of the function pane, view information about unified storage
devices. The following table describes the parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
341
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Name
Name of the unified storage device.
Device
Management
Opening the device management page when clicked.
Status
Status of the unified storage device. For example, the value can be:
Normal, Offline, Unknown, or Faulty.
IP Address
IP address of the management network port on the unified storage
device.
Total Capacity
Total capacity of the unified storage device.
Used Capacity
Used capacity of the unified storage device.
Model
Model of the unified storage device.
Operations
NOTE
The JAVA version must be installed to enable this function to work correctly.
l Click
device.
to go to the topology view of the corresponding
l If the storage array configuration has been changed, click
refresh the selected device to update configuration data.
l Click
to
to delete the selected devices.
----End
10.1.1.2 Viewing the Summary of Disk Arrays
By viewing the summary of a disk array, you can learn about its basic information, capacity,
port operating status, and disk statistics.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, click More to view basic information of the selected disk
array. The following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the disk array.
IP address
IP address of the disk array.
Model
Model of the disk array.
Total capacity
Total capacity of the disk array.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
342
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Block storage pools
Block storage pool quantity of the disk array.
Manufacturer
Manufacturer of the disk array.
Last refreshed at
Time when the disk array was last refreshed.
Device
Management
Opening the device management page when clicked.
Status
Status of the disk array. For example, the value can be: Normal,
Offline, or Faulty.
SN
Serial number of the disk array.
Software version
Software version of the disk array.
Disks
Disk quantity of the disk array.
LUNs
Quantity of LUNs.
NOTE
l Click Device Management, the device management page is opened.
l Click Modify to modify the device name in the Modify dialog.
Step 4 In the Disk Health Status area, view the port status of the selected disk array. The following
table describes the parameters.
Parameter
Description
Normal
The functions and running parameters of the hard disk are normal.
Faulty
Some or all functions of the hard disk fail and the fault cannot be
rectified.
Unknown
The system cannot report the health status of the hard disk.
Single link failure
In dual-controller mode, hard disks are identified by only one
controller.
Unauthenticated
The hard disk has not been authenticated.
Spun down
The disk spins down.
Failing
The disk is failing.
Isolated
The disk slot is faulty and causes the hard disk in it to be
automatically isolated.
Disk write
protection
The hard disk is in the write protection state.
Step 5 In the Port Operating Status area, view the port operating status of the selected disk array.
The following table describes the parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
343
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Port Type
Types of ports on the disk array:
l FC
l iSCSI
Status Distribution
Quantity of online/offline ports.
Step 6 In the Latest 10 uncleared alarms area, view the latest 10 uncleared alarms about the device.
----End
10.1.1.3 Viewing the Summary of VISs
This section describes how to view basic information, capacity summary, and port operating
status of a virtual intelligent storage (VIS) system.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, click More to view basic information of the selected VIS
system. The following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the VIS system.
IP address
IP address of the VIS system.
Model
Model of the VIS system.
Total capacity
Total capacity of the VIS system.
Logical disk groups
Quantity of logical disk groups on the VIS system.
Manufacturer
Manufacturer of the VIS system.
Last refreshed at
The latest time when the VIS system was refreshed.
Device
Management
Opening the device management page when clicked.
Status
Status of VIS the system. For example, the value can be: Online or
Offline.
SN
Serial number of the VIS system.
Software version
Software version of the VIS system controller.
Logical disks
Quantity of logical disks on the VIS system.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
344
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Volumes
Quantity of volumes on the VIS system.
NOTE
l Click Device Management, the device management page is opened.
l Click Modify to modify the device name in the Modify dialog.
Step 4 In the Capacity Summary area, view the capacity summary of the selected VIS system.
In the Capacity Summary area, used capacity and free capacity of the VIS system are
displayed.
Step 5 In the Port Operating Status area, view the port operating status of the selected VIS system.
The following table describes the parameters.
Parameter
Description
Port Type
Types of ports on the VIS system:
l FC
l GEa
Online/Offline
Quantity of online and offline ports on the VIS system.
a: Gigabit Ethernet
----End
10.1.1.4 Viewing the Summary of Unified Storages
By viewing the summary of a disk array, you can learn about its basic information, capacity,
port operating status, and disk statistics.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, click More to view basic information of the selected storage
system. The following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the storage device.
IP address
IP address of the unified storage device.
Model
Model of the unified storage device.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
345
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Total disk capacity
Total capacity of the unified storage device.
File storage pools
Quantity of file storage pools on the unified storage device.
Disks
Quantity of hard disks.
LUNs
Quantity of LUNs.
Status
Status of the unified storage device. For example, the value can be:
Online, Offline, Faulty, or Unknown.
SN
Serial number of the unified storage device.
Software version
Software version of the unified storage device.
Data disks
Quantity of the data disks.
File systems
Quantity of file systems.
Block storage pools
Quantity of block storage pools.
Manufacturer
Manufacturer of the unified storage device.
Last refreshed at
The latest time when the unified storage device was refreshed.
NOTE
l Click Device Management, the device management page is opened.
l Click Modify to modify the device name in the Modify dialog.
Step 4 In the Disk Health Status area, view the hard disk status of the selected unified storage
system. The following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Normal
The functions and running performance of the hard disk are normal.
Faulty
Some or all functions of the hard disk fail and the fault cannot be
rectified.
Unknown
The system cannot report the health status of the hard disk.
Single link failure
In dual-controller mode, hard disks are identified by only one
controller.
Unauthenticated
The hard disk has not been authenticated.
Spin-down
The disk spins down.
Failing
The disk is failing.
Isolated
The disk slot is faulty and causes the hard disk in it to be
automatically isolated.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
346
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Disk write
protection
The hard disk is in the write protection state.
Step 5 In the Port Operating Status area, view the port operating status of the selected unified
storage system. The following table describes the parameters.
NOTE
l Click the Status Distribution of the FC port. The Online Fibre Channel Port Details or Offline
Fibre Channel Port Details dialog box is displayed. And you can view the information about
online FC ports and offline FC ports.
l Click the Status Distribution of the iSCSI port. The Online iSCSI Port Details or Offline iSCSI
Port Details dialog box is displayed. And you can view the information about online iSCSI ports
and offline iSCSI ports.
l Click the Status Distribution of the Ethernet Port. The Online Ethernet Port Details or Offline
Ethernet Port Details dialog box is displayed. And you can view the information about online
Ethernet ports and offline Ethernet ports.
Parameter
Description
Port Type
Types of ports on the unified storage device:
l FC
l iSCSI
l Ethernet Port
Online/Offline
Quantity of online and offline ports on the unified storage device.
----End
10.1.1.5 Viewing Health Status Information
According to the device alarm information, important performance index of load fluctuation
and business operation, the health degree make a health comprehensive evaluation of the
device. This operation allows you to learn about the device alarm information, load
fluctuation and business operation stability of selected unified storage devices.
Context
NOTICE
You can view health status of T series V1R2, T series V1R5, T series V2R1, T series
V2R2C00, T series V2R2C10, HVS85T V1R1C99, HVS88T V1R1C99 and Dorado 5100
V1R1.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
347
eSight
Operation Guide
10 Managing Storage
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, click Healthy.
Step 4 In the right function pane, view health score, health score trend and objects with high
workloads and high anomaly rates.
NOTE
l Workload: Statistics show the load of key performance indicators system.
l Anomaly: To calculate the dynamic fluctuation range corresponding index according to the
performance data collection, the new data beyond the dynamic fluctuation condition known as
anomaly.
l When the device health score is low, please refer to the following suggestions for processing:
1. Check whether there is alarm device, if the alarms exist, please deal with alarms.
2. Check the device workload, if the workload is high, please make sure the device hardware meets
the business needs.
3. Check the device anomaly statistics, please confirm whether the normal business leads to
abnormal condition.
Step 5 Click Threshold Settings in the top right corner, the Threshold Settings dialog is displayed,
the following table describes related parameters:
Issue 01 (2016-04-30)
Name
Description
Heath
If the score is higher than the preset upper
limit, the system is healthy. If the score is
lower than the preset lower limit, the system
has critical health problems. If the score is
between the higher limit and the lower limit,
the system has major health problems.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
348
eSight
Operation Guide
10 Managing Storage
Name
Description
Workload
Statistics on abnormal workloads of specific
objects within one hour based on the preset
workload threshold.
Anomaly
Statistics on anomalies of specific objects
within one hour based on the preset
anomaly threshold.
Upper limit
Set the upper limit value of the heath, for
example, 70.
Lower limit
Set the lower limit value of the heath, for
example, 30.
Workload
Set the workload threshold value, for
example, 40.
Anomaly
Set the anomaly threshold value, for
example, 40.
Step 6 In Workload and Anomalies, view information about the workload of the selected unified
storage device in the last one hour. The following table describes related parameters:
Object
Parameter
Description
Controller
Name
Name of a controller.
Location
Location of a controller in an
enclosure.
Version
Software version of the current
controller.
Load
Load of the current controller.
Location
Disk location in an enclosure.
Physical type
Physical type of a disk.
Manufacturer
Manufacturer of a disk.
Load
Load of a disk.
Identifier
ID of a port.
Owning interface module ID
ID of the interface module where a
port resides.
Owning controller
Controller where a port resides.
Port type
Type of a port.
Load
Load of a port.
Disk
Port
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
349
eSight
Operation Guide
10 Managing Storage
Step 7 In Workload and Anomalies, view information about the anomalies of the selected unified
storage device in the last one hour. The following table describes related parameters:
Object
Parameter
Description
Controller
Name
Name of a controller.
Location
Location of a controller in an
enclosure.
Version
Software version of a controller.
Anomaly
Number of anomalies on a controller.
Location
Disk location in an enclosure.
Physical type
Physical type of a disk.
Manufacturer
Manufacturer of a disk.
Anomaly
Number of abnormal disks.
Identifier
ID of a port.
Owning interface module ID
ID of the interface module where a
port resides.
Owning controller
Controller where a port resides.
Port type
Type of a port.
Anomaly
Number of abnormal ports.
Name
Name of a storage pool.
Type
Type of a storage pool.
RAID level
RAID group level
Anomaly
Number of anomalies in a storage
pool.
Name
Name of a LUN.
Type
Type of a LUN.
Owning storage pool
Storage pool to which a LUN
belongs.
Anomaly
Number of abnormal LUNs.
Disk
Port
Resource
pool
LUN
Step 8 In Workload, view the workload information about the selected unified storage component.
The following table describes related parameters:
NOTE
If anomaly statistics accumulate for seven or more days, the anomaly chart is displayed.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
350
eSight
Operation Guide
10 Managing Storage
Object
Load
Controller
CPU usage
Port
Bandwidth usage
Disk
Disk usage
Resource pool
l IOPS
l I/O latency
l Bandwidth
l IOPS
LUN
l I/O latency
l Bandwidth
Step 9 In Anomalies, view anomalies of the selected unified storage objects. The following table
describes related parameters:
Parameter
Description
Object
Name of the object that has anomalies.
Current Value
The current value of the indicator in the latest eight hours.
Maximum Value
The Max. value of the indicator in the latest eight hours.
Minimum Value
The Min. value of the indicator in the latest eight hours.
Step 10 In Faults, view alarms of the selected unified storage device. The current alarms and alarm
trend chart are displayed.
----End
10.1.1.6 Managing Storage Resource
By managing storage resources, you can obtain information about hard disks, RAID groups,
LUNs, controllers, and ports of the disk array, as well as mappings between these storage
resources.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Storage Resource.
Step 4 On the Storage Resource page, you can view mappings between storage resources.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
351
eSight
Operation Guide
10 Managing Storage
NOTE
You can select Show legends to view icons used on the page. These icons enable you to view
information about resources in an easier and more direct way.
You can click a RAID group to view mappings between objects. That is, mappings between disks,
LUNs, owning controllers, and corresponding ports of mapped LUNs.
Step 5 You can view storage resource information by putting your mouse pointer on the storage
resource.
1.
2.
3.
Issue 01 (2016-04-30)
Check controller information. The following table describes the parameters.
Parameter
Description
Name
Name of the controller.
Health status
Health status of the controller, Normal, Faulty, or Unknown.
Running status
Operating status of the controller, Online or Offline.
IPv4 address
IPv4 address of the controller.
IPv6 address
IPv6 address of the controller.
Primary/
Secondary status
Working status of the controller, Primary or Secondary.
View hard disk information. The following table describes the parameters.
Parameter
Description
Enclosure ID
ID of the enclosure where the hard disk resides.
Slot ID
ID of the slot where the hard disk is inserted.
Physical type
Physical type of the hard disk.
Logical type
Logical type of the hard disk.
Capacity
Total capacity of the hard disk.
Owning block
storage pool or
Owning storage
pool
Name of the block storage pool or storage pool that the hard disk
belongs to, which can be a RAID group or thin pool.
Health status
Health status of the hard disk. For example, the value can be:
Normal, or Faulty, Unknown.
Operating status
Operating status of the hard disk. For example, the value can be:
Online, Offline, or Faulty.
View port information. The following table describes the parameters.
Parameter
Description
Module ID
ID of the module where the port resides.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
352
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Port ID
ID of the port.
Type
Type of the port.
Health status
Health status of the port. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the port. For example, the value can be:
Connected, Disconnected, or Faulty.
MAC address
MAC address of the iSCSI port.
This parameter is valid when the port type is iSCSI.
IPv4 address
IPv4 address of an iSCSI port.
This parameter is valid when the port type is iSCSI.
IPv6 address
IPv6 address of an iSCSI port.
This parameter is valid when the port type is iSCSI.
WWN
Worldwide Name (WWN) of a Fibre Channel port or Serial
Attached SCSI (SAS) port.
This parameter is valid when the port type is Fibre Channel or
SAS.
4.
5.
Issue 01 (2016-04-30)
Operating rate
Operating rate of the port.
Owning controller
ID of the controller to which the port belongs.
View RAID group information. The following table describes the parameters.
Parameter
Description
Name
Name of the RAID group.
ID
ID of the RAID group.
Type
Type of the block storage pool, RAID Group or Block Storage
Pool.
RAID level
RAID level of the block storage pool.
Capacity
Capacity of the storage pool.
Health status
Health status of the storage pool. For example, the value can be:
Normal or Faulty.
Operating status
Operating status of the storage pool. For example, the value can
be: Online or Offline.
Check LUN information. The following table describes the parameters.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
353
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Name
Name of the LUN.
ID
ID of the LUN.
Owning block
storage pool or
Owning storage
pool
The block storage pool or storage pool to which the LUN
belongs.
RAID level
RAID level of the block storage pool to which the LUN belongs.
Capacity
Capacity of the LUN.
Health status
Health status of the LUN. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the LUN. For example, the value can be:
Online or Offline.
Step 6 In the text box on the upper right, enter a LUN name and click Search. The LUN is located.
----End
10.1.1.7 Managing Mappings
This section describes how to obtain information about host groups/mapping views, hosts and
LUNs, as well as mappings between these objects.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Mapping.
Step 4 In the Mapping area, you can check the mapping between different objects.
Step 5 You can view storage resource information by putting your mouse pointer on the storage
resource.
1.
Issue 01 (2016-04-30)
View information about a host group/mapping view. The following table describes the
parameters.
Parameter
Description
Name
Name of the host group/mapping view.
ID
ID of the host group/mapping view.
Hosts
Quantity of hosts contained in the host group/mapping view.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
354
eSight
Operation Guide
10 Managing Storage
2.
3.
4.
Parameter
Description
Mapped LUNs
Quantity of mapped LUNs.
View host information. The following table describes the parameters.
Parameter
Description
Name
Name of the host.
Whether or not to
associate service
hosts
Indicating whether to associate the host with service hosts.
Operating system
Operating system of the host.
Initiators
Quantity of the host initiators.
Mapped LUNs
Quantity of mapped LUNs.
View initiator information. The following table describes the parameters.
Parameter
Description
Identifier
Alias of the initiator.
HBA type
Type of the host bus adapter (HBA).
Status
Status of the initiator.
View LUN information. The following table describes the parameters.
Parameter
Description
Name
Name of the LUN.
ID
ID of the LUN.
WWN
WWN of the LUN.
Health status
Health status of the LUN. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the LUN. For example, the value can be:
Online or Offline.
Capacity
Capacity of the LUN.
Owning block
storage pool or
Owning storage
pool
The block storage pool or storage pool to which the LUN
belongs.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
355
eSight
Operation Guide
10 Managing Storage
10.1.1.8 Viewing SAN Service Free Space
By viewing free space of a storage device, you can learn about the space usage of the storage
device.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Step 4 Select SAN Service from the drop-down list.
Step 5 Click the Storage Device tab and view space usage of the selected storage device. The
following table describes the parameters.
Parameter
Description
Device Name
Name of the storage device.
Total Capacity
Total capacity of the storage device.
Capacity of
Mapped LUNs
Capacity of mapped LUNs.
Capacity of Private
LUNs
Capacity of private LUNs.
Capacity of
Unmapped LUNs
Capacity of unmapped LUNs.
Free Capacity of
Block Storage
Pools
Free capacity of block storage pools.
Free Disk Capacity
Capacity of free disks.
Hot Spare Disk
Capacity
Capacity of hot spare disks.
NOTE
If a LUN is used to expand storage capacity, its Type becomes Private. A
private LUN cannot be mapped to a host or host group.
Step 6 In the function pane, choose Disk to view disk space usage. The following table describes the
parameters.
Issue 01 (2016-04-30)
Parameter
Description
Total Capacity
Total capacity of hard disks.
Free Disk Capacity
Capacity of free disks.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
356
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Member Disk
Capacity
Capacity of member disks.
Hot Spare Disk
Capacity
Capacity of hot spare disks.
Step 7 In the function pane, choose Block Storage Pools or Storage Pools. Select a block storage
pool or a storage pool to view its space usage. The following table describes the parameters.
Parameter
Description
Name
Name of the block storage pool or the storage pool.
ID
ID of the block storage pool or the storage pool.
RAID Level
RAID level of the block storage pool.
NOTE
This parameter is available only when selected Free Space > Block Storage
Pools.
Type
Types of the block storage pool:
l RAID group
l Thin Pool
NOTE
This parameter is available only when selected Free Space > Block Storage
Pools.
Total Capacity
Total capacity of the block storage pool or the storage pool.
Preset Capacity
Preset capacity of a thin pool.
NOTE
This parameter is available only when selected Free Space > Block Storage
Pools.
Capacity of
Mapped LUNs
Capacity of mapped LUNs in the block storage pool or the storage
pool.
Capacity of Private
LUNs
Capacity of private LUNs in the block storage pool.
NOTE
This parameter is available only when selected Free Space > Block Storage
Pools.
If a LUN is used to extend storage capacity, its Type becomes Private. A
private LUN cannot be mapped to a host or host group.
Issue 01 (2016-04-30)
Capacity of
Unmapped LUNs
Capacity of unmapped LUNs in the block storage pool or the storage
pool.
Used Hot Spare
Capacity
Used capacity of the hot spare capacity.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
357
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Free Hot Spare
Capacity
Reserved capacity
Free capacity of the hot spare capacity.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Reserved capacity of the Storage Pool.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Used Storage High
Performance layer
capacity
Used capacity of the high performance layer capacity.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Free Storage High
Performance layer
capacity
Free capacity of the high performance layer capacity.
Used Storage
Performance layer
capacity
Used capacity of the performance layer capacity.
Free Storage
Performance layer
capacity
Used Storage
Capacity layer
capacity
NOTE
This parameter is available only when selected Free Space > Storage Pools.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Free capacity of the performance layer capacity.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Used capacity of the capacity layer capacity.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Free Storage
Capacity layer
capacity
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Free capacity of the capacity layer capacity.
Free Capacity
Free capacity of the block storage pool or the storage pool.
Capacity Ratio
l Selected Free Space > Block Storage Pools, it is the respective
percentages of Capacity of Mapped LUNs, Capacity of
Private LUNs, Capacity of Unmapped LUNs, and Free
Capacity in the block storage pool.
l Selected Free Space > Storage Pools, it is the respective
percentages of Capacity of Mapped LUNs, Capacity of
Unmapped LUNs, Used Hot Spare Capacity, Free Hot Spare
Capacity, and Free Capacity in the storage pool.
Step 8 In the function pane, choose Unmapped LUNs to view space usage of unmapped LUNs. The
following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the unmapped LUN.
ID
ID of the unmapped LUN.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
358
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Type
Types of an unmapped LUN are described as follows:
l Common: common LUNs
l Expansion: An expansion LUN becomes an extended LUN after
LUN expansion. The capacity of the extended LUN is the total
capacity of the extending primary LUN and extending secondary
LUNs.
l Thin: A thin LUN is one whose owning block storage pool or
storage pool is a thin pool.
Capacity
Total capacity of unmapped LUNs.
Owning Block
Storage Pool or
Owning Storage
Pool
Block storage pool or storage pool that the unmapped LUN belongs
to.
----End
10.1.1.9 Viewing NAS Service Free Space
This section describes how to view free space of a storage device.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Step 4 Select NAS Service from the list.
Step 5 Click the Storage Device tab to view space usage of the selected storage device. The
following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Device Name
Name of the storage device.
Total Capacity
Total capacity of the storage device.
Capacity of Shared
File Systems
Capacity of file systems for sharing.
Capacity of
Unshared File
Systems
Capacity of file systems that have not been set for sharing.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
359
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Free Capacity on
Data Disks
Free capacity on data disks.
Step 6 Click the File Storage Pools tab and view space usage of file system pool. The following
table describes the parameters.
Parameter
Description
Name
Name of the file storage pool.
Total Capacity
Total capacity of the file storage pool.
Capacity of Shared
File Systems
Capacity of file systems for sharing.
Capacity of
Unshared File
Systems
Capacity of file systems that have not been set for sharing.
Free Capacity
Free capacity of the file storage pool.
Capacity Ratio
Percentages of the capacity of shared file systems, the capacity of
unshared file systems, and the free capacity of the file storage pool.
Step 7 Click the Data Disks tab and view space usage of data disks. The following table describes
the parameters.
Parameter
Description
Name
Name of the data disk.
Total Capacity
Total capacity of the data disk.
Used Capacity
Used capacity of the data disk.
Free Capacity
Free capacity of the data disk.
Usage (%)
Capacity usage of the data disk.
Step 8 Click the Unshared File Systems tab and view space usage of an unshared file system. The
following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the unshared file system.
Total Capacity
Total capacity of the unshared file system.
Used Capacity
Used capacity of the unshared file system.
Free Capacity
Free capacity of the unshared file system.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
360
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Usage (%)
Capacity usage of the unshared file system.
----End
10.1.1.10 Viewing Free Space of a Hard Disk Area
By viewing free space of hard disk area, you can learn about the space usage of the hard
disks.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Step 4 In the function pane, choose Disk Area to view disk space usage. The following table
describes the parameters.
Parameter
Description
Total Capacity
Total capacity of hard disks.
Free Disk Capacity
Capacity of free disks.
Member Disk
Capacity
Capacity of member disks.
Hot Spare Disk
Capacity
Capacity of hot spare disks.
----End
10.1.1.11 Viewing Free Space of a VIS System
By viewing free space of a virtual intelligent storage (VIS) system, you can learn about the
space usage of the VIS system.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
361
eSight
Operation Guide
10 Managing Storage
Step 4 In the function pane, choose Storage Device to view space usage of the selected VIS system.
The following table describes the parameters.
Parameter
Description
Device Name
Name of the VIS system.
Total Capacity
Total capacity of the VIS system.
Capacity of
Mapped Volumes
Capacity of mapped volumes on the VIS system.
Capacity of Private
Logical Disks
Quantity of private logical disks on the VIS system.
Capacity of
Unmapped
Volumes
Capacity of unmapped volumes on the VIS system.
Free Capacity of
Logical Disk
Groups
Free capacity of logical disk groups on the VIS system.
Free Logical Disk
Capacity
Quantity of free logical disks on the VIS system.
Private Space
Capacity
Quantity of private logical disks on the VIS system.
NOTE
Private logical disks are used to store the configuration information of all
logical disks managed by the VIS6000.
Step 5 In the function pane, choose Logical Disk to view space usage of logical disks. The following
table describes the parameters.
Parameter
Description
Total Capacity
Total capacity of logical disks on the VIS system.
Free Disk Capacity
Capacity of free logical disks on the VIS system.
Member Disk
Capacity
Capacity of member disks on the VIS system.
Private Disk
Capacity
Capacity of private disks on the VIS system.
Step 6 In the function pane, choose Logical Disk Groups to view space usage of logical disk groups.
The following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the logical disk group.
Total Capacity
Total capacity of the logical disk group.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
362
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Capacity of
Mapped Volumes
Capacity of mapped volumes in the logical disk group.
Capacity of
Unmapped
Volumes
Capacity of unmapped volumes in the logical disk group.
Free Capacity
Free capacity of the logical disk group.
Private Space
Capacity
Capacity of private volumes in the logical disk group.
Capacity Ratio
Respective ratios of Capacity of Mapped Volumes, Capacity of
Unmapped Volumes, Free Capacity, and Private Space Capacity
in the logical disk group.
Step 7 In the function pane, choose Unmapped Volumes to view space usage of unmapped volumes.
The following table describes the parameters.
Parameter
Description
Name
Name of an unmapped volume.
Capacity
Capacity of an unmapped volume.
Owning Logical
Disk Group
Logical disk group an unmapped volume belongs to.
----End
10.1.1.12 Viewing Storage Device Effect Range
By viewing affect area of the storage, you can learn about the space usage of the storage
device.
Prerequisites
l
The host has been discovered in the system.
l
You can not view the Storage Effect Range page, when the unified storage is OceanStor
S2600 V1R2 or OceanStor S5000 V1R1.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Storage Effect Range.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
363
eSight
Operation Guide
10 Managing Storage
Step 4 Click Storage Device, the following table describes the parameters.
NOTE
The hosts in the Related Hosts list are discovered through adding resource.
Parameter
Description
Name
Name of a host.
Status
The status of a host.
Operating System
The OS of a host.
IP Address
IP address of the management network port on the unified storage
device.
VM or Not
Whether the device is virtual machine.
Owning ESX
Server/Virtual
Server
The ESX server or the virtual server of a host.
Database
The database of the host belongs to.
----End
10.1.1.13 Viewing Disk Effect Range
By viewing affect area of the disk, you can learn about the space usage of the storage device.
Context
You can not view the Disk page in the Storage Effect Range, when the unified storage is
OceanStor 18500/OceanStor 18800/OceanStor 18800F(V1R1), OceanStor T series V2R2,
6800 V3/5800 V3/5600 V3/5500 V3/5300 V3/2800 V3(V3R1C10) or OceanStor HVS85T/
OceanStor HVS88T(V1R1C00).
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Storage Effect Range.
Step 4 Click Disk, view the disk parameters. The following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Location
The location of the hard disk in the tray.
Health Status
The health status of the hard disk.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
364
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Physical Type
The type of the hard disk.
Running Days
The days of the hard disk have been running.
Capacity
The capacity of the hard disk.
Owning Storage
Pool/RAID Group
The owning storage pool or RAID group of the hard disk.
Health Status of
Storage Pool
The health status of the storage pool.
NOTE
You can view the related host and the application of the hard disk when you click the disk.
----End
10.1.1.14 Configuring Reporter Access Parameters
To enable devices to be loaded to the network management system (eSight) by the automatic
discovery function, configure the reporter access parameters.
Prerequisites
The OceanStor 18000 series and HVS85T/HVS88T(V1R1C00) storage system have been
added, and the reporter access parameters have been changed.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 Set the reporter access parameters, Table 10-1 describes related parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
365
eSight
Operation Guide
10 Managing Storage
Table 10-1 Reporter access parameters
Paramet
er
IP
Setting
Description
Indicates the IP address of the report
device.
[Value range]
l From left to right, the value of the
first byte ranges from 1 to 255.
l The values of the other bytes
range from 0 to 255.
[Example]
10.10.10.70
Port
Port number used for access a
specific NE.
[Value range]
The value ranges from 1 to 65535.
[Example]
6553
Username
Password
Indicates the user name of the report
device.
[Example]
Indicates the password of the report
device.
[Example]
admin
password
Step 4 Click OK when the configuration is successful.
----End
10.1.1.15 Configuring Protocol Parameters and Event Notification
To enable devices to be loaded to the eSight by the automatic discovery function, configure
the eSight access parameters.
Procedure
Step 1 Go to the Unified Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Unified Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Settings > Protocol Parameters or Event Notification, refer to
3.10.2.2 Adding a Single Unified Storage Device to set parameters.
Step 4 Set protocol parameters for the NE and click Test.
Step 5 Click Apply when the test is successful.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
366
eSight
Operation Guide
10 Managing Storage
10.1.2 Managing Massive Storage Systems
This function allows you to manage details and current alarms of mass storage systems.
10.1.2.1 Managing All Massive Storage Devices
This section describes how to manage all mass storage devices, including viewing mass
storage device information and querying and refreshing new mass storage devices.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, query information about a mass storage device.
l
Choose the subnet you want to query in the Subnet. Click Search to query information
of corresponding mass storage devices in the state.
l
Enter a mass storage device name you want to query in the Name. Click Search to query
information of the corresponding mass storage device.
l
Enter a IP address you want to query in the IP address. Click Search to query
information about the corresponding mass storage device.
l
Enter a model you want to query in the Model. Click Search to query information about
the corresponding storage system.
NOTE
You can manage the device in the list as follows.
l Moving device
1. Select a device that you want to move and click Move.
2. In the Select Subnet dialog box, select a subnet to which you want to move the host and click
OK.
l Deleting device
1. In the host list, click the name of a host that you want to delete and click Delete.
2. In the dialog box that is displayed, click OK.
Step 3 In the function pane, view information about mass storage devices. The following table
describes the parameters.
Parameter
Description
Name
Name of the mass storage device.
Device
Management
Opening the device management page when clicked.
NOTE
The JAVA version must be installed to enable this function to work correctly.
NOTE
To enable this function to work correctly, the OceanStor 9000E, CSS or CSE
device need to set the device manage IP address, for details, refer to 10.1.2.14
Configuring Device Management URL for Massive Storage.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
367
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Status
Status of the mass storage device. For example, the value can be:
Normal, Offline, Unknown, or Faulty.
IP address
IP address of the management network port on the mass storage
device.
Total Capacity
Total capacity of the mass storage device.
Used Capacity
Used capacity of the mass storage device.
Model
Model of the mass storage device.
Operations
l Click
device.
to go to the topology view of the corresponding
l If the storage array configuration has been changed, click
refresh the selected device to update configuration data.
l Click
to
to delete the selected devices.
----End
10.1.2.2 Viewing Summary of an OceanStor 9000 Storage System
This task helps you learn about the basic information, service capacity usage of top 5 nodes,
and capacity summary of an OceanStor 9000 storage system.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, view the basic information about the OceanStor 9000 storage
system. The following table describes related parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of an OceanStor 9000 storage system.
Status
Status of an OceanStor 9000 storage system. For example, the value
can be: Normal, Offline, Faulty, or Unknown.
Software version
Software version of the OceanStor 9000 storage system.
Total disk capacity
Total disk capacity of the OceanStor 9000 storage system.
Total Nodes
Number of nodes on the OceanStor 9000 storage system.
Manufacturer
Manufacturer of the mass storage system.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
368
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Last refreshed at
Time when the OceanStor 9000 storage system's information was
refreshed last.
Device
Management
Link to the corresponding device management page.
NOTE
Click Modify to modify the device name in the Modify dialog.
Step 4 In the Capacity Utilization of Top 5 Node area, view the node capacity usage of the
OceanStor 9000 storage system.
Step 5 In the Capacity Summary area, view the capacity summary of the OceanStor 9000 storage
system.
The Capacity Summary area shows the used capacity and free capacity of the OceanStor
9000 storage system.
----End
10.1.2.3 Viewing Summary of the UDS
By viewing detail information of a UDS system, you can learn about the basic information,
cabinet status and capacity summary of the UDS system.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, view basic information of the UDS system. The following
table describes related parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the UDS system.
Status
Status of the UDS system. For example, the value can be: Normal,
Offline, Unknown, or Faulty.
IP address
IP address of the UDS system.
Model
Model of the UDS system.
Total Cabinet
Total number of the cabinet of the UDS system.
Faulty Disk/Total
Disk
The ratio of the faulty disk.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
369
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Total capacity
Total capacity of the UDS system.
Manufacturer
Manufacturer of the cloud storage system.
Last refreshed at
Time when the UDS system's information was refreshed last.
Device
Management
Opening the device management page when clicked.
NOTE
l Click Device Management, the device management page is opened.
l Click Modify to modify the device name in the Modify dialog.
Step 4 In the Cabinet Status area of the function pane, view cabinet status of the UDS system. The
following table describes parameters of cabinet status.
Parameter
Description
Normal Cabinet
The functions and running parameters of the devices in the cabinet
are normal.
Offline Cabinet
The functions and running parameters of the devices in the cabinet
are offline.
Step 5 In the Capacity Summary area, view the capacity summary of the UDS system.
The Capacity Summary area shows the used capacity and free capacity of the UDS system.
----End
10.1.2.4 Viewing Summary of a CSS
By viewing summary information of a CSS, you can learn about the basic information,
cabinet status and capacity summary of the CSS.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, view basic information of the CSS. The following table
describes related parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the CSS.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
370
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Status
Status of the CSS. For example, the value can be: Normal, Faulty,
Offline, or Unknown.
IP Address
IP address of the CSS.
Model
Model of the cloud storage system.
Total Capacity
Total capacity of the CSS.
Used Capacity
Used capacity of the CSS.
Free capacity
Free capacity of the CSS.
Manufacturer
Manufacturer of the cloud storage system.
Last refreshed at
The latest time when the CSS was refreshed.
NOTE
Click Modify to modify the device name in the Modify dialog.
Step 4 In the CSS Node Status area, view the hard disk status of the selected unified storage system.
The following table describes the parameters.
Parameter
Description
Normal
The functions and running performance of the CSS Node are
normal.
Closed
The service of the CSS node is turned off.
Offline
Connections between the CSS node and the network is disconnected
Energy Saving
Enable energy saving mode to reduce power consumption of
equipment operation on the CSS node.
Step 5 In the Capacity Summary area, view the capacity summary of the CSS.
In the Capacity Summary area, used capacity and free capacity of the CSS are displayed.
----End
10.1.2.5 Viewing Summary of a CSE
By viewing summary information of a CSE, you can learn about the basic information and
node status of the CSE.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
371
eSight
Operation Guide
10 Managing Storage
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, view basic information of the CSE. The following table
describes related parameters.
Parameter
Description
Name
Name of the CSE.
Status
Status of the CSE. For example, the value can be: Normal, Offline,
Faulty, or Unknown.
IP Address
IP address of the CSE.
Model
Model of the cloud storage system.
Manufacturer
Manufacturer of the cloud storage system.
Last refreshed at
Time when the CSE system's information was refreshed last.
NOTE
Click Modify to modify the device name in the Modify dialog.
Step 4 In the Node Status area, view the node status of the selected CSE. The following table
describes the parameters.
Parameter
Description
Offline
Connection between the node and the eSight is disconnected
Normal
The functions and running performance of the node are normal.
Faulty
The node is partially or completely faulty and the fault cannot be
rectified.
Unknown
The system cannot report the status of the node.
----End
10.1.2.6 Viewing Summary of a N8000
By viewing summary of a N8000 device, you can learn about its basic information, capacity
summary, port operating status, and disk statistics.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, click More to view basic information of the selected storage
system. The following table describes the parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
372
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Name
Name of the storage device.
IP address
IP address of the N8000.
Model
Model of the N8000.
Total Data Disk
Capacity
Total data disk capacity of the N8000.
File storage pools
Quantity of file storage pools on the N8000.
Disks
Quantity of hard disks.
LUNs
Quantity of LUNs.
Status
Status of the N8000, For example, the value can be: Online, Offline,
Faulty, or Unknown.
SN
Serial number of the N8000.
Software version
Software version of the N8000.
Data disks
Quantity of the data disks.
File systems
Quantity of file systems.
Block storage pools
Quantity of block storage pools.
Manufacturer
Manufacturer of the N8000.
Last refreshed at
The latest time when the N8000 was refreshed.
NOTE
l Click Device Management, the device management page is opened.
l Click Modify to modify the device name in the Modify dialog.
Step 4 In the Disk Health Status area, view the hard disk status of the selected unified storage
system. The following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Normal
The functions and running performance of the hard disk are normal.
Faulty
Some or all functions of the hard disk fail and the fault cannot be
rectified.
Unknown
The system cannot report the health status of the hard disk.
Single link failure
In dual-controller mode, hard disks are identified by only one
controller.
Unauthenticated
The hard disk has not been authenticated.
Spin-down
The disk spins down.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
373
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Failing
The disk is failing.
Isolated
The disk slot is faulty and causes the hard disk in it to be
automatically isolated.
Disk write
protection
The hard disk is in the write protection state.
Step 5 In the Port Operating Status area, view the port operating status of the selected unified
storage system. The following table describes the parameters.
NOTE
l Click the Status Distribution of the FC port. The Online Fibre Channel Port Details or Offline
Fibre Channel Port Details dialog box is displayed. And you can view the information about
online FC ports and offline FC ports.
l Click the Status Distribution of the iSCSI port. The Online iSCSI Port Details or Offline iSCSI
Port Details dialog box is displayed. And you can view the information about online iSCSI ports
and offline iSCSI ports.
l Click the Status Distribution of the Ethernet Port. The Online Ethernet Port Details or Offline
Ethernet Port Details dialog box is displayed. And you can view the information about online
Ethernet ports and offline Ethernet ports.
Parameter
Description
Port Type
Types of ports on the N8000:
l FC
l iSCSI
l Ethernet Port
Online/Offline
Quantity of online and offline ports on the N8000.
----End
10.1.2.7 Managing Storage Resources
The storage resource page displays information about storage resources and mappings
between them. This section describes how to view and query information about storage
resources.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Storage Resource.
Step 4 On the Storage Resource page, you can view mappings between storage resources.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
374
eSight
Operation Guide
10 Managing Storage
NOTE
You can select Show legends to view icons used on the page. These icons enable you to view
information about resources in a easier and more direct way.
You can click a RAID group to view mappings between objects. That is, mappings between disks,
LUNs, owning controllers, and corresponding ports of mapped LUNs.
Step 5 Click the SAN resource tab and put your mouse pointer on the storage resource to view its
information.
1.
2.
3.
Issue 01 (2016-04-30)
View controller information. The following table describes the parameters.
Parameter
Description
Name
Name of the controller.
Health status
Health status of the controller. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the controller. For example, the value can be:
Online or Offline.
IPv4 address
IPv4 address of the controller.
IPv6 address
IPv6 address of the controller.
Primary/
Secondary status
Working status of the controller, Primary or Secondary.
View hard disk information. The following table describes the parameters.
Parameter
Description
Enclosure ID
ID of the enclosure where the hard disk resides.
Slot ID
ID of the slot where the hard disk is inserted.
Physical type
Physical type of the hard disk.
Logical type
Logical type of the hard disk.
Capacity
Total capacity of hard disks.
Owning block
storage pool
Storage pool that a LUN belongs to. A block storage pool
contains RAID groups and thin pools.
Health status
Health status of a disk. For example, the value can be: Normal,
Faulty, or Unknown.
Operating status
Operating status of a disk. For example, the value can be:
Online, Offline, or Faulty.
View port information. The following table describes the parameters.
Parameter
Description
Module ID
ID of the module where the port resides.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
375
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Port ID
ID of the port.
Type
Type of the port.
Health status
Health status of the port. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the port. For example, the value can be:
Normal, Faulty, or Unknown.
MAC address
MAC address of an iSCSI port.
This parameter is valid when the port type is iSCSI.
IPv4 address
IPv4 address of an iSCSI port.
This parameter is valid when the port type is iSCSI.
IPv6 address
IPv6 address of an iSCSI port.
This parameter is valid when the port type is iSCSI.
WWN
WWN of a Fibre Channel port.
This parameter is valid when the port type is Fibre Channel.
4.
5.
Issue 01 (2016-04-30)
Operating rate
(Gbit/s)
Operating rate of the port.
Owning Node/
controller
Node/Controller that the port belongs to.
View RAID group information. The following table describes the parameters.
Parameter
Description
Name
Name of the RAID group.
ID
ID of the RAID group.
Type
Type of the block storage pool. The value can be either RAID
Group or Thin Pool.
RAID level
RAID level of the block storage pool.
Capacity
Capacity of the block storage pool.
Health status
Health status of the block storage pool. For example, the value
can be: Normal or Faulty.
Operating status
Operating status of the block storage pool. For example, the
value can be: Online or Offline.
View LUN information. The following table describes the parameters.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
376
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Name
Name of the LUN.
ID
ID of the LUN.
Owning block
storage pool
Block storage pool that the LUN belongs to.
RAID level
RAID level of the block storage pool that the LUN belongs to.
Capacity
Capacity of the LUN.
Health status
Health status of the LUN. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the LUN. For example, the value can be:
Online or Offline.
Step 6 Click the NAS resource tab and put your mouse pointer on the storage resource to view its
information.
1.
2.
View node information. The following table describes the parameters.
Parameter
Description
Name
Name of the node.
Health status
Health status of the node. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the node. For example, the value can
be:Online or Offline.
IPv4 address
IPv4 address of the node.
View port information. The following table describes the parameters.
Parameter
Description
Module ID
ID of the module where the port resides.
Port ID
ID of the port.
Type
Type of the port.
Health status
Health status of the port. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the port. For example, the value can be:
Connected, Disconnected, or Faulty.
MAC address
MAC address of an iSCSI port.
This parameter is valid when the port type is iSCSI.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
377
eSight
Operation Guide
10 Managing Storage
Parameter
Description
IPv4 address
IPv4 address of an iSCSI port.
This parameter is valid when the port type is iSCSI.
WWN
WWN of a Fibre Channel port.
This parameter is valid when the port type is Fibre Channel.
3.
4.
5.
Issue 01 (2016-04-30)
Operating rate
(Mbit/s)
Operating rate of the port.
Owning controller
Controller that the port belongs to.
View information about a file system. The following table describes the parameters.
Parameter
Description
Name
Name of the file system.
Health status
Health status of a file system. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of a file system. For example, the value can be:
Online or Offline.
Layout type
Layout type of a file system. For example, the value can be:
Simple, Stripe, or Mirror.
Capacity
Total capacity of the file system.
Share mode
Share mode of the file system. For example, the value can be:
Unshared, CIFS_NORMAL, CIFS_HOMEDIR, or NFS.
Owning file
storage pool
Storage pool that the file system belongs to.
View information about a file storage pool. The following table describes the parameters.
Parameter
Description
Name
Name of the file storage pool.
Capacity
Capacity of the file storage pool.
Health status
Health status of the file storage pool.
Operating status
Health status of the file storage pool.
View information about a data disk. The following table describes the parameters.
Parameter
Description
Name
Name of the data disk.
Health status
Health status of the data disk.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
378
eSight
Operation Guide
10 Managing Storage
6.
7.
Parameter
Description
Operating status
Operating status of data migration.
Capacity
Capacity of the data disk.
Owning file
storage pool
File storage pool that the data disk belongs to.
View LUN information. The following table describes the parameters.
Parameter
Description
Name
Name of the LUN.
ID
ID of the LUN.
Owning block
storage pool
Block storage pool that the LUN belongs to.
RAID level
RAID level of the block storage pool that the LUN belongs to.
Capacity
Capacity of the LUN.
Health status
Health status of the LUN. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the LUN. For example, the value can be:
Online or Offline.
View hard disk information. The following table describes the parameters.
Parameter
Description
Enclosure ID
ID of the enclosure where the hard disk resides.
Slot ID
ID of the slot where the hard disk is inserted.
Physical type
Physical type of the hard disk.
Logical type
Logical type of the hard disk.
Capacity
Total capacity of the hard disk.
Owning block
storage pool
Block storage pool that the hard disk belongs to. A block storage
pool contains RAID groups and thin pools.
Health status
Health status of a disk. For example, the value can be: Normal,
Faulty, or Unknown.
Operating status
Operating status of a disk. For example, the value can be:
Online, Offline, or Faulty.
Step 7 In the text box on the upper right, enter a data disk name and click Search. The data disk is
located.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
379
eSight
Operation Guide
10 Managing Storage
10.1.2.8 Managing Mappings
This section describes how to manage mappings between different LUN objects.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Mapping.
Step 4 In the Mapping area, you can check mappings between different objects.
Step 5 You can view storage resource information by putting your mouse pointer on the storage
resource.
1.
2.
3.
Issue 01 (2016-04-30)
View information about a host group. The following table describes related parameters.
Parameter
Description
Name
Name of the host group.
ID
ID of the host group.
Hosts
Quantity of hosts contained in the host group.
Mapped LUNs
Quantity of mapped LUNs.
View host information. The following table describes the parameters.
Parameter
Description
Name
Name of the host.
Whether or not to
associate service
hosts
Whether to associate the host with service hosts.
Operating system
Operating system of the host.
Initiators
Quantity of host initiators.
Mapped LUNs
Quantity of mapped LUNs.
View initiator information. The following table describes related parameters of an
initiator.
Parameter
Description
Identifier
Identifier of the initiator.
HBA type
Type of the HBA.
Status
Status of the initiator.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
380
eSight
Operation Guide
10 Managing Storage
4.
View LUN information. The following table describes the parameters.
Parameter
Description
Name
Name of the LUN.
ID
ID of the LUN.
WWN
Worldwide Name (WWN) of the LUN.
Health status
Health status of the LUN. For example, the value can be:
Normal, Faulty, or Unknown.
Operating status
Operating status of the LUN. For example, the value can be:
Online, Offline, or Deleting.
Capacity
Capacity of the LUN.
Owning block
storage pool
Block storage pool that the LUN belongs to.
----End
10.1.2.9 Viewing NAS Service Free Space
This section describes how to view free space of a storage device.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Free Space.
Step 4 Select NAS Service from the list.
Step 5 Click the Storage Device tab to view space usage of the selected storage device. The
following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Device Name
Name of the storage device.
Total Capacity
Total capacity of the storage device.
Capacity of Shared
File Systems
Capacity of file systems for sharing.
Capacity of
Unshared File
Systems
Capacity of file systems that have not been set for sharing.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
381
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Free Capacity on
Data Disks
Free capacity on data disks.
Step 6 Click the File Storage Pools tab and view space usage of file system pool. The following
table describes the parameters.
Parameter
Description
Name
Name of the file storage pool.
Total Capacity
Total capacity of the file storage pool.
Capacity of Shared
File Systems
Capacity of file systems for sharing.
Capacity of
Unshared File
Systems
Capacity of file systems that have not been set for sharing.
Free Capacity
Free capacity of the file storage pool.
Capacity Ratio
Percentages of the capacity of shared file systems, the capacity of
unshared file systems, and the free capacity of the file storage pool.
Step 7 Click the Data Disks tab and view space usage of data disks. The following table describes
the parameters.
Parameter
Description
Name
Name of the data disk.
Total Capacity
Total capacity of the data disk.
Used Capacity
Used capacity of the data disk.
Free Capacity
Free capacity of the data disk.
Usage (%)
Capacity usage of the data disk.
Step 8 Click the Unshared File Systems tab and view space usage of an unshared file system. The
following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the unshared file system.
Total Capacity
Total capacity of the unshared file system.
Used Capacity
Used capacity of the unshared file system.
Free Capacity
Free capacity of the unshared file system.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
382
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Usage (%)
Capacity usage of the unshared file system.
----End
10.1.2.10 Viewing SAN Service Free Space
By viewing free space of a storage device, you can learn about the space usage of the storage
device.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Free Space.
Step 4 Select SAN Service from the drop-down list.
Step 5 Click the Storage Device tab and view space usage of the selected storage device. The
following table describes the parameters.
Parameter
Description
Device Name
Name of the storage device.
Total Capacity
Total capacity of the storage device.
Capacity of
Mapped LUNs
Capacity of mapped LUNs.
Capacity of Private
LUNs
Capacity of private LUNs.
Capacity of
Unmapped LUNs
Capacity of unmapped LUNs.
Free Capacity of
Block Storage
Pools
Free capacity of block storage pools.
Free Disk Capacity
Capacity of free disks.
Hot Spare Disk
Capacity
Capacity of hot spare disks.
NOTE
If a LUN is used to expand storage capacity, its Type becomes Private. A
private LUN cannot be mapped to a host or host group.
Step 6 In the function pane, choose Disk to view disk space usage. The following table describes the
parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
383
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Total Capacity
Total capacity of hard disks.
Free Disk Capacity
Capacity of free disks.
Member Disk
Capacity
Capacity of member disks.
Hot Spare Disk
Capacity
Capacity of hot spare disks.
Step 7 In the function pane, choose Block Storage Pools or Storage Pools. Select a block storage
pool or a storage pool to view its space usage. The following table describes the parameters.
Parameter
Description
Name
Name of the block storage pool or the storage pool.
ID
ID of the block storage pool or the storage pool.
RAID Level
RAID level of the block storage pool.
NOTE
This parameter is available only when selected Free Space > Block Storage
Pools.
Type
Types of the block storage pool:
l RAID group
l Thin Pool
NOTE
This parameter is available only when selected Free Space > Block Storage
Pools.
Total Capacity
Total capacity of the block storage pool or the storage pool.
Preset Capacity
Preset capacity of a thin pool.
NOTE
This parameter is available only when selected Free Space > Block Storage
Pools.
Capacity of
Mapped LUNs
Capacity of mapped LUNs in the block storage pool or the storage
pool.
Capacity of Private
LUNs
Capacity of private LUNs in the block storage pool.
NOTE
This parameter is available only when selected Free Space > Block Storage
Pools.
If a LUN is used to extend storage capacity, its Type becomes Private. A
private LUN cannot be mapped to a host or host group.
Capacity of
Unmapped LUNs
Issue 01 (2016-04-30)
Capacity of unmapped LUNs in the block storage pool or the storage
pool.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
384
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Used Hot Spare
Capacity
Used capacity of the hot spare capacity.
Free Hot Spare
Capacity
Free capacity of the hot spare capacity.
Reserved capacity
NOTE
This parameter is available only when selected Free Space > Storage Pools.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Reserved capacity of the Storage Pool.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Used Storage High
Performance layer
capacity
Free Storage High
Performance layer
capacity
Used Storage
Performance layer
capacity
Used capacity of the high performance layer capacity.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Free capacity of the high performance layer capacity.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Used capacity of the performance layer capacity.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
Free Storage
Performance layer
capacity
Free capacity of the performance layer capacity.
Used Storage
Capacity layer
capacity
Used capacity of the capacity layer capacity.
Free Storage
Capacity layer
capacity
Free capacity of the capacity layer capacity.
Free Capacity
Free capacity of the block storage pool or the storage pool.
Capacity Ratio
l Selected Free Space > Block Storage Pools, it is the respective
percentages of Capacity of Mapped LUNs, Capacity of
Private LUNs, Capacity of Unmapped LUNs, and Free
Capacity in the block storage pool.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
NOTE
This parameter is available only when selected Free Space > Storage Pools.
l Selected Free Space > Storage Pools, it is the respective
percentages of Capacity of Mapped LUNs, Capacity of
Unmapped LUNs, Used Hot Spare Capacity, Free Hot Spare
Capacity, and Free Capacity in the storage pool.
Step 8 In the function pane, choose Unmapped LUNs to view space usage of unmapped LUNs. The
following table describes the parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
385
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Name
Name of the unmapped LUN.
ID
ID of the unmapped LUN.
Type
Types of an unmapped LUN are described as follows:
l Common: common LUNs
l Expansion: An expansion LUN becomes an extended LUN after
LUN expansion. The capacity of the extended LUN is the total
capacity of the extending primary LUN and extending secondary
LUNs.
l Thin: A thin LUN is one whose owning block storage pool or
storage pool is a thin pool.
Capacity
Total capacity of unmapped LUNs.
Owning Block
Storage Pool or
Owning Storage
Pool
Block storage pool or storage pool that the unmapped LUN belongs
to.
----End
10.1.2.11 Viewing Disk Array Effect Range
By viewing affect area of the storage, you can learn about the space usage of the storage
device.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Storage Effect Range.
Step 4 Click Disk Array, the following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of a host.
Status
The status of a host.
Operating System
The OS of a host.
IP Address
IP address of the management network port on the unified storage
device.
is VM
Whether the device is virtual machine.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
386
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Owning ESX
Server/Virtual
Server
The ESX server or the virtual server of a host.
Database
The database of the host belongs to.
----End
10.1.2.12 Viewing Disk Effect Range
By viewing affect area of the disk, you can learn about the space usage of the storage device.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Storage Effect Range.
Step 4 Click Disk, view the parameters in the page.
----End
10.1.2.13 Configuring Reporter Access Parameters
To enable devices to be loaded to the eSight by the automatic discovery function, configure
the reporter access parameters.
Prerequisites
An OceanStor 9000 storage system have been added, and the reporter access parameters have
been changed.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 Input the right parameters in the IP Address and Port.
Step 4 Click OK when the configuration is successful.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
387
eSight
Operation Guide
10 Managing Storage
10.1.2.14 Configuring Device Management URL for Massive Storage
In the Massive Storage page, to enable open the device management page when click Device
Management in OceanStor 9000E, CSS or CSE device, you need to configure the URL for
device management.
Prerequisites
The OceanStor 9000, CSS or CSE devices have been added.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Settings > Device Management.
Step 4 In the Device Management URL textbox, input the URL for device management.
Step 5 Click Apply.
----End
10.1.2.15 Configuring Protocol Parameters and Event Notification
To enable devices to be loaded to the eSight by the automatic discovery function, configure
the eSight access parameters.
Procedure
Step 1 Go to the Massive Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Massive Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Settings > Protocol Parameters or Event Notification, refer to
3.10.2.3 Adding a Single Massive Storage Device to set parameters.
Step 4 Set protocol parameters for the NE and click Test.
Step 5 Click Apply when the test is successful.
----End
10.1.3 Managing Data Protections
This section describes how to manage summary, node information, and current alarms of data
protections.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
388
eSight
Operation Guide
10 Managing Storage
10.1.3.1 Managing All Data Protections
This section describes how to manage all data protections, including checking data protection
information and querying and refreshing data protections.
Procedure
Step 1 Go to the Data Protection page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Data Protection.
NOTE
You can manage the device in the list as follows.
l Moving device
1. Select a device that you want to move and click Move.
2. In the Select Subnet dialog box, select a subnet to which you want to move the host and click
OK.
l Deleting device
1. In the host list, click the name of a host that you want to delete and click Delete.
2. In the dialog box that is displayed, click OK.
Step 2 In the function pane, view information about data protections. The following table describes
the parameters.
Parameter
Description
Name
Name of the data protection.
Status
Status of the data protection. For example, the value can be: Normal
or Offline.
IP Address
IP address of the data protection's network management port.
Total Capacity
Total capacity of the data protections.
Used Capacity
Used capacity of the data protections.
Model
Model of the data protections.
Operations
l Click
device.
to go to the topology view of the corresponding
l If the storage array configuration has been changed, click
refresh the selected device to update configuration data.
l Click
to
to delete the selected devices.
----End
10.1.3.2 Viewing the Summary of a VTL
This section describes how to view basic information, capacity summary, and port operating
status of a virtual tape library (VTL).
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
389
eSight
Operation Guide
10 Managing Storage
Procedure
Step 1 Go to the Data Protection page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Data Protection.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, view basic information about the selected VTL. The following
table describes the parameters.
Parameter
Description
Name
Name of the VTL.
SN
Serial number of the VTL.
Model
Model of the VTL.
Software version
Software version of the VTL.
Manufacturer
Manufacturer of the VTL.
Last refreshed at
Time when the VTL was last refreshed.
NOTE
Click Modify to modify the device name in the Modify dialog.
Step 4 In the Capacity Summary area, view the capacity summary of the selected VTL.
In the Capacity Summary area, used capacity and free capacity of the selected VTL are
displayed.
Step 5 In the Node Status area, view node information about the selected VTL. The following table
describes the parameters.
Parameter
Description
Node Type
Type of the VTL node.
Status Distribution
Status of different types of nodes on the VTL.
----End
10.1.3.3 Viewing the Summary of a HDP
This operation allows you to learn about basic information, capacity summary, and node
operating status of the selected HDP.
Procedure
Step 1 Go to the Data Protection page.
1.
Issue 01 (2016-04-30)
On the menu bar, choose Resource > Resource Management > Storage Device.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
390
eSight
Operation Guide
10 Managing Storage
2.
In the navigation tree, choose Data Protection.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In Basic Information, view the basic information about the selected HDP. The following
table describes related parameters:
Parameter
Description
Name
Name of an HDP.
Status
Status of an HDP.
IP Address
IP address of the management network port on the HDP.
Model
Model of an HDP.
Manufacturer
Manufacturer of an HDP.
Last refreshed at
Time when an HDP was last refreshed.
NOTE
Click Modify to modify the device name in the Modify dialog.
----End
10.1.3.4 Viewing Node Information
This section describes how to view details about a virtual tape library (VTL) node.
Procedure
Step 1 Go to the Data Protection page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Data Protection.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the function pane, select Node Information.
Step 4 View node information about the selected VTL node. The following table describes the
parameters.
Issue 01 (2016-04-30)
Parameter
Description
ID
ID of the VTL node.
Name
Name of the VTL.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
391
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Role Type
Role types of different nodes, including VTL, single instance
repository (SIR), Fibre Channel switch (SW), and Array.
l VTL: VTL engine
l SIR: SIR engine
l SW: Fibre Channel switch
l Array: Storage unit
Health Status
Health status of the VTL.
IP Address
IP address of the VTL node's network management port.
Total Capacity
Total capacity of the VTL.
Used Capacity
Used capacity of the VTL.
Usage (%)
Capacity usage of the VTL.
Model
Model of the VTL.
Software Version
Software version of the VTL.
HA Switchover
Mode
HA status of the VTL.
NOTE
Click Device Management, the device management page is opened.
----End
10.1.3.5 Configuring Protocol Parameters and Event Notification
To enable devices to be loaded to the eSight by the automatic discovery function, configure
the eSight access parameters.
Procedure
Step 1 Go to the Data Protection page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Data Protection.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Settings > Protocol Parameters or Event Notification, refer to
3.10.2.4 Adding a Single Data Protection to set parameters.
Step 4 Set protocol parameters for the NE and click Test.
Step 5 Click Apply when the test is successful.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
392
eSight
Operation Guide
10 Managing Storage
10.1.4 Managing Third Party Storage Systems
This function allows you to manage storage systems made by third party vendors including
DFT, EMC, HP, Inspur, NetApp, and Sugon.
NOTE
The eSight manages third party storage systems based on standard SMI-S but SMI-S supported by
storage vendors may differ. Therefore, storage system properties shown on the eSight may be
inconsistent with those shown on specific management software delivered with the storage systems.
10.1.4.1 Managing All Third Party Storages
You can manage all disk arrays on the management software, including viewing third party
device information, querying third party devices, and refreshing third party devices to obtain
all information about monitored third party devices.
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, query information of third party storages.
l
Choose the subnet you want to query in the Subnet. Click Search to query information
of corresponding third party storages in the selected subnet.
l
Enter a disk array name you want to query in the Name. Click Search to query
information of the corresponding third party storage.
l
Enter a IP address you want to query in the IP address. Click Search to query
information of third party storages corresponding to the selected IP address.
l
Enter a model you want to query in the Model. Click Search to query information about
corresponding third party storages of the model.
NOTE
You can manage the device in the list as follows.
l Moving device
1. Select a device that you want to move and click Move.
2. In the Select Subnet dialog box, select a subnet to which you want to move the host and click
OK.
l Deleting device
1. In the host list, click the name of a host that you want to delete and click Delete.
2. In the dialog box that is displayed, click OK.
Step 3 In the function pane, view information about third party storages. The following table
describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the third party storage.
Device
Management
Opening the device management page when clicked.
NOTE
The JAVA version must be installed to enable this function to work correctly.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
393
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Status
Status of the third party storage. For example, the value can be:
Normal, Faulty, Warning or Offline.
IP Address
IP address of the management network port.
Total Capacity
Total capacity of the third party storage.
Used Capacity
Used capacity of the third party storage.
Model
Model of the third party storage.
Manufacturer
Manufacturer of the third party storage.
Operations
l Click
device.
to go to the topology view of the corresponding
l If the storage array configuration has been changed, click
refresh the selected device to update configuration data.
l Click
to
to delete the selected devices.
----End
10.1.4.2 Viewing Summary of a Third Party Storage System
This task helps you learn about the basic information, disk health status, and port operating
status of a third party storage system.
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, click More to view the basic information about the third party
storage system. The following table describes related parameters.
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of the third party storage system.
Status
Status of the third party storage system. For example, the value can
be: Normal, Offline, Warning, or Faulty.
IP address
IP address of the third party storage system.
SN
Device serial number of the third party storage system.
SMI-Agent IP
IP address of the SMI-Agent.
Model
Model of the third party storage system.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
394
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Software version
Software version of the third party storage system.
Total Capacity
Total capacity of the third party storage system.
Disks
Disks of the third party storage system.
Block storage
pools/Storage pools
Block storage pools or storage pools of the third party storage
system.
LUNs
LUNs of the third party storage system.
Manufacturer
Manufacturer of the third party storage system.
Last refreshed at
Time when the third party storage system information was last
refreshed.
NOTE
l Click Device Management, the device management page is opened.
l Click Modify to modify the device name and the manufacturer in the Modify dialog.
Step 4 In the Disk Health Status area, view the disk health status of the third party storage system.
The following table describes related parameters.
Parameter
Description
Normal
The functions and running status of the disk are normal.
Faulty
The disk is partially or completely faulty and the fault cannot be
rectified.
Failing
The disk is failing.
Unknown
The system cannot report the health status of the disk.
Spin-down
The disk is spun down.
Single link failure
The disk is identified by only one controller in dual-controller mode.
Unauthenticated
The disk is not authenticated.
Isolated
The slot that houses the disk is faulty, causing the disk to be
automatically isolated by the system.
Disk write
protection
The disk is under write protect.
NOTE
In the health status distribution diagram, you can click different areas to view details about disks. The
details include Location, Health Status, Operating Status, Physical Type, Logical Type, Capacity,
Manufacturer, SN, Firmware Version, Model, and Owning Block Storage Pool.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
395
eSight
Operation Guide
10 Managing Storage
Step 5 In the Port Operating Status area, view the port operating status of the third party storage
system. The following table describes related parameters.
Parameter
Description
Port Type
Port type of the third party storage system.
Status Distribution
Port status of the third party storage system. For example, the value
can be: Online or Offline.
NOTE
l Click Status Distribution of the FC port. The Online Fibre Channel Port Details or Offline Fibre
Channel Port Details dialog box is displayed. And you can view Port ID, Health Status,
Operating Status, WWN, Operating Rate(Gbit/s), ID of Owning Interface Module and Owning
Controller about online FC ports and offline FC ports.
l Click Status Distribution of the iSCSI port. The Online iSCSI Port Details or Offline iSCSI Port
Details dialog box is displayed. And you can view Port ID, Health Status, Operating Status, IPv4
Address, Operating Rate(Mbit/s), ID of Owning Interface Module and Owning Controller
about online iSCSI ports and offline iSCSI ports.
----End
10.1.4.3 Viewing Free Space of a Storage Device
This task helps you learn about the capacity usage of a storage device and make better use of
system storage resources.
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Step 4 In the function pane, choose Storage Device to view the capacity usage of the third party
storage system. The following table describes related parameters.
Issue 01 (2016-04-30)
Parameter
Description
Device Name
Name of the third party storage system.
Total Capacity
Total capacity of the third party storage system.
Capacity of
Mapped LUNs
Capacity of mapped LUNs on the third party storage system.
Capacity of Private
LUNs
Capacity of private LUNs on the third party storage system.
NOTE
After a LUN is used to expand the capacity of another LUN, its Type changes
to Private. A private LUN cannot be mapped to a host or host group.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
396
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Capacity of
Unmapped LUNs
Capacity of unmapped LUNs on the third party storage system.
Free Capacity of
Block Storage
Pools/Storage Pools
Free capacity of block storage pools or storage pools on the third
party storage system.
Free Disk Capacity
Capacity of free disks on the third party storage system.
Hot Spare Disk
Capacity
Capacity of hot spare disks on the third party storage system.
----End
10.1.4.4 Viewing Free Space of Disks
This task helps you learn about the capacity usage of disks on a third party storage system and
make better use of system storage resources.
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Step 4 In the function pane, choose Disk to view the capacity usage of disks on the third party
storage system. The following table describes related parameters.
Parameter
Description
Total Capacity
Total capacity of disks on the third party storage system.
Free Disk Capacity
Capacity of free disks on the third party storage system.
Member disk
capacity
Capacity of member disks on the third party storage system.
Hot Spare Disk
Capacity
Capacity of hot spare disks on the third party storage system.
----End
10.1.4.5 Viewing Free Space of Block Storage Pools or Storage Pools
This task helps you learn about the capacity usage of block storage pools or storage pools on a
third party storage system and make better use of system storage resources.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
397
eSight
Operation Guide
10 Managing Storage
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Step 4 In the function pane, choose Block Storage Pools/Storage Pools to view the capacity usage
of block storage pools or storage pools on the third party storage system. The following table
describes related parameters.
Parameter
Description
Name
Name of a block storage pool or storage pool.
ID
ID of a block storage pool or storage pool.
RAID Level
RAID level of a block storage pool.
NOTE
This parameter is available when Free Space > Block Storage Pools is
chosen.
Total Capacity
Total capacity of a block storage pool or storage pool.
Preset Capacity
Preset capacity of a thin pool.
NOTE
This parameter is available when Free Space > Block Storage Pools is
chosen.
Capacity of
Mapped LUNs
Capacity of Private
LUNs
Capacity of mapped LUNs in a block storage pool or storage pool.
Capacity of private LUNs in a block storage pool.
NOTE
This parameter is available when Free Space > Block Storage Pools is
chosen.
After a LUN is used to expand the capacity of another LUN, its Type changes
to Private. A private LUN cannot be mapped to a host or host group.
Capacity of
Unmapped LUNs
Capacity of unmapped LUNs in a block storage pool or storage pool.
Free Capacity
Free capacity of a block storage pool or storage pool.
Capacity Ratio
l If Free Space > Block Storage Pools is chosen, this parameter
indicates the percentages of Capacity of Mapped LUNs,
Capacity of Private LUNs, Capacity of Unmapped LUNs, and
Free Capacity in a block storage pool.
l If Free Space > Storage Pools is chosen, this parameter
indicates the percentages of Capacity of Mapped LUNs,
Capacity of Unmapped LUNs, Used Hot Spare Capacity, and
Free Hot Spare Capacity in a storage pool.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
398
eSight
Operation Guide
10 Managing Storage
Step 5 In the function pane, search for information about specified block storage pools or storage
pools.
l
Select Name and enter the name of a block storage pool or storage pool in the text box.
Click Search to search for information about the desired block storage pool or storage
pool.
l
Select ID and enter the ID of a block storage pool or storage pool in the text box. Click
Search to search for information about the desired block storage pool or storage pool.
----End
10.1.4.6 Viewing Free Space of LUNs
This task helps you learn about the capacity usage of LUNs on a third party storage system
and make better use of system storage resources.
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Step 4 In the function pane, choose LUNs to view the capacity usage of LUNs on the third party
storage system. The following table describes related parameters.
Parameter
Description
Name
Name of a LUN.
ID
ID of a LUN.
Type
Type of a LUN. Possible values are as follows:
l Common: The LUN is a common LUN.
l Expansion: An extended LUN is formed after a LUN extending.
The capacity of the extended LUN is the total capacity of the
extending master LUN and extending slave LUNs.
l Thin: The block storage pool or storage pool to which a thin
LUN belongs is a thin pool.
Mapped
Indicates whether a LUN is mapped.
Capacity
Total capacity of a LUN.
Owning Block
Storage Pool/
Owning Storage
Pool
The block storage pool or storage pool to which a LUN belongs.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
399
eSight
Operation Guide
10 Managing Storage
10.1.4.7 Viewing Free Space of the Inspur AS400
This task helps you learn about the capacity usage of a storage device, improving system
storage resource utilization.
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, choose Free Space.
Step 4 In the function pane, click Storage Device to view the capacity usage of the AS400 storage
system. The following table describes related parameters:
Parameter
Description
Device Name
Name of the AS400 storage system.
Total Capacity
Total capacity of the AS400 storage system.
Free capacity of
storage groups
Free capacity of storage groups in the AS400 storage system.
Free capacity of
storage volumes
Free capacity of storage volumes in the AS400 storage system.
Used capacity of
storage volumes
Used capacity of storage volumes in the AS400 storage system.
Free Disk Capacity
Capacity of free disks in the AS400 storage system.
Hot Spare Disk
Capacity
Capacity of hot spare disks in the AS400 storage system.
Step 5 In the function pane, click Disk to view the disk capacity usage of the AS400 storage system.
The following table describes related parameters:
Parameter
Description
Total capacity
Total capacity of the AS400 storage system disks.
Free Disk Capacity
Capacity of free disks in the AS400 storage system.
Member Disk
Capacity
Capacity of member disks in the AS400 storage system.
Hot Spare Disk
Capacity
Capacity of hot spare disks in the AS400 storage system.
Step 6 In the function pane, choose Storage Group to view the storage group capacity usage of the
AS400 storage system. The following table describes related parameters:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
400
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Name
Name of a storage group of the AS400 storage system.
Total capacity
Total capacity of storage groups of the AS400 storage system.
RAID 0(Available
Max./
Min.Capacity)
Maximum and minimum capacity that can be used by RAID 0
groups in the AS400 storage system.
RAID 1(Available
Max./
Min.Capacity)
Maximum and minimum capacity that can be used by RAID 1
groups in the AS400 storage system.
RAID 3(Available
Max./
Min.Capacity)
Maximum and minimum capacity that can be used by RAID 3
groups in the AS400 storage system.
RAID 5(Available
Max./
Min.Capacity)
Maximum and minimum capacity that can be used by RAID 5
groups in the AS400 storage system.
RAID 6(Available
Max./
Min.Capacity)
Maximum and minimum capacity that can be used by RAID 6
groups in the AS400 storage system.
Step 7 In the function pane, click Storage Volume to view the storage volume capacity usage of the
AS400 storage system. The following table describes related parameters:
Parameter
Description
Name
Name of a storage volume of the AS400 storage system.
Status
Status of a storage volume of the AS400 storage system.
Total capacity
Total capacity of storage volumes of the AS400 storage system.
RAID Level
RAID level of a storage volume of the AS400 storage system.
Stripe Size
Stripe size of a storage volume of the AS400 storage system.
Cache Size
Cache size of a storage volume of the AS400 storage system.
Write Policy
Write policy of a storage volume of the AS400 storage system.
----End
10.1.4.8 Viewing Free Space of the Sugon DS600
This task helps you learn about storage device usage, improving system storage resource
utilization.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
401
eSight
Operation Guide
10 Managing Storage
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, click Free Space.
Step 4 In the function pane, click Storage Device to view the space utilization of the selected DS600
storage system. The following table describes related parameters:
Parameter
Description
Device Name
Name of the DS600 storage system.
Total Capacity
Total capacity of the DS600 storage system.
Capacity of mapped
logical partitions
Capacity of mapped logical partitions in the DS600 storage system.
Capacity of
unmapped logical
partitions
Capacity of unmapped logical partitions in the DS600 storage
system.
Free capacity of
logical disks
Free capacity of logical disks in the DS600 storage system.
Free capacity of
logical volumes
Free capacity of logical volumes in the DS600 storage system.
Free disk capacity
Capacity of free disks in the DS600 storage system.
Hot spare disk
capacity
Capacity of hot spare disks in the DS600 storage system.
Step 5 In the function pane, click Disk to view the disk space utilization of the selected DS600
storage system. The following table describes related parameters:
Parameter
Description
Total capacity
Total capacity of the DS600 storage system disks.
Free Disk Capacity
Capacity of free disks in the DS600 storage system.
Member Disk
Capacity
Capacity of member disks in the DS600 storage system.
Hot Spare Disk
Capacity
Capacity of hot spare disks in the DS600 storage system.
Step 6 In the function pane, click Logical Disk to view the logical disk space utilization of the
selected DS600 storage system. The following table describes related parameters:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
402
eSight
Operation Guide
10 Managing Storage
Parameter
Description
ID
ID of a logical disk in the DS600 storage system.
Status
Status of a logical disk in the DS600 storage system.
RAID Level
RAID level of a logical disk in the DS600 storage system.
Total capacity
Total capacity of logical disks in the DS600 storage system.
Disk Quantity
Quantity of logical disks in the DS600 storage system.
Online Disk
Quantity
Quantity of online logical disks in the DS600 storage system.
Hot Spare Disk
Quantity
Quantity of hot spare disks for logical disks in the DS600 storage
system.
Faulty Disk
Quantity
Quantity of faulty logical disks in the DS600 storage system.
Read Statistics
(MB/S)
Data read speed of a logical disk in the DS600 storage system.
Write Statistics
(MB/S)
Data write speed of a logical disk in the DS600 storage system.
Step 7 In the function pane, click Logical Volume to view the logical volume space utilization of the
selected DS600 storage system. The following table describes related parameters:
Parameter
Description
ID
ID of a logical volume in the DS600 storage system.
Status
Status of a logical volume in the DS600 storage system.
Total Capacity
Total capacity of logical volumes in the DS600 storage system.
Available Capacity
Available capacity of logical volumes in the DS600 storage system.
Logical Disk
Quantity
Quantity of logical disks in logical volumes in the DS600 storage
system.
Step 8 In the function pane, click Logical Partition to view the logical partition space utilization of
the selected DS600 storage system. The following table describes related parameters:
Issue 01 (2016-04-30)
Parameter
Description
Name
Name of a logical partition in the DS600 storage system.
Logical Volume/
Logical Disk ID
ID of a logical volume/logical disk in the DS600 storage system.
Partition SN
SN of a logical partition in the DS600 storage system.
Total Capacity
Total capacity of logical partitions in the DS600 storage system.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
403
eSight
Operation Guide
10 Managing Storage
----End
10.1.4.9 Configuring Device Management URL for Third Party Storage
In the Third Party Storage page, to enable open the device management page when click
Device Management, you need to configure the URL for device management.
Prerequisites
The third party storage devices have been added.
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Settings > Device Management.
Step 4 In the Device Management URL textbox, input the URL for device management.
Step 5 Click Apply.
----End
10.1.4.10 Configuring Protocol Parameters
To enable devices to be loaded to the eSight by the automatic discovery function, configure
the eSight access parameters.
Procedure
Step 1 Go to the Third Party Storage page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose Third Party Storage.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Settings > Protocol Parameters, refer to 3.10.2.5 Adding a
Single Third Party Storage Device to set parameters.
Step 4 Set protocol parameters for the NE and click Test.
Step 5 Click Apply when the test is successful.
----End
10.1.5 Managing Fibre Channel Switches
This chapter describes how to viewing the summary, port, and zone information of Fibre
Channel switches.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
404
eSight
Operation Guide
10 Managing Storage
10.1.5.1 Managing All Fibre Channel Switches
This section describes how to manage all Fibre Channel switches on the management system,
including viewing information about FC switches and querying and refreshing FC switchs.
Procedure
Step 1 Go to the FC Switches page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose FC Switches.
Step 2 In the function pane, query information about Fibre Channel switches.
l
Enter a Fibre Channel switch's subnet you want to query in the Subnet. Click Search to
query information about the Fibre Channel switches.
l
Enter a Fibre Channel switch's name you want to query in the Name. Click Search to
query information about the Fibre Channel switch.
l
Enter a Fibre Channel switch's IP address you want to query in the IP Address. Click
Search to query information about the Fibre Channel switch.
l
Enter a Fibre Channel switch's model you want to query in the Model. Click Search to
query information about the Fibre Channel switches.
NOTE
You can manage the device in the list as follows.
l Moving device
1. Select a device that you want to move and click Move.
2. In the Select Subnet dialog box, select a subnet to which you want to move the host and click
OK.
l Deleting device
1. In the host list, click the name of a host that you want to delete and click Delete.
2. In the dialog box that is displayed, click OK.
Step 3 In the function pane, view the basic information about Fibre Channel switches. The following
table describes the parameters.
Parameter
Description
Name
Name of the Fibre Channel switch.
Device
Management
Opening the device management page when clicked.
NOTE
l The JAVA version must be installed to enable this function to work
correctly.
l This function is disabled when using Chrome 29 browser.
Issue 01 (2016-04-30)
Status
Status of the Fibre Channel switch.
IP Address
IP address of the Fibre Channel switch.
WWN
WWN of the Fibre Channel switch.
Port
Quantity of the ports on the Fibre Channel switch.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
405
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Connected Port
Quantity of the connected ports on the Fibre Channel switch.
Manufacturer
Manufacturer of the Fibre Channel switch.
Operations
l Click
device.
to go to the topology view of the corresponding
l If the storage array configuration has been changed, click
refresh the selected device to update configuration data.
l Click
to
to delete the selected devices.
----End
10.1.5.2 Viewing the Summary
This section describes how to view the summary about a Fibre Channel switch, including its
basic information and port connection status.
Procedure
Step 1 Go to the FC Switches page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose FC Switches.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Basic Information area, click More to view basic information about the selected Fibre
Channel switch. The following table describes the parameters.
Parameter
Description
Name
Name of the Fibre Channel switch.
Status
Status of the Fibre Channel switch. Possible values for Qlogic and
Brocade Fibre Channel switches are as follows:
l Qlogic FC
: Normal, Offline, Faulty, or Warning.
l Brocade FC
: Normal, Offline, Faulty, Unknown, or Warning.
IP address
IP address of the Fibre Channel switch.
SMI-Agent IP
IP address of the SMI-Agent.
NOTE
The parameter is available when a Brocade Fibre Channel switch is selected.
Port
Issue 01 (2016-04-30)
Quantity of ports and connected ports on the Fibre Channel switch.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
406
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Domain ID
Domain id is a unique number between 1 to 239 assigned to the
Fibre Channel switch, used to identify the switches in the
architecture.
WWN
Worldwide Name (WWN) of the Fibre Channel switch.
Firmware version
Firmware version of the Fibre Channel switch.
Manufacture
Manufacturer of the Fibre Channel switch.
Last refreshed at
The last time that the device is refreshed.
NOTE
l Click Device Management, the device management page is opened. This function is disabled when
using Chrome 29 browser.
l Click Modify to modify the device name in the Modify dialog.
Step 4 In the Port Connection Status area, view the port connection status of the selected Fibre
Channel switch.
In the Port Connection Status area, the status of connected and disconnected ports is
displayed.
NOTE
Click the Port Connection Status pie chart of the selected Fibre Channel switch. The Connected Port
Details or Disconnected Port Details dialog box is displayed. And you can view the information about
connected and disconnected ports.
----End
10.1.5.3 Viewing Port Information
This section describes how to view detailed information of a Fibre Channel switch port.
Procedure
Step 1 Go to the FC Switches page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose FC Switches.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Ports area of the function pane, query information about a Fibre Channel switch port.
The following table describes the parameters.
Issue 01 (2016-04-30)
Parameter
Description
Port name
Port name of the Fibre Channel switch.
Port ID
Port number of the Fibre Channel switch.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
407
eSight
Operation Guide
10 Managing Storage
Parameter
Description
Connection Status
Connection status of the Fibre Channel switch port. For example, the
value can be: Connected or Disconnected.
WWN
Worldwide Name (WWN) of the Fibre Channel switch.
Peer WWN
WWN of the peer port that connects to the Fibre Channel switch.
Performance
Monitoring
Monitored performance information of the Fibre Channel switch.
You can click Monitoring to view monitored performance
information of the port.
----End
10.1.5.4 Viewing Zone Information
This section describes how to view detailed information of a Fibre Channel switch zone.
Procedure
Step 1 Go to the FC Switches page.
1.
On the menu bar, choose Resource > Resource Management > Storage Device.
2.
In the navigation tree, choose FC Switches.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the Zones area of the function pane, query information about a Fibre Channel switch zone.
The following table describes the parameters.
Parameter
Description
Zone Name
Name of the Fibre Channel switch zone.
Zone Set Name
Name of the Fibre Channel switch zone set.
Member Port
Quantity of the member ports in the Fibre Channel zone.
You can click the value to view detailed information of the member
port.
----End
10.1.5.5 Configuring Protocol Parameters and Event Notification
To enable devices to be loaded to the eSight by the automatic discovery function, configure
the eSight access parameters.
Procedure
Step 1 Go to the FC Switches page.
1.
Issue 01 (2016-04-30)
On the menu bar, choose Resource > Resource Management > Storage Device.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
408
eSight
Operation Guide
10 Managing Storage
2.
In the navigation tree, choose FC Switches.
Step 2 In the function pane, click the name of the device whose information you want to query.
Step 3 In the navigation tree, select Settings > Protocol Parameters or Event Notification, refer to
3.10.2.6 Adding a Single Fibre Channel Switch to set parameters.
Step 4 Set protocol parameters for the NE and click Test.
Step 5 Click Apply when the test is successful.
----End
10.2 Managing Custom Storages
10.2.1 Customizing Alarm Parameters
You can customize alarm parameters so that a third-party storage system can report alarms to
the eSight.
See the contents in the following table to customize alarm parameters.
Operati
on
Description
Create
Click Create and enter customized alarm parameters to create a customized
alarm. For details, see 10.2.1.5 Viewing All Alarm Parameter
Customization.
Delete
Select one or multiple check boxes and click Delete to delete customized alarm
information.
Import
Click Import and fill in alarm information based on the configuration file
template to import alarms in batch. For details, see 10.2.1.3 Importing
Customized Information About Alarm Parameters in Batch.
Export
All
Click Export All to export all alarm information to your local computer.
Export
Selected
Select one or multiple check boxes and click Export Selected to export the
information about selected alarms to your local computer.
Modify
In the Operation area of the alarm information list, click
of the alarm you
want to modify and modify the alarm information. For details, see 10.2.1.4
Modifying Alarm Parameter Customization.
10.2.1.1 Obtaining Alarm Customization Parameters
This section describes how to obtain alarm customization parameters.
Context
You can use either of the following methods to obtain alarm customization parameters:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
409
eSight
Operation Guide
10 Managing Storage
l
Log in to Huawei enterprise website forum to obtain the parameters. The link to the
forum is http://support.huawei.com/ecommunity/bbs/10250853.html.
l
Obtain the parameters from the device MIB library. An MIB library file is in the format
of *.mib. An MIB library of a storage device defines all alarm information about the
device.
l
If parameters cannot be obtained using either of the methods, contact the device vendor
to obtain details alarm MIB information. If you cannot customize alarms by yourself,
contact Huawei technical support engineers for help.
The following explains how to obtain alarm customization parameters from an MIB library.
Procedure
l
Obtaining basic parameter information
a.
Use the text editor to open the MIB library of the storage device, The following
shows a complete alarm information.
NOTE
l This section uses a storage device that reports alarms through SNMP v1 traps as an
example.
l Because each alarm contains SNMP trap types, you can query related strings to display
all alarm information.
n
l
The string for SNMP v1 trap type is TRAP-TYPE.
l
The string for SNMP v2c trap and NMP v3 trap types is NOTIFICATIONTYPE.
First line
○
UnderTemperatureWarningLow after trap is alarm name.
An alarm name contains 1 to 32 characters. If a name is longer than 32
characters, make it shorter and enter it again.
○
TRAP-TYPE indicates that SNMP version of the reported alarms is
SNMP v1.
NOTIFICATION-TYPE indicates that SNMP version of the reported
alarms is SNMP v2c or SNMP v3.
n
Second line
petevts after ENTERPRISE defines enterprise ID.
The value of petevts must be obtained from the MIB library.
In this example, the value of petevts is 1.3.6.1.4.1.37945.1.1, which is
enterprise ID of the reported alarms.
1)
Issue 01 (2016-04-30)
Search for OBJECT IDENTIFIER in the MIB library.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
410
eSight
Operation Guide
10 Managing Storage
2)
1 after pet is the last digit of enterprise ID.
NOTE
l enterprise ID contains 3 to 64 characters and is in the format of
X.X.X.X.X.X. The value contains at least X.X, where X is a digit.
The last digit of enterprise ID is 1, so enterprise ID is X.X.X.X.X.1.
l If the value of petevts has been defined in the MIB library, you obtain the
value quickly by searching for -- petevts =.
3)
Search for the value of wiredformgmt in the MIB library. This value is
the last but one digit of enterprise ID.
In the same way, you can search for the values of parameters in {} in the
MIB library to complete enterprise ID.
n
Seventh line
Under-Temperature Warning (Lower non-critical, going low) after -#SUMMARY is alarm cause.
NOTE
If an alarm cause is not defined in the MIB library, you can customize it based on site
requirements.
n
Ninth line
WARNING after --#SEVERITY defines alarm severity.
Table 10-2 describes the eSight alarm severities in the MIB library. In this
example, alarm severity is major.
NOTE
If an alarm severity is not defined in the MIB library, you can customize it based on
site requirements.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
411
eSight
Operation Guide
10 Managing Storage
Table 10-2 eSight alarm severities in the MIB library
n
MIB Library Alarm Severity
eSight Alarm Severity
CRITICAL
Critical
WARNING
Major
INFORMATIONAL
Info
Eleventh line
65792 after ::= is specified trap type.
l
Obtaining alarm OID
a.
Search for NOTIFICATION-TYPE in the MIB library.
NOTE
Because each alarm contains SNMP trap types, you can query related strings to display all
alarm information.
NOTIFICATION-TYPE indicates that alarms are reported as SNMP v2c traps or SNMP v3
traps.
b.
1 after ::= is the last digit of alarm OID.
NOTE
alarm OID contains 3 to 64 characters and is in the format of X.X.X.X.X.X. The value
contains at least X.X, where X is a digit.
The last digit of alarm OID is 1, so alarm OID is X.X.X.X.X.1.
c.
Search for the value of hwOEM in the MIB library. This value is the last but one
digit of alarm OID.
In the same way, you can search for the values of parameters in {} in the MIB
library to complete alarm OID.
l
Obtaining advanced parameter information
a.
The MIB library uses the following strings to define alarm location parameters:
n
Issue 01 (2016-04-30)
cpqHoGenericData after VARIABLES is location parameter name.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
412
eSight
Operation Guide
10 Managing Storage
n
The value of location parameter OID must be obtained from the MIB library.
1)
Search for cpqHoGenericData OBJECT-TYPE in the MIB library.
2)
1 after ::= is the last digit of location parameter OID.
NOTE
location parameter OID contains 3 to 64 characters and is in the format of
X.X.X.X.X.X. The value contains at least X.X, where X is a digit.
The last digit of location parameter OID is 1, so location parameter OID is
X.X.X.X.X.1.
3)
Search for the value of cpqHoGeneric in the MIB library. This value is
the last but one digit of location parameter OID.
In the same way, you can search for the values of parameters in {} in the
MIB library to complete location parameter OID.
----End
10.2.1.2 Creating Alarm Parameter Customization
You need to create alarm parameter customization so that third-party storage systems can
report alarms to the eSight.
Prerequisites
Third-party storage system alarm customization parameters have been obtained. For details
about how to obtain the parameters, see 10.2.1.1 Obtaining Alarm Customization
Parameters.
Procedure
Step 1 Go to the page for customizing alarm parameters.
1.
Om the menu bar, choose System > Administration > Custom Storage Management.
2.
In the navigation tree, click Alarm Parameter Customization.
Step 2 Click Create.
Step 3 Set the alarm information based on the obtained third-party storage system alarm
customization parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
413
eSight
Operation Guide
10 Managing Storage
Step 4 A storage system that reports alarms through SNMP v1 traps is used as an example. Table
10-3 lists the basic parameters to be set.
Table 10-3 Alarm parameters
Parameter
Value
Manufacturer
Inspur
Severity
Major
Alarm name
UnderTemperatureWarningLow
Notification type
Alarm
Event type
Device alarm
SNMP
SNMP v1
Generic
6
Specific
65792
Enterprise ID
1.3.6.1.4.1.37945.1.1
Alarm cause
Under-Temperature Warning (Lower noncritical, going low)
Step 5 When the alarms are reported using SNMP v2c trap or SNMP v3 trap, Alarm OID needs to
be set.
For details about how to obtain an alarm OID, see 10.2.1.1 Obtaining Alarm Customization
Parameters.
Step 6 Click Advanced and set advanced parameters for the alarm parameter customization.
For details about how to obtain advanced parameters, see 10.2.1.1 Obtaining Alarm
Customization Parameters.
Step 7 click OK after the parameter configuration is complete.
Step 8 When a success message is displayed, click OK.
----End
10.2.1.3 Importing Customized Information About Alarm Parameters in Batch
Fill in the customized information about alarm parameters based on the configuration file
template to import the customized information in batch.
Prerequisites
Third-party storage system alarm customization parameters have been obtained. For details
about how to obtain the parameters, see 10.2.1.1 Obtaining Alarm Customization
Parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
414
eSight
Operation Guide
10 Managing Storage
Context
NOTICE
The batch import may take several minutes.
Procedure
Step 1 Open the alarm parameter customization page.
1.
On the menu bar, choose System > Administration > Custom Storage Management.
2.
In the navigation tree, choose Alarm Parameter Customization.
Step 2 Click Import.
The batch import page is displayed.
Step 3 In the Download template area, click the configuration file template.
The File Download dialog box is displayed.
Step 4 Click Save to save the EXCEL configuration file template locally.
Step 5 In the configuration file template, enter alarm information that needs to be batch imported
based on the obtained third-party storage system alarm customization parameters and save the
entered information as a configuration file.
NOTE
Carefully read requirements and restrictions on the Instructions tab of the template and fill in the
contents based on the requirements in the template.
beside Upload File and select the EXCEL
Step 6 On the device import page, click
configuration file that has been saved.
Step 7 Click Upload to upload the configuration file.
After the configuration file is uploaded, the information about alarm parameters that need to
be batch imported is displayed.
Step 8 Select the alarms and click Create. The system starts importing the selected alarm.
NOTE
If some alarms fail to be imported, modify the information about those alarms and import again.
----End
Follow-up Procedure
You can perform the following operations to save the alarm information summary to your
computer.
1.
On the alarm parameter customization page, click Export All (or select one or multiple
check boxes and click Export Selected), the File Download dialog box is displayed.
2.
Click Save. The Save as dialog box is displayed.
3.
Enter a name for the file and click Save. The alarm information summary is saved
locally.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
415
eSight
Operation Guide
10 Managing Storage
10.2.1.4 Modifying Alarm Parameter Customization
You can modify alarm parameter customization.
Procedure
Step 1 Open the alarm parameter customization page.
1.
On the menu bar, choose System > Administration > Custom Storage Management.
2.
In the navigation tree, choose Alarm Parameter Customization.
Step 2 Modify alarm parameter customization.
1.
In the function pane, click
next to the target device.
2.
In the displayed dialog box, modify the parameters.
3.
Click OK.
A success message is displayed.
4.
Click OK.
----End
10.2.1.5 Viewing All Alarm Parameter Customization
You can view alarm parameter customization of all third-party storages.
Prerequisites
Alarm parameter customization has been created.
Procedure
Step 1 Open the alarm parameter customization page.
1.
On the menu bar, choose System > Administration > Custom Storage Management.
2.
In the navigation tree, choose Alarm Parameter Customization.
Step 2 In the function pane, view basic information about alarm parameter customization.
The basic information includes the alarm name, storage vendor name, alarm severity, and
Simple Network Management Protocol (SNMP) version.
Step 3 Search for alarm parameter customization.
1.
Set a search criterion.
–
Specify an alarm name.
Enter an alarm name in the Alarm name text box.
–
Specify a vendor name.
Enter a storage vendor name in the Manufacturer text box.
–
Specify an alarm severity.
Select an alarm severity from the Severity drop-down list.
–
Specify an SNMP version.
Select an SNMP version from the SNMP Version drop-down list.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
416
eSight
Operation Guide
10 Managing Storage
2.
Click Search.
The alarm parameter customization that meets the search criterion is listed.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
417
eSight
Operation Guide
11 Managing Servers
11
Managing Servers
About This Chapter
11.1 Overview of Server Operations
This topic provides the processes of operating servers in different scenarios, helping you
better use the management functions provided by the eSight.
11.2 Managing Rack Servers
You can manage all rack servers, including viewing summary information, alarms, and
hardware information and remotely controlling rack servers.
11.3 Managing Blade Servers
You can manage all blade servers, including viewing summary information, alarms, and
hardware information and remotely controlling blade servers.
11.4 Managing High-Density Servers
You can manage all high-density servers, including viewing summary information, alarms,
and hardware information and remotely controlling high-density servers.
11.5 Managing Storage Servers
You can manage all storage servers, including viewing summary information and alarms.
11.6 Managing Third-Party Servers
You can manage all third-party servers, including viewing summary information and alarms.
11.7 Service Settings
You need to configure automatic check services.
11.8 Managing Custom Servers
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
418
eSight
Operation Guide
11 Managing Servers
11.1 Overview of Server Operations
This topic provides the processes of operating servers in different scenarios, helping you
better use the management functions provided by the eSight.
Table 11-1 shows the operations that the eSight allows you to perform on servers.
Table 11-1 Operations that can be performed on servers
Issue 01 (2016-04-30)
NE Type
Scenario
Task
Operation
Description
Common
Site deployment
Viewing the protocol
parameters
To correctly use server
management functions
provided by the eSight,
learn about protocol
parameters for
connecting a server to
the eSight: 3.3.3
Methods and
Protocols Used for
Adding Servers.
Setting server protocol
parameters
To ensure that a server
correctly communicate
with the eSight, set the
protocol parameters on
the server: 3.4.3
Setting Server
Protocol Parameters.
Adding a server
You can set the server
IP address, server type,
and communication
protocol in the
template to add the
server to the eSight:
3.10.3 Adding a
Single Server.
Batch adding servers
You can import a
configuration file for
rapid deployment to
batch create servers,
improving the
operation efficiency:
3.9.3 Adding Server
Information in
Batches.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
419
eSight
Operation Guide
11 Managing Servers
NE Type
Scenario
Task
Operation
Description
Operation and
maintenance
Managing servers
Describing how to
resolve issues that may
occur during server
management using the
eSight: 15.4.11 Server
Management.
Rack Servers
Operation and
maintenance
Managing rack servers
The eSight manages
rack servers. For
details, see 11.2
Managing Rack
Servers.
Blade Servers
Operation and
maintenance
Managing blade servers
The eSight manages
blade servers. For
details, see 11.3
Managing Blade
Servers.
High-Density
Servers
Operation and
maintenance
Managing high-density
servers
The eSight manages
high-density servers.
For details, see 11.4
Managing HighDensity Servers.
Storage
Servers
Operation and
maintenance
Managing storage
servers
The eSight manages
storage servers. For
details, see 11.5
Managing Storage
Servers.
Third-Party
Servers
Site deployment
Managing custom
servers
You must perform
related configurations
on the eSight for the
eSight to detect thirdparty servers.
l Customizing device
information: 11.8.1
Customizing
Device
Information
l Customizing alarm
parameters: 11.8.2
Customizing
Alarm Parameters
Operation and
maintenance
Issue 01 (2016-04-30)
Managing third-party
servers
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
The eSight manages
third-party servers. For
details, see 11.6
Managing ThirdParty Servers.
420
eSight
Operation Guide
11 Managing Servers
11.2 Managing Rack Servers
You can manage all rack servers, including viewing summary information, alarms, and
hardware information and remotely controlling rack servers.
Prerequisites
Before remotely controlling a rack server, ensure that the following condition is met:
The PC that functions as a client is properly communicating with the rack server.
Procedure
Step 1 Open the rack server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Rack Server.
Step 2 Click the server IP address to view details about the server.
Step 3 In the navigation tree, choose General > Summary to view the basic information, component
health status, and latest alarms of the server.
1.
In the Basic Information area, view basic information about the server. For details about
the parameters, see Table 11-2.
Table 11-2 Parameters in the Basic Information area
Parameter
Description
Name
Identifies a server.
Status
Indicates server status. The value can be one of the following:
– Normal: The server is operating properly.
– Faulty: An alarm is generated for the server.
– Unknown: The server cannot be scanned.
– Offline: The server fails to communicate with the eSight.
Issue 01 (2016-04-30)
IP address
Indicates a server IP address.
Device type
Indicates a server type.
Device model
Indicates a server model.
SN
Indicates the serial number of a server.
Refreshed at
Indicates the latest time when information about a server is
refreshed.
Description
Provides supplementary information about a server.
Device
Management
Provides a link to the server management software. After you
click Device Management, the login page is displayed.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
421
eSight
Operation Guide
11 Managing Servers
2.
In the Health Status of Installed Components area, view the status of server
components and proportions of server components in each state.
3.
In the Recent Alarms area, view the latest alarms of the server.
Step 4 In the navigation tree, choose General > Alarm List to view details about server alarms.
In the function pane, you can acknowledge, unacknowledge, or clear alarms or add remarks
for alarms.
Step 5 View server component information.
1.
In the navigation tree, choose Component > Hardware.
The front and rear views of the server and the basic information, asset information, and
health status of each component on the server are displayed in the function pane.
2.
Click
to expand the component area and view details about the component.
Step 6 Set the protocol parameters.
1.
In the navigation tree, choose Settings > Protocol Parameters.
The protocol parameters of the server are displayed in the function pane.
2.
Set the Intelligent Platform Management Interface (IPMI) parameters for a V1 server and
the Simple Network Management Protocol (SNMP) parameters for another type of
server.
–
Set the IPMI parameters.
i.
In the IPMI Protocol area, set the parameters.
ii.
Click Test.
iii. When a success message is displayed, click OK.
–
iv.
Click Apply.
v.
Click OK.
Set the SNMP parameters.
i.
In the SNMP Protocol area, set the parameters.
ii.
Click Test.
iii. When a success message is displayed, click OK.
iv.
Click Apply.
v.
Click OK.
----End
11.2.1 Viewing All Servers
You can view information about all rack servers monitored by the eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
422
eSight
Operation Guide
11 Managing Servers
Procedure
Step 1 Open the rack server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Rack Server.
Step 2 In the function pane, view basic information about a server.
For details about the parameters, see Table 11-3.
Table 11-3 Parameter description
Parameter
Description
IP Address
Indicates a server IP address.
Name
Identifies a server.
Device
Management
Provides a link to the server management software. After you click
Device Management, the login page is displayed.
Status
Indicates server status. The value can be Normal, Faulty,
Unknown, or Offline.
Model
Indicates a server model.
Step 3 Search for servers.
1.
Set a search criterion.
–
Specify a subnet.
next to Subnet.
i.
Click
ii.
In the Select Subnet dialog box, select a subnet.
iii. Click OK.
–
Specify a server name.
Enter a server name in the Name text box.
–
Specify an IP address.
Enter a server IP address in the IP address text box.
–
Specify server status.
Select server status from the Status drop-down list.
2.
Click Search.
----End
Follow-up Procedure
After a server is searched, you can perform the following operations:
l
Click
in the Operation column to locate the topology of the server.
l
Click
in the Operation column to refresh information about the server.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
423
eSight
Operation Guide
11 Managing Servers
NOTE
To collect performance data, click
immediately after you configure inband information about
the server. Otherwise, performance data cannot be collected immediately.
l
Click
in the Operation column to delete information about the server.
11.2.2 Moving a Server
You can move a rack server to a specified subnet.
Procedure
Step 1 Open the rack server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Rack Server.
Step 2 Move a server.
1.
In the function pane, select the target server and click Move.
2.
In the Select Subnet dialog box, select the subnet to which the server is to be moved.
3.
Click OK.
----End
11.2.3 Deleting a Server
If a rack server does not need to be managed by the eSight, you can delete the server from the
eSight.
Procedure
Step 1 Open the rack server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Rack Server.
Step 2 Delete a server.
1.
In the function pane, select the target server.
2.
Click Delete.
3.
In the confirmation dialog box, click OK.
----End
11.2.4 Setting a Server Name
You can set a rack server name.
Procedure
Step 1 Open the rack server list.
1.
Issue 01 (2016-04-30)
On the menu bar, choose Resource > Resource Management > Server.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
424
eSight
Operation Guide
11 Managing Servers
2.
In the navigation tree, choose Server > Rack Server.
Step 2 Set a server name.
1.
In the function pane, click the IP address of the target server.
2.
In the function pane, click Modify Name in the upper right part.
The Modify Name dialog box is displayed.
3.
Enter a new server name in the Name text box.
4.
Enter a server description in the Description text box.
5.
Click OK.
The new server name and description are displayed in the Basic Information area.
----End
11.2.5 Controlling Power
You can power on, power off, or restart a rack server.
Procedure
Step 1 Open the rack server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Rack Server.
Step 2 Control the power of a rack server.
1.
In the function pane, click the IP address of the target rack server.
2.
In the function pane, click Set Power in the upper right part.
The Set Power dialog box is displayed.
3.
Click Power on, Power off, or Reboot next to Operation.
NOTICE
Before powering off or restarting a server, ensure that no service risk exists.
4.
Click OK.
A success message is displayed.
5.
Click OK.
----End
11.2.6 Configuring the UID Indicator
You can turn on or turn off the unit identification (UID) indicator on a rack server to quickly
locate the server.
Procedure
Step 1 Open the rack server list.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
425
eSight
Operation Guide
11 Managing Servers
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Rack Server.
Step 2 Configure the UID indicator for the server.
1.
In the function pane, click the IP address of the target server.
2.
In the function pane, click Config UID in the upper right part.
The Config UID dialog box is displayed.
3.
Click Temporarily on or Turn off next to Config UID.
NOTE
After you click Temporarily on, set Duration. The UID indicator will be on in the specified
duration.
4.
Click OK.
A success message is displayed.
5.
Click OK.
----End
11.3 Managing Blade Servers
You can manage all blade servers, including viewing summary information, alarms, and
hardware information and remotely controlling blade servers.
Prerequisites
l
Before you view information about server blades on an E6000, log in to the E6000, and
change the SNMPv3 authorization and authentication protocols and data encryption
protocols of the server blades to make these protocols consistent with those of the
E6000. Otherwise, information about the server blades cannot be displayed in the eSight.
l
The PC that functions as a client is properly communicating with the blade server.
Procedure
Step 1 Open the blade server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Blade Server.
Step 2 Click the server IP address to view details about the server.
Step 3 In the navigation tree, choose General > Summary to view the basic information, component
health status, and latest alarms of the server.
1.
In the Basic Information area, view basic information about the server. For details about
the parameters, see Table 11-4.
Table 11-4 Parameters in the Basic Information area
Issue 01 (2016-04-30)
Parameter
Description
Name
Identifies a server.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
426
eSight
Operation Guide
11 Managing Servers
Parameter
Description
Status
Indicates server status. The value can be one of the following:
– Normal: The server is operating properly.
– Faulty: An alarm is generated for the server.
– Unknown: The server cannot be scanned.
– Offline: The server fails to communicate with the eSight.
IP address
Indicates a server IP address.
Device type
Indicates a server type.
Device model
Indicates a server model.
SN
Indicates the serial number of a server.
Refreshed at
Indicates the latest time when information about a server is
refreshed.
Description
Provides supplementary information about a server.
Device
Management
Provides a link to the server management software. After you
click Device Management, the login page is displayed.
2.
In the Health Status of Installed Components area, view the status of server
components and proportions of server components in each state.
3.
In the Recent Alarms area, view the latest alarms of the server.
Step 4 In the navigation tree, choose General > Alarm List to view details about server alarms.
In the function pane, you can acknowledge, unacknowledge, or clear alarms or add remarks
for alarms.
Step 5 View server component information.
1.
In the navigation tree, choose Component > Hardware.
The front and rear views of the server and the basic information, asset information, and
health status of each component on the server are displayed in the function pane.
2.
Click
to expand the component area and view details about the component.
Step 6 Set the protocol parameters.
1.
In the navigation tree, choose Settings > Protocol Parameters.
The protocol parameters of the server are displayed in the function pane.
2.
In the SNMP Protocol area, set the parameters.
3.
Click Test.
4.
When a success message is displayed, click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
427
eSight
Operation Guide
11 Managing Servers
5.
Click Apply.
6.
Click OK.
----End
11.3.1 Viewing All Servers
View information about all blade servers monitored by the system.
Procedure
Step 1 Open the blade server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Blade Server.
Step 2 In the function pane, view basic information about a server.
For details about the parameters, see Table 11-5.
Table 11-5 Parameter description
Parameter
Description
IP Address
Indicates a server IP address.
Name
Identifies a server.
Device
Management
Provides a link to the server management software. After you click
Device Management, the login page is displayed.
Status
Indicates server status. The value can be Normal, Faulty,
Unknown, or Offline.
Model
Indicates a server model.
Step 3 Search for servers.
1.
Set a search criterion.
–
Specify a subnet.
next to Subnet.
i.
Click
ii.
In the Select Subnet dialog box, select a subnet.
iii. Click OK.
–
Specify a server name.
Enter a server name in the Name text box.
–
Specify an IP address.
Enter a server IP address in the IP address text box.
–
Specify server status.
Select server status from the Status drop-down list.
2.
Click Search.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
428
eSight
Operation Guide
11 Managing Servers
Follow-up Procedure
After a server is searched, you can perform the following operations:
l
Click
in the Operation column to locate the topology of the server.
l
Click
in the Operation column to refresh information about the server.
NOTE
To collect performance data, click
immediately after you configure inband information about
the server. Otherwise, performance data cannot be collected immediately.
l
Click
in the Operation column to delete information about the server.
11.3.2 Moving a Server
You can move a blade server to a specified subnet.
Procedure
Step 1 Open the blade server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Blade Server.
Step 2 Move a server.
1.
In the function pane, select the target server and click Move.
2.
In the Select Subnet dialog box, select the subnet to which the server is to be moved.
3.
Click OK.
----End
11.3.3 Deleting a Server
If a blade server does not need to be managed by the eSight, you can delete the server from
the eSight.
Procedure
Step 1 Open the blade server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Blade Server.
Step 2 Delete a server.
1.
In the function pane, select the target server.
2.
Click Delete.
3.
In the confirmation dialog box, click OK.
----End
11.3.4 Setting a Server Name
You can set a blade server name.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
429
eSight
Operation Guide
11 Managing Servers
Procedure
Step 1 Open the blade server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Blade Server.
Step 2 Set a server name.
1.
In the function pane, click the IP address of the target server.
2.
In the function pane, click Modify Name in the upper right part.
The Modify Name dialog box is displayed.
3.
Enter a new server name in the Name text box.
4.
Enter a server description in the Description text box.
5.
Click OK.
The new server name and description are displayed in the Basic Information area.
----End
11.3.5 Managing Blades
You can manage blades on a blade server.
Prerequisites
Before remotely controlling a blade on a blade server, ensure that the following condition is
met:
The PC that functions as a client is properly communicating with the blade server.
Procedure
Step 1 Open the blade server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Blade Server.
Step 2 Open the blade list.
1.
In the function pane, click the IP address of the blade server where the blade to be
managed is located.
2.
In the navigation tree, choose Component > Hardware.
3.
In the function pane, click the name of the blade in the Blade area.
Step 3 Manage the blade.
1.
In the function pane, view basic information about the blade. For details about the
parameters, see Table 11-6.
Table 11-6 Parameters in the Basic Information area
Issue 01 (2016-04-30)
Parameter
Description
IP address
Indicates a blade IP address.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
430
eSight
Operation Guide
11 Managing Servers
Parameter
Description
Status
Indicates blade status. The value can be Normal, Faulty,
Unknown, or Offline.
Device model
Indicates a blade model.
Slot ID
Indicates the slot number of a blade.
2.
In the Health Status of Installed Components area, view the status of blade
components and proportions of blade components in each state.
3.
In the function pane, click Modify Name in the upper right part, and modify Name and
Description.
4.
In the function pane, click Set Power in the upper right part. Then click Power on,
Power off, or Reboot.
NOTICE
Before powering off or restarting a blade, ensure that no service risk exists.
5.
In the function pane, click Config UID in the upper right part. Then click Temporarily
on or Turn off for the UID indicator on the blade.
NOTE
After you click Temporarily on, set Duration. The UID indicator will be on in the specified
duration.
Step 4 View blade component information.
1.
In the navigation tree, choose Component > Hardware.
The basic information, asset information, and health status of each component on the
blade are displayed in the function pane.
2.
Click
for each component to view its details.
Step 5 Set the protocol parameters.
1.
In the navigation tree, choose Settings > Protocol Parameters.
The protocol parameters of the server are displayed in the function pane.
2.
Set the Baseboard Management Controller (BMC) authentication parameters.
a.
In the BMC Authentication area, set the parameters.
b.
Click Test.
c.
When a success message is displayed, click OK.
d.
Click Apply.
e.
Click OK.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
431
eSight
Operation Guide
11 Managing Servers
11.4 Managing High-Density Servers
You can manage all high-density servers, including viewing summary information, alarms,
and hardware information and remotely controlling high-density servers.
Prerequisites
Before remotely controlling a high-density server, ensure that the following condition is met:
The PC that functions as a client is properly communicating with the high-density server.
Procedure
Step 1 Open the high-density server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > High-Density Server.
Step 2 Click the server IP address to view details about the server.
Step 3 In the navigation tree, choose General > Summary to view the basic information and
component health status of the server.
1.
In the Basic Information area, view basic information about the server. For details about
the parameters, see Table 11-7.
Table 11-7 Parameters in the Basic Information area
Parameter
Description
Name
Identifies a server.
Status
Indicates server status. The value can be one of the following:
– Normal: The server is operating properly.
– Faulty: An alarm is generated for the server.
– Unknown: The server cannot be scanned.
– Offline: The server fails to communicate with the eSight.
2.
IP address
Indicates a server IP address.
Device type
Indicates a server type.
Device model
Indicates a server model.
In the Health Status of Installed Components area, view the status of server
components and proportions of server components in each state.
Step 4 View server component information.
1.
In the navigation tree, choose Component > Hardware.
The front and rear views of the server and the basic information, asset information, and
health status of each component on the server are displayed in the function pane.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
432
eSight
Operation Guide
11 Managing Servers
2.
Click
to expand the component area and view details about the component.
----End
11.4.1 Viewing All Servers
You can view information about all high-density servers monitored by the eSight.
Procedure
Step 1 Open the high-density server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > High-Density Server.
Step 2 In the function pane, view basic information about a server.
For details about the parameters, see Table 11-8.
Table 11-8 Parameter description
Parameter
Description
IP Address
Indicates a server IP address.
Name
Identifies a server.
Device
Management
Provides a link to the server management software. After you click
Device Management, the login page is displayed.
Status
Indicates server status. The value can be Normal, Faulty,
Unknown, or Offline.
Model
Indicates a server model.
Step 3 Search for servers.
1.
Set a search criterion.
–
Specify a subnet.
next to Subnet.
i.
Click
ii.
In the Select Subnet dialog box, select a subnet.
iii. Click OK.
–
Specify a server name.
Enter a server name in the Name text box.
–
Specify an IP address.
Enter a server IP address in the IP address text box.
–
Specify server status.
Select server status from the Status drop-down list.
2.
Click Search.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
433
eSight
Operation Guide
11 Managing Servers
Follow-up Procedure
After a server is searched, you can perform the following operations:
l
Click
in the Operation column to locate the topology of the server.
l
Click
in the Operation column to refresh information about the server.
NOTE
To collect performance data, click
immediately after you configure inband information about
the server. Otherwise, performance data cannot be collected immediately.
l
Click
in the Operation column to delete information about the server.
11.4.2 Moving a Server
You can move a high-density server to a specified subnet.
Procedure
Step 1 Open the high-density server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > High-Density Server.
Step 2 Move a server.
1.
In the function pane, select the target server and click Move.
2.
In the Select Subnet dialog box, select the subnet to which the server is to be moved.
3.
Click OK.
----End
11.4.3 Deleting a Server
If a high-density server does not need to be managed by the eSight, you can delete the server
from the eSight.
Procedure
Step 1 Open the high-density server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > High-Density Server.
Step 2 Delete a server.
1.
In the function pane, select the target server.
2.
Click Delete.
3.
In the confirmation dialog box, click OK.
----End
11.4.4 Managing Blades
You can manage blades on a high-density server.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
434
eSight
Operation Guide
11 Managing Servers
Prerequisites
Before remotely controlling a blade on a high-density server, ensure that the following
condition is met:
The PC that functions as a client is properly communicating with the high-density server.
Procedure
Step 1 Open the high-density server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > High-Density Server.
Step 2 Open the blade list.
1.
In the function pane, click the IP address of the blade server where the blade to be
managed is located.
2.
In the navigation tree, choose Component > Hardware.
3.
In the function pane, click the name of the blade in the Blade area.
Step 3 Manage the blade.
1.
In the function pane, view basic information about the blade. For details about the
parameters, see Table 11-9.
Table 11-9 Parameters in the Basic Information area
Parameter
Description
Name
Identifies a blade.
Status
Indicates blade status. The value can be Normal, Faulty,
Unknown, or Offline.
IP address
Indicates a blade IP address.
Device model
Indicates a blade model.
SN
Indicates the serial number of a blade.
Refreshed at
Indicates the latest time when information about a blade is
refreshed.
Description
Provides supplementary information about a blade.
Device
Management
Link to the server management software. After you click Device
Management, the login page is displayed.
2.
In the Health Status of Installed Components area, view the status of blade
components and proportions of blade components in each state.
3.
In the Recent Alarms area, view the latest alarms of the blade.
4.
In the function pane, click Modify Name in the upper right part, and modify Name and
Description.
5.
In the function pane, click Set Power in the upper right part. Then click Power on,
Power off, or Reboot.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
435
eSight
Operation Guide
11 Managing Servers
NOTICE
Before powering off or restarting a blade, ensure that no service risk exists.
6.
In the function pane, click Config UID in the upper right part. Then click Temporarily
on or Turn off for the UID indicator on the blade.
NOTE
After you click Temporarily on, set Duration. The UID indicator will be on in the specified
duration.
Step 4 In the navigation tree, choose General > Alarm List to view details about blade alarms.
In the function pane, you can acknowledge or clear alarms or add remarks for alarms.
Step 5 View blade component information.
1.
In the navigation tree, choose Component > Hardware.
The basic information, asset information, and health status of each component on the
blade are displayed in the function pane.
2.
Click
for each component to view its details.
Step 6 Set the protocol parameters.
1.
In the navigation tree, choose Settings > Protocol Parameters.
The protocol parameters of the server are displayed in the function pane.
2.
Set the Intelligent Platform Management Interface (IPMI) parameters for a V1 server and
the Simple Network Management Protocol (SNMP) parameters for a server of another
generation.
–
Set the IPMI parameters.
i.
In the IPMI Protocol area, set the parameters.
ii.
Click Test.
iii. When a success message is displayed, click OK.
–
iv.
Click Apply.
v.
Click OK.
Set the SNMP parameters.
i.
In the SNMP Protocol area, set the parameters.
ii.
Click Test.
iii. When a success message is displayed, click OK.
iv.
Click Apply.
v.
Click OK.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
436
eSight
Operation Guide
11 Managing Servers
11.5 Managing Storage Servers
You can manage all storage servers, including viewing summary information and alarms.
Procedure
Step 1 Open the storage server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Storage Server.
Step 2 Click the server IP address to view details about the server.
Step 3 In the navigation tree, choose General > Summary to view the basic information and latest
alarms of the server.
1.
In the Basic Information area, view basic information about the server. For details about
the parameters, see Table 11-10.
Table 11-10 Parameters in the Basic Information area
Parameter
Description
Name
Identifies a server.
Status
Indicates server status. The value can be one of the following:
– Normal: The server is operating properly.
– Faulty: An alarm is generated for the server.
– Unknown: The server cannot be scanned.
– Offline: The server fails to communicate with the eSight.
2.
IP address
Indicates a server IP address.
Device type
Indicates a server type.
Device model
Indicates a server model.
Refreshed at
Indicates the latest time when information about a server is
refreshed.
Description
Provides supplementary information about a server.
Device
Management
Link to the server management software. After you click Device
Management, the login page is displayed.
In the Recent Alarms area, view the latest alarms of the server.
Step 4 In the navigation tree, choose General > Alarm List to view details about server alarms.
In the function pane, you can acknowledge, unacknowledge, or clear alarms or add remarks
for alarms.
Step 5 Set the protocol parameters.
1.
Issue 01 (2016-04-30)
In the navigation tree, choose Settings > Protocol Parameters.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
437
eSight
Operation Guide
11 Managing Servers
The protocol parameters of the server are displayed in the function pane.
2.
Set the Intelligent Platform Management Interface (IPMI) parameters.
a.
In the IPMI Protocol area, set the parameters.
b.
Click Test.
c.
When a success message is displayed, click OK.
d.
Click Apply.
e.
Click OK.
----End
11.5.1 Viewing All Servers
You can view information about all storage servers monitored by the eSight.
Procedure
Step 1 Open the storage server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Storage Server.
Step 2 In the function pane, view basic information about a server.
For details about the parameters, see Table 11-11.
Table 11-11 Parameter description
Parameter
Description
IP Address
Indicates a server IP address.
Name
Identifies a server.
Device
Management
Provides a link to the server management software. After you click
Device Management, the login page is displayed.
Status
Indicates server status. The value can be Normal, Faulty,
Unknown, or Offline.
Model
Indicates a server model.
Step 3 Search for servers.
1.
Set a search criterion.
–
Specify a subnet.
next to Subnet.
i.
Click
ii.
In the Select Subnet dialog box, select a subnet.
iii. Click OK.
–
Specify a server name.
Enter a server name in the Name text box.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
438
eSight
Operation Guide
11 Managing Servers
Specify an IP address.
–
Enter a server IP address in the IP address text box.
Specify server status.
–
Select server status from the Status drop-down list.
2.
Click Search.
----End
Follow-up Procedure
After a server is searched, you can perform the following operations:
l
Click
in the Operation column to locate the topology of the server.
l
Click
in the Operation column to refresh information about the server.
NOTE
To collect performance data, click
immediately after you configure inband information about
the server. Otherwise, performance data cannot be collected immediately.
l
Click
in the Operation column to delete information about the server.
11.5.2 Moving a Server
You can move a storage server to a specified subnet.
Procedure
Step 1 Open the storage server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Storage Server.
Step 2 Move a server.
1.
In the function pane, select the target server and click Move.
2.
In the Select Subnet dialog box, select the subnet to which the server is to be moved.
3.
Click OK.
----End
11.5.3 Deleting a Server
If a storage server does not need to be managed by the eSight, you can delete the server from
the eSight.
Procedure
Step 1 Open the storage server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Storage Server.
Step 2 Delete a server.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
439
eSight
Operation Guide
11 Managing Servers
1.
In the function pane, select the target server.
2.
Click Delete.
3.
In the confirmation dialog box, click OK.
----End
11.5.4 Setting a Server Name
You can set a storage server name.
Procedure
Step 1 Open the storage server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Storage Server.
Step 2 Set a server name.
1.
In the function pane, click the IP address of the target server.
2.
In the function pane, click Modify Name in the upper right part.
The Modify Name dialog box is displayed.
3.
Enter a new server name in the Name text box.
4.
Enter a server description in the Description text box.
5.
Click OK.
The new server name and description are displayed in the Basic Information area.
----End
11.5.5 Controlling Power
You can power on, power off, or restart a storage server.
Procedure
Step 1 Open the storage server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Storage Server.
Step 2 Control the power of a rack server.
1.
In the function pane, click the IP address of the target rack server.
2.
In the function pane, click Set Power in the upper right part.
The Set Power dialog box is displayed.
3.
Click Power on, Power off, or Reboot next to Operation.
NOTICE
Before powering off or restarting a server, ensure that no service risk exists.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
440
eSight
Operation Guide
11 Managing Servers
4.
Click OK.
A success message is displayed.
5.
Click OK.
----End
11.6 Managing Third-Party Servers
You can manage all third-party servers, including viewing summary information and alarms.
Procedure
Step 1 Open the third-party server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Third-Party Server.
Step 2 Click the server IP address to view details about the server.
Step 3 In the navigation tree, choose General > Summary to view the basic information and latest
alarms of the server.
1.
In the Basic Information area, view basic information about the server. For details about
the parameters, see Table 11-12.
Table 11-12 Parameters in the Basic Information area
Parameter
Description
Name
Identifies a server.
Status
Indicates server status. The value can be one of the following:
– Normal: The server is operating properly.
– Faulty: An alarm is generated for the server.
– Unknown: The server cannot be scanned.
– Offline: The server fails to communicate with the eSight.
2.
IP address
Indicates a server IP address.
Device type
Indicates a server type.
Device model
Indicates a server model.
Refreshed at
Indicates the latest time when information about a server is
refreshed.
Description
Provides supplementary information about a server.
Device
Management
Link to the server management software. After you click Device
Management, the login page is displayed.
In the Recent Alarms area, view the latest alarms of the server.
Step 4 In the navigation tree, choose General > Alarm List to view details about server alarms.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
441
eSight
Operation Guide
11 Managing Servers
In the function pane, you can acknowledge, unacknowledge, or clear alarms or add remarks
for alarms.
Step 5 Set the protocol parameters.
1.
In the navigation tree, choose Settings > Protocol Parameters.
The protocol parameters of the server are displayed in the function pane.
2.
Modify the parameters.
3.
After the setting, click Test.
4.
When a success message is displayed, click OK.
5.
Click Apply.
6.
Click OK.
----End
11.6.1 Viewing All Servers
You can view information about all third-party servers monitored by the eSight.
Procedure
Step 1 Open the third-party server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Third-Party Server.
Step 2 In the function pane, view basic information about servers.
For details about the parameters, see Table 11-13.
Table 11-13 Parameter description
Parameter
Description
IP Address
Indicates a server IP address.
Name
Identifies a server.
Device
Management
Provides a link to the server management software. After you click
Device Management, the login page is displayed.
Status
Indicates server status. The value can be Normal, Faulty,
Unknown, or Offline.
Model
Indicates a server model.
Vendor
Indicates a server vendor.
Step 3 Search for servers.
1.
Set a search criterion.
–
Specify a subnet.
i.
Issue 01 (2016-04-30)
Click
next to Subnet.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
442
eSight
Operation Guide
11 Managing Servers
ii.
In the Select Subnet dialog box, select a subnet.
iii. Click OK.
Specify a server name.
–
Enter a server name in the Name text box.
Specify an IP address.
–
Enter a server IP address in the IP address text box.
Specify a server vendor.
–
Select a server vendor from the Vendor drop-down list.
2.
Click Search.
----End
Follow-up Procedure
After a server is searched, you can perform the following operations:
l
Click
in the Operation column to locate the topology of the server.
l
Click
in the Operation column to refresh information about the server.
NOTE
To collect performance data, click
immediately after you configure inband information about
the server. Otherwise, performance data cannot be collected immediately.
l
Click
in the Operation column to delete information about the server.
11.6.2 Moving a Server
You can move a third-party server to a specified subnet.
Procedure
Step 1 Open the third-party server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Third-Party Server.
Step 2 Move a server.
1.
In the function pane, select the target server and click Move.
2.
In the Select Subnet dialog box, select the subnet to which the server is to be moved.
3.
Click OK.
----End
11.6.3 Deleting a Server
You can delete a third-party server from the eSight if the server does not need to be managed
by the eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
443
eSight
Operation Guide
11 Managing Servers
Procedure
Step 1 Open the third-party server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Third-Party Server.
Step 2 Delete a server.
1.
In the function pane, select the target server.
2.
Click Delete.
3.
In the confirmation dialog box, click OK.
----End
11.6.4 Setting a Server Name
You can set a third-party server name.
Procedure
Step 1 Open the third-party server list.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Third-Party Server.
Step 2 Set a server name.
1.
In the function pane, click the IP address of the target server.
2.
In the function pane, click Modify Name in the upper right part.
The Modify Name dialog box is displayed.
3.
Enter a new server name in the Name text box.
4.
Enter a server description in the Description text box.
5.
Click OK.
The new server name and description are displayed in the Basic Information area.
----End
11.7 Service Settings
You need to configure automatic check services.
11.7.1 Configuring the Automatic Detection Service
When a managed device sends a discovery request to the eSight, the eSight can use the preset
user names and passwords to attempt to connect to the managed device.
Prerequisites
The broadcast function has been enabled on the device that needs to use the automatic
detection service.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
444
eSight
Operation Guide
11 Managing Servers
Procedure
Step 1 On the menu bar, choose Business > Server > Service Settings.
Step 2 In the navigation tree, choose Service Settings > Auto Detection Service.
Step 3 Click Modify.
Step 4 In the User Name, Password, and Confirm Password text boxes, enter all possible user
names, passwords, and confirmation passwords required for attempting to connect to the
target device respectively.
Step 5 Click Apply to enable the automatic detection service.
----End
11.8 Managing Custom Servers
11.8.1 Customizing Device Information
You can customize device information so that the eSight can manage third-party servers.
11.8.1.1 Viewing All Device Information Customization
You can view device information customization of all third-party servers.
Prerequisites
Device information customization has been created.
Procedure
Step 1 Open the device information customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Device Information Customization.
Step 2 In the function pane, view basic information about device information customization.
The basic information includes the device type, device model, vendor name, and system
object identifier (OID).
Step 3 Search for device information customization of third-party servers.
1.
Set a search criterion.
–
Specify a device type.
Select a device type from the Type drop-down list.
–
Specify a vendor name.
Enter a device vendor name in the Manufacturer text box.
–
Specify a device model.
Enter a device model in the Model text box.
–
Specify a definition type.
Select a definition type from the Defined type drop-down list.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
445
eSight
Operation Guide
11 Managing Servers
2.
Click Search.
The device information customization that meets the search criterion is listed.
----End
11.8.1.2 Creating Device Information Customization
You need to create device information customization so that the eSight can manage thirdparty servers.
Procedure
Step 1 Open the device information customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Device Information Customization.
Step 2 Click Create.
Step 3 Configure device information.
1.
Select a device type from the Type drop-down list.
2.
Enter a device model in the Model text box.
3.
Enter a device vendor name in the Manufacturer text box.
4.
Enter a system object identifier (OID) in the System OID text box.
5.
Enter a management information base (MIB) OID in the MIB OID text box.
6.
Enter an object value in the Object value text box.
7.
Enter the web network management link in the Web NM link text box.
NOTE
–
To obtain the values of System OID and MIB OID, log in to http://support.huawei.com/
ecommunity/bbs/10250853.html and check whether the required server information has been
published. If the required server information has not been published, obtain system OID node
information from the vendor first or contact Huawei technical support for help.
–
HTTP may cause security risks. You are advised to use the HTTPS Web NM link.
Step 4 Click OK.
A success message is displayed.
Step 5 Click OK.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
446
eSight
Operation Guide
11 Managing Servers
11.8.1.3 Deleting Device Information Customization
You can delete unwanted device information customization.
Procedure
Step 1 Open the device information customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Device Information Customization.
Step 2 Delete device information customization.
1.
In the function pane, select the device information customization to be deleted.
2.
Click Delete.
3.
Click OK.
----End
11.8.1.4 Modifying Device Information Customization
You can modify device information customization.
Procedure
Step 1 Open the device information customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Device Information Customization.
Step 2 Modify device information customization.
1.
In the function pane, click
2.
Modify the parameters.
3.
Click OK.
next to the target device.
A success message is displayed.
4.
Click OK.
----End
11.8.2 Customizing Alarm Parameters
You can customize alarm parameters so that third-party servers can report alarms to the
eSight.
11.8.2.1 Viewing All Alarm Parameter Customization
You can view alarm parameter customization of all third-party servers.
Prerequisites
Alarm parameter customization has been created.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
447
eSight
Operation Guide
11 Managing Servers
Procedure
Step 1 Open the alarm parameter customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Alarm Parameter Customization.
Step 2 In the function pane, view basic information about alarm parameter customization.
The basic information includes the alarm name, server vendor name, alarm severity, and
Simple Network Management Protocol (SNMP) version.
Step 3 Search for alarm parameter customization.
1.
Set a search criterion.
–
Specify an alarm name.
Enter an alarm name in the Alarm name text box.
–
Specify a vendor name.
Enter a server vendor name in the Manufacturer text box.
–
Specify an alarm severity.
Select an alarm severity from the Severity drop-down list.
–
Specify an SNMP version.
Select an SNMP version from the SNMP Version drop-down list.
2.
Click Search.
The alarm parameter customization that meets the search criterion is listed.
----End
11.8.2.2 Creating Alarm Parameter Customization
You need to create alarm parameter customization so that third-party servers can report alarms
to the eSight.
Prerequisites
A MIB corresponding to the servers has been obtained.
Context
The MIB is in the format of *.mib. All alarms for servers are defined in the MIB.
Procedure
Step 1 Open the alarm parameter customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Alarm Parameter Customization.
Step 2 Click Create.
Step 3 Set the alarm parameters according to the MIB.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
448
eSight
Operation Guide
11 Managing Servers
Step 4 Open the MIB using a text editor. The following complete alarm information is displayed.
NOTE
l This topic uses an Inspur server as an example and alarms are reported using SNMP v1 trap.
l Search for strings of SNMP trap types for viewing all alarms because the type information is
contained in all alarms.
l
–
TRAP-TYPE for SNMP v1 trap
–
NOTIFICATION-TYPE for SNMP v2c trap and SNMP v3 trap
Characters in the first line
–
UnderTemperatureWarningLow following trap indicates the value of Alarm
name.
The value is a string of 1 to 32 characters. If the value contains more than 32
character, enter it into the eSight after shortening it.
–
TRAP-TYPE indicates the value for SNMP is SNMP v1.
NOTIFICATION-TYPE indicates the value for SNMP is SNMP v2c or SNMP
v3.
l
Characters in the second line
petevts following ENTERPRISE indicates the value of Enterprise ID.
Query the value in the MIB.
The value of petevts is 1.3.6.1.4.1.37945.1.1, which is the value of Enterprise ID of the
server, in this example.
a.
Issue 01 (2016-04-30)
Search for OBJECT IDENTIFIER in the MIB.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
449
eSight
Operation Guide
11 Managing Servers
b.
1 following pet is the last digit of the value of Enterprise ID.
NOTE
n
The value of Enterprise ID is a string of 3 to 64 characters in the format of
X.X.X.X.X.X and contains at least one X.X. X indicates a digit.
The last digit for the value of Enterprise ID is 1. Therefore, the value of Enterprise ID
is X.X.X.X.X.1.
n
c.
If the value of petevts is defined in the MIB, search for -- petevts = to obtain the value.
Search for the value of wiredformgmt in the MIB to serve as the last second digit
for the value of Enterprise ID.
Search for parameters in {} in the MIB until the value of Enterprise ID is
complete.
l
Characters in the seventh line
Under-Temperature Warning (Lower non-critical, going low) following -#SUMMARY indicates the value of Alarm cause.
NOTE
A user can define the alarm cause if nothing is found in the MIB.
l
Characters in the ninth line
WARNING following --#SEVERITY indicates the value of Severity.
Table 11-14 lists the mapping of alarm severity in the MIB and the eSight alarm severity.
The value of Severity is Major.
NOTE
A user can define the alarm severity if nothing is found in the MIB.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
450
eSight
Operation Guide
11 Managing Servers
Table 11-14 Mapping of alarm severity in the MIB and the eSight alarm severity
l
Alarm severity in the MIB
eSight Alarm Severity
CRITICAL
Critical
WARNING
Major
INFORMATIONAL
Warning
Characters in the eleventh line
65792 following ::= indicates the value of Specific.
Step 5 This topic uses an Inspur server as an example and alarms are reported using SNMP v1 trap.
Table 11-15 lists the parameters to be set.
Table 11-15 Alarm parameters
Parameter
Value
Manufacturer
Inspur
Severity
Major
Alarm name
UnderTemperatureWarningLow
Notification type
Alarm
Event type
Device alarm
SNMP
SNMP v1
Generic
6
Specific
65792
Enterprise ID
1.3.6.1.4.1.37945.1.1
Alarm cause
Under-Temperature Warning (Lower noncritical, going low)
Step 6 When the alarms are reported using SNMP v2c trap or SNMP v3 trap, Alarm OID needs to
be set.
1.
Search for NOTIFICATION-TYPE in the MIB.
NOTE
Search for strings for SNMP trap types for viewing all alarms because the type information is
contained in all alarms.
NOTIFICATION-TYPE indicates that the alarms are reported using SNMP v2c trap or SNMP
v3 trap.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
451
eSight
Operation Guide
11 Managing Servers
2.
1 following ::= is the last digit of the value of Alarm OID.
NOTE
The value of Alarm OID is a string of 3 to 64 characters in the format of X.X.X.X.X.X and
contains at least one X.X. X indicates a digit.
The last digit for the value of Alarm OID is 1. Therefore, the value of Alarm OID is X.X.X.X.X.
1.
3.
Search for the value of hwOEM in the MIB to serve as the last second digit for the value
of Alarm OID.
Search for parameters in {} until the value of Alarm OID is complete.
Step 7 Click Advanced and set advanced parameters for the alarm parameter customization.
The location parameter defined in the MIB is shown in the following figure.
l
cpqHoGenericData following VARIABLES indicates the value of Location
Parameter Name.
l
Query the value of Location Parameter OID in the MIB.
a.
Search for cpqHoGenericData OBJECT-TYPE in the MIB.
b.
1 following ::= is the last digit of the value of Location Parameter OID.
NOTE
The value of Location Parameter OID is a string of 3 to 64 characters in the format of
X.X.X.X.X.X and contains at least one X.X. X indicates a digit.
The last digit for the value of Location Parameter OID is 1. Therefore, the value of
Location Parameter OID is X.X.X.X.X.1.
c.
Search for the value of cpqHoGeneric in the MIB to serve as the last second digit
for the value of Location Parameter OID.
Search for parameters in {} until the value of Location Parameter OID is
complete.
Step 8 Click OK after the parameter configuration is complete.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
452
eSight
Operation Guide
11 Managing Servers
Step 9 When a success message is displayed, click OK.
----End
11.8.2.3 Importing Customized Information About Alarm Parameters in Batch
Fill in the customized information about alarm parameters based on the configuration file
template to import the customized information in batch.
Context
NOTICE
The batch import may take several minutes.
Procedure
Step 1 Open the alarm parameter customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Alarm Parameter Customization.
Step 2 Click Import.
The batch import page is displayed.
Step 3 In the Download template area, click the configuration file template.
The File Download dialog box is displayed.
Step 4 Click Save to save the EXCEL configuration file template locally.
Step 5 In the configuration file template, enter alarm information that needs to be batch imported and
save the entered information as a configuration file.
NOTE
l Carefully read requirements and restrictions on the Instructions tab of the template and fill in the
contents based on the requirements in the template.
l To obtain alarm information to be filled in the Excel configuration file, log in to http://
support.huawei.com/ecommunity/bbs/10250853.html and check whether the required server
information has been published. If the required server information has not been published, obtain
MIB alarm information from the vendor and send the information to Huawei technical support. Then
Huawei technical support generates a batch import template and provides the template to Huawei
frontline personnel for batch import.
Step 6 On the device import page, click
file that has been saved.
beside Upload File and select the EXCEL configuration
Step 7 Click Upload to upload the configuration file.
After the configuration file is uploaded, the information about alarm parameters that need to
be batch imported is displayed.
Step 8 Select the alarms and click Create. The system starts importing the selected alarm.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
453
eSight
Operation Guide
11 Managing Servers
NOTE
If some alarms fail to be imported, modify the information about those alarms and import again.
----End
Follow-up Procedure
You can perform the following operations to save the alarm information summary to your
computer.
1.
On the alarm parameter customization page, click Export All (or select one or multiple
check boxes and click Export Selected), the File Download dialog box is displayed.
2.
Click Save. The Save as dialog box is displayed.
3.
Enter a name for the file and click Save. The alarm information summary is saved
locally.
11.8.2.4 Deleting Alarm Parameter Customization
You can delete unwanted alarm parameter customization.
Procedure
Step 1 Open the alarm parameter customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Alarm Parameter Customization.
Step 2 Delete alarm parameter customization.
1.
In the function pane, select the alarm parameter customization to be deleted.
2.
Click Delete.
3.
Click OK.
----End
11.8.2.5 Modifying Alarm Parameter Customization
You can modify alarm parameter customization.
Procedure
Step 1 Open the alarm parameter customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Alarm Parameter Customization.
Step 2 Modify alarm parameter customization.
next to the target device.
1.
In the function pane, click
2.
In the displayed dialog box, modify the parameters.
3.
Click OK.
A success message is displayed.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
454
eSight
Operation Guide
11 Managing Servers
4.
Click OK.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
455
eSight
Operation Guide
12 Managing Disaster Recovery System
12
Managing Disaster Recovery System
The Disaster Recovery System uses value-added features provided by underlying storage
systems to implement remote replication for mission-critical data of common applications
running on application servers, the system is used in data protection and disaster recovery
solutions. On the eSight, you can go to Disaster Recovery Management page.
Prerequisites
The user is a member of the administrator group.
Procedure
Step 1 On the navigation bar, choose System > System Management > Disaster Recovery
Management.
Step 2 In the function pane, choose Access Configuration.
Step 3 In the right area, view the device information. Table 12-1 describes related parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
456
eSight
Operation Guide
12 Managing Disaster Recovery System
Table 12-1 Access parameters
Parameter
Description
Setting
Name
Set the name of the disaster
recovery system.
[Example]
storageA
NOTE
The name is a string of 1 to
128 characters.
IP Address
Indicates the IP address of
the disaster recovery system.
[Value range]
l From left to right, the
value of the first byte
ranges from 1 to 255.
l The values of the other
bytes range from 0 to
255.
[Example]
10.10.10.70
Management
Port
Click Management, the
Disaster Recovery
Management page is
opened.
[Example]
Port number used for access
a specific disaster recovery
system.
[Value range]
-
The value ranges from 1 to
65535.
[Example]
6553
Description
Operation
The description of the
disaster recovery system.
Click
to modify the
device information.
[Example]
[Example]
-
to delete the device
Click
information.
NOTE
l Click Add, set the device parameters in the Add Disaster Recovery Access Address dialog to add
the Disaster Recovery access address.
l In the host list, click the name of a host that you want to delete and click Delete.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
457
eSight
Operation Guide
13 Security Management
13
Security Management
About This Chapter
Security management provides the functions of managing user rights and eSight security
policies. These functions can prevent unauthorized users from performing malicious
operations on the eSight, ensuring data security of the eSight.
13.1 Basic Concepts of Security Management
Before performing security management operations, you must familiarize yourself with the
basic concepts related to security management, such as the user, role, operation rights, and
access control. Understanding these concepts will help you avoid errors when performing
security management operations.
13.2 Overview
This topic helps you learn about all operations about security management and select
operation modes based on site requirements.
13.3 Security Policy Management
Security policies are customized for user management. To improve access security, you need
to plan and configure security policies during initial installation of the eSight.
13.4 Creating Users and Assigning Rights
You can create users and assign rights to the users to optimize network management. The
eSight enables you to assign operation rights, managed objects to a role and define the role for
a user so that the user has all rights of the role.
13.5 Setting Authentication Server
Authentication, Authorization and Accounting (AAA) is deployed at many enterprises to
implement centralized user management, authorization, and authentication. You can use an
account created in eSight or an existing account on the authentication server to log in to and
use eSight.
13.6 Online User Management
You can view online user to find unauthorized login users and log out these users, which
prevents unauthorized operations performed on the eSight client.
13.7 Setting eSight Data Overflow Dump
Normally, sufficient database space has been allocated based on the network scale to ensure
proper eSight service running. Even so, it is still possible that network monitoring will be
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
458
eSight
Operation Guide
13 Security Management
compromised as new data cannot be written to the database when the data in it accumulates
with time. eSight data overflow dump provides a mechanism to cope with the problem. It is
advisable to plan and set this function based on the network scale and hardware configuration
of the eSight server after eSight is installed.
13.8 Querying Logs
A log records the operations and major events of the eSight. By querying logs, you can learn
about the eSight running status and operation details.
13.9 Example: Typical Security Management Operations
In the eSight, only after you set a role for a user, the user has the operation rights of the role in
its object groups. This topic describes how to create an eSight user and assign rights to the
user.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
459
eSight
Operation Guide
13 Security Management
13.1 Basic Concepts of Security Management
Before performing security management operations, you must familiarize yourself with the
basic concepts related to security management, such as the user, role, operation rights, and
access control. Understanding these concepts will help you avoid errors when performing
security management operations.
Table 13-1 describes the basic concepts about security management.
Table 13-1 Basic concepts
Concept
Description
User
The user name and password of the user uniquely determine the
operation management rights.
The default administrator is admin, who can manage all devices and
possesses all the operation rights of the eSight.
Role
A role defines a set of users. Also, a role is a set of permissions that
provide a user with the ability to perform a predefined set of functions.
Managing user rights based on roles makes rights management more
effective.
l Administrators is the default administrator role provided by the
eSight, and the role has the operation rights of all managed objects.
l openapi is a role provided by the eSight by default and has
permission to invoke the open API interfaces. Users who belong to
the openapi role has permission to use the open API to access eSight
resources and develop other functions based on the original functions.
Managed
object
Managed objects are the devices managed by the eSight, including
physical devices, virtual devices and subnets.
Operation
rights
Operation rights mean the rights associated with a user to perform a
specific operation. After the operation rights are assigned to a user, the
user can perform a specific operation.
Operation rights are related to object groups. Users can perform
operations on the devices in an object group only when they have the
operation rights of the object group.
Access control
policy
It is used to limit users to only have access to the eSight in the specified
time segment or by using an Internet Protocol (IP) address within the
specified IP address range.
If a user account is hacked, the hacker cannot use the account to log in to
the server. This is because that users can log in only by using the IP
addresses that are included in the access control list (ACL). This ensures
the eSight access security.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
460
eSight
Operation Guide
13 Security Management
Rights
Rights define which operations can be performed on objects. The operations that users can
perform on objects vary according to their rights.
Figure 13-1 shows the rights elements: objects and operations.
Figure 13-1 Rights elements
eSight Users can perform operations on the eSight only they have access rights and operation
rights of the eSight.
Figure 13-2 shows the operations that can be performed on the eSight.
Figure 13-2 Operations that can be performed on the eSight
Table 13-2 describes the rights of the eSight users.
Table 13-2 Rights description
Issue 01 (2016-04-30)
Rights
Operation
Description
Access rights
Log in to the eSight
Users can log in to the eSight only when
they have valid accounts.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
461
eSight
Operation Guide
13 Security Management
Rights
Operation
Description
Operation rights
Perform operations on
the eSight
Users can perform related management
operations on the eSight client only when
they have management rights. For
example, querying system logs, creating a
role, or creating a subnet.
Authorization Principles
Authorization is the function of assigning rights to users.
Authorization is to assign eSight operation rights for users. The eSight assigns rights to users
by adding the users to roles.
After some operations and objects are allocated to a role, the role has the rights of the
operations on the objects. If a user is added to the role, the user has the rights of the role. The
eSight provides two authorization modes: select roles while creating users and select users
while creating rules.
l
Select roles while creating users.
Roles are already created. If you select roles when creating users, the users have the
rights of the selected roles after successful creation. Figure 13-3 shows the process of
selecting roles while creating users.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
462
eSight
Operation Guide
13 Security Management
Figure 13-3 Common authorization process
In the process shown in Figure 13-3, objects and operations must be specified for a role
one by one. Too many objects may cause complex authorization operations. To improve
authorization efficiency, you need to plan object groups before authorization. Figure
13-4 shows the authorization process by creating object groups.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
463
eSight
Operation Guide
13 Security Management
Figure 13-4 Complete authorization process
l
Select users while creating roles.
Users are already created. If you select users when creating roles, the selected users have
the rights of the roles after successfully creation. Figure 13-5 shows the process of
selecting users while creating roles.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
464
eSight
Operation Guide
13 Security Management
Figure 13-5 Process
13.2 Overview
This topic helps you learn about all operations about security management and select
operation modes based on site requirements.
Before performing security management operations, you must familiarize yourself with the
basic concepts related to security management, such as the user, role, operation rights, and
access control. For details, see 13.1 Basic Concepts of Security Management.
Understanding these concepts will help you avoid errors when performing security
management operations.
Figure 13-6 shows the overview of security management operations.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
465
eSight
Operation Guide
13 Security Management
Figure 13-6 Overview of security management operations
13.3 Security Policy Management
Security policies are customized for user management. To improve access security, you need
to plan and configure security policies during initial installation of the eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
466
eSight
Operation Guide
13 Security Management
13.3.1 Setting an Account Policy
This topic describes how to set an account policy to improve access security of the eSight.
The account policy settings include the length of the user name and the policies related to user
login.
Prerequisites
You have the operation rights for User Management.
Context
l
l
The account policy applies to the following users after the account policy is successfully
set:
–
New users.
–
Users whose information is modified.
The eSight provides the default account policy, and you can modify it as required.
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree on the left, choose Account Policy.
Step 3 On the Account Policy page, set the account policy as required.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
467
eSight
Operation Guide
13 Security Management
Step 4 Click Apply.
----End
Follow-up Procedure
The following table describes the operations that you can perform if the user is disabled or
locked.
Task
Procedure
Enable a user
1. Choose System > Administration > User Management from the
main menu.
2. In the navigation tree on the left, choose User.
3. Click
in the Operation column where the user information is
located.
Unlock a user
account
l Unlock the user account within the lock duration.
The user account is automatically unlocked after the lock duration
limit is reached.
l Unlock a user account that is locked permanently.
– Choose System > Administration > User Management from
the main menu.
– In the navigation tree on the left, choose User.
in the Operation column where the user information is
– Click
located.
13.3.2 Setting a Password Policy
You can set a password policy to improve access security of the eSight. The password policy
settings include the user password complexity rules, password change interval, and character
restriction.
Prerequisites
You have the operation rights for User Management.
Context
l
A password policy applies to all users once it is configured. After the minimum length of
the user password is specified and validated, if an online user wants to change the
password, the user needs to set the new password based on the specified minimum
password length requirements.
l
You need to set a password based on the password policy when you create a user.
l
A new password policy does not affect the configured password.
l
The eSight provides the default password policy, and you can modify it as required.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
468
eSight
Operation Guide
13 Security Management
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree on the left, choose Password Policy.
Step 3 On the Password Policy page, set the password policy as required.
NOTICE
Disabling the functions of password strength policies and password change intervals will
lower account security. You are advised to enable all password security policies provided by
the eSight.
Step 4 Click Apply.
----End
13.3.3 Setting an Access Control Policy
The access control policy controls login time and client Internet Protocol (IP) addresses. To
ensure access security, you can set an access control policy to allow some users to log in to
the eSight by using a specified IP address within the specified period of time.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
469
eSight
Operation Guide
13 Security Management
Prerequisites
You have the operation rights for User Management.
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree, select Client IP Address Policy or Login Time Policy to add, modify,
or delete an access control policy.
----End
Result
l
Issue 01 (2016-04-30)
When you create a user, you can select an existing access control policy at the step of
setting Access Control Policies.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
470
eSight
Operation Guide
13 Security Management
l
Because the default user admin needs to log in any time, the eSight does not allow
control on the login time of the admin user.
13.3.4 Setting the Client to Be Logged Out Automatically
This topic describes how to set the client to be logged out automatically. To prevent other
users from performing unauthorized operations, the eSight allows you to set related idle
parameters. If the automatic logout settings are canceled, you must manually log out of a
client when you are away. Otherwise, other users may perform unauthorized operations.
Context
This operation is valid for the current user. If the database disconnects during eSight running,
this configuration item will be reset to its default value. If the eSight detects that the database
reconnects, the configuration item is restored to the value set by a user.
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree on the left, choose Idle Time Setting.
Step 3 On the Idle Time Setting page, select Enable auto logout.
Step 4 In the Idle time text box, enter a value or select a value.
Step 5 Click Apply.
----End
Follow-up Procedure
After the client is automatically logged out, the current user needs to log in to the eSight
again.
13.3.5 Changing the Password of an eSight User
You must periodically change the eSight user password to ensure user information security.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
471
eSight
Operation Guide
13 Security Management
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree on the left, choose My Settings.
Step 3 On the Change Password page, click Settings.
Step 4 Set Old password, New password, and Confirm password.
Step 5 Click OK.
----End
13.4 Creating Users and Assigning Rights
You can create users and assign rights to the users to optimize network management. The
eSight enables you to assign operation rights, managed objects to a role and define the role for
a user so that the user has all rights of the role.
13.4.1 Creating a Role
This topic describes how to create a role. When the default roles of the eSight cannot meet the
user authorization requirements, you can create roles to ensure security of the eSight and
facilitate network management.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
472
eSight
Operation Guide
13 Security Management
Prerequisites
You have the operation rights for User Management.
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree on the left, choose Role.
Step 3 On the Role page, click Create.
Step 4 Set the basic information on the displayed page.
1.
Issue 01 (2016-04-30)
In the Enter Basic Info step, set Role name and Description.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
473
eSight
Operation Guide
13 Security Management
2.
Optional: Select users.
–
You can select users from the user list. After a role is created, a specified user has
the management rights and operation rights of the role.
NOTE
–
3.
n
You can select users from the list or by searching for user names.
n
You can delete the selected users in the Available Users area.
After a role is created, when you create users, you can allocate the role to these
users. These users have the management rights and operation rights of the role.
Click Next.
Step 5 Select managed objects to enable the role to have the management rights of a specified object
group.
1.
Issue 01 (2016-04-30)
In the Select Managed Objects step, click Add.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
474
eSight
Operation Guide
13 Security Management
2.
In the Select Managed Objects dialog box, select managed objects. Click OK.
NOTE
You can select managed objects from Object Groups or from User-Defined Object Groups.
When the eSight has no user-defined object group, the User-Defined Object Groups node is not
displayed. User-defined object groups are created on the Group Management page. For details
about how to create object group, see 3.11 Creating a Group.
3.
Click Next.
Step 6 Select operations to make the role have the specified operation rights.
1.
Issue 01 (2016-04-30)
In the Select Operation Rights step, click Add.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
475
eSight
Operation Guide
13 Security Management
2.
In the Select Operation Rights dialog box, select operations. Click OK.
3.
Click Next.
Step 7 Summary.
1.
Issue 01 (2016-04-30)
In the Confirm Info step, check the role settings.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
476
eSight
Operation Guide
13 Security Management
2.
Click Finish.
----End
Follow-up Procedure
The following table describes the operations that you can perform on the Role page after you
create a role.
Task
Procedure
View role
information
You can learn about the details of a role.
Modify role
information
You can modify role information as required.
In the Role Name column, click the required role name. On the displayed
page, view the details of the role.
1. Click
in the Operation column where the required role information
is located.
2. On the displayed page, Modify Description, Users, Managed
Objects, and Operation Rights.
For details about how to change the value of Users, see Step 4 under
Create Role; for details about how to change the value of Managed
Objects, see Step 5 under Create Role; for details about how to
change the value of Operation Rights, see Step 6 under Create Role.
3. Click OK.
Delete a role
You can delete an unused role.
NOTE
The default role Administrators cannot be deleted.
1. Click
in the Operation column where the required role information
is located.
2. In the Warning dialog box, click Yes.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
477
eSight
Operation Guide
13 Security Management
13.4.2 Creating Users
This topic describes how to create users. When the default user of the eSight cannot meet the
network management requirements, you can create users to ensure security of the eSight and
facilitate network management.
Prerequisite
l
You have the operation rights for User Management.
l
You learn about the user account policy and password policy.
For details about how to set an account policy or a password policy, see 13.3.1 Setting
an Account Policy and 13.3.2 Setting a Password Policy.
Context
l
Users can be created one by one or in batches. To create users in batches, import a
template in .xls format to the eSight.
l
A maximum of 1000 users can be created. When the number of users to be created
reaches 1000, the eSight stops creating the remaining users.
l
You must manually set the user name and password. For the other properties, you can
use default values or set them after you create the user account successfully.
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree on the left, choose User.
Step 3 On the User page, select a method of creating users.
l
Create a user
This operation enables you to create a single user.
Issue 01 (2016-04-30)
a.
On the User page, click Create.
b.
On the displayed page, set the basic information.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
478
eSight
Operation Guide
13 Security Management
i.
In the Enter Basic Info step, set User name.
ii.
Click Settings, Set Password and Confirm password, click OK.
iii. Set Account status to Enabled.
iv.
Set the user's Mobile number and Email address.
v.
Set Description.
vi. Click Next.
c.
On the displayed page, set a role for the user. The user has the management rights
and operation rights of the role.
i.
In the Role step, select the role.
NOTE
○ In the Role Name column, click the required role name. In the View Role dialog
box, view the details of the role.
○ The created user has operation rights only if you select the role.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
479
eSight
Operation Guide
13 Security Management
ii.
d.
Click Next.
On the displayed page, set an access control policy for the user. The user can login
the eSight by using a specified Internet Protocol (IP) address within the specified
period of time.
i.
In the Access Control Policies step, select a login time control policy and an
IP address range.
NOTE
○ If the required login time control policy does not exist in the Policy list, you can
click Create to create it.
○ If the required client IP address control policy does not exist in the IP Address
Range list, you can click Create to create it.
ii.
l
Click Finish.
Batch Create Users
This operation enables you to create multiple users in a efficient way.
a.
On the User page, click Batch Create.
b.
On the displayed page, click Template.xls next to Download template to
download the template to a local disk.
c.
Open the template on the local disk, enter the user information, and save the
template.
NOTE
A user cannot be created if the user information is incorrect.
d.
Issue 01 (2016-04-30)
On the displayed page, click
template saved on the local disk.
next to Upload user information to import the
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
480
eSight
Operation Guide
13 Security Management
NOTE
When Internet Explorer is used to upload files, the complete path (for example, D:\A\A
\A.xls) cannot exceed 255 characters. Otherwise, target files cannot be uploaded.
e.
Click
to upload the template. The eSight automatically creates users based on
the user information in the template.
f.
In the Operation result dialog box, confirm the result of creating users in batches,
and click OK.
The detailed information about the created users is displayed in the operation result
list.
NOTE
You can view user details in the user list on the User page.
----End
Follow-up Procedure
The following table describes the operations that you can perform on the User page after you
create a user.
Task
Procedure
View user
information
You can learn about the details of a user.
Modify user
information
You can modify user information as required.
In the User Name column, click the required user name. On the
displayed page, view the details of the user.
1. Click
in the Operation column where the required user
information is located, and then modify it.
2. On the displayed page, modify Basic Info, Role, and Access
Control Policies.
3. Click OK.
Delete a user
You can delete an unused user.
NOTE
The default user admin cannot be deleted.
1. Click
in the Operation column where the required user
information is located.
2. In the Confirm dialog box, click Yes.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
481
eSight
Operation Guide
13 Security Management
Task
Procedure
Reset password
If a user forgets the password when logging to the eSight, the user can
use the new password to log in after the password is reset.
NOTE
The password of the default user admin cannot be reset. You must remember its
password.
in the Operation column where the required user
1. Click
information is located.
2. In the displayed page, set New password and Confirm password
based on the password rules.
3. Click OK.
Enable a user
If an account is not used for a long time and maximum number of days
the account is not used continuously is reached, the account is disabled.
To use the account again, you can enable the user account.
Click
in the Operation column where the required user
information is located.
Disable a user
You can disable a user account when you do not use the user account.
NOTE
The default user admin cannot be disabled.
Click
in the Operation column where the required user information
is located.
13.5 Setting Authentication Server
Authentication, Authorization and Accounting (AAA) is deployed at many enterprises to
implement centralized user management, authorization, and authentication. You can use an
account created in eSight or an existing account on the authentication server to log in to and
use eSight.
Prerequisites
You have the operation rights of Authentication Server Settings.
Context
1.
Local authentication
Local authentication is performed when you use an account created in eSight to log in to
and use eSight.
NOTE
If the authentication server is not configured, the default authentication mode Local authentication is
used.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
482
eSight
Operation Guide
13 Security Management
2.
Remote authentication
Remote authentication is performed when you use an existing account on the
authentication server to log in to eSight through LDAP authenticated or RADIUS
authenticated. The account is authenticated in AAA. After successful authentication, you
can log in to and use eSight.
NOTICE
Because the RADIUS protocol does not support replay attack protection, client and
server interaction content encryption, or high password strength requirements, it is
recommended that you deploy eSight and the RADIUS server in the same trusted
domain.
NOTE
The account used to log in to eSight through remote authentication must be configured on the remote
authentication server in advance. In this case, the account can match with the role information
configured on eSight and you can obtain corresponding role rights after login.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
483
eSight
Operation Guide
13 Security Management
Procedure
Step 1 Choose System > System Settings > Authentication Server Settings from the main menu.
Step 2 Set Authentication mode.
NOTE
The options of Authentication mode are as follows:
l LDAP: Log in to eSight using an account that is authenticated on the LDAP authentication server.
l RADIUS: Log in to eSight using an account that is authenticated on the RADIUS authentication
server.
l Local authentication: Log in to eSight using an account that is created in eSight.
Step 3 Set related parameters.
The account on the RADIUS server is in the following format:
User-Name
User-Password == "Test1234"
Service-Type = Login-User
Reply-Message = "Administrators;SSAgroup"
When an account that is created on the RADIUS authentication server is used to log in to
eSight, eSight determines the role of this account by the value of Reply-Message.
Step 4 Click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
484
eSight
Operation Guide
13 Security Management
NOTE
The settings on the authentication server take effect only after eSight is restarted.
----End
13.6 Online User Management
You can view online user to find unauthorized login users and log out these users, which
prevents unauthorized operations performed on the eSight client.
13.6.1 Viewing Online Users
You can view online users to find unauthorized login users and take proper measures to
prevent unauthorized operations performed on the eSight client.
Prerequisites
You have the operation rights for User Management.
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree on the left, choose View Online User.
Step 3 On the View Online User page, view online users, and their login time, login IP addresses,
and roles to which they belong. In addition, you can perform the following operations:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
485
eSight
Operation Guide
13 Security Management
Task
Procedure
Update online user
information
Click Refresh to update the online user information.
Force a user to log
out
For details, see 13.6.2 Forcing a User to Log Out.
Enter Single User
Mode
When you want to maintain the eSight server, you can choose to
make the system enter single user mode.
1. Click Enter Single User Mode.
2. In the Confirm dialog box, click Yes.
NOTE
l After the system enters single user mode, the eSight only allows the
current user to log in to the eSight, and other online users are forcibly
logged out.
l You need to make the system exit single user mode immediately you
complete maintenance operations. In this way, other users can use the
eSight properly.
Exit Single User
Mode
You need to exit single user mode after completing maintenance
operations.
Click Exit Single User Mode.
NOTE
After you exit single user mode, other users can log in to the eSight again.
----End
13.6.2 Forcing a User to Log Out
When viewing online users, you can force an unauthorized user to log out. This prevents the
unauthorized user from performing unauthorized operations on the eSight client.
Prerequisites
You have the operation rights for User Management.
Context
If you log in, you cannot force yourself to log out.
Procedure
Step 1 Choose System > Administration > User Management from the main menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
486
eSight
Operation Guide
13 Security Management
Step 2 In the navigation tree on the left, choose Viewing Online User.
Step 3 Click Logout in the Operation column where the required user information is located.
Step 4 In the Confirm dialog box, click Yes.
----End
13.7 Setting eSight Data Overflow Dump
Normally, sufficient database space has been allocated based on the network scale to ensure
proper eSight service running. Even so, it is still possible that network monitoring will be
compromised as new data cannot be written to the database when the data in it accumulates
with time. eSight data overflow dump provides a mechanism to cope with the problem. It is
advisable to plan and set this function based on the network scale and hardware configuration
of the eSight server after eSight is installed.
Prerequisites
You have the operation rights for Database Overflow Dump.
Context
Figure 13-7 shows the working mechanism of eSight data overflow dump.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
487
eSight
Operation Guide
13 Security Management
Figure 13-7 Working Mechanism of Data Overflow Dump
l
At the preset time every day, the eSight checks whether the database tablespace usage
exceeds the preset threshold, that is, whether overflow occurs. If the usage exceeds the
threshold, the eSight dumps the earliest data to the files in a specified path and deletes
the data from the database until the database tablespace usage is below the threshold.
l
Dump path can be an absolute path or a relative path.
l
–
The relative path is relative to the eSight installation path eSight installation
directory/AppBase/var/iemp/data/dump (on Linux). If you specify Dump path
to AAA, the file is saved to eSight installation directory/AppBase/var/iemp/
data/dump/AAA.
–
If an absolute path is specified (on Linux), it must be a subpath of eSight
installation directory/AppBase/var/iemp/data/dump.
Before saving dump files to a specified directory, the eSight checks whether the file size
or the retention period exceeds the preset thresholds. If so, it will delete the earliest file
until they are below the threshold. File size and Save period settings can help you
manage file directory size based on available space of hard disks.
NOTICE
Because the eSight deletes the dumped data from the database, the dumped data cannot be
queried from the GUI. You can view it in the dump file during the storage period. If overflow
dump occurs on a database, the database tablespace will exhaust soon. Expanding the
database is recommended to ensure proper operation of the eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
488
eSight
Operation Guide
13 Security Management
Procedure
Step 1 Choose System > System Settings > Set Database Overflow Dump from the main menu.
Step 2 Choose the database overflow dump type from the navigation tree on the left.
Step 3 In the right pane, set dump parameters.
The maximum sizes for tablespaces may vary with the database type. For details, see Table
13-3.
Table 13-3 Maximum sizes for tablespaces
Tablespace
MySQL Database
SQL Server
Database
Oracle Database
Log management
-
5000 MB
5000 MB
Alarm management
-
5000 MB
5000 MB
Performance
management
-
5000 MB
5000 MB
Terminal resource
management
-
4096 MB
4096 MB
Network traffic
management
-
20480 MB
20480 MB
SLA management
-
20480 MB
20480 MB
Configuration file
management
-
2048 MB
2048 MB
Step 4 Click Apply.
----End
Result
When data is dumped, the eSight automatically generates a folder named in the format of the
current date, save the data to the folder, and place the folder in the directories whose names
are the months in which the data is generated.
13.8 Querying Logs
A log records the operations and major events of the eSight. By querying logs, you can learn
about the eSight running status and operation details.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
489
eSight
Operation Guide
13 Security Management
Prerequisites
You have the operation rights for Log Management.
Context
eSight logs are classified into security logs, system logs, and operation logs.
l
Security logs record security operations that are performed on the eSight, such as logging
in to the server, changing passwords, creating users, and logging out of the server.
l
System logs record the events occurred on the eSight, such as abnormal running of the
eSight, network failures, and attacks to the eSight. These logs help you analyze the
eSight status and rectify faults.
l
Operation logs record the user operations that are performed on the eSight, such as
creating monitoring views and modifying device managers.
Procedure
Step 1 Choose System > Administration > Log Management from the main menu.
Step 2 In the navigation tree in the left pane, choose Security Logs, System Logs or Operation
Logs.
Step 3 On the page, view the log information, or set search criteria to view specified log information.
After clicking the value in the Details column of the target log, you can view logs details.
NOTE
A maximum of 800 characters can be displayed in Details. Contents other than the first 800 characters are
displayed as ....
The eSight server time is used for the filter criteria Time period. The value is 24 hours before
the current time. For example, if the current time is 11:00:00, November 12, 2012, the default
value of Time period is from 11:00:00, November 11, 2012 to 11:00:00, November 12, 2012.
----End
Follow-up Procedure
You can export the logs and back them up for future analysis.
NOTICE
Switching between pages will cause log exporting to be interrupted.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
490
eSight
Operation Guide
13 Security Management
Task
Procedure
Export all logs
1. Click Export All to export all logs.
2. In the File Download dialog box, click Save.
3. Select a save path and click Save.
NOTE
Log files must be saved in .csv format.
Export the selected logs
1. In the log list, select the check box before Event
Name of the required log.
2. Click Export Selected to export the selected logs.
3. In the File Download dialog box, click Save.
4. Select a save path and click Save.
NOTE
Log files must be saved in .csv format.
13.9 Example: Typical Security Management Operations
In the eSight, only after you set a role for a user, the user has the operation rights of the role in
its object groups. This topic describes how to create an eSight user and assign rights to the
user.
Application Scenario
The eSight can manage the devices in an office in a centralized manner. The devices in the
office are allocated to two user-defined object groups by region, namely, city A and city B,
and monitored and maintained by different engineers. To help the engineers to monitor and
maintain the devices by using the eSight, you need to assign accounts and rights for them.
Figure 13-8 shows the network diagram in the current scenario.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
491
eSight
Operation Guide
13 Security Management
Figure 13-8 Rights- and domain-based network diagram
Data Planning
To monitor and maintain devices in a centralized manner, you can allocate the devices to two
user-defined object groups, city A and city B.
Based on role responsibilities, the following three roles are planned.
Table 13-4 Role planning
Issue 01 (2016-04-30)
Role
Function
Object Group
Operated Rights
Administrators
Performs operation
and maintenance
operations on the
devices in city A and
city B.
Devices in city A
and city B
Has the default operation
rights of the eSight
administrator.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
492
eSight
Operation Guide
13 Security Management
Role
Function
Object Group
Operated Rights
Alarm monitor
of City A
Monitors alarms of the
devices in city A.
Devices in city A
Browse Current Alarms
Browses the masked
alarms.
Browses historical alarms
Browses the event list
Alarm monitor
of City B
Monitors alarms of the
devices in city B.
Devices in city B
Browse Current Alarms
Browses the masked
alarms
Browses historical alarms
Browses the event list
Based on user responsibilities, the following three users are planned.
Table 13-5 User planning
User Name
Function
Role
Operator_AB
Maintains the devices in city A and
city B.
Administrators
Alarm_Monitor_A
Monitors alarms of the devices in city
A.
Alarm monitor of City
A
Alarm_Monitor_B
Monitors alarms of the devices in city
B.
Alarm monitor of City
B
Configuration Procedure
To create an eSight user and assign rights to the user, perform the following steps:
1.
2.
Issue 01 (2016-04-30)
Create two groups, city A and city B.
a.
Choose Resource > Resources Group > Group Management from the main
menu.
b.
On the Group Management page, click
c.
Set Group Name and Description for city A, and enter description in the
Description text box.
d.
In the Manually Add Members area, click
them to the group.
e.
On the Group Management page, click Confirm.
f.
Perform steps 1.a through 1.d to create a user-defined object group for city B and
add all the devices in city B to the user-defined object group.
in the left pane.
and select devices to add
Create alarm monitoring roles for city A and city B respectively, and assign the
management rights and operations for the roles.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
493
eSight
Operation Guide
13 Security Management
a.
Choose System > Administration > User Management from the main menu.
b.
In the navigation tree on the left, choose Role.
c.
On the Role page, click Create. In the Enter Basic Info step, set Role name to
Alarm monitor of City A, and click Next.
d.
In the Select Managed Objects step, click Add. In the Select Managed Objects
dialog box, select the user-defined object group for city A and click OK.
e.
Click Next.
f.
Click Add. In the Select Operation Rights dialog box, select operation rights
based on Table 13-4, and click OK.
g.
Click Next.
h.
Click Finish.
The alarm monitoring role for city A is created successfully.
i.
Perform steps 2.a through 2.h to create the alarm monitoring role for city B.
NOTE
The administrator is the default role of the eSight, and the default object group manages all the
devices and has all the operation rights. Therefore, you do not need to create the object group for
the operator role.
3.
Create users Operator_AB, Alarm_Monitor_A, and Alarm_Monitor_B, and set the
roles for the users.
a.
Choose System > Administration > User Management from the main menu.
b.
In the navigation tree on the left, choose User.
c.
On the User page, click Create. In the Enter Basic Info step, set User name to
Operator_AB and set Password and Confirm password of the user. Then click
Next.
d.
In the Role step, set the role to Administrators and click Next.
e.
To ensure security of the eSight, you need to perform the following operations in
the Access Control Policies step:
f.
n
Set login time for different on-duty persons.
n
Bind the Internet Protocol (IP) addresses allowed for login based on the IP
address of the workstation in each area.
Click Finish.
The user Operator_AB is successfully created.
g.
Perform steps 3.a through 3.f to create users Alarm_Monitor_A and
Alarm_Monitor_B and set their roles as the alarm monitor for city A and the alarm
monitor for city B.
When the preceding configuration is complete, you can provide the accounts to related
personnel.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
494
eSight
Operation Guide
14 Alarm Reference
14
Alarm Reference
About This Chapter
This topic describes detailed alarms for devices managed on eSight.
NOTICE
Alarm information may contain IP address and port information. When processing alarms,
Huawei engineers must obtain official authorization from the customer and obey local laws
and regulations before sending collected information out of the customer's network.
14.1 eSight Alarm Reference
This topic describes alarm information about the eSight, including alarm explanation, alarm
attributes, impact on the system, possible causes, and handling suggestions.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
495
eSight
Operation Guide
14 Alarm Reference
14.1 eSight Alarm Reference
This topic describes alarm information about the eSight, including alarm explanation, alarm
attributes, impact on the system, possible causes, and handling suggestions.
14.1.1 ALM-17434 The report storage usage has exceed 80%
Description
The report storage usage has exceed 80%.
Attribute
Alarm ID
Alarm Severity
Alarm Type
17434
major
equipmentAlarm
Impact on the System
The report task can not be executed.
Possible Causes
l
Reason 1: The setting value of disk Maximum capacity is too small.
l
Reason 2:The long-running of report generate large history record.
Procedure
Step 1 Change the setting of the maximum capacity to a reasonable value.
Step 2 Delete the unnecessary history record files.
----End
14.1.2 ALM-80001 Automatic backup failed
Description
This alarm is generated when the maintenance tool detects a database backup failure. You
must manually clear this alarm after the fault is rectified.
Attribute
Alarm ID
Alarm Severity
Alarm Type
80001
Critical
Communications Alarm
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
496
eSight
Operation Guide
14 Alarm Reference
Parameters
Name
Meaning
Server address
Internet Protocol (IP) address of the active server of the product.
Product name
The product of the source data. It is eSight.
Impact on the System
The automatic backup fails and no backup data is generated for recovery.
Possible Causes
l
The connection between the eSight and the database is abnormal.
l
The network of the server where the backup path is located is abnormal.
l
The backup data volume is huge (more than 1 TB), causing backup timeout.
Procedure
Step 1 In the current alarm list, check the location information of the alarm for the product on which
the backup fails.
1.
In the alarm list of the Current Alarm page, click the alarm name to open the Alarm
Details dialog box.
2.
In Location Info of the Alarm Detail dialog box, view and record the values of Product
name, and Server address.
Step 2 Contact the administrator to check whether the connection between the database and the
product queried in Step 1 is normal.
l
If yes, go to Step 3.
l
If no, contact the database administrator to resolve the database connection problem, and
go to Step 8.
Step 3 Check whether the database backup path is on the local server.
1.
On the maintenance tool, choose Backup and Restoration > Backup Policy Setting
from the main menu.
2.
In Backup Path of the Backup Policy Setting page, check whether the database backup
path is on the local server.
l
If yes, go to Step 5.
l
If no, record the IP address of the remote server where the backup path is located, and go
to Step 4.
Step 4 Check whether the connection of the remote server where the backup path is located is
normal.
1.
On the maintenance tool, choose System > Server Management from the main menu.
2.
On the Server Management page, check whether Connection Status of the remote
server is Online.
l
If yes, go to Step 5.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
497
eSight
Operation Guide
14 Alarm Reference
l
If no, contact the device maintenance engineer to resolve the network connection
problem, and go to Step 8.
Step 5 Check whether the backup data volume is huge (more than 1 TB) and causes backup timeout.
1.
On the maintenance tool, choose System > Database Information from the main menu.
2.
On the Database Information page, check whether the data size of all databases of
Product name queried in Step 1 exceeds 1 TB (1024 GB).
Data size of a database = total data space of the database - available data space of the
database
l
If yes, go to Step 6.
l
If no, go to Step 7.
Step 6 Dump the database data to ensure that the source data is within 1 TB, and go to Step 8. For
details on how to dump the database data, see 13.7 Setting eSight Data Overflow Dump.
Step 7 Collect the information about alarm handling, and contact the technical support personnel.
Step 8 Back up the data immediately. For details, see Related Information.
----End
Clearing
Manually clear the alarm on the eSight. For details about how to manually clear an alarm, see
8.3 Monitoring Network Faults Through Alarms.
Related Information
The procedure for immediately backing up the data is as follows:
1.
Choose Backup and Restoration > Backup Policy Setting from the main menu.
2.
Set the backup path and number of backup files.
Task
Procedure
Backing up to the local
server
1. Select Back up to local server.
2. In the Backup path of the local server list, click
in the Operation column and set the path for
storing backup files in the Modify Backup
Directory dialog box.
3. Set Number of backup files.
4. Click Apply.
5. In the Confirm dialog box, click Yes.
On the Backup policy setting page, if Setting
backup policy succeeded is displayed in the lower
part, the backup policy is set successfully.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
498
eSight
Operation Guide
14 Alarm Reference
Task
Procedure
Backing up to a remote
server
1. Select Back up to the remote server.
2. Set Server IP address, Connection protocol and
port number, User name, Password, and Backup
path of the remote server.
NOTE
l Connection protocol and port number: You can
select FTP or SFTP for the connection protocol.
SFTP is recommended to ensure transmission security.
The default File Transfer Protocol (FTP) port number
is 21, and the default Secure File Transfer Protocol
(SFTP) protocol number is 22. SFTP is recommended
to ensure transmission security.
l User name: user name mapping to the connection
protocol.
l Backup path of the remote server: path related to the
FTP shared directory.
On Windows, the default FTP shared directory
provided by the eSight is C:/openssh. On Linux, the
default FTP shared directory provided by the eSight
is /ossuser. For example, for the Linux operating
system, the input value is related to /ossuser (FTP
shared directory). If you enter AAA, files are stored
in /ossuser/AAA.
3. Set Number of backup files.
4. Optional: Click Verify Validity.
The parameters are successfully set if Verification
succeeded is displayed. If any parameters fail to be
set, set the parameters again.
5. Click Apply.
6. In the Confirm dialog box, click Yes.
The backup policy is successfully set if Setting
backup policy succeeded is displayed.
3.
Choose Backup and Restoration > Instant Backup from the main menu.
4.
Click Immediate Backup.
5.
In the Confirm dialog box, click Yes.
6.
The backup is complete if Succeeded is displayed in the Backup Result column.
–
Backup is successful.
You can view the backup data in the specified backup path. You are not advised to
modify backup file names. Otherwise, manual restoration is affected.
–
Backup fails.
Click
in the Operation column and view the operation details in the dialog box
that is displayed. You can following the steps to back up data again if necessary.
7.
Click Complete.
8.
Check whether automatic backup is enabled for the current backup policy and whether
the backup policy applies to the current plan.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
499
eSight
Operation Guide
14 Alarm Reference
14.1.3 ALM-80002 Veritas Resource Fault
Description
The eSight queries the Veritas resource status every 5 minutes. This alarm is generated when
the eSight detects that the resources monitored by the Veritas are abnormal. This alarm is
automatically cleared when the eSight detects that the resources monitored by the Veritas are
normal.
Attribute
Alarm ID
Alarm Severity
Alarm Type
80002
Major
Environmental alarm
Name
Meaning
System Name
Name of the node in a VCS cluster that generates an alarm.
Resource Name
Name of the resource that generates an alarm.
Parameters
Impact on the System
If a floating IP address is abnormal, you cannot use the floating IP address, but the fixed IP
address to access the eSight client. Only the local HA system in the same network segment
has a floating IP address. The HA system will switch over due to a fault if the resources
except the floating IP address are abnormal.
Possible Causes
This alarm is generated when the database process, database listening process, or eSight agent
process is abnormal.
Procedure
Step 1 View the location information about the alarm and confirm the information about the server
and the name of the resource that generate the alarm.
1.
In the alarm list of the Current Alarm page, click the alarm name to open the Alarm
Details dialog box.
2.
In the Alarm Detail dialog box, view the Location Info.
Step 2 Contact Huawei technical support engineers to diagnose the fault.
Step 3 After fault is rectified, log in the VCS client, right-click the resource name in the Fault state
and choose Clear Fault from the shortcut menu to clear the fault.
Step 4 Manually restore the active/standby relationship of the primary and secondary servers.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
500
eSight
Operation Guide
14 Alarm Reference
l
If an active/standby switchover is not triggered, right-click the resource whose fault is
cleared on the primary server and choose Online from the shortcut menu.
l
If an active/standby switchover has been triggered, you are advised to manually perform
a switchover to restore the normal relationship between the primary and secondary
servers.
Step 5 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 6.
Step 6 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
14.1.4 ALM-80003 Exceeded the Threshold of the Veritas
Replication Buffer (Major)
Description
The eSight queries the status of the Veritas replication buffer every 5 minutes. This alarm is
generated when the eSight detects that the data in the Veritas replication buffer reaches 210
MB. This alarm is automatically cleared when the eSight detects that the data in the Veritas
replication buffer is less than 90 MB.
Attribute
Alarm ID
Alarm Severity
Alarm Type
80003
Major
Environmental alarm
Parameters
Name
Meaning
Threshold
Alarm threshold standard (210).
Impact on the System
The service data cannot be synchronized from the primary server to the secondary server so
the service data is inconsistent between the primary and secondary servers. When the primary
server is faulty, a switchover fails and the eSight will be unavailable.
Possible Causes
l
Issue 01 (2016-04-30)
The NMS applications perform a large number of read and write operations on the
database in a short time. As a result, the application I/O bursts and lasts a long time.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
501
eSight
Operation Guide
14 Alarm Reference
l
The data communication network (DCN) is unstable with problems such as high packet
loss rate and long delay.
l
The data replication bandwidth is insufficient.
Procedure
Step 1 Contact related personnel to analyze the possible causes one by one.
l
Contact the NMS administrator to analyze and check the application I/O and the data
replication buffer.
l
Contact the device maintenance personnel to check the network bandwidth usage and
network quality.
Step 2 Contact related personnel to solve the problems based on the analysis results.
l
Contact technical support engineers to solve the faults on the application I/O and data
replication buffer.
l
Contact the device maintenance personnel to solve the network bandwidth and network
quality issues.
Step 3 After the faults are rectified, Wait five minutes. In the current alarm list, check whether the
alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 4.
Step 4 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
14.1.5 ALM-80004 Veritas in the Healing State
Description
The eSight queries the Veritas cluster status every 5 minutes. This alarm is generated when
the eSight detects that the Veritas cluster is in the healing state. This alarm is automatically
cleared when the eSight detects that the Veritas cluster is not in the healing state.
Attribute
Alarm ID
Alarm Severity
Alarm Type
80004
Major
Environmental alarm
Parameters
None.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
502
eSight
Operation Guide
14 Alarm Reference
Impact on the System
When the primary server is faulty, the secondary server does not automatically take over the
services and the eSight services are unavailable.
Possible Causes
l
The data communication network (DCN) between the primary and secondary servers is
unstable or the network is interrupted. As a result, the heartbeat and replication between
the primary and secondary servers last for more than 10 minutes. The secondary server
automatically takes over the services and the two servers work in the dual-active state.
After the DCN recovers, the HA system works in the healing state.
l
The primary server does not respond after more than 10 minutes. As a result, the
secondary server forcibly takes over the services of the primary server. This alarm is
generated after the primary server recovers.
Procedure
Step 1 Force either server as the active server.
1.
Stop the database service and the eSight processes.
2.
Log in to the maintenance tool client.
3.
Choose HA Management > HA Deployment from the main menu.
4.
Choose Force primary, and click Apply.
NOTE
The server with the latest service data functions as the primary server.
5.
Click Yes in the confirmation dialog box that is displayed to forcibly make the server
become the primary server.
If a success message is displayed, the current server becomes the primary server.
6.
Click Close.
Step 2 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 3.
Step 3 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
14.1.6 ALM-80005 Veritas Heartbeat Interruption
Description
The eSight queries the Veritas heartbeat status every 5 minutes. This alarm is generated when
the eSight detects that the Veritas heartbeat is interrupted. This alarm is automatically cleared
when the eSight detects that the Veritas heartbeat status is normal.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
503
eSight
Operation Guide
14 Alarm Reference
Attribute
Alarm ID
Alarm Severity
Alarm Type
80005
Major
Environmental alarm
Parameters
Name
Meaning
Local IP address
Heartbeat IP address of the primary server.
Remote IP address
Heartbeat IP address of the secondary server.
Impact on the System
When the heartbeat connection is interrupted for more than 10 minutes, the secondary server
forcibly takes over the services and the HA system works in the active/active state.
Possible Causes
l
The heartbeat network adapters of the primary and secondary servers are faulty.
l
The heartbeat data communication network (DCN) of the primary and secondary servers
is interrupted.
l
The heartbeat IP addresses of the primary and secondary servers are unreachable.
Procedure
Step 1 Run the following command on the primary and secondary servers to check whether their
heartbeat IP addresses exist:
#ifconfig -a
If the displayed information contains an IP address, the heartbeat IP exists. Otherwise,
reconfigure the heartbeat IP address. For details, see chapter Preconfiguring the OS in the
eSight High Availability System Software Installation Guide.
Step 2 Check whether the status of the network adapters assigned the heartbeat IP addresses of the
primary and secondary servers contains UP and RUNNING, but not DUPLICATED.
l
If yes, go to Step 4.
l
If no, go to Step 3.
Step 3 Set the status of the network adapter assigned the heartbeat IP address.
l
If the displayed information does not contain UP, run the ifconfig network adapter name
up command to make the network adapter in the UP state.
l
If the displayed information does not contain RUNNING, ensure that the network
adapter is properly connected.
l
If DUPLICATED is displayed, the IP address may have been used. Reconfigure an IP
address.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
504
eSight
Operation Guide
14 Alarm Reference
Step 4 Run the following command on the primary and secondary servers to check the heartbeat IP
address:
#ifconfig -a
Step 5 Run the following command on the primary and secondary servers to check whether their
heartbeat IP addresses are reachable:
#pingpeer heartbeat IP address
If the ping is successful, the heartbeat IP addresses between the primary and secondary
servers are reachable.
Step 6 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 7.
Step 7 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
14.1.7 ALM-80006 Veritas Replication Interruption
Description
The eSight queries the data replication status between the primary and secondary servers
every 5 minutes. This alarm is generated when the eSight detects that the data replication
between the primary and secondary servers interrupts. This alarm is automatically cleared
when the eSight detects that the data replication status between the primary and secondary
servers is normal.
Attribute
Alarm ID
Alarm Severity
Alarm Type
80006
Major
Environmental alarm
Parameters
None.
Impact on the System
When the primary server is faulty, the data is inconsistent between the primary and secondary
servers. As a result, the secondary server does not automatically take over the services and the
eSight services are unavailable.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
505
eSight
Operation Guide
14 Alarm Reference
Possible Causes
l
The replication network adapters of the primary and secondary servers are faulty.
l
The replication data communication network (DCN) of the primary and secondary
servers is interrupted.
l
The replication IP addresses of the primary and secondary servers are unreachable.
l
The application I/O data volume on the primary server increases dramatically. As a
result, the replication buffer data overflows.
Procedure
Step 1 Run the following command on the primary and secondary servers to check whether their
replication IP addresses exist:
#ifconfig -a
If the displayed information contains an IP address, the replication IP exists. Otherwise,
reconfigure the replication IP address. For details, see chapter Preconfiguring the OS in the
eSight High Availability System Software Installation Guide.
Step 2 Check whether the status of the network adapters assigned the replication IP addresses of the
primary and secondary servers contains UP and RUNNING, but not DUPLICATED.
l
If yes, go to Step 4.
l
If no, go to Step 3.
Step 3 Set the status of the network adapter assigned the replication IP address.
l
If the displayed information does not contain UP, run the ifconfig network adapter name
up command to make the network adapter in the UP state.
l
If the displayed information does not contain RUNNING, ensure that the network
adapter is properly connected.
l
If DUPLICATED is displayed, the IP address may have been used. Reconfigure an IP
address.
Step 4 Run the following command on the primary and secondary servers to check the replication IP
addresses:
#ifconfig -a
Step 5 Run the following command on the primary and secondary servers to check whether their
replication IP addresses are reachable:
#pingpeer replication IP address
If the ping is successful, the replication IP addresses between the primary and secondary
servers are reachable.
Step 6 On the primary server, run the following command to check whether the replication buffer
data overflows:
#vradmin -g datadg repstatus datarvg | grep "Logging to"
If the displayed information contains DCM, the replication buffer data overflows.
l
If yes, go to Step 7.
l
If no, the alarm handling process is complete.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
506
eSight
Operation Guide
14 Alarm Reference
Step 7 Run the following command to restore the replication:
#vradmin -g datadg resync datarvg
Step 8 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 9.
Step 9 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
14.1.8 ALM-80007 Frozen Veritas Resource Groups
Description
The eSight queries the status of the Veritas resource groups every 5 minutes. This alarm is
generated when the eSight detects that the Veritas resource groups are frozen. This alarm is
automatically cleared when the eSight detects that the the Veritas resource groups are
unfrozen.
Attribute
Alarm ID
Alarm Severity
Alarm Type
80007
Major
Environmental alarm
Parameters
Name
Meaning
System name
Name of the node in a VCS cluster that generates an alarm.
Resource group name
Name of the resource group that generates an alarm.
Impact on the System
When the primary server is faulty, the secondary server does not automatically take over the
services and the eSight services are unavailable.
Possible Causes
l
The HA system automatically freezes when users perform operations on the primary and
secondary servers using the maintenance tool client.
l
When maintaining the HA system, the administrator sets the resource groups to the
frozen state and does not unfreeze them.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
507
eSight
Operation Guide
14 Alarm Reference
Procedure
Step 1 On the maintenance tool client, perform operations on the primary and secondary servers for
the HA system to automatically freeze so that an alarm is generated.
1.
On the Current Alarm page of the eSight client, check the last generation time of the
alarm.
2.
Log in to the maintenance tool client.
3.
On the maintenance tool client, choose System > Operation Log from the main menu.
4.
On the Operation Log page, check whether the Join, Split, or Force primary
operations are performed on the primary and secondary servers before and after alarm
occurrence.
l
If yes, go to Step 6 after the HA system completes its processing.
l
If no, go to Step 2.
Step 2 View the location information about the alarm and confirm the information about the server
and the name of the resource group that generate the alarm.
1.
In the alarm list of the Current Alarm page, click the alarm name to open the Alarm
Details dialog box.
2.
In the Alarm Detail dialog box, view the Location Info.
Step 3 Log in to the server on which resource groups are frozen as the root user.
Step 4 Run the following command to check the frozen method of the resource groups:
#hagrp -display service_group_name| grep Frozen
If the value of Frozen is set to 1, the resource groups are frozen permanently. If the value of
TFrozen is set to 1, the resource groups are frozen temporarily. If the values of Frozen and
TFrozen are set to 0, the resource groups are not frozen.
Step 5 Run the following command to unfreeze the resource groups:
l
Frozen temporarily:
#hagrp -unfreeze service_group_name
l
Frozen permanently:
#hagrp -unfreeze service_group_name-persistent
Step 6 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 7.
Step 7 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
508
eSight
Operation Guide
14 Alarm Reference
14.1.9 ALM-80008 Temporary Veritas Licenses
Description
The eSight queries the license status every 5 minutes. This alarm is generated when the eSight
detects that the Veritas license is a temporary one. This alarm is automatically generated when
the eSight detects that the Veritas license is an official one.
Attribute
Alarm ID
Alarm Severity
Alarm Type
80008
Major
Environmental alarm
Name
Meaning
System Name
Name of the system of the node that generates an alarm.
Parameters
Impact on the System
When the temporary license expires, the HA system is unavailable.
Possible Causes
The Veritas license is a temporary one.
Procedure
Step 1 Change the temporary Veritas license to an official one. For details, see chapter Updating a
Veritas License in the eSight High Availability System Software Installation Guide.
Step 2 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 3.
Step 3 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
509
eSight
Operation Guide
14 Alarm Reference
14.1.10 ALM-80009 Faulty Veritas Software Process
Description
The eSight queries the Veritas process status every 5 minutes. This alarm is generated when
the eSight detects that the Veritas software processes stop. This alarm is automatically
generated when the eSight detects that the Veritas software processes start.
NOTE
The Veritas software processes include the had, hashadow, vxconfigd, and vradmind processes.
Attribute
Alarm ID
Alarm Severity
Alarm Type
80009
Major
Environmental alarm
Name
Meaning
System Name
Name of the node in a VCS cluster that generates an alarm.
Process Name
Name of the abnormal process that generates an alarm.
Parameters
Impact on the System
The VCS client is abnormal and cannot manage the HA system. When the primary server is
faulty, the secondary server cannot take over the services and the eSight services are
unavailable. The following table lists the impact on the system.
Process
Impact on the System
/opt/VRTSvcs/bin/had
The Veritas cluster management function is
invalid.
/opt/VRTSvcs/bin/hashadow
The Veritas cannot restart the had process.
/sbin/vxconfigd
Users cannot configure or maintain the
disks or disk groups in the HA system.
/usr/sbin/vradmind
The volume management commands of the
Veritas cannot be issued.
Possible Causes
The Veritas software processes do not start or end.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
510
eSight
Operation Guide
14 Alarm Reference
Procedure
Step 1 View the location information about the alarm and confirm the information about the server
and the name of the process that generate the alarm.
1.
In the alarm list of the Current Alarm page, click the alarm name to open the Alarm
Details dialog box.
2.
In the Alarm Detail dialog box, view the Location Info.
Step 2 Log in to the server where the alarm is generated as the root user.
Step 3 Run the related command to start the faulty process.
Process
Command
/opt/VRTSvcs/bin/had
#/opt/VRTSvcs/bin/had -onenode
/opt/VRTSvcs/bin/hashadow
#/opt/VRTSvcs/bin/hashadow
/sbin/vxconfigd
#/etc/init.d/vxvm-sysboot
/usr/sbin/vradmind
#/etc/rc2.d/S96vradmind start
Step 4 Check whether the process starts successfully.
l
If yes, go to Step 5.
l
If no, go to Step 6.
Step 5 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 6.
Step 6 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
14.1.11 ALM-80010 Exceeded the Threshold of the Veritas
Replication Buffer (Critical)
Description
The eSight queries the data volume of the Veritas replication buffer every 5 minutes. This
alarm is generated when the eSight detects that the data in the Veritas replication buffer
reaches 450 MB. This alarm is automatically cleared when the eSight detects that the data in
the Veritas replication buffer is less than 210 MB.
NOTE
After this alarm is generated, the alarm 14.1.4 ALM-80003 Exceeded the Threshold of the Veritas
Replication Buffer (Major) coexists. After this alarm is cleared, the alarm 14.1.4 ALM-80003
Exceeded the Threshold of the Veritas Replication Buffer (Major) is automatically cleared after the
data in the Veritas replication buffer is less than 90 MB.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
511
eSight
Operation Guide
14 Alarm Reference
Attribute
Alarm ID
Alarm Severity
Alarm Type
80010
Critical
Environmental alarm
Parameters
Name
Meaning
Threshold
Alarm threshold standard (450).
Impact on the System
When the primary server is faulty, the secondary server does not automatically take over the
services and the eSight services are unavailable.
Possible Causes
l
The NMS applications perform a large number of read and write operations on the
database in a short time. As a result, the application I/O bursts and lasts a long time.
l
The data communication network (DCN) is unstable with problems such as high packet
loss rate and long delay.
l
The data replication bandwidth is insufficient.
Procedure
Step 1 Contact related personnel to analyze the possible causes one by one.
l
Contact the NMS administrator to analyze and check the application I/O and the data
replication buffer.
l
Contact the device maintenance personnel to check the network bandwidth usage and
network quality.
Step 2 Contact related personnel to solve the problems based on the analysis results.
l
Contact technical support engineers to solve the faults on the application I/O and data
replication buffer.
l
Contact the device maintenance personnel to solve the network bandwidth and network
quality issues.
Step 3 After the faults are rectified, Wait five minutes. In the current alarm list, check whether the
alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 4.
Step 4 Collect the information about alarm handling, and contact the technical support personnel.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
512
eSight
Operation Guide
14 Alarm Reference
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
14.1.12 ALM-19660817 Registration failure of the trap IP address
with the device
Description
Failed to register a trap IP address with device ([dev-name]). The target host is ([dev-name])
and the target port is ([dev-port]).
Attribute
ID
Event Level
Automatically Detected
and Automatically
Cleared
19660817
Major
No
Impact on the System
If the trap IP address registration failed, the NMS will not be able to receive alarms and status
change information from the device. This will result in the resource status inconsistency
between the NMS and the device or the loss of alarms.
Possible Causes
l
The port number of the Trap IP address is inconsistent with that of the ISM.
l
The number of trap IP addresses registered on the device reached the upper limit.
l
The write community is incorrect.
Procedure
Step 1 Contact your service provider to clear the alarm.
----End
14.1.13 ALM-80001001 The connection to the log collector is
interrupted
Description
Because the network or the log collector is abnormal, the connection between the eSight
server and log collector [collector-name] is disconnected.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
513
eSight
Operation Guide
14 Alarm Reference
Attribute
Alarm ID
Alarm Severity
Alarm Type
80001001
Major
Operation fault alarm
Parameters
Name
Meaning
collector-name Indicates the name of the collector whose connection to the server is
interrupted.
Impact on the System
If you leave the alarm uncleared, the report data may be lost and the logs may not be queried.
Possible Causes
The log collector is not started.
1.
The log collector is not started.
2.
Network faults exist in the distributed deployment.
3.
When the system is in a distributed deployment, the software firewall on the eSight
server or the log collector is started.
4.
When the system is in a distributed deployment, a hardware firewall is deployed between
the eSight server and the log collector, and the hardware firewall does not open some
necessary ports through the configured ACL rules.
Procedure
Step 1 Check whether the service of the log collector is started. If yes, go to step 3. If no, go to step
2.
Step 2 Start the log collector service manually. If the alarm still persists and the system is in
distributed deployment, go to step 3. If not, go to step 8.
Step 3 Check whether the connection between the eSight server and the log collector is normal. If
yes, go to step 5. If no, go to step 4.
Step 4 Repair the network. If the alarm still persists, go to step 5.
Step 5 Check whether a software firewall is enabled on the log collector or the eSight server,
including the Windows firewall or other third-party software firewalls. If yes, go to step 6. If
no, go to step 7.
Step 6 Close the corresponding software firewall. If you do not want to close the software firewall,
add the related programs and ports of the eSight server and the log collector to the exception
list of the software firewall. If the software firewall is the Windows firewall, see How to Add
the Program of log collectors to the Exception List of the Windows Software Firewall in
Troubleshooting.If the softwarewall is one of the third-party software firewalls, see
corresponding product document. If the alarm still persists, go to step 7.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
514
eSight
Operation Guide
14 Alarm Reference
Step 7 Check whether a hardware firewall is deployed between the eSight server and the log
collector. If yes, check whether the hardware firewall opens ports 10020 and 9999 through the
ACL rules. The two ports are necessary in the communication between the eSight server and
the log collector. If the two ports are not opened, modify the ACL rules. If the alarm still
persists, go to step 8.
Step 8 If the alarm still persists, contact technical support personnel for help.
----End
Clearing
Automatic Clearing.
14.1.14 ALM-505001001 CPU Usage Is High
Description
The maintenance tool continuously samples the central processing unit (CPU) usage of the
server. This alarm is generated when the CPU usage sampled each time in a sampling period
is greater than or equal to the alarm generation threshold (90%). This alarm is automatically
cleared if the CPU usage is less than or equal to the alarm clearance threshold (70%) in a
sampling period.
NOTE
l Sampling period = Sampling times x Sampling interval, the sampling period is 80s (80 = 8x10).
l If a server has multiple CPUs, the maintenance tool continuously samples the usage of each CPU.
l In a distributed system, the maintenance tool continuously samples the CPU usage of each eSight
server.
Attribute
Alarm ID
Alarm Severity
Alarm Type
505001001
Major
QoS
Parameters
Name
Meaning
Server name
Name of the server for which the alarm is generated.
Server IP address
Internet Protocol (IP) address of the server for which the alarm is
generated.
Threshold
Threshold for generating an alarm.
Clearance threshold Threshold for clearing an alarm.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
515
eSight
Operation Guide
14 Alarm Reference
Name
Meaning
Usage
CPU usage of the server.
Impact on the System
l
The eSight responds slowly, and operations time out.
l
The real-time reporting from the northbound module, performance module, and fault
module times out, and the information cannot be collected in time.
l
The system processes services slowly. As a result, messages may be accumulated.
Possible Causes
l
The eSight is busy temporarily.
l
The alarm generation threshold for the CPU usage of the eSight server is set improperly.
l
The eSight server is performing an operation that occupies many system resources or
takes a long time.
l
The hardware performance of the server is low. Therefore, the eSight cannot run
properly.
Procedure
Step 1 Check whether the eSight is busy temporarily.
1.
Choose Monitor > Fault Management > Current Alarms from the main menu.
2.
On the Current Alarms page, view First Occurrence Time of the alarm.
Meanwhile, Check whether one of the following situations exist:
–
The alarm is not consecutively generated, and is automatically cleared in ten
minutes. In addition, the alarm is seldom generated. It is generated once each day at
most.
–
The alarm affects the system running (including the northbound interface
operations, performance statistics collecting, alarm reporting, and user operations)
slightly or for a short time. The performance delay does not exceed a period, the
alarm delay does not exceed 30 seconds, and the graphical user interface (GUI)
response takes less than 10 seconds. In addition, the alarm is automatically cleared
in 30 minutes.
–
When the high CPU usage alarm is generated, a large number of alarms or events
are reported (this is not a mandatory condition).
Check whether one of the preceding conditions is met.
3.
–
If yes, go to Step 1.3.
–
If no, go to Step 3.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 2.
Step 2 Check whether the alarm generation threshold for the CPU usage of the eSight server is set
improperly.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
516
eSight
Operation Guide
14 Alarm Reference
1.
2.
Contact the administrator to check whether the alarm generation threshold for the CPU
usage of the server is set improperly.
–
If yes, contact the administrator for troubleshooting or go to Step 7.
–
If no, go to Step 3.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 3.
Step 3 Check whether the CPU usage of the eSight application programs is greater than 90%.
1.
On the maintenance tool client, choose System > System Monitoring from the main
menu.
2.
In the System Monitoring window, choose Look > Process from the navigation tree.
3.
On the Process tab page, check whether the CPU usage of the eSight process exceeds
90%.
4.
–
If yes, the memory is exhausted due to the eSight application. Wait until the related
service is processed. Then, go to Step 3.4. If the service has not completed within a
long period of time, go to Step 7.
–
If no, go to Step 4.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 4.
Step 4 Check whether the CPU usage of the non-eSight application programs is greater than 90%.
1.
2.
Contact the administrator to check whether the CPU usage of the non-eSight application
programs is greater than 90%.
–
On SUSE Linux, you can run the top command to check the CPU usage of a
process in the CPU column.
–
On Windows, you can click the Process tab in Windows Task Manager, and check
the process CPU usage in the CPU column.
n
If yes, contact the administrator for troubleshooting. After the administrator
processes it, go to Step 4.2. If you cannot wait for the administrator to process
it, go to Step 7.
n
If no, go to Step 5.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 5.
Step 5 Check whether hardware performance of the server is low and the hardware does not support
the running of the eSight.
1.
Contact the administrator to check whether the hardware performance of the server is
low.
If hardware performance of the server is low:
–
Issue 01 (2016-04-30)
The hardware requirements corresponding to the management scope of the
eSightare beyond the actual hardware capability of the server.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
517
eSight
Operation Guide
14 Alarm Reference
–
The alarm is generated consecutively or frequently.
Check whether any of the preceding two symptoms appears.
2.
–
If yes, contact the administrator for troubleshooting. After the administrator
processes it, go to Step 4.2. If you cannot wait for the administrator to process it, go
to Step 7.
–
If no, go to Step 7.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 7.
Step 6 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 7.
Step 7 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
The following situations cause failures in automatically clearing alarms. Instead, they need to
be cleared manually.
l
The name and IP address of the host for which this alarm is generated are changed.
l
The server that generates the alarm is not monitored.
Related Information
None.
14.1.15 ALM-505001003 Disk Usage Is High
Description
If the maintenance tool detects that the usage of a disk or partition is greater than the alarm
generation threshold (80%), the alarm is generated. The detection period is 1 minute. If the
disk or partition usage is less than the alarm clear threshold (75%), the alarm is automatically
cleared.
Attribute
Alarm ID
Alarm Severity
Alarm Type
505001003
Major
Qos
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
518
eSight
Operation Guide
14 Alarm Reference
Parameters
Name
Meaning
Server name
Name of the server for which the alarm is generated.
Server IP address
Internet Protocol (IP) address of the server for which the alarm is
generated.
fileSystem
Name of the server disk for which the alarm is generated.
Threshold
Threshold for generating an alarm.
Clearance threshold Threshold for clearing an alarm.
Usage
Disk space usage.
Impact on the System
The write operation of the eSight service may fail, and a database exception occurs.
Possible Causes
l
The alarm generation threshold for the disk usage of the eSight server is set improperly.
l
The disk contains too many unnecessary files.
–
The recycle bin is not cleared.
–
The eSight server has received a large amount of data, including NE alarms, events,
and logs. The data is exported from the database to disk files in a short time.
–
There are too many temporary data files and backup files.
Procedure
Step 1 Check whether the alarm generation threshold for the disk usage of the eSight server is set
improperly.
1.
2.
Contact the administrator to check whether the alarm generation threshold for the disk
usage of the server is set improperly.
–
If yes, contact the administrator for troubleshooting. After the administrator
processes it, go to Step 1.2. If you cannot wait for the administrator to process it, go
to Step 5.
–
If no, go to Step 2.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 2.
Step 2 Log in to the eSight server on Xwindows, and check whether the recycle bin is empty.
l
Issue 01 (2016-04-30)
If yes, go to Step 4.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
519
eSight
Operation Guide
14 Alarm Reference
l
If no, empty the recycle bin. Then, go to Step 3.
Step 3 Check whether there are too many unnecessary files in the disk.
1.
Run the following command to view the file system usage.
# df -h
Filesystem
/dev/sda2
devtmpfs
tmpfs
/dev/sda5
/dev/sda6
/dev/sda10
/dev/sda7
/dev/sda8
/dev/sda9
shm
Size
13G
12G
24G
1.1G
8.1G
214G
5.1G
11G
5.1G
24G
Used Avail Use% Mounted on
3.3G 8.8G 28% /
200K
12G
1% /dev
7.1G
17G 30% /dev/shm
74M 955M
8% /boot
133M 7.9G
2% /home
50G 164G 24% /opt
179M 4.9G
4% /tmp
2.7G 7.4G 27% /usr
824M 4.2G 17% /var
7.1G
17G 30% /dev/shm
The Use% column indicates the usage of all file systems. View this column and check
for the file systems that their usages exceed the preset threshold.
2.
Access the over-used file system, check the size of all files and directories in it, and sort
them.
# cd filepatch
# du -sk * | sort -n
3.
Find the directory that occupies too much disk space based on the check result.
4.
Access the directory that occupies too much disk space, check the size of all files and
directories in it, and sort them.
# cd filepatch
# du -sk * | sort -n
5.
Find the directory or file that causes the high file system usage based on the check result.
6.
Repeat Step 3.4 and Step 3.5 to search for the files that cause the high file system usage
and check whether these files can be deleted. You are advised to preferentially delete the
installation packages, patch packages, installation packages of the adaptation layer that
are backed up before, backup files during installation, and core files. Table 14-1 lists the
files of the eSight and database that can be deleted. After you delete the files, go to Step
4.
NOTE
If you are not sure whether the file can be deleted, contact the system administrator or Huawei
technical support personnel.
Table 14-1 Files of the eSight and database that can be deleted on SUSE Linux
Issue 01 (2016-04-30)
Directory
Unnecessary File
Cleanup
eSight installation directory/
AppBase/var/iemp/log
eSight log files
Back up the files to another
computer, and run the rm
command to delete all core
files.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
520
eSight
Operation Guide
14 Alarm Reference
Directory
Unnecessary File
Cleanup
eSight installation directory/
mttools/var/iemp/log
Maintenance tool
log files
Back up the files to another
computer, and run the rm
command to delete all core
files.
Step 4 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 5.
Step 5 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
The following situations cause failures in automatically clearing alarms. Instead, they need to
be cleared manually.
l
The name and IP address of the host for which this alarm is generated are changed.
l
The mounting point for the disk for which this alarm is generated is changed.
l
The server that generates the alarm is not monitored.
Related Information
None.
14.1.16 ALM-505001101 Database Usage Is High
Description
If the maintenance tool detects that the database tablespace usage is greater than the alarm
generation threshold (95%), the alarm is generated. The detection period is 5 minutes. If the
database tablespace usage is less than the alarm clear threshold (85%), the alarm is
automatically cleared.
Attribute
Alarm ID
Alarm Severity
Alarm Type
505001101
Major
QoS
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
521
eSight
Operation Guide
14 Alarm Reference
Parameters
Name
Meaning
Server name
Name of the server for which the alarm is generated.
Server IP address
Internet Protocol (IP) address of the server for which the alarm is
generated.
TablespaceName
Name of the database tablespace for which the alarm is generated.
Threshold
Threshold for generating an alarm.
Clearance threshold Threshold for clearing an alarm.
Usage
Database tablespace usage.
Impact on the System
The operations associated with the eSight database tablespace may fail, for example, alarm
information may fail to be saved to the database. This alarm may cause exceptions or eSight
failures if it is not cleared in a timely manner.
Possible Causes
l
The alarm generation threshold for the database tablespace usage of the eSight server is
set improperly.
l
The eSight receives a large number of alarms or events within a short period of time.
l
The eSight records a large number of logs within a short period of time.
l
The database tablespace is not released in a timely manner after the data in the Oracle
database is exported or dumped.
Procedure
Step 1 Check whether the alarm generation threshold for the database tablespace usage of the eSight
server is set improperly.
1.
2.
Contact the administrator to check whether the alarm generation threshold for the
database tablespace usage of the server is set improperly.
–
If yes, ask the administrator to handle it. After the administrator processes it, go to
Step 1.2. If you cannot wait for the administrator to process it, go to Step 5.
–
If no, go to Step 2.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 2.
Step 2 Check whether a large number of alarms or events are reported within a short period of time.
1.
Issue 01 (2016-04-30)
Check whether TablespaceName in the alarm information is the alarm database fmdb.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
522
eSight
Operation Guide
14 Alarm Reference
2.
3.
4.
–
If yes, go to Step 2.2.
–
If no, go to Step 3.
Check whether a large number of alarms are reported within a short period of time.
a.
Choose Monitor > Fault Management > Current Alarms from the main menu.
b.
On Current Alarms page, check whether a large number of events (more than 300
events per second) are reported within a short period of time.
–
If yes, go to Step 2.3.
–
If no, go to Step 3.
Handle these alarms.
–
Set alarm masking rules to mask these alarms.
–
Choose System > System Settings > Set Database Overflow Dump from the main
menu.
–
In the navigation tree in the left pane, choose Alarm Database Dump. On the
Alarm Database Dump page, perform scheduled tasks for alarm overflow dump,
and find the cause for device alarm generation.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 3.
Step 3 Check whether a large number of logs are reported within a short period of time.
1.
2.
3.
4.
Check whether TablespaceName in the alarm information is the alarm database omssm.
–
If yes, go to Step 3.2.
–
If no, go to Step 4.
Generally, only a large number of system logs are reported within a short period of time.
check whether a large number of system logs are reported.
a.
Choose System > Administration > Log Management from the main menu.
b.
In the navigation tree in the left pane, choose System Logs. On the System Logs
page, check whether a large number of system logs are reported (more than 300
logs are reported per second.)
–
If yes, go to Step 3.3.
–
If no, go to Step 4.
Handle these logs.
a.
Choose System > System Settings > Set Database Overflow Dump from the main
menu.
b.
In the navigation tree in the left pane, choose Log Database Dump. On the Log
Database Dump page, perform scheduled tasks for system log dump, and find the
cause for system log generation.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 4.
Step 4 Check whether it is the Oracle database that does not release the database tablespace after data
is exported or dumped from the database.
1.
Issue 01 (2016-04-30)
Check whether it is the Oracle database based on the TablespaceName field in the alarm
location information.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
523
eSight
Operation Guide
14 Alarm Reference
–
If yes, connect to the database as the administrator and run the following command
to release the database tablespace:
# alter table <table_name> enable row movement
# alter table <table_name> shrink space
NOTE
In the command, replace <table_name> with the actual database tablespace name.
After the database tablespace is released, go to Step 4.2.
–
2.
If no, go to Step 5.
Wait five minutes. In the current alarm list, check whether the alarm is cleared.
–
If yes, the alarm handling process is complete.
–
If no, go to Step 5.
Step 5 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
The following situations cause failures in automatically clearing alarms. Instead, they need to
be cleared manually.
l
The name and IP address of the host for which this alarm is generated are changed.
l
The server that generates the alarm is not monitored.
Related Information
None.
14.1.17 ALM-505001102 NMS Processes Exit Unexpectedly
Description
This alarm is generated when the maintenance tool detects that the the NMS processes exit
unexpectedly in the detection period (period: 10s) and when the attempts to restart the NMS
process reach a preset value (10 times). This alarm is automatically cleared when the
maintenance tool detects that the NMS processes restore and start or the processes are
switched from the abnormal slave server to the secondary server.
Attribute
Alarm ID
Alarm Severity
Alarm Type
505001102
Major
Processing error alarm
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
524
eSight
Operation Guide
14 Alarm Reference
Parameters
Name
Meaning
Server IP Address
Indicates the IP address of the server that generates an alarm.
Process Name
Indicates the name of the process that generates an alarm.
Impact on the System
After the NMS processes exit, related service functions are unavailable and services that
depend on the functions are unavailable.
Possible Causes
l
The issue is caused by manual operations. For example, a process is ended manually.
l
The system resources are insufficient.
Procedure
Step 1 Log in to the maintenance tool.
Step 2 In alarm details, check whether the service is running properly.
1.
Choose System > System Monitoring from the main menu.
2.
In the navigation pane of the System Monitoring window, choose View > Process.
On the Process tab page, check whether the process related to the alarm is running
properly.
l
If yes, go to Step 4.
l
If no, go to Step 3.
Step 3 Start the NMS service that exits unexpectedly.
l
If the service starts successfully, go to Step 4.
l
If the service fails to start, go to Step 5.
Step 4 Log in to the eSight client. On the Current Alarms page, check whether the alarm indicating
that NMS processes exit unexpectedly is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 5.
Step 5 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
Related Information
None.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
525
eSight
Operation Guide
14 Alarm Reference
14.1.18 ALM-505001105 Dump failed
Description
This alarm is generated when alarm, log, or performance data overflow dump fails. This alarm
is automatically cleared if the next dump is successful.
Attribute
Alarm ID
Alarm Severity
Alarm Type
505001105
Major
Processing error alarm
Parameters
None.
Impact on the System
The dump failure may lead to insufficient database spaces, which will affect eSight functions.
Possible Causes
l
The database is abnormal.
l
The database is busy, which leads to a database operation failure.
l
When the database and iEMP are deployed separately, the database is busy, which leads
to a database operation failure.
Procedure
Step 1 Determine whether the database and eSight are deployed separately.
l
If yes, go to Step 2.
l
If no, go to Step 3.
Step 2 Check whether the network connection is normal.
l
If yes, go to Step 3.
l
If no, contact the maintenance personnel to check the hardware. For example, check that
network cables are securely connected and that the switch is working properly. After the
network recovers, set a scheduled dump task and check whether the dump is successful.
If the dump fails, go to Step 3.
Step 3 Contact the maintenance personnel to check whether the NE server is started.
l
If yes, go to Step 4.
l
If no, contact the maintenance personnel to recover the database. After the database
recovers, set a scheduled dump task and check whether the dump is successful. If the
dump fails, go to Step 4.
Step 4 Collect the information about alarm handling, and contact the technical support personnel.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
526
eSight
Operation Guide
14 Alarm Reference
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
Related Information
None.
14.1.19 ALM-505001106 Login Attempts Reach the Maximum
Value
Description
This event is generated when accounts are locked because the login attempts reach the
maximum value.
Attribute
Alarm ID
Alarm Severity
Alarm Type
505001106
NA
Security service or mechanism violation
Parameters
None.
Impact on the System
Users cannot log in to the eSight during the lockout period.
Possible Causes
This event is reported to remind users when they forgot login passwords or unauthorized users
attempt to crack passwords.
Procedure
l
This event does not require handling.
----End
Clearing
None.
Related Information
None.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
527
eSight
Operation Guide
14 Alarm Reference
14.1.20 ALM-999999992 The license will expire
Description
This alarm is generated when the system detects that the number of remaining days of the
license file in the intelligent enterprise management platform (eSight) is less than the advance
warning days (15 days) before the license expires. This alarm is automatically cleared when
the system detects that the number of days remaining until the license file expires is greater
than the configured days.
Attribute
Alarm ID
Alarm Severity
Alarm Type
999999992
Major
Security service or mechanism violation
Parameters
None.
Impact on the System
If the alarm is handled in a timely manner, the license will expire.
Possible Causes
The number of remaining days of the license file is less than the advance warning days (15
days) before the license expires.
Procedure
Step 1 Check whether the number of remaining days of the license file is less than the advance
warning days (15 days) before the license expires.
1.
Choose System > Administration > License Management from the main menu.
2.
In the Basic License Information area in the License Management page, view the
value of Validity period and check whether the number of remaining days of the license
file is less than the advance warning days (15 days) before the license expires.
l
If yes, go to Step 2.
l
If no, go to Step 4.
Step 2 Apply to the administrator for a license file.
1.
Obtain an equipment serial number (ESN).
In the License Management page, click Obtain ESN. In the displayed page, select a
network adapter or enter the message authentication code (MAC) address of a server,
and click Generate ESN to obtain an ESN.
2.
Apply to the administrator for a license file.
Step 3 Import the license file that is applied for to the eSight.
1.
Issue 01 (2016-04-30)
In the License Management page, click Import License.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
528
eSight
Operation Guide
14 Alarm Reference
2.
On the Import License page, click
next to License file.
3.
In the displayed dialog box, select the new license file, and click Open.
4.
Click Import to import the license file to the eSight.
5.
Click Apply. The license file is immediately applied.
Step 4 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 5.
Step 5 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
Related Information
None.
14.1.21 ALM-999999993 The license has expired
Description
This alarm is generated when the system detects that the license file has reached or exceeded
its expiration date; this alarm is automatically cleared when the system detects that the license
file is within its validity period.
NOTE
The 14.1.20 ALM-999999992 The license will expire is always generated earlier than this alarm. After
this alarm is generated, the Clearance of the 14.1.20 ALM-999999992 The license will expire is
changed to Cleared.
Attribute
Alarm ID
Alarm Severity
Alarm Type
999999993
Critical
Security service or mechanism violation
Parameters
None.
Impact on the System
Online users cannot use the eSight. Users can log in to the eSight only when they update the
license files.
Possible Causes
The license file has reached or exceeded its expiration date.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
529
eSight
Operation Guide
14 Alarm Reference
Procedure
Step 1 Check whether the current user logs in to the eSight client.
l
If the user logs in to the eSight client, go to Step 2.
l
If the user does not log in to the eSight client, go to Step 5.
Step 2 Check whether the current license file has reached or exceeded its expiration date.
1.
Choose System > Administration > License Management from the main menu.
2.
In the Basic License Information area in the License Management page, view the
value of Validity period and check whether the license file has reached or exceeded its
expiration date:
l
If yes, go to Step 3.
l
If no, go to Step 9.
Step 3 Apply to the administrator for a license file.
1.
Obtain an equipment serial number (ESN).
In the License Management page, click Obtain ESN. In the displayed page, select a
network adapter or enter the message authentication code (MAC) address of a server,
and click Generate ESN to obtain an ESN.
2.
Apply to the administrator for a license file.
Step 4 Import the license file that is applied for to the eSight.
1.
In the License Management page, click Import License.
2.
On the Import License page, click
3.
In the displayed dialog box, select the new license file, and click Open.
4.
Click Import to import the license file to the eSight.
5.
Click Apply. The license file is immediately applied.
next to License file.
Step 5 Enter the uniform resource locator (URL) of the eSight in the address bar of your web
browser and check whether the login is successful:
l
If yes, go to Step 9.
l
If no, go to Step 6.
Step 6 Click Here to open the Obtain ESN page as prompted. In the displayed page, select a
network adapter or enter the MAC address of a server, and click Generate ESN to obtain an
ESN.
Step 7 Apply to the administrator for a license file. Import the license file that is applied for to the
eSight as prompted in Step 6.
Step 8 Log in to the eSight again.
Step 9 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 10.
Step 10 Collect the information about alarm handling, and contact the technical support personnel.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
530
eSight
Operation Guide
14 Alarm Reference
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
Related Information
None.
14.1.22 ALM-999999994 The license resource overs the threshold
Description
This alarm is generated when the system detects that the license usage has reached or
exceeded the threshold; this alarm is automatically cleared when the system detects that the
license usage is below the threshold.
NOTE
For the thresholds for generating alarms related to license resources, see the license control information.
For details, see Step 2.
Attribute
Alarm ID
Alarm Severity
Alarm Type
999999994
Major
Security service or mechanism violation
Parameters
None.
Impact on the System
After the alarm is generated and if it is not handled in a timely manner, you cannot access
license resources when the license usage reaches the threshold. For example if the number of
NEs connected to the eSight has reached the threshold 1000000 of license resources, you
cannot connect new NEs.
Possible Causes
A license resource reaches or exceeds the threshold.
Procedure
Step 1 In the current alarm list, view Additional text of the alarm and check whether the usage of a
license resource has reached or exceeded the threshold.
Step 2 Check whether the license usage has reached or exceeded the threshold.
1.
Choose System > Administration > License Management from the main menu.
2.
In the Resource Control area in the License Management page, check whether the
license usage has reached or exceeded the threshold.
l
If yes, go to Step 3.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
531
eSight
Operation Guide
14 Alarm Reference
l
If no, go to Step 4.
Step 3 Clear the alarm by applying for a new license file or reducing the license usage.
l
Apply for a new license file.
For details, see Step 2 and Step 3 in 14.1.20 ALM-999999992 The license will expire.
Then go to Step 4.
l
Reduce the license usage.
Perform the following steps to reduce the usage of the license resource.
–
Client Count: The number of clients that the eSight can open. Some user accounts
are forcibly logged out to release resources until the license usage is below the
threshold.
i.
Choose System > Administration > User Management from the main menu.
ii.
In the navigation tree in the left pane, choose View Online User.
iii. In the session list on the View Online User page, click Logout in the
Operation column where the required user account is located.
–
AMOS (Alarm monitor of outsourcing system) Management Function: The
number of devices that the eSight can manage. Unnecessary devices can be deleted
to reduce the license usage until the usage is below the threshold.
i.
Choose Resource > Resource Management > Device Type from the main
menu.
ii.
Choose the device type in the navigation tree on the left.
iii. In the NE list, click
be managed.
in the Operation column of the NEs that do not need to
Step 4 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 5.
Step 5 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
Related Information
None.
14.1.23 ALM-999999995 The license is invalid
Description
This alarm is generated when the system detects that the license file on the eSight does not
match the network adapter of the eSight server or the license is invalid. This alarm is cleared
when the system detects a new license and the new license matches the network adapter of the
eSight server.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
532
eSight
Operation Guide
14 Alarm Reference
Attribute
Alarm ID
Alarm Severity
Alarm Type
999999995
Major
Security service or mechanism violation
Parameters
None.
Impact on the System
When the license becomes invalid, the eSight provides a grace period 60 days, during which
the eSight functions can be used properly. When the grace period expires, the eSight functions
become unavailable.
NOTE
The grace period provided by the eSight must be within the license validity period. Therefore, the actual
grace period is equal to or less than 60 days. For example, if the current license has 20 remaining days,
you can manually invalidate the current license. Then the actual grace period is 20 days.
Possible Causes
l
In the license validity period, the network adapter is faulty. As a result, the license file on
the eSight does not match the equipment serial number (ESN) of the eSight server.
l
The license is in the trial period or has expired.
Procedure
Step 1 Choose System > Administration > License Management from the main menu. and check
whether the Revoke License button is available.
l
Yes: Go to Step 4.
l
No: Go to Step 2.
Step 2 Check whether any hardware fault occurs.
l
Yes: Go to Step 3.
l
No: Go to Step 7.
Step 3 Apply to the administrator for a license file.
1.
Obtain an equipment serial number (ESN).
In the License Management page, click Obtain ESN. In the displayed page, select a
network adapter or enter the message authentication code (MAC) address of a server,
and click Generate ESN to obtain an ESN.
2.
Apply to the administrator for a license file.
Step 4 Obtain the license invalidity code to apply for a new license.
1.
On the License Management page, click Revoke License and record the license
invalidity code at the lower part of the page.
2.
On the License Management page, click Obtain ESN. On the displayed page, select the
network adapter or enter the MAC address of a server, and click Generate ESN to
obtain the ESN.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
533
eSight
Operation Guide
14 Alarm Reference
3.
Contact the administrator to apply for a new license using the obtained license invalidity
code and ESN.
Step 5 Import the license file that is applied for to the eSight.
1.
In the License Management page, click Import License.
2.
On the Import License page, click
3.
In the displayed dialog box, select the new license file, and click Open.
4.
Click Import to import the license file to the eSight.
5.
Click Apply. The license file is immediately applied.
next to License file.
Step 6 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 7.
Step 7 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
If an alarm is generated when the system detects that the license file does not match the eSight
server network adapter, the alarm will be automatically cleared only after you use the network
adapter that matches the license file and then restart the eSight.
In other scenarios, when the fault is eliminated, the system will auto-clear the alarm. Manual
clearing is not required.
Related Information
None.
14.1.24 ALM-999999999 Communication Between NMS And NE Is
Abnormal
Description
The eSight queries device communication status each 2 minutes. When the eSight detects
disconnected device communication, the alarm is generated. When the eSight successfully
reconnects the devices, the alarm is automatically cleared.
Attribute
Alarm ID
Alarm Severity
Alarm Type
999999999
Major
Communications Alarm
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
534
eSight
Operation Guide
14 Alarm Reference
Parameters
Name
Meaning
Address
Internet Protocol (IP) address of the device that cannot communicate with
the eSight server.
Protocol
Protocol used by the device that generates the alarm.
Port
Port number for communication between the device and the eSight.
Med Node ID Gateway for communication between the eSight and the device.
Impact on the System
l
The eSight cannot monitor the operating status of the device.
l
The eSight cannot deliver commands to the device.
Possible Causes
The network fails or the device stops running.
Procedure
Step 1 View the location information about the alarm and confirm the information about the device
that generates the alarm.
1.
In the alarm list of the Current Alarm page, click the alarm name to open the Alarm
Details dialog box.
2.
In Object instance of the Alarm Detail dialog box, view and record the values of
Address, Protocol, Port, and Mediation Node ID.
3.
In the Alarm Detail dialog box, view and record the value of Alarm Source.
Step 2 Check whether the device network is normal.
1.
Choose Resource > Resource Management > Device Type from the main menu.
2.
Choose the device type in the navigation tree on the left.
3.
Select Name from the Search by drop-down list. In the Search Criteria text box, enter
the value of Alarm Source and click Search.
4.
In the Parameter Checking area, click Check SNMP Parameters to check the device
connection.
5.
In the dialog box that is displayed, click OK.
Check whether the Operation Result column returns The operation is successful.
–
If yes, go to Step 6.
–
If no, go to Step 3.
Step 3 Contact the maintenance personnel to check whether the device server is started.
l
If yes, go to Step 4.
l
If no, start the server and then go to Step 4.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
535
eSight
Operation Guide
14 Alarm Reference
Step 4 Contact the maintenance personnel to check the hardware. For example, check that network
cables are securely connected and that the switch is working properly.
l
If the faults are rectified, go to Step 5.
l
If the faults cannot be rectified, go to Step 7.
Step 5 Check whether the device network is normal by following Step 2.
l
If yes, go to Step 6.
l
If no, go to Step 7.
Step 6 Wait five minutes. In the current alarm list, check whether the alarm is cleared.
l
If yes, the alarm handling process is complete.
l
If no, go to Step 7.
Step 7 Collect the information about alarm handling, and contact the technical support personnel.
----End
Clearing
When the fault is eliminated, the system will auto-clear the alarm. Manual clearing is not
required.
Related Information
None.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
536
eSight
Operation Guide
15 FAQs
15
FAQs
About This Chapter
This topic describes the solutions to the frequently asked questions (FAQs) about the eSight.
15.1 Browser
This topic describes the solutions to the FAQs about the eSight cause by browser defects.
15.2 Login
This topic describes the solutions to the FAQs about eSight login failures.
15.3 GUI
This topic describes the solutions to the FAQs about eSight interface display.
15.4 System Function
This topic describes the solutions to the FAQs about eSight system functions.
15.5 Others
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
537
eSight
Operation Guide
15 FAQs
15.1 Browser
This topic describes the solutions to the FAQs about the eSight cause by browser defects.
15.1.1 What Do I Do If a Dialog Box Fails to Be Closed After the
eSight Client Opened Using Mozilla Firefox Is Logged Out
Automatically?
Question
After the eSight client opened using Mozilla Firefox is logged out automatically, a dialog box,
for example, Add Performance Counter in the performance management module, is still
displayed on the login page.
Answer
This is a known problem of Mozilla Firefox. You can manually close the dialog box, and log
in to the eSight again.
15.1.2 What Do I Do If the Page Goes Blank When I Repeatedly
Add a Subnet on the eSight Client Opened Using Internet
Explorer 8?
Question
I use Internet Explorer 8 to log in to the eSight client, open the Default Subnet page, and
click Create Subnet. Then, I cancel the operation. After repeating the operation several
times, the page goes blank.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
538
eSight
Operation Guide
15 FAQs
Answer
This problem is a defect of Internet Explorer 8.
Use either of the following methods to resolve the problem:
l
Click Refresh on the web page or press F5 to refresh the page.
l
Use Internet Explorer 9 or later, or use Mozilla Firefox.
15.1.3 What Do I Do If the Browser Does Not Respond When I
Switch Between Multiple Tab Pages on the eSight Opened Using
Internet Explorer 9?
Question
After I log in to the eSight client using Internet Explorer 9, I switch between multiple tab
pages, but the browser does not respond.
Answer
The problem is caused by various plug-ins installed Internet Explorer 9.
Close tab pages that are not used to release operating system resources. Check plug-in settings
on the browser, and delete or disable unnecessary plug-ins.
15.1.4 What Do I Do If a Message Indicating Slow Response from
the Browser Is Displayed After I Log In to the eSight Using
Internet Explorer 8?
Question
After I log in to the eSight using Internet Explorer 8, a message is displayed, showing that the
browser responds slowly. The scenarios are as follows:
l
Scenario 1: Present performance data in a curve.
l
Scenario 2:
a.
Choose Resource > Add Resource > Auto Discovery from the main menu.
b.
On the Auto Discovery page, click Select SNMP Protocol Template.
c.
In the Select Protocol Template dialog box, click Add.
d.
In the displayed dialog box, enter the template name, Read community and Write
community, set Parameter type to SNMPv1 or SNMPv2c, and retain default
values for other parameters.
e.
Click OK.
Answer
The possible reason is that Internet Explorer 8 has low efficiency in JS execution and drawing
pictures.
Use Internet Explorer 9 or later.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
539
eSight
Operation Guide
15 FAQs
15.1.5 What Do I Do When Internet Explorer 8 Runs Slowly
During Script Execution?
Question
When I add a MicroDC, environment monitoring unit, or camera on eSight using Internet
Explorer 8, a dialog box may be displayed, indicating that "A script on this page is causing
Internet Explorer to run slowly. If it continues to run, your computer may become
unresponsive. Do you want to abort the script?"
Answer
This problem is caused by low JavaScript execution efficiency on Internet Explorer 8.
Solutions:
l
Visit http://support.microsoft.com/kb/175500/en and fix the problem as prompted.
l
Use Internet Explorer 9 or Firefox 27.
15.1.6 What Do I Do If the Forward and Back Buttons Become
Unavailable On the eSight Client Opened Using Windows
Internet Explorer?
Symptom
After I log in to the eSight client opened using Internet Explorer 9.0.8112.16421 and click the
back and forward buttons several times, the buttons become unavailable.
Possible Causes
This problem is a defect of Internet Explorer 9.0.8112.16421.
Procedure
Step 1 Install another revision of Internet Explorer 9, or use eSight menus to perform operations.
----End
Suggestion and Summary
You are advised not to use the forward and back buttons. Use another revision of Internet
Explorer 9, or use eSight menus to perform operations.
15.1.7 What Do I Do If the eSight Client Fails to Be Opened in
IPv6 Mode Using Mozilla Firefox?
Question
l
Issue 01 (2016-04-30)
When I use the Firefox 3.6 browser to access the eSight, I enter an abbreviated IPv6
address that contains two consecutive colons (::) in the address box. The Topology
Management page cannot be opened. Two consecutive colons (::) indicate the
consecutive zero-block sequence.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
540
eSight
Operation Guide
15 FAQs
l
I cannot log in to the eSight client in IPv6 mode using Mozilla Firefox 4.0 or later.
Answer
This problem is a defect of Mozilla Firefox.
When logging in to the eSight client in IPv6 mode, use Windows Internet Explorer.
15.1.8 What Do I Do If the Page Is Not Properly Displayed When I
Use Internet Explorer on Windows 2008 to Access the eSight
Symptom
When a user uses Internet Explorer on Windows 2008 to access the eSight, the page is not
properly displayed. For example, the Customize button on the homepage is not displayed. An
error is displayed in the lower left corner of Internet Explorer. After the user double-clicks
, the error message "Access is denied" is displayed.
Possible Causes
The security level of Internet explorer is high, which intercepts normal requests.
Procedure
Step 1 On the menu bar of Internet Explorer, choose Tools > Internet Options. In the Internet
Options dialog box, click the Security tab and select Trusted sites. Add the eSight access
address (https://eSight server IP address:eSight server port number/) to the trusted site list and
set security level to Low.
----End
Suggestion and Summary
Add the eSight access address (https://eSight server IP address:eSight server port number/) to
the trusted site list and set security level to Low.
15.1.9 What Do I Do If the Home Page Does Not Respond After I
Log In to the eSight?
Question
After I log in to the eSight, the home page displays a loading box and does not respond
further.
Answer
After the eSight is upgraded, the browser caches the code of the source version. and still uses
the code. As a result, the home page cannot be displayed properly.
To address this problem, clear the browser cache. The following uses Internet Explorer as an
example.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
541
eSight
Operation Guide
15 FAQs
Step 1 On the menu bar of Internet Explorer, choose Tools > Internet Options.
Step 2 On the General tab page, click Delete in the Browsing history area.
Step 3 In the Delete Browsing History dialog box, select Temporary Internet files and click
Delete.
Step 4 Click Refresh in Internet Explorer or press F5 to refresh the page.
The home page is displayed properly.
----End
15.1.10 What Do I Do If Firefox Browser and Flash Plug-in
Download Failure During eSight Login Using Internet Explorer 9
on Windows Server 2008
Symptom
The Firefox browser and Flash plug-in cannot be downloaded when I log in to eSight using
Internet Explorer 9 on Windows Server 2008.
Figure 15-1 Firefox browser download failure
Figure 15-2 Flash plug-in download failure
Possible Causes
The Windows Server 2008 operating system has high security requirements. Enhanced
Internet Explorer security settings are enabled for administrators and users by default. The
Internet Explorer security level is high and cannot be changed overall, which causes the fault
as shown in Figure 15-1 and Figure 15-2.
Procedure
Step 1 Right-click Computer on the desktop and choose Manage from the shortcut menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
542
eSight
Operation Guide
15 FAQs
Step 2 In the Server Manager dialog box that is displayed, click Configure IE ESC.
Step 3 In the dialog box that is displayed, set Administrator and Users to Off, and click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
543
eSight
Operation Guide
15 FAQs
Step 4 Restart Internet Explorer.
----End
Suggestion and Summary
The same reason may cause table or attachment download failure. In this case, you can use
the same method to rectify the problem.
15.1.11 How Do I Address the eSight Login Failure Due to Firefox
Browser Proxy Setting?
Question
When the Firefox browser proxy is set, I cannot log in to eSight. How do I address this
problem?
NOTE
This problem does not occur when Internet Explorer is used.
Answer
Step 1 Open the Firefox browser (for example, Firefox 27).
Step 2 Choose Tools > Options from the main menu.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
544
eSight
Operation Guide
15 FAQs
Step 3 In the Options window that is displayed, choose Advanced > Network and click Settings.
Step 4 Set the eSight server to access in No Proxy for and click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
545
eSight
Operation Guide
15 FAQs
Step 5 Click OK.
When the configuration is complete, log in to eSight again.
----End
15.1.12 What Do I Do When the Copy Button Is Unavailable on
the Alarm Details Page Using Firefox?
Question
After I log in to eSight using Firefox and click Copy on the Alarm Details page, an error
message is displayed, as shown in Figure 15-3.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
546
eSight
Operation Guide
15 FAQs
Figure 15-3 Error message
Answer
The Firefox browser does not allow websites to operate the user clipboard. As a result, the
Copy button is unavailable on the Alarm Details page. Solution:
l
Choose the link in the URL text box and press Ctrl+C.
l
Use Internet Explorer 9 to access the link.
15.1.13 What Do I Do When the Security Warning Dialog Box Is
Displayed?
Symptom
When the eSight is set to the SSL mode, the Security Warning dialog box is displayed after a
user opens the eSight page using Internet Explorer 8. Click Yes to continue. The functions and
security will not be affected.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
547
eSight
Operation Guide
15 FAQs
Possible Causes
This is a compatibility problem of Internet Explorer 8. Other browsers, such as Internet
Explorer 9 and Firefox do not encounter this problem.
Procedure
l
Solution 1: User other browsers.
l
Solution 2: Set the Security Level of the Browser
Issue 01 (2016-04-30)
a.
Open Microsoft Internet Explorer, and choose Tools > Internet Options.
b.
In the Internet Options dialog box, select the Internet icon on the Security tab
page, and click Custom level in the Security level for this zone area.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
548
eSight
Operation Guide
15 FAQs
c.
Issue 01 (2016-04-30)
In the Security Settings-Internet Zone window, select Enable under Display
mixed content, and click OK.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
549
eSight
Operation Guide
15 FAQs
d.
In the Internet Options window, click OK.
e.
Close Internet Explorer and open it again to log in to the eSight.
----End
Suggestion and Summary
If you do not want the browser to display the Security Warning dialog box but still keep
Internet Explorer secure, solution 1 is recommended.
15.1.14 What Do I Do If the Topology Management Page
Displayed in Full Screen Mode Does not Respond After I Perform
Operations on It?
Question
A user logs in to the eSight on Internet Explorer 9, opens the topology management page in
full screen mode, right-clicks an NE, chooses the hyperlink from the shortcut menu, and
switches back to the topology management page displayed on the browser. The topology
management page is locked.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
550
eSight
Operation Guide
15 FAQs
Answer
The full-screen topology management page is displayed using an independent flash
component. As a result, the original topology management page displayed on the browser is
locked and does not respond.
You are advised to perform operations on the topology management page after you press Alt
+Tab to select the flash process and press Esc to exit the full screen mode.
15.1.15 What Do I Do If a PopVideo Icon Is Displayed When I
Open the eSight Topology Management Page?
Symptom
When a user opens the eSightTopology Management page using a Firefox browser, a
PopVideo icon is displayed to the right of the search box and the page flickers.
Possible Causes
The PopVideo extension component is installed on the Firefox browser. The PopVideo icon
will be displayed in the upper right corner of flash-based pages. When the PopVideo icon is
displayed, the eSightTopology Management page adjusts its width. Therefore, the page
flickers. You can perform the following steps to disable the PopVideo extension component
to prevent this problem:
Procedure
l
Issue 01 (2016-04-30)
Open the Firefox component manager.
Choose Firefox > Add-ons.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
551
eSight
Operation Guide
15 FAQs
l
Select Extensions.
Find the PopVideo extension component and disable it.
l
Restart the Firefox browser.
----End
Suggestion and Summary
This problem occurs temporarily when the Topology Management page is displayed. This
problem does not affect eSight functions even if you do not disable the PopVideo extension
component.
15.1.16 What Do I Do If a Dialog Box Is Displayed When I Re-log
In to a Client After the eSight Upgrade?
Question
When I re-log in to the eSight after the eSight upgrade, the The current system do not
support your browser dialog box is displayed.
Answer
After the eSight is upgraded, the browser caches the code of the source version. and still uses
the code. As a result, the home page cannot be displayed properly.
To address this problem, clear the browser cache. The following uses Internet Explorer as an
example.
Step 1 On the menu bar of Internet Explorer, choose Tools > Internet Options.
Step 2 On the General tab page, click Delete in the Browsing history area.
Step 3 In the Delete Browsing History dialog box, select Temporary Internet files and click
Delete.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
552
eSight
Operation Guide
15 FAQs
Step 4 Click Refresh in Internet Explorer or press F5 to refresh the page.
The home page is displayed properly.
----End
15.1.17 What Do I Do If Files Failed to be Downloaded Using the
Internet Explorer?
Symptom
If Internet Explorer is used to access the eSight client, you cannot download files. When you
attempt to export data, such as the current or historical alarm information and signaling
tracing data, the system displays a message shown in Figure 15-4.
Figure 15-4 Interception information
Possible Causes
The automatic prompt function for downloading files is disabled.
Procedure
l
Perform the following steps to resolve the current problem. This problem still persists
next time you download files:
Click the Internet Explorer pop-up blocker, and select Download File.
l
Issue 01 (2016-04-30)
Perform the following steps to resolve the problem thoroughly:
a.
Start the Internet Explorer.
b.
Choose Tools > Internet Options > Security > Custom Level from the main
menu.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
553
eSight
Operation Guide
15 FAQs
c.
Issue 01 (2016-04-30)
Click Enable in Automatic prompting for file downloads under Downloads.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
554
eSight
Operation Guide
15 FAQs
d.
Click OK.
e.
Restart the Internet Explorer and log in to the eSight client.
----End
15.1.18 What Do I Do When a Page Error Message Is Displayed
When I Attempt to Close the Change Password Page in Internet
Explorer 9?
Symptom
A page error message is displayed when I attempt to close the Change Password page on
Internet Explorer 9.
Possible Causes
This problem occurs because script debugging is enabled in Internet Explorer 9. To solve the
problem, disable script debugging.
Procedure
Step 1 Open Internet Explorer 9.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
555
eSight
Operation Guide
15 FAQs
Step 2 Choose Tools > Internet Options from the main menu.
Step 3 In the Internet Options dialog box, click Advanced, select Disabled script debugging, and
click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
556
eSight
Operation Guide
15 FAQs
Step 4 Restart Internet Explorer.
----End
15.1.19 How Do I Solve the Problem When Data Fails to Be
Downloaded from eSight?
Question
Files fail to be downloaded from eSight. A current eSight page is redirected to the home page
in an attempt to download ActiveX controls.
Answer
The problem occurs because the Automatic prompting for file downloads function of
Internet Explorer is disabled. To solve the problem, enable the function.
Step 1 Open the Internet Explorer.
Step 2 Choose Tools > Internet Options.
Step 3 In the Internet Options dialog box, choose security > Custom level.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
557
eSight
Operation Guide
15 FAQs
Step 4 Choose Downloads > Automatic prompting for file downloads > Enable.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
558
eSight
Operation Guide
15 FAQs
Step 5 Click OK.
Step 6 Log in to eSight again.
----End
15.1.20 What Do I Do If Files Failed to be Downloaded Using
Internet Explorer?
Symptom
If Internet Explorer is used to access the eSight client, you cannot download files. Internet
Explorer displays a message indicating that files cannot be downloaded to ensure security.
For example, system logs fail to be downloaded on the System Logs page.
1.
Choose System > Administration > Log Management from the main menu.
2.
In the System Logs window, download system log files.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
559
eSight
Operation Guide
15 FAQs
Possible Causes
The zone security level is set too high in Internet Explorer.
Procedure
l
Perform the following steps to resolve the current problem. This problem still persists
next time you download files:
Click the Internet Explorer pop-up blocker, and select Download File.
l
Issue 01 (2016-04-30)
Perform the following steps to resolve the problem thoroughly:
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
560
eSight
Operation Guide
15 FAQs
a.
On the menu bar of Internet Explorer, choose Tools > Internet Options.
b.
In the Internet Options dialog box, click the Security tab.
c.
In the Security level for this zone area, set the security level to low.
d.
Click OK and restart Internet Explorer.
----End
Suggestion and Summary
After setting the security level to low, the download failure message may still be displayed or
even worse, security problems may occur. It is recommended that Method 1 be used to
resolve the problem.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
561
eSight
Operation Guide
15 FAQs
15.1.21 What Do I Do If a Message Indicating Unsupported
Browser Is Displayed When I Log in to the eSight on Internet
Explorer 10?
Symptom
When I log in to the eSight on Internet Explorer 10, a message is displayed, indicating that the
current system does not support the browser.
Possible Causes
The Google Chrome Frame add-on is installed on the Internet Explorer browser, and the addon version is not supported by the eSight.
Procedure
Step 1 Solution 1: User other browsers.
Step 2 Solution 2: Disable the Google Chrome Frame add-on. For example, the navigation path for
Internet Explorer is Tools > Manage Add-ons > Toolbars and Extensions.
----End
Suggestion and Summary
Solution 2 is recommended.
15.2 Login
This topic describes the solutions to the FAQs about eSight login failures.
15.2.1 What Do I Do If the eSight Displays a Security Certificate
Error During Login?
Symptom
Internet Explorer or Mozilla Firefox displays a message indicating that the security certificate
is incorrect when you log in to the eSight.
l
Issue 01 (2016-04-30)
The following figure shows the security certificate error prompted by Internet Explorer.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
562
eSight
Operation Guide
15 FAQs
l
The following figure shows the security certificate error prompted by Firefox.
Possible Causes
The security certificate is incorrect or is not installed, you need to install a valid security
certificate.
Procedure
l
Issue 01 (2016-04-30)
Method 1: Deploy the certificated authorized by the Certificate Authority (CA) to eSight.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
563
eSight
Operation Guide
15 FAQs
l
a.
Contact the eSight server administrator to apply for a certificate from the CA.
b.
Deploy the certificates issued by the CA to the eSight.
Method 2: Set the certificate of the eSight to a trust certificate of the browser.
–
Install the security certificate in Internet Explorer.
i.
On the error message page, click Continue to this website (not
recommended).
ii.
Click Certificate Error. In the Certificate Invalid dialog box, click View
certificates.
iii. On the General tab page, click Install Certificate.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
564
eSight
Operation Guide
15 FAQs
iv.
Issue 01 (2016-04-30)
In the Certificate Import Wizard dialog box, click Next.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
565
eSight
Operation Guide
15 FAQs
v.
Select Place all certificates in the following store and click Browse.
vi. In the Select Certificate Store dialog box, select Trusted Root Certification
Authorities and click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
566
eSight
Operation Guide
15 FAQs
vii. Click Next.
viii. In the Certificate Import Wizard dialog box, click Finish.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
567
eSight
Operation Guide
15 FAQs
ix. In the Security Warning dialog box, click Yes.
x.
Issue 01 (2016-04-30)
In the Certificate Import Wizard dialog box, click OK.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
568
eSight
Operation Guide
15 FAQs
xi. Close Internet Explorer and open it again to log in to the eSight.
The security certificate error page is displayed due to the invalid certificate.
Click Continue to this website (not recommended). The eSight login page is
displayed for you to log in to the eSight.
–
Issue 01 (2016-04-30)
Install the security certificate in Mozilla Firefox.
i.
On the error message page, expand I Understand the Risks and click Add
Exception.
ii.
In the Add Security Exception dialog box, click Confirm Security
Exception.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
569
eSight
Operation Guide
15 FAQs
iii. Close Mozilla Firefox and open it again to log in to the eSight.
----End
Suggestion and Summary
Method 1 is recommended. Method 2 may do not work in some scenario because Internet
Explorer versions differ.
15.2.2 What Do I Do If the eSight Displays a Security Warning
Message During Login?
Symptom
The Web browser displays a security alarm when you log in to the eSight.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
570
eSight
Operation Guide
15 FAQs
Possible Causes
The security level of the browser is too high. To solve this problem, you can add the website
of the eSight as a trusted website or set the security level of the browser to a low level.
Procedure
l
Issue 01 (2016-04-30)
Solution 1: Add Trusted Websites
a.
In the security alarm dialog box, click Add.
b.
In the Internet Options dialog box, select the Trusted sites icon on the Security
tab page, and click Sites.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
571
eSight
Operation Guide
15 FAQs
c.
In the Trusted sites dialog box, enter the eSight website address in the Add this
website to the zone text box, and click Add to add the website to the list of trusted
websites.
NOTE
The websites for accessing the eSight over Hypertext Transfer Protocol (HTTP) or Hypertext
Transfer Protocol Secure (HTTPS) must be added to the list of trusted websites.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
572
eSight
Operation Guide
15 FAQs
l
Issue 01 (2016-04-30)
d.
Click Close.
e.
Close Internet Explorer and open it again to log in to the eSight.
Solution 2: Set the Security Level of the Browser
a.
Open Microsoft Internet Explorer, and choose Tools > Internet Options.
b.
In the Internet Options dialog box, select the Trusted sites icon on the Security
tab page, and click Custom level in the Security level for this zone area.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
573
eSight
Operation Guide
15 FAQs
c.
Issue 01 (2016-04-30)
In the Security Settings-Internet Zone window, select Enable under Submit nonencrypted from data and Enable under Active scripting, and click OK.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
574
eSight
Operation Guide
15 FAQs
d.
In the Internet Options window, click OK.
e.
Close Internet Explorer and open it again to log in to the eSight.
----End
15.2.3 What Do I Do When a Message Is Displayed Indicating the
System Internal Error?
Symptom
During login to eSight, a message indicating system internal error is displayed, as shown in
Figure 15-5.
Figure 15-5 System error message
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
575
eSight
Operation Guide
15 FAQs
Possible Causes
1.
eSight is being restarted.
2.
A key eSight component, for example, the security component, fails to start.
l
Log in to eSight later.
l
If the problem persists, restart eSight.
Procedure
----End
15.2.4 What Do I Do If I Forget the Password When I Attempt to
Log In to the eSight?
Question
What do I do if I forget the password when I attempt to log in to the eSight?
Answer
l
For non-admin users, contact the admin user to reset the password.
l
For the admin user, the eSight does not support password resetting. The password of the
admin user cannot be retrieved and you must reinstall the eSight. Therefore, you must
remember the password of the admin user.
15.2.5 How Do I Cancel the Advance Warning of Password
Expiration and Mandatory Password Change
Question
When I log in to the eSight, I receive an advance warning before the password expires every a
specified period, for example, three months, and I am asked to change the password. If I do
not change the password before it expires, I cannot log in after the password expires and have
to change it immediately.
How do I cancel the advance warning of password expiration and mandatory password
change or prolong the password change period?
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
576
eSight
Operation Guide
15 FAQs
Answer
NOTICE
Changing passwords periodically can improve user information security and reduce the
possibility of account forgery. Exercise caution when canceling the functions and changing
the password change period.
User information is more secure if a password is changed more frequently. However, you may
forgot the passwords if you change password frequently.
Step 1 Choose System > Administration > User Management from the main menu.
Step 2 In the navigation tree, select Password Policy.
The eSight password policy includes Forcibly change an expired password, as shown in
Figure 15-6. By default, the check box is selected. The default password validity period is 90
days and users are notified that their passwords are about to expire 7 days in advance.
Users who have security management rights can modify the policy as follows:
l
Determine whether to require users to periodically change passwords. Select the check
box to retain the function.
l
Prolong or shorten the password change period. Specifically, change the password
validity period. The password change period is determined by the password validity
period.
l
Change the number of days in advance users are notified that their passwords are about
to expire.
Figure 15-6 Password policy
If a user logs in to the eSight when the password is about to expire, the user receives
notifications and is asked to change the password, as shown in Figure 15-7. Users can change
the password or ignore the notification and do not change the password. If the password is not
changed after it expires, the user can log in only after changing the password.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
577
eSight
Operation Guide
15 FAQs
Figure 15-7 Password change notification
----End
15.2.6 How Do I Do When the eSight Login Page Is Not Displayed
on the Current Host in the Windows Server 2008 R2 Operating
System?
Symptom
As shown in Figure 15-8, the login page is not displayed when you want to log in to eSight
on the current host in the Windows Server 2008 R2 operating system.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
578
eSight
Operation Guide
15 FAQs
Figure 15-8 Unable to display the login page
Possible Causes
The Windows Server 2008 R2 operating system has high security requirements. Enhanced
Internet Explorer security settings are enabled for administrators and users by default. The
Internet Explorer security level is high and cannot be changed overall, which causes the fault
as shown in Figure 15-8.
Procedure
Step 1 Right-click Computer on the desktop and choose Manage from the shortcut menu.
Step 2 In the Server Manager dialog box that is displayed, click Configure IE ESC.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
579
eSight
Operation Guide
15 FAQs
Step 3 In the dialog box that is displayed, set Administrator and Users to Off, and click OK.
Step 4 Restart Internet Explorer.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
580
eSight
Operation Guide
15 FAQs
Suggestion and Summary
Before logging in to eSight on the Windows Server 2008 R2 operating system, perform the
preceding operations to ensure successful login.
15.2.7 How Do I Solve the Service Session Failure That Occurs
When I Log In to eSight?
Question
A user has already logged in to eSight. The user uses the same browser to log in to eSight on
the same PC for a second time. A message indicating service session failure may be displayed
on the first eSight page.
Answer
Close all the eSight pages and log in to eSight again.
NOTICE
Do not use the same browser to log in to eSight on the same PC more than once.
15.2.8 Login to the eSight Failed and the User Is Locked
Symptom
When I log in to the eSight, the following message is displayed:
Login failed. The user is locked.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
581
eSight
Operation Guide
15 FAQs
Possible Causes
l
If you log in to the eSight as the admin user and enter the password incorrectly five
times in 10 minutes, the login Internet Protocol (IP) address is locked for 10 minutes.
l
When a common user logs in to the eSight, the conditions for locking accounts specified
in the account policy are triggered.
l
Login as the admin user
Procedure
l
–
Use another IP address to log in to the eSight.
–
Wait 10 minutes and log in to the eSight.
Login as a common user.
Wait until the lock period expires and log in to the eSight again. Alternatively, contact
the admin user for unlocking the current user and log in to the eSight again.
----End
Suggestion and Summary
It is recommended that you remember the password and enter the password correctly to log in
to the eSight.
15.2.9 Login Page of the eSight Client or Maintenance Tool
Displays Blank Using Internet Explorer on Windows Server 2008
Symptom
The login page of the eSight client or maintenance tool using Internet Explorer on Windows
Server 2008 are as follows:
l
Internet Explorer shows a blank page for login to the eSight client.
l
Internet Explorer shows a blank page for login to the maintenance tool.
Possible Causes
The security level of Internet Explorer is set to high. You can set the website of the eSight
client or maintenance tool as a trusted website to resolve the problem.
Procedure
Step 1 Open Microsoft Internet Explorer, and choose Tools > Internet Options.
Step 2 On the Security tab page, select Trusted sites and then click Sites.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
582
eSight
Operation Guide
15 FAQs
Step 3 In the Add this website to the zone text box, enter the address of the eSight client or the
website of the maintenance tool, and click Add to add the website to the list of trusted
websites.
NOTE
The address of the eSight client and the website of the maintenance tool must be set as a trusted website
regardless of whether they are accessed by using the Hypertext Transfer Protocol (HTTP) or Hypertext
Transfer Protocol Secure (HTTPS) protocol.
l
Issue 01 (2016-04-30)
Set the HTTP website as a trusted website
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
583
eSight
Operation Guide
15 FAQs
l
Set the HTTPS website as a trusted website
Step 4 Click Close.
Step 5 Open Windows Internet Explorer again, and login to the eSight client or maintenance tool.
The login page is displayed correctly.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
584
eSight
Operation Guide
15 FAQs
Suggestion and Summary
Other methods, such as lowering the security level, may cause security risks. It is
recommended that the method of setting the website of the eSight client or maintenance
tool as a trusted website provided in this topic be used to resolve the problem.
15.2.10 What Do I Do If the Home Page Does Not Respond After I
Log In to the eSight?
Question
After I log in to the eSight, the home page displays a loading box and does not respond
further.
Answer
After the eSight is upgraded, the browser caches the code of the source version. and still uses
the code. As a result, the home page cannot be displayed properly.
To address this problem, clear the browser cache. The following uses Internet Explorer as an
example.
Step 1 On the menu bar of Internet Explorer, choose Tools > Internet Options.
Step 2 On the General tab page, click Delete in the Browsing history area.
Step 3 In the Delete Browsing History dialog box, select Temporary Internet files and click
Delete.
Step 4 Click Refresh in Internet Explorer or press F5 to refresh the page.
The home page is displayed properly.
----End
15.2.11 What Do I Do When the Bad Gateway Error (Error Code:
502) Is Displayed During the eSight Access?
Symptom
When a user accesses the eSight page, the bad gateway (error code: 502) error message is
displayed.
Possible Causes
The Transmission Control Protocol (TCP) port resources of the eSight server are insufficient.
Procedure
l
Contact eSight server administrators for a solution.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
585
eSight
Operation Guide
15 FAQs
15.2.12 Users Fail to Log In to eSight After the IP Address of the
eSight Server Changes
Symptom
After the IP address of the eSight server running the Windows operating system changes,
users fail to log in to eSight.
Possible Causes
The changed IP address of the eSight server does not take effect because the eSight
components are not stopped.
Procedure
Step 1 Log in to the server where the network traffic collector is deployed as an operating system
user from the Administrators group.
Step 2 Stop the eSight service.
Choose Start > All Programs > eSight > eSight Console. In the eSight Console dialog box
that is displayed, click Stop.
Step 3 Use the IP address change tool to synchronize the eSight IP address.
Choose Start > All Programs > eSight > eSight Console. From the eSight Console main
menu, choose Tools > IP Change Tool, select an eSight server IP address and click Modify.
Step 4 Start the eSight service.
Choose Start > All Programs > eSight > eSight Console. In the eSight Console dialog box
that is displayed, click Start.
----End
Suggestion and Summary
Ensure that you stop the eSight components before changing the IP address of the eSight
server, and re-start the eSight components after the IP address is changed. Otherwise, login
failures may occur because the changed eSight server IP address does not take effect.
15.2.13 Subsequent Login Attempts Fail When the User Does Not
Normally Exit the Single User Mode
Symptom
A user directly closes the browser after logging in to the eSight in single user mode. When
another user attempts to log in to the eSight, the login fails and the message "The system
already enters the single user mode. Please login later." is displayed.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
586
eSight
Operation Guide
15 FAQs
Possible Causes
Subsequent user login attempts can succeed only after the user logging in to the eSight in
single user mode exits the eSight normally. If the user only closes the browser to exit the
eSight, the web page server session is not released and other users cannot successfully log in.
Procedure
Step 1 Users can successfully log in to the eSight after the web page server session times out. The
default session timeout period is 30 minutes.
If you urgently need to log in, restart the eSight service or the server operating system and log
in to the eSight again.
----End
Suggestion and Summary
Generally, the single user mode is used when a user performs maintenance operations on the
eSight server to prevent interference from other users' operations.
Pay attention to the following when using the single user mode:
l
In single user mode, the eSight allows only the current user to log in and forcibly logs
out the other online users.
l
After the maintenance is complete, the user needs to exit the single user mode in a timely
manner. Otherwise, other users cannot successfully log in to the eSight.
15.3 GUI
This topic describes the solutions to the FAQs about eSight interface display.
15.3.1 What Do I Do When a Few English Fields Cannot Be
Displayed Completely or When English Letters Overlap on the
eSight GUI in the Firefox?
Symptom
l
Issue 01 (2016-04-30)
Scenario 1: A few English fields cannot be displayed completely when you create users
on the eSight using the Firefox (Chinese edition). However, this problem does not occur
if Internet Explorer is used.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
587
eSight
Operation Guide
15 FAQs
l
Scenario 2: Some English letters overlap when the Firefox (Chinese edition) is used to
access the eSight.
Possible Causes
l
Scenario 1: The default font of the Firefox (Chinese edition) is not Arial.
l
Scenario 2: The Firefox (Chinese edition) uses its own font style, not the one referenced
by the current page.
Fault Diagnosis
l
Scenario 1: Change the default font.
l
Scenario: Allow the current page to use its own font style.
Procedure
Scenario 1: Fields that cannot be displayed completely
1
Issue 01 (2016-04-30)
Choose Tools > Options from the main menu of the Firefox (Chinese edition).
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
588
eSight
Operation Guide
15 FAQs
2
In the Options dialog box, click the Content tab.
3
In the Fonts & Colors area, select Arial from the Default font drop-down list.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
589
eSight
Operation Guide
15 FAQs
4
Click OK.
The fields can be displayed completely.
Scenario 2: English letters that overlap
5
Issue 01 (2016-04-30)
Choose Tools > Options from the main menu of the Firefox (Chinese edition).
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
590
eSight
Operation Guide
15 FAQs
6
In the Options dialog box, click the Content tab.
7
In the Fonts & Colors area, click Advanced.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
591
eSight
Operation Guide
15 FAQs
8
In the Fonts dialog box, select the Allow pages to choose their own fonts,instead of
my selections above check box and click OK.
9
Click OK.
The English letters are displayed clearly.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
592
eSight
Operation Guide
15 FAQs
Suggestion and Summary
When using the Firefox (Chinese edition) to access the eSight, set the font first.
15.3.2 What Do I Do When the Font Format Is Incorrect on the
eSight GUI in the Firefox?
Symptom
The font format is incorrect when the Firefox is used to access the eSight, as shown in Figure
15-9. Figure 15-10 shows the correct font format. However, this problem does not occur if
Internet Explorer is used.
Figure 15-9 Incorrect font format
Figure 15-10 Correct font format
Possible Causes
The Firefox uses its own font format, not the one referenced by the current page.
Fault Diagnosis
Allow the current page to use its own font format.
Procedure
Step 1 For details, see Scenario 2: English letters that overlap.
----End
Suggestion and Summary
When using the Firefox to access the eSight, set the font first.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
593
eSight
Operation Guide
15 FAQs
15.3.3 What Do I Do If an Installation Failure Message Is
Displayed When I Am Installing the Adobe Flash Player?
Symptom
If browser is used to access the eSight, an error message displayed after you log in.
When you install Adobe Flash Player under browser as prompted, an error message is
displayed, indicating installation failure.
Possible Causes
The version of Adobe Flash Player is earlier than that of Adobe Flash Player recorded in the
registration table of the client.
Fault Diagnosis
Uninstall Adobe Flash Player and install the earlier and later versions of Adobe Flash Player
respectively.
l
No error message is displayed when you install Adobe Flash Player whose version is
later than the Adobe Flash Player provided by the eSight. The installation is successful.
l
An error message is displayed when you install Adobe Flash Player whose version is
earlier than the Adobe Flash Player provided by the eSight. The installation failed.
Procedure
Step 1 Click FlashCleaner.zip to save the file to the local computer.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
594
eSight
Operation Guide
15 FAQs
Step 2 Run the FlashCleaner.vbs script for deleting registry information to delete the registry of the
Adobe Flash Player installed on the client.
Step 3 In the error dialog box, click Player Download Center.
Go to the Adobe Flash Player download center to obtain the latest version.
Step 4 Install the latest version of Adobe Flash Player.
----End
15.3.4 What Do I Do If the eSight Interface Layout Is Incorrect
After Login?
Symptom
The interface layout is incorrect. For example, After I log in to the client and choose System
> Administration > User Management from the main menu, the User page layout is
incorrect.
Possible Causes
The compatibility view mode is set for Windows Internet Explorer 8. The correct view mode
is standard view.
Procedure
Step 1 Open Windows Internet Explorer 8, and choose Tools > Compatibility View Settings from
the menu bar.
If the menu bar is unavailable, press Alt to display it.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
595
eSight
Operation Guide
15 FAQs
Step 2 In the Compatibility View Settings dialog box, deselect Include updated website lists from
Microsoft, Display intranet sites in Compatibility view, and Display all websites in
Compatibility View.
Step 3 Click Close.
The page is automatically refreshed, and the interface layout becomes normal.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
596
eSight
Operation Guide
15 FAQs
15.3.5 What Do I Do If a Message Indicating that the Flash Plugin
Is Crashed Is Displayed When I Use the Firefox to access an
eSight Flash Page?
Symptom
When I use Firefox Mozilla to access the flash pages of the eSight, such as the alarm bar
chart, topology page, and performance monitoring page, displays a message indicating that
the flash plug-in crashes.
Possible Causes
l
During the running of the Flash plug-in, a conflict occurs when reading and writing the
memory. Firefox Mozilla automatically ends the plug-in management process to ensure
normal running, which causes that the Flash plug-in crashes.
l
The memory and central processing unit (CPU) of the operating system where Firefox
Mozilla is running is insufficient so that Firefox Mozilla automatically ends the plug-in
management process, which causes that the Flash plug-in crashes.
Procedure
Step 1 Click Refresh on the web page or press F5 to refresh the page.
----End
15.3.6 When the System Displays an Incorrect Import Path During
Operations on eSight in Internet Explorer
Symptom
The system displays an incorrect import path during operations on eSight in Internet Explorer,
which has no impact on the import results.
Possible Causes
This problem occurs because Allowed levels for this zone is set to Medium-high or higher.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
597
eSight
Operation Guide
15 FAQs
Procedure
Step 1 Open Internet Explorer.
Step 2 Choose Tools > Internet Options.
Step 3 In the Internet Options dialog box, choose Security > Internet.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
598
eSight
Operation Guide
15 FAQs
Step 4 Set Allowed levels for this zone to Medium, and click OK.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
599
eSight
Operation Guide
15 FAQs
----End
15.3.7 What Do I Do If the Page Does Not Respond After the
Topology View Enters the Idle State for a Long Period of Time?
Symptom
I use Windows Internet Explorer to log in to the eSight and open the topology page. More
than 10 hours later, the topology page displays blank or cannot be switched to other pages
when I perform the corresponding operations.
Possible Causes
A large number of devices are managed on the network, and Windows Internet Explorer
occupies the memory for a long period of time, causing insufficient client memory. As a
result, no response is returned for the operations.
Procedure
Step 1 Restart Windows Internet Explorer.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
600
eSight
Operation Guide
15 FAQs
Step 2 Log in to the eSight again, and open the topology page.
Operations on the topology page are proper.
----End
15.3.8 When Internet Explorer 8 Displays a Message Indicating
that No Alarm Sound Is Selected
Symptom
Internet Explorer 8 displays a message indicating that no alarm sound is selected.
Possible Causes
This problem occurs because Compatibility View is enabled in Internet Explorer 8. To solve
the problem, disable Compatibility View for Internet Explorer 8.
Procedure
Step 1 Open Internet Explorer 8.
Step 2 Choose Tools > Developer Tools.
Step 3 On the Developer Tools page that is displayed, set Browser Mode to Internet Explorer 8
and Document Mode to Internet Explorer 8 Standards.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
601
eSight
Operation Guide
15 FAQs
Step 4 Close the Developer Tools page and log in to eSight again.
----End
Suggestion and Summary
In most cases, incomplete page display and invalid sessions in Internet Explorer 8 are caused
by Compatibility View settings.
You are recommended to disable Compatibility View for Internet Explorer 8.
Internet Explorer 9 is recommended.
15.3.9 What Do I Do If Diagrams Are Not Displayed When I Use
the eSight on Internet Explorer 8?
Symptom
When I use the eSight on Internet Explorer 8, diagrams are not displayed.
Possible Causes
Internet Explorer 8 cannot use the Vector Markup Language (VML) to draw graphs because
its bottom-layer dynamic graph library VGX.dll is deregistered.
Procedure
Step 1 Run the following command as the Administrator user on the local client to register
VGX.dll:
regsvr32 "%CommonProgramFiles%\microsoft shared\vgx\vgx.dll"
Step 2 Close Internet Explorer and open it again to log in to the eSight.
----End
15.3.10 When the Disk Space of the eSight Server Is Fully
Occupied, eSight Runs Abnormally
Symptom
l
The eSight GUI fails to display properly when I log in. When I log out, the GUI displays
page-wide code.
l
A message is displayed indicating that the license is invalid when I log in to eSight.
Possible Causes
The disk space of the eSight server is fully occupied, eSight runs abnormally.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
602
eSight
Operation Guide
15 FAQs
Procedure
Step 1 Clean up the disk space of the eSight server. For example, remove unnecessary files from the
disk space.
Step 2 Restart eSight.
----End
Suggestion and Summary
The disk space required by the proper running of an eSight server varies according to eSight
edition and ranges from 20 GB to 320 GB. For details, see the eSight Release Notes.
15.3.11 What Do I Do When Some eSight Functions Are Not
Available in a Browser?
Question
When you log in to eSight client using the Internet Explorer, Web pages are displayed
abnormally and the Internet Explorer's functions are unavailable.
Answer
Step 1 If you use the Internet Explorer:
1.
On the menu bar, choose Tools > Internet Options.
2.
Click the General tab and click Delete.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
603
eSight
Operation Guide
15 FAQs
3.
Issue 01 (2016-04-30)
The Delete Browsing History dialog box is displayed. Click Delete.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
604
eSight
Operation Guide
15 FAQs
Step 2 If you use the Firefox:
1.
On the menu bar, choose Tools > Options.
2.
In the Options dialog box that is displayed, click the Privacy tab, then click clear your
recent history.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
605
eSight
Operation Guide
15 FAQs
3.
Select Everything in the dialog box that is displayed, click Clear Now.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
606
eSight
Operation Guide
15 FAQs
15.4 System Function
This topic describes the solutions to the FAQs about eSight system functions.
15.4.1 Resource Management
15.4.1.1 What Do I Do If I Failed to Obtain Information Using Trace Router on
the eSight Running on Linux?
Symptom
The eSight server runs on Linux. The eSight client fails to obtain information using the Trace
Router function. The operation is as follows:
1.
Choose Resource > Resource Management > Device Type from the main menu.
2.
On the Device View page, select an network element (NE), and click Trace Router in
Device Manager in the right part.
The Information dialog box is displayed, showing that valid Trace Router information is
not obtained.
NOTE
This problem does not occur when the eSight server runs on Windows.
Possible Causes
On Linux, the ossuser user does not have rights to run the traceroute command.
NOTE
l On the eSight server, the ossuser user runs the traceroute command to obtain information and
present the information on the client. This is called Trace Router.
l By default, only the root user has rights to run the traceroute command. When the eSight is
installed as the root user, the rights for running the traceroute command are automatically assigned
to the ossuser user. If the rights for running the traceroute command change, the ossuser will fail to
run the traceroute command.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
607
eSight
Operation Guide
15 FAQs
Procedure
l
Log in to the eSightserver as the root user.
l
Run the following command to assign the rights for running the traceroute command to
the ossuser user:
chmod u+s /usr/sbin/traceroute
----End
15.4.1.2 What Do I Do When an eSight Opened Using Windows Internet Explorer
Failed to Connect to a Device in Telnet Mode?
Symptom
After a user logs in to the eSight using the Windows Internet Explorer, selects a device on the
Device View page, and clicks Telnet, the device page failed to be displayed.
Possible Causes
The Telnet function depends on the Telnet client of Windows. The possible causes are as
follows:
l
The Telnet client is not installed.
l
The Telnet registry information is incorrect.
NOTE
The Telnet protocol is insecure. SSH is recommended because it is secure.
Fault Diagnosis
Check whether the %windir%\System32\telnet.exe file exists.
NOTE
In the file name, %windir% indicates the installation path of Windows, for example, C:\Windows.
l
Yes: The Telnet registry information is incorrect. Go to Step 2.
l
No: The Telnet client is not installed. Go to Step 1.
Procedure
Step 1 Install the Telnet client of Windows, and ensure that the %windir%\System32\telnet.exe file
exists. Then, go to Step 3.
Step 2 Download and run the registry file based on the Windows version of the client.
l
For Windows 32-bit edition:
Download and run the registry file to import the file contents to the local registry.
l
Issue 01 (2016-04-30)
For Windows 64-bit edition:
a.
Download and run the registry file to import the file contents to the local registry.
b.
Copy the %windir%\System32\telnet.exe file to the %windir%\SysWOW64\
directory.
c.
Check whether the telnet.exe.mui file exists in the %windir%\System32\%locale
%\ directory. If yes, copy it to the %windir%\SysWOW64\%locale%\ directory.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
608
eSight
Operation Guide
15 FAQs
NOTE
In the file name, %locale% indicates the language environment of Windows, for example,
en-US.
Step 3 Check whether the registry configuration is correct.
1.
Open the HKEY_CLASSES_ROOT\telnet\shell\open\command directory.
2.
In the right pane, check whether the value of (Default) is "%windir%
\System32\rundll32.exe" "%windir%\System32\url.dll",TelnetProtocolHandler %l.
For example, "C:\Windows\System32\rundll32.exe" "C:\Windows
\System32\url.dll",TelnetProtocolHandler %l
–
Yes: Go to Step 4.
–
No: Change the value to the correct one, and go to Step 4.
Step 4 Restart Windows Internet Explorer, and connect to the device in Telnet mode again.
----End
15.4.1.3 How Do I Solve the Problem That Internet Explorer 8 Displays a
Confirmation Dialog Box When a Large Number of NEs Are Discovered?
Question
When a large number of NEs (more than 2000) are discovered during automatic discovery in
eSight, Internet Explorer might display a confirmation dialog box, asking users whether to
stop running the script, as shown in Figure 15-11.
Figure 15-11 Confirmation dialog box
Answer
Step 1 In the confirmation dialog box, click No. eSight continues to automatically discover NEs.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
609
eSight
Operation Guide
15 FAQs
NOTICE
The confirmation dialog box will be displayed only in Internet Explorer 8. You are advised to
use Internet Explorer 9, Firefox 12, or browsers of later versions.
----End
15.4.1.4 What Do I Do When an Invalid Session Is Displayed After I Click
Complete During Automatic NE Addition?
Symptom
What do I do when an invalid session is displayed after I click Complete during automatic
NE addition?
Possible Causes
This problem is caused by the Compatibility View of Internet Explorer 8. To solve this
problem, disable the Compatibility View by performing the following operations. It is
recommended that you use Internet Explorer 9.
Procedure
l
Method 1:
a.
Open Internet Explorer 8.
b.
Choose Tools > Developer Tools.
NOTE
If the menu bar is unavailable, press Alt to display it.
c.
Issue 01 (2016-04-30)
On the Developer Tools page that is displayed, set Browser Mode to Internet
Explorer 8 and Document Mode to Internet Explorer 8 Standards.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
610
eSight
Operation Guide
15 FAQs
d.
l
Close the Developer Tools page and log in to eSight again.
Method 2:
a.
Open Internet Explorer 8.
b.
Choose Tools > Compatibility View Settings from the menu bar.
NOTE
If the menu bar is unavailable, press Alt to display it.
c.
Issue 01 (2016-04-30)
In the Compatibility View Settings dialog box, deselect Display intranet sites in
Compatibility view, and Display all websites in Compatibility View.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
611
eSight
Operation Guide
15 FAQs
d.
Click Close.
e.
Choose Tools > Internet Options from the menu bar.
f.
In the Advanced tab, clear Automatically recover from page layout errors with
Compatibility View.
g.
Click OK and log in to eSight again.
----End
Related Information
In most cases, incomplete page display and invalid sessions in Internet Explorer 8 are caused
by Compatibility View settings.
You are recommended to disable Compatibility View for Internet Explorer 8.
15.4.1.5 How Do I Locate the Fault When Failing to Add NEs?
Symptom
I cannot add NEs to the NMS.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
612
eSight
Operation Guide
15 FAQs
Possible Causes
l
The NMS and NEs are disconnected.
l
The SNMP parameters for NEs are set incorrectly.
Fault Diagnosis
1.
Check the connection between the NMS and NEs.
2.
Verify the configuration of the SNMP parameters for NEs.
Procedure
Step 1 Check the connection between the NMS and NEs. The following takes Huawei AC6605 as an
example.
1.
Run the ping command on the AC6605 and check its communication with the NMS.
2.
Run the ping command on the NMS server and check its communication with the
AC6605.
If the communication is normal, continue to verify the configuration of the SNMP
parameters for the AC6605. If the communication is abnormal, ensure that the firewall
and NAT settings between the NMS and NE.
Step 2 Verify the configuration of the SNMP parameters for NEs. Take example of Huawei AC6605.
Log in to the device, run the following command, and ensure that the parameters configured
on the device are consistent with the parameters specified when the device is added to eSight:
l
SNMP v1/v2c
system-view
snmp-agent sys-info version v2c
snmp-agent community write Private@123
snmp-agent community read Public@123
Check the configuration information.
display snmp-agent community
Community name:%$%$o<0)+Puf0Bl,fq);94]Nv`WN%$%$
Group name:%$%$o<0)+Puf0Bl,fq);94]Nv`WN%$%$
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
613
eSight
Operation Guide
15 FAQs
NOTE
Here, public is the device's read community name and private is the device's write community name.
When adding the device to eSight, ensure that the two parameters on the device and eSight are
consistent.
l
SNMPv3
system-view
snmp-agent sys-info version v3
snmp-agent group v3 snmpv3usergroup privacy read-view public
snmp-agent usm-user v3 snmpv3user snmpv3usergroup authentication-mode sha
Hello@123 privacy-mode des56 Hello@123
Check user information.
display snmp-agent usm-user
User name: snmpv3user
Engine ID: 800007DB0300259E0370C3 active
NOTE
–
snmpv3user: indicates a user name in the snmpv3usergroup group, corresponding to the security
name on eSight. When adding the device to eSight, ensure that the parameter on the device and
eSight is consistent.
–
authentication-mode: indicates the authentication protocol, corresponding to the authentication
protocol on eSight. If this parameter is configured on the device, ensure that the parameter on the
device and eSight is consistent when adding the device to eSight.
–
privacy-mode: indicates the security level, corresponding to the proprietary protocol on eSight. If
this parameter is configured on the device, ensure that the parameter on the device and eSight is
consistent when adding the device to eSight.
NOTE
If the ACL is configured, ensure that the NMS server IP address is contained in the ACL. The command for
checking the ACL is as follows:
display acl all
----End
15.4.1.6 What Are eSight Network Device Polling Types and Principles?
Question
What device rolling types do eSight support? What are the rolling principles?
Answer
Issue 01 (2016-04-30)
Polling Type
Polling Time
Changeable
Description
Device status
polling
Yes
eSight queries the online and offline status of devices
through ICMP Ping, SNMP Ping perceives the device
status change, generates alarms when devices go
offline abnormally, and refreshes devices on the
topology management and IP topology management
pages.
Default value: 1
minute
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
614
eSight
Operation Guide
15 FAQs
Polling Type
Polling Time
Changeable
Description
Interface status
polling
Yes
eSight reads MIB node information on devices
through the SNMP protocol to obtain the latest
interface data and refresh the device and link status on
the topology management and IP topology
management pages.
Default value
for link
interfaces: 5
minutes
Default value
for all
interfaces: 60
minutes
Scheduled
device
synchronizatio
n
Yes
IP address
polling
Yes
Default value:
02:20
Default value:
60 minutes
eSight reads MIB node information on devices
through the SNMP protocol to obtain the latest feature
data about the interface and IP address on devices.
Scheduled device synchronization consumes much
system resources and are supposed to be performed
during off-peak hours.
eSight reads MIB node information on devices
through the SNMP protocol to obtain the latest IP
address data and refresh the IP address change
information on the IP topology management page.
15.4.1.7 Which SNMP Version Is Used When eSight Collects Device Interface
Traffic?
Question
Which SNMP version is used when eSight collects device interface traffic?
Answer
When eSight collects device interface traffic, it uses the SNMP version specified for adding
the device to it.
NOTICE
eSight cannot collect interface traffic from a device that is added to it using SNMPv1. To
collect interface traffic from the device, modify SNMP parameters on the device and eSight to
add the device using SNMPv2c or a later version, and then collect interface traffic again.
Exercise caution when using SNMPV2c because it may bring information security risks. You
are advised to use SNMPv3.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
615
eSight
Operation Guide
15 FAQs
15.4.1.8 Can Devices Be Added on eSight Through the SNMP v2c When Only the
Write Community Name Rather Than the Read Community Name Is
Configured?
Question
Can devices be added on eSight through the SNMP v2c when only the write community name
rather than the read community name is configured?
Answer
NO. Devices cannot be added. See scenario 3.
Read and write community names have the following application scenarios.
l
Read community name: This parameter is used when users expect that low-level network
administrators have the read-only permission in a specified view.
l
Write community name: This parameter is used when users expect that high-level
network administrators have the read and write permissions in a specified view.
Scen
ario
Wheth
er
Read
Comm
unity
Name
Config
ured
Wheth
er
Write
Comm
unity
Name
Config
ured
Can
Be
Adde
d to
eSight
Condition for Devices Added to eSight
Scena
rio 1
√
√
√
When you add a device, the read and write
community names must be consistent with these
on the device.
Scena
rio 2
√
×
√
When you add a device, the read community name
must be consistent with that on the device.
NOTE
If only the read community name is configured, users
can only check the device information but cannot
modify the device configuration or deliver a tasks for
the device.
Scena
rio 3
×
√
×
When you add a device, the read and write
community names must be consistent with the
write community name on the device.
15.4.1.9 Can Device Icons on the Topology Page Restore to the Normal Color
After a Fault Recovery?
Question
Can device icons on the topology page restore to the normal color after a fault recovery?
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
616
eSight
Operation Guide
15 FAQs
Answer
In most cases, device icons on the topology page automatically restore to the normal color
after a fault recovery.
However, device icons cannot restore to the normal color when eSight does not support
automatic clearing of device alarms, such as the neighbor change alarm of the OSPF link.
15.4.1.10 Can eSight Correctly Parse Device Alarms Only After the trap source
Command Is Configured on Devices?
Question
Can eSight correctly parse device alarms only after the trap source command is configured
on devices?
Answer
Yes. Run the snmp-agent trap source interface-type interface-number command to specify
the source interface (device management interface) for sending Trap packets. Ensure that the
IP address of the device management interface must be consistent with the IP address added
to the NMS.
15.4.1.11 How Does eSight Ensure that Data in the eSight Database Is the Same
as the Device Resources Data? Is SNMP or Telnet Used for Device Resources
Synchronization?
Question
How does eSight ensure that data in the eSight database is the same as the device resources
data? Is SNMP or Telnet used for device resources synchronization?
Answer
eSight ensures data consistency through manual synchronization. eSight processes the alarms
to ensure that data is synchronized. eSight uses Telnet to synchronize IPSec and SNMP to
synchronize all the other device resources.
15.4.1.12 Can the eSight Manage Devices on the Public Network?
Question
Can the eSight manage devices on the public network?
Answer
The eSight can manage devices on the public network since there are reachable routes
between the eSight and the devices. After devices are automatically added to the eSight
through the automatic discovery function or manually added to the eSight, the eSight can
manage the devices. If refined management is required, you need to configure SNMP and
Telnet parameters.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
617
eSight
Operation Guide
15 FAQs
15.4.1.13 Why Is the Number of Links in the Topology View Larger than the
Number of Physical Links on the Network?
Question
After the automatic link discovery function is enabled on the eSight, the number of links
displayed in the topology view is larger than the number of physical links on the network.
Answer
Generally, a physical link has two attributes: IP link and Layer 2 link. The links automatically
discovered by the eSight are logical links. That is, a physical link with two attributes is
recorded as two links in the topology view. As a result, the number of links displayed on the
eSight is larger than the number of physical links on the network.
15.4.1.14 How Do I Enable the Telnet Client in the Windows Vista, Windows
2008, Windows 7, or Linux Operating System?
Question
How do I enable the Telnet client in the Windows Vista, Windows 2008, Windows 7, or Linux
operating system?
Answer
l
The Telnet client is disabled in the Windows Vista, Windows 2008, Windows 7, or Linux
operating system by default. To enable the Telnet client, perform the following
operations.
a.
Enable the Telnet client in the Windows operating system.
n
n
b.
Issue 01 (2016-04-30)
For the Windows 2008 operating system
1)
Choose Start > Administrative > Server Manager. The Server
Manager page is displayed.
2)
In the navigation tree of the Server Manager page, click Features.
3)
In the right area of the Server Manager page, click Add Features.
4)
Select Telnet Client from the feature list and click Next.
5)
Click Install.
6)
After the installation is complete, click Close.
For the Windows Vista or Windows 7 operating system
1)
Choose Start > Control Panel. The All Control Panel page is displayed.
2)
Select Programs and Features.
3)
In the navigation tree, click Turn Windows features on or off.
4)
Select Telnet Client.
5)
Click OK.
Configure the browser.
i.
On the menu bar of Internet Explorer, choose Tools > Internet Options.
ii.
In the Internet Options dialog box, click the Security tab.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
618
eSight
Operation Guide
15 FAQs
iii. On the Security tab page, click Custom level....
iv.
l
In the Security Settings - Internet Zone dialog box, set Automatic
prompting for ActiveX controls and Allow previously unused ActiveX
controls to run without prompt to Enable.
For the Linux operating system
a.
Enter about:config in the address bar.
b.
Add Preferences to network.protocol-handler.app.telnet.
c.
Enter a string of characters indicating the location where the script is executed, for
example, /conf/application/scripts/opm_moz_Telnet.sh.
d.
Add the the following content to the script: opm_moz_Telnet.sh #!/bin/bash
address=`echo $1 | cut -d : -f 2` konsole -e telnet ${address}.
15.4.1.15 NEs Fail to Be Added to eSight
Symptom
eSight starts abnormally and some modules cannot work properly. NEs fail to be added to
eSight and a message is displayed indicating that the device type is invalid or the access type
is not configured.
Possible Causes
The eSight server uses an operating system rather than Windows Server 2008R2, and the NE
access module fails to be loaded.
Procedure
l
Re-install eSight on a server running the Windows Server 2008R2 operating system.
----End
15.4.1.16 eSight Discovers a Link Between Two Devices Not Directly Connected
Symptom
An S2700 switch is connected to an S7706 switch through a USG firewall. LLDP is enabled
and SNMP parameters are correctly configured on the three devices. eSight discovers a direct
link between the S2700 and S7706 in the network topology.
Possible Causes
This problem may occur if configurations on the intermediate device between two indirectly
connected devices are incorrect.
Run the display lldp neighbor brief command on the S2700. The command output shows
that the S7706 is the neighbor of the S2700. The USG firewall transparently transmits LLDP
link discover packets from the S2700. As a result, eSight discovers a direct link between the
S2700 and S7706.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
619
eSight
Operation Guide
15 FAQs
Procedure
Step 1 This is a known issue on the USG firewall running the software version
V300R001C00SPC800. To solve this problem, upgrade the USG software version to
V300R001C00SPC900.
----End
Suggestion and Summary
When eSight discovers a direct link between two indirectly connected devices, check the
configurations on the intermediate device.
15.4.1.17 Users Fail to Add the USG6650 Using SNMP
Symptom
Users fail to add the USG6650 running the software version V100R001C00SPC200 to eSight.
However, eSight can successfully ping the management address of the USG6650 and the
SNMP parameters are correctly configured.
Possible Causes
The SNMP management configuration is not configured on the USG6650's management
interface.
Procedure
Step 1 Enter the USG6650's management interface view and configure the service-manage snmp
permit command on the management interface to enable SNMP on the interface.
----End
Suggestion and Summary
When adding USG6600 series firewalls to eSight, check whether eSightcan successfully ping
the firewalls, whether interzone policies are correctly configured, and whether the servicemanage snmp permit command is configured on the firewall's management interface.
15.4.1.18 Synchronization of the Device's Management Interface Fails
Symptom
When eSight synchronizes data from an S2700-9TP-EI V100R006C03, the management
interface fails to be synchronized. However, eSight can successfully synchronize management
interfaces from other S2700-9TP-EI switches running the same version.
Possible Causes
The possible causes are as follows:
l
Issue 01 (2016-04-30)
The SNMP configurations on the switch are incorrect.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
620
eSight
Operation Guide
15 FAQs
l
eSight cannot normally collect the switch's interface information using SNMP packets
due to packet loss on the network.
l
The switch does not correctly respond to the SNMP request packets from eSight.
Procedure
Step 1 Check the SNMP configurations on the switch.
Run the display current-configuration | include snmp command on the switch to check the
SNMP configurations. The command output shows that the SNMP configurations are correct
and the SNMP trap function is enabled.
Step 2 Ping the switch from eSight. Ping packets are not lost, but ICMP packets have jitters and are
unstable.
As the switch sends ICMP packets to the CPU for processing, it is suspected that the CPU is
highly occupied and not sufficient for processing protocol packets.
Step 3 Check the CPU usage of the switch. The CPU usage is higher than 50%, and the cpu-defend
information shows that some SNMP packets are lost during the NE data synchronization.
The switch does not correctly respond to the SNMP request packets from eSight because the
number of SNMP packets sent to the CPU has reached the upper limit.
Step 4 Change the number of SNMP request packets sent by eSight each time. By default, eSight
sends 10 SNMP request packets to the switch each time. Change the number to 1 or a larger
value to ensure normal data reading.
Modify the file in eSight installation directory\AppBase\etc\snmp\snmp.xml.
After the modification:
<!-- comment this config item to use get-next -->
<!-- rule: [5, 10, 100] -->
<param name="get-bulk">1</param>
Step 5 Synchronize data from the switch again. The management interface can be successfully
synchronized to eSight.
----End
Suggestion and Summary
If the monitored device traffic becomes abnormal or device data synchronization fails when
eSightt is used to manage devices, troubleshoot the problem according to the following
procedure:
l
Check whether the SNMP configurations on the switch are correct.
l
Check whether the network between eSight and the device is stable.
l
Check whether the CPU usage of the device is over high when the Huawei S-series
switch sends SNMP packets to the CPU.
l
Check the cpu-defend information to determine whether the device can normally
process protocol packets.
If the CPU usage is over high or the number of SNMP packets sent to the CPU has reached
the upper limit, change the number of SNMP request packets sent by eSight each time to
reduce the rate at which the device processes SNMP packets.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
621
eSight
Operation Guide
15 FAQs
15.4.2 Topology Management
15.4.2.1 Why Does It Take 2 to 3 Minutes for the Device Color in the eSight
Topology to Refresh After the Device Powers Off?
Question
Why does it take 2 to 3 minutes for the device color in the eSight topology to refresh after the
device powers off?
Answer
The device status refresh in the topology is determined by the eSight polling mechanism. The
default value for the device status polling interval is 1 minutes. Users can change the interval
based on the site requirements, but a too short interval may deteriorate the eSight
performance.
The device status polling principle is as follows: eSight queries the online and offline status of
devices through ICMP Ping, perceives the device status change, generates alarms when
devices go offline abnormally, and refreshes devices on the topology management and IP
topology management pages.
15.4.2.2 Which Types of Links Does eSight Support?
Question
Which types of links does eSight support?
Answer
eSight supports 3 links and Layer 2 links. The details are as follows:
Layer 3 link: An IP link is a Layer 3 link between devices. The IP addresses for interfaces at
both ends of a IP link contain a 30-bit subnet mask.
Layer 2 link: A Layer 2 link between devices can be displayed in the physical view. eSight
supports the following discovery methods.
Discovery
Method
Description
LLDP-based
A Link Layer Discovery Protocol (LLDP) link is a Layer LLDP link
that uses LLDP for discovery.
LLDP is a Layer 2 discovery protocol defined in IEEE 802.1ab.
eSight can use LLDP to obtain information about Layer 2
neighboring devices and detailed network topology information,
which helps to expand the network. In addition, eSight can use LLDP
to detect improper network configurations, which helps the network
administrator to optimize network configurations.
To use this discovery method, enable the LLDP function first.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
622
eSight
Operation Guide
15 FAQs
Discovery
Method
Description
CDP-based
Cisco Discovery Protocol (CDP) is used to discover links among
Cisco devices.
To use this discovery method, enable the CDP function first.
Based on the
MAC and ARP
forwarding table
Links can be also discovered based on the MAC and ARP forwarding
table if LLDP or CDP is not enabled. If links between devices
change, users can manually discover links.
15.4.2.3 Can eSight Automatically Add LLDP Links After LLDP Is Configured on
the Devices That Have Been Added to eSight?
Question
Can eSight automatically add LLDP links after LLDP is configured on the devices that have
been added to eSight?
Answer
If eSight receives neighbor change alarms, eSight can automatically add LLDP links.
15.4.2.4 Can LLDP and IP Links Be Automatically Added to the eSight After
Devices Are Added to the eSight? Can Automatically Added Links Be Deleted?
Question
Can LLDP and IP links be automatically added to the eSight after devices are added to the
eSight? Can automatically added links be deleted?
Answer
After devices are added to the eSight, IP links can be automatically added to the eSight. If
LLDP is enabled on the devices, LLDP links can be automatically added to the eSight.
Automatically added links can be deleted manually.
15.4.2.5 Can IP Links Be Automatically Added to the eSight After LLDP is
Enabled on the Devices?
Question
Can IP links be automatically added to the eSight after LLDP is enabled on the devices?
Answer
IP link discovery is irrelevant to the LLDP protocol; therefore, IP links can be automatically
added to the eSight after LLDP is enabled on the devices.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
623
eSight
Operation Guide
15 FAQs
15.4.2.6 Should NTDP Be Enabled for the eSight to Discover LLDP Links?
Question
Should NTDP be enabled for the eSight to discover LLDP links?
Answer
The eSight uses LLDP but not Neighbor Topology Discovery Protocol (NTDP) to discover
LLDP links; therefore, there is no need to enable NTDP.
15.4.2.7 What Do I Do If the Link Status on eSight Is Not Refreshed After a
Device Is Restarted or Wakened?
Question
What do I do if the link status on eSight is not refreshed after a device is restarted or
wakened?
Answer
Problem
Solution
The link status
is not refreshed
after the device
is restarted.
Ensure that the SNMP parameters configured on the device and the
NMS are consistent.
The link status
is not refreshed
after the device
is wakened.
Method 1: During scheduled polling, the polling interval for the
interface status is 5 minutes, after which the link status is automatically
refreshed.
Method 2: Manually synchronize the device.
NOTE
Automatic device hibernation: After the ports on the device shut down, the device
automatically hibernates. In this case, the links on eSight are disconnected.
Automatic wakeup: Make a port to enter the UP state to wake up the device.
After the device wakes up, the link UP and DOWN alarms are not reported in a
timely manner, which delays the link refresh on eSight.
15.4.2.8 How Do I Solve the Problem that Links Cannot Be Discovered?
Question
After devices are added to eSight, the links cannot be added to eSight.
Answer
Troubleshooting for LLDP Links:
Use either of the following methods to rectify the fault.
l
Issue 01 (2016-04-30)
Rectify the fault by performing the following operations on eSight.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
624
eSight
Operation Guide
15 FAQs
a.
Ensure that Telnet parameters are set consistently on the devices and eSight to
ensure normal communication.
b.
On the Discover Link page, perform the manual link discovery operation.
For devices that do not support LLDP, you are advised to configure the Side-bySide links or manually create links to view the link status between devices.
l
Rectify the fault by running commands on the devices.
a.
Run the following command to check whether LLDP is enabled globally on the
devices.
If LLDP is not enabled globally on the devices, run the following command to
enable LLDP globally.
b.
Check whether LLDP is enabled on device interfaces. If not, enable LLDP on
device interfaces.
The following figure indicates that LLDP is disabled on device interfaces.
Run the following command to enable LLDP on device interfaces.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
625
eSight
Operation Guide
15 FAQs
c.
Check whether LLDP neighbor information is displayed on the devices.
Run the following command to check whether LLDP neighbor information is
displayed on the devices. If no LLDP neighbor information is displayed on the
devices, the devices fail to detect links. Check the devices' network settings to
verify whether physical links exist. If LLDP neighbor information is displayed on
the devices, go to Step 4.
d.
Check whether the SNMP configuration is correct. The SNMP read and write
community should be set to mib-view that includes iso-view.
snmp-agent community read XXX mib-view iso-view
snmp-agent community write XXX mib-view iso-view
snmp-agent mib-view iso-view include iso
e.
After the configurations are complete, perform auto link discovery on the Link
Management page again.
Manually create links between devices that do not support LLDP and check the link status.
Troubleshooting for LLDP Links (CDP protocol):
1.
Ensure that Telnet parameters are set consistently on the devices and eSight to ensure
normal communication.
2.
Enable the CDP protocol for the devices.
configure terminal
cdp run
Check the CDP global configuration information on the devices.
show cdp
Global CDP information:
Sending CDP packets every 60 seconds
Sending a holdtime value of 180 seconds
Sending CDPv2 advertisements is enabled
Check Cisco devices that are connected to the devices.
show cdp neighbors
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
Device ID
ID
FTX1606M0FE/00000C
PORT
Issue 01 (2016-04-30)
Local Intrfce
Gig 0/0
Holdtme
164
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Capability
H
Platform
Port
NAM
MGMT
626
eSight
Operation Guide
15 FAQs
3.
On the Discover Link page, perform the manual link discovery operation.
Troubleshooting for Side-by-Side Links:
Ensure that the IP addresses and subnet masks of the interfaces at the two sides meet Side-bySide requirements.
l Ensure that the subnet mask is 255.255.255.252 (30-bit subnet mask).
l Ensure that the last two binary digits are not 00 or 11 after the IP address is converted to
a binary format.
l Ensure that the IP addresses are in the same network segment.
You can view port IP address details on the IP address management page on the NE manager.
15.4.2.9 Why Is the Color of Device Icons on the Topology Page Updated 2 or 3
Minutes After the Devices Are Powered Off?
Question
Why is the color of device icons on the topology page updated 2 or 3 minutes after the
devices are powered off?
Answer
eSight periodically updates NE status. Currently, the status polling interval is set to 1 minutes.
If the status polling interval is set to a smaller value, eSight performance may be deteriorated
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
627
eSight
Operation Guide
15 FAQs
or packet loss may occur. eSight performance baseline requirements define a status polling
interval of 1 minutes. It meets the baseline requirement.
15.4.2.10 eSight Cannot Discover Links Between Huawei and Cisco Devices?
How Do I Solve this Problem?
Question
eSight can discover links between Huawei devices or Cisco devices but cannot discover links
between Huawei and Cisco devices. Why?
Answer
Links between Huawei devices are discovered through the LLDP protocol, while links
between Cisco devices are discovered through the Cisco proprietary CDP protocol.
Huawei and Cisco devices cannot communicate with each other because they use different
protocols, and eSight cannot discover links between them.
To enable eSight to discover links between Huawei and Cisco devices, run LLDP on Cisco
devices.
15.4.2.11 After a User Changes the Connection Interface on an S-series Switch,
the Link Status Is Displayed as Faulty (in Red) on the eSight Network Topology
Symptom
After a user changes the connection interface on an S-series switch, the link status is
displayed as faulty (in red) on the eSight network topology. After the device data is
synchronized to eSight, the link status is still displayed as faulty (in red). Run the display lldp
neighbor brief command on the device to check the neighboring interface status. The
command output shows the interface before the change, but the interface status is Down.
Possible Causes
After the connection interface on the switch is changed, the LLDP neighbor connection status
is not updated in a timely manner and the link is displayed as a faulty link on eSight.
Procedure
Step 1 Run the undo lldp enable command on the switch to disable LLDP.
<Quidway> system-view
[Quidway] undo lldp enable
Warning: This command will delete the configurations of LLDP on all the
ports.Continue?[Y/N]:y
Info: Global LLDP is disabled successfully.
Step 2 Run the lldp enable command on the switch to enable LLDP again.
<Quidway> system-view
[Quidway] lldp enable
Info: Global LLDP is enabled successfully.
Step 3 Delete the red faulty link from the eSight topology and configure eSight to discover links
again.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
628
eSight
Operation Guide
15 FAQs
15.4.3 Fault Management
15.4.3.1 How Do I Solve the Problem When eSight Fails to Receive Alarms
Reported from Devices?
Symptom
A fault occurred on a device, but eSight failed to receive the alarm.
Possible Causes
l
The communication between the eSight server and the device is abnormal, preventing
eSight from receiving alarm packets reported from the device.
l
The trapip is not configured on the device or becomes invalid.
NOTICE
If the eSight IP address may be changed by an operation, such as IP address change or active/
standby switchover, you must configure the trapip again. Otherwise, eSight cannot receive
alarms reported by devices.
Procedure
Step 1 Check the communication between the eSight server and the device.
1.
Choose Monitor > Fault Management > Current Alarms from the main menu.
2.
On the Current Alarms page, check whether the Communication Between NMS And
NE Is Abnormal alarm for the device exists.
–
If yes, go to Step 2.
–
If no, go to Step 3.
Step 2 Rectify the problem of abnormal communication between the eSight server and each network
device.
1.
On the Current Alarms page, click the Communication Between NMS And NE Is
Abnormal alarm.
2.
In the Alarm Details dialog box, check Proposed repair actions, and locate and rectify
the alarm based on the suggestions.
3.
After the alarm is processed, check whether eSight receives alarms from the device.
–
If yes, the problem is solved.
–
If no, go to Step 3.
Step 3 Check whether the trapip is configured.
1.
Log in to the device and check whether the trapip is configured by referring to the
corresponding document for the device.
2.
Configure the trapip.
3.
After the trapip is configured, check whether eSight receives alarms from the device.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
629
eSight
Operation Guide
15 FAQs
–
If yes, the problem is solved.
–
If no, go to Step 4.
Step 4 Collect the information about alarm handling and contact the technical support engineers.
----End
15.4.3.2 The Interface Status Is null When eSight Receives a Link Down Alarm
from a Third-Party Device
Symptom
When using eSight to manage third-party devices, the interface status is null in a link down
alarm sent by a third-party device.
Possible Causes
The alarm from the third-party device does not carry interface running status or management
status parameters, so eSight cannot obtain the interface status and the actual interface status is
different from that in the alarm.
Procedure
l
No action is required.
----End
15.4.3.3 Why Only NMS Alarms Rather than NE Alarms Are Displayed on eSight
Symptom
Why only NMS alarms rather than NE alarms are displayed on eSight?
Possible Causes
l
After eSight is installed on the server, NEs cannot send alarms to the eSight server if the
server IP address is changed.
l
Port 162 of the eSight server is in use.
l
Change the server IP address. For details, see eSight Administrator Guide
l
Check whether port 162 is in use.
Procedure
a.
In the Run dialog box on the Windows operating system, run the netstat -aon
command to check whether port 162 exists and find its PID.
b.
Start Windows Task Manager and check the process name of the PID. If the
process name is not java, port 162 is being used by other software.
c.
Close the process of the PID in Windows Task Manager.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
630
eSight
Operation Guide
15 FAQs
15.4.3.4 How to Configure Commands on Devices to Enable the NMS to Parse
Device Alarms?
Question
How to configure commands on devices to enable the NMS to parse device alarms?
Answer
Run the snmp-agent trap source interface-type interface-number command to specify the
source interface (device management interface) for sending Trap packets. Ensure that the IP
address of the device management interface must be consistent with the IP address added to
the NMS.
15.4.3.5 eSight Cannot Receive Alarms from Devices
Symptom
eSight cannot receive alarms reported by all NEs but can only display alarms generated by
eSight.
Possible Causes
After eSight is installed, the server IP address is modified, making the eSight functions
unavailable. To use the eSight functions, modify the eSight IP address.
Procedure
l
Use the IP address modification tool to modify the eSight IP address, ensuring that it is
the same as the server IP address. For detailed operations, see the eSight Administrator
Guide.
----End
15.4.3.6 eSight Cannot Receive Alarms from Devices After SNMPv3 and Trap
Parameters Are Configured
Symptom
After SNMPv3 and Trap parameters are configured on devices and they are added to eSight,
eSight cannot receive alarms from these devices.
Possible Causes
The MIB view related parameters are configured on the devices.
Procedure
l
Configure MIB view related parameters on the devices.
The detailed configurations are as follows:
system view
snmp-agent mib-view View_ALL include iso
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
631
eSight
Operation Guide
15 FAQs
snmp-agent group v3 snmpv3usergroup privacy read-view View_ALL write-view
View_ALL notify-view View_ALL
----End
15.4.3.7 Why Device Alarms Are Displayed in the Alarm List But the Number of
Device Alarms Is Zero on the TopN Alarm Page on the eSight Homepage? What
Are the Sequence Rules for TopN Alarms?
Question
Why device alarms are displayed in the alarm list but the number of device alarms is zero on
the TopN alarm page on the eSight homepage? What are the sequence rules for TopN alarms?
Answer
If devices have no new alarms, the number of alarms is not displayed on the TopN alarm page
on the eSight homepage. The number of alarms displayed on the TopN alarm page indicates
the number of uncleared alarms, while the alarm list contains cleared and uncleared alarms.
The sequence rules for TopN alarms are as follows:
l
Collect statistical information about all current alarms (including cleared alarms) on
devices. The alarm type that has the most critical alarms is sequenced in front.
l
If the number of critical alarms is the same, the alarm type has more major alarms is
sequenced in front.
l
If the number of major alarms is the same, the alarm type has more minor alarms is
sequenced in front.
15.4.3.8 How Do I Disable Alarms Generated During Interface Polling?
Question
How do I disable alarms generated during interface polling on eSight?
Answer
After devices are added to eSight, eSight polls and reports the device interface status at
regular intervals. You can disable the interface polling function.
Step 1 Choose System > System Settings > Network Device Polling Parameter Settings.
Step 2 In the Interface Status Polling dialog box that is displayed, clear Interface Polling interval.
Step 3 Click Apply.
----End
15.4.3.9 What Do I Do If the Connection Between a SMS Modem and the Server
Fails?
Symptom
A SMS modem can connect to an HP or IBM server but fails to connect to a Huawei server.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
632
eSight
Operation Guide
15 FAQs
Possible Causes
Flow control is set on SMS modems. In normal cases, flow control is not required.
Procedure
Step 1 Install the subscriber identity module (SIM) of a mobile phone on a SMS modem.
Step 2 Use a non-Huawei server to connect to the SMS modem. Then run commands to disable flow
control through a serial port.
1.
Set the baud rate to 115200, data bit to 8, parity bit to None, and stop bit to 1.
2.
Run the AT command and press Enter.
If the command output contains OK, the SMS modem responds properly.
3.
Check whether flow control is set. Run the AT+ICF command and press Enter.
If the command output is not 0,0, flow control is set.
4.
Disable flow control. Run the AT+ICF=0,0 command and press Enter.
If the command output contains OK, the command is run successfully.
5.
Save the settings. Run the AT&W command and press Enter.
Step 3 Connect the SMS modem to the Huawei server and check whether the connection is normal.
----End
15.4.4 Performance Management
15.4.4.1 Why Is Data Displayed on eSight Different from Data Displayed on
Devices?
Answer
Data collected by eSight can be classified into two types: data collected at a specified time,
for example, CPU usage and memory usage, and data collected during an interval of a
performance task, for example, average interface rate.
There is a delay between data display on eSight and command execution on devices. Besides,
the collection interval on devices may be different from that on eSight.
It is normal that the values displayed on eSight differ from those displayed on devices after
you run commands.
15.4.4.2 Why No Alarm Is Triggered When the Counter Value Exceeds the Alarm
Threshold?
Answer
Check the value of Times for triggering an alarm.
NOTE
You can view the value of Times in Step 2: Set performance counters. on the page of setting performance
data collection tasks .
If Times is set to 3, an alarm is triggered only when the counter values exceed the alarm
threshold in three performance data collection intervals.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
633
eSight
Operation Guide
15 FAQs
15.4.4.3 Is Performance Task Controlled by a License?
Answer
Performance task is not controlled by a license. You can create multiple performance tasks.
15.4.4.4 What Is the Collection Interval of a Performance Task?
Answer
By default, eSight executes performance tasks at an interval of 15 minutes. You can specify
the interval when you create a performance task.
15.4.4.5 Can Monitored Performance Counters Be Displayed on the NE Manager
Page?
Answer
By default, CPU usage, memory usage, daily ping failures, and response duration are
displayed on the NE Manager page.
You can click the button(s) on each KPI on the NE Manager page to customize the
performance counters to be displayed.
15.4.4.6 Can eSight Automatically Create Performance Tasks? For What
Performance Counters?
Answer
eSight can automatically create performance tasks for some counters, such as CPU usage,
memory usage, and interface traffic.
eSight provides pre-defined templates in which some performance counters are defined. After
devices are added to eSight, eSight automatically creates performance tasks for these
counters.
NOTE
Choose Monitor > Performance Management > Monitoring Template from the main menu. You can view
the pre-defined templates on the page that is displayed.
15.4.4.7 Certain Performance Counters Are Lost After a Performance Collection
Task Is Executed
Symptom
On the Historical Performance Data page, it is found that a performance collection task is
successfully executed but certain performance counters in the task are lost. The collection task
is not interrupted or the task settings are not modified during the execution (for example,
Collection period is not changed), but data collected at certain time points or from a device is
not displayed.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
634
eSight
Operation Guide
15 FAQs
Possible Causes
l
The communication between the eSight and the device is abnormal, causing counter
collection to be interrupted.
l
Bandwidth between the eSight and devices is insufficient and therefore packet loss
occurs.
Procedure
Step 1 Check the exceptions of communication between the eSight server and the device.
1.
Choose Monitor > Fault Management > Current Alarms from the main menu.
2.
On the Current Alarms page, check whether the Communication Between NMS And
Device Is Abnormal alarm exists for the device.
–
If yes, go to Step 2.
–
If no, go to Step 3.
Step 2 Handle the exceptions of communication between the eSight server and the device.
1.
On the Current Alarms page, click the arrow before the Communication Between
NMS And Device Is Abnormal alarm to expand alarm details.
2.
Click More. In the Alarm Details screen that is displayed, click View details next to
Proposed repair actions and clear the alarm based on suggestions.
Step 3 Contact device maintenance engineers to confirm and solve the bandwidth problem.
NOTE
For details about eSight bandwidth requirements, see the eSight Product Description.
----End
15.4.4.8 Why Cannot I View the Real-Time Performance Data of Some Counters?
Question
When I view performance data of some counters, for example, NE average CPU usage and
Response duration, I can view data of these counters on the Performance Data page, but
cannot view real-time details of them. Why?
Answer
Take NE average CPU usage as an example. The average CPU usage of an NE is calculated
based on the CPU usage of cards on the NE. Therefore, you can only view real-time details of
CPU usage of each card but not the NE.
Take Response duration as an example. eSight does not obtain data of this counter from an
NE in real time, but calculates its value based on specific factors; therefore, you cannot view
real-time details of this counter.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
635
eSight
Operation Guide
15 FAQs
15.4.4.9 Why Device TCP and UDP Data Is Not Displayed on the Historical
Performance Data Statistics Page?
Question
Why device TCP and UDP data is not displayed on the historical performance data statistics
page?
Answer
eSight allows users to view device TCP and UDP data on the historical performance data
statistics page, but the corresponding performance monitoring tasks must be created first.
Only the data about executed monitoring tasks is displayed on the historical performance data
statistics page.
15.4.4.10 How Do I Mask Bandwidth Usage Alarms from Specified Devices?
Question
How do I mask bandwidth usage alarms from specified devices?
Answer
Bandwidth usage alarms are generated by the performance module. On the performance
monitoring template configuration page, you can set or disable bandwidth thresholds for
specified NE types.
15.4.4.11 How Do I Handle a Performance Indicator Collection Exception?
Question
How do I handle a performance indicator collection exception?
Answer
Rectify the exception as follows:
1.
Check whether the IP address of the NMS server is changed. If the IP address of the
NMS server is changed, use the IP address change tool to update the IP address and
restart the NMS.
2.
Verify that the devices are online. The NMS cannot collect performance data for offline
devices.
3.
Verify that the performance tasks created on the same device are not too many. If the
performance tasks are too many, an exception may occur.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
636
eSight
Operation Guide
15 FAQs
15.4.4.12 During indicator collection for interface traffic, why the status and
collection results for some devices are "unknown exception"?
Question
During indicator collection for interface traffic, why the status and collection results for some
devices are "unknown exception"?
Answer
Interface traffic collection is not supported by devices that enable only SNMPv1.
15.4.4.13 Why Cannot I Select Measurement Object When Creating a Task to
Monitor the Server's Storage Space Usage?
Question
Why cannot I select measurement object when creating a task to monitor the server's storage
space usage?
Answer
To monitor the server's storage space usage, eSight and the server must be reachable to each
other through SNMP. Ensure that the SNMP service has been enabled on the server and try
again.
15.4.4.14 Failed to Create a Performance Task for a ZTE Device, Displaying That
Measurement Object Cannot Be Selected
Symptom
When users create a CPU/memory usage performance collection task for a ZTE device, the
corresponding slot is empty and task creation fails.
Possible Causes
The read community named public in the device's SNMP protocol does not provide the slot
information synchronization rights.
Procedure
l
Run the following command on the device to configure the rights of the read community
named public.
snmp-server community public view AllView ro
The command format varies with the device model, and this command is used for
reference only. For the detailed command, see Command Reference of the device.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
637
eSight
Operation Guide
15 FAQs
15.4.5 Big-Screen Monitor
15.4.5.1 How Do I Set View Rotation in a Big Screen?
Question
The eSight provides big screen monitoring. Can the views rotate in a big screen?
Answer
Yes. You can use a Firefox browser, install the Firefox add-on, Tab Mix Plus (TMP), and
perform simple settings to achieve view rotation in a big screen.
NOTICE
l Do not download the add-on if view rotation is not required in a big screen.
l The add-on provides the function of automatically rotating tabs. You do not need to
download the add-on if other add-ons can provide the function.
l Before downloading the add-on, read the Privacy Policy and Legal Notices provided by
the add-on website and ensure its security to avoid legal or security risks.
l Prerequisite: You have installed a Firefox browser (Firefox 27 is recommended). Internet
Explorer and Chrome browsers do not support view rotation in a big screen.
Step 1 Install the Firefox add-on, TMP.
1.
Open the Firefox.
2.
Enter http://tmp.garyr.net/ in the address box of the browser.
3.
Click Download.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
638
eSight
Operation Guide
15 FAQs
NOTE
The TMP version displayed in the figure is the latest, which may be different from that displayed
on your page. Ignore this difference.
4.
If the This Connection is Untrusted message is displayed, click Add
Exception. Otherwise, go to f.
5.
In the Add Security Exception dialog box, click Confirm Security Exception.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
639
eSight
Operation Guide
15 FAQs
6.
On the page (https://addons.mozilla.org/en-US/firefox/addon/tab-mix-plus/), click Add
to Firefox.
NOTE
The TMP version displayed in the figure is the latest, which may be different from that displayed
on your page. Ignore this difference.
7.
Issue 01 (2016-04-30)
In the Software Installation dialog box, click Install Now.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
640
eSight
Operation Guide
15 FAQs
8.
Wait after the installation is complete and click Restart Now.
Step 2 On the Firefox, set the hot key (shortcut) of TMP Toggle tabs slideshow.
1.
Issue 01 (2016-04-30)
Choose Options from the Firefox menu bar.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
641
eSight
Operation Guide
15 FAQs
2.
In the Options dialog box, click Tabs and click Tab Mix Plus Options.
3.
In the Tab Mix Plus Options dialog box, click Menu and click the Shortcuts tab.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
642
eSight
Operation Guide
15 FAQs
4.
Issue 01 (2016-04-30)
On the Shortcuts tab page, set the shortcut of Toggle tabs slideshow. For example, if
you press Ctrl and F8, the shortcut is Ctrl+F8.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
643
eSight
Operation Guide
15 FAQs
You can set the interval (default interval: 10s) for automatically rotating tabs. The
Firefox will automatically rotate Firefox tabs at the interval.
5.
In the Tab Mix Plus Options dialog box, click Apply.
Step 3 On the eSight, check the view rotation effect in a big screen.
1.
Log in to the eSight on the Firefox browser.
2.
Choose Monitor > Monitor Tools > Big Screen Monitor from the main menu.
3.
Click in the upper part to create bit screen monitoring views (at least two views). The
following figure shows three views, in addition to the default view.
4.
In every view, click Show.
5.
Optional: Close Firefox tabs that are not big screen views so that the rotated tabs are all
big screen views.
6.
On the Firefox browser, press Ctrl+F8. The Firefox browser displays the Tab
Rotation is On message. The Firefox tabs rotate.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
644
eSight
Operation Guide
15 FAQs
NOTE
Press Ctrl+F8 again to disable tab rotation.
7.
Press F11 on the tab page that is displayed in a big screen to display all tab pages in full
screen mode.
NOTE
Press F11 again to exit the full screen mode.
----End
15.4.6 License
15.4.6.1 Is the ESN Case-sensitive for License Application
Question
Is the ESN case-sensitive for license application?
Answer
Case-sensitive.
15.4.6.2 Is the MAC Address Case-sensitive for ESN Generation?
Question
Is the MAC address case-sensitive for ESN generation?
Answer
Case-insensitive.
15.4.7 What Can I Do When I Fail to Back Up Cisco Configuration
Files?
Question
What can I do when I fail to back up Cisco configuration files?
Answer
l
If a timeout error occurs when you back up Cisco configuration files by running
commands, the Cisco device is faulty.
l
Check the FTP service password. When FTP is used to transfer Cisco configuration files,
the FTP service password cannot be set to 0 to 7.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
645
eSight
Operation Guide
15 FAQs
15.4.8 What Can I Do When Configuration File Backup Through
SNMPv3 Fails?
Question
What can I do when configuration file backup through SNMPv3 fails?
Answer
In SNMPv3, the MIB view for the read community is ViewDefault but that for the write
community and notification reporting is left blank by default. If the MIB view for the write
community is empty during the configuration file backup process, configuration file backup
fails. Run the following commands to set the SNMPv3 MIB view to ISO:
l
snmp-agent mib-view View_ALL include iso
l
snmp-agent group v3 snmpv3usergroup privacy read-view View_ALL write-view
View_ALL notify-view View_ALL
15.4.9 eSight Fails to Back Up Configuration Files of Cisco
Devices
Symptom
eSight can successfully back up configuration files of Huawei devices. However, an error
occurs when eSight backs up configuration files of Cisco devices.
Possible Causes
The privilege password in Telnet parameters on Sight differs from that configured on the
devices during configuration file backup of Cisco devices.
Procedure
Step 1 Choose Resource > Resource Management > Network Device from the main menu.
Step 2 In the navigation tree, choose Network Device.
Step 3 Click the name of a device. The NE manager page is displayed.
Step 4 In the navigation tree, choose Protocol Parameters > Telnet Parameters.
Step 5 Set the parameters and click Test.
NOTE
After you select Privilege model, set Privilege Password. The Privilege Password must be the same as that
configured on the device.
----End
Suggestion and Summary
For non-Huawei devices and WS6603, ensure that Telnet parameters on NEs and eSight are
set to the same values.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
646
eSight
Operation Guide
15 FAQs
15.4.10 Storage Management
This topic describes how to resolve issues that may occur during storage management by
using the eSight.
15.4.10.1 How Do I Troubleshoot Invalid or Slow Reporting of Messages from
Storage Device Components?
Symptom
After the information about storage device components is changed, it takes a long time for the
eSight components to update the information or the eSight components do not update the
information at all.
Possible Causes
l
The communication between the management network ports of the eSight and storage
device is abnormal.
l
The eSight default ports are shielded by a firewall.
l
The storage device report slowly.
l
Cause 1: The communication between the management network ports of the eSight and
storage device is abnormal.
Procedure
a.
b.
l
On the maintenance terminal, run the ping command on the CLI to check whether
the network link can be pinged. The destination address is the management network
IP address of the storage device.
n
If yes, go to Cause 2.
n
If no, go to b.
Reinsert or replace network cables. Then run the ping command on the CLI to
check whether the network link can be pinged. The destination address is the
management network IP address of the storage device.
n
If yes, go to d.
n
If no, go to c.
c.
Contact the network administrator to troubleshoot the network and go to d.
d.
On the eSight, check whether the storage device status is updated.
n
If yes, no further action is required.
n
If yes, go to Cause 2.
Cause 2: The NSM default ports are shielded by a firewall.
a.
b.
Check whether a firewall is enabled on the maintenance terminal.
n
If yes, go to b.
n
If no, go to e.
On the firewall management interface, check whether any of the NSM default ports
have been added to the firewall exception list.
The default NSM port numbers range from 8000 to 8090 and 8100 to 8190 and
include 7890 and 8901.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
647
eSight
Operation Guide
15 FAQs
If yes, go to c.
n
If no, go to e.
c.
Add any of the NSM default ports to the firewall exception list.
d.
On the eSight, check whether the storage device status is updated.
n
If yes, no further action is required.
n
If no, go to e.
e.
Go to the list of the devices of the specific type and click Refresh.
f.
After devices are refreshed, check whether the device component information is
updated.
g.
l
n
n
If yes, no further action is required.
n
If no, go to g.
Keep the fault environment intact and contact technical support engineers.
Cause 3: The storage device report slowly.
a.
b.
Check whether any of the storage device have finished the report.
n
If yes, no further action is required.
n
If no, go to b.
Go to the list of the devices of the specific type and click Refresh, to synchronize
the device information.
----End
15.4.10.2 eSight Reports User Account Lockout When Discovering a Storage
Device
Symptom
After discovering a device, the eSight reports "The user account has been locked. Please try
later.".
Possible Causes
1.
An incorrect user name or password has been used to scan for devices.
2.
The device is discovered, but the user's password for logging in to the device is changed.
Procedure
Step 1 If an administrator attempts to discover a device using an incorrect user name or password,
the device locks the user name for 15 minutes. In that case, the administrator has to wait 15
minutes until the device unlocks the user account. The administrator can then enter the correct
user name and password to discover the device.
Step 2 A password change on the device also leads to user account lockout. In that case, choose
Resource > Resource Management > Storage Device to find the device and clicks Settings
> Protocol Parameters to change the user account, password, and SSL. Then wait 15
minutes for the device to unlock the user account.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
648
eSight
Operation Guide
15 FAQs
15.4.10.3 Why Is a Storage Device Offline After Being Discovered Based on the
SNMP Protocol?
Symptom
Storage devices and Fibre Channel switches are online after being discovered based on the
SNMP protocol. However, after a period, those devices are displayed to be offline on the ISM.
Actually, they do not go offline.
Possible Causes
The network speed is slow. As a result, pinging device times out every five minutes and
devices are set to the offline state.
Procedure
Step 1 Choose Resource > Resource Management > Storage Device.
Step 2 Click the name of the device. The page showing details about the device is displayed.
Step 3 In the navigation tree, choose Settings > Protocol Parameters.
Step 4 Set Timeout to 10 seconds.
Step 5 Click Test.
l
If the test result is positive, click Apply. No further operation is required.
l
If the test result is negative, add 10 seconds to the value of Timeout and go to Step 5.
----End
15.4.10.4 Faults May Fail to Be Located if Logs Are Printed Too Quickly
Symptom
If more than 100 devices are managed and the system is running for over two weeks, some
error logs are overwritten. As a result, faults may fail to be located.
Possible Causes
If a system manages a large number of devices, background tasks, such as device polling and
component updating, generate a lot of logs.
Fault Diagnosis
By default, eSight prints error logs or logs of higher levels. Therefore, the system's reliability
is not adversely affected by the log printing. This problem only affects the locating of
component faults.
Procedure
Step 1 After this problem occurs, export all logs. For details about how to export logs, see the eSight
Administrator Guide.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
649
eSight
Operation Guide
15 FAQs
15.4.10.5 Discovery of Devices by IP Address Segment Takes a Long Period of
Time
Symptom
The discovery of devices by IP address segment takes a long period of time. For example, if
the IP address segment contains 100 IP addresses and two discovery protocols are selected, it
takes three hours to discover 10 or several more devices; if the IP address segment contains
254 IP addresses and one discovery protocol is selected, it takes one hour.
Possible Causes
The device discovery is implemented in single thread and serial mode. Therefore, if the
number of devices that need to be discovered is large, the discovery takes a long period of
time.
Fault Diagnosis
This problem adversely affects user experience.
Procedure
Step 1 Clicking Add Resource to add devices one by one can improve the user experience.
Step 2 If you use the Auto Discovery function, enter an IP address segment that contains a small
number of IP addresses and use one discovery protocol.
----End
15.4.10.6 No Data Is Unavailable in the Statistical Object Lists of Storage Devices
Symptom
Storage devices have historical performance statistics and they are normal. However, the
statistics are not displayed in the statistical object lists of storage devices.
Choose Monitor > Performance Management > Performance Collection Task.
In the left navigation tree, click and view statistical objects, as shown in Figure 15-12.
Figure 15-12 No statistics are displayed.
Possible Causes
Historical performance statistics of storage devices are read from performance files. The
performance file generation requires a long period. If the collection period is short, the
historical performance statistics cannot be displayed in a timely manner.
Fault Diagnosis
None.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
650
eSight
Operation Guide
15 FAQs
Procedure
Step 1 None.
----End
15.4.10.7 How Can I Troubleshoot the Unavailability of the Device Management
Function Caused by Outdated JRE of Firefox 27
Symptom
On the eSight interface, the device management function is unavailable when you click
Device Manager on Firefox 27 or later.
NOTE
This problem does not occur if Internet Explorer 1.6.0_20 or later is used. For security purposes, you are
advised to use JRE 1.7.0_51(7u51) or later.
Possible Causes
By default, Firefox 27 mask insecure JRE plug-ins. As a result, the device management
function becomes unavailable after you click Device Manager.
Fault Diagnosis
If you are prompted with a message indicating that there is no proper plug-in when using the
device management function, perform the following steps to check the version of the current
JRE.
1.
Go to the operating system command-line mode and run java –version to view the JRE
version.
2.
Open Firefox 27 and choose Add-ons Manager > Plugins to check whether JRE is
loaded to Firefox.
Procedure
Step 1 Log in to http://www.oracle.com and download JRE1.7.0_51(7u51).
Step 2 Install JRE on the client.
Step 3 Check whether JRE is activated.
1.
Go to the operating system command-line mode and run java –version to view the JRE
version.
2.
Choose Start > Control Panel and click Java. The page for Java settings is displayed.
3.
Click the Java tab and View. On the User and System tab pages, select the newly
installed JRE and select Enable.
4.
Open Firefox 27 and choose Add-ons Manager > Plugins to check whether JRE is
activated.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
651
eSight
Operation Guide
15 FAQs
15.4.10.8 What Can I Do If No Data Is Displayed When Performance Statistics Is
Checked?
Symptom
When performance statistics is checked on the network management interface, no data is
displayed.
Possible Causes
The performance monitoring function of the storage system is not enabled.
Fault Diagnosis
Rectify the fault based on the causes.
Procedure
l
The performance monitoring function of the storage system is not enabled.
a.
On the menu bar, choose Resource > Resource Management > Storage Device.
b.
In the navigation tree, choose Unified Storage. The Unified Storage page is
displayed.
c.
In the right function pane, click Device Management.
d.
Enable the performance monitoring function, ensure that performance files of the
storage system can be generated properly. For details, see the OceanStor
DeviceManager Online Help.
----End
15.4.10.9 Failed to Obtain Storage Device Details
Symptom
A storage device has been successfully added but its details cannot be obtained.
Possible Causes
l
An SQL Server database in eSight identifies all IQNs as case-insensitive. In this case,
case-sensitive IQNs of iSCSI initiators on the storage device are identified as the same,
so the unique initiator identifiers consisting of these case-insensitive IQNs conflict in the
database. As a result, storage device details cannot be obtained.
l
Some IQNs of iSCSI host initiators are long and the length of unique initiator identifiers
consisting of these IQNs exceeds 255 characters (the upper limit of string length in
eSight). As a result, the unique initiator identifiers cannot be stored into the database and
therefore storage device details cannot be obtained.
l
Cause 1: An SQL Server database in eSight identifies all IQNs as case-insensitive. In
this case, case-sensitive IQNs of iSCSI initiators on the storage device are identified as
the same, so the unique initiator identifiers consisting of these case-insensitive IQNs
conflict in the database. As a result, storage device details cannot be obtained.
Procedure
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
652
eSight
Operation Guide
15 FAQs
a.
n
If yes, go to b.
n
If no, go to cause 2.
b.
Modify the initiator IQNs and ensure that the IQNs are different when being
identified in case-insensitive way.
c.
Rediscover or refresh the storage device and check whether its details can be
obtained.
d.
l
Check whether any IQNs of the iSCSI initiators are the same in the storage device
when being identified in case-insensitive way.
n
If yes, no further action is required.
n
If no, go to d.
Collect related information and contact technical support engineers for further
handling.
Cause 2: Some IQNs of iSCSI host initiators are long and the length of unique initiator
identifiers consisting of these IQNs exceeds 255 characters (the upper limit of string
length in eSight). As a result, the unique initiator identifiers cannot be stored into the
database and therefore storage device details cannot be obtained.
a.
Check whether the length of any IQN of an iSCSI initiator exceeds 190 characters.
n
If yes, go to b.
n
If no, go to d.
b.
Modify the initiator IQN and ensure that the IQN length is smaller than 190
characters.
c.
Rediscover or refresh the storage device and check whether its details can be
obtained.
d.
n
If yes, no further action is required.
n
If no, go to d.
Collect related information and contact technical support engineers for further
handling.
----End
15.4.10.10 How Can I Troubleshoot the Unavailability of Ports Within the Range
of 8000-8090, 7890, 8901 Specified in the Listening Port Matrix When eSight Is
Running Normally
Question
After storage devices are added to eSight, the storage devices cannot listen ports within the
range of 8000-8090, 7890, 8901.
Answer
1.
Check whether devices are connected to eSight using SMI-S. Only devices that are
connected to eSight using SMI-S can listen a specific range of ports.
2.
Check whether the communication between eSight and storage devices is normal. Ports
can be listened only when the communication is normal.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
653
eSight
Operation Guide
15 FAQs
15.4.11 Server Management
This topic describes how to resolve issues that may occur during server management by using
the eSight.
15.4.11.1 eSight Failed to Receive Device Alarms from a Managed Server
Symptom
The eSight fails to receive device alarms from a managed server.
Possible Causes
l
The server has not registered a trap IP address with its baseboard management controller
(BMC).
l
The trap mode of the server is not set to OID.
l
When the trap version of the E6000 is set to v3, the authorization and authentication
protocol is not set to Secure Hash Algorithm (SHA) and the data encryption protocol is
not set to Advanced Encryption Standard (AES).
Procedure
Step 1 Log in to the server web user interface (WebUI).
Step 2 In the navigation bar, choose Configuration > Log and Alarm.
Step 3 Set trap parameters.
1.
In the right function pane, choose Trap State.
2.
Set Trap Mode to OID.
3.
Enable the trap function and set Trap IP Address and Trap Port.
Step 4 Confirm and save the settings.
Step 5 To manage the E6000, set the authorization and authentication protocol and the data
encryption protocol.
1.
Log in to the E6000 WebUI.
2.
Set the authorization and authentication protocol to SHA.
3.
Set the data encryption protocol to AES.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
654
eSight
Operation Guide
15 FAQs
4.
Confirm and save the settings.
----End
15.4.11.2 eSight Ran Slowly or Stopped Responding
Symptom
The eSight runs slowly or stops responding.
Possible Causes
Many eSight pages are opened on the browser.
Procedure
Step 1 Close unnecessary eSight pages on the browser.
Step 2 If the fault persists after eSight pages are closed, close the browser and log in to the eSight
again.
----End
15.4.11.3 Failed to Switch from the eSight to the Management WebUI of a ThirdParty Server
Symptom
A user fails to switch from the eSight to the management web user interface (WebUI) of a
third-party server.
Possible Causes
The default web network management link on the eSight is incorrect.
Procedure
Step 1 Open the device information customization page.
1.
On the menu bar, choose System > Administration > Custom Server Management.
2.
In the navigation tree, choose Device Information Customization.
Step 2 Change the web network management link.
next to the target device.
1.
In the function pane, click
2.
Change the web network management link in the Web NM Link text box.
3.
Click OK.
A success message is displayed.
4.
Click OK.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
655
eSight
Operation Guide
15 FAQs
15.4.11.4 Failed to Add a Server on eSight After the Server IP Address Is Changed
Symptom
A server is failed to add on eSight after the server IP address is changed.
Possible Causes
The existing server is not deleted.
Procedure
Step 1 Delete the existing server on eSight.
NOTE
This topic uses a rack server as an example to describe how to delete the existing rack server on eSight
as required.
1.
On the menu bar, choose Resource > Resource Management > Server.
2.
In the navigation tree, choose Server > Rack Server.
3.
In the function pane, select the existing server.
4.
Click Delete.
5.
Click OK.
Step 2 On the menu bar, choose Resource > Add Resource > Add Resource.
The Add Resource page is displayed, add a server as required.
----End
15.4.11.5 eSight Failed to Add a Server
Symptom
A message indicating error SNMP parameters is displayed when eSight fails to add a server.
Possible Causes
eSight fails to add a server due to error SNMP parameters.
Procedure
Step 1 Log in to the server WebUI.
Step 2 Check whether the SNMP parameters are correct.
l
Add a server using SNMPv1 or SNMPv2c.
–
Issue 01 (2016-04-30)
The value of Port must be the same as the port number of SNMP Agent.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
656
eSight
Operation Guide
15 FAQs
l
–
The value of Read community must be the same as that of Read-Only
Community.
–
The value of Write community must be the same as that of Read-Write
Community.
Add a server using SNMPv3.
–
Issue 01 (2016-04-30)
The value of Port must be the same as the port number of SNMP Agent.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
657
eSight
Operation Guide
Issue 01 (2016-04-30)
15 FAQs
–
The value of Username must be the same as the user name for logging in to the
server.
–
The value of Authentication protocol must be the same as that of SNMP V3
Authentication Protocol.
–
The value of Data encryption protocol must be the same as that of SNMP V3
Privacy Protocol.
–
The value of Authentication password must be the same as that of Current User
Password for user root and contains at least eight characters.
–
The value of Data encryption password must be the same as that of Current User
Password for user root and contains at least eight characters.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
658
eSight
Operation Guide
15 FAQs
Step 3 Add the server after changing the SNMP parameters.
----End
15.4.11.6 Alarms Configured to Be Masked Are Still Displayed on the Current
Alarms Page
Symptom
Although you have configured alarms to be masked, the alarms are still displayed on the
Current Alarms page.
Possible Causes
The alarm source is a server blade.
Procedure
Step 1 eSight masks only server chassis alarms but not blade alarms. After you configure blade
alarms to be masked, the alarms are still displayed on the Current Alarms page.
----End
15.4.11.7 Data Loss During Real-Time Performance Collection of a Server
Symptom
Data loss occurs during real-time performance collection of a server.
Possible Causes
The real-time performance collection period is set to a small value.
Procedure
Step 1 Change the real-time performance collection period to a larger value (30 seconds is
recommended).
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
659
eSight
Operation Guide
15 FAQs
15.5 Others
15.5.1 How Do I Prevent Home Page Settings from Being
Replaced?
Question
When an account is used to set the home page on multiple clients at the same time, the
settings performed on one client may be replaced by the settings performed on another client.
How can I prevent this issue?
Answer
When an account is used to set the home page on multiple clients at the same time, the
settings performed on one client may be replaced by the settings performed on another client.
Before setting the home page, you are advised to refresh the home page to ensure that settings
performed on other clients are synchronized to the current client. This prevents accidental
deletion of the settings performed on other clients caused by unsynchronized settings.
15.5.2 How Do I Install an SSL Certificate for the Email Server?
Question
An Secure Sockets Layer (SSL) certificate is required when SSL is used to connect the eSight
system to the email server. How do I install the SSL certificate?
Answer
Step 1 Obtain the SSL certificate for the email server.
Export the SSL certificate from the email server.
NOTE
The eSight does not support SSL V3 certificates.
Step 2 Copy the SSL certificate to a temporary directory of the eSight server.
Step 3 Install the SSL certificate to the specified directory.
NOTE
l Before performing the operation, ensure that you have the read and write permissions of the eSight
installation directory/AppBase/etc/certificate directory.
l keytool is a Java runtime environment (JRE) command. Ensure that the command is executable.
l
Windows
a.
In the command line window, run the following commands:
keytool -import -file SSL certificate directory/SSL certificate name -keystore
eSight installation directory/AppBase/etc/certificate/trustKeystore -storepass
password of SSL certificate
b.
Issue 01 (2016-04-30)
Check whether a prompt message is displayed, asking you whether to display the
trust certificate.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
660
eSight
Operation Guide
15 FAQs
n
If the prompt is displayed, enter Y at the prompt.
n
If the prompt is not displayed, the JDK is not installed. Run the following
command to install it:
cd /d eSight installation directory/AppBase/jre/bin
keytool -import -file SSL certificate directory/SSL certificate name -keystore
eSight installation directory/AppBase/etc/certificate/trustKeystore storepass password of SSL certificate
When a prompt is displayed, asking you whether to display the trust certificate,
enter Y.
l
Linux
a.
In the command line window, run the following commands:
keytool -import -file SSL certificate directory/SSL certificate name -keystore
eSight installation directory/AppBase/etc/certificate/trustKeystore -storepass
password of SSL certificate
b.
Check whether a prompt message is displayed, asking you whether to display the
trust certificate.
n
If the prompt is displayed, enter Y at the prompt.
n
If the prompt is not displayed, the JDK is not installed. Run the following
command to install it:
cd eSight installation directory/AppBase/jre/bin
./keytool -import -file SSL certificate directory/SSL certificate name keystore eSight installation directory/AppBase/etc/certificate/
trustKeystore -storepass password of SSL certificate
When a prompt is displayed, asking you whether to display the trust certificate,
enter Y.
c.
Run the following command to modify the certificate permission to ensure the
certificate security:
chmod 600 eSight installation directory/AppBase/etc/certificate/trustKeystore
Step 4 Restart the eSight.
----End
15.5.3 eSight System Becomes Faulty After the Database User
Password Is Changed Using a Database Tool
Question
After I use a database tool instead the maintenance tool to change the password for a NMS
user or administrators of the eSight database, some problems occur on the eSight system. For
example, I cannot start the eSight using the maintenance tool. How do I resolve the problems?
Answer
The maintenance tool of the eSight system changes the database access password and the
database password. Other database tools, however, change only the database password. Use
the maintenance tool instead of a database tool to change the password for a NMS user or
administrators of the database. Otherwise, the following problems may occur:
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
661
eSight
Operation Guide
15 FAQs
l
The eSight system cannot be started using the maintenance tool if the password for a
database NMS user is changed.
l
The password for a database NMS user cannot be changed using the maintenance tool if
the password for the administrator is changed.
When these problems occur, perform the following steps to change the password used for
database access to maintain password consistency:
Step 1 On the maintenance tool, choose System > DB Password Management from the main menu.
Step 2 Change the database access password to the same as the database password.
l
For the eSight system startup failure
On the Database NMS User password area of the DB Password Management
window, set parameters listed in Table 15-1 in the displayed window.
Table 15-1 Parameters required for changing the password for a database NMS user
l
Parameter
Description
Old Password
Enter the NMS user password used for database access.
New Password
Enter the database NMS user password changed using the
database tool.
Confirm Password
Enter the new password again for confirmation.
For the failure to change the password for a database NMS user using the maintenance
tool
On the Database System Administrator password area of the DB Password
Management window, set parameters listed in Table 15-2 in the displayed window.
Table 15-2 Parameters required for changing the password for a administrator
Parameter
Description
Old Password
Enter the administrator password used for database access.
New Password
Enter the administrator password changed using the
database tool.
Confirm Password
Enter the new password again for confirmation.
Step 3 Click Apply.
Step 4 For the eSight startup failure, start the eSight again. For the failure to change the password for
a common user using the maintenance tool, change the password for the database NMS user
again.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
662
eSight
Operation Guide
15 FAQs
15.5.4 How Do I Prevent Problems Caused by eSight Server
System Time Change?
Symptom
If the eSight server system time is changed, eSight may fail to work. For example, the
topology is not refreshed.
Procedure
Step 1 Stop eSight services.
Step 2 Restart eSight services.
----End
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
663
eSight
Operation Guide
A Glossary
A
Glossary
A
AA
See access agent.
AAA
See Authentication, Authorization and Accounting.
ADAC
automatically detected and automatically cleared
ADMC
automatically detected and manually cleared
ARP
See Address Resolution Protocol.
AS
See autonomous system.
AT
See application terminated.
ATAE
See Advanced Telecommunications Application Environment.
Address Resolution
Protocol (ARP)
An Internet Protocol used to map IP addresses to MAC addresses. The ARP protocol
enables hosts and routers to determine link layer addresses through ARP requests and
responses. The address resolution is a process by which the host converts the target IP
address into a target MAC address before transmitting a frame. The basic function of
ARP is to use the target equipment's IP address to query its MAC address.
Advanced
Telecommunications
Application
Environment (ATAE)
A carrier-class processing platform that is designed to meet the service application
requirement of high performance, high specialization, and high integration.
Allow
A header field, which gives a list of request types that can all be supported by the
proxy server.
Authentication,
Authorization and
Accounting (AAA)
A mechanism for configuring authentication, authorization, and accounting security
services. Authentication refers to the verification of user identities and the related
network services; authorization refers to the granting of network services to users
according to authentication results; and accounting refers to the tracking of the
consumption of network services by users.
access
A link between the customer and the telecommunication network. Many technologies,
such as the copper wire, optical fiber, mobile, microwave and satellite, are used for
access.
access agent (AA)
A device that is responsible for PC client access. PC clients obtain login information
from the AA and use other service capabilities through the AA.
Issue 01 (2016-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
664
eSight
Operation Guide
A Glossary
active
A state in the life cycle of a subscriber. After being first activated, a subscriber enters
the active state. A subscriber in the active state can use all basic telecom services
provided by the system, such as making or answering calls, and sending or receiving
short messages.
address
A number that identifies the location of a device in a network or the location on the
hard disk or the memory, such as the IPv4 address or IPv6 address of a network entity.
administrator
A user who has authority to access all EMLCore product management domains. This
user has access to the entire network and all management functi