A Controlled Feature Activation Procedures
Appendix A, Controlled Feature Activation Procedures, describes the procedures necessary to activate and deactivate features (features that require a feature access key to be activated) contained in this manual.
A.1 Introduction
Note:
As of Release 46.3, the fak parameter is no longer required. This parameter is only used for backward compatibility.Controlled features are features that are activated using a feature access key. These features can either be on or off, or features that operate at a particular performance level. Only the controlled features that are used in this manual are covered in this appendix.
The feature access key allows the user to enable and activate a controlled feature in the EAGLE by entering either a permanent feature access key or a temporary feature access key. By requiring a feature access key to enable and activate a controlled feature, unauthorized enabling and activation of a controlled feature can be prevented. The feature access key is supplied by Oracle.
Features enabled with a permanent feature access key remain enabled for as long as the EAGLE remains in service. Once features are permanently enabled, they cannot be disabled.
Features enabled with a temporary feature access key are enabled for only 30 days. On the twenty-third day, seven days before the temporary key expires, a major alarm (UAM 0367) is generated to inform the user that the one or more temporary feature access keys will expire soon.
0367.0181 ** SYSTEM Temp Key(s) expiring soon.
If a temporary feature access key expires, the controlled feature is disabled and a critical alarm (UAM 0368) is generated.
0368.0181 *C SYSTEM Temp Key(s) have expired.
Any attempts to enable the controlled feature with the temporary feature access key are rejected. The controlled feature can be enabled only by entering the permanent feature access key for the controlled feature.
To clear the critical alarm (UAM 0368), the user can either enter the chg-ctrl-feat
command with the alarm=clear
parameter, or permanently enable the controlled feature by entering the permanent feature access key for the controlled feature.
If the critical alarm is cleared with the chg-ctrl-feat
command, the controlled feature is disabled and cannot be enabled with the temporary feature access key. The feature can be enabled only by entering the permanent feature access key for the controlled feature.
A.2 Activating Controlled Features
This procedure is used to enable and activate these controlled features, Command Class Management, IP User Interface, and Network Security Enhancements, using the feature’s part number and a feature access key for each feature.
The feature access key is based on the feature’s part number and the serial number of the EAGLE, making the feature access key site-specific.
The
enable-ctrl-feat
command enables the
controlled feature by inputting the controlled feature’s access key and the
controlled feature’s part number with these parameters:
:fak
– The
feature access key generated by the feature
access key generator. The feature access key contains 13 alphanumeric
characters and is not case sensitive.
:partnum
– The
Oracle-issued part number associated with the controlled feature. The part
number is a 9-digit number, not including dashes. The first three digits must
be 893 (that is, 893xxxxxx, where x is a numeric value).
If the controlled feature is being enabled with a temporary feature access key, the feature must not be in the in-use, expired, or unavailable state.
The
enable-ctrl-feat
command requires that
the database contain a valid serial number for the
EAGLE, and that this serial number is locked.
This can be verified with the
rtrv-serial-num
command. The
EAGLE is shipped with a serial number in the
database, but the serial number is not locked. The serial number can be
changed, if necessary, and locked once the
EAGLE is on-site, with the
ent-serial-num
command. The
ent-serial-num
command uses these
parameters.
:serial
– The serial number assigned to the EAGLE. The serial number is
not case sensitive
.
:lock
– Specifies whether
or not the serial number is locked. This parameter has only one value,
yes
, which locks the serial number.
Once the serial number is locked, it cannot be changed.
Note:
To enter and lock the EAGLE’s serial number, theent-serial-num
command must be entered
twice, once to add the correct serial number to the database with the
serial
parameter, then again with the
serial
and the
lock=yes
parameters to lock the serial
number. You should verify that the serial number in the database is correct
before locking the serial number. The serial number can be found on a label
affixed to the control shelf (shelf 1100).
Once the controlled feature has been enabled, the
controlled feature must be activated with the
chg-ctrl-feat
command. The
chg-ctrl-feat
command uses these
parameters:
:partnum
– The
Oracle-issued part number associated with the controlled feature. The part
number is a 9-digit number, not including dashes. The first three digits must
be 893 (that is, 893xxxxxx, where x is a numeric value).
:status=on
– used to
activate the controlled features that customer has purchased and enabled.
The status of the controlled features in the
EAGLE is shown with the
rtrv-ctrl-feat
command.
The part numbers for the Command Class Management, IP User Interface, and Network Security Enhancements features are:
-
Command Class Management – 893005801
-
Telnet (IP User Interface) – 893005701
-
Network Security Enhancements – 893009101
Figure A-1 Activating Controlled Features
A.3 Activating the EAGLE OA&M IP Security Enhancement Controlled Feature
This procedure is used to enable and activate the EAGLE OAM IP Security Enhancement Controlled Feature, using the feature’s part number and a feature access key.
For Release 46.5 and later. the EAGLE OA&M IP Security feature is enabled by default and the feature entry is used to control only the alarming if the SSH for terminals or Security of FTP Server entries is OFF. SSH for terminals and Security of FTP Server entries are controlled via the SECU-DFLT: SSH parameter and SECUIRTY parameter against the FTP servers entries, respectively. The following is expected after upgrade to release 46.5 or later from release 46.4 or earlier:
- If the OA&M IP Security feature is currently (R46.4 or earlier) OFF, then it will remain OFF after the upgrade to R46.5.
- If the OA&M IP Security feature is currently (R46.4 or earlier) ON, and all the FTP Servers have Security ON and the Telnet terminals are using SSH, then it will remain ON after the upgrade to R46.5.
- If the OA&M IP Security feature is currently (R46.4 or earlier) ON, and there was 1 or more FTP Servers or Telnet terminals not using SSH, then it will be turned OFF after upgrade to R46.5, so that no new alarms will be generated after the upgrade.
- If the OA&M IP Security feature is currently (R46.4 or earlier) OFF and SECU-DFLT-SSH parameter is ON, then the SECU-DFLT-SSH parameter will be turned OFF after the upgrade to R46.5, so that the access protocol used will not be changed after the upgrade.
- If the OA&M IP Security feature is currently (R46.4 or earlier) OFF and the SECURITY parameter is ON for the FTP server entry in the FTP server table, then the SECURITY parameter for the FTP server entry (except for the SFLOG FTP server entry) will be turned OFF after the upgrade to R46.5, so that the file transfer protocol used will not be changed after the upgrade.
With SSH for terminals ON, a secure shell connection is
established between the
EAGLE and the telnet terminals allowing
passwords to be sent over the connection. This allows the
EAGLE administrator to add new users to the
EAGLE (with the
ent-user
command) and to change the
passwords of existing users (with the
pid
parameter of the
chg-user
command) from a telnet
terminal.
If the SSH for terminals is ON, the FTRA must be configured to support secure connections to the EAGLE. Go to FTP Table Base Retrieval User's Guide, for more information on using secure connections with the FTRA.
If Security of meas FTP Server entry is ON, the Measurements Platform must support secure FTP servers. Go to the Adding an FTP Server procedure for more information on configuring secure FTP servers for the Measurements Platform.
Similarly, if Security of FTP Server entry for any specific application (dist, db, user) is ON, the designated FTP server for the application must support secure FTP protocol.
Caution:
If EAGLE
OA&M
IP Security
Enhancements feature is activated with a temporary feature access key and that
key expires, secure shell connections will become non-secure. Passwords can be
transmitted on a non-secure connection, but cannot be assigned or changed. The
ent-user
command and
pid
parameter of the
chg-user
command cannot be used. File
transfers using secure
FTP cannot be performed
unless non-secure
FTP servers are
available. It is recommended that the
FTRA and the Measurements
Platform is configured with secure and non-secure
FTP servers.
To enable and activate this feature, the
enable-ctrl-feat
,
ent-serial-num
, and
chg-ctrl-feat
commands are used. For
more information on these commands, go to the
Activating Controlled Features
procedure, or
Commands User's Guide.
Figure A-2 Activating the EAGLE OA&M IP Security Enhancement Controlled Feature
Sheet 1 of 4
Sheet 2 of 4
Sheet 3 of 4
Sheet 4 of 4
A.4 Unmate IP Security for Terminal and Measurements
EAGLE Release 45.0 provides the capability to unmate the IP Security for Telnet and FTP. The Terminal security (SSH) will be controlled by an option 'ssh' in the Security Default table. This option can be set to ON to enable SSH or set to OFF to disable SSH. The chg-secu-dflt
command is modified to support the parameter 'ssh' that turns SSH ON/OFF. The parameter is optional, and defaults to ON. Example command:
chg-secu-dflt:ssh=on
Security for the FTP interfaces will be controlled by an option Security in the FTP Server table. Each option in the table defines the parameters for a specific FTP interface. The parameter Security can be turned ON/OFF for each server entry independently. When the OAM IP Security feature is ON and the FTP interface Security parameter is ON, the interface will be protected by data encryption.
The Security Parameter can be set when an interface is initially created with the ent-ftp-serv
command, or changed for an existing interface with the chg-ftp-serv
command. The parameter is optional, and defaults to ON. Example commands:
ent-ft-serv-:ipaddr=x.x.x.x:login=user:app=dist:prio=1=login=eagle:path="/path":security=on
and
chg-ftp-serv:ipaddr=x.x.x.x:app=dist:security=on
.
A.5 Activating the 15 Minute Measurements Controlled Feature
This procedure is used to enable and turn on the 15 Minute Measurements controlled feature, using the feature’s part number and a feature access key. This feature allows EAGLE measurements to be collected every 15 minutes.
To enable and turn on the 15 Minute Measurements controlled feature, the following requirements must be met:
- The Measurements Platform feature must be on, or the Integrated Measurements feature must be enabled and turned on.
- The EAGLE must be configured to use the Measurements Platform, or the Integrated Measurements feature.
- If the Measurements Platform is being used, MCPMs must be provisioned in the database, and the state of all these MCPMs must be IS-NR.
The enable-ctrl-feat
, ent-serial-num
, and chg-ctrl-feat
commands are used to enable and turn on the 15 Minute Measurements controlled feature using the feature’s part number and a feature access key.
The feature access key for the 15 Minute Measurements controlled feature is based on the feature’s part number and the serial number of the EAGLE, making the feature access key site-specific.
The enable-ctrl-feat
command enables the feature by inputting the feature’s access key and the feature’s part number with these parameters:
:fak
– The feature access key provided by Oracle. The feature access key contains 13 alphanumeric characters and is not case sensitive.
:partnum
– The Oracle-issued part number of the 15 Minute Measurements controlled feature, 893012101.
The enable-ctrl-feat
command requires that the database contain a valid serial number for the EAGLE, and that this serial number is locked. This can be verified with the rtrv-serial-num
command. The EAGLE is shipped with a serial number in the database, but the serial number is not locked. The serial number can be changed, if necessary, and locked once the EAGLE is on-site, with the ent-serial-num
command. The ent-serial-num
command uses these parameters.
:serial
– The serial number assigned to the EAGLE. The serial number is not case sensitive.
:lock
– Specifies whether or not the serial number is locked. This parameter has only one value, yes
, which locks the serial number. Once the serial number is locked, it cannot be changed.
Note:
To enter and lock the EAGLE’s serial number, theent-serial-num
command must be entered twice, once to add the correct serial number to the database with the serial
parameter, then again with the serial
and the lock=yes
parameters to lock the serial number. You should verify that the serial number in the database is correct before locking the serial number. The serial number can be found on a label affixed to the control shelf (shelf 1100).
This feature cannot be temporarily enabled (with the temporary feature access key).
Once this feature has been enabled, the feature must be turned on with the chg-ctrl-feat
command. The chg-ctrl-feat
command uses these parameters:
:partnum
– The Oracle-issued part number of the 15 Minute Measurements controlled feature, 893027701.
:status=on
– used to turn the 15 Minute Measurements controlled feature on.
Once the 15 Minute Measurements controlled feature has been turned on, it be cannot be turned off.
The status of the features in the EAGLE is shown with the rtrv-ctrl-feat
command.
After the 15 Minute Measurements controlled feature is enabled and turned on, the 15 minute measurement collection option in the measurement options table must be turned on.
Figure A-3 Activating the 15 Minute Measurements Controlled Feature
Sheet 1 of 4
Sheet 2 of 4
Sheet 3 of 4
Sheet 4 of 4
A.6 Clearing a Temporary FAK Alarm
This procedure is used to clear the critical alarm, UAM 0368, generated when a a temporary feature access key has expired, using the chg-ctrl-feat
command.
The chg-ctrl-feat
command uses the following parameters:
:partnum
- The part number of the controlled feature that was temporarily enabled and is causing the alarm.
:alarm=clear
- Clears UAM 0368, Temp Key(s) have expired.
The controlled feature must have been temporarily enabled and is now in danger of expiration or in an expired state.
Figure A-4 Clearing a Temporary FAK Alarm
A.7 Deactivating Controlled Features
This procedure is used to deactivate these controlled features, Command Class Management, IP User Interface, and Network Security Enhancements using the chg-ctrl-feat
command.
The chg-ctrl-feat
command uses the following parameters:
:partnum
- The part number of the controlled feature being deactivated.
- Command Class Management – 893005801
- Telnet (IP User Interface) – 893005701
- Network Security Enhancements – 893009101
:status=off
– used to deactivate the controlled feature.
The status of the controlled feature being deactivated must be on
and is shown with the rtrv-ctrl-feat
command.
Caution:
If the SEAS over IP feature is turned off, all SEAS terminal traffic stops.Caution:
If the IP User Interface (TELNET) controlled feature is deactivated, all Telnet sessions supported by this feature will be disabled. No changes can be made to the configuration of the Telnet terminals (terminals 17 through 40). Deactivating this feature will also deactivate FTP Retrieve and Replace feature. If the SEAS over IP feature is turned on, the TELNET feature cannot be turned off.Figure A-5 Deactivating Controlled Features
A.8 Activating the HIPR2 High Rate Mode Feature
This procedure is used to enable and turn on the HIPR2 High Rate Mode feature using the feature’s part number and a feature access key.
The feature access key for the HIPR2 High Rate Mode feature is based on the feature’s part number and the serial number of the EAGLE, making the feature access key site-specific.
The enable-ctrl-feat
command enables the feature by inputting the feature’s access key and the feature’s part number with these parameters:
:fak
– The feature access key provided by Oracle. The feature access key contains 13 alphanumeric characters and is not case sensitive.
:partnum
– The Oracle-issued part number of the HIPR2 High Rate Mode feature, 893020101.
The enable-ctrl-feat
command requires that the database contain a valid serial number for the EAGLE, and that this serial number is locked. This can be verified with the rtrv-serial-num
command. The EAGLE is shipped with a serial number in the database, but the serial number is not locked. The serial number can be changed, if necessary, and locked once the EAGLE is on-site, with the ent-serial-num
command. The ent-serial-num
command uses these parameters.
:serial
– The serial number assigned to the EAGLE. The serial number is not case sensitive.
:lock
– Specifies whether or not the serial number is locked. This parameter has only one value, yes
, which locks the serial number. Once the serial number is locked, it cannot be changed.
Note:
To enter and lock the EAGLE’s serial number, theent-serial-num
command must be entered twice, once to add the correct serial number to the database with the serial
parameter, then again with the serial
and the lock=yes
parameters to lock the serial number. You should verify that the serial number in the database is correct before locking the serial number. The serial number can be found on a label affixed to the control shelf (shelf 1100).
This feature cannot be temporarily enabled (with the temporary feature access key).
Once this feature is enabled, the feature must be turned on with the chg-ctrl-feat
command. The chg-ctrl-feat
command uses these parameters.
:partnum
– The Oracle-issued part number of the HIPR2 High Rate Mode feature, 893020101.
:status=on
– used to turn the HIPR2 High Rate Mode feature on.
Caution:
The HIPR2 High Rate Mode feature cannot be turned off if any of these conditions are present.- The IMT Rate Change sequence is being performed.
- The Extended Bit Rate Test (BERT) is being performed.
- Any of the cards in card locations 9 and 10 in each shelf are being flashed with the
init-flash
command.
Once the HIPR2 High Rate Mode feature has been turned on, it be can be turned off. For more information on turning the HIPR2 High Rate Mode feature off, perform Turning Off the HIPR2 High Rate Mode Feature.
The status of the features in the EAGLE is shown with the rtrv-ctrl-feat
command.
When the HIPR2 High Rate Mode feature is turned on, the throughput of the IMT bus is increased to 2.5 Gbps. If the HIPR2 High Rate Mode feature is not turned on, the throughput of the IMT bus is limited to 1 Gbps. To turn the the HIPR2 High Rate Mode feature on, all the cards in card locations 9 and 10 in each shelf must be HIPR2 cards.
Figure A-6 Activating the HIPR2 High Rate Mode Feature
Sheet 1 of 5
Sheet 2 of 5
Sheet 3 of 5
Sheet 4 of 5
Sheet 5 of 5
A.9 Turning Off the HIPR2 High Rate Mode Feature
This procedure is used to turn off the HIPR2 High Rate Mode feature, using the chg-ctrl-feat
command.
Caution:
The HIPR2 High Rate Mode feature cannot be turned off if any of these conditions are present.- The IMT Rate Change sequence is being performed.
- The Extended Bit Rate Test (BERT) is being performed.
- The total provisioned system TPS value is greater than 500,000.
- Any of the cards in card locations 9 and 10 in each shelf are being flashed with the
init-flash
command.
The chg-ctrl-feat
command uses the following parameters:
:partnum
- The part number of the HIPR2 High Rate Mode feature, 893020101.
:status=off
– used to turn off the HIPR2 High Rate Mode feature.
The status of the HIPR2 High Rate Mode feature must be on
and is shown with the rtrv-ctrl-feat
command.
Caution:
If the HIPR2 High Rate Mode feature is turned off, the throughput rate for the IMT bus is limited to 1 Gbps.Figure A-7 Turning Off the HIPR2 High Rate Mode Feature