STMS V12 Getting Started and Administration Guide
STMS V12 Getting Started and Administration Guide
Ribbon's qualification lab is accredited by A2LA for competence in electrical testing according to the International
Standard ISO IEC 17025-2017 General Requirements for the Competence of Testing and Calibration Laboratories.\
Catalog #: X66945
Drawing #: 497006-2412-148-A00
Contents
STMS Getting Started and Administration Guide .......................................................... 1
STMS Getting Started and Administration Guide Revision History ............................. 2
Introducing STMS.............................................................................................................. 3
STMS Key Features Overview .........................................................................................................................3
Inventory Information in STMS................................................................................................................... 4
Fault Management with the STMS ............................................................................................................. 4
Configuration Management with the STMS................................................................................................ 5
PM TCA Reports......................................................................................................................................... 6
Security Features at the NE Level.............................................................................................................. 7
Built-In Test................................................................................................................................................. 7
STMS Ease of Use..................................................................................................................................... 7
Network Communications Control.............................................................................................................. 8
Plug and Play ........................................................................................................................................... 10
STMS System Overview and Architecture .....................................................................................................10
STMS System Architecture .......................................................................................................................11
Database Backup Using RDR ........................................................................................................................12
STMS Server and STMS Client Startup ......................................................................... 13
STMS Server..................................................................................................................................................13
Start the STMS Server as a Daemon....................................................................................................... 13
Start the STMS Server Not as a Daemon ................................................................................................ 13
Start the STMS Server as an STMS User................................................................................................ 14
SSH Connections Option ...............................................................................................................................14
Set Up SSH in Windows........................................................................................................................... 14
Set Up SSH in Solaris .............................................................................................................................. 15
Start and Log in to the STMS Client...............................................................................................................15
STMS Client Settings ...................................................................................................... 20
Define View Preferences ................................................................................................................................20
Alarm Preferences..........................................................................................................................................22
Set the Alarm View Preferences in the STMS.......................................................................................... 23
Set the Audio Notification Preferences in the STMS ................................................................................ 23
Add an Alarm Notification in the STMS .................................................................................................... 23
Edit an Alarm Notification in the STMS .................................................................................................... 25
Delete an Alarm Notification in the STMS ................................................................................................ 25
Reorder Alarm Notifications in the STMS................................................................................................. 26
Introducing STMS
Shade Tree Management System (STMS) is the element management, service provisioning, and
monitoring solution for the Apollo series. STMS provides fault, configuration, administration, performance,
and security (FCAPS) management, as well as powerful service management capabilities for a complete
suite of Wavelength Division Multiplexing (WDM) and Optical Transport Network (OTN) services. The main
STMS features include:
• Integrated management: STMS includes smooth integration with the LightSOFT® management
system. STMS can also be operated in standalone mode on a Linux PC, a cost-effective management
option for small networks.
• Intelligent troubleshooting: STMS offers advanced troubleshooting tools to detect and resolve
network issues, such as Ethernet, WDM, and OTN service failures, misconfiguration, incorrect
software versions, and disconnected interfaces. STMS reduces the time to provision, deploy, and
define network elements, cards and interfaces by providing a user-friendly GUI to simplify the
configuration process.
• Efficient preconfiguration: STMS supports preconfiguration of cards and interfaces. After installing
the actual equipment, STMS verifies the configuration, and sends notification if there is a configuration
mismatch.
• Comprehensive reports: STMS gathers, processes, and stores statistical information that is
collected by the network elements to generate complete and accurate performance management
reports.
Refer also to:
• STMS Key Features Overview
• STMS System Overview and Architecture
• Database Backup Using RDR
Note
The MTNM CORBA-based interface (NBI) is a fully integrated add-on capability that is
available on a cost basis. The feature is available if a license has been purchased, is current,
and has not exceeded its limits (see Manage Licenses).
• Comprehensive Network Planning: The comprehensive and accurate data stored in the STMS
database enable effective network planning. Managed device, inventory, and available slot reports
assist capacity planning and inventory control. Device-monitoring capabilities prevent problems from
reaching a critical stage by providing proactive monitoring of components, such as CPU utilization, file
system size, memory usage, and device temperature, sending alerts when thresholds are exceeded.
Refer also to:
• Inventory Information in STMS
• Fault Management with the STMS
• Configuration Management with the STMS
• PM TCA Reports
• Security Features at the NE Level
• Built-In Test
• STMS Ease of Use
• Network Communications Control
• Plug and Play
• Non-alarm notifications: Notify about changes in the system. These notifications are sent as
automatic output messages to the external management system without waiting for a stabilization
period.
Both alarm and non-alarm notifications are reported to STMS as well as to external management systems
using an SNMP agent. A system of severity levels is used to prioritize the alarms in the order of urgency:
• Critical: Service affecting. Always requires immediate attention to restore service. Used when the
managed entity is totally out of service and its capability must be restored.
• Major: Service affecting. Gives notice that attention is required, but it is not an immediate emergency.
• Minor: Non service affecting. Requires corrective action in order to prevent a more serious fault.
• Warning: Non service affecting. A situation which is not the cause of traffic stoppage or degradation,
but which an operator may still want to be notified. Warning alarms use the minor LEDs and relays.
• Non-alarmed: Non service affecting. Extended severity for transient condition reports (such as
protection switch events, timing-switching, or 1-day TCA reports).
Additional optional methods can be provided for alarm control and display:
• Terminal displays, including LEDs that indicate malfunctions of specific plug-in units or transmission
paths.
• Alarm contacts, delivering critical, major, and minor alarm indications to the station alarm bus
• Four input alarm and four output alarm dry contacts, to be explicitly defined by the user. By default
there is no configuration of external dry contacts.
• Rack alarm buzzer with station acknowledgment mechanism.
• Alarm server, delivering network aggregated alarms from LightSOFT to the operator's Central
Monitoring Station (CMS).
• Alarm inputs from in-station devices (such as security sensors, fire detectors, external monitoring
equipment) and other in-station telecommunication equipment (like flexible multiplexers and DWDM
units).
Each managed entity (such as a card, port, or interface) that supports fault management functionality works
with a severity profile, a list of all alarm and non-alarm notifications that can be suppressed. Using the
severity profile, a user can modify the severity of each alarm and suppress reporting of selected alarm or
non-alarm reports. Apollo NEs also provide log functionality:
• All reported alarms are logged to a persistent NE alarm log.
• All non-alarm reports (if so defined in the severity profile) are logged to a persistent NE event log.
There are several levels of alarm report suppression:
• Per specific alarm: Suppressed by changing the reporting attribute of the specific alarm in a specific
severity profile.
• Per managed entity: Suppressed by changing the alarm master mask attribute value.
• AINS: Suppressed until getting into service for the first time (future).
Current reported alarms can be retrieved via CLI, STMS, and SNMP requests. In addition, CLI and STMS
allow retrieval of reported and non-reported alarm conditions per managed entity.
User Configuration
A required part of Apollo platform installation is for you to define parameter settings for I/O and fabric card
slots. Common equipment cards (such as controller, power supply, and fan cards) are implicitly defined by
the NE.
In addition, there are other instances when you must define equipment entities. For example, cards with
unique multiple configurations for supported entities need manual configuration. User configuration is also
required for preplanned and manual configuration.
Implicit Configuration
Implicit configuration is the ability of an NE to define equipment and/or supported entities without operator
intervention. This feature is supported by the Apollo as follows:
• Implicit equipment configuration is supported for the main service shelf, including components
requiring minimal equipment configuration. As part of implicit configuration, the main shelf defines the
minimal equipment configuration, including its RCP, fan unit (FCM) and power supplies (PFMs),
according to their default values. In addition, the main shelf defines RCPs of subtending shelves
according to their default values, and controller cards of subtending passive shelves.
• Cards with unique configuration of supported entities enable the user to simply set the card type
and all ports, and the supported entities are implicitly defined according to their default values. This
applies to the passive optics cards (e.g., DCFs, splitters/couplers), amplifiers, some ports in Add-
ROADMs, and service cards with non-FRU transceivers. This category also includes cards with
multiple configurations. In this case, the user sets the card type, and the card is defined according to
its default values; the supported entities are not defined. This would include, for example, client cards,
line cards, and transponders.
• Ports with unique configuration of supported entities enable the user to define the port type, and
all supported entities are implicitly defined. This would include, for example, service cards, data cards,
and ROADMs.
PM TCA Reports
Apollo as a transport system provides performance monitoring interval collection on its transport entities,
such as ports and interfaces. By default, performance monitoring is enabled, and performance monitoring
data is collected for L1 service cards and photonic cards with monitoring points. Apollo also supports
performance monitoring on the OSC-2M and OSC-100M ports used for in-band management.
The NE collects performance monitoring information every 15 minutes, as well as compiling historic
performance monitoring data for each entity at the end of each day. The collected information is stored in
nonvolatile memory in the NE in a single zipped file for each performance monitoring interval.
The NE can store up to 95 historical performance monitoring files for 15-minute intervals and seven historical
performance monitoring files for 1-day intervals. Any external managed system can acquire the performance
monitoring files from the NE.
Performance monitoring profiles contain a list of performance monitoring threshold setting values defined for
each technology. Only entities supporting performance monitoring interval functionality can be associated
with a performance monitoring profile.
Performance monitoring TCA reports follow transport system standards as follows:
• 15-minute TCAs are reported as standing condition reports with alarm severity types.
• 1-day TCAs are reported as transient condition reports with the non-alarmed severity type.
• Performance monitoring TCAs are defined in the severity profile for each technology, following the
alarms and events approach.
• Current interval and historical performance monitoring information per entity can be retrieved upon
user request. Current intervals and historical intervals have a suspect flag attribute indicating if the
interval information is reliable or not.
• The flag is enabled by configuration changes on the monitored entities, such as resetting counters
and performance monitoring updates.
For more information, see the Performance Monitoring chapter in the Performance Monitoring Guide.
Built-In Test
STMS provides Built-In Testing (BIT).
The BIT hardware and its related software assist in identification of any faulty card in the system. BIT checks
are performed during power up and at periodic intervals afterwards.
There are three BIT levels:
• BIT failed: Card devices don't work (or partially work); service is affected.
• BIT degraded: Service might be somewhat affected (for example, higher degree of BER).
• BIT slightly degraded: Service not affected but there is some unusual or non-optimal behavior (for
example, a heated device). This level usually doesn't require immediate technician attention.
Unsuccessful BIT raises an alarm according to the BIT level, including a list of all associated error codes and
some explanation. Based on this information, the technician decides how to fix the problem.
Channel Mixing
Communication Channels (MCC). You can create/edit/change a Management VLAN service directly through
the Create L2VPN Service window in LightSOFT.
Northbound API
The NB-API consists of a set of Enterprise JavaBean (EJB) interfaces that represent the main access points
for creating, reading, updating, and deleting objects within the STMS Domain. Java applications can use the
EJB interfaces via Java Remote Method Invocation (RMI).
CORBA Stubs
STMS generates CORBA stubs to implement a CORBA interface to Apollo NEs. CORBA provides powerful
architectural advantages over SNMP-based systems, including increased efficiency through reduced calls,
enhanced reliability using TCP/IP, and secure communications via SSL.
GUI Layer
STMS (server-side software) implements a sophisticated GUI layer to support the powerful features and
functions of the Java-based STMS Client (Java 8 only).
Event Manager
Implemented on top of the Java Message Service (JMS), the event manager is responsible for receiving
event messages from Apollo NEs and routing them to subscribed client applications. Messages can pertain
to alarms, device trace events, and state change events.
Note
For an STMS backup, the following items are not maintained in the DB and must be stored and
backed up separately on a Network File System (NFS) server that is mounted under the root directory
of the STMS server:
• Historical counters
• Software builds
If the NFS server is mounted at the same point in the file system, the standby STMS can open
these items.
STMS Server
This section explains how to start the STMS server, including the following topics:
• Start the STMS Server as a Daemon
• Start the STMS Server Not as a Daemon
• Start the STMS Server as an STMS User
Note
You can also restart the STMS server on Solaris systems. This process stops the server and
immediately restarts it.
Start
1. Open a shell prompt.
2. At the prompt, change the working directory to the directory where STMS will be installed.
3. At the root prompt, type one of the following commands:
◦ /etc/init.d/stms start
◦ /etc/init.d/stms restart
4. Press ENTER.
The STMS server starts/restarts as a daemon.
Note
On some systems, the script might be at /etc/rc.d/init.d/stms.
Start
1. Open a shell prompt.
2. At the prompt, change the working directory to the directory where STMS will be installed.
3. At the root prompt, type:
/opt/STMS/sh/STMS start
4. Press ENTER.
The STMS server starts.
Notes
◦ To check the status of the STMS server, type: /opt/STMS/sh/STMS stat
◦ To stop the STMS server, type: /opt/STMS/sh/STMS stop
Note
The default installation location for PuTTY is C:\\Program Files\\PuTTY.
If you want to install PuTTY in a different folder, adjust the instructions in the procedure.
Start
1. Download PuTTY from the internet site.
2. Add C:\\Program Files\\PuTTY to your windows path variable by doing the following:
◦ Go to the Control panel and click System.
◦ Click the Advanced tab and then click the Environment Variables button at the bottom of this
tab.
◦ In System Variables list, select the Path variable, and click Edit.
◦ Add ;C:\\Program Files\\PuTTY to the end of the Path variable.
◦ Click OK.
3. In the directory C:\\Program Files\\PuTTY , copy the binary file putty.exe to a file called ssh.exe.
Prerequisites
• Windows 10 must be installed
• Java 8 Update 321 or 341 must be installed
• User should have admin rights on the Windows machine
Start
1. Add the STMS IP and STMS host name in the Windows 10 PC hosts file at C:
\Windows\System32\drivers\etc.
Example: Here, STMS IP is 172.24.127.204 and the host name is lab-stms-vm4 so the following
entry should be added in the hosts file: 172.24.127.204 lab-stms-vm4
Note
If Java 1.8.0_341 is installed, the path should be edited accordingly.
8. In the Security tab of the Java Control Panel window, add the server URL (e.g. https://
hostname:7002/) to the Exception Site List.
9. Verify that the Launcher and jnlp file are in the same folder.
10. Open the Launcher.
The Security Warning window opens.
11. Select I accept the risk and want to run the application, and click Run.
The Login window appears.
12. In the User Name field, type your STMS user name.
13. In the Password field, type your password, and click OK.
Note
• If your password has expired or if the system administrator has reset your password since
your last login, you might be prompted to change your password.
• If you don't type a correct password during login, your account might be locked for a period
of time. Contact your system administrator.
2. In the View tab, define the relevant view settings. For details, see the table below.
3. Click Apply.
View Preferences
Preference Description
STMS Font Size Select the font size to use for system text.
STMS Font Style Select the font to use for system text.
STMS Time Format Select the time format to be used in the application, either
24-hour or 12-hour (AM/PM).
Enable "Are You Sure" prompts for By default, you are prompted to confirm any actions that
service-affecting actions might disrupt services.
Use native interface-naming scheme Select to use default naming conventions for cards, ports,
and paths. Clear to use description naming.
Load nested QoS state on startup Select to load only shallow state for Layer 3 classifiers on
GUI startup.
Chassis View
Flex Grid View By default, wavelengths are defined using a fixed grid in
which the wavelength values are fixed. Select this checkbox
to enable Flex Grid, which enables defining wavelengths
using flexible values.
For details on using Flex Grid, see the STMS User Guide.
Layout view
Enable Layout View Select to enable/disable the layout view option. The layout
view displays a logical representation of all managed NEs in
the STMS Domain.
Preference Description
Background Image Sets the background image for the layout view option.
Max. NEs in view Sets the maximum number of NEs that can be displayed in
the layout view (default 50).
Properties
Show properties in popup window by By default, right-click an object (NE, component card,
default interface, etc.) and then click Properties to display the
properties for that object in the Property Inspector in the
View panel.
If you select this checkbox, right-click an object and then
click Properties to open the property sheet in a popup
window.
Logging
Show logs from all NEs in a single area By default, the STMS Client displays messages about
system events and conditions for all NEs (for which you have
enabled logging) in one tab in the Alarm/Log panel. If you
clear this checkbox, messages about system events and
conditions for each NE type (for which you have enabled
logging) are displayed in separate tabs in the Alarm/Log
panel.
Alarm Preferences
This section explains how to define alarm preferences. You can define preferences for alarm views and
alarm notifications.
The STMS Client can be defined to notify users via email or audible or not audible alarm of specific alarms
received from an NE managed by the STMS Client. Email notifications, which contain a summary of the
alarm, can be sent to other systems such as SMS or paging, which can then forward the information to a
user. In the event that the STMS Client is unsuccessful in sending a notification email, the STMS Client
writes the notification to a log. Audible notifications play a WAV file when a specified alarm condition is met.
The sound is played for all the clients specifically defined for that alarm condition.
• Set the Alarm View Preferences in the STMS
• Set the Audio Notification Preferences in the STMS
• Add an Alarm Notification in the STMS
• Edit an Alarm Notification in the STMS
• Delete an Alarm Notification in the STMS
• Reorder Alarm Notifications in the STMS
• Enable Audible Alarm Notifications in the STMS
• Pause Alarm Notifications in the STMS
Note
By default, alarms are displayed in table view and this checkbox is cleared.
3. Click Apply.
A message popup states that the STMS Client must be restarted for your change to take effect.
4. For specific details on alarm notifications, see Add an Alarm Notification in the STMS.
5. After completing the edits, click Finish.
Connection Options
At a specified interval, the STMS Client pings the STMS server (the one it is defined to communicate with) to
determine the status of communication. If a specified number of ping failures occurs, the STMS Client sets
the status of communication with the STMS server as "Not Connected." The STMS Client continues to ping
the STMS server until communication is reestablished.
You can:
• Change the Ping Interval
• Set the Number of Ping Failures
6. Click Apply.
A message appears stating that the STMS Client must be restarted for your changes to take effect.
7. Click Yes to restart the STMS Client.
The STMS Client closes and then restarts. The filtering preferences are updated.
Manage Licenses
Some STMS features are only available if the relevant license has been purchased (and the license has not
exceeded its limits or expiration date).
The following licenses are available:
2.5G 1
10G 1
40G 4
100G 10
200G 20
16G 2 FC1600
25G 3 25GBE
32G 3 FC3200
300G 30 FLEXO-3
400G 40 ENHZR-400
500G 50 ENHZR-500
600G 60 ENHZR-600
700G 70 ENHZR-700
800G 80 ENHZR-800
900G 90 ENHZR-900
1G-10G 1
25G 3
FC3200 3
40G 4
FC6400 6
OPT9901x 100G Line 100G 1 Enables 100G line ports for the
Port Tokens OPT9901x card.
OPT9603 1
OPT9608 and 2
OPT9608D
OPT9901X 3
RADM100 6 (2 OPT9901X
NEs)
OPT9624 6
OPT9904X 6
OPT9914 10
OPT9932 20
1G-10G 1
32FC (FC3200) 3
40G 4
100G 10
8FC (FC800) 1
16FC (FC1600) 1
300G 30
400G 40
TIOMR_32 3
HIO10_20 20
HIO100_2 20
HIO10_40 40
10G 1
40G 4
100G 10
200G 20
300G 30
400G 40
1G-10G 1
32FC 3
40G 4
100G 10
You can view and manage your licenses and the available tokens via the License Manager.
To manage licenses:
1. From the System menu, select License Manager.
The STMS License Manager window opens.
2. To change the Expiration Date format, select the format from the dropdown list.
3. Click one of the following buttons:
◦ License String: Displays the license string and enables copying it.
◦ Description: Enabled when an entry in the list is selected. It describes the number of tokens
charged by STMS for the selected feature.
◦ Not Usable List: Shows a list of the objects that are "not usable" due to license "overdraft". "Not
usable" for ports means that they can't be used in trails.
◦ Load License: Enables loading a license file to replace the current one, to extend the expiration
date or increase the number of tokens.
◦ Save License as: Enables saving the license to a specific location.
View Options
STMS provides a collection of detailed views for examining your network:
• Network Element Status View
• Network Element Layout View
• Chassis View
• Properties View
The Network Element Status view displays information for each NE, including host name, type, state, group,
when the element was initially discovered, and any reason that discovery might have failed. This is the
default view for the Network Explorer.
To view the Network Element Status view for the entire network:
• From the Network Explorer, right-click STMS Domain and select Network Element Status.
The NEs and their details appear in the right area.
Chassis View
The Chassis view displays a graphical representation of a specific NE, including views of the card cages and
a card inventory table. You can display the Chassis view in the right pane or in a new window.
Start
1. In the Network Explorer tab, right-click the NE and select one of the following:
◦ Show Chassis: Displays the Chassis view in the right pane.
◦ Show Chassis in New Window: Displays the Chassis view in a new window. You can perform
configuration operations for only the specific NE from the Chassis view window.
The NE Chassis view appears. The Chassis view for OPT9932 has additional view options (see
OPT9932 Chassis view).
The following icons can appear next to the NE name, when relevant:
◦ - Indicates that an alarm exists for the NE (color changes according to the alarm severity)
2. The default Chassis view displays a graphical representation of the configured cards. To see the
actual installed cards in the chassis, select the Show Actual option.
Note
You can perform various configuration and management tasks via the menus, and by right-
clicking on the ports. Most of the Chassis view menu options are also available from the right-
click menus in the Explorer area and from the STMS main menus.
2. To view the expanded top or bottom area of the chassis, click Top Expand or Bottom Expand.
3. To change back to the regular Chassis view, click Change OPT9932 View.
Note
To indicate an alarm condition, the port color changes to yellow, orange, or red.
Properties View
The Properties view displays detailed information about objects in the network.
Note
The screenshots below show examples of the NE Properties view.
Start
1. In the Network Explorer tab, right-click the NE and select Properties.
2. Click General.
The General tab appears in the right pane.
4. Click Location.
The Location tab appears in the right pane.
6. Click PM.
The PM tab appears in the right pane.
7. Click OTDR.
The OTDR tab appears in the right pane.
• GUI Audit Log: Displays messages about the STMS Client that indicate the occurrence of non-error
system events or conditions, such as NEs being discovered.
• GUI Error Log: Displays messages about the STMS Client that indicate the occurrence of system
exceptions or conditions.
• Network Element Logging: If you enable logging for one or multiple NEs, this tab appears in the
Alarm/Log panel and displays messages about NE system events or conditions.
Note
For information about viewing and managing alarms, see Fault management. For information
about logging and tracing, see Log management.
Note
Alarm indicators appear in the lower right portion of an object icon in the Explorer panel and Layout
views, for example, .
If an NE is in a state which prevents the STMS from managing it, an indicator ( ) appears in the
lower portion of the NE icon to indicate that management is disabled.
Note
The Security Configuration window is only available to users defined with Administrator or
Security user group privileges.
You can enable or disable a user account by selecting or de-selecting the checkbox in the Enabled
column. When a user account is disabled, the user can't log in to the STMS client.
Note
The Security Configuration window is only available to users defined with Administrator or
Security user group privileges.
Note
An example of the Password-Username-Policy Required requirement:
When creating a user whose username is johnsmith and the Allowed Substring Length is set to 4.
The password can be something like joh$$$$$ or john$$$$ but it cannot be johns$$$ because the
substring "johns" exceeds the allowed substring length.
Create a User
Start
1. From the Security menu, select Security Configuration.
The Security Configuration window opens.
Note
The Security Configuration window is only available to users defined with Administrator or
Security user group privileges.
9. Enter the user's details. For the Password Expiration Date, you can enter an expiration date or
select Never for the password to never expire.
10. Click Finish.
The new user is added.
Edit a User
Start
1. From the Security menu, select Security Configuration.
The Security Configuration window opens.
Note
The Security Configuration window is only available to users defined with Administrator or
Security user group privileges.
2. Select the user you want to modify and click Edit User.
The Edit User window opens.
Delete a User
Start
1. From the Security menu, select Security Configuration.
The Security Configuration window opens.
Note
The Security Configuration window is only available to users defined with Administrator or
Security user group privileges.
2. Select the user you want to delete and click Delete User.
A confirmation message appears.
3. Click Yes.
The user is deleted.
Note
The Security Configuration window is only available to users defined with Administrator or
Security user group privileges.
2. Select the user whose password you want to change and click Reset Password.
The Reset Password window opens.
3. In the New Password field, type a new password for the user.
4. In the Verify New Password field, type the password again and click OK.
The password is reset.
Note
In case the password-username-substring policy is enabled and the STMS user attempts
to change a password, the STMS enforces the password-username-substring policy.
Refer to Define Password Requirements. An example is provided.
The STMS will extract all the substrings from the username, the substring length being
according to the configured Allowed Substring Length (default value is 4 and the valid range
is 4 to 8 characters).
In case one of the substrings appears in the password, it will reject the change password
request.
An error message " Username substring <"detected substring"> found in password" appears.
Note
The Security Configuration window is only available to users defined with Administrator or
Security user group privileges.
2. Select the user for which you want to change the user group and click Change Group.
The Change Group window appears.
3. Select the user group from the dropdown list and click OK.
The user group is updated for the user.
Note
The Active User Sessions window is only available to users defined with Administrator or
Security user group privileges.
Note
The Active User Sessions window is only available to users defined with Administrator or
Security user group privileges.
2. Select the user session you want to end and click Force Logout.
Note
The Force Logout button is disabled if you select your own user session.
Field Description
Activity Logs
The STMS Action Log module records and displays user operations that affect the configuration of the
network or of the STMS.
The STMS presents the log records in the following logs:
• Activity Log: Displays records of every user action that affects the network configuration, according
to the following categories:
◦ Equipment
◦ Services and traffic
◦ Topology
◦ Maintenance
◦ STMS configuration
◦ License management
See View the Activity Log.
• Security Log: Displays records of the following user actions:
◦ Login
◦ Logout
◦ Forced logout
◦ Password change
See View the Security Log.
To archive activity logs, see Archive of Activity Logs, Events, and Alarms.
Note
You can select the amount of records to be displayed via the Page Size dropdown list.
◦ Filter the activity logs according to category, operation result, time period, and/or specific text.
◦ Click Apply.
The filtered log records appear.
Notes
Note
You can select the amount of records to be displayed via the Page Size dropdown list.
◦ Filter the activity logs according to category, operation result, time period, and/or specific text.
◦ Click Apply.
The filtered log records appear.
Notes
2. In the Selected column, select the checkbox of the record type you want to archive immediately.
3. The checkbox in the Clear After Archive column is selected automatically, which enables the deletion
of the records from the STMS database upon completion of the archive process. If you don't want the
records to be deleted, de-select this checkbox for the relevant log type.
Note
The Clear After Archive option is disabled for Current Alarm records.
4. Click Apply.
The log records are archived.
2. From the Select Log Type dropdown list, select the log type.
The log files appear.
Note
You can select the amount of records to be displayed via the Page Size dropdown list.
Prerequisites
1. STMS must be stopped before start a restore (STMS stop).
2. The schema backup is created in the Oracle server zone in the folder /sdh_home/ora/.BACKUP
using a new unique directory name (with a timestamp showing when backup created).
3. When case matches the following condition, it is strongly recommended to turn off archive mode
before starting the restoration and to activate it again when restoration ends.
◦ Case condition: DB runs in archive mode, only one application configured to use the DB (STMS in
this case) and DB is large. By doing so, will dramatically reduce the restoration time.
Warning
Only one backup or restore can run at once on the same Oracle DB server. If you rune more than
one backup, the following message appears:
ERROR!! FAILED can't run while OraDBBackup running in another session
Aborting...
Check Log file: /var/ORACLE/logs/OraDBBackup.log for more details.
Start
EmsStmsDBBackup [-backup | -restore | -purge | -auto ] [ -noconsistent ] [ -N
num ] [-h]
Where: