4 System Administration Procedures

Chapter 4, System Administration Procedures, describes the procedures used to administer the items shown in the Introduction.

4.1 Introduction

This chapter contains system administration procedures. The items discussed in this section are:

  • The date and time

  • User IDs and passwords

  • Terminal configuration

  • Shelves

  • Cards

  • Security Log

  • Unauthorized Use Warning Message

  • UIM Thresholds

  • MCPMs, IP links, and FTP servers for the Measurements Platform

  • IPSMs for the IP User Interface (Telnet) feature

  • Configuring the Network Security Options

  • Configuring the Restore Device State Option

  • Configuring the Frame Power Alarm Threshold

The procedures shown in this chapter use a variety of commands. If more information on these commands is needed, go to Commands User's Guide to find the required information.

4.2 Setting the Clock and Date on the EAGLE

This procedure is used to set the EAGLE’s clock and date.

  1. To set the date, use the set-date command.

    The date must be entered in the form YYMMDD (YY for the year, MM for the month, and DD for the day of the month). For example, to set the date to March 7, 2003, enter this command.

    set-date:date=030307

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:33:19 GMT  EAGLE5 36.0.0
    Date set complete.
    
  2. To set the clock, use the set-time command.

    The time must be entered in the form HHMM (HH for the hour, and MM for the minutes). The hour is based on a 24-hour clock. The time zone can also be specified. If the time zone is not specified, then the EAGLE uses the time zone that was entered with the previous set-time command. The values for the time zone parameter are shown in Table 4-1. The entry in the Abbreviation column of Table 4-1 is the value to be specified for the time zone parameter.

    Table 4-1 Time Zones

    Time Zone Abbreviation Offset from GMT (hours)

    Greenwich Mean Time

    GMT

    0

    US Eastern Daylight Time

    EDT

    - 4

    US Eastern Standard Time

    EST

    - 5

    US Pacific Daylight Time

    PDT

    - 7

    US Pacific Standard Time

    PST

    - 8

    US Mountain Daylight Time

    MDT

    - 6

    US Mountain Standard Time

    MST

    - 7

    US Central Daylight Time

    CDT

    - 5

    US Central Standard Time

    CST

    - 6

    US Hawaiian Daylight Time

    HDT

    - 9

    US Hawaiian Standard Time

    HST

    - 10

    Atlantic Daylight Time

    ADT

    - 3

    Atlantic Standard Time

    AST

    - 4

    Western European Time

    WET

    0

    Universal Time Coordinated

    UTC

    0

    British Summer Time

    BST

    + 1

    Western European Summer Time

    WEST

    + 1

    Central European Time

    CET

    + 1

    Central European Summer Time

    CEST

    + 2

    Eastern European Time

    EET

    + 2

    Eastern European Summer Time

    EEST

    + 3

    French Summer Time

    FST

    + 2

    French Winter Time

    FWT

    + 1

    Brazil Standard Time

    BRA

    - 3

    Middle European Time

    MET

    + 1

    Middle European Summer Time

    MEST

    + 2

    Moscow Time

    MSK

    + 3

    Moscow Summer Time

    MSD

    + 4

    Australian Eastern Standard Time

    AEST

    + 10

    Australian Eastern Daylight Time

    AEDT

    + 11

    Australian Western Standard Time

    AWST

    + 8

    Australian Western Daylight Time

    AWDT

    + 9

    Australian Central Standard Time

    ACST

    + 9.5

    Australian Central Daylight Time

    ACDT

    + 10.5

    New Zealand Standard Time

    NZST

    + 12

    New Zealand Daylight Time

    NZDT

    + 13

    South African Standard Time

    SAST

    + 2

    China Coast Time

    CCT

    + 8

    Republic of Korea

    ROK

    + 9

    India Standard Time

    IST

    + 5.5

    India Daylight Time

    IDT

    + 6.5

    Alaska Standard Time

    AKST

    -9

    Alaska Daylight Time

    AKDT

    -8

    Newfoundland Standard Time

    NST

    -3.5

    Newfoundland Daylight Time

    NDT

    -2.5

    For example, to set the time to 14:20 (2:20 PM) in the Greenwich Mean time zone, enter this command.

    set-time:time = 1420:tz=gmt

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 14:20:00 GMT  EAGLE5 36.0.0
    Time set complete.
    
  3. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-1 Setting the Clock and Date on the EAGLE 5 ISS



4.3 Changing the Security Defaults

This procedure is used to change the user ID and password requirements for the EAGLE using the chg-secu-dflt command. The chg-secu-dflt command uses these parameters.

:page – The amount of time, in days, that the specified user’s password can be used before the user must change their password. The value of this parameter applies to all EAGLE user IDs unless a different value is specified for a specific user ID with the ent-user or chg-user command.

:uout – The number of consecutive days that a user ID can remain active in the EAGLE and not be used. When the user ID has not been used for the number of days specified by the uout parameter, that user ID is no longer valid and the EAGLE rejects any attempt to log into the EAGLE with that user ID. The value of this parameter applies to all user IDs in the EAGLE unless a different value is specified for a specific user ID with the ent-user or chg-user command.

:multlog – are the user IDs allowed to log on to more than one terminal at any given time.

:minlen – the minimum length of the password

:alpha – the minimum number of alpha characters (a - z)

:num – the minimum number of numeric characters (0 - 9)

:punc – the minimum number of punctuation characters (any printable character that is not an alphabetic character, a numeric character, the space bar)

:minintrvl – the minimum number of days before a password can be changed again.

:pchreuse – the number of characters that cannot be reused from the current password when setting the new password. For example, if the pchreuse parameter value is 5, no more than five characters of the current password can be reused in the new password.

:pgrace – the number of days after password expiration during which the user can login without changing their password.

:pnotify – the number of days before password expiration that the user is notified about the expiration.

:preuse – the number of previous passwords that cannot be used. If the preuse parameter value is 6, the previous six passwords cannot be used.

The chg-secu-dflt command also contains the wrnln,wrntx, and clrwrntx parameters. These parameters are used to configure the unauthorized use warning message that is displayed when a user logs into the EAGLE. To configure the unauthorized use warning message, go to the Configuring the Unauthorized Use Warning Message procedure.

Even though the minlen parameter specifies the minimum length of a password, the password must also contain the minimum number characters defined by the alpha, num, and punc parameters.

The examples in this procedure are used to change the security defaults to these values.

page = 100 days

uout = 50 days

multlog = yes, to allow the user IDs in the EAGLE to log onto more than one terminal at any given time.

minlen = 12 characters

alpha = 2 characters

num = 2 characters

punc = 2 characters

minintrvl = 5 days

pnotify = 14 days

pgrace = 2 days

preuse = 6 passwords

pchreuse = 5 characters

Note:

When the EAGLE is delivered to the user, the database will contain these security default values.

:page = 90 days

:uout = 90 days

:multlog = no

:minlen = 8 characters

:alpha = 1 character

:num = 1 character

:punc = 1 character

:minintrvl = 1 day

:pnotify = 7 days

:pgrace = 3 days

:preuse = 5 passwords

:pchreuse = 4 characters

The rtrv-secu-dflt command uses the msg parameter to specify whether the unauthorized use warning message text is displayed in the command output. The msg parameter has two values.

yes – the unauthorized use warning message text is displayed.

no – the unauthorized use warning message text is not displayed.

The default value for this parameter is no.

Regardless of the value specified for the msg parameter, the user ID and password security defaults are displayed in the rtrv-secu-dflt command output.

  1. Display the current security defaults by entering the rtrv-secu-dflt command.

    This is an example of the possible output.

    
    rlghncxa03w 10-04-01 16:02:05 GMT  EAGLE5 42.0.0
    SECURITY DEFAULTS
    -----------------
    PAGE           60
    UOUT           90
    MULTLOG        NO
    MINLEN          8
    ALPHA           1
    NUM             1
    PUNC            1
    MININTRVL       1
    PNOTIFY         7
    PGRACE          3
    PREUSE          5
    PCHREUSE        4
    
    
  2. Change the current security defaults by entering the chg-secu-dflt command.

    For this example, enter this command.

    chg-secu-dflt:page=100:uout=50:multlog=yes:minlen=12:alpha=2 :num=2:punc=2:minintrvl=5:pchreuse=5:pgrace=2:pnotify=14:preuse=6

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 11:43:04 GMT EAGLE5 36.0.0
    CHG-SECU-DFLT: MASP A - COMPLTD
    
  3. Verify the changes with the rtrv-secu-dflt command.

    This is an example of the possible output.

    
    rlghncxa03w 10-04-01 16:02:05 GMT  EAGLE5 42.0.0
    SECURITY DEFAULTS
    -----------------
    PAGE          100
    UOUT           50
    MULTLOG       YES
    MINLEN         12
    ALPHA           2
    NUM             2
    PUNC            2
    MININTRVL       5
    PNOTIFY        14
    PGRACE          2
    PREUSE          6
    PCHREUSE        5
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-2 Changing the Security Defaults



4.4 Configuring the Unauthorized Use Warning Message

This procedure is used to configure the unauthorized use warning message that is displayed after a user successfully logs into the EAGLE.

These parameters are used in this procedure.

:wrnln – the line number of the text of the unauthorized use warning message. The unauthorized use warning message can contain from 1 to 20 lines of text.

:wrntx – the text of the line number of the unauthorized use warning message. The each line of text can contain up to 70 alphanumeric characters and must be enclosed in quotes (“). A blank line is specified with this text string, “ “, the blank space character enclosed in double quotes.

:clrwrntx - This parameter specifies whether or not the text of the warning message is removed and will not be displayed. This parameter has three values.
  • no - the text of a specific line in the warning message is not removed.
  • yes - the text of a specific line in the warning message is removed and will not be displayed.
  • all - the text in all the lines of the warning message are removed and no warning message will be displayed.

The clrwrntx=yes parameter can be specified only with the wrnln parameter.

The chg-secu-dflt command contains other parameters that are not used in this procedure. These parameters are used to change the user ID and password security defaults on the EAGLE. To change the user ID and password security defaults, perform the Changing the Security Defaults procedure.

Note:

When the EAGLE is delivered to the user, the database will contain this login warning message.
NOTICE: This is a private computer system. 
Unauthorized access or use may lead to prosecution.

The example in this procedure is used to change the unauthorized use warning message from the system default message to this message.

************************************************************
* NOTICE: This is a private computer system.               *
* UNAUTHORIZED ACCESS OR USE WILL BE PROSECUTED            *
*                                                          *
*                                                          *
* 03/17/08 Notice!!! System will be upgraded between       *
* the hours of 2am-3am on 04/01/08                         *
*                                                          *
*                                                          *
************************************************************

The rtrv-secu-dflt command uses the msg parameter to specify whether the unauthorized use warning message text is displayed in the command output. The msg parameter has two values.

yes – the unauthorized use warning message text is displayed.

no – the unauthorized use warning message text is not displayed.

The default value for this parameter is no.

Regardless of the value specified for the msg parameter, the user ID and password security defaults are displayed in the rtrv-secu-dflt command output.

  1. Display the current text of the unauthorized use warning message by entering the rtrv-secu-dflt command with the msg=yes parameter.

    This is an example of the possible output.

    
    rlghncxa03w 10-04-01 16:02:05 GMT  EAGLE5 42.0.0
    SECURITY DEFAULTS
    -----------------
    PAGE           60
    UOUT           90
    MULTLOG        NO
    MINLEN          8
    ALPHA           1
    NUM             1
    PUNC            1
    MININTRVL       1
    PNOTIFY         7
    PGRACE          3
    PREUSE          5
    PCHREUSE        4
    
    rlghncxa03w 10-04-01 16:02:05 GMT  EAGLE5 42.0.0
    WARNING MESSAGE
    ---------------
    1:"NOTICE: This is a private computer system."
    2:"Unauthorized access or use may lead to prosecution."
    3:" "
    4:""
    5:""
    6:""
    7:""
    8:""
    9:""
    10:""
    11:""
    12:""
    13:""
    14:""
    15:""
    16:""
    17:""
    18:""
    19:""
    20:""
    
  2. Change the unauthorized use warning message by entering the chg-secu-dflt command with the wrnln, wrntx, and clrwrntx parameters.

    For this example, to configure a new warning message, enter these commands.

    chg-secu-dflt:wrnln=1:wrntx=“*******************************************************”

    chg-secu-dflt:wrnln=2:wrntx=“*  NOTICE: This is a private computer system. *”

    chg-secu-dflt:wrnln=3:wrntx=“*  UNAUTHORIZED ACCESS OR USE WILL BE PROSECUTED *”

    chg-secu-dflt:wrnln=4:wrntx=“*...............................................*”

    chg-secu-dflt:wrnln=5:wrntx=“.................................................*”

    chg-secu-dflt:wrnln=6:wrntx=“* 11/17/97 Notice!!! System will be upgraded between*”

    chg-secu-dflt:wrnln=7:wrntx=“* the hours of 2am-3am on 02/07/00 *”

    chg-secu-dflt:wrnln=6:wrntx=“* 03/17/08 Notice!!! System will be upgraded between*”

    chg-secu-dflt:wrnln=7:wrntx=“* the hours of 2am-3am on 04/01/08 *”

    chg-secu-dflt:wrnln=8:wrntx=“*...................................................*”

    chg-secu-dflt:wrnln=9:wrntx=“*...................................................*”

    chg-secu-dflt:wrnln=10:wrntx=“******************************************************”

    chg-secu-dflt:wrnln=11:wrntx=“ ”

    chg-secu-dflt:wrnln=12:clrwrntx=yes

    chg-secu-dflt:wrnln=13:clrwrntx=yes

    chg-secu-dflt:wrnln=14:clrwrntx=yes

    chg-secu-dflt:wrnln=15:clrwrntx=yes

    chg-secu-dflt:wrnln=16:clrwrntx=yes

    chg-secu-dflt:wrnln=17:clrwrntx=yes

    chg-secu-dflt:wrnln=18:clrwrntx=yes

    chg-secu-dflt:wrnln=19:clrwrntx=yes

    chg-secu-dflt:wrnln=20:clrwrntx=yes

    If you wish to remove the current warning message, enter this command.

    chg-secu-dflt:clrwrntx=all

    If you wish to configure a new warning message after removing the current warning message, repeat this step with the wrnln, wrntx, and clrwrntx=yes parameters as needed.

    When each of these commands has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    CHG-SECU-DFLT: MASP A - COMPLTD
    
  3. Verify the changes with the rtrv-secu-dflt:msg=yes command.

    This is an example of the possible output.

    
    rlghncxa03w 10-04-01 16:02:05 GMT  EAGLE5 42.0.0
    SECURITY DEFAULTS
    -----------------
    PAGE           60
    UOUT           90
    MULTLOG        NO
    MINLEN          8
    ALPHA           1
    NUM             1
    PUNC            1
    MININTRVL       1
    PNOTIFY         7
    PGRACE          3
    PREUSE          5
    PCHREUSE        4
    
    rlghncxa03w 10-04-01 16:02:05 GMT  EAGLE5 42.0.0
    WARNING MESSAGE
    ---------------
    1:"*****************************************************"
    2:"*  NOTICE: This is a private computer system.       *"
    3:"*  UNAUTHORIZED ACCESS OR USE WILL BE PROSECUTED    *"
    4:"*                                                   *"
    5:"*                                                   *"
    6:"* 03/17/08 Notice!!! System will be upgraded between *"
    7:"*                 the hours of 2am-3am on 04/01/08  *"
    8:"*                                                   *"
    9:"*                                                   *"
    10:"****************************************************"
    11:" "
    12:""
    13:""
    14:""
    15:""
    16:""
    17:""
    18:""
    19:""
    20:""
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-3 Configuring the Unauthorized Use Warning Message



4.5 Changing the Security Log Characteristics

This procedure is used to change the characteristics of the EAGLE’s security log using the chg-attr-seculog command. The chg-attr-seculog command uses these parameters.

:upldalm – whether the security log alarms are on. The security log alarms are:

  • upload required – the percentage of the maximum capacity of the security log exceeds the value of the upslg parameter. The security log entries need to be copied to the file transfer area of the fixed disk.

  • log overflowed – the security log has become 100% full and log entries are being lost. The security log entries must be copied to the file transfer area of the fixed disk.

  • standby log contains >0 un-uploaded entries – the security log on the standby fixed disk contains entries that have not been copied to the file transfer area of the fixed disk. Usually, the security log on the standby fixed disk contains no entries, but for some reason, for example, a MASP switchover resulting in the active MASP security log becoming the standby MASP security log, the security log on the standby fixed disk contains uncopied security log entries.

    The upldalm=yes parameter turns the security log alarms on. The upldalm=no turns the security log alarms off. If a security log alarm has been generated, the upldalm=no parameter lowers the alarm.

:upslg – the threshold at which the EAGLE generates the upload required security log alarm, if the upldalm=yes parameter has been specified. The threshold is the percentage of the maximum capacity of the security log.

When the EAGLE is delivered to the user, the security log characteristics will be set to these values:

:upldalm = yes

:upslg = 90

  1. Display the current characteristics of the security log by entering the rtrv-attr-seculog command.

    This is an example of the possible output.

    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    Security log attributes
    -----------------------
    UPLDALM       no
    UPSLG         80
    
  2. Change the characteristics of the security log by entering the chg-attr-seculog command.

    For this example, enter this command.

    chg-attr-seculog:upldalm=yes:upslg=90

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    CHG-ATTR-SECULOG: MASP A - COMPLTD
    
  3. Verify the changes with the rtrv-attr-seculog command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    Security log attributes
    -----------------------
    UPLDALM      yes
    UPSLG         90
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-4 Changing the Security Log Characteristics



4.6 Copying the Security Log to the File Transfer Area

This procedure is used to copy the EAGLE’s security log to the file transfer area of the fixed disk using the copy-seculog command. The copy-seculog command uses these parameters.

:dfile – the name of the file created in the file transfer area containing the security log entries copied with the copy-seculog command.
  • The filename can contain from 1 to 32 characters. If the filename contains special characters such as blank spaces, colons, dashes, periods, ampersands (&), etc. (for example, eagle123.doc), the filename must be enclosed in double quotes. For example, :dfile=“eagle123.doc”.
  • If a filename is not specified, the EAGLE specifies its own filename with this format, yymmddx.log, where yymmdd are the current year/month/day that the security log file was created, and x is either a if the security log on the active fixed disk is copied (slog=act) or s if the security log on the standby fixed disk is copied (slog=stb).

:slog – the security log that is copied to the file transfer area, the security log on the active fixed disk (slog=act) or the standby fixed disk (slog=stb). The default value for this parameter is act.

:dloc – the file transfer area that is receiving the copy of the security log, the file transfer area on the active fixed disk (dloc=act) or the file transfer area on the standby fixed disk dloc=stb). The default value for this parameter is act.

If a filename is not specified, the EAGLE specifies its own filename with this format, yymmddx.log, where yymmdd are the current year/month/day that the security log file was created, and x is either a for the copy of the security log on the active fixed disk or s for the copy of the security log on the standby fixed disk.

The copy-seculog command can be specified with no parameters. If the copy-seculog command is specified with no parameters, the security log on the active fixed disk is copied to the file transfer area on the active fixed disk and is given a default name. The default name is in this format, yymmdda.log, where yymmdd are the current year/month/day that the security log file was created, and a for the copy of the security log on the active fixed disk.

  1. Verify the card that is card location 1113 by entering this command.

    rept-stat-card:loc=1113

    This is an example of the possible output.

    
    rlghncxa03w 09-03-28 21:15:37 GMT EAGLE5 40.1.0
    CARD   VERSION      TYPE      GPL        PST            SST        AST
    1113   132-013-000  E5MCAP    OAMHC      IS-NR          Active     -----
      ALARM STATUS       = No Alarms.
      BLMCAP  GPL version = 132-005-000
      IMT BUS A           = Conn
      IMT BUS B           = Conn
      CURRENT TEMPERATURE   =  30C ( 86F)
      PEAK TEMPERATURE:     =  33C ( 92F)     [02-01-05 07:18]
    
    Command Completed.
    
  2. Verify the card that is in card location 1115 by entering this command.

    rept-stat-card:loc=1115

    This is an example of the possible output.

    
    rlghncxa03w 09-03-28 21:15:37 GMT EAGLE5 40.1.0
    CARD   VERSION      TYPE      GPL        PST            SST        AST
    1113   132-013-000  E5MCAP    OAMHC      IS-NR          Active     -----
      ALARM STATUS       = No Alarms.
      BLMCAP  GPL version = 132-005-000
      IMT BUS A           = Conn
      IMT BUS B           = Conn
      CURRENT TEMPERATURE   =  30C ( 86F)
      PEAK TEMPERATURE:     =  33C ( 92F)     [02-01-05 07:18]
    
    Command Completed.
    

    Ensure that both card locations contain the same type of card (E5-OAM).

  3. Display the current characteristics of the security log by entering the rept-stat-seculog command.

    This is an example of the possible output.

    
    rlghncxa03w 09-03-04 16:02:05 GMT  EAGLE5 40.1.0
                 -- SINCE LAST UPLOAD --  OLDEST   NEWEST   LAST
    LOC  ROLE    ENTRIES %FULL OFLO FAIL  RECORD   RECORD   UPLOAD
    1114 Active  8312    84    No   No    09-01-25 09-03-04 09-02-15
                                          08:25:21 09:02:44 02:47:17
    
    1116 Standby 693     7     No   No    09-01-25 09-03-04 09-02-15
                                          08:25:21 09:02:44 02:47:17
    
  4. Copy the security log to the file transfer area by entering the copy-seculog command.

    For this example, copy the security log on the active fixed disk to the file transfer area on the fixed disk. Enter this command.

    copy-seculog:dfile=security1.log:slog=act:dloc=act

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 09-03-04 16:02:37 GMT  EAGLE5 40.1.0
    Security log on TDM 1114 copied to file security1.log on TDM 1114
    
  5. Verify the changes with the rept-stat-seculog command.

    This is an example of the possible output.

    
    rlghncxa03w 09-03-04 16:04:43 GMT  EAGLE5 40.1.0
                 -- SINCE LAST UPLOAD --  OLDEST   NEWEST   LAST
    LOC  ROLE    ENTRIES %FULL OFLO FAIL  RECORD   RECORD   UPLOAD
    1114 Active  1       1     No   No    09-03-04 09-03-04 09-03-04
                                          09:02:44 09:02:44 16:02:37
    
    1116 Standby 0       0     No   No    09-01-25 09-03-04 09-02-15
                                          08:25:21 09:02:44 02:47:17
    

Figure 4-5 Copying the Security Log to the File Transfer Area



Sheet 1 of 2



Sheet 2 of 2

4.7 Adding a User to the System

This procedure is used to add a user to the EAGLE using the ent-user command. This procedure can only be performed if you have been assigned the command class “Security Administration.” If the user ID does not exist in the database, the user’s characteristics cannot be changed.

Note:

This procedure can be performed on all terminals (1 - 40) if the Eagle OA&M IP Security Enhancements feature is on. If this feature is on, the entry YES is shown for terminals 17 through 40 in the SECURE column in the rtrv-trm output. The output of the rtrv-ctrl-feat command also shows if this feature is on or off. If this feature is off, this procedure can be performed only on terminals 1 through 16. If you wish to use the Eagle OA&M IP Security Enhancements feature, and the feature is not on, performActivating the EAGLE OA&M IP Security Enhancement Controlled Feature to enable and turn on this feature.

The ent-user command uses these parameters.

:uid – The user ID to be added to the database

:all – The user has access to all commands in all non-configurable command classes (dbg, link, sys, sa, pu, db).

:dbg – The user has access to all commands in the command class “Debug.”

:link – The user has access to all commands in the command class “Link Maintenance.”

:sys – The user has access to all commands in the command class “System Maintenance.”

:sa – The user has access to all commands in the command class “Security Administration.”

:pu – The user has access to all commands in the command class “Program Update.”

:db – The user has access to all commands in the command class “Database Administration.”

:cc1 - :cc8 – Eight configurable command classes. These parameters specified whether or not the user has access to the commands in the specified configurable command class. The value of these parameters consist of the configurable command class name (1 alphabetic character followed by 2 alphanumeric characters), and either yes or no. The command class name and the yes or no values are separated by a dash. For example, to assign a user the permission to use the commands in configurable command class db1, the cc1=db1-yes parameter would be specified.

To specify any configurable command classes, the Command Class Management feature must be enabled and turned on. Enter the rtrv-ctrl-feat command to verify whether or not the Command Class Management feature is enabled. If the Command Class Management feature is not enabled or turned on, perform Activating Controlled Features to enable and turn on the Command Class Management feature. Up to 32 configurable command classes can be assigned to users. When the Command Class Management feature is enabled and turned on, the configurable command class names are given the names u01 - u32. These command class names, the descriptions of these command classes, and the commands assigned to these command classes can be changed using Configuring Command Classes.

The ent-user command allows up to eight configurable command classes to be assigned to the user. Perform Changing User Information to assign the other 24 configurable command classes to the user, if desired.

:page – The amount of time, in days, that the specified user’s password can be used before the user must change their password.

If the page parameter is not specified with the ent-user command, the EAGLE uses the value configured for the page parameter specified by the chg-secu-dflt command to determine the age of the user’s password.

:uout – The number of consecutive days that a user ID can remain active in the EAGLE and not be used. When the user ID has not been used for the number of days specified by the uout parameter, that user ID is no longer valid and the EAGLE rejects any attempt to log into the EAGLE with that user ID.

If the uout parameter is not specified with the ent-user command, the EAGLE uses the value configured for the uout parameter specified by the chg-secu-dflt command to determine the number of consecutive days that a user ID can remain active on the EAGLE and not be used

:revoke – Is the specified user ID in service? Any login attempts using a revoked user ID are rejected by the EAGLE. The revoke=yes parameter cannot be specified for a user ID assigned to the security administration command class.

The words seas or none cannot be used for user IDs to prevent any conflict with the use of these words in the UID field of the security log. The word none in the UID field of the security log refers to any command that was logged that had no user ID associated with it. The word seas refers to any command logged in the security log that entered the EAGLE on either of the SEAS terminals.

This example shows an rtrv-secu-user command output when the Command Class Management feature is enabled and turned on. If the Command Class Management feature is not enabled and turned on, the 32 configurable command classes, shown in the following example as fields U01 - U32, are not shown in the rtrv-secu-user command output.

An asterisk (*) displayed after the value in the PAGE or UOUT fields indicates that the system-wide default page or uout parameter values, as configured on the chg-secu-dflt command, is in effect for the user ID.


rlghncxa03w 09-03-01 08:33:48 GMT EAGLE5 40.1.0
                                                                
USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
frodo                750 0    0    NO  YES  YES YES YES YES YES
            
            U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
            YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES NO
            
            U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
            YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO  NO  YES
                                                                         
USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
manny                36  60   60   NO  YES  YES YES YES YES YES           
            U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
            NO  NO  NO  NO  YES YES YES YES YES YES YES YES YES YES YES YES
            
            U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
            YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO  NO  YES
                                                               
USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
moe                  100 30   60   YES YES  YES YES YES YES YES
            
            U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
            YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES NO
            
            U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
            YES YES YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO
                                                                
USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
jack                 10  30 * 30 * NO  YES  YES YES YES YES YES
            
            U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
            YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES
            
            U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
            YES YES YES YES YES YES NO  NO  NO  NO  YES YES YES YES YES NO

Canceling the RTRV-SECU-USER Command

Because the rtrv-secu-user command used in this procedure can output information for a long period of time, the rtrv-secu-user command can be canceled and the output to the terminal stopped. There are three ways that the rtrv-secu-user command can be canceled.

  • Press the F9 function key on the keyboard at the terminal where the rtrv-secu-user command was entered.
  • Enter the canc-cmd without the trm parameter at the terminal where the rtrv-secu-user command was entered.
  • Enter the canc-cmd:trm=<xx>, where <xx> is the terminal where the rtrv-secu-user command was entered, from another terminal other that the terminal where the rtrv-secu-user command was entered. To enter the canc-cmd:trm=<xx> command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with the rtrv-secu-trm command. The user’s permissions can be verified with the rtrv-user or rtrv-secu-user commands.

For more information about the canc-cmd command, go to Commands User's Guide.

  1. Verify whether or not the user ID you wish to add to the database is in the database by entering the rtrv-secu-user command and specifying the desired user ID with the uid parameter.

    For this example, enter this command.

    rtrv-secu-user:uid=frodo

    If the user ID being added to the database is displayed in the rtrv-secu-user output, the user ID cannot be used in this procedure. The attributes of the user ID shown in the rtrv-secu-user output can be changed in the Changing User Information.

    If the user ID being added to the database is not in the database, the error message E2199 is displayed.

    
    E2199 Cmd Rej: The specified user identification is not defined
    
    Continue the procedure by performing one of these steps.
    • If the cc1 through cc8 parameters are not being specified in this procedure, continue the procedure with 4.
    • If the cc1 through cc8 parameters will be specified in this procedure, continue the procedure by performing one of these steps.
      • If configurable command classes are shown in the rtrv-secu-user output, continue the procedure with 3.
      • If configurable command classes are not shown in the rtrv-secu-user output, continue the procedure with 2.
  2. Verify that the Command Class Management feature is enabled and turned on, by entering the rtrv-ctrl-feat command with the partnum=893005801 parameter.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    The following features have been permanently enabled:
    Feature Name              Partnum    Status  Quantity
    Command Class Management  893005801  off     ----
    

    Note:

    The rtrv-ctrl-feat command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-ctrl-feat command, see the rtrv-ctrl-feat command description in Commands User's Guide.

    If the Command Class Management feature is enabled and turned on (status = on), continue the procedure with 3.

    If the Command Class Management feature is not enabled or turned on, perform Activating Controlled Featuresto enable and turn on the Command Class Management feature.

    Caution:

    If the Command Class Management feature is temporarily enabled, the configurable command classes can be assigned and used only for the amount of time shown in the Trial Period Left column in the rtrv-ctrl-feat output.
  3. Display the descriptions of the configurable command classes in the database by entering the rtrv-cmd command.

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 21:15:37 GMT EAGLE5 41.0.0
    CMD                 CLASS
    alw-slk             link, u11
    ent-user            sa
    unhb-slk            link
    rtrv-attr-seculog   sa, u31
    inh-slk             link, abc
    rtrv-meas-sched     link, abc, def
    act-lbp             link
    act-dlk             link
    act-slk             link
    rtrv-seculog        sa, abc, def, ghi
    act-lpo             link
    blk-slk             link, abc, u23, u31
    dact-lbp            link
    canc-dlk            link
    inh-card            sys
    canc-lpo            link, u01, u02, u03, u04, u05, u06, u07, u08, u09, u10,
                        u11, u12, u13
    canc-slk            link
    ublk-slk            link, u01, u02, u03, u04, u05, u06, u07, u08, u09, u10,
                        u11, u12, u13, u14, u15, u16, u17, u18, u19, u20, u21,
                        u22, u23, u24, u25, u26, u27, u28, u29, u30, u31, u32
    inh-trm             sys, krb
    rept-meas           link
    .
    .
    .
    chg-meas            link
    tst-dlk             link, krb
    tst-slk             link
    

    If the desired configurable command class descriptions are not in the database, perform Configuring Command Classes to configure the desired command classes.

  4. After you enter the ent-user command, you will be prompted for a password for the user that is being added.

    The password must meet the requirements defined by the chg-secu-dflt command. Once you enter the ent-user command, you will not be able to enter any other commands until the user ID and password combination has been accepted by the EAGLE. The password requirements must be verified before the ent-user command is executed. Display the password requirements by entering the rtrv-secu-dflt command. This is an example of the possible output.

    
    rlghncxa03w 10-07-01 16:02:05 GMT  EAGLE5 42.0.0
    SECURITY DEFAULTS
    -----------------
    MINLEN          8
    ALPHA           1
    NUM             1
    PUNC            1
    

    The rtrv-secu-dflt command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-secu-dflt command, refer to the rtrv-secu-dflt command description in Commands User's Guide.

    The password can contain from one to twelve characters. For this example, the password must contain at lease eight characters, no more than twelve, with at least one alpha character (a-z), at least one numeric character (0-9), and at least one punctuation character (any printable character that is not an alphabetic character, a numeric character, the space bar). The password requirements are shown in these fields in the rtrv-secu-dflt command output.

    • MINLEN – the minimum length of the password
    • ALPHA – the minimum number of alpha characters
    • NUM – the minimum number of numeric characters
    • PUNC – the minimum number of punctuation characters

    The password is not case sensitive. For security reasons, the password is never displayed on the terminal.

  5. Add the new user ID to the database using the ent-user command.

    The user ID must contain 1 alpha character and up to 15 alphanumeric characters. The first character of a user ID must be an alpha character. Even though a period is not an alphanumeric character, one of the 15 alphanumeric characters can be a period.

    The other parameters assign command class permissions to the user ID. If yes is entered for any of these parameters, the user will have access to that class of commands. If no is entered, the user will not have access to that class of commands. These parameters are optional and if not specified, the user is not assigned to that command class. The user is assigned to the Basic command class whether any of these other parameters are specified. Refer to Commands User's Guide for a list of commands permitted with each command class. For this example, the user IDfrodo is being added with access to these command classes: link maintenance, system maintenance, database administration, and debug.

    The frodo user ID will use the values for the page and uout parameters configured with the chg-secu-dflt command. For this example, enter this command.

    ent-user:uid=frodo:link=yes:sys=yes:db=yes:dbg=yes:cc1=db1-yes

    This message should appear.

    
    rlghncxa03w 06-10-01  09:12:36 GMT  EAGLE5 36.0.0
    ENT-USER: MASP A - COMPLTD
    
  6. You are prompted for a password for the user that is being added.

    Enter the new password. Make sure that the password meets the password requirements displayed in the output of the rtrv-secu-dflt command, executed in 4 .

  7. At the prompt verify password, re-enter the password that was entered in 6 again.
  8. When the command executed message appears, the execution of the command has been completed, and the user ID and password has been added to the database.
  9. Verify the changes using the rtrv-secu-user command with the user ID specified in 5 .

    For this example, enter this command.

    rtrv-secu-user:uid=frodo

    This is an example of the possible output.

    
    rlghncxa03w 09-03-01 08:33:48 GMT EAGLE5 40.1.0
                                                                    
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    frodo                0   60 * 90 * NO  YES  NO  YES NO  YES YES
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                YES NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO
    
  10. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-6 Adding a User to the System



Sheet 1 of 2



Sheet 2 of 2

4.8 Removing a User from the System

This procedure is used to remove a user from the EAGLE using the dlt-user command. This procedure can only be performed if you have been assigned the command class “Security Administration.” If the user ID does not exist in the database, the user’s characteristics cannot be changed.

  1. Display the user IDs in the database using the rtrv-secu-user command.

    This is an example of the possible output.

    
    rlghncxa03w 09-03-01 08:33:48 GMT EAGLE5 40.1.0
                                                                    
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    frodo                0   60 * 90 * NO  YES  NO  YES NO  YES YES
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                YES NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO
                                                        
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    manny                36  60   60   NO  YES  YES YES YES YES YES
                
                U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                NO  NO  NO  NO  YES YES YES YES YES YES YES YES YES YES YES YES
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO  NO  YES
                                                                    
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    fred                 750 0    0    NO  YES  YES YES YES YES YES
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES NO
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                YES YES YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO
                                                                    
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    travist              101 60 * 90 * NO  YES  NO  YES NO  NO  YES
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                YES YES YES YES YES YES NO  NO  NO  NO  YES YES YES YES YES NO
    
  2. Remove the user ID from the database by using the dlt-user command.

    The dlt-user command has only one parameter, uid, which is the user ID that you wish to remove from the database. For this example, enter this command.

    dlt-user:uid=travist

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    DLT-USER: MASP A - COMPLTD
    
  3. Verify the changes using the rtrv-secu-user command and specifying the user ID used in step 2 with the uid parameter.

    For this example, enter this command.

    rtrv-secu-user:uid=travist

    If the user ID was removed in step 2, error message E2199 is displayed.

    
    E2199 Cmd Rej: The specified user identification is not defined
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-7 Removing a User from the System



4.9 Changing User Information

This procedure is used to change the characteristics of a user on the EAGLE using the chg-user command. This procedure can only be performed if you have been assigned the command class “Security Administration.” If the user ID does not exist in the database, the user’s characteristics cannot be changed.

Note:

The pid parameter can be specified for this procedure on all terminals (1 - 40) if the Eagle OA&M IP Security Enhancements feature is on. If this feature is on, the entry YES is shown for terminals 17 through 40 in the SECURE column in the rtrv-trm output. The output of the rtrv-ctrl-feat command also shows if this feature is on or off. If this feature is off, the pid parameter can be specified for this procedure only on terminals 1 through 16. If you wish to use the Eagle OA&M IP Security Enhancements feature, and the feature is not on, performActivating the EAGLE OA&M IP Security Enhancement Controlled Feature to enable and activate this feature.

The chg-user command uses these parameters.

:uid – The ID of a user in the database

:nuid – New user ID – The new ID of the user specified by the uid parameter.

:pid – Password ID (only required if changing the password of a user) – The password of the user specified by the uid parameter.

:all – The user has access to all commands in all command classes.

:dbg – The user has access to all commands in the command class “Debug.”

:link – The user has access to all commands in the command class “Link Maintenance.”

:sys – The user has access to all commands in the command class “System Maintenance.”

:sa – The user has access to all commands in the command class “Security Administration.”

:pu – The user has access to all commands in the command class “Program Update.”

:db – The user has access to all commands in the command class “Database Administration.”

:cc1 - :cc8 – Eight configurable command classes. These parameters specified whether or not the user has access to the commands in the specified configurable command class. The value of these parameters consist of the configurable command class name (1 alphabetic character followed by 2 alphanumeric characters), and either yes or no. The command class name and the yes or no values are separated by a dash. For example, to assign a user the permission to use the commands in configurable command class db1, the cc1=db1-yes parameter would be specified.

To specify any configurable command classes, the Command Class Management feature must be enabled and turned on. Enter the rtrv-ctrl-feat command to verify whether or not the Command Class Management feature is enabled. If the Command Class Management feature is not enabled or turned on, perform Activating Controlled Features to enable and turn on the Command Class Management feature. Up to 32 configurable command classes can be assigned to users. When the Command Class Management feature is enabled and turned on, the configurable command class names are given the names u01 - u32. These command class names, the descriptions of these command classes, and the commands assigned to these command classes can be changed using the Configuring Command Classes.

The chg-user command can assign a maximum of eight configurable command classes to the user each time the chg-user command is performed.

:page – The amount of time, in days, that the specified user’s password can be used before the user must change their password.

If the page parameter is not specified with the ent-user command, the EAGLE uses the value configured for the page parameter specified by the chg-secu-dflt command to determine the age of the user’s password.

:uout – The number of consecutive days that a user ID can remain active on the EAGLE and not be used. When the user ID has not been used for the number of days specified by the uout parameter, that user ID is no longer valid and the EAGLE rejects any attempt to log into the EAGLE with that user ID.

If the uout parameter is not specified with the ent-user command, the EAGLE uses the value configured for the uout parameter specified by the chg-secu-dflt command to determine the number of consecutive days that a user ID can remain active on the EAGLE and not be used

:revoke – Is the specified user ID in service? Any login attempts using a revoked user ID are rejected by the EAGLE. The revoke=yes parameter cannot be specified for a user ID assigned to the security administration command class.

:rstlsl – resets the last successful login date for a user ID to the current date. If the user ID is out of service because the user ID has been idle longer that the value of the uout parameter defined by either the ent-user or chg-secu-dflt commands, this parameter brings that user ID back into service.

This example shows an rtrv-secu-user command output when the Command Class Management feature is enabled and turned on. If the Command Class Management feature is not enabled and activated, the 32 configurable command classes, shown in the following example as fields U01 - U32, are not shown in the rtrv-secu-user command output.

An asterisk (*) displayed after the value in the PAGE or UOUT fields indicates that the system-wide default page or uout parameter values, as configured on the chg-secu-dflt command, is in effect for the user ID.


rlghncxa03w 09-03-01 08:33:48 GMT EAGLE5 40.1.0                                                                
USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
frodo                750 0    0    NO  YES  YES YES YES YES YES
            
            U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
            YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES NO
            
            U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
            YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO  NO  YES
                                                            
USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
manny                36  60   60   NO  YES  YES YES YES YES YES
            
            U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
            NO  NO  NO  NO  YES YES YES YES YES YES YES YES YES YES YES YES
            
            U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
            YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO  NO  YES
                                                                
USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
moe                  100 30   60   YES YES  YES YES YES YES YES
            
            U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
            YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES NO
            
            U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
            YES YES YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO
                                                                
USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
jack                 10  30 * 30 * NO  YES  YES YES YES YES YES
          
            U01 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
            YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES
            
            U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
            YES YES YES YES YES YES NO  NO  NO  NO  YES YES YES YES YES NO
  1. Display the user IDs in the database using the rtrv-secu-user command.

    This is an example of the possible output.

    
    rlghncxa03w 09-03-01 08:33:48 GMT EAGLE5 40.1.0
                                                             
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    frodo                0   60 * 90 * NO  YES  NO  YES NO  YES YES
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                YES NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO  NO
                                                                    
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    manny                36  60   60   NO  YES  YES YES YES YES YES
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                NO  NO  NO  NO  YES YES YES YES YES YES YES YES YES YES YES YES
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO  NO  YES
                                                                    
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    fred                 750 0    0    NO  YES  YES YES YES YES YES
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                NO  YES YES YES YES YES YES YES YES YES YES YES YES YES YES NO
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                YES YES YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO
                                                                    
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    travist              101 60 * 90 * NO  YES  NO  YES NO  NO  YES
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                YES YES YES YES YES YES NO  NO  NO  NO  YES YES YES YES YES NO
    
    Continue the procedure by performing one of these steps.
    • If the cc1 through cc8 parameters are not being specified in this procedure, continue the procedure with 4.
    • If the cc1 through cc8 parameters will be specified in this procedure, continue the procedure by performing one of these steps.
      • If configurable command classes are shown in the rtrv-secu-user output, continue the procedure with 3.
      • If configurable command classes are not shown in the rtrv-secu-user output, continue the procedure with 2.
  2. Verify that the Command Class Management feature is enabled and activated, by entering the rtrv-ctrl-feat command with the partnum=89005801 parameter.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    The following features have been permanently enabled:
    Feature Name              Partnum    Status  Quantity
    Command Class Management  893005801  off     ----
    

    Note:

    The rtrv-ctrl-feat command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-ctrl-feat command, see the rtrv-ctrl-feat command description in Commands User's Guide.

    If the Command Class Management feature is enabled and turned on (status = on), 3 .

    If the Command Class Management feature is not enabled or turned on, perform Activating Controlled Featuresto enable and turn on the Command Class Management feature.

    Caution:

    If the Command Class Management feature is temporarily enabled, the configurable command classes can be assigned and used only for the amount of time shown in the Trial Period Left column in the rtrv-ctrl-feat output.
  3. Display the descriptions of the configurable command classes in the database by entering the rtrv-cmd command.

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 21:15:37 GMT EAGLE5 41.0.0
    CMD                 CLASS
    alw-slk             link, u11
    ent-user            sa
    unhb-slk            link
    rtrv-attr-seculog   sa, u31
    inh-slk             link, abc
    rtrv-meas-sched     link, abc, def
    act-lbp             link
    act-dlk             link
    act-slk             link
    rtrv-seculog        sa, abc, def, ghi
    act-lpo             link
    blk-slk             link, abc, u23, u31
    dact-lbp            link
    canc-dlk            link
    inh-card            sys
    canc-lpo            link, u01, u02, u03, u04, u05, u06, u07, u08, u09, u10,
                        u11, u12, u13
    canc-slk            link
    ublk-slk            link, u01, u02, u03, u04, u05, u06, u07, u08, u09, u10,
                        u11, u12, u13, u14, u15, u16, u17, u18, u19, u20, u21,
                        u22, u23, u24, u25, u26, u27, u28, u29, u30, u31, u32
    inh-trm             sys, krb
    rept-meas           link
    .
    .
    .
    chg-meas            link
    tst-dlk             link, krb
    tst-slk             link
    

    If the desired configurable command class descriptions are not in the database, perform Configuring Command Classesto configure the desired command classes.

    Note:

    A user ID cannot be changed while the user is logged on, except when the revoke=yes parameter is specified with the chg-user command. It is assumed that if the user is being revoked, the intent is to immediately deny the user access to the EAGLE. In this case, the user will be logged off when the database is updated.
  4. Verify that the user is not logged on the EAGLE using the rept-stat-user command.

    If the user is logged on to the EAGLE, the chg-user command will log the user off the EAGLE when the command is executed. Notify the user to log off the EAGLE. This is an example of the possible output.

    
    rlghncxa03w 09-05-01 09:12:15 GMT  EAGLE5 41.0.0
    REPT-STAT-USER COMPLTD
    USER ID          TERM #  IDLE SINCE         COMMAND             STATE
    fred                3    09-04-19 05:06:43  rept-stat-user      PROCESSING
    frodo              13    09-04-20 08:12:23  chg-db              IDLE
    manny               1    09-04-27 04:37:56  ent-dlk             IDLE
    travist             7    09-04-30 10:06:22  rtrv-meas           IDLE
    
  5. Change the user’s characteristics using the chg-user command.

    The nuid parameter changes the user ID of a user. This parameter is optional and if not specified, the user ID is not changed. The user ID must contain 1 alpha character and up to 15 alphanumeric characters. The first character of a user ID must be an alpha character. Even though a period is not an alphanumeric character, one of the 15 alphanumeric characters can be a period.

    The pid parameter specifies whether the password is to be changed. If no is selected, the password is not changed. If yes is entered, you will be prompted for a new password for the user. Enter the new password for the user. You do not need to know the old password with this command. The password must meet the requirements defined by the chg-secu-dflt command. Display the password requirements by entering the rtrv-secu-dflt command.

    This is an example of the possible output.

    
    rlghncxa03w 10-07-01 16:02:05 GMT  EAGLE5 42.0.0
    SECURITY DEFAULTS
    -----------------
    MINLEN          8
    ALPHA           1
    NUM             1
    PUNC            1
    

    The rtrv-secu-dflt command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-secu-dflt command, refer to the rtrv-secu-dflt command description in Commands User's Guide.

    The password can contain from one to twelve characters. For this example, the password must contain at least eight characters, no more than twelve, with at least one alpha character (a-z), at least one numeric character (0-9), and at least one punctuation character (any printable character that is not an alphabetic character, a numeric character, the space bar). The password requirements are shown in these fields in the rtrv-secu-dflt command output.

    • MINLEN – the minimum length of the password
    • ALPHA – the minimum number of alpha characters
    • NUM – the minimum number of numeric characters
    • PUNC – the minimum number of punctuation characters

    The password is not case sensitive. For security reasons, the password is never displayed on the terminal.

    At the prompt verify password, enter the new password again. This pid parameter is optional and the default value is no.

    The other parameters assign command class permissions to the user ID. If yes is selected for any of these parameters, the user will have access to that class of commands. If no is entered, the user will not have access to that class of commands. These parameters are optional and if not specified, the values are not changed.

    For this example, the user ID manny is being changed to bilbo, and the PU, DB, DBG, and DB1 command class values are changed. Enter this command.

    chg-user:uid=manny:nuid=bilbo:pu=no:db=no:dbg=no:db1=yes

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    CHG-USER: MASP A - COMPLTD
    
  6. Verify the changes using the rtrv-secu-user command and specifying the user ID used in 5 with the uid parameter.

    If the user ID was changed in 5 , specify the new user ID. For this example, enter this command.

    rtrv-secu-user:uid=bilbo

    This is an example of the possible output.

    
    rlghncxa03w 09-03-01 08:33:48 GMT EAGLE5 40.1.0
                                                                    
    USER ID              AGE PAGE UOUT REV LINK SA  SYS PU  DB  DBG
    bilbo                36  60   60   NO  YES  YES YES NO  NO  NO
                
                DB1 U02 U03 U04 U05 U06 U07 U08 U09 U10 U11 U12 U13 U14 U15 U16
                YES NO  NO  NO  YES YES YES YES YES YES YES YES YES YES YES YES
                
                U17 U18 U19 U20 U21 U22 U23 U24 U25 U26 U27 U28 U29 U30 U31 U32
                YES YES YES YES YES YES YES YES YES YES YES NO  NO  NO  NO  YES
    
  7. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-8 Changing User Information



Sheet 1 of 3



Sheet 2 of 3



Sheet 3 of 3

4.10 Changing a Password

There are two different procedures that can be used to change passwords. This procedure allows a specific user to change their own password using the chg-pid command. The other procedure is for the EAGLE administrator to change the password of any user (see the Changing User Information procedure).

Rules for Changing a Password

The rules for the format of the password are determined by the chg-secu-dflt command (see the Changing the Security Defaults procedure for more information) and are displayed in the scroll area of the terminal before the password prompt is issued, or by entering the rtrv-secu-dflt command.

The minintrvl parameter of the chg-secu-dflt command defines the minimum number of days between attempts to change a password. If this attempt occurs during this interval, the password cannot be changed.

The pchreuse parameter of the chg-secu-dflt command defines the number of characters that cannot be reused from the current password when setting the new password. For example, if the pchreuse parameter value is 5, no more than five characters of the current password can be reused in the new password. If the new password contains more the five characters from the current password, the new password will be rejected.

The preuse parameter defines the number of previous passwords that cannot be used. If the preuse parameter value is 6, the previous six passwords cannot be used. If the new password is one of the number of previous passwords defined by the preuse parameter, the new password will be rejected.

When the password is being changed with the chg-pid command, the minimum requirements for passwords are displayed after the current password is entered at the Enter Old Password: prompt.

The password is not case sensitive. For security reasons, the password is never displayed on the terminal.

Note:

This procedure can be performed on all terminals (1 - 40) if the Eagle OA&M IP Security Enhancements feature is on. If this feature is on, the entry YES is shown for terminals 17 through 40 in the SECURE column in the rtrv-trm output. The output of the rtrv-ctrl-feat command also shows if this feature is on or off. If this feature is off, this procedure can be performed only on terminals 1 through 16. If you wish to use the EAGLE OA&M IP Security Enhancements feature, and the feature is not on, go to the Activating the EAGLE OA&M IP Security Enhancement Controlled Feature procedure to enable and activate this feature.
  1. Log into the EAGLE using the login or act-user command.

    This is an example of the messages that appear when you have successfully logged onto the EAGLE.

    
    NOTICE: This is a private computer system. 
    Unauthorized access or use may lead to prosecution. 
    
    0 LOGIN failures since last successful LOGIN
    Last successful LOGIN was on port 4 on 04-06-01 @ 09:12:36
    
  2. Enter the chg-pid command.
  3. At the prompt enter old password, enter your current password.

    This is a security feature of this command. It prevents another user from changing the password of the user that is logged in to the EAGLE who may have stepped away from the terminal without logging off.

  4. At the prompt enter new password, the minimum requirements for passwords are displayed as shown in the following example.
    
    rlghncxa03w 10-07-01 09:12:36 GMT  EAGLE5 42.0.0
    New password must contain:
      - between 8 and 12 characters
      - at least 1 alphabetic character(s) (‘a’-’z’)
      - at least 1 numeric character(s) (‘0’-’9’)
      - at least 1 punctuation character(s) (e.g. $%@#) 
    New password must:
      - be unique from the old password
      - be unique from the last 6 historical passwords
      - not reuse more than 4 characters from the old password
    

    Enter your new password making sure that the password meets the minimum requirements for passwords on your EAGLE.

    If the password is rejected, it did not meet the minimum requirements for passwords. Go back to 2 and start the process of changing the password again making sure that the new password meets the minimum character requirements.

  5. At the prompt verify new password, enter the password that was entered in 4 again.

    If the password is rejected, either the new password entered in this step did not match the password entered in 4 , or the password entered in 3 did not match the original password. Go back to 2 and start the process of changing the password again making sure that the current password entered in 3 is correct and that the new password meets the minimum character requirements shown at the enter new password prompt.

  6. When the command executed message appears, the execution of the command has been completed, and the new password has been entered into the EAGLE database.

    This message should also appear.

  7. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-9 Changing a Password



4.11 Changing Terminal Characteristics

This procedure is used to change the characteristics of a terminal, except for the SEAS terminal and a measurements terminal for an EAGLE containing a maximum of 700 signaling links, using the chg-trm command.

To configure a measurements terminal for an EAGLE containing a maximum of 700 signaling links, go to the Configuring the Measurements Terminal for an EAGLE Containing 700 Signaling Links procedure.

To configure a SEAS terminal, refer to the Configuring SEAS Terminals procedure.

The communication attributes can be changed on any terminal except on the terminal you are logged on to. The message output group assignments can be changed on any terminal, including the terminal you are logged on to. The chg-trm command uses these parameters.

:trm – terminal numbers (1 - 40, terminals 1-16 are serial terminals, terminals 17-40 are telnet terminals).

:baud – Serial port baud rate (2400, 4800, 9600, or 19200, 38400, 57600, 115200). Values 38400, 57600, and 115200 are only valid when the OAMHC is used.

:sb – The number of stop bits used in communications with the device (1 or 2).

:prty – Parity used by the device (odd, even, none).

:type – The type of device being connected (See the "Terminal Types" section).

:fc – The type of flow control used between the EAGLE and the output devices. (sw - software, hw - hardware, both - hardware and software, none).

Note:

Hardware flow control (fc=hw) and both hardware and software flow control (fc=both) are not supported for the terminal if the EAGLE contains E5-TDMs. Part of the terminal output may be lost if hardware flow control or both hardware and software flow control are specified for the terminal when the EAGLE contains E5-TDMs.

:tmout – The maximum amount of time, in minutes, that a login session on the specified port can remain idle (that is, no user input) on the port before being automatically logged off. (0 - 99, see the "Security Parameters" section).

:mxinv – The login failure threshold – The number of login attempt failures or attempts to unlock a terminal that can occur on the terminal before the terminal is disabled. (0 - 9, see the "Security Parameters" section).

:dural – The length of time that the terminal is disabled after the login failure threshold has been exceeded. (See the "Security Parameters" section).

:all – Specifies whether or not all unsolicited messages are displayed on the specified terminal (yes or no).

:traf – Specifies whether or not traffic related unsolicited messages are displayed on the specified terminal (yes or no).

:link – Specifies whether or not link maintenance related unsolicited messages are displayed on the specified terminal (yes or no).

:sa – Specifies whether or not security administration related unsolicited messages are displayed on the specified terminal (yes or no).

:db – Specifies whether or not database related unsolicited messages are displayed on the specified terminal (yes or no).

:sys – Specifies whether or not system maintenance related unsolicited messages are displayed on the specified terminal (yes or no).

:pu – Specifies whether or not program update related unsolicited messages are displayed on the specified terminal (yes or no).

:uimrd – Specifies whether or not UIM redirect related unsolicited messages are displayed on the specified terminal (yes or no).

:appserv – Specifies whether or not application server related unsolicited messages are displayed on the specified terminal. (yes or no).

:appss – Specifies whether or not application subsystem related unsolicited messages are displayed on the specified terminal (yes or no).

:card – Specifies whether or not card related unsolicited messages are displayed on the specified terminal (yes or no).

:clk – Specifies whether or not clock related unsolicited messages are displayed on the specified terminal (yes or no).

:dbg – Specifies whether or not debug related unsolicited messages are displayed on the specified terminal (yes or no).

:gtt – Specifies whether or not global title translation related unsolicited messages are displayed on the specified terminal (yes or no).

:gws – Specifies whether or not gateway screening related unsolicited messages are displayed on the specified terminal (yes or no).

:meas – Specifies whether or not measurements maintenance related unsolicited messages are displayed on the specified terminal (yes or no).

:mon – Specifies whether or not unsolicited messages related to the Sentinel monitoring functions are displayed on the specified terminal (yes or no).

:mps – Specifies whether or not MPS related unsolicited messages are displayed on the specified terminal (yes or no).

:seas – Specifies whether or not SEAS maintenance related unsolicited messages are displayed on the specified terminal (yes or no).

:logintmr – the login timer. This parameter specifies the maximum time for logging on to the telnet terminal after selecting the terminal. This timer makes sure the user logs in with in the configured time and terminal does not remain idle. The value for this timer can be from 3 seconds to 600 seconds. An additional value none indicates that the user has an indefinite amount of time to login on the telnet terminal. The system default value for this parameter is none. This parameter can be specified only for telnet terminals (type=telnet).

:logouttmr – the logout timer. This parameter specifies the maximum time the telnet session remains open after the user manually or automatically logs out. The value for this timer can be from 0 to 1200 seconds. An additional value none indicates that the telnet session is never closed when the user logs out. The system default value for this parameter is none. This parameter can be specified only for telnet terminals (type=telnet).

:pngtimeint – the ping timer interval. This parameter specifies the amount of time that must pass before the IPSM initiates a new ping cycle. The value for this timer can be from 100 to 1200000 milliseconds. An additional value none indicates that pinging does not occur. The system default value for this parameter is none. This parameter can be specified only for telnet terminals (type=telnet) and EMSALM terminals (type=emsalm).

:pngfailcnt – This parameter specifies the number of consecutive ping fails that must occur before the telnet connection is dropped. The value for this timer can be from 1 to 10. The system default value for this parameter is 1. This parameter can be specified only for telnet terminals (type=telnet) and EMSALM terminals (type=emsalm).

The messages assigned to the output message groups defined by the traf, db, link, sa, sys, pu, uimrd, appserv, appss, card, clk, dbg, gtt, gws, meas, mon, mps, and seas parameters are listed in Unsolicited Alarm and Information Messages Reference .

Certain UIMs (unsolicited information messages) can be assigned to the UIM Redirect output group or remain in their original output message group. The uimrd parameter of the chg-trm command and the on=uimrd and off=uimrd parameters of the chg-stpopts command determine which output groups these UIMs are assigned to and how the EAGLE handles them.

The on=uimrd parameter of the chg-stpopts command tells the EAGLE to put these UIMs in the unsolicited UIM Redirect output message group. If the off=uimrd parameter is specified with the chg-stpopts command, the messages remain in their original output message group. The on=uimrd parameter value of the chg-stpopts command is shown in the UIMRD row of the rtrv-stpopts output as the value yes. The off=uimrd parameter value of the chg-stpopts command is shown in the UIMRD row of the rtrv-stpopts output as the value no. The uimrd=yes parameter of the chg-trm command allows the specified terminals to receive unsolicited UIM redirect output messages.

Table 4-2 shows the combination of the values of both uimrd values and how the EAGLE handles the messages. The unsolicited output group message assignments are listed in Unsolicited Alarm and Information Messages Reference.

Table 4-2 UIMRD Parameter Combinations

UIMRD value of the terminal UIMRD STP option value Action

No

No (See Note 1)

The UIMs remain in their original output message group and are output to terminals receiving messages from the original output message group.

No

Yes (See Note 2)

The UIMs are in the UIM Redirect output group but are not output to any terminal.

Yes

No (See Note 1)

The UIMs remain in their original output message group and are output to terminals receiving messages from the original output message group.

Even though the UIMRD value for the terminal is yes, there are no messages in the UIM redirect output group because the UIMRD value in the rtrv-stpopts output is no.

No UIM redirect messages are output to any terminal.

Yes

Yes (See Note 2)

The UIMs are in the UIM Redirect output group and are output to terminals receiving unsolicited UIM redirect messages.

Notes:
  1. This value is set with theoff=uimrdparameter of thechg-stpoptscommand.
  2. This value is set with theon=uimrdparameter of thechg-stpoptscommand.

If the type=vt320 or type=sccs parameters are specified, the value of the prty parameter cannot be none. The value of the prty parameter must be either odd or even.

The EAGLE requires at least two terminals assigned to the Security Administration command class. The terminal type of a terminal assigned to the Security Administration command class cannot be changed to these terminal types, printer (:type=printer) or none (:type=none) if the change would leave the EAGLE with only one terminal assigned to the Security Administration command class. The command class assignments of the terminal are shown with the rtrv-secu-trm command. If the terminal type is being changed to either printer or none, go to the Changing Terminal Command Class Assignments procedure and make sure that the command class assignment for the terminal being changed does not have the Security Administration command class assigned to it, or change the command class assignment of another terminal to include the Security Administration command class.

If the all=yes parameter and the traf, db, link, sa, sys, pu, uimrd, appserv, appss, card, clk, dbg, gtt, gws, meas, mon, mps, or seas parameters are specified, for example, chg-trm:trm=1:all=yes:pu=no; all the message output groups are set to yes with the exception of the message output groups specified in the chg-trm command which are set to no. In this example, the value of all the message output groups is yes (all=yes) with the exception of the program update message output group which has the value no (pu=no).

If the all=no parameter is specified for a SEAS terminal (type=seas), all the output group values are changed to NO except for the SEAS output group. The SEAS output group value remains set to YES and this message is displayed.

SEAS Output Group is SET for SEAS terminal <terminal number>

The total value of the terminals’ baud rate cannot be greater than 172,032. If the total baud rate of the terminals exceeds 172,032, change the baud rates of the terminals so that the total baud rate is not greater than 172,032.

Only four terminals should be configured to receive unsolicited system maintenance messages (:sys=yes).

If the communication attributes (baud, sb, prty, and fc) or the terminal type (type) for the terminal are being changed, the terminal must be placed out of service with the rmv-trm command before the changes can be made.

If only the output message group or security (tmout, mxinv, dural) parameters are being changed, the terminal can remain in service when the chg-trm command is executed.

Terminal Types

There are nine terminal types that can be used on the EAGLE.

The VT320 type is the standard terminal used for entering commands, displaying command responses, displaying periodic system status information at screen specific locations, and scrolling unsolicited messages.

The PRINTER type is used with printers for recording UAMs, UIMs and echoed command responses.

The KSR type mimics older style teleprinters (that is, printers with a keyboard).

The SCCS type is used for some network monitoring and surveillance applications. SCCS terminals are the same as KSR terminals, except a pre-defined “start-of-message” character is added to indicate the beginning of a new command response or unsolicited message.

The NONE type is typically used to indicate unused terminals.

The MGMT terminal type, or management terminal, provides a machine to machine messaging interface between the EAGLE and the customer’s network to provide network surveillance.

The TELNET terminal type provides up to 24 IP based connections to the EAGLE’s user interface using a telnet client, in addition to the 16 RS-232 terminals. The telnet terminals are numbered from 17 to 40. The telnet terminals are configured automatically when the IP User Interface (Telnet) feature is enabled and activated, and when the IPSMs are configured in the database. The EAGLE can have 3 IPSMs, with each IPSM supporting eight telnet terminals. The baud, prty, sb, and fc parameters cannot be specified with the chg-trm command for a telnet terminal, but all other terminal parameters can be specified and changed for a telnet terminal. For terminals 17 to 40, the values for the type parameter can be only telnet, none, or emsalm.

Note:

If the chg-trm command is executed from a telnet terminal (terminals 17 to 40), only the output group parameters (all, traf, link, sa, db, sys, pu, uimrd, appserv, appss, card, clk, dbg, gtt, gws, meas, mon, mps, seas) and the terminal type can be changed.

The EMSALM terminal type provides an alarm monitoring capability that displays only UAMs and system alive messages generated by the EAGLE. UIMs and autonomous reports are not displayed on the EMSALM terminals, even if the output group settings for these terminals would allow these messages to be displayed on these terminals.

Caution:

EMSALM terminals can accept login requests and commands; however, these operations may interfere with the alarm monitoring functions of the EMSALM terminals and should be performed on another terminal.

The EMSALM terminal type can be assigned to any terminal, serial (terminals 1 to 16) or telnet (terminals 17 to 40). When the terminal type is changed to emsalm, all the output message group settings for that terminal are set to yes, even if any of the output message groups were set to no before the terminal type change. These output message group settings can be changed, if desired. The communications attributes (baud, prty, sb, fc) and security parameter values (tmout, mxinv, dural) are not changed.

Caution:

It is recommended that all the output message group settings for an EMSALM terminal are set to yes. Changing any of the output message group settings to no could prevent alarm messages controlled by the output message group from being displayed on the EMSALM terminal.

Caution:

If a terminal dedicated to measurements collection is configured (see the Configuring the Measurements Terminal for an EAGLE Containing 700 Signaling Links procedure), it is recommended that this terminal is not changed to an EMSALM terminal.

When the terminal type is changed from emsalm to another terminal type, the output message group settings, communications attributes, and security parameter values are not changed.

When assigning the EMSALM terminal type to a serial terminal, the communication attribute (baud, prty, sb, fc), security (tmout, mxinv, dural), and output group (traf, db, link, sa, sys, uimrd, appserv, appss, card, clk, dbg, gtt, gws, meas, mon, mps, seas) parameters values can be changed.

When assigning the EMSALM terminal type to a telnet terminal, only the security (tmout, mxinv, dural), and output group (traf, db, link, sa, sys, pu, uimrd, appserv, appss, card, clk, dbg, gtt, gws, meas, mon, mps, seas) parameters values can be changed.

The SEAS terminal type is used to provide a path between the EAGLE and the CCS MR to support the SEAS over IP feature. The SEAS terminal type is not used in this procedure. To configure a terminal as a SEAS terminal, refer to the Configuring SEAS Terminals procedure.

Security Parameters

The monitoring of a terminal’s idle time (tmout) and the automatic logout function only applies to terminal types VT320 (type=vt320), KSR, (type=ksr), SCCS (type=sccs), and MGMT (type=mgmt). The tmout parameter can be specified with other terminal types, but it will have no effect. The system default value for the tmout parameter is 30 minutes. The tmout=0 parameter value allows the terminal to remain idle indefinitely without being automatically logged off.

To impose a temporary lockout of a terminal after a particular number of login attempt failures or a particular number of attempts to unlock a terminal have occurred, the mxinv and dural values for that terminal must be greater than 0.

The mxinv=0 parameter value prevents any temporary lockout of the terminal regardless of the number of successive failed login or unlock attempts that were made at the terminal. No messages are issued regarding the temporary lockout. This action applies even if the dural parameter value is greater than 0.

The dural=0 parameter prevents the terminal from being temporarily locked out. If the mxinv parameter value is greater than 0 and the dural parameter value is 0, the EAGLE issues messages concerning login failure threshold, but the terminal will not be locked out.

The value of the dural parameter can be expressed in seconds (0 - 59), minutes and seconds (0 - 5959), or hours, minutes, and seconds (0 - 995959). The value 999999 for the dural parameter disables the terminal, when the login failure threshold has been exceeded, for an indefinite period of time. A terminal that is disabled for an indefinite period of time is identified by the entry INDEF in the DURAL field of the rtrv-trm command output. A terminal disabled indefinitely can only be restored to service by inhibiting the terminal with the rmv-trm command, then placing it into service with the rst-trm command.

When the EAGLE is delivered to the user, the mxinv and dural parameters will be set to these values:

:mxinv = 5

:dural = 0100 (1 minute, 0 seconds)

The RTRV-TRM Output

The output of the rtrv-trm command is displayed in two parts. The first part displays the communication and security attributes of the terminal. The communication attributes of the terminal, BAUD, PRTY (parity), SB (stop bits), and DBTS (data bits), are displayed in the COMM field of the rtrv-trm output and are displayed in this format: BAUDDBTSPRTYSB. The type of flow control used by the terminal is shown in the FC field. The security attributes of the terminal are shown in the TMOUT, MXINV, and DURAL fields. The second part of the rtrv-trm command output displays the types of unsolicited messages the terminal may receive. An example of the rtrv-trm command output is shown in this example.


rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 36.0.0
TRM  TYPE    COMM        FC    TMOUT MXINV DURAL
3    VT320    9600-7-E-1 SW    30    5     99:59:59

TRM  TRAF LINK SA  SYS PU  DB  UIMRD
3    NO   YES  NO  YES NO  YES YES
     APP  APP

TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
3    YES  YES YES  YES YES YES YES YES  YES YES NO   

In this example, terminal 3 is running at 9600 baud with 7 data bits, even parity, and 1 stop bit.

For terminals 17 to 40, the COMM and FC fields are not displayed in the rtrv-trm output. The following items are displayed for these terminals in addition to the security attributes and the types of unsolicited messages the terminal may receive. An example rtrv-trm output example follows the list.
  • The card location of the IPSM associated with the terminals.
  • The security status of the terminal is displayed in the SECURE field. If the Eagle OA&M IP Security Enhancements feature is on, the terminal is secure. The entry yes is shown in the SECURE field. If the Eagle OA&M IP Security Enhancements feature is off, the terminal is not secure. The entry no is shown in the SECURE field. Controlled Feature Activation Procedures contains the procedures to enable and turn on, or turn off the Eagle OA&M IP Security Enhancements feature.
  • The login timer (LOGINTMR), logout timer (LOGOUTTMR), ping time out timer (PNGTIMEINT), and the ping fail count (PNGFAILCNT) values.

rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 39.0.0
TRM  TYPE    LOC         TMOUT MXINV DURAL     SECURE   
30   TELNET  1204        60    0     00:00:00  no

TRM  LOGINTMR LOGOUTTMR PNGTIMEINT PNGFAILCNT
     (sec)    (sec)     (msec)
30   none     none      none       1

TRM  TRAF LINK SA  SYS PU  DB  UIMRD
30   YES  YES  YES YES YES YES YES

     APP  APP                         
TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
30   YES  YES YES  YES YES YES YES YES  YES YES NO   

Using Telnet Terminals in Place of Serial Terminals

If the Eagle OA&M IP Security feature is disabled and turned off , serial terminals must be connected to the EAGLE and provisioned in the database because Security Administration commands cannot be executed from a telnet terminal.

If the Eagle OA&M IP Security feature is enabled and on, Security Administration commands, in addition to all other commands, can be executed from a telnet terminal only if the Eagle OA&M IP Security feature is enabled and on. The ability to execute commands from a particular terminal is dependent on the terminal command class assignments for that terminal. Even with the ability to execute most EAGLE commands from a telnet terminal, it is recommended that at least two serial terminals remain connected to the EAGLE. The act-echo, lock, and unlock commands cannot be executed from a telnet terminal. These terminals should be configured with at least Security Administration command class privileges.

By having serial terminals connected to the EAGLE, the user would still have access to the EAGLE in the event of a telnet terminal connection failure.

Upgrades of the EAGLE from a telnet terminal are not supported. When the EAGLE is upgraded, the MASPs are upgraded first, followed by the various cards in the EAGLE. The cards are upgraded by taking the cards out of service, then placing the cards back into service. When the IPSMs are taken out of service, the telnet sessions running on the IPSMs are disabled. This can result in losing the telnet terminal connection to the EAGLE. The Expanded Terminal Output Groups feature can create a situation where UIMs required for the upgrade would not be displayed on the same telnet terminal that initiated the upgrade. The upgrade would be difficult to complete if the UIMs generated during the upgrade are not displayed on the same telnet terminal that initiated the upgrade.

The EAGLE upgrade procedure recommends that some method to capture command input and output during the upgrade process is used. The telnet terminals do not support capturing the input and output, nor can the EAGLE’s act-echo command be used on a telnet terminal. Because of this limitation, the upgrade procedure should not be executed from a telnet terminal.

For any EAGLE release, whether the Eagle OA&M IP Security feature is enabled or not, if applicable, Kermit file transfers, required for the Security Log feature, are not supported from telnet terminals. The Kermit file transfers can be performed only from a serial terminal.

  1. Display the values of all terminals using the rtrv-trm command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 39.0.0
    TRM  TYPE     COMM        FC    TMOUT MXINV DURAL
    1    VT320    9600-7-E-1  SW    30    5     99:59:59
    2    KSR      9600-7-E-1  HW    30    5     INDEF
    3    PRINTER  4800-7-E-1  HW    30    0     00:00:00
    4    VT320    2400-7-E-1  BOTH  30    5     00:30:00
    5    VT320    9600-7-O-1  NONE  30    5     00:00:30
    6    VT320    9600-7-E-2  SW    30    9     INDEF
    7    PRINTER  9600-7-E–2  HW    30    5     00:30:00
    8    KSR     19200-7-E-2  BOTH  30    5     00:30:00
    9    VT320    9600-7-E-1  SW    30    7     00:30:00
    10   VT320    9600-7-E-1  HW    30    5     00:30:00
    11   VT320    4800-7-E-1  HW    30    5     00:30:00
    12   PRINTER  9600-7-E-1  HW    30    4     00:30:00
    13   VT320    9600-7-O-1  NONE  30    5     00:30:00
    14   VT320    9600-7-E-2  SW    30    8     00:30:00
    15   VT320    9600-7-E–2  HW    30    5     00:30:00
    16   VT320    9600-7-E-2  BOTH  30    3     00:30:00
    
    TRM  TYPE      LOC              TMOUT MXINV DURAL      SECURE
    17   TELNET    1201             60    5     00:30:00   yes
    18   TELNET    1201             60    5     00:30:00   yes
    19   TELNET    1201             60    5     00:30:00   yes
    20   TELNET    1201             60    5     00:30:00   yes
    21   TELNET    1201             60    5     00:30:00   yes
    22   TELNET    1201             60    5     00:30:00   yes
    23   TELNET    1201             60    5     00:30:00   yes
    24   TELNET    1201             60    5     00:30:00   yes
    
    TRM  LOGINTMR LOGOUTTMR PNGTIMEINT PNGFAILCNT
         (sec)    (sec)     (msec)
    17   none     none      none       1
    18   none     none      none       1
    19   none     none      none       1
    20   none     none      none       1
    21   none     none      none       1
    22   none     none      none       1
    23   none     none      none       1
    24   none     none      none       1
    
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    1    NO   YES  NO  YES NO  YES YES
    2    NO   NO   NO  NO  NO  NO  NO
    3    YES  YES  YES NO  YES YES YES
    4    YES  NO   NO  NO  NO  NO  NO
    5    NO   YES  NO  NO  NO  NO  YES
    6    NO   NO   YES NO  NO  NO  NO
    7    YES  YES  YES YES YES YES YES
    8    NO   NO   NO  NO  YES NO  YES
    9    NO   YES  NO  NO  NO  YES NO
    10   NO   NO   NO  NO  NO  NO  YES
    11   YES  YES  YES YES YES YES YES
    12   YES  YES  YES YES YES YES YES
    13   NO   YES  NO  NO  NO  NO  YES
    14   NO   NO   YES NO  NO  NO  NO
    15   YES  YES  YES NO  YES YES YES
    16   NO   NO   NO  NO  YES NO  YES
    17   NO   NO   NO  NO  NO  NO  NO
    18   NO   NO   NO  NO  NO  NO  NO
    19   NO   NO   NO  NO  NO  NO  NO
    20   NO   NO   NO  NO  NO  NO  NO
    21   NO   NO   NO  NO  NO  NO  NO
    22   NO   NO   NO  NO  NO  NO  NO
    23   NO   NO   NO  NO  NO  NO  NO
    24   NO   NO   NO  NO  NO  NO  NO
     
        APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    1    YES  YES YES  YES YES YES YES YES  YES YES NO   
    2    YES  YES YES  YES YES YES YES YES  YES YES NO   
    3    YES  YES YES  YES YES YES YES YES  YES YES NO   
    4    YES  YES YES  YES YES NO  YES YES  YES YES NO   
    5    YES  YES YES  YES YES YES YES YES  YES YES NO   
    6    YES  YES YES  YES YES YES YES YES  YES YES NO   
    7    NO   YES YES  YES YES YES YES YES  YES YES NO   
    8    YES  YES YES  YES YES YES YES YES  YES YES YES  
    9    YES  YES YES  YES YES YES YES YES  YES YES YES  
    10   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    11   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    12   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    13   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    14   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    15   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    16   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    17   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    18   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    19   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    20   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    21   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    22   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    23   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    24   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    

    If a telnet terminal is being changed, continue the procedure with 2.

    If telnet terminals are not being added in this procedure, continue the procedure by performing one of these steps.
    • If the terminal type or the communication attributes of the terminal are being changed, or the pngtimeint, pngfailcnt parameters of an EMSALM terminal are being changed, continue the procedure with 3.
    • If only the output message group or security parameters for the terminal are being changed, continue the procedure with 7.
  2. If the rtrv-trm output in 1 shows terminals 1 to 16 and you wish to add telnet terminals (type=telnet, terminals 17 through 40), go to the Adding an E5-IPSM procedure.

    Adding an IPSM adds eight telnet terminals to the EAGLE.

    When an IPSM is added to the database, the eight telnet terminals associated with the IPSM are added to the database with the telnet terminal type and the default values for these parameters.
    • The security (tmout, mxinv, dural) parameters.
    • The output message group (traf, db, link, sa, sys, pu, uimrd, appserv, appss, card, clk, dbg, gtt, gws, meas, mon, mps, seas) parameters
    • The logintmr, logouttmr, pngtimeint, pngfailcnt parameters.

    The only actions that can be performed on terminals 17 through 40 is changing the terminal type to either none, telnet, or emsalm, and changing the security (tmout, mxinv, dural), changing the output message group (traf, db, link, sa, sys, pu, uimrd, appserv, appss, card, clk, dbg, gtt, gws, meas, mon, mps, seas) parameters, or changing the logintmr, logouttmr, pngtimeint, pngfailcnt parameters.

    If no changes are being made to the telnet terminals, either to the existing telnet terminals, or to the telnet terminals that were added in this step with “Adding an E5-IPSM“ procedure, this procedure is finished.

    If changes are being made to the telnet terminals, continue the procedure by performing one of these steps.
    • If only the output message group or security parameters are being changed, continue the procedure with 7 .
    • If the terminal type or the logintmr, logouttmr, pngtimeint, pngfailcnt parameters are being changed, continue the procedure with 3.
  3. Display the status of the terminals by entering the rept-stat-trm command.

    This is an example of the possible output (another IPSM added from 2).

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    TRM   PST           SST           AST
    1     IS-NR         Active        -----
    2     IS-NR         Active        -----
    3     IS-NR         Active        -----
    4     IS-NR         Active        -----
    5     IS-NR         Active        -----
    6     IS-NR         Active        -----
    7     IS-NR         Active        -----
    8     IS-NR         Active        -----
    9     IS-NR         Active        -----
    10    IS-NR         Active        -----
    11    IS-NR         Active        -----
    12    IS-NR         Active        -----
    13    IS-NR         Active        -----
    14    IS-NR         Active        -----
    15    IS-NR         Active        -----
    16    IS-NR         Active        -----
    17    IS-NR         Active        -----
    18    IS-NR         Active        -----
    19    IS-NR         Active        -----
    20    IS-NR         Active        -----
    21    IS-NR         Active        -----
    22    IS-NR         Active        -----
    23    IS-NR         Active        -----
    24    IS-NR         Active        -----
    25    IS-NR         Active        -----
    26    IS-NR         Active        -----
    27    IS-NR         Active        -----
    28    IS-NR         Active        -----
    29    IS-NR         Active        -----
    30    IS-NR         Active        -----
    31    IS-NR         Active        -----
    32    IS-NR         Active        -----
    
    Command Completed.
    

    If the status of the terminal that is being changed is OOS-MT-DSBLD, and the terminal type is being changed to printer or none, continue the procedure with 6.

    If the status of the terminal that is being changed is OOS-MT-DSBLD, and the terminal type is not being changed to printer or none, continue the procedure with 7.

    If the status of the terminal that is being changed is not OOS-MT-DSBLD, continue the procedure with 4.

  4. Inhibit the terminal you wish to change using the rmv-trm command and specify the port you wish to inhibit.

    rmv-trm:trm=4

    rmv-trm:trm=8

    rmv-trm:trm=19

    rmv-trm:trm=23

    rmv-trm:trm=21

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    Inhibit message sent to terminal
    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    Command Completed.
    
  5. Verify that the terminal that was inhibited in 4 is in the OOS-MT-DSBLD state by entering the rept-stat-trm command.

    For this command, enter these commands.

    rept-stat-trm:trm=4

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    TRM   PST            SST           AST
    4     OOS-MT-DSBLD   MANUAL        -----
    Command Completed.
    

    rept-stat-trm:trm=8

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    TRM   PST            SST           AST
    8     OOS-MT-DSBLD   MANUAL        -----
    Command Completed.
    

    rept-stat-trm:trm=19

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    TRM   PST            SST           AST
    19    OOS-MT-DSBLD   MANUAL        -----
    Command Completed.
    

    rept-stat-trm:trm=23

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    TRM   PST            SST           AST
    23    OOS-MT-DSBLD   MANUAL        -----
    Command Completed.
    

    rept-stat-trm:trm=21

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 39.0.0
    TRM   PST            SST           AST
    21    OOS-MT-DSBLD   MANUAL        -----
    Command Completed.
    

    If the terminal type is not being changed to either printer or none, continue the procedure with 7.

    If the terminal type is being changed to either printer or none, continue the procedure with 6.

  6. Display the command class values of all terminals using the rtrv-secu-trm command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 12:31:04 GMT EAGLE5 36.0.0
                                      
    TRM    LINK SA  SYS  PU   DB   DBG
    1      NO   NO  YES  NO   YES  NO
    2      NO   NO  NO   NO   YES  NO
    3      YES  *** YES  YES  YES  YES
    4      NO   YES NO   NO   NO   NO
    5      YES  NO  NO   NO   YES  YES
    6      NO   YES NO   NO   NO   NO
    7      NO   *** YES  NO   YES  NO
    8      NO   NO  NO   NO   NO   NO
    9      YES  YES YES  YES  YES  YES
    10     NO   NO  NO   NO   NO   NO
    11     YES  NO  YES  NO   YES  YES
    12     NO   *** NO   NO   NO   NO
    13     NO   NO  NO   NO   YES  YES
    14     NO   YES NO   NO   YES  YES
    15     NO   NO  NO   NO   YES  YES
    16     NO   NO  NO   NO   YES  YES
    17     NO   NO  YES  NO   YES  NO
    18     NO   NO  NO   NO   YES  NO
    19     YES  NO  YES  YES  YES  YES
    20     NO   YES NO   NO   NO   NO
    21     YES  NO  NO   NO   YES  YES
    22     NO   YES NO   NO   NO   NO
    23     NO   NO  YES  NO   YES  NO
    24     NO   NO  NO   NO   NO   NO
    25     YES  YES YES  YES  YES  YES
    26     NO   NO  NO   NO   NO   NO
    27     YES  NO  YES  NO   YES  YES
    28     NO   NO  NO   NO   NO   NO
    29     NO   NO  NO   NO   YES  YES
    30     NO   YES NO   NO   YES  YES
    31     NO   NO  NO   NO   YES  YES
    32     NO   NO  NO   NO   YES  YES
    

    Note:

    If the terminal type is being changed to either printer or none, make sure the EAGLE has at least two terminals assigned to the Security Administration command class (shown in the SA column in the rtrv-secu-trm output). If the terminal being changed in this procedure is being removed from the Security Administration command class, and if this change would leave the EAGLE with only one terminal assigned to the Security Administration command class, go to the Changing Terminal Command Class Assignments procedure and change the command class assignment of another terminal to include the Security Administration command class.
  7. Display the UIMRD STP option value by entering the rtrv-stpopts command. This is an example of the possible output.
    
    rlghncxa03w 10-07-17 16:02:05 GMT  EAGLE5 42.0.0
    STP OPTIONS
    -----------------------
    UIMRD               yes
    

    Note:

    The rtrv-stpopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-stpopts command, see the rtrv-stpopts command description in Commands User's Guide.

    The EAGLE sends UIMs to the terminals based on the value of the UIMRD field in the rtrv-stpopts output and the UIMRD value for the terminal. The interaction of these two values is shown in Table 4-2.

    If you do not wish to change how the EAGLE handles sends UIMs to the terminal, continue the procedure with 11 and do not change the UIMRD value for the terminal.

    If you do not wish to change how the EAGLE handles sends UIMs to the terminal, continue the procedure with 10. When 11 is performed, do not change the UIMRD value for the terminal.

    If you wish to change how the EAGLE handles sends UIMs to the terminal, continue the procedure with 8.

  8. Change the UIMRD STP option value.

    To turn the UIMRD STP option on, enter this command.

    chg-stpopts:on=uimrd

    To turn the UIMRD STP option off, enter this command.

    chg-stpopts:off=uimrd

    When the command has successfully completed, this message should appear.

    
    rlghncxa03w 10-07-01 15:08:45 GMT EAGLE5 42.0.0
    CHG-STPOPTS: MASP A - COMPLTD
    
  9. Verify the changes using the rtrv-stpopts command.

    If the on=uimrd parameter was specified in 8, this is an example of the possible output.

    
    rlghncxa03w 10-07-17 16:02:05 GMT  EAGLE5 42.0.0
    STP OPTIONS
    -----------------------
    UIMRD               yes
    

    If the off=uimrd parameter was specified in 8, this is an example of the possible output.

    
    rlghncxa03w 10-07-17 16:02:05 GMT  EAGLE5 42.0.0
    STP OPTIONS
    -----------------------
    UIMRD                no
    

    Note:

    The rtrv-stpopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-stpopts command, see the rtrv-stpopts command description in Commands User's Guide.

    If you do not wish to change the UIMRD value for the terminal, continue the procedure with 11 without specifying the uimrd parameter.

    If you wish to change the UIMRD value for the terminal, continue the procedure with 11. Specify the uimrd parameter with a value, yes or no, that will change the current value for the terminal.

    Continue the procedure with 10.

    If you do not wish to change the UIMRD value for the terminal, when 11 is performed do not specify the uimrd parameter.

    If you wish to change the UIMRD value for the terminal, when 11 is performed specify the uimrd parameter with a value, yes or no.

  10. Verify the TDMs that are in the EAGLE by entering these commands.

    rept-stat-card:loc=1114

    This is an example of the possible output.

    
    
    rlghncxa03w 10-12-17 16:02:05 GMT  EAGLE5 43.0.0
    CARD   VERSION      TYPE      GPL        PST            SST        AST
    1114   -----------  E5TDM                IS-NR          Active     -----
    
    Command Completed.
    
    

    rept-stat-card:loc=1116

    This is an example of the possible output.

    
    
    rlghncxa03w 10-12-17 16:02:05 GMT  EAGLE5 43.0.0
    CARD   VERSION      TYPE      GPL        PST            SST        AST
    1116   -----------  E5TDM                IS-NR          Active     -----
    
    Command Completed.
    
    

    E5-TDMs are shown by the entry E5TDM in the TYPE column. TDMs are shown by the entry TDM in the TYPE column. Hardware flow control (fc=hw) and both hardware and software flow control (fc=both) are not supported for the terminal if the EAGLE contains E5-TDMs. Part of the terminal output may be lost if hardware flow control is specified for the terminal when the EAGLE contains E5-TDMs.

  11. Change the terminal characteristics using the chg-trm command.

    For this example enter these commands.

    chg-trm:trm=4:baud=9600:traf=no:link=yes:sa=yes:db=yes

    chg-trm:trm=19:type=none

    chg-trm:trm=21:sys=yes:link=yes:sa=yes:db=yes:tmout=30:logintmr=30:logouttmr=60 :pngtimeint=1000:pngfailcnt=3

    chg-trm:trm=8:type=emsalm

    chg-trm:trm=23:type=emsalm

    Note:

    If 4 was not performed in this procedure (placing the terminal out of service), do not specify these parameters with thechg-trm command:
    • baud, sb, prty, fc (the communications attributes of the terminal).

      These parameters cannot be specified for terminals 17 to 40.

    • the terminal type (type).
    • the logintmr, logouttmr, pngtimeint, pngfailcnt parameters

    Caution:

    If the terminal type is being changed to emsalm, it is recommended that all the output message group settings for an EMSALM terminal are set to yes. Changing any of the output message group settings to no could prevent alarm messages controlled by the output message group from being displayed on the EMSALM terminal.

    Caution:

    If a terminal dedicated to measurements collection is configured (see the Configuring the Measurements Terminal for an EAGLE Containing 700 Signaling Links procedure), it is recommended that this terminal is not changed to an EMSALM terminal.

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    CHG-TRM: MASP A - COMPLTD
    
  12. Verify the changes made in 11 by using the rtrv-trm command with the terminal number specified in 11 .

    For this example, enter these commands.

    rtrv-trm:trm=4

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 36.0.0
    TRM  TYPE    COMM        FC    TMOUT MXINV DURAL
    4    VT320    9600-7-E-1 BOTH  30    5     00:30:00
                                   
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    4    NO   YES  YES NO  NO  YES NO
    
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    4    YES  YES YES  YES YES NO  YES YES  YES YES NO   
    

    rtrv-trm:trm=19

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 39.0.0
    TRM  TYPE      LOC              TMOUT MXINV DURAL      SECURE
    19   NONE      1201             60    5     00:30:00   yes
    
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    19   NO   NO   NO  NO  NO  NO  NO
    
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    19   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    

    rtrv-trm:trm=21

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 39.0.0
    TRM  TYPE      LOC              TMOUT MXINV DURAL      SECURE
    21   TELNET    1201             30    5     00:30:00   yes
                                   
    TRM  LOGINTMR LOGOUTTMR PNGTIMEINT PNGFAILCNT
         (sec)    (sec)     (msec)
    21   30        60       1000       3
    
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    21   NO   YES  YES YES NO  YES NO
    
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    21   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   

    rtrv-trm:trm=8

    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 36.0.0
    TRM  TYPE     COMM        FC    TMOUT MXINV DURAL
    8    EMSALM  19200-7-E-2  BOTH  30    5     00:30:00
                                   
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    8    YES  YES  YES YES YES YES YES
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    8    YES  YES YES  YES YES YES YES YES  YES YES YES  

    rtrv-trm:trm=23

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 39.0.0
    TRM  TYPE      LOC              TMOUT MXINV DURAL      SECURE
    23   EMSALM    1201             60    5     00:30:00   yes
                                   
    TRM  PNGTIMEINT PNGFAILCNT
         (msec)
    23   none       1
    
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    23   YES  YES  YES YES YES YES YES YES YES
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    23   YES  YES YES  YES YES YES YES YES  YES YES YES  
    

    Note:

    If there terminal was not inhibited in 4, continue the procedure with 13.
  13. When the changes are complete, and if the terminal was inhibited in 4, activate the terminal using the rst-trm command.

    For this example, enter these commands.

    rst-trm:trm=4

    rst-trm:trm=8

    rst-trm:trm=19

    rst-trm:trm=23

    rst-trm:trm=21

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    Allow message sent to terminal
    
  14. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-10 Changing Terminal Characteristics



Sheet 1 of 6



Sheet 2 of 6



Sheet 3 of 6



Sheet 4 of 6



Sheet 5 of 6



Sheet 6 of 6

4.12 Changing Terminal Command Class Assignments

This procedure is used to change the assignment of command classes to a terminal using the chg-secu-trm command. This procedure can only be performed if you have been assigned the command class “Security Administration.” This can be useful to restrict the types of commands that can be entered on an EAGLE terminal. This procedure can only be performed if you and the terminal have been assigned the command class “Security Administration.” The EAGLE commands are grouped into these command classes.

  • Basic
  • Database Administration
  • Debug
  • Link Maintenance
  • Program Update
  • Security Administration
  • System Maintenance
  • 32 Configurable Command Classes

With the chg-secu-trm command, only six of these command classes can be assigned to a terminal. The Basic command class is automatically assigned to every terminal and to every user and is not configurable. Refer to the Commands Manual for a list of command classes and the commands assigned to them.

The chg-secu-trm command uses these parameters.

:trm – The terminal number 1-16.

:all – The commands in all non-configurable command classes (dbg, link, sys, sa, pu, db) can be entered on the specified terminal.

:db – Database Administration commands can be entered on the specified terminal.

:dbg – Debug commands can be entered on the specified terminal.

:linkLink Maintenance commands can be entered on the specified terminal.

:pu – Program Update commands can be entered on the specified terminal.

:sa – Security Administration commands can be entered on the specified terminal.

:sys – System Maintenance commands can be entered on the specified terminal.

:cc1 - :cc8 – Eight configurable command classes. These parameters specify whether or not the commands in the specified configurable command class can be entered on the specified terminal. The value of these parameters consist of the configurable command class name (1 alphabetic character followed by 2 alphanumeric characters), and either yes or no. The command class name and the yes or no values are separated by a dash. For example, to allow commands in the configurable command class db1 from terminal 5, the cc1=db1-yes parameter would be specified in the chg-secu-trm command for terminal5.

To specify any configurable command classes, the Command Class Management feature must be enabled and turned on. Enter the rtrv-ctrl-feat command to verify whether or not the Command Class Management feature is enabled. If the Command Class Management feature is not enabled or turned on, perform Activating Controlled Features to enable and turn on the Command Class Management feature. Up to 32 configurable command classes can be assigned to terminals. When the Command Class Management feature is enabled and turned on, the configurable command class names are given the names u01 - u32. These command class names, the descriptions of these command classes, and the commands assigned to these command classes can be changed using Configuring Command Classes.

The chg-secu-trm command allows up to eight configurable command classes to be assigned to a terminal each time the chg-secu-trm command is performed.

If the all=yes parameter and the db, dbg, link, pu, sa, sys parameter values are specified as no, for example, chg-secu-trm:trm=1:all=yes:pu=no; all commands can be entered on the specified terminal except those commands in the command class specified with the chg-secu-trm command. In this example, all commands can be entered on terminal 1 except for program update commands.

The terminal command class assignments cannot be changed for the specified terminal if a user is currently logged onto that terminal. This can be verified with the rept-stat-user command.

At least two terminals in the EAGLE must always be assigned to the security administration command class to prevent the EAGLE from becoming unadministerable.

It is possible that a terminal with the terminal type of printer or none can be assigned to the Security Administration command class. Terminals with these terminal types are not counted as having Security Administration authority since commands cannot be administered from these terminal types and is shown in the rtrv-secu-trm output report as “***”instead of yes.

When the EAGLE is delivered to the user, the terminal command class assignments will be set to the system default values for these parameters.

all = no

db = no

dbg = no

link = no

pu = no

sa = yes

sys = no

The examples in this procedure are used to change the command class assignments to the terminal assigned to port 4 to these values: Link Maintenance = yes, Security Administration = no, Program Update = yes, Database Administration = yes.

  1. Display the command class values of all terminals using the rtrv-secu-trm command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 12:31:04 GMT EAGLE5 36.0.0
                                       
    TRM    LINK SA  SYS  PU   DB   DBG 
    1      NO   NO  YES  NO   YES  NO  
    2      NO   NO  NO   NO   YES  NO  
    3      YES  *** YES  YES  YES  YES 
    4      NO   YES NO   NO   NO   NO  
    5      YES  NO  YES  NO   YES  YES 
    6      NO   NO  NO   NO   NO   NO  
    7      NO   NO  YES  NO   YES  NO  
    8      NO   NO  NO   NO   NO   NO  
    9      YES  YES YES  YES  YES  YES 
    10     NO   NO  NO   NO   NO   NO  
    11     YES  NO  YES  NO   YES  YES 
    12     NO   NO  NO   NO   NO   NO  
    13     NO   NO  NO   NO   YES  YES 
    14     NO   NO  NO   NO   YES  YES 
    15     NO   NO  NO   NO   YES  YES 
    16     NO   NO  NO   NO   YES  YES 
    
    Continue the procedure by performing one of these steps.
    • If the cc1 through cc8 parameters are not being specified in this procedure, continue the procedure with 4.
    • If the cc1 through cc8 parameters will be specified in this procedure, continue the procedure by performing one of these steps.
      • If configurable command classes are shown in the rtrv-secu-user output, continue the procedure with 3.
      • If configurable command classes are not shown in the rtrv-secu-user output, continue the procedure with 2.
  2. Verify that the Command Class Management feature is enabled and turned on, by entering the rtrv-ctrl-feat command with the partnum=89005801 parameter.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    The following features have been permanently enabled:
    Feature Name              Partnum    Status  Quantity
    Command Class Management  893005801  off     ----
    

    Note:

    The rtrv-ctrl-feat command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-ctrl-feat command, see the rtrv-ctrl-feat command description in Commands User's Guide.

    If the Command Class Management feature is enabled and turned on (status = on), continue the procedure with 3. If the Command Class Management feature is not enabled or turned on, perform the Activating Controlled Features to enable and turn on the Command Class Management feature.

    Caution:

    If the Command Class Management feature is temporarily enabled, the configurable command classes can be assigned and used only for the amount of time shown in the Trial Period Left column in the rtrv-ctrl-feat output.
  3. Display the descriptions of the configurable command classes in the database by entering the rtrv-cmd command.

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 21:15:37 GMT EAGLE5 41.0.0
    CMD                 CLASS
    alw-slk             link, u11
    ent-user            sa
    unhb-slk            link
    rtrv-attr-seculog   sa, u31
    inh-slk             link, abc
    rtrv-meas-sched     link, abc, def
    act-lbp             link
    act-dlk             link
    act-slk             link
    rtrv-seculog        sa, abc, def, ghi
    act-lpo             link
    blk-slk             link, abc, u23, u31
    dact-lbp            link
    canc-dlk            link
    inh-card            sys
    canc-lpo            link, u01, u02, u03, u04, u05, u06, u07, u08, u09, u10,
                        u11, u12, u13
    canc-slk            link
    ublk-slk            link, u01, u02, u03, u04, u05, u06, u07, u08, u09, u10,
                        u11, u12, u13, u14, u15, u16, u17, u18, u19, u20, u21,
                        u22, u23, u24, u25, u26, u27, u28, u29, u30, u31, u32
    inh-trm             sys, krb
    rept-meas           link
    .
    .
    .
    chg-meas            link
    tst-dlk             link, krb
    tst-slk             link
    

    If the desired configurable command class descriptions are not in the database, perform Configuring Command Classesto configure the desired command classes.

  4. Verify that no users are logged onto the terminal whose command class assignments you wish to change using the rept-stat-user command.

    If the user is logged onto the terminal, notify the user to log off the terminal. This is an example of the possible output.

    
    rlghncxa03w 09-05-01 09:12:15 GMT  EAGLE5 41.0.0
    REPT-STAT-USER COMPLTD
    USER ID          TERM #  IDLE SINCE         COMMAND             STATE
    fred                3    09-04-19 05:06:43  rept-stat-user      PROCESSING
    frodo              13    09-04-20 08:12:23  chg-db              IDLE
    manny               1    09-04-27 04:37:56  ent-dlk             IDLE
    travist             7    09-04-30 10:06:22  rtrv-meas           IDLE
    
  5. If you wish to change the Security Administration command class assignment of the specified terminal to no (:sa=no), make sure the EAGLE has at least two terminals assigned to the Security Administration command class.

    This is shown in the output of 1 , the rtrv-secu-trm command output, with the entry YES in the SA field. If this procedure would leave the EAGLE with only one terminal assigned to the Security Administration command class, use the chg-secu-trm command and change another terminal’s assignment to the Security Administration command class from NO to YES. For this example, enter the chg-secu-trm:trm=1:sa=yes command

    .
  6. Change the command class assignments of the terminal using the chg-secu-trm command.

    For this example enter this command.

    chg-secu-trm:trm=4:link=yes:sa=no:pu=yes:db=yes

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 12:31:04 GMT EAGLE5 36.0.0
    CHG-SECU-TRM: MASP A - COMPLTD
    
  7. Verify the changes made in 6 by using the rtrv-secu-trm command with the port number specified in 6 .

    For this example, enter this command.

    rtrv-secu-trm:trm=4

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 12:31:04 GMT EAGLE5 36.0.0
                                        
    TRM    LINK SA  SYS  PU   DB   DBG  
    4      YES  NO  NO   YES  YES  NO   
    
  8. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-11 Changing Terminal Command Class Assignments



Sheet 1 of 2



Sheet 2 of 2

4.13 Configuring Command Classes

This procedure is used to assign different names to the 32 configurable command classes, and to assign commands to these configurable command classes.

The EAGLE still has the non-configurable command classes: Basic, Database Administration, Debug, Link Maintenance, Program Update, Security Administration, System Maintenance.

The Command Class Management feature allows commands from any of these non-configurable command classes to placed into another command class, which can be assigned to a user or terminal. This gives greater control over the commands that users can use, and to the commands that can be executed from a given terminal. For example, a user needs to use only these commands: rtrv-card, rtrv-ls, rtrv-slk, rtrv-dstn, rtrv-rte, rtrv-user, rtrv-secu-user, rept-stat-db, rept-stat-card, rept-stat-slk, rept-stat-ls, rtrv-gpl, rept-stat-gpl, rept-stat-rte, rept-meas.

To give this user access to these commands without the Command Class Management feature would require the user to be assigned to these command classes: Database, Security Administration, System Maintenance, Program Update, and Link Maintenance. In addition to giving access to the commands this user needs, this user has access to all the commands in these command classes. This would also allow the user to add, change, or remove database entities (cards, signaling links, routes, etc.), to inhibit signaling links, enable features with either the chg-feat or enable-ctrl-feat command that you may not want turned on.

The Command Class Management feature allows these commands to be placed in their own command class which can be assigned to the user. Once the new command class is configured with these commands, the commands will be in their original command classes as well as the new configured command class. The user can be restricted to executing the commands in the new configured command class.

Commands can also be removed from configurable command classes.

When the Command Class Management controlled feature is enabled and activated, these command classes are created with the names U01, U02, U03, ... U32. The names of these command classes, and the descriptions of these command classes can be changed with the chg-cmdclass command. The chg-cmdclass command uses these parameters.

:class – The current class name, shown in the rtrv-cmdclass command output.

:nclass – The new command class name consisting of 1 alphabetic character and 2 alpha-numeric characters.

:descr – The description of the new command class consisting of 1 alphabetic character and up to 31 alpha-numeric characters, enclosed in double quotes.

Commands can be assigned to these configurable command classes using the chg-cmd command. The chg-cmd command uses these parameters.

:cmd – The command being added or removed from the configurable command class.

:class1 - :class8 – The name of the configurable command class that command is being added to or removed from with either yes (to add the command) or no (to remove the command) separated by a dash. For example, to add a command to configurable class db1, the class1=db1-yes parameter would be specified.

Up to eight configurable command classes can be specified with the chg-cmd command. To assign the command to more than eight configurable command classes, the repeat chg-cmd command until the desired number of configurable command classes, up to 32, have been specified.

To configure command classes, the Command Class Management feature must be enabled and turned on. Enter the rtrv-ctrl-feat command to verify whether or not the Command Class Management feature is enabled. If the Command Class Management feature is not enabled or turned on, perform Activating Controlled Featuresto enable andturn on the Command Class Management feature.

  1. Verify that the Command Class Management feature is enabled and turned on, by entering the rtrv-ctrl-feat command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    The following features have been permanently enabled:
    Feature Name              Partnum    Status  Quantity
    Command Class Management  893005801  off     ----
    

    Note:

    The rtrv-ctrl-feat command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-ctrl-feat command, see the rtrv-ctrl-feat command description in Commands User's Guide.

    If the Command Class Management feature is enabled and turned on (status = on),.

    If the Command Class Management feature is not enabled or turned on, perform Activating Controlled Features to enable and turn on the Command Class Management feature. After the Command Class Management feature is turned on, continue the procedure with 2.

    Caution:

    If the Command Class Management feature is temporarily enabled, the configurable command classes can be assigned and used only for the amount of time shown in the Trial Period Left column in the rtrv-ctrl-feat output.
  2. Display the descriptions of the configurable command classes in the database by entering the rtrv-cmd command.

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 21:15:37 GMT EAGLE5 41.0.0
    CMD                 CLASS
    alw-slk             link, u11
    ent-user            sa
    unhb-slk            link
    rtrv-attr-seculog   sa, u31
    inh-slk             link, abc
    rtrv-meas-sched     link, abc, def
    act-lbp             link
    act-dlk             link
    act-slk             link
    rtrv-seculog        sa, abc, def, ghi
    act-lpo             link
    blk-slk             link, abc, u23, u31
    dact-lbp            link
    canc-dlk            link
    inh-card            sys
    canc-lpo            link, u01, u02, u03, u04, u05, u06, u07, u08, u09, u10,
                        u11, u12, u13
    canc-slk            link
    ublk-slk            link, u01, u02, u03, u04, u05, u06, u07, u08, u09, u10,
                        u11, u12, u13, u14, u15, u16, u17, u18, u19, u20, u21,
                        u22, u23, u24, u25, u26, u27, u28, u29, u30, u31, u32
    inh-trm             sys, krb
    rept-meas           link
    .
    .
    .
    chg-meas            link
    tst-dlk             link, krb
    tst-slk             link
    

    If the desired configurable command class descriptions are in the database, and the commands are in the desired command classes, no further action is necessary. This procedure is finished.

    Note:

    If the name of a configurable command class is not being changed, continue the procedure with 6.
  3. Display the configurable command class descriptions by entering the rtrv-cmdclass command.

    This is an example of the possible output.

    
    rlghncxa03w 09-03-01 21:15:37 GMT EAGLE5 40.1.0
    CLASS               DESCR
    link                link maintenance commands
    sa                  security administration commands
    sys                 system maintenance commands
    db                  database administration commands
    dbg                 debug commands
    pu                  program update commands
    u01                 configurable command class 1 
    krb                 my command class description
    u03                 configurable command class 3 
    dab                 your command class description
    u05                 configurable command class 5 
    .
    .
    .
    u32                 configurable command class 32 
    
  4. Change the configurable command class name or description by entering the chg-cmdclass command.

    For this example, enter these commands.

    chg-cmdclass:class=u01:nclass=db1:descr="retrieve database commands"

    chg-cmdclass:class=dab:nclass=s15

    chg-cmdclass:class=u03:descr="user commands 3"

    Note:

    The command classes link, sa, sys, db, dbg, and pu cannot be changed.

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    CHG-CMDCLASS: MASP A - COMPLTD
    
  5. Verify the changes by entering the rtrv-cmdclass command, specifying the command class name, or new command class name if the command class name was changed, used in 4 .

    For this example, enter these commands.

    rtrv-cmdclass:class=db1

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    CLASS               DESCR
    db1                 retrieve database commands
    

    rtrv-cmdclass:class=s15

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    CLASS               DESCR
    s15                 your command class description
    

    rtrv-cmdclass:class=u03

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    CLASS               DESCR
    u03                 user commands 3
    
  6. Add or remove a command from the desired command classes by entering the chg-cmd command.

    For this example, enter these commands.

    chg-cmd:cmd=rtrv-card:class1=db1-yes

    chg-cmd:cmd=tst-dlk:class1=krb-no

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    CHG-CMD: MASP A - COMPLTD
    

    Up to eight configurable command classes can be specified with the chg-cmd command. If you wish to assign the command to more than eight configurable command classes, but no more than 32 configurable command classes, repeat this step until the desired configurable command class assignments have been made.

  7. Verify the changes by entering the rtrv-cmd command specifying the cmd parameter value used in step 6.

    For this example, enter these commands.

    rtrv-cmd:cmd=rtrv-card

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    CMD                 CLASS
    rtrv-card           db, db1
    

    rtrv-cmd:cmd=tst-dlk

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    CMD                 CLASS
    tst-dlk             link
    
  8. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-12 Configuring Command Classes



Sheet 1 of 2



Sheet 2 of 2

4.14 Adding a Shelf

This procedure is used to add a shelf to the database using the ent-shlf command. The shelf may not already exists in the database. The control shelf (Shelf 1100) cannot be added to the database. The ent-shlf command uses these parameters.

:type – The shelf type. There is only one shelf type that can be added to the database, an extension shelf, shown by the value for this parameter as ext.

:loc – The shelf location

The examples in this procedure are used to add an extension shelf to frame 3 of the EAGLE.

  1. Display the current shelf information using the rtrv-shlf command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SHELF DISPLAY
    FRAME SHELF        TYPE
      1     1       CONTROL
      1     2       EXTENSION
      1     3       EXTENSION
      2     2       EXTENSION
    
  2. Add the shelf using the ent-shlf command.

    For this example, the shelf to be added is the first shelf in frame 3. Enter this command.

    ent-shlf:loc=3100:type=ext

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    ENT-SHLF: MASP A - COMPLTD
    
  3. Verify the changes using the rtrv-shlf command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SHELF DISPLAY
    FRAME SHELF        TYPE
      1     1       CONTROL
      1     2       EXTENSION
      1     3       EXTENSION
      2     2       EXTENSION
      3     1       EXTENSION
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-13 Adding a Shelf



4.15 Removing a Shelf

This procedure is used to remove a shelf from the database using the dlt-shlf command. If the shelf to be removed does not exist in the database, it cannot be removed. The control shelf (Shelf 1100) cannot be removed from the database. The dlt-shlf command has only one parameter, loc, which is the location of the shelf.

Before a shelf can be removed from the database, all of the cards in that shelf must be removed from the database. The procedures for removing these cards are based on the application that is assigned to these cards. Table 4-3 shows the location of these procedures.

Table 4-3 Card Removal Procedures

Card Application Procedure

SS7ANSI, ATMANSI, CCS7ITU, ATMITU

“Removing an SS7 LIM”

"Removing an E1 Card" in the Database Administration - SS7 User's Guide

"Removing a T1 Card" in the Database Administration - SS7 User's Guide

VSCCP

"Removing a Service Module" in the Database Administration - GTT User's Guide

GLS

"Removing a GLS Card" in the Database Administration - GWS User's Guide

IPLIM, IPLIMI, SS7IPGW, IPGWI

"Removing an IPLIMx Card" or "Removing an IPGWx Card" in the Database Administration - IP7 User's Guide

IPSG "Removing an IPSG Card" in the Database Administration - IP7 User's Guide

EROUTE

“Removing an STC Card” in the Database Administration - Features User's Guide

MCP

“Removing an MCPM”

IPS

“Removing an IPSM”

Caution:

If any card in the shelf is the last card of that type in service, removing that card from the database will cause the traffic handled by that card to be lost or the feature requiring that card to be disabled. See Table 4-4 for a description of the effect that removing the last card type that is in service has on the EAGLE.

Table 4-4 Effect of Removing the Last In-Service Card Type from the Database

Card type Application assigned to card Effect on the EAGLE

LIMDS0, LIME1, LIMT1, LIMCH

SS7ANSI

ANSI traffic is lost.

LIMATM

ATMANSI

LIME1, LIMT1, LIMCH

CCS7ITU

ITU traffic is lost.

LIME1ATM

ATMITU

DSM

VSCCP

Global title translation traffic is lost. If any of the GTT-related features are enabled, the traffic for those features is also lost. Refer to the "Adding a Service Module" procedure in the Database Administration - GTT User's Guide for a list of the GTT-related features.

TSM

GLS

Gateway screening feature is disabled.

DCM

IPLIM

Point-to-point connectivity for IP7 Secure Gateway functions in ANSI networks is disabled.

IPLIMI

Point-to-point connectivity for IP7 Secure Gateway functions in ITU networks is disabled.

SS7IPGW

Point-to-multipoint connectivity for IP7 Secure Gateway functions in ANSI networks is disabled.

IPGWI

Point-to-multipoint connectivity for IP7 Secure Gateway functions in ITU networks is disabled.

ENET IPSG Traffic carried by the IPSG card is lost.

STC

EROUTE

Monitoring of the EAGLE by the EAGLE 5 Integrated Monitoring Support feature is disabled.

MCPM

MCP

The Measurements Platform feature is disabled.

IPSM

IPS

IP Telnet sessions and the IP User Interface (Telnet) feature are disabled.

The shelf being removed in this procedure cannot be removed if the shelf is the only provisioned shelf in the frame and the frame is in the Frame Power Alarm Threshold table. The Frame Power Alarm Threshold table is shown in the rtrv-frm-pwr command output. If the frame is shown in the rtrv-frm-pwr output, and the shelf is the only shelf in the frame, perform the Removing an Entry from the Frame Power Alarm Threshold Table procedure to remove the frame from the Frame Power Alarm Threshold table.

The examples in this procedure are used to remove shelf 2100 from the database.

  1. Display the cards in the database using the rtrv-card command.

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 09:12:36 GMT EAGLE5 41.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1101   DSM       VSCCP      
    1102   TSM       GLS       
    1113   GSPM      OAM
    1114   TDM-A
    1115   GSPM      OAM
    1116   TDM-B
    1117   MDAL
    1201   LIMDS0    SS7ANSI   sp2           A    0   sp1           B    0
    1202   LIMDS0    SS7ANSI   sp4           A    0   
    1203   LIMDS0    SS7ANSI   sp3           A    0   
    1204   LIMDS0    SS7ANSI   sp3           A    1   
    1205   LIMDS0    SS7ANSI   nsp3          A    0   nsp4          B    0
    1206   LIMDS0    SS7ANSI   nsp3          A    1   nsp4          B    1
    1211   DSM       VSCCP      
    1212   TSM       GLS            
    1301   LIMATM    ATMANSI   lsnatm1       A    0    
    1307   LIMDS0    SS7ANSI   sp2           A    1   nsp3          B    2
    1308   LIMATM    ATMANSI   lsnatm1       A    1   
    2101   LIMDS0    SS7ANSI   sp5           A    0   sp8           B    0
    2102   LIMDS0    SS7ANSI   sp7           A    0   
    2103   LIMDS0    SS7ANSI   sp6           A    0   
    2104   LIMDS0    SS7ANSI   sp6           A    1   
    2105   LIMDS0    SS7ANSI   nsp3          A    0   nsp5          B    0
    2106   LIMDS0    SS7ANSI   nsp3          A    1   nsp5          B    1  
    

    In this example, these cards must be removed from the database: 2101, 2102, 2103, 2104, 2105, 2106.

  2. Based on the application assigned to the cards in the shelf to be removed, perform the appropriate procedures shown in Table 4-3 and remove all the cards from the shelf.

    The application assigned to the card is shown in the APPL field of the rtrv-card command output in step 1.

  3. Display the shelves configured in the database by entering the rtrv-shlf command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SHELF DISPLAY
    FRAME SHELF        TYPE
      1     1       CONTROL
      1     2       EXTENSION
      1     3       EXTENSION
      2     1       EXTENSION
    

    If the rtrv-shlf output shows the shelf being removed in this procedure is not the only shelf in the frame, skip step 4 and go to step 5.

  4. Display the frame power alarm thresholds by entering the rtrv-frm-pwr command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    
    Frame              Power Threshold (Amps)
    -----              ----------------------
    cf00                                   56
    ef00                                   36
    

    If the frame containing the shelf being removed in this procedure is shown in the rtrv-frm-pwr output, the frame must be removed from the frame power alarm threshold table (shown in the rtrv-frm-pwr output) before the shelf can be removed. The following list shows the frames and the shelves contained in those frames.

    • Frame CF00 – Shelves 1200 and 1300
    • Frame EF00 – Shelves 2100, 2200, and 2300
    • Frame EF01 – Shelves 3100, 3200, and 3300
    • Frame EF02 – Shelves 4100, 4200, and 4300
    • Frame EF03 – Shelves 5100, 5200, and 5300
    • Frame EF04Shelf 6100

    Shelf 1100 is the Control Shelf and is in Frame CF00. Shelf 1100 cannot be removed.

    Perform the Removing an Entry from the Frame Power Alarm Threshold Table procedure to remove the frame from the frame power alarm threshold table.

    If the frame containing the shelf being removed in this procedure is not shown in the rtrv-frm-pwr output, go to step 5.

  5. Remove the shelf from the database using the dlt-shlf command.

    For this example, enter this command.

    dlt-shlf:loc=2100

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    DLT-SHLF: MASP A - COMPLTD
    
  6. Verify the changes with the rtrv-shlf command and specify the location of the shelf.

    For this example, enter this command.

    rtrv-shlf:loc=2100

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SHELF DISPLAY LOCATION=1200
    FRAME SHELF        TYPE
    
    This shelf is UNEQUIPPED in the database.
    
  7. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-14 Removing a Shelf



4.16 Adding an SS7 LIM

This procedure is used to add a low-speed SS7 LIM (link interface module) to the database using the ent-card command. The SS7 LIM cannot be added if it exists in the database.

The SS7 LIM that is being added in this procedure is the Multiport LIM, part number 870-2061-XX. The Multiport LIM can contain eight signaling links. A maximum of 63 Multiport LIMs can be configured in the database. See the “Determining the Number of High-Speed and Low-Speed Signaling Links” section of Appendix D, “Reference Information,” in Database Administration - SS7 User's Guide for information on how to determine the quantities of the different types of signaling links the EAGLE can have. The Multiport LIM is added using these parameters.
  • :loc – The location of the card being added to the database.
  • :type – The type of card being added to the database - limds0.
  • :appl – The application software that is assigned to the card - ss7ansi.

The ent-card command also contains the force parameter. If the global title translation feature is on, the force=yes parameter allows the LIM to be added to the database even if the current SCCP transactions-per-second threshold is unable to support the additional SCCP transaction-per-second capacity created by adding the LIM. This parameter is obsolete and is no longer used.

There are other cards that support signaling links that are provisioned with the ent-card command. These cards are provisioned in the following procedures. These cards can also be used to provision ITU signaling links.

  • Cards for E1 signaling links are configured in the database using the procedures in Appendix A, “E1 Interface,” in Database Administration - SS7 User's Guide.
  • Cards for T1 signaling links are configured in the database using the procedures in Appendix B, “T1 Interface,” in Database Administration - SS7 User's Guide.
  • Cards for ATM high-speed signaling links are configured in the database using the procedures in Appendix C, “ATM Signaling Link Configuration,” in the Database Administration - SS7 User's Guide.
  • IP cards (cards used for IP links) are configured in the database using the procedures in Database Administration - IP7 User's Guide.

The shelf to which the card is to be added, must already be in the database. This can be verified with the rtrv-shlf command. If the shelf is not in the database, see the Adding a Shelf procedure.

  1. Display the cards in the database using the rtrv-card command.
    This is an example of the possible output.
    
    rlghncxa03w 09-05-01 09:12:36 GMT EAGLE5 41.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1101   DSM       VSCCP      
    1102   TSM       GLS       
    1113   GSPM      OAM
    1114   TDM-A
    1115   GSPM      OAM
    1116   TDM-B
    1117   MDAL
    1201   LIMDS0    SS7ANSI   sp2           A    0   sp1           B    0
    1203   LIMDS0    SS7ANSI   sp3           A    0   
    1204   LIMDS0    SS7ANSI   sp3           A    1   
    1206   LIMDS0    SS7ANSI   nsp3          A    1   nsp4          B    1  
    1301   DSM       VSCCP      
    1308   LIMDS0    SS7ANSI   sp6           A    1   sp7           B    0
    1314   LIMDS0    SS7ANSI   sp7           A    1   sp5           B    1   

    The cards should be distributed throughout the EAGLE for proper power distribution. Refer to Installation Guide for the shelf power distribution.

  2. Add the card using the ent-card command.

    For this example, enter these commands.

    ent-card:loc=1205:type=limds0:appl=ss7ansi

    ent-card:loc=1305:type=limds0:appl=ss7ansi

    ent-card:loc=1311:type=limds0:appl=ss7ansi

    When each of these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    ENT-CARD: MASP A - COMPLTD
    
  3. Verify the changes using the rtrv-card command with the card location specified. For this example, enter these commands.

    rtrv-card:loc=1202

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 09:12:36 GMT EAGLE5 41.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1202   LIMDS0    SS7ANSI   
    

    rtrv-card:loc=1205

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 09:12:36 GMT EAGLE5 41.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1205   LIMDS0    SS7ANSI   
    

    rtrv-card:loc=1305

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT EAGLE5 36.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1305   LIMDS0    SS7ANSI   
    

    rtrv-card:loc=1311

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT EAGLE5 36.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1311   LIMDS0    SS7ANSI   
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.
    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.
    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-15 Adding an SS7 LIM



4.17 Removing an SS7 LIM

This procedure is used to remove an SS7 LIM (link interface module) from the database using the dlt-card command. The card cannot be removed if it does not exist in the database.

No SS7 signaling links can be assigned to the card you wish to remove from the database.

Caution:

If the SS7 LIM is the last SS7 LIM in service, removing this card from the database will cause SS7 traffic to be lost and isolate the EAGLE from the network.

Note:

1. LIM-E1 or LIMCH cards for E1 signaling links are removed from the database using the procedures in Appendix A, "E1 Interface" in Database Administration - SS7 User's Guide.

2. LIM-T1 or LIMCH cards for T1 signaling links are removed from the database using the procedures in Appendix B, "T1 Interface" in Database Administration - SS7 User's Guide.

3. IP cards (DCMs used for IP links) are removed from the database using the procedures in Database Administration - IP7 User's Guide.

The examples in this procedure are used to remove the SS7 LIMs in card location 1201, 1311, and 1318.

Canceling the REPT-STAT-CARD Command

Because the rept-stat-card command used in this procedure can output information for a long period of time, the rept-stat-card command can be canceled and the output to the terminal stopped. There are three ways that the rept-stat-card command can be canceled.

  • Press the F9 function key on the keyboard at the terminal where the rept-stat-card command was entered.
  • Enter the canc-cmd without the trm parameter at the terminal where the rept-stat-card command was entered.
  • Enter the canc-cmd:trm=<xx>, where <xx> is the terminal where the rept-stat-card command was entered, from another terminal other that the terminal where the rept-stat-card command was entered. To enter the canc-cmd:trm=<xx> command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with the rtrv-secu-trm command. The user’s permissions can be verified with the rtrv-user or rtrv-secu-user commands.

For more information about the canc-cmd command, go to Commands User's Guide.

  1. Display the cards in the database using the rtrv-card command.

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 09:12:36 GMT EAGLE5 41.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1101   DSM       VSCCP      
    1102   TSM       GLS         
    1113   GSPM      OAM
    1114   TDM-A
    1115   GSPM      OAM
    1116   TDM-B
    1117   MDAL
    1201   LIMDS0    SS7ANSI   sp2           A    0   sp1           B    0
    1202   LIMDS0    SS7ANSI   sp2           A    1   nsp3          B    0
    1203   LIMDS0    SS7ANSI   sp3           A    0   
    1204   LIMDS0    SS7ANSI   sp3           A    1   
    1205   LIMDS0    SS7ANSI   itu1          A    0   
    1206   LIMDS0    SS7ANSI   nsp3          A    1   nsp4          B    0
    1212   DSM       VSCCP      
    1214   TSM       GLS         
    1301   LIMATM    ATMANSI   lsnatm1       A    0   
    1308   LIMDS0    SS7ANSI   sp6           A    0   sp7           B    0
    1311   LIMDS0    SS7ANSI   sp2           A    2   sp1           B    1
                               sp7           A1   1   sp3           B1   2
    1315   LIMDS0    SS7ANSI   sp7           A    2   sp5           B    0
    1318   LIMATM    ATMANSI   lsnatm1       A    1   
    
  2. An SS7LIM is identified by the entries SS7ANSI, CCS7ITU, or ATMANSI in the APPL field.

    Display the status of the SS7 signaling links on the card you wish to remove by entering the rept-stat-slk command, specifying the card location and signaling link. The card location is shown in the CARD field of the rtrv-card command output.

    For this example, enter these commands.

    rept-stat-slk:loc=1201:link=a

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SLK      LSN       CLLI        PST          SST       AST
    1201,A   sp2       ----------- IS-NR        Avail     ----
      ALARM STATUS       = No Alarms.
      UNAVAIL REASON     = --
    Command Completed.
    

    rept-stat-slk:loc=1201:link=b

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SLK      LSN       CLLI        PST          SST       AST
    1201,B   sp1      -----------  IS-NR        Avail     ----
      ALARM STATUS       = No Alarms.
      UNAVAIL REASON     = --
    Command Completed.
    

    rept-stat-slk:loc=1318:link=a

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SLK      LSN       CLLI        PST          SST       AST
    1318,A   lsnatm1   ----------- IS-NR        Avail     ----
      ALARM STATUS       = No Alarms.
      UNAVAIL REASON     = --
    Command Completed.
    

    rept-stat-slk:loc=1311:link=a

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SLK      LSN       CLLI        PST          SST       AST
    1311,A   sp2       ----------- IS-NR        Avail     ----
      ALARM STATUS       = No Alarms.
      UNAVAIL REASON     = --
    Command Completed.
    

    rept-stat-slk:loc=1311:link=a1

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SLK      LSN       CLLI        PST          SST       AST
    1311,A1  sp7       ----------- IS-NR        Avail     ----
      ALARM STATUS       = No Alarms.
      UNAVAIL REASON     = --
    Command Completed.
    

    rept-stat-slk:loc=1311:link=b

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SLK      LSN       CLLI        PST          SST       AST
    1311,B   sp1       ----------- IS-NR        Avail     ----
      ALARM STATUS       = No Alarms.
      UNAVAIL REASON     = --
    Command Completed.
    

    rept-stat-slk:loc=1311:link=b1

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SLK      LSN       CLLI        PST          SST       AST
    1311,B1  sp3       ----------- IS-NR        Avail     ----
      ALARM STATUS       = No Alarms.
      UNAVAIL REASON     = --
    Command Completed.
    
  3. Deactivate the links to the card that are not in an OOS-MT-DSBLD state using the dact-slk command.

    For this example, enter these commands.

    dact-slk:loc=1201:link=a

    dact-slk:loc=1201:link=b

    dact-slk:loc=1318:link=a

    dact-slk:loc=1311:link=a

    dact-slk:loc=1311:link=a1

    dact-slk:loc=1311:link=b

    dact-slk:loc=1311:link=b1

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    Deactivate Link message sent to card
    
  4. Display the cards that are in service with the rept-stat-card:stat=nr command.

    rept-stat-card:stat=nr

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 16:43:42 GMT  EAGLE5 41.0.0
    CARD  VERSION      TYPE    GPL       PST           SST       AST
    1101  113-003-000  DSM     VSCCP     IS-NR         Active    ---
    1102  113-003-000  TSM     GLS       IS-NR         Active    ---
    1109  113-003-000  HMUX    BPHMUX    IS-NR         Active    ---
    1110  113-003-000  HMUX    BPHMUX    IS-NR         Active    ---
    1113  113-003-000  GPSM    EOAM      IS-NR         Active    --- 
    1114  -----------  TDM               IS-NR         Active    ---
    1115  113-003-000  GPSM    EOAM      IS-NR         Standby   ---
    1116  -----------  TDM               IS-NR         Active    ---
    1117  -----------  MDAL              IS-NR         Active    ---
    1201  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1203  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1204  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1205  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1206  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1209  113-003-000  HMUX    BPHMUX    IS-NR         Active    ---
    1210  113-003-000  HMUX    BPHMUX    IS-NR         Active    ---
    1212  113-003-000  DSM     VSCCP     IS-NR         Active    ---
    1214  113-003-000  TSM     GLS       IS-NR         Active    ---
    1301  113-003-000  LIMATM  ATMANSI   IS-NR         Active    ---
    1305  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1308  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1309  113-003-000  HMUX    BPHMUX    IS-NR         Active    ---
    1310  113-003-000  HMUX    BPHMUX    IS-NR         Active    ---
    1311  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1314  113-003-000  LIMDS0  SS7ANSI   IS-NR         Active    ---
    1318  113-003-000  LIMATM  ATMANSI   IS-NR         Active    ---
    
  5. If the signaling links on the card to be removed from the database is the last signaling link in a linkset, the force=yes parameter must be used with the dlt-slk command.

    To verify this, enter the rtrv-ls command with the linkset name shown in step 1 (LSET NAME field) or in step 2 (LSN field). For this example, enter these commands.

    rtrv-ls:lsn=sp1

    This is an example of the possible output

    
    rlghncxa03w 09-07-01 16:31:35 GMT EAGLE5 41.1.0
    
                                     L3T SLT              GWS GWS GWS
    LSN          APCA   (SS7)  SCRN  SET SET BEI LST LNKS ACT MES DIS SLSCI NIS
    sp1          240-020-000   scr1  1   1   yes A   2    off off off yes   off
    
               CLLI         TFATCABMLQ MTPRSE ASL8
               -----------  2          yes    yes
    
               IPGWAPC MATELSN    IPTPS LSUSEALM SLKUSEALM GTTMODE
               no      ---------- ---   ---      ---       CdPA
    
                                      L2T               PCR  PCR
               LOC  LINK SLC TYPE     SET  BPS    ECM   N1   N2
               1201 B    0   LIMDS0   1    56000  BASIC ---  -----
               1311 B    0   LIMDS0   1    56000  BASIC ---  -----
    
    Link set table is ( 10 of 1024)  1% full
    

    rtrv-ls:lsn=sp2

    This is an example of the possible output

    
    rlghncxa03w 09-07-01 16:31:35 GMT EAGLE5 41.1.0
    
                                     L3T SLT              GWS GWS GWS
    LSN          APCA   (SS7)  SCRN  SET SET BEI LST LNKS ACT MES DIS SLSCI NIS
    sp2          240-030-000   scr1  1   1   yes A   3    off off off yes   off
    
               CLLI         TFATCABMLQ MTPRSE ASL8
               -----------  2          yes    yes
    
               IPGWAPC MATELSN    IPTPS LSUSEALM SLKUSEALM GTTMODE
               no      ---------- ---   ---      ---       CdPA
    
                                      L2T               PCR  PCR 
               LOC  LINK SLC TYPE     SET  BPS    ECM   N1   N2
               1201 A    0   LIMDS0   1    56000  BASIC ---  -----
               1202 A    1   LIMDS0   1    56000  BASIC ---  -----
               1311 A    2   LIMDS0   1    56000  BASIC ---  -----
    
    Link set table is ( 10 of 1024)  1% full
    

    rtrv-ls:lsn=lsnatm1

    This is an example of the possible output

    
    rlghncxa03w 06-10-01 16:31:35 GMT EAGLE5 36.0.0
    
                                     L3T SLT              GWS GWS GWS
    LSN          APCA   (SS7)  SCRN  SET SET BEI LST LNKS ACT MES DIS SLSCI NIS
    lsnatm1      240-040-000   scr1  1   1   yes A   2    off off off yes   off
    
               CLLI         TFATCABMLQ MTPRSE ASL8
               -----------  2          yes    yes
    
               IPGWAPC MATELSN    IPTPS LSUSEALM SLKUSEALM GTTMODE
               no      ---------- ---   ---      ---       CdPA
    
                                      LP            ATM
               LOC  LINK SLC TYPE     SET  BPS      TSEL      VCI    VPI   LL
               1301  A   0   LIMATM   3    1544000  INTERNAL  35     15
               1318  A   1   LIMATM   5    1544000  LINE      5      0
    
    Link set table is ( 10 of 1024)  1% full
    

    rtrv-ls:lsn=sp3

    This is an example of the possible output

    
    rlghncxa03w 09-07-01 16:31:35 GMT EAGLE5 41.1.0
                                 L3T  SLT
    LSN       APCA (SS7)   SCRN  SET  SET BEI  LST LNKS GWSA GWSM GWSD SLSCI NIS
    sp3       240-050-000  scr1  1    1   yes  A   3    off  off  off  yes   off
    
               CLLI         TFATCABMLQ MTPRSE ASL8
               -----------  2          yes    yes
    
               IPGWAPC MATELSN    IPTPS LSUSEALM SLKUSEALM GTTMODE
               no      ---------- ---   ---      ---       CdPA
    
                                      L2T               PCR  PCR 
               LOC  LINK SLC TYPE     SET  BPS    ECM   N1   N2
               1203 A    0   LIMDS0   1    56000  BASIC ---  -----
               1204 A    1   LIMDS0   1    56000  BASIC ---  -----
               1311 B1   2   LIMDS0   1    56000  BASIC ---  -----
    
    Link set table is ( 10 of 1024)  1% full
    

    rtrv-ls:lsn=sp7

    This is an example of the possible output

    
    rlghncxa03w 09-07-01 16:31:35 GMT EAGLE5 41.1.0
    
                                     L3T SLT              GWS GWS GWS
    LSN          APCA   (SS7)  SCRN  SET SET BEI LST LNKS ACT MES DIS SLSCI NIS
    sp7          240-060-000   scr1  1   1   yes A   3    off off off yes   off
    
               CLLI         TFATCABMLQ MTPRSE ASL8
               -----------  2          yes    yes
    
               IPGWAPC MATELSN    IPTPS LSUSEALM SLKUSEALM GTTMODE
               no      ---------- ---   ---      ---       CdPA
    
                                       L2T              PCR  PCR 
               LOC  LINK SLC TYPE     SET  BPS    ECM   N1   N2
               1308 B    0   LIMDS0   1    56000  BASIC ---  -----
               1311 A1   1   LIMDS0   1    56000  BASIC ---  -----
               1315 A    2   LIMDS0   1    56000  BASIC ---  -----
    
    Link set table is ( 10 of 1024)  1% full
    
  6. Inhibit the card using the rmv-card command, specifying the card location.

    If the LIM to be inhibited contains the only signaling link in the linkset that in service, the force=yes parameter must also be specified. For this example, enter these commands.

    rmv-card:loc=1201

    rmv-card:loc=1318

    rmv-card:loc=1311

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    Card has been inhibited.
    
  7. Remove the signaling links on the specified card by using the dlt-slk command.

    If the output of step 5 shows that the signaling link being removed is the last signaling link in a linkset, the force=yes parameter must be used. For this example, enter these commands.

    dlt-slk:loc=1201:link=a

    dlt-slk:loc=1201:link=b

    dlt-slk:loc=1318:link=a

    dlt-slk:loc=1311:link=a

    dlt-slk:loc=1311:link=a1

    dlt-slk:loc=1311:link=b:force=yes

    dlt-slk:loc=1311:link=b1

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    DLT-SLK: MASP A - COMPLTD
    
  8. Remove the card using the dlt-card command.

    The dlt-card command has only one parameter, loc, which is the location of the card. For this example, enter these commands.

    dlt-card:loc=1201

    dlt-card:loc=1318

    dlt-card:loc=1311

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    DLT-CARD: MASP A - COMPLTD
    
  9. Verify the changes using the rtrv-card command specifying the card that was removed in step 8.

    For this example, enter these commands.

    rtrv-card:loc=1201

    rtrv-card:loc=1318

    rtrv-card:loc=1311

    When these commands have successfully completed, this message should appear.

    
    E2144 Cmd Rej: Location invalid for hardware configuration
    
  10. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-16 Removing an SS7 LIM



Sheet 1 of 2



Sheet 2 of 2

4.18 Configuring the UIM Threshold

This procedure is used to configure the threshold (the number of times during a specified period of time) a specific UIM (unsolicited information message) is displayed at an EAGLE terminal using the set-uim-acthresh command.

The set-uim-acthresh command uses these parameters.

:uimn – The number of the UIM that the threshold is being created for, or the threshold being changed. The number of the UIM must exist in the EAGLE. See Unsolicited Alarm and Information Messages Reference for a list of the UIMs that can be displayed.

:limit – The number of UIMs that can be displayed in the amount of time specified by the intrvl parameter.

:intrvl – The amount of time, in minutes, that the number of UIMs specified by the limit parameter can be displayed at the EAGLE terminal.

:force – The force=yes parameter allows the limit parameter to be set to 0 should the conditions at the EAGLE make this action necessary. Setting the limit parameter to 0 prevents the specified UIM, and the information contained in the UIM, from being displayed at the EAGLE terminal. It is highly recommended that the limit parameter value is not set to 0.

When the limit=0 and the force=yes parameters are specified with the set-uim-acthresh command, this message appears in the scroll area of the terminal display.


Caution: Setting LIMIT=0 suppresses UIM permanently

When creating a new UIM threshold, both the limit and intrvl parameters must be specified with the set-uim-acthresh command.

If you are changing an existing UIM threshold, either the limit or intrvl parameters must be specified with the set-uim-acthresh command.

The examples used in this procedure change the time interval for the existing UIM threshold for UIM 1155 from 30 minutes to 20 minutes, the number of UIMs displayed for existing UIM threshold for UIM 1162 from 100 to 25, and to create a new UIM threshold to display UIM 1075 for 175 times in 30 minutes. These changes are shown in Table 4-5.

Table 4-5 Example UIM Threshold Configuration

UIM Number Old Limit Old Time Interval New Limit New Time Interval

1155

50

30

No Change

20

1162

100

5

25

No Change

1075

N/A

N/A

175

30

  1. Display the UIM thresholds in the database using the rtrv-uim-acthresh command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 08:50:12 GMT EAGLE5 36.0.0
    UIMN    LIMIT    INTRVL
    1155     50       30
    1162     100      5
    1216     200      15
    
    The UIM Threshold Table is (3 of 499) 1% full.
    
  2. Configure the UIM threshold using the set-uim-acthresh command.

    For this example, enter these commands.

    set-uim-acthresh:uimn=1155:intrvl=20

    set-uim-acthresh:uimn=1162:limit=25

    set-uim-acthresh:uimn=1075:limit=175:intrvl=30

    When each of these commands has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 08:50:12 GMT EAGLE5 36.0.0
    SET-UIM-ACTHRESH: MASP A - COMPLTD
    
  3. Verify the changes using the rtrv-uim-acthresh command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 08:50:12 GMT EAGLE5 36.0.0
    UIMN    LIMIT    INTRVL
    1075     175      30
    1155     50       20
    1162     25       5
    1216     200      15
    
    The UIM Threshold Table is (4 of 499) 1% full.
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first

    .
    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-17 Configuring the UIM Threshold



4.19 Removing a UIM Threshold

This procedure is used to remove a UIM threshold from the database using the dlt-uim-acthresh command. The dlt-uim-acthresh command has only one parameter, uimn, which specifies the UIM number of the UIM threshold that is being removed from the database.

The UIM threshold must be in the database.

The example in this procedure removes the UIM threshold for UIM 1216 from the database.

  1. Display the UIM thresholds in the database using the rtrv-uim-acthresh command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 08:50:12 GMT EAGLE5 36.0.0
    UIMN    LIMIT    INTRVL
    1075     175      30
    1155     50       20
    1162     25       5
    1216     200      15
    
    The UIM Threshold Table is (4 of 499) 1% full.
    
  2. Remove a UIM threshold from the database using the dlt-uim-acthresh command.

    For this example, enter this command.

    dlt-uim-acthresh:uimn=1216

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 08:50:12 GMT EAGLE5 36.0.0
    DLT-UIM-ACTHRESH: MASP A - COMPLTD
    
  3. Verify the changes using the rtrv-uim-acthresh command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 08:50:12 GMT EAGLE5 36.0.0
    UIMN    LIMIT    INTRVL
    1075     175      30
    1155     50       20
    1162     25       5
    
    The UIM Threshold Table is (3 of 499) 1% full.
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-18 Removing a UIM Threshold



4.20 Configuring the Measurements Terminal for an EAGLE Containing 700 Signaling Links

This procedure is used to configure a terminal to collect measurement reports on an EAGLE that contains from 501 to 700 signaling links. The chg-trm command is used to configure this terminal and uses these parameters to configure this terminal.

Note:

The terminal being configured in this procedure must be terminals 1 through 16. Telnet terminals cannot be specified in this procedure.

:trm – Serial port number

:baud – Serial port baud rate

:sb – The number of stop bits used in communications with the device

:prty – Parity used by the device

:type – The type of device being connected.

:fc – The type of flow control used between the EAGLE and the output devices (vt320 terminal, modem, printer, or KSR terminal).

:tmout – The maximum amount of time that a login session on the specified port can remain idle (that is, no user input) on the port before being automatically logged off.

:mxinv – The login failure threshold

:dural – The length of time that the terminal is disabled after the login failure threshold has been exceeded.

:all – All unsolicited messages are received by the specified port

:traf  – Traffic measurement related unsolicited messages are received by the specified port

Note:

There are other parameters that can be used with the chg-trm command but these parameters cannot be used in this procedure. For more information on these parameters, go to Changing Terminal Characteristics procedure, or to the chg-trm command description in Commands User's Guide.

The measurement terminal must be configured with these parameter values:

  • trm=<terminal being changed>
  • baud=19200
  • type=ksr
  • traf=yes – all other output message groups must be set to no.

The other parameters listed in this procedure do not have to be specified with the chg-trm command. If these parameters are not specified with the chg-trm command, these default values will be assigned to the measurements terminal:

  • prty – even
  • sb – 1
  • fc – sw (software)
  • tmout – 30 minutes
  • mxinv – 5
  • dural – 100 (1 minute, 0 seconds)

The terminal must be placed out of service before it can be configured.

If the terminal being changed has output message groups other than traf set to yes, the all=no parameter must be specified with the chg-trm command. The chg-trm command can then specified with the traf=yes parameter.

The messages assigned to the output message groups defined by the traf parameters are listed in Unsolicited Alarm and Information Messages Reference.

The tmout, dural, and mxinv parameters can be applied to this terminal. See the "Security Parameters" section in the Changing Terminal Characteristics procedure for more information on these parameters.

The total value of the terminals’ baud rate cannot be greater than 172,032. If the total baud rate of the terminals exceeds 172,032, change the baud rates of the terminals so that the total baud rate is not greater than 172,032.

The output of the rtrv-trm command is displayed in two parts. The first part displays the communication security attributes of the terminal. The communication attributes of the terminal, BAUD, PRTY (parity), SB (stop bits), and DBTS (data bits), are displayed in the COMM field of the rtrv-trm output and are displayed in this format: BAUDDBTSPRTYSB. The second part of the rtrv-trm command output displays the types of unsolicited messages the terminal may receive. An example of the rtrv-trm command output is shown in this example.


rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 36.0.0
TRM  TYPE    COMM        FC    TMOUT MXINV DURAL
3    VT320    9600-7-E-1 SW    30    5     99:59:59

TRM  TRAF LINK SA  SYS PU  DB  UIMRD
3    NO   YES  NO  YES NO  YES YES

     APP  APP
TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
3    YES  YES YES  YES YES YES YES YES  YES YES NO   

In this example, terminal 3 is running at 9600 baud with 7 data bits, even parity, and 1 stop bit.

The examples in this procedure are used to configure terminal 1 as the measurements terminal.

  1. Display the values of all terminals using the rtrv-trm command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 36.0.0
    TRM  TYPE    COMM        FC    TMOUT MXINV DURAL
    1    VT320    9600-7-E-1 SW    30    5     99:59:59
    2    KSR      9600-7-E-1 HW    30    5     INDEF
    3    PRINTER  4800-7-E-1 HW    30    0     00:00:00
    4    VT320    2400-7-E-1 BOTH  30    5     00:30:00
    5    VT320    9600-7-O-1 NONE  30    5     00:00:30
    6    VT320    9600-7-E-2 SW    30    9     INDEF
    7    PRINTER  9600-7-N-2 HW    30    5     00:30:00
    8    KSR     19200-7-E-2 BOTH  30    5     00:30:00
    9    VT320    9600-7-E-1 SW    30    7     00:30:00
    10   VT320    9600-7-E-1 HW    30    5     00:30:00
    11   VT320    4800-7-E-1 HW    30    5     00:30:00
    12   PRINTER  9600-7-E-1 HW    30    4     00:30:00
    13   VT320    9600-7-O-1 NONE  30    5     00:30:00
    14   VT320    9600-7-E-2 SW    30    8     00:30:00
    15   VT320    9600-7-N-2 HW    30    5     00:30:00
    16   VT320    9600-7-E-2 BOTH  30    3     00:30:00
    
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    1    NO   YES  NO  NO  NO  YES YES
    2    NO   NO   NO  NO  NO  NO  NO
    3    YES  YES  YES NO  YES YES YES
    4    YES  NO   NO  NO  NO  NO  NO
    5    NO   YES  NO  NO  NO  NO  YES
    6    NO   NO   YES NO  NO  NO  NO
    7    YES  YES  YES YES YES YES YES
    8    NO   NO   NO  NO  YES NO  YES
    9    NO   YES  NO  NO  NO  YES NO
    10   NO   NO   NO  NO  NO  NO  YES
    11   YES  YES  YES YES YES YES YES
    12   YES  YES  YES YES YES YES YES
    13   NO   YES  NO  NO  NO  NO  YES
    14   NO   NO   YES NO  NO  NO  NO
    15   YES  YES  YES NO  YES YES YES
    16   NO   NO   NO  NO  YES NO  YES
     
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    1    YES  YES YES  YES YES YES YES YES  YES YES NO   
    2    YES  YES YES  YES YES YES YES YES  YES YES NO   
    3    YES  YES YES  YES YES YES YES YES  YES YES NO   
    4    YES  YES YES  YES YES NO  YES YES  YES YES NO   
    5    YES  YES YES  YES YES YES YES YES  YES YES NO   
    6    YES  YES YES  YES YES YES YES YES  YES YES NO   
    7    NO   YES YES  YES YES YES YES YES  YES YES NO   
    8    YES  YES YES  YES YES YES YES YES  YES YES YES  
    9    YES  YES YES  YES YES YES YES YES  YES YES YES  
    10   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    11   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    12   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    13   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    14   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    15   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    16   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    
  2. Inhibit the terminal you wish to change using the rmv-trm command and specify the port you wish to inhibit.

    For this example, enter this command.

    rmv-trm:trm=1

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    Inhibit message sent to terminal
    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    Command Completed.
    
  3. Verify that the terminal that was inhibited in step 4 is in the OOS-MT-DSBLD state by entering the rept-stat-trm command.

    For this command, enter this command.

    rept-stat-trm:trm=1

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    TRM   PST            SST           AST
    1     OOS-MT-DSBLD   MANUAL        -----
    Command Completed.
    
  4. Configure the measurements terminal using the chg-trm command and making sure that only the traf output message group is set to yes.
    1. If the output of the rtrv-trm command output in step 1 shows that all the output message groups are set to no, then only the traf=yes parameter needs to be specified for the output message group assignments as show in this example.

      chg-trm:trm=1:type=ksr:baud=19200:traf=yes

    2. If however, the rtrv-trm command output shows that output message groups other than traf are set to yes, the chg-trm command must be entered with the all=no and the traf=yes parameter as shown in this example.

      chg-trm:trm=1:type=ksr:baud=19200:traf=yes:all=no

    For this example enter the command shown in substep b.

    When the chg-trm command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    CHG-TRM: MASP A - COMPLTD
    
  5. Verify the changes made in step 4 by using the rtrv-trm command with the port number specified in step 4.

    For this example, enter this command.

    rtrv-trm:trm=1

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 36.0.0
    TRM  TYPE    COMM        FC    TMOUT MXINV DURAL
    1    KSR     19200-7-E-1 SW    30    5     00:01:00
    
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    1    YES  NO   NO  NO  NO  NO  NO
    
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    1    NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    
  6. When the changes are complete, and if the terminal was inhibited in step 4, activate the terminal using the rst-trm command.

    For this example, enter this command.

    rst-trm:trm=1

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    Allow message sent to terminal
    
  7. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-19 Configuring the Measurements Terminal for an EAGLE Containing 700 Signaling Links



4.21 Adding a Measurement Collection and Polling Module (MCPM)

This procedure is used to add an Measurement Collection and Polling Module (MCPM), used for the Measurements Platform feature, to the database using the ent-card command. The MCPM provides an interface between the EAGLE and the customer’s network. The Measurements Platform provides a dedicated processor for collecting and transferring measurements data to a customer supplied FTP server.

The ent-card command uses these parameters.

:loc – The location of the card being added to the database.

:type – The type of card being added to the database. For this procedure, the value of this parameter is mcpm.

:appl – The application software that is assigned to the card. For this procedure, the value of this parameter is mcp.

The Measurements Platform feature requires a minimum of two MCPM cards (part number 870-2372-03 or later) with at least 2 GB of memory per card or two E5-MCPM-B cards with at least 4 GB of memory per card. The MCPM and E5-MCPM-B cards can also be used in mixed mode.

The Measurements Platform feature must be on in order to add a MCPM to the database. This can be verified with the rtrv-feat command. To enable the Measurements Platform feature, the measplat=on parameter must be specified with the chg-feat command.

Note:

The Measurements Platform feature must be purchased before turning on the feature. If you are not sure whether you have purchased the Measurements Platform feature, contact your Oracle Sales Representative or Account Representative.

The shelf to which the card is to be added, must already be in the database. This can be verified with the rtrv-shlf command. If the shelf is not in the database, see the Adding a Shelf procedure.

After all required MCPMs have been configured in the database, go to theConfiguring the Measurements Platform Feature procedure and configure the IP links for these MCPMs and enable the Measurement Platform feature, if necessary.

The examples in this procedure are used to add an MCPM in card location 2107.

  1. Verify that the MCPM (part number 870-2372-03 or later) being added to the database has been physically installed into the proper location.
  2. Connect the Ethernet cables from the customer’s network to Port A of the MCPM.
  3. Display the cards in the database using the rtrv-card command.

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 09:12:36 GMT EAGLE5 41.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1101   DSM       VSCCP      
    1102   TSM       GLS         
    1113   GSPM      OAM
    1114   TDM-A
    1115   GSPM      OAM
    1116   TDM-B
    1117   MDAL
    1201   LIMDS0    SS7ANSI   sp2           A    0   sp1           B    0
    1202   LIMDS0    SS7ANSI   sp2           A    1   nsp3          B    0
    1203   LIMDS0    SS7ANSI   sp3           A    0   
    1204   LIMDS0    SS7ANSI   sp3           A    1   
    1205   LIMDS0    SS7ANSI   itu1          A    0   
    1206   LIMDS0    SS7ANSI   nsp3          A    1   nsp4          B    0
    1212   DSM       VSCCP      
    1214   TSM       GLS          
    1301   LIMATM    ATMANSI   lsnatm1       A    0   
    1303   STC       EROUTE    
    1308   LIMDS0    SS7ANSI   sp6           A    0   sp7           B    0
    1311   LIMDS0    SS7ANSI   sp2           A    2   sp1           B    1
                               sp7           A1   1   sp3           B1   2
    1315   LIMDS0    SS7ANSI   sp7           A    2   sp5           B    0
    1318   LIMATM    ATMANSI   lsnatm1       A    1   
    2101   STC       EROUTE    
    2103   STC       EROUTE    
    2105   STC       EROUTE    
    

    The cards should be distributed throughout the EAGLE for proper power distribution. Refer to Installation Guide for the shelf power distribution.

    Note:

    If the rtrv-card output from step 3 shows an MCPM card, shown by the entries MCPM in the TYPE column and MCP in the APPL column, skip steps 4 and 5, and go to step 6.
  4. Verify that the Measurements Platform feature is enabled by entering the rtrv-feat command.

    If the Measurements Platform feature is on, the MEASPLAT field should be set to on. For this example, the Measurements Platform feature is off.

    Note:

    The rtrv-feat command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-feat command, see the rtrv-feat command description in Commands User's Guide.

    Note:

    If the Measurements Platform feature is on, skip step 5, and go to step 6.
  5. Turn the Measurements Platform feature on by entering this command.

    chg-feat:measplat=on

    Note:

    Once the Measurements Platform feature is turned on with the chg-feat command, it cannot be turned off.

    The Measurements Platform feature must be purchased before turning on the feature. If you are not sure whether you have purchased the Measurements Platform feature, contact your Oracle Sales Representative or Account Representative.

    When the chg-feat has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 21:18:37 GMT EAGLE5 36.0.0
    CHG-FEAT: MASP A - COMPLTD
    
  6. Verify that the EAGLE has a fan unit and the fan unit is on. If the fan unit is not on, use the chg-feat:fan=on command to turn on the fan.
  7. Add the MCPM using the ent-card command.

    For this example, enter this command.

    ent-card:loc=2107:type=mcpm:appl=mcp

    When each of these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    ENT-CARD: MASP A - COMPLTD
    
  8. Verify the changes using the rtrv-card command with the card location specified in step 6.

    For this example, enter this command.

    rtrv-card:loc=2107

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT EAGLE5 36.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    2107   MCPM      MCP       
    
  9. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    
  10. Go to the Configuring the Measurements Platform Feature procedure and configure the IP links for these MCPMs and enable the Measurement Platform feature, if necessary.

Note:

Before executing this procedure, make sure you have purchased the Measurements Platform feature. If you are not sure whether you have purchased the Measurements Platform feature, contact your Oracle Sales Representative or Account Representative.

Figure 4-20 Adding a Measurement Collection and Polling Module (MCPM)

Sheet 1 of 2

Sheet 2 of 2

4.22 Removing an MCPM

This procedure is used to remove a Measurement Collection & Polling Module (MCPM) from the database using the dlt-card command.

Caution:

If the MCPM is the last MCPM in service, removing this card from the database will disable the Measurements Platform feature.

The examples in this procedure are used to remove the MCPM in card location 2107.

Canceling the REPT-STAT-CARD Command

Because the rept-stat-card command used in this procedure can output information for a long period of time, the rept-stat-card command can be canceled and the output to the terminal stopped. There are three ways that the rept-stat-card command can be canceled.

  • Press the F9 function key on the keyboard at the terminal where the rept-stat-card command was entered.

  • Enter the canc-cmd without the trm parameter at the terminal where the rept-stat-card command was entered.

  • Enter the canc-cmd:trm=<xx>, where <xx> is the terminal where the rept-stat-card command was entered, from another terminal other that the terminal where the rept-stat-card command was entered. To enter the canc-cmd:trm=<xx> command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with the rtrv-secu-trm command. The user’s permissions can be verified with the rtrv-user or rtrv-secu-user commands.

For more information about the canc-cmd command, go to Commands User's Guide.

  1. Display the cards in the database using the rtrv-card command.

    This is an example of the possible output.

    
    rlghncxa03w 09-05-01 09:12:36 GMT EAGLE5 41.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1101   DSM       VSCCP      
    1102   TSM       GLS          
    1113   GSPM      OAM
    1114   TDM-A
    1115   GSPM      OAM
    1116   TDM-B
    1117   MDAL
    1201   LIMDS0    SS7ANSI   sp2           A    0   sp1           B    0
    1202   LIMDS0    SS7ANSI   sp2           A    1   nsp3          B    0
    1203   LIMDS0    SS7ANSI   sp3           A    0   
    1204   LIMDS0    SS7ANSI   sp3           A    1   
    1205   LIMDS0    SS7ANSI   itu1          A    0   
    1206   LIMDS0    SS7ANSI   nsp3          A    1   nsp4          B    0
    1212   DSM       VSCCP      
    1214   TSM       GLS          
    1301   LIMATM    ATMANSI   lsnatm1       A    0   
    1303   STC       EROUTE       
    1308   LIMDS0    SS7ANSI   sp6           A    0   sp7           B    0
    1311   LIMDS0    SS7ANSI   sp2           A    2   sp1           B    1
                               sp7           A1   1   sp3           B1   2
    1315   LIMDS0    SS7ANSI   sp7           A    2   sp5           B    0
    1318   LIMATM    ATMANSI   lsnatm1       A    1   
    2101   STC       EROUTE    
    2103   STC       EROUTE    
    2105   STC       EROUTE    
    2107   MCPM      MCP       
    2108   MCPM      MCP       
    2111   MCPM      MCP       
    

    An MCPM is identified by the entries MCPM in the TYPE field and MCP in the APPL field.

  2. Display the status of the MCPMs in the database with the rept-stat-meas command.

    This is an example of the possible output.

    
    rlghncxa03w 09-02-01 16:43:42 GMT  EAGLE5 40.0.0
    
                          PST            SST       AST
    MEAS SS               IS-NR          Active    -----
            ALARM STATUS =   No Alarms
    
        CARD   VERSION         TYPE    PST           SST        AST
        2107 P 101-009-000     MCPM    IS-NR         Active     -----
           IP Link A                   IS-NR         Active     Available
        2108   101-009-000     MCPM    IS-NR         Active     -----
           IP Link A                   IS-NR         Active     Available
        2111   101-009-000     MCPM    IS-NR         Active     -----
           IP Link A                   IS-NR         Active     Available
      
        CARD 2107 ALARM STATUS = No Alarms
        CARD 2108 ALARM STATUS = No Alarms
        CARD 2111 ALARM STATUS = No Alarms
    
  3. Inhibit the MCPM using the rmv-card command, specifying the card location of the MCPM.

    If the MCPM to be inhibited is the last MCPM that is in service, the force=yes parameter must also be specified. For this example, enter this command.

    rmv-card:loc=2107

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    Card has been inhibited.
    
  4. Remove the card using the dlt-card command.

    The dlt-card command has only one parameter, loc, which is the location of the card. For this example, enter these commands.

    dlt-card:loc=2107

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    DLT-CARD: MASP A - COMPLTD
    
  5. Verify the changes using the rtrv-card command specifying the card that was removed in step 4.

    For this example, enter these commands.

    rtrv-card:loc=2107

    When this command has successfully completed, this message should appear.

    
    E2144 Cmd Rej: Location invalid for hardware configuration
    
  6. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-21 Removing a MCPM



4.23 Activating the Fan Feature

This procedure is used to activate the fan using the chg-feat command with this parameter.
  • fan=on - turns the fan on. When the fan is turned on, system cards and functions that generate heat in the EAGLE can function properly.
.
  1. Enter the rtrv-feat command to check the status of the Fan feature.

    Note:

    The rtrv-feat command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-feat command, see the rtrv-feat command description in Commands User's Guide.
  2. If the fan feature is not on, use the chg-feat:fan=on command to turn on the fan.
  3. Verify the changes using the rtrv-feat command.

4.24 Configuring the Measurements Platform Feature

This procedure is used to configure IP communications links between the EAGLE and the customer’s network and enable the Measurements Platform on the EAGLE using these commands:

  • ent-ip-host – Configuring the IP host of the MCPM
  • chg-ip-card – Configuring the IP address of the MCPM
  • chg-ip-lnk – Configuring the IP link assigned to the MCPM
  • chg-measopts – Enabling the Measurements Platform option

These commands contain parameters that are not used in this procedure. Commands User's Guide contains a full description of these commands.

The Measurements Platform requires measurements FTP servers. A maximum of three measurements FTP servers can be configured with one of these procedures.

MCPMs must be configured in the database before this procedure can be performed. This can be verified with the rtrv-card command.

If a Class B IP address is specified for the ipaddr parameter of the chg-ip-lnk command, the subnet address that results from the ipaddr and submask parameter values cannot be the same as the subnet address that results from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command. The pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values can be verified by entering the rtrv-netopts command. Choose ipaddr and submask parameter values for the IP link to the MCPM whose resulting subnet address is not be the same as the subnet address that resulting from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command.

  1. Display the cards in the database using the rtrv-card command.

    This is an example of the possible output.

    
    rlghncxa03w 07-13-13 09:12:36 GMT EAGLE5 45.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1101   DSM       VSCCP      
    1102   TSM       GLS       
    1113   E5MCAP    OAMHC
    1114   E5TDM-A
    1115   E5MCAP    OAMHC
    1116   E5TDM-B
    1117   E5MDAL
    1201   LIMDS0    SS7ANSI   sp2           A    0   sp1           B    0
    1202   LIMDS0    SS7ANSI   sp2           A    1   nsp3          B    0
    1203   LIMDS0    SS7ANSI   sp3           A    0   
    1204   LIMDS0    SS7ANSI   sp3           A    1   
    1206   LIMDS0    SS7ANSI   nsp3          A    1   nsp4          B    0
    1212   DSM       VSCCP      
    1214   TSM       GLS          
    1301   LIMATM    ATMANSI   lsnatm1       A    0   
    1303   STC       EROUTE       
    1308   LIMDS0    SS7ANSI   sp6           A    0   sp7           B    0
    1311   LIMDS0    SS7ANSI   sp2           A    2   sp1           B    1
                               sp7           A1   1   sp3           B1   2
    1315   LIMDS0    SS7ANSI   sp7           A    2   sp5           B    0
    1318   LIMATM    ATMANSI   lsnatm1       A    1   
    2101   STC       EROUTE    
    2103   STC       EROUTE    
    2105   STC       EROUTE    
    2107   MCPM      MCP       
    2108   MCPM      MCP       
    

    If no MCPMs are configured in the database, identified by the entries MCPM in the TYPE field and MCP in the APPL field, go to the Adding a Measurement Collection and Polling Module (MCPM) procedure and configure the required MCPMs.

  2. Display the status of the MCPMs in the database with the rept-stat-meas command.

    This is an example of the possible output.

    
    e1061001 11-12-05 18:35:58 EST  EAGLE5 44.0.0-64.16.0
                              PST           SST        AST
        MEAS SS               IS-NR         Active     -----
            ALARM STATUS =   No Alarms
    
        CARD   VERSION         TYPE    PST           SST        AST
        1105 P 099-016-000     MCPM    IS-NR         Active     -----
           IP Link A                   OOS-MA        Ueq        -----
        1106   099-016-000     MCPM    IS-NR         Active     -----
           IP Link A                   OOS-MA        Ueq        -----
    
        CARD 1105 ALARM STATUS = No Alarms
        CARD 1106 ALARM STATUS = No Alarms
    
    If the status of the MCPM that the IP Link is being assigned to is OOS-MT DSBLD, continue the procedure by performing one of these steps.
    • If a Class A or C IP address will be specified for the ipaddr parameter in 6, continue the procedure with 5.
    • If a Class B IP address will be specified for the ipaddr parameter in 6, continue the procedure with 4.

    If the status of the MCPM that the IP Link is being assigned to is not OOS-MT DSBLD, continue the procedure with 3.

  3. Inhibit the MCPM using the rmv-card command, specifying the card location of the MCPM.

    If the MCPM to be inhibited is the last MCPM that is in service, the force=yes parameter must also be specified. For this example, enter this command.

    rmv-card:loc=2107

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    Card has been inhibited.
    
    Continue the procedure by performing one of these steps.
    • If a Class A or C IP address will be specified for the ipaddr parameter in 6, continue the procedure with 5.
    • If a Class B IP address will be specified for the ipaddr parameter in 6, continue the procedure with 4.
  4. The subnet address that results from the ipaddr and submask parameter values of the chg-ip-lnk command cannot be the same as the subnet address that results from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command.

    Display the pvn, pvnmask, fcna, fcnamask, fcnb, and fcnbmask parameter values of the chg-netopts command by entering the rtrv-netoptscommand.

    If error message E3967 Cmd Rej: E5IS must be on is displayed after the rtrv-netopts command is executed, the pvn, pvnmask, fcna, fcnamask, fcnb, and fcnbmask parameters are not configured. Continue the procedure with 5.

    This is an example of the possible output if the E5IS feature is on.

    
    rlghncxa03w 09-02-28 21:17:37 GMT EAGLE5 40.1.0
    NETWORK OPTIONS
    ------------------
    PVN        = 128.20.30.40
    PVNMASK    = 255.255.192.0
    FCNA       = 170.120.50.0
    FCNAMASK   = 255.255.240.0
    FCNB       = 170.121.50.0
    FCNBMASK   = 255.255.254.0
    

    Choose ipaddr and submask parameter values for the IP link to the MCPM whose resulting subnet address is not be the same as the subnet address that resulting from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command. Continue the procedure with 5.

  5. Display the IP link assignments using the rtrv-ip-lnk command.

    The following is an example of the possible output.

    
    rlghncxa03w 08-12-01 21:20:37 GMT EAGLE5 40.0.0
    LOC   PORT IPADDR           SUBMASK        DUPLEX SPEED MACTYPE AUTO MCAST
    2107  A    --------------- --------------- HALF   10    DIX     NO   NO
    2107  B    --------------- --------------- HALF   10    DIX     NO   NO
    2108  A    150.123.123.123  255.255.255.0  HALF   100   DIX     NO   YES
    2108  B    --------------- --------------- HALF   10    DIX     NO   NO
    2111  A    150.123.123.125  255.255.255.0  HALF   100   DIX     NO   YES
    2111  B    --------------- --------------- HALF   10    DIX     NO   NO
    
    IP-LNK   table is (6 of 2048) 1% full.
    
  6. Assign an IP link to the MCPM using the chg-ip-lnk command with these parameters: loc, port=a, ipaddr, submask, speed=100, mcast=yes, duplex=full.

    For this example, enter this command.

    chg-ip-lnk:loc=2107:port=a:ipaddr=150.1.1.1:submask=255.255.255.0 :speed=100:mcast=yes:duplex=full

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 21:20:37 GMT EAGLE5 36.0.0
    CHG-IP-LNK:   MASP A - COMPLTD
    
  7. Assign a default router to the MCPM using the chg-ip-card command with these parameters: loc, srchordr, domain, and defrouter.

    For this example, enter this command.

    chg-ip-card:loc=2107:srchordr=local:domain=nc.tekelec.com :defrouter=150.1.1.50

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 09-07-28 21:15:37 GMT EAGLE5 41.1.0
    CHG-IP-CARD:   MASP A - COMPLTD
    
  8. Display the current IP host information in the database by entering the rtrv-ip-host:display=all command.

    The following is an example of the possible output.

    
    rlghncxa03w 07-13-13 09:12:36 GMT EAGLE5 45.0.0
    LOCAL IPADDR    LOCAL HOST
    150.1.1.2       GW102.NC.TEKELEC.COM
    150.1.1.3       GW103.NC.TEKELEC.COM
    
    REMOTE IPADDR   REMOTE HOST
    150.1.1.5       NCDEPTECONOMIC_DEVELOPMENT.SOUTHEASTERN_COORIDOR_ASHVL.GOV
    
    IP Host table is  (3 of 4096) <1% full
    
  9. Assign an IP host to the MCPM using the ent-ip-host command.

    For this example, enter this command.

    ent-ip-host:host=gw100.nc.tekelec.com:ipaddr=150.1.1.1

    When this command has successfully completed, the following message should appear.

    
    rlghncxa03w 06-10-01 21:18:37 GMT EAGLE5 36.0.0
    ENT-IP-HOST: MASP A - COMPLTD
    
  10. Place the MCPM back into service using the rst-card specifying the location of the MCPM.

    For this example, enter this command.

    rst-card:loc=2107

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 21:20:37 GMT EAGLE5 36.0.0
    Card has been allowed.
    
  11. Display the FTP Server configuration using the rtrv-ftp-serv command.
    
    rlghncxa03w 06-10-01 09:12:36 GMT EAGLE5 36.0.0
    FTP Client Security: OFF
    
    APP       IPADDR           LOGIN            PRIO
    --------  ---------------  ---------------  ----
    meas      1.255.0.100      ftpmeas3         3
       Path:  ~meas\local
    meas      1.255.0.101      ftpmeas2         2
       Path:  mp\measurements\backup\dat
    
    FTP SERV table is (2 of 10) 20% full
    

    The EAGLE allows three FTP servers for the Measurements Platform. If no FTP servers or one FTP server is in the database, go to the Adding an FTP Server procedure, and backup the FTP server. To change any of these configured FTP servers, go to the Changing an FTP Server procedure.

  12. Verify whether or nor the Measurements Platform option is enabled (PLATFORMENABLE = on) using the rtrv-measopts command.
    
     e1061001 11-12-05 18:50:10 EST  EAGLE5 44.0.0-64.16.0
        PLATFORMENABLE   = off
        COLLECT15MIN     = off
        CLLIBASEDNAME    = off
        OAMHCMEAS        = off
        ----------------------
        SYSTOTSTP        = on
        SYSTOTTT         = off
    

    Note:

    The rtrv-measopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-measopts command, see the rtrv-measopts command description in Commands User's Guide.
    Continue the procedure by performing one of these steps.
    • If the Measurements Platform option is enabled, continue the procedure with 15.
    • If the Measurements Platform option is not enabled, continue the procedure with 13.
  13. Enable the Measurements Platform option using the chg-measopts command with the platformenable parameter.

    For this example, enter this command.

    chg-measopts:platformenable=on

    When the chg-measopts command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 00:22:57 GMT  EAGLE5 36.0.0
    CHG-MEASOPTS: MASP A - COMPLTD
    
  14. Verify the status of the MCPM using the rept-stat-meas command.

    For this example, enter this command.

    rept-stat-meas

    
    e1061001 11-12-05 18:46:58 EST  EAGLE5 44.0.0-64.16.0
                              PST           SST        AST
        MEAS SS               IS-ANR        Restrict   -----
            ALARM STATUS =   No Alarms
    
        CARD   VERSION         TYPE    PST           SST        AST
        1105 P 099-016-000     MCPM    IS-NR         Active     -----
           IP Link A                   IS-NR         Active     -----
        1106   099-016-000     MCPM    IS-NR         Active     -----
           IP Link A                   IS-NR         Active     -----
    
        CARD 1105 ALARM STATUS = No Alarms
        CARD 1106 ALARM STATUS = No Alarms
    
  15. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-22 Configuring the Measurements Platform Feature



Sheet 1 of 4



Sheet 2 of 4



Sheet 3 of 4



Sheet 4 of 4

4.25 Adding an FTP Server

This procedure is used to add FTP servers using the ent-ftp-serv command.

The ent-ftp-serv command uses these parameters.

:app – The application of the FTP server. There are four values for the app parameter:

  • meas – The FTP servers for the Measurements Platform. A maximum of three FTP servers can be configured for this application.
  • db - The FTP server for the database backup/restore application. Only one FTP server can be configured for this application.
  • dist - the FTP server for the EAGLE software release distribution application. Only one FTP server can be configured for this application.
  • user – The FTP servers for the FTP Retrieve and Replace feature.A maximum of two FTP servers can be configured for this application.

    Caution:

    While this procedure can be used to add a USERFTP server, any USERFTP servers entered by this procedure will be overwritten by the FTP server configuration information sent to the EAGLE by the FTP-Based Table Retrieve Application (FTRA).

:ipaddr – The IP address of the FTP server.

:login – The name of the FTP server client.

:path – The path to the file on the EAGLE that is to be sent to the FTP server.

:prio – The priority of the FTP server, from 1 to 10.

The app/ipaddr parameter combination must be unique in the database.

The login parameter value can contain from 1 to 15 alpha-numeric characters. The alphabetic characters can be both upper and lower case characters.

The path parameter value is a mixed-case quoted character string with a valid FTP path format that can contain up to 100 characters.

After the FTP server is added to the database with the ent-ftp-serv command, the user is prompted for a password for this FTP server. The password can contain from 1 to 15 alpha-numeric characters. The alphabetic characters must be both upper and lower case characters. The password is not shown on the terminal screen as it is being entered and is not shown in the rtrv-ftp-serv output.

If the EAGLE OA&M IP Security Enhancement Controlled Feature is enabled and activated, the FTP servers configured in this procedure must be secure FTP servers. The FTP-Based Table Retrieve Application (FTRA) and the Measurements Platform must support secure shell connections to the EAGLE. Enter the rtrv-ctrl-feat command to verify whether or not the Eagle OA&M IP Security Enhancement Controlled Feature is enabled and activated.

Because CSV measurement data files do not have unique names across multiple STPs, include the CLLI of the STP in the FTP server path for meas FTP servers.

The IP address of the FTP server cannot be shown as the IPADDR value in the rtrv-ip-lnk or rtrv-seas-config outputs, or the BPIPADDR value in the rtrv-ip-card output.

  1. Display the FTP servers in the database using the rtrv-ftp-serv commandby entering this command..

    rtrv-ftp-serv:mode=full

    This is an example of the possible output.

    
    rlghncxa03w 08-09-01 09:12:36 GMT EAGLE5 39.2.0
    FTP Client Security: ON
    
    APP       IPADDR           LOGIN            PRIO
    --------  ---------------  ---------------  ----
    meas      1.255.0.100      ftpmeas3         3
       Path:  ~meas\local
    
    FTP SERV table is (1  of 10)  10% full
    
  2. Add the FTP server to the database using the ent-ftp-serv command.

    For this example, enter these commands.

    ent-ftp-serv:app=meas:ipaddr=1.255.0.101:login=ftpmeas2:prio=2 :path="\tmp\measurements\backup\dat"

    ent-ftp-serv:app=user:ipaddr=1.255.0.100:login=ftpuser1:prio=3 :path="\tmp\user"

    ent-ftp-serv:app=user:ipaddr=1.255.0.102:login=ftpuser5:prio=7 :path="\tmp\backup\user"

    ent-ftp-serv:app=db:ipaddr=10.20.50.102:login=dbuser1:prio=1 :path="~/eagle"

    ent-ftp-serv:app=dist:ipaddr=100.200.50.102:login=dbuser1:prio=1 :path="~/eagle"

    Caution:

    While this procedure can be used to add a USER FTP server, any USER FTP servers entered by this procedure will be overwritten by the FTP server configuration information sent to the EAGLE by the EAGLE FTP Table Base Retrieval (FTRA).

    When each of these commands has successfully completed, the following message should appear.

    
        rlghncxa03w 08-09-01 21:18:37 GMT EAGLE5 39.2.0
    Enter Password :
        FTP SERV table is (4 of 10) 40% full
        ENT-FTP-SERV: MASP A - COMPLTD
    
    
    rlghncxa03w 06-10-01 21:18:37 GMT EAGLE5 36.0.0
    FTP SERV table is (4 of 10) 40% full
    ENT-FTP-SERV: MASP A - COMPLTD
    
  3. Enter a password for the FTP server added in 2 at the PASSWORD: prompt.

    The password is not shown on the terminal screen as it is entered. The password can contain from 1 to 15 alpha-numeric characters. The alphabetic characters must be both upper and lower case characters.

  4. Display the changes by entering this command.

    rtrv-ftp-serv:mode=full

    The following is an example of the possible output.

    
    rlghncxa03w 08-09-01 09:12:36 GMT EAGLE5 39.2.0
    FTP Client Security: ON
    
    
    APP       IPADDR           LOGIN            PRIO
    --------  ---------------  ---------------  ----
    db        10.20.50.102     dbuser1          1
       Path:  ~/eagle
    dist      100.200.50.102   dbuser1          1
       Path:  ~/eagle
    meas      1.255.0.100      ftpmeas3         3
       Path:  ~meas\local
    meas      1.255.0.101      ftpmeas2         2
       Path:  \tmp\measurements\backup\dat
    user      1.255.0.100      ftpuser1         3
       Path:  \tmp\user
    user      1.255.0.102      ftpuser5         7
       Path:  \tmp\backup\user
    
    FTP SERV table is (6 of 10) 60% full
    
  5. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first

    .
    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-23 Adding an FTP Server



Sheet 1 of 2



Sheet 2 of 2

4.26 Removing an FTP Server

This procedure is used to remove an FTP server from the database using the dlt-ftp-serv command.

The dlt-ftp-serv command uses these parameters.

:app – The application of the FTP server. There are four values for the app parameter:

  • meas – The FTP servers for the Measurements Platform
  • user – The FTP servers for the FTP Retrieve and Replace feature.
  • db - The FTP server for the database backup/restore application.
  • dist - the FTP server for the EAGLE software release distribution application.

:ipaddr – The IP address of the FTP server.

Caution:

Removing all FTP servers for an application will disable the feature supported by the FTP servers.
  1. Display the FTP servers in the database by entering this command.

    rtrv-ftp-serv:mode=full

    This is an example of the possible output.

    
    rlghncxa03w 08-09-01 09:12:36 GMT EAGLE5 39.2.0
    FTP Client Security: ON
    
    
    APP       IPADDR           LOGIN            PRIO
    --------  ---------------  ---------------  ----
    db        10.20.50.102     dbuser1          1
       Path:  ~/eagle
    dist      100.200.50.102   dbuser1          1
       Path:  ~/eagle
    meas      1.255.0.100      ftpmeas3         3
       Path:  ~meas\local
    meas      1.255.0.101      ftpmeas2         2
       Path:  \tmp\measurements\backup\dat
    user      1.255.0.100      ftpuser1         3
       Path:  \tmp\user
    user      1.255.0.102      ftpuser5         7
       Path:  \tmp\backup\user
    
    FTP SERV table is (6 of 10) 60% full
    
  2. Remove an FTP server from the database using the dlt-ftp-serv command.

    For this example, enter this command.

    dlt-ftp-serv:app=meas:ipaddr=1.255.0.101

    When this command has successfully completed, the following message should appear.

    
    rlghncxa03w 08-09-01 21:18:37 GMT EAGLE5 39.2.0
    FTP SERV table is (5 of 10) 50% full
    DLT-FTP-SERV: MASP A - COMPLTD
    
  3. Display the changes by entering this command.

    rtrv-ftp-serv:mode=full

    The following is an example of the possible output.

    
    rlghncxa03w 08-09-01 09:12:36 GMT EAGLE5 39.2.0
    FTP Client Security: ON
    
    
    APP       IPADDR           LOGIN            PRIO
    --------  ---------------  ---------------  ----
    db        10.20.50.102     dbuser1          1
       Path:  ~/eagle
    dist      100.200.50.102   dbuser1          1
       Path:  ~/eagle
    meas      1.255.0.100      ftpmeas3         3
       Path:  ~meas\local
    user      1.255.0.100      ftpuser1         3
       Path:  \tmp\user
    user      1.255.0.102      ftpuser5         7
       Path:  \tmp\backup\user
    
    FTP SERV table is (5 of 10) 50% full
    
  4. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-24 Removing an FTP Server



4.27 Changing an FTP Server

This procedure is used to change the values assigned to an FTP server using the chg-ftp-serv command.

The chg-ftp-serv command uses these parameters.

:app – The application of the FTP server. There are four values for the app parameter:

  • meas – The FTP servers for the Measurements Platform
  • db - The FTP server for the database backup/restore application.
  • dist - the FTP server for the EAGLE software release distribution application.
  • user – The FTP servers for the FTP Retrieve and Replace feature.

    Caution:

    While this procedure can be used to change a USERFTP server configuration, any USERFTP server configurations changed by this procedure will be overwritten by the FTP server configuration information sent to the EAGLE by the EAGLE FTP Table Base Retrieval (FTRA).

:ipaddr – The IP address of the FTP server.

:login – The name of the FTP server client.

:path – The path to the file on the EAGLE that is to be sent to the FTP server.

:prio – The priority of the FTP server, from 1 to 10.

The app and ipaddr parameters must be specified with the chg-ftp-serv command. The IP address of the FTP server cannot be changed with the chg-ftp-serv command. If you wish to change the IP address of the FTP server, the FTP server must first be removed with the Removing an FTP Server procedure, then re-entered with the new IP address using the Adding an FTP Server procedure.

The login parameter value can contain from 1 to 15 alpha-numeric characters. The alphabetic characters can be both upper and lower case characters.

The path parameter value is a mixed-case quoted character string with a valid FTP path format that can contain up to 100 characters.

If the login parameter value is changed, the user is prompted for a password for this FTP server. The password can contain from 1 to 15 alpha-numeric characters. The alphabetic characters must be both upper and lower case characters. The password is not shown on the terminal screen as it is being entered and is not shown in the rtrv-ftp-serv output.

If the Eagle OA&M IP Security Enhancement Controlled Feature is enabled and activated, the FTP servers configured in this procedure must be secure FTP servers. The EAGLE FTP Table Base Retrieval (FTRA) and the Measurements Platform must support secure shell connections to the EAGLE. Enter the rtrv-ctrl-feat command to verify whether or not the Eagle OA&M IP Security Enhancement Controlled Feature is enabled and activated.

Because CSV measurement data files do not have unique names across multiple STPs, include the CLLI of the STP in the FTP server path for meas FTP servers.

  1. Display the FTP servers in the database by entering this command.

    rtrv-ftp-serv:mode=full

    This is an example of the possible output.

    
    rlghncxa03w 08-09-01 09:12:36 GMT EAGLE5 39.2.0
    FTP Client Security: ON
    
    
    APP       IPADDR           LOGIN            PRIO
    --------  ---------------  ---------------  ----
    db        10.20.50.102     dbuser1          1
       Path:  ~/eagle
    dist      100.200.50.102   dbuser1          1
       Path:  ~/eagle
    meas      1.255.0.100      ftpmeas3         3
       Path:  ~meas\local
    meas      1.255.0.101      ftpmeas2         2
       Path:  \tmp\measurements\backup\dat
    user      1.255.0.100      ftpuser1         3
       Path:  \tmp\user
    user      1.255.0.102      ftpuser5         7
       Path:  \tmp\backup\user
    
    FTP SERV table is (6 of 10) 60% full
    
  2. Change the FTP server to the database using the chg-ftp-serv command.

    For this example, enter this command.

    chg-ftp-serv:app=meas:ipaddr=1.255.0.101:login=meas25:prio=1

    When this command has successfully completed, the following message should appear.

    
        rlghncxa03w 08-09-01 21:18:37 GMT EAGLE5 39.2.0
    Enter Password :
        CHG-FTP-SERV: MASP A - COMPLTD
    

    Note:

    If the login parameter was not specified in this step, continue the procedure with 4.
  3. Enter a password for the FTP server changed in 2 at the PASSWORD: prompt.

    The password is not shown on the terminal screen as it is entered. The password can contain from 1 to 15 alpha-numeric characters. The alphabetic characters must be both upper and lower case characters.

  4. Display the changes by entering this command.

    rtrv-ftp-serv:mode=full

    The following is an example of the possible output.

    
    rlghncxa03w 08-09-01 09:12:36 GMT EAGLE5 39.2.0
    FTP Client Security: ON
    
    
    APP       IPADDR           LOGIN            PRIO
    --------  ---------------  ---------------  ----
    db        10.20.50.102     dbuser1          1
       Path:  ~/eagle
    dist      100.200.50.102   dbuser1          1
       Path:  ~/eagle
    meas      1.255.0.100      ftpmeas3         3
       Path:  ~meas\local
    meas      1.255.0.101      meas25           1
       Path:  \tmp\measurements\backup\dat
    user      1.255.0.100      ftpuser1         3
       Path:  \tmp\user
    user      1.255.0.102      ftpuser5         7
       Path:  \tmp\backup\user
    
    FTP SERV table is (6 of 10) 60% full
    
  5. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-25 Changing an FTP Server



Sheet 1 of 2



Sheet 2 of 2

4.28 Adding an E5-IPSM

This procedure is used to add an E5-IPSM (IP Services Module), used for the IP User Interface feature, to the database using the ent-card command. The E5-IPSM provides eight IP based connections to the EAGLE’s user interface through a telnet client. As of Release 46.5, the E5-IPSM card and its functionality is replaced by the E5-ENET-B (p/n 870-2971-01) or SLIC (p/n 7094646) card. Any references to E5-IPSM and the 870-2877-01 part number should be replaced by the 46.5 and greater card and part number.

The ent-card command uses these parameters.

:loc – The location of the card being added to the database.

:type – The type of card being added to the database. For this procedure, the value of this parameter is ipsm.

:appl – The application software that is assigned to the card. For this procedure, the value of this parameter is ips.

The IP User Interface (Telnet) feature is not required to be enabled and activated in order to add an E5-IPSM, but the IP User Interface (Telnet) feature must be enabled and activated so that the user can use a telnet client to establish a connection to the EAGLE. This can be verified with the rtrv-ctrl-feat command. To enable and activate the IP User Interface (Telnet) feature, go to the Activating Controlled Features procedure.

The shelf to which the card is to be added, must already be in the database. This can be verified with the rtrv-shlf command. If the shelf is not in the database, see the Adding a Shelf procedure.

If an E5-IPSM is being provisioned in this procedure, HIPR2 cards must be installed into card locations 9 and 10 in the shelf that the E5-IPSM will occupy. If HIPR2 cards are not installed in the shelf that the E5-IPSM will occupy, the E5-IPSM will not function when the E5-IPSM is inserted into the shelf. Enter the rept-stat-gpl:gpl=hipr2 command to verify whether or not HIPR2 cards are installed in the same shelf as the E5-IPSM being provisioned in this procedure.

If the Eagle OA&M IP Security Enhancement feature is enabled and activated, shown in the rtrv-ctrl-feat output, when an E5-IPSM is installed into the EAGLE, UIM 1493, SSH Host Keys Regenerated, is displayed. UIM 1493 contains the public host key fingerprint which is used to establish a secure connection with an SSH client. If the secure connection is to be made with the FTRA, the public host key fingerprint displayed in UIM 1493 must be added to the hosts.xml file in the FTRA. Record the public host key fingerprint information displayed in UIM 1493 if a secure connection to the FTRA will be made. For more information about editing the hosts.xml file on the FTRA, see FTP Table Base Retrieval (FTRA) User's Guide.

An IP link must be assigned to the E5-IPSM. The IP links can be verified using the rtrv-ip-lnk command. IP links are configured using the chg-ip-lnk command.

After an E5-IPSM is configured in the database and placed into service, eight telnet terminals are configured in the database with default values for the security and output group parameters. If you wish to change the security and output group parameter values, go to the Changing Terminal Characteristics procedure.

If a Class B IP address is specified for the ipaddr parameter of the chg-ip-lnk command, the subnet address that results from the ipaddr and submask parameter values cannot be the same as the subnet address that results from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command. The pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values can be verified by entering the rtrv-netopts command. Choose ipaddr and submask parameter values for the IP link to the E5-IPSM whose resulting subnet address is not be the same as the subnet address that resulting from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command.

The IP address of the E5-IPSM cannot be shown as the IPADDR value in the rtrv-ip-lnk, rtrv-ftp-serv, or rtrv-seas-config outputs, or the BPIPADDR value in the rtrv-ip-card output.

The examples in this procedure are used to add an E5-IPSM in card location 2107.

  1. Display the cards in the database using the rtrv-card command.

    This is an example of the possible output.

    
    rlghncxa03w 07-13-13 09:12:36 GMT EAGLE5 45.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1101   DSM       VSCCP      
    1102   TSM       GLS         
    1114   E5TDM-A
    1116   E5TDM-B
    1201   LIMDS0    SS7ANSI   sp2           A    0   sp1           B    0
    1202   LIMDS0    SS7ANSI   sp2           A    1   nsp3          B    0
    1203   LIMDS0    SS7ANSI   sp3           A    0   
    1204   LIMDS0    SS7ANSI   sp3           A    1   
    1205   LIMDS0    SS7ANSI   itu1          A    0   
    1206   LIMDS0    SS7ANSI   nsp3          A    1   nsp4          B    0
    1212   DSM       VSCCP      
    1214   TSM       GLS       
    1301   LIMATM    ATMANSI   lsnatm1       A    0   
    1303   STC       EROUTE      
    1308   LIMDS0    SS7ANSI   sp6           A    0   sp7           B    0
    1311   LIMDS0    SS7ANSI   sp2           A    2   sp1           B    1
                               sp7           A1   1   sp3           B1   2
    1315   LIMDS0    SS7ANSI   sp7           A    2   sp5           B    0
    1318   LIMATM    ATMANSI   lsnatm1       A    1   
    2101   STC       EROUTE    
    2103   STC       EROUTE    
    2105   STC       EROUTE    
    

    The cards should be distributed throughout the EAGLE for proper power distribution. Refer to Installation Guide for the shelf power distribution.

    Note:

    The EAGLE can contain a maximum of 3 E5-IPSMs. If the rtrv-card output shows that there are three E5-IPSMs in the EAGLE, this procedure cannot be performed.

    Note:

    If the card being added in this procedure is not an E5-IPSM card, continue the procedure with 3.
  2. Verify that HIPR2 cards are installed in card locations 9 and 10 in the shelf that will contain the E5-IPSM card being added in this procedure. Enter this command.

    rept-stat-gpl:gpl=hipr2

    This is an example of the possible output.

    
    rlghncxa03w 09-07-01 11:40:26 GMT  EAGLE5 41.1.0
    GPL        CARD      RUNNING            APPROVED      TRIAL
    HIPR2      1109      126-002-000        126-002-000   126-003-000
    HIPR2      1110      126-002-000        126-002-000   126-003-000
    HIPR2      1209      126-002-000        126-002-000   126-003-000
    HIPR2      1210      126-002-000        126-002-000   126-003-000
    HIPR2      1309      126-002-000        126-002-000   126-003-000
    HIPR2      1310      126-002-000        126-002-000   126-003-000
    HIPR2      2109      126-002-000        126-002-000   126-003-000
    HIPR2      2110      126-002-000        126-002-000   126-003-000
    Command Completed
    

    If HIPR2 cards are installed in the shelf that will contain the E5-IPSM card, continue the procedure with 3.

    If HIPR2 cards are not installed on the shelf that will contain the E5-IPSM card, refer to Installation Guide to install the HIPR2 cards. Once the HIPR2 cards have been installed, continue the procedure with 3.

  3. Install the E5-IPSM into the proper card location.

    If the OA&M IP Security Enhancements feature is enabled and activated, UIM 1493, SSH Host Keys Regenerated, is displayed when the E5-IPSM is installed into the card location. UIM 1493 contains the public host key fingerprint which is used to establish a secure connection with an SSH client. If the secure connection is to be made with the FTRA, the public host key fingerprint displayed in UIM 1493 must be added to the hosts.xml file in the FTRA. Record the public host key fingerprint information displayed in UIM 1493 if a secure connection to the FTRA will be made. For more information about editing the hosts.xml file on FTRA, see FTP Table Base Retrieval (FTRA) User's Guide.

  4. Verify that the EAGLE has a fan unit and the fan unit is on. If the fan unit is not on, use the chg-feat:fan=on command to turn on the fan.
  5. Add the E5-IPSM using the ent-card command.

    For this example, enter this command.

    ent-card:loc=2107:type=e5ipsm:appl=ips

    When this command has successfully completed, these messages should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    Telnet auto-provisioning activated, 8 terminals are being added:
    Telnet terminal 17 Added at location 2107.
    Telnet terminal 18 Added at location 2107.
    Telnet terminal 19 Added at location 2107.
    Telnet terminal 20 Added at location 2107.
    Telnet terminal 21 Added at location 2107.
    Telnet terminal 22 Added at location 2107.
    Telnet terminal 23 Added at location 2107.
    Telnet terminal 24 Added at location 2107.
    
    ENT-CARD: MASP A - COMPLTD
    
  6. Verify the changes using the rtrv-card command with the card location specified in 5 .

    For this example, enter this command.

    rtrv-card:loc=2107

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT EAGLE5 36.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    2107   E5-IPSM      IPS       
    
  7. Verify that the terminals shown as added in 5 have been added by entering the rtrv-trm command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 39.0.0
    TRM  TYPE     COMM        FC    TMOUT MXINV DURAL
    1    VT320    9600-7-E-1  SW    30    5     99:59:59
    2    KSR      9600-7-E-1  HW    30    5     INDEF
    3    PRINTER  4800-7-E-1  HW    30    0     00:00:00
    4    VT320    2400-7-E-1  BOTH  30    5     00:30:00
    5    VT320    9600-7-O-1  NONE  30    5     00:00:30
    6    VT320    9600-7-E-2  SW    30    9     INDEF
    7    PRINTER  9600-7-N-2  HW    30    5     00:30:00
    8    KSR     19200-7-E-2  BOTH  30    5     00:30:00
    9    VT320    9600-7-E-1  SW    30    7     00:30:00
    10   VT320    9600-7-E-1  HW    30    5     00:30:00
    11   VT320    4800-7-E-1  HW    30    5     00:30:00
    12   PRINTER  9600-7-E-1  HW    30    4     00:30:00
    13   VT320    9600-7-O-1  NONE  30    5     00:30:00
    14   VT320    9600-7-E-2  SW    30    8     00:30:00
    15   VT320    9600-7-N-2  HW    30    5     00:30:00
    16   VT320    9600-7-E-2  BOTH  30    3     00:30:00
    
    TRM  TYPE      LOC              TMOUT MXINV DURAL      SECURE
    17   TELNET    2107             60    5     00:30:00
    18   TELNET    2107             60    5     00:30:00
    19   TELNET    2107             60    5     00:30:00
    20   TELNET    2107             60    5     00:30:00
    21   TELNET    2107             60    5     00:30:00
    22   TELNET    2107             60    5     00:30:00
    24   TELNET    2107             60    5     00:30:00
    
    TRM  LOGINTMR LOGOUTTMR PNGTIMEINT PNGFAILCNT
         (sec)    (sec)     (msec)
    17   none     none      none       1
    18   none     none      none       1
    19   none     none      none       1
    20   none     none      none       1
    21   none     none      none       1
    22   none     none      none       1
    23   none     none      none       1
    24   none     none      none       1
    
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    1    NO   YES  NO  YES NO  YES YES
    2    NO   NO   NO  NO  NO  NO  NO
    3    YES  YES  YES NO  YES YES YES
    4    YES  NO   NO  NO  NO  NO  NO
    5    NO   YES  NO  NO  NO  NO  YES
    6    NO   NO   YES NO  NO  NO  NO
    7    YES  YES  YES YES YES YES YES
    8    NO   NO   NO  NO  YES NO  YES
    9    NO   YES  NO  NO  NO  YES NO
    10   NO   NO   NO  NO  NO  NO  YES
    11   YES  YES  YES YES YES YES YES
    12   YES  YES  YES YES YES YES YES
    13   NO   YES  NO  NO  NO  NO  YES
    14   NO   NO   YES NO  NO  NO  NO
    15   YES  YES  YES NO  YES YES YES
    16   NO   NO   NO  NO  YES NO  YES
    17   NO   NO   NO  NO  NO  NO  NO
    18   NO   NO   NO  NO  NO  NO  NO
    19   NO   NO   NO  NO  NO  NO  NO
    20   NO   NO   NO  NO  NO  NO  NO
    21   NO   NO   NO  NO  NO  NO  NO
    22   NO   NO   NO  NO  NO  NO  NO
    23   NO   NO   NO  NO  NO  NO  NO
    24   NO   NO   NO  NO  NO  NO  NO
    
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    1    YES  YES YES  YES YES YES YES YES  YES YES NO   
    2    YES  YES YES  YES YES YES YES YES  YES YES NO   
    3    YES  YES YES  YES YES YES YES YES  YES YES NO   
    4    YES  YES YES  YES YES NO  YES YES  YES YES NO   
    5    YES  YES YES  YES YES YES YES YES  YES YES NO   
    6    YES  YES YES  YES YES YES YES YES  YES YES NO   
    7    NO   YES YES  YES YES YES YES YES  YES YES NO   
    8    YES  YES YES  YES YES YES YES YES  YES YES YES  
    9    YES  YES YES  YES YES YES YES YES  YES YES YES  
    10   YES  YES YES  YES YES YES YES YES  YES YES YES  
    11   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    12   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    13   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    14   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    15   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    16   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    17   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    18   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    19   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    20   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    21   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    22   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    23   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    24   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    

    To change the output parameter values or the logintmr, logouttmr, pngfailcnt, or the pngtimeint parameter values for the telnet terminals added in this procedure, perform the Changing Terminal Characteristics procedure.

    After this step has been performed, continue the procedure by performing one of these steps.
    • If a Class A or C IP address will be specified for the ipaddr parameter in 10, continue the procedure with 9 .
    • If a Class B IP address will be specified for the ipaddr parameter in 10, continue the procedure with 8.
  8. The subnet address that results from the ipaddr and submask parameter values of the chg-ip-lnk command cannot be the same as the subnet address that results from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command.

    Display the pvn, pvnmask, fcna, fcnamask, fcnb, and fcnbmask parameter values of the chg-netopts command by entering the rtrv-netopts command.

    If error message E3967 Cmd Rej: E5IS must be on is displayed after the rtrv-netopts command is executed, the pvn, pvnmask, fcna, fcnamask, fcnb, and fcnbmaskpvn and pvnmask parameters are not configured.

    This is an example of the possible output if the E5IS feature is on.

    
    rlghncxa03w 09-02-28 21:17:37 GMT EAGLE5 40.1.0
    NETWORK OPTIONS
    ------------------
    PVN        = 128.20.30.40
    PVNMASK    = 255.255.192.0
    FCNA       = 170.120.50.0
    FCNAMASK   = 255.255.240.0
    FCNB       = 170.121.50.0
    FCNBMASK   = 255.255.254.0
    

    Choose ipaddr and submask parameter values for the IP link to the E5-IPSM whose resulting subnet address is not be the same as the subnet address that resulting from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command. Continue the procedure with 9.

  9. Display the IP link data assigned to the E5-IPSM using the rtrv-ip-lnk command with the E5-IPSM’s location and the port=a parameter.

    For this example, enter this command.

    rtrv-ip-lnk:loc=2107:port=a

    The following is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:20:37 GMT EAGLE5 36.0.0
    LOC   PORT IPADDR          SUBMASK         DUPLEX  SPEED MACTYPE AUTO MCAST
    2107  A    --------------- --------------- HALF    10    DIX     NO   NO
    
  10. Assign an IP link to the E5-IPSM using the chg-ip-lnk command with these parameters: loc, port=a, ipaddr, submask, speed=100, duplex=full.

    For this example, enter this command.

    chg-ip-lnk:loc=2107:port=a:ipaddr=150.1.1.1:submask=255.255.255.0:speed=100:duplex=full

    Note:

    If either the ipaddr or submask parameters are specified, then both parameters must be specified, unless the ipaddr=0.0.0.0 parameter is specified, then the submask parameter is not required. The ipaddr=0.0.0.0 parameter disables the IP link.

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 21:20:37 GMT EAGLE5 36.0.0
    CHG-IP-LNK:   MASP A - COMPLTD
    
  11. Verify the changes made in 10 using the rtrv-ip-lnk command and specifying the card location and port values used in 10 .

    For this example, enter this command.

    rtrv-ip-lnk:loc=2107:port=a

    The following is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:20:37 GMT EAGLE5 36.0.0
    LOC   PORT IPADDR           SUBMASK        DUPLEX SPEED MACTYPE AUTO MCAST
    2107  A    150.1.1.1        255.255.255.0  FULL   100   DIX     NO   NO
    
  12. Display the current IP host information in the database by entering the rtrv-ip-host command with the IP address of the IP link shown in 11 .

    For this example, enter this command.

    rtrv-ip-host:ipaddr=150.1.1.1

    No IP address and IP host entry is displayed, as shown in the following example.

    
    rlghncxa03w 07-13-13 09:12:36 GMT EAGLE5 45.0.0
    
    No matching entries found
    
    IP Host table is  (2 of 4096) <1% full
    
  13. Assign an IP host to the E5-IPSM using the ent-ip-host command.

    For this example, enter this command.

    ent-ip-host:host=ip.nc.tekelec.com:ipaddr=150.1.1.1

    When this command has successfully completed, the following message should appear.

    
    rlghncxa03w 06-10-01 21:18:37 GMT EAGLE5 36.0.0
    ENT-IP-HOST: MASP A - COMPLTD
    
  14. Display the IP card attributes of the E5-IPSM using the rtrv-ip-card command specifying the E5-IPSM’s location.

    For this example, enter this command.

    rtrv-ip-card:loc=2107

    The following is an example of the possible output.

    
    rlghncxa03w 08-06-01 21:20:37 GMT EAGLE5 39.0.0
    LOC 2107
      SRCHORDR  SRVR
      DNSA      ---------------
      DNSB      ---------------
      DEFROUTER ---------------
      DOMAIN    ---------------
      SCTPCSUM  crc32c
      BPIPADDR  ---------------
      BPSUBMASK ---------------
    
  15. Change the IP card attributes of the E5-IPSM using the chg-ip-card command with these values: E5-IPSM card location, local search order, domain, and the default router for the E5-IPSM.

    For this example, enter this command.

    chg-ip-card:loc=2107:srchordr=local:domain=ip.nc.tekelec.com:defrouter=150.1.1.250

    The following is an example of the possible output.

    Note:

    The network portion of the default router’s IP address (defrouter) must be the same as the network portion of the IP address specified in the chg-ip-lnk ( 7 ) and ent-ip-host ( 11 ) commands. The value of the last octet of the default router’s IP address must be from 1 to 254.

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 21:20:37 GMT EAGLE5 36.0.0
    CHG-IP-CARD:   MASP A - COMPLTD
    
  16. Verify the changes made in 15 using the rtrv-ip-card command specifying the E5-IPSM’s location.

    For this example, enter this command.

    rtrv-ip-card:loc=2107

    The following is an example of the possible output.

    
    rlghncxa03w 08-06-01 21:20:37 GMT EAGLE5 39.0.0
    LOC 2107
      SRCHORDR  LOCAL
      DNSA      ---------------
      DNSB      ---------------
      DEFROUTER 150.1.1.250
      DOMAIN    ip.nc.tekelec.com
      SCTPCSUM  crc32c
      BPIPADDR  ---------------
      BPSUBMASK ---------------
    
  17. Verify that the IP User Interface (Telnet) feature is enabled and turned on, and if secure connections to the EAGLE are to be used, verify that the OA&M IP Security Enhancements feature is enabled and activated by entering the rtrv-ctrl-feat command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    The following features have been permanently enabled:
    Feature Name              Partnum    Status  Quantity
    Telnet                    893005701  off     ----
    

    Note:

    The rtrv-ctrl-feat command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-ctrl-feat command, see the rtrv-ctrl-feat command description in Commands User's Guide.

    If the IP User Interface (Telnet) feature is enabled and turned on (status = on), continue the procedure with 18.

    If the IP User Interface (Telnet) feature is not enabled or turned on, perform the Activating Controlled Features procedure to enable and turn on the IP User Interface (Telnet) feature.

    If UIM 1493 was displayed when the E5-IPSM was installed in 3 , the OA&M IP Security Enhancements feature is enabled and turned on. If the OA&M IP Security Enhancements feature is enabled and turned on (shown by the entry EAGLE OA&M IP Security in the rtrv-ctrl-feat output with the status = on), continue the procedure with 18.

    If the OA&M IP Security Enhancements feature is not enabled or turned on, and secure connections are to the EAGLE are to be used, perform the Activating the EAGLE OA&M IP Security Enhancement Controlled Feature procedure to enable and turn on the OA&M IP Security Enhancements feature.

  18. Place the E5-IPSM into service using the rst-card specifying the location of the E5-IPSM.

    For this example, enter this command.

    rst-card:loc=2107

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 21:20:37 GMT EAGLE5 36.0.0
    Card has been allowed.
    

    If the OA&M IP Security Enhancements feature is enabled and activated, UIM 1494, SSH Host Keys Loaded, is displayed. UIM 1494 contains the public host key fingerprint which is used to establish a secure connection with an SSH client. If the secure connection is to be made with the FTRA, the public host key fingerprint displayed in UIM 1494 must be added to the hosts.xml file in the FTRA. If the public host key fingerprint was not recorded in 3 , record the public host key fingerprint information displayed in UIM 1494 if a secure connection to the FTRA will be made. For more information about editing the hosts.xml file on the FTRA, see FTP Table Base Retrieval (FTRA) User's Guide.

  19. Put the terminals that were created when the E5-IPSM was added in 5 into service with the rst-trm command. For this example, enter these commands.

    rst-trm:trm=17

    rst-trm:trm=18

    rst-trm:trm=19

    rst-trm:trm=20

    rst-trm:trm=21

    rst-trm:trm=22

    rst-trm:trm=23

    rst-trm:trm=24

    This message should appear when each of these commands have successfully completed.

    rlghncxa03w 07-05-01 15:08:45 GMT EAGLE5 37.0.0
    Allow message sent to terminal
    
    rlghncxa03w 07-05-01 15:08:45 GMT EAGLE5 37.0.0
    Command Completed.
  20. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-26 Adding an E5-IPSM



Sheet 1 of 6



Sheet 2 of 6



Sheet 3 of 6



Sheet 4 of 6



Sheet 5 of 6



Sheet 6 of 6

4.29 Removing an E5-IPSM

This procedure is used to remove an E5-IPSM (IP Services Module - a card running the ips application) from the database using the dlt-card command.

Note:

As of Release 46.5, the E5-IPSM card and its functionality is replaced by the E5-ENET-B (p/n 870-2971-01) or SLIC (p/n 7094646) card. Any references to E5-IPSM and the 870-2877-01 part number should be replaced by the 46.5 and greater card and part number.

Caution:

If the E5-IPSM is the last E5-IPSM in service, removing this card from the database will disable the IP User Interface (Telnet) feature.

All terminals associated with the E5-IPSM being removed must be out of service. The terminals are displayed using the rtrv-trm command. The state of the terminals is displayed using the rept-stat-trm command.

The examples in this procedure are used to remove the E5-IPSM in card location 2107.

Canceling the REPT-STAT-CARD Command

Because the rept-stat-card command used in this procedure can output information for a long period of time, the rept-stat-card command can be canceled and the output to the terminal stopped. There are three ways that the rept-stat-card command can be canceled.

  • Press the F9 function key on the keyboard at the terminal where the rept-stat-card command was entered.

  • Enter the canc-cmd without the trm parameter at the terminal where the rept-stat-card command was entered.

  • Enter the canc-cmd:trm=<xx>, where <xx> is the terminal where the rept-stat-card command was entered, from another terminal other that the terminal where the rept-stat-card command was entered. To enter the canc-cmd:trm=<xx> command, the terminal must allow Security Administration commands to be entered from it and the user must be allowed to enter Security Administration commands. The terminal’s permissions can be verified with the rtrv-secu-trm command. The user’s permissions can be verified with the rtrv-user or rtrv-secu-user commands.

For more information about the canc-cmd command, go to Commands User's Guide.

  1. Display the cards in the database using the rtrv-card command.

    This is an example of the possible output.

    
    rlghncxa03w 13-07-01 09:12:36 GMT EAGLE5 45.0.0
    CARD   TYPE      APPL      LSET NAME     LINK SLC LSET NAME     LINK SLC
    1101   DSM       VSCCP      
    1102   TSM       GLS          
    1113   E5MCAP    OAMHC
    1114   E5TDM-A
    1115   E5MCAP    OAMHC
    1116   E5TDM-B
    1117   E5MDAL
    1201   LIMDS0    SS7ANSI   sp2           A    0   sp1           B    0
    1202   LIMDS0    SS7ANSI   sp2           A    1   nsp3          B    0
    1203   LIMDS0    SS7ANSI   sp3           A    0   
    1204   LIMDS0    SS7ANSI   sp3           A    1   
    1205   LIMDS0    SS7ANSI   itu1          A    0   
    1206   LIMDS0    SS7ANSI   nsp3          A    1   nsp4          B    0
    1212   DSM       VSCCP      
    1214   TSM       GLS        
    1301   LIMATM    ATMANSI   lsnatm1       A    0   
    1303   STC       EROUTE       
    1308   LIMDS0    SS7ANSI   sp6           A    0   sp7           B    0
    1311   LIMDS0    SS7ANSI   sp2           A    2   sp1           B    1
                               sp7           A1   1   sp3           B1   2
    1315   LIMDS0    SS7ANSI   sp7           A    2   sp5           B    0
    1318   LIMATM    ATMANSI   lsnatm1       A    1   
    2101   STC       EROUTE    
    2103   STC       EROUTE    
    2105   STC       EROUTE    
    2107   IPSM      IPS       
    2108   IPSM      IPS       
    2111   IPSM      IPS       
    

    An E5-IPSM is identified by the entries E5-IPSM in the TYPE field and IPS in the APPL field.

  2. Display the status of the E5-IPSM being removed from the database with the rept-stat-card command and specifying the card location of the E5-IPSM.

    For this example, enter this command.

    rept-stat-card:loc=2107

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:43:42 GMT  EAGLE5 36.0.0
    CARD   VERSION      TYPE      GPL        PST            SST        AST
    2107   114-001-000  IPSM      IPS        IS-NR          Active     -----
    
      ALARM STATUS       = No Alarms.
      BPDCM GPL          = 002-122-000
      IMT BUS A          = Conn
      IMT BUS B          = Conn
    Command Completed.
    

    If the IPSM is out of service, shown by the entry OOS-MT-DSBLD in the PST column, skip steps 3 through 5, and go to step 6.

  3. Display the terminals using the rtrv-trm command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:08 GMT EAGLE5 39.0.0
    TRM  TYPE     COMM        FC    TMOUT MXINV DURAL
    1    VT320    9600-7-E-1  SW    30    5     99:59:59
    2    KSR      9600-7-E-1  HW    30    5     INDEF
    3    PRINTER  4800-7-E-1  HW    30    0     00:00:00
    4    VT320    2400-7-E-1  BOTH  30    5     00:30:00
    5    VT320    9600-7-O-1  NONE  30    5     00:00:30
    6    VT320    9600-7-E-2  SW    30    9     INDEF
    7    PRINTER  9600-7-N-2  HW    30    5     00:30:00
    8    KSR     19200-7-E-2  BOTH  30    5     00:30:00
    9    VT320    9600-7-E-1  SW    30    7     00:30:00
    10   VT320    9600-7-E-1  HW    30    5     00:30:00
    11   VT320    4800-7-E-1  HW    30    5     00:30:00
    12   PRINTER  9600-7-E-1  HW    30    4     00:30:00
    13   VT320    9600-7-O-1  NONE  30    5     00:30:00
    14   VT320    9600-7-E-2  SW    30    8     00:30:00
    15   VT320    9600-7-N-2  HW    30    5     00:30:00
    16   VT320    9600-7-E-2  BOTH  30    3     00:30:00
    
    TRM  TYPE      LOC              TMOUT MXINV DURAL      SECURE
    17   TELNET    2107             60    5     00:30:00   yes
    18   SEAS      2107             60    5     00:30:00   yes
    19   TELNET    2107             60    5     00:30:00   yes
    20   TELNET    2107             60    5     00:30:00   yes
    21   TELNET    2107             60    5     00:30:00   yes
    22   TELNET    2107             60    5     00:30:00   yes
    23   TELNET    2107             60    5     00:30:00   yes
    24   TELNET    2107             60    5     00:30:00   yes
    25   TELNET    2108             60    5     00:30:00   yes
    26   TELNET    2108             60    5     00:30:00   yes
    27   SEAS      2108             60    5     00:30:00   yes
    28   TELNET    2108             60    5     00:30:00   yes
    29   TELNET    2108             60    5     00:30:00   yes
    30   TELNET    2108             60    5     00:30:00   yes
    31   TELNET    2108             60    5     00:30:00   yes
    32   TELNET    2108             60    5     00:30:00   yes
    33   TELNET    2111             60    5     00:30:00   yes
    34   TELNET    2111             60    5     00:30:00   yes
    35   TELNET    2111             60    5     00:30:00   yes
    36   TELNET    2111             60    5     00:30:00   yes
    37   TELNET    2111             60    5     00:30:00   yes
    38   TELNET    2111             60    5     00:30:00   yes
    39   TELNET    2111             60    5     00:30:00   yes
    40   TELNET    2111             60    5     00:30:00   yes
    
    TRM  LOGINTMR LOGOUTTMR PNGTIMEINT PNGFAILCNT
         (sec)    (sec)     (msec)
    17   none     none      none       1
    19   none     none      none       1
    20   none     none      none       1
    21   none     none      none       1
    22   none     none      none       1
    23   none     none      none       1
    24   none     none      none       1
    25   none     none      none       1
    26   none     none      none       1
    28   none     none      none       1
    29   none     none      none       1
    30   none     none      none       1
    31   none     none      none       1
    32   none     none      none       1
    33   none     none      none       1
    34   none     none      none       1
    35   none     none      none       1
    36   none     none      none       1
    37   none     none      none       1
    38   none     none      none       1
    39   none     none      none       1
    40   none     none      none       1 
    
    TRM  TRAF LINK SA  SYS PU  DB  UIMRD
    1    NO   YES  NO  YES NO  YES YES
    2    NO   NO   NO  NO  NO  NO  NO
    .
    .
    .
    39   NO   NO   NO  NO  NO  NO  NO
    40   NO   NO   NO  NO  NO  NO  NO
    
         APP  APP
    TRM  SERV SS  CARD CLK DBG GTT GWS MEAS MON MPS SEAS 
    1    YES  YES YES  YES YES YES YES YES  YES YES NO   
    2    YES  YES YES  YES YES YES YES YES  YES YES NO   
    .
    .
    .
    39   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    40   NO   NO  NO   NO  NO  NO  NO  NO   NO  NO  NO   
    
  4. Display the status of the terminals by entering the rept-stat-trm command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    TRM   PST           SST           AST
    1     IS-NR         Active        -----
    2     IS-NR         Active        -----
    3     IS-NR         Active        -----
    4     IS-NR         Active        -----
    5     IS-NR         Active        -----
    6     IS-NR         Active        -----
    7     IS-NR         Active        -----
    8     IS-NR         Active        -----
    9     IS-NR         Active        -----
    10    IS-NR         Active        -----
    11    IS-NR         Active        -----
    12    IS-NR         Active        -----
    13    IS-NR         Active        -----
    14    IS-NR         Active        -----
    15    IS-NR         Active        -----
    16    IS-NR         Active        -----
    17    IS-NR         Active        -----
    18    IS-NR         Active        -----
    19    IS-NR         Active        -----
    20    IS-NR         Active        -----
    21    IS-NR         Active        -----
    22    IS-NR         Active        -----
    23    IS-NR         Active        -----
    24    IS-NR         Active        -----
    25    IS-NR         Active        -----
    26    IS-NR         Active        -----
    27    IS-NR         Active        -----
    28    IS-NR         Active        -----
    29    IS-NR         Active        -----
    30    IS-NR         Active        -----
    31    IS-NR         Active        -----
    32    IS-NR         Active        -----
    33    IS-NR         Active        -----
    34    IS-NR         Active        -----
    35    IS-NR         Active        -----
    36    IS-NR         Active        -----
    37    IS-NR         Active        -----
    38    IS-NR         Active        -----
    39    IS-NR         Active        -----
    40    IS-NR         Active        -----
    
    Command Completed.
    

    Note:

    If all the terminals associated with the E5-IPSM being removed from the database are out of service, shown by the entry OOS-MT-DSBLD in the PST column, skip step 5, and go to step 6.
  5. Place the terminals associated with the E5-IPSM being removed out of service using the rmv-trm command.

    For this example, enter these commands.

    rmv-trm:trm=17

    rmv-trm:trm=18

    rmv-trm:trm=19

    rmv-trm:trm=20

    rmv-trm:trm=21

    rmv-trm:trm=22

    rmv-trm:trm=23

    rmv-trm:trm=24

    Note:

    If the E5-IPSM that will be removed in this procedure contains the last in-service SEAS terminal, the force=yes parameter must be specified with the rmv-trm command for that SEAS terminal.

    Caution:

    Placing these terminals out of service will disable any Telnet sessions running on these terminals.

    If the status of any terminals associated with the E5-IPSM being removed shown in the PST field in step 4 is OOS-MT-DSBLD (out-of-service maintenance disabled), the terminal is already out of service and the rmv-trm command does not need to be executed for that terminal.

    When these commands have successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    Inhibit message sent to terminal
    
    rlghncxa03w 06-10-01 15:08:45 GMT EAGLE5 36.0.0
    Command Completed.
    
  6. Place the E5-IPSM out of service using the rmv-card command, specifying the card location of the E5-IPSM.

    For this example, enter this command.

    rmv-card:loc=2107

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    Card has been inhibited.
    
  7. Remove the card using the dlt-card command.

    The dlt-card command has only one parameter, loc, which is the location of the card. For this example, enter these commands.

    dlt-card:loc=2107

    Note:

    If the E5-IPSM that was removed in this step contains a SEAS terminal, the entry for that SEAS terminal is removed from the SEAS over IP configuration and is not shown in the rtrv-seas-config output. This message is displayed after the dlt-card command has been entered.
    Invalidating the Terminal data in SEASCFG Table

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    DLT-CARD: MASP A - COMPLTD
    
  8. Verify the changes using the rtrv-card command specifying the card that was removed in step 7.

    For this example, enter these commands.

    rtrv-card:loc=2107

    When this command has successfully completed, this message should appear.

    
    E2144 Cmd Rej: Location invalid for hardware configuration
    
  9. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-27 Removing an IPSM



Sheet 1 of 2



Sheet 2 of 2

4.30 Configuring the Options for the Network Security Enhancements Feature

This procedure is used to configure the EAGLE to enhance its network security by discarding messages that should not be received. Four options are set using the chg-stpopts command to support this feature.

  • SECMTPSID – The EAGLE should not receive a message where the OPC is equal to the EAGLE's own true, secondary or capability point codes.

  • SECMTPMATE – The EAGLE should not receive a message with the true, secondary, or capability point code of the mate STP other than across the C link.

  • SECMTPSNM – the EAGLE should not receive an MTP network management message unless:

    • The OPC is an adjacent point code

    • The EAGLE has a route to the OPC of the MTP network management message on the linkset which the message was received.

    • The EAGLE has a route to the destination field in the message (if applicable to the concerned message) on the linkset which the message was received.

  • SECMTPSCMG – the EAGLE should not receive an SCCP network management message unless:

    • The EAGLE has a route to the OPC of the SCMG message on the linkset, on which the message was received.

    • The EAGLE has a route to the affected point code in the message on the linkset on which the message was received.

    This option will only apply to SSP and SOR messages. This feature will not affect the following messages: SSA, SST, SOG, SBR, SNR and SRT.

Each of these options have four values which determine how the EAGLE handles the messages controlled by the options.

  • NOTIFY – The specified option is active and UIMs are generated.

  • SILENT – The specified option is active, but no UIMs are generated.

  • TEST – The specified option is not active, but UIMS are generated as if the option was active.

  • OFF – The specified option is not active.

The system default value for each of these options is OFF.

To set these options, the Network Security Enhancements feature must be enabled and activated. This can be verified with the rtrv-ctrl-feat command. To enable and activate the Network Security Enhancements feature, go to the Activating Controlled Features procedure.

If the Network Security Enhancements feature is not enabled and activated, the Network Security Enhancement options are not displayed in the rtrv-stpopts output.

When the Network Security Enhancements feature is enabled and activated for the first time, each option is displayed in the rtrv-stpopts output with the system default value (OFF). When the Network Security Enhancements feature is enabled and activated after the feature was disabled, each option is displayed in the rtrv-stpopts output with the value that the option was assigned when the feature was disabled.

  1. Display the Network Security Enhancements options using the rtrv-stpopts command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    STP OPTIONS
    -----------------------
    SECMTPSID         notify
    SECMTPMATE        test
    SECMTPSNM         silent
    SECMTPSCMG        off
    

    Note:

    The rtrv-stpopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-stpopts command, see the rtrv-stpopts command description in Commands User's Guide.

    Note:

    If the Network Security Enhancement options are shown in the rtrv-stpopts output in step 1, skip step 2, and go to step 3.
  2. Verify that the Network Security Enhancements feature is enabled and activated, by entering the rtrv-ctrl-feat command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 21:15:37 GMT EAGLE5 36.0.0
    The following features have been permanently enabled:
    Feature Name              Partnum    Status  Quantity
    Network Security Enhance  893009101  off     ----
    

    Note:

    The rtrv-ctrl-feat command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-ctrl-feat command, see the rtrv-ctrl-feat command description in Commands User's Guide.

    If the Network Security Enhancements feature is not enabled or activated, go to the Activating Controlled Features procedure and enable and activate the Network Security Enhancements feature.

    Caution:

    If the Network Security Enhancements feature is temporarily enabled, the Network Security Enhancement options can be set and used only for the amount of time shown in the Trial Period Left column in the rtrv-ctrl-feat output.
  3. Change the Network Security Enhancement options.

    For this example, enter this command.

    chg-stpopts:secmtpsid=silent:secmtpmate=notify :secmtpsnm=notify:secmtpscmg=notify

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 00:22:57 GMT  EAGLE5 36.0.0
    CHG-STPOPTS: MASP A - COMPLTD
    
  4. Verify the changes using the rtrv-stpopts command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    STP OPTIONS
    -----------------------
    SECMTPSID          silent
    SECMTPMATE         notify
    SECMTPSNM          notify
    SECMTPSCMG         notify
    

    Note:

    The rtrv-stpopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-stpopts command, see the rtrv-stpopts command description in Commands User's Guide.
  5. Back up the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-28 Configuring the Options for the Network Security Enhancements Feature



4.31 Configuring the Restore Device State Option

This procedure is used to configure the restore device state option using the chg-stpopts command with the rstrdev value for the on or off parameters of the chg-stpopts command. The system default value is off.

If the value of the restore device state option is off ( off=rstrdev ), the EAGLE does not retain the manually initiated state (for example, OOS-MT-DSBLD) for the signaling links, TCP/IP data links, cards, or the terminals after either the init-sys command is executed, or when a MASP role change occurs (the active MASP becomes the standby MASP and the standby MASP becomes the active MASP). After the init-sys command executes, the EAGLE attempts to bring all provisioned links, cards, and terminals on line, including those that were previously out of service. You will need to manually put each device back into its previous state after the EAGLE is back on line. If the init-sys command is being executed, it is advisable to print or electronically capture the output of the EAGLE’s rept-stat-slk, rept-stat-dlk, rept-stat-card, and rept-stat-trm commands for reference before issuing the init-sys command. During a MASP role change, current processing for the role change occurs and the state of the out-of-service devices may change. To restore a device to its previous state, issue the appropriate inhibit/deactivate command listed in Commands User's Guide in the Related Commands section for each of the above rept-stat commands.

If the value of the restore device state option is on ( on=rstrdev ), the state the signaling links, TCP/IP data links, cards, and terminals is not changed after the init-sys command is executed or a MASP role change occurs. No manual intervention is required to put the device back into its previous state after the EAGLE is back on line.

If the restore device state option is on and the database is being restored with the chg-db:action=restore command, the state of the cards, SS7 signaling links, TCP/IP data links, and terminals before the chg-db:action=restore and init-sys commands are performed will not be maintained after these commands are performed. The persistent device state table becomes obsolete and is disabled. UIM 1257 is generated.


rlghncxa03w 06-10-01 16:07:48 GMT  EAGLE5 36.0.0
1234.1257    SYSTEM       INFO  DB Restore has cleared and disabled PDS 
  1. Display the existing values for the restore device state parameter by entering the rtrv-stpopts command.

    The value for the restore device state parameter is shown in the RSTRDEV field. This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    STP OPTIONS
    -----------------------
    RSTRDEV            off
    

    Note:

    The rtrv-stpopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-stpopts command, see the rtrv-stpopts command description in Commands User's Guide.
  2. Change the restore device state parameter.

    To change the rstrdev parameter to on, enter this command.

    chg-stpopts:on=rstrdev

    To change the rstrdev parameter to off, enter this command.

    chg-stpopts:off=rstrdev

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 00:22:57 GMT  EAGLE5 36.0.0
    CHG-STPOPTS: MASP A - COMPLTD
    
  3. Verify the changes using the rtrv-stpopts command.

    If the on=rstrdev parameter was specified in 2, this is an example of the possible output.

    
    rlghncxa03w 10-07-17 16:02:05 GMT  EAGLE5 42.0.0
    STP OPTIONS
    -----------------------
    RSTRDEV             on
    

    If the off=rstrdev parameter was specified in 2, this is an example of the possible output.

    
    rlghncxa03w 10-07-17 16:02:05 GMT  EAGLE5 42.0.0
    STP OPTIONS
    -----------------------
    RSTRDEV            off
    

    Note:

    The rtrv-stpopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-stpopts command, see the rtrv-stpopts command description in Commands User's Guide.
  4. Backup the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-29 Configuring the Restore Device State Option



4.32 Adding an Entry to the Frame Power Alarm Threshold Table

This procedure is used to add an entry to the frame power alarm threshold table. The frame power alarm threshold table defines the power level threshold, in amps, for each frame in the EAGLE. The power level threshold determines when alarms regarding the amount of power used by the frame are generated. Three alarms can be generated for the power levels.

  • UAM 0522 - a minor alarm indicating that the power level for the frame has reached 90% of the threshold value.
  • UAM 0521 - a major alarm indicating that the power level for the frame has reached 95% of the threshold value.
  • UAM 0520 - a critical alarm indicating that the power level for the frame has reached 98% of the threshold value.

More information on these alarms is shown in Unsolicited Alarm and Information Messages Reference.

The power alarm threshold table for each frame is configured using the ent-frm-pwr command with these parameters:

:frm – The name of the frame being added to the power alarm threshold table, cf00, ef00, ef01, ef02, ef03, or ef04.

:thrshld – The power threshold value, from 30 to 65 amps.

The frame being added in this procedure must be configured in the database. This can be verified by displaying the shelves in the EAGLE with the rtrv-shlf command. The number assigned to each configured frame is shown in the SHELF FRAME column of the rtrv-shlf output. Table 4-6 shows the name of each frame used in the Frame Power Alarm Threshold table and the corresponding frame number shown in the SHELF FRAME column of the rtrv-shlf output.

Table 4-6 Frame Power Alarm Threshold Table Frame Designations

Name of the Frame in the Frame Power Alarm Threshold Table Frame Numbers shown in the Shelf Frame Column of the RTRV-SHLF Output

CF00

1

EF00

2

EF01

3

EF02

4

EF03

5

EF04

6

The thrshld parameter is optional. If the thrshld parameter value is not specified, the thrshld value is set to 30.

  1. Display the frame power alarm thresholds by entering the rtrv-frm-pwr command.

    This is an example of the possible output

    .
    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    
    Frame              Power Threshold (Amps)
    -----              ----------------------
    cf00                                   56
    ef00                                   36
    
    FRAME POWER THRESHOLD table is (2 of 10) 20% full;
    RTRV-FRM-PWR: MASP A - COMPLTD
    
  2. Display the shelves configured in the database by entering the rtrv-shlf command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    SHELF DISPLAY
    FRAME SHELF        TYPE
      1     1       CONTROL
      1     2       EXTENSION
      1     3       EXTENSION
      2     1       EXTENSION
      2     2       EXTENSION
      2     3       EXTENSION
      3     1       EXTENSION
    

    To add an entry to the Frame Power Alarm Threshold table, the frame must be shown in the rtrv-shlf output. Table 4-6 shows the name of the frames used in the Frame Power Alarm Threshold table and the corresponding frame numbers shown in the SHELF FRAME column of the rtrv-shlf output.

    If the frame you wish to add to the Frame Power Alarm Threshold table is shown in the rtrv-shlf output, go to step 3.

    If all the frames shown in the rtrv-shlf output are shown in the rtrv-frm-pwr output, the only actions that can be taken is to either remove an entry from the Frame Power Alarm Threshold table, or to change an entry in the Frame Power Alarm Threshold table. To remove an entry from the Frame Power Alarm Threshold table, perform the Removing an Entry from the Frame Power Alarm Threshold Table procedure. To change an entry in the Frame Power Alarm Threshold table, perform the Changing an Entry in the Frame Power Alarm Threshold Table procedure. If you do not wish to perform either of these actions, this procedure is finished.

  3. Display the power consumption of the frame that will be added to the Frame Power Alarm Threshold table by entering the rtrv-stp command with these parameters:

    display=power

    frm =<frame to be added>

    For this example, enter this command.

    rtrv-stp:display=power:frm=ef01

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
     
                  Power Threshold          Power Consumption
    Frame         (Amps)    (Watts)         (Amps)    (Watts)
    -----         -----------------         -----------------
    EF01            +30       +1440          14.06        675
    
                                                     Power Consumption
    Card       Part Number       Revision        (MilliAmps)        (Watts)
    ----       -----------       --------       -----------------------------
    3101       870-1293-13          D               313               15
    3102       870-1293-13          D               313               15
    3103       870-2671-03          M              1563               75
    3104       870-1293-13          D               313               15 
    3105       870-2061-01          K               542               26
    3106       870-1984-13          M               646               31
    3107       870-1984-13          M               646               31
    3108       870-2372-14          J               521               25
    3109       MUX                                  313               15
    3110       MUX                                  313               15
    3111       870-2061-01          A               542               26
    3112       870-2061-01          A               542               26
    3113       850-0549-01          A            +  313           +   15
    3114    +  870-2198-07          M            + 1563           +   75
    3115       850-0549-01          A               313               15
    3116    +  870-2198-07          M              1563               75
    3117       870-1293-13          B               521               25
    
    FAN ASSYs Power Consumption                    2604              125
    Command Completed.
    
  4. Add the entry to the Frame Power Alarm Threshold table by entering the ent-frm-pwr command with these parameters.

    frm =<frame to be added>

    thrshld=<frame power threshold level>

    A minor alarm (UAM 0522) is generated when the power level for the frame reaches 90% of the threshold value. A major alarm (UAM 0521) is generated when the power level for the frame reaches 95% of the threshold value. A critical alarm (UAM 0520) is generated when the power level for the frame reaches 98% of the threshold value.

    The thrshld parameter is optional. If the thrshld parameter value is not specified, the thrshld value is set to 30.

    For this example, enter this command.

    ent-frm-pwr:frm=ef01:thrshld=35

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 00:22:57 GMT  EAGLE5 36.0.0
    FRAME POWER THRESHOLD table is (3 of 10) 30% full
    ENT-FRM-PWR: MASP A - COMPLTD
    
  5. Verify the changes by entering the rtrv-frm-pwr command with frame entry specified in step 4.

    For this example, enter this command.

    rtrv-frm-pwr:frm=ef01

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    
    Frame              Power Threshold (Amps)
    -----              ----------------------
    ef01                                   35
    
    FRAME POWER THRESHOLD table is (3 of 10) 30% full;
    RTRV-FRM-PWR: MASP A - COMPLTD
    
  6. Backup the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-30 Adding an Entry to the Frame Power Alarm Threshold Table



Sheet 1 of 2



Sheet 2 of 2

4.33 Removing an Entry from the Frame Power Alarm Threshold Table

This procedure is used to remove an existing entry from the frame power alarm threshold table. The entry in the power alarm threshold table is removed using the dlt-frm-pwr command with this parameter:

:frm – The name of the frame being removed from the power alarm threshold table, cf00, ef00, ef01, ef02, ef03, or ef04.

The frame being removed from the frame power alarm threshold table must be configured in the frame power alarm threshold table.

When a frame entry is removed, a default threshold setting of 30 amps is assigned to the frame. If the amount of power currently used by the frame is 27 amps or more, an alarm will be generated when this frame entry is removed. The alarm that will be generated will depend of the amount of power the frame is using.

  • A minor alarm (UAM 0522) is generated when the power level for the frame reaches 90% of the threshold value.
  • A major alarm (UAM 0521) is generated when the power level for the frame reaches 95% of the threshold value.
  • A critical alarm (UAM 0520) is generated when the power level for the frame reaches 98% of the threshold value.

More information on these alarms is shown in Unsolicited Alarm and Information Messages Reference.

For example, if the frame is using 27 amps, and the frame is removed resulting in the default 30 amp threshold, minor alarm 0522 is generated because 27 amps is the threshold at which minor alarm 0522 is generated (90% of 30 amps is 27 amps).

If the frame is using 30 amps or more, and the frame is removed resulting in the default 30 amp threshold, critical alarm 0520 is generated because that amount of power used by the frame is 100% or more of the threshold value, and a critical alarm is generated at 98% of the threshold value.

The power being used by the frame is displayed in the Power Consumption (Amps) column in the rtrv-stp output.

  1. Display the frame power alarm thresholds by entering the rtrv-frm-pwr command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    
    Frame              Power Threshold (Amps)
    -----              ----------------------
    cf00                                   56
    ef00                                   36
    ef01                                   35
    
    FRAME POWER THRESHOLD table is (3 of 10) 30% full;
    RTRV-FRM-PWR: MASP A - COMPLTD
    
  2. Display the power consumption of the frame that will be removed from the Frame Power Alarm Threshold table by entering the rtrv-stp command with these parameters:

    display=power

    frm =<frame to be removed from step 1>

    For this example, enter this command.

    rtrv-stp:display=power:frm=ef01

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    
                   Power Threshold          Power Consumption
    Frame         (Amps)    (Watts)         (Amps)    (Watts)
    -----         -----------------         -----------------
    EF01             35        1440          14.06        675
    
                                                     Power Consumption
    Card       Part Number       Revision        (MilliAmps)        (Watts)
    ----       -----------       --------       -----------------------------
    3101       870-1293-13          D               313               15
    3102       870-1293-13          D               313               15
    3103       870-2671-03          M              1563               75
    3104       870-1293-13          D               313               15 
    3105       870-2061-01          K               542               26
    3106       870-1984-13          M               646               31
    3107       870-1984-13          M               646               31
    3108       870-2372-14          J               521               25
    3109       MUX                                  313               15
    3110       MUX                                  313               15
    3111       870-2061-01          A               542               26
    3112       870-2061-01          A               542               26
    3113       850-0549-01          A            +  313           +   15
    3114    +  870-2198-07          M            + 1563           +   75
    3115       850-0549-01          A               313               15
    3116    +  870-2198-07          M              1563               75
    3117       870-1293-13          B               521               25
    
    FAN ASSYs Power Consumption                    2604              125
    Command Completed.
    

    When a frame entry is removed, a default threshold setting of 30 amps is assigned to the frame. If the amount of power currently used by the frame is 27 amps or more, shown in the Power Consumption (Amps) column in the rtrv-stp output, an alarm will be generated when this frame entry is removed. The alarm that will be generated will depend of the amount of power the frame is using. See the introduction to this procedure for the alarm information.

    If you still wish to remove this frame entry even if an alarm will be generated, go to step 3. If you do not wish to remove this frame entry, repeat this step with another frame entry from step 1.

    If you do not wish to repeat this step with another frame entry from step 1, this procedure is finished.

  3. Remove the frame entry from the Frame Power Alarm Threshold table by entering the dlt-frm-pwr command with this parameter.

    frm =<frame to be removed>

    For this example, enter this command.

    dlt-frm-pwr:frm=ef01

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 00:22:57 GMT  EAGLE5 36.0.0
    FRAME POWER THRESHOLD table is (2 of 10) 20% full
    DLT-FRM-PWR: MASP A - COMPLTD
    
  4. Verify the changes by entering the rtrv-frm-pwr command with frame entry specified in step 3.

    For this example, enter this command.

    rtrv-frm-pwr:frm=ef01

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    
    Frame              Power Threshold (Amps)
    -----              ----------------------
    ef01                                   35
    
    FRAME POWER THRESHOLD table is (2 of 10) 20% full;
    RTRV-FRM-PWR: MASP A - COMPLTD
    
  5. Backup the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-31 Removing an Entry from the Frame Power Alarm Threshold Table



Sheet 1 of 2



Sheet 2 of 2

4.34 Changing an Entry in the Frame Power Alarm Threshold Table

This procedure is used to change an existing entry in the frame power alarm threshold table. The frame entry in the power alarm threshold table is changed using the chg-frm-pwr command with these parameters:

:frm – The name of the frame being added to the power alarm threshold table, cf00, ef00, ef01, ef02, ef03, or ef04.

:thrshld – The power threshold value, from 30 to 65 amps.

The frame power alarm threshold table defines the power level threshold, in amps, for each frame in the EAGLE. The power level threshold determines when alarms regarding the amount power used by the frame are generated. Three alarms can be generated for the power levels.

  • UAM 0522 - a minor alarm indicating that the power level for the frame has reached 90% of the threshold value.
  • UAM 0521 - a major alarm indicating that the power level for the frame has reached 95% of the threshold value.
  • UAM 0520 - a critical alarm indicating that the power level for the frame has reached 98% of the threshold value.

More information on these alarms is shown in Unsolicited Alarm and Information Messages Reference.

When setting the threshold value (the thrshld parameter value), the threshold value should be greater than the amount of power being used by the frame. The power being used by the frame is displayed in the Power Consumption (Amps) column in the rtrv-stp output. The threshold value should also be high enough to avoid generating any alarms.

Table 4-7 shows selected threshold values and the power levels for a frame that would generate a minor alarm for that threshold value.

Table 4-7 Power Level to Generate a Minor Alarm

Threshold Value Power Level to Generate a Minor Alarm

30

27

35

31.5

40

36

45

40.5

50

45

55

49.5

60

54

65

58.5

  1. Display the frame power alarm thresholds by entering the rtrv-frm-pwr command.

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    
    Frame              Power Threshold (Amps)
    -----              ----------------------
    cf00                                   56
    ef00                                   36
    ef01                                   35
    
    FRAME POWER THRESHOLD table is (3 of 10) 30% full;
    RTRV-FRM-PWR: MASP A - COMPLTD
    
  2. Display the power consumption of the frame that will be changed in the Frame Power Alarm Threshold table by entering the rtrv-stp command with these parameters:

    display=power

    frm =<frame being changed>

    For this example, enter this command.

    rtrv-stp:display=power:frm=ef01

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 16:02:05 GMT  EAGLE5 36.0.0
    
                   Power Threshold          Power Consumption
    Frame         (Amps)    (Watts)         (Amps)    (Watts)
    -----         -----------------         -----------------
    EF01             30        1440          14.06        675
    
                                                     Power Consumption
    Card       Part Number       Revision        (MilliAmps)        (Watts)
    ----       -----------       --------       -----------------------------
    3101       870-1293-13          D               313               15
    3102       870-1293-13          D               313               15
    3103       870-2671-03          M              1563               75
    3104       870-1293-13          D               313               15 
    3105       870-2061-01          K               542               26
    3106       870-1984-13          M               646               31
    3107       870-1984-13          M               646               31
    3108       870-2372-14          J               521               25
    3109       MUX                                  313               15
    3110       MUX                                  313               15
    3111       870-2061-01          A               542               26
    3112       870-2061-01          A               542               26
    3113       850-0549-01          A            +  313           +   15
    3114    +  870-2198-07          M            + 1563           +   75
    3115       850-0549-01          A               313               15
    3116    +  870-2198-07          M              1563               75
    3117       870-1293-13          B               521               25
    
    FAN ASSYs Power Consumption                    2604              125
    Command Completed.
    
  3. Changed the entry in the Frame Power Alarm Threshold table by entering the chg-frm-pwr command with these parameters.

    frm =<frame being changed>

    thrshld=<frame power threshold level>

    A minor alarm (UAM 0522) is generated when the power level for the frame reaches 90% of the threshold value. A major alarm (UAM 0521) is generated when the power level for the frame reaches 95% of the threshold value. A critical alarm (UAM 0520) is generated when the power level for the frame reaches 98% of the threshold value. When setting the threshold value, the threshold value should be greater that the Power Consumption (Amps) value shown in the rtrv-stp output in step 2, and high enough to avoid generating any alarms. See Table 4-7 for some examples of threshold values and the power levels for a frame to generate a minor alarm for these threshold values.

    For this example, enter this command.

    ent-frm-pwr:frm=ef01:thrshld=45

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 06-10-01 00:22:57 GMT  EAGLE5 36.0.0
    FRAME POWER THRESHOLD table is (3 of 10) 30% full
    ENT-FRM-PWR: MASP A - COMPLTD
    
  4. Verify the changes by entering the rtrv-frm-pwr command with frame entry specified in step 3.

    For this example, enter this command.

    rtrv-frm-pwr:frm=ef01

    This is an example of the possible output.

    
    rlghncxa03w 06-10-01 09:12:36 GMT  EAGLE5 36.0.0
    
    Frame              Power Threshold (Amps)
    -----              ----------------------
    ef01                                   45
    
    FRAME POWER THRESHOLD table is (3 of 10) 30% full;
    RTRV-FRM-PWR: MASP A - COMPLTD
    
  5. Backup the new changes using the chg-db:action=backup:dest=fixedcommand.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-32 Changing an Entry in the Frame Power Alarm Threshold Table



4.35 Configuring the IMT Bus Alarm Thresholds

This procedure is used to change the IMT bus alarm thresholds using the chg-th-alm command and these parameters.

:imtbusutllvl1 – The percentage for the IMT bus combined utilization level 1 threshold alarm (reported on the IMT system). The percentage for the IMT bus combined utilization level 1 threshold alarm, from 35 to 70 and is shown in the IMT Bus Combined Utilization Alarm Level 1 field of the rtrv-th-alm output. The system default value is 70. When this threshold is exceeded, UAM 0027 is generated.

:imtbusutllvl2 – The percentage for the IMT bus combined utilization level 2 threshold alarm (reported on the IMT system). The percentage for the IMT bus combined utilization level 2 threshold alarm, from 40 to 80 and is shown in the IMT Bus Combined Utilization Alarm Level 2 field of the rtrv-th-alm output. The system default value is 80. When this threshold is exceeded, UAM 0028 is generated.

After the chg-th-alm command is performed, the imtbusutllvl2 parameter value must be greater than the imtbusutllvl1 parameter value.

:imtcongestlvl1 – The percentage for the IMT bus congestion level 1 threshold alarm (reported on the HIPR2 card). The percentage for the IMT bus congestion level 1 threshold alarm, from 35 to 70 and is shown in the IMT Bus Congestion Alarm Level 1 field of the rtrv-th-alm output. The system default value is 70. When this threshold is exceeded, UAM 0030 is generated.

:imtcongestlvl2 – The percentage for the IMT bus congestion level 2 threshold alarm (reported on the HIPR2 card). The percentage for the IMT bus congestion level 2 threshold alarm, from 40 to 80 and is shown in the IMT Bus Congestion Alarm Level 2 field of the rtrv-th-alm output. The system default value is 80. When this threshold is exceeded, UAM 0031 is generated.

After the chg-th-alm command is performed, the imtcongestlvl2 parameter value must be greater than the imtcongestlvl1 parameter value.

For more information on these alarms, refer to Unsolicited Alarm and Information Messages Reference.

The chg-th-alm command contains other optional parameters. These parameters are not shown here because they are not necessary to configure the IMT bus alarm thresholds. These parameters are explained in more detail in Commands User's Guide.

  1. Display the current IMT bus alarm thresholds in the database by entering thertrv-th-alm command. This is an example of the possible output.
    
    rlghncxa03w 09-07-28 09:12:36 GMT EAGLE5 41.1.0
    IMT Bus Combined Utilization Alarm Level 1: 70%
    IMT Bus Combined Utilization Alarm Level 2: 80%
    IMT Bus Congestion Alarm Level 1:           70%
    IMT Bus Congestion Alarm Level 2:           80%
    RTRV-TH-ALM: MASP A - COMPLTD.
    

    Note:

    The rtrv-th-alm command output contains other fields that are not used in this procedure. If you wish to see all the fields displayed by the rtrv-th-alm command, refer to the rtrv-th-alm command description in Commands User's Guide.
  2. Configure the IMT bus alarm thresholds by entering the chg-th-alm command with at least one of the IMT bus alarm threshold parameters.
    If an IMT bus alarm threshold parameter is not specified with the chg-th-alm command, that parameter value will not be changed. The system default values for the IMT bus alarm threshold parameters are:
    • imtbusutllvl1 – 70
    • imtbusutllvl2 – 80
    • imtcongestlvl1 – 70
    • imtcongestlvl2 – 80.

    After the chg-th-alm command is performed, the imtbusutllvl2 parameter value must be greater than the imtbusutllvl1 parameter value, and the imtcongestlvl2 parameter value must be greater than the imtcongestlvl1 parameter value.

    For this example, enter this command.

    chg-th-alm:imtbusutllvl1=50:imtcongestlvl1=50:imtbusutllvl2=70:imtcongestlvl1=70

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 09-07-28 09:12:36 GMT EAGLE5 41.1.0
    CHG-TH-ALM: MASP A - COMPLTD
    
  3. Verify the changes using the rtrv-th-alm command. This is an example of the possible output.
    
    rlghncxa03w 09-07-28 09:12:36 GMT EAGLE5 41.1.0
    IMT Bus Combined Utilization Alarm Level 1: 50%
    IMT Bus Combined Utilization Alarm Level 2: 60%
    IMT Bus Congestion Alarm Level 1:           50%
    IMT Bus Congestion Alarm Level 2:           60%
    RTRV-TH-ALM: MASP A - COMPLTD.
    

    Note:

    The rtrv-th-alm command output contains other fields that are not used in this procedure. If you wish to see all the fields displayed by the rtrv-th-alm command, refer to the rtrv-th-alm command description in Commands User's Guide.
  4. Backup the new changes using the chg-db:action=backup:dest=fixed command.
    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.
    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-33 Configuring the IMT Bus Alarm Thresholds



4.36 Configuring the Integrated Measurements Feature

This procedure is used to configure IP communications links between the EAGLE and the customer’s network and enable the Integrated Measurements feature on the EAGLE using these commands.

  • ent-ip-host – Configuring the IP host of the E5-MCAP.
  • chg-ip-card – Configuring the IP address of the E5-MCAP.
  • chg-ip-lnk – Configuring the IP link assigned to the E5-MCAP.
  • chg-measopts – Enabling the measurement collection option for the E5-MCAP card option.
  • enable-ctrl-feat – Enabling the Integrated Measurements feature.
  • chg-ctrl-feat – Turning the Integrated Measurements feature on.

Some of these commands contain parameters that are not used in this procedure. Commands User's Guide contains a full description of these commands.

The Integrated Measurements feature requires measurements FTP servers. A maximum of three measurements FTP servers can be configured with one of these procedures.

This procedure can be performed only on EAGLEs that contain E5-based control cards. Refer to Maintenance and Administration Subsystem for more information about the control cards.

The Integrated Measurements feature is enabled using the enable-ctrl-feat command with these parameters.

:fak – The feature access key provided by Oracle.

:partnum – The Oracle-issued part number of the Integrated Measurements feature, 893037301.

Once this feature is enabled, it is permanently enabled. This feature cannot be enabled with a temporary feature access key.

The enable-ctrl-feat command requires that the database contain a valid serial number for the EAGLE, and that this serial number is locked. This can be verified with the rtrv-serial-num command. The EAGLE is shipped with a serial number in the database, but the serial number is not locked. The serial number can be changed, if necessary, and locked once the EAGLE is on-site, with the ent-serial-num command. The ent-serial-num command uses these parameters.

:serial – The serial number assigned to the EAGLE. The serial number is not case sensitive.

:lock – Specifies whether or not the serial number is locked. This parameter has only one value, yes, which locks the serial number. Once the serial number is locked, it cannot be changed.

Note:

To enter and lock the EAGLE serial number, the ent-serial-num command must be entered twice, once to add the correct serial number to the database with the serial parameter, then again with the serial and the lock=yes parameters to lock the serial number. Verify that the serial number in the database is correct before locking the serial number. The serial number can be found on a label affixed to the control shelf (shelf 1100).

Once the Integrated Measurements feature has been enabled, the Integrated Measurements feature must be turned on with the chg-ctrl-feat command. The chg-ctrl-feat command uses these parameters:

:partnum – The Oracle-issued part number of the Integrated Measurements feature, 893037301.

:status=on – used to turn the Integrated Measurements feature on.

Once the Integrated Measurements feature has been turned on, it be cannot be turned off.

The status of the Integrated Measurements feature is shown with the rtrv-ctrl-feat command.

If a Class B IP address is specified for the ipaddr parameter of the chg-ip-lnk command, the subnet address that results from the ipaddr and submask parameter values cannot be the same as the subnet address that results from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command. The pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values can be verified by entering the rtrv-netopts command. Choose ipaddr and submask parameter values for the IP address assigned to the E5-MCAP card whose resulting subnet address is not be the same as the subnet address that resulting from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command.

The Integrated Measurements feature supports the collection and reporting of all measurement entities for EAGLEs configured with a maximum of 2400 signaling links (or 1200 links if the 15-minute measurements feature is turned on) using the E5-MCAP cards instead of the MCPM. The enhanced reporting capabilities provided by the Integrated Measurements feature support the generation of text file measurements reports in the CSV format. The reports can be sent to a customer-provided FTP server on-demand or on a scheduled basis. EAGLEs with more than 2400/1200 signaling links require the Measurements Platform for full measurements support.

  1. Display the status of the controlled features by entering the rtrv-ctrl-feat command. The following is an example of the possible output.
    
    rlghncxa03w 10-04-28 21:15:37 GMT EAGLE5 42.0.0
    The following features have been permanently enabled:
    
    Feature Name              Partnum    Status  Quantity
    Command Class Management  893005801  on      ----
    LNP Short Message Service 893006601  on      ----
    Intermed GTT Load Sharing 893006901  on      ----
    XGTT Table Expansion      893006101  on      400000
    XMAP Table Expansion      893007710  off     ----
    Large System # Links      893005910  on      2000
    Routesets                 893006401  on      6000
    HC-MIM SLK Capacity       893012707  on      64
    
    The following features have been temporarily enabled:
    
    Feature Name              Partnum    Status  Quantity     Trial Period Left
    Zero entries found.
    
    The following features have expired temporary keys:
    
    Feature Name              Partnum
    Zero entries found.
    

    If the Integrated Measurements feature is enabled and turned on, continue the procedure with 21.

    If the Integrated Measurements feature is enabled but not turned on, continue the procedure with 19.

    If the Integrated Measurements feature is not enabled, continue the procedure with 2.

  2. Display the control cards in the EAGLE by entering this command.

    rtrv-stp:gpl=oamhc

    This is an example of the possible output.

    
    rlghncxa03w 10-04-01 16:07:48 GMT  EAGLE5 42.0.0
    
    Card  Part Number  Rev Serial Number  Type     DB     APPL     GPL Version
    ----  -----------  --- -------------  ----     --     ----     -----------
    1113  870-2903-01  C   10206255064    E5MCAP   4096M  OAMHC    132-018-000
    1115  870-2903-01  C   10206255165    E5MCAP   4096M  OAMHC    132-018-000
    
    Command Completed.
    

    To enable the Integrated Measurements feature, E5-MCAP cards must be installed in card locations 1113 and 1115. If E5-MCAP cards are not shown in either card location 1113 or 1115, install the E5-MCAP cards in card locations 1113 or 1115 as required. Contact the Customer Care Center before installing the E5-MCAP cards. Refer to the My Oracle Support (MOS) section for the contact information.

    After the E5-MCAP cards have been installed, or if E5-MCAP cards are shown in card locations 1113 and 1115 in the rtrv-stp output, continue the procedure by performing one of these steps.
    • If the rtrv-ctrl-feat output shows the HC-MIM SLK Capacity feature with a quantity of 64 and other features, continue the procedure with 7.
    • If the rtrv-ctrl-feat output shows only the HC-MIMSLK Capacity feature with a quantity of 64, continue the procedure with 3.
  3. Display the serial number in the database with the rtrv-serial-num command. This is an example of the possible output.
    
    rlghncxa03w 09-07-28 21:15:37 GMT EAGLE5 41.1.0
    System serial number = nt00001231
    
    System serial number is not locked.
    
    rlghncxa03w 09-07-28 21:15:37 GMT EAGLE5 41.1.0
    Command Completed
    

    Note:

    If the serial number is not correct and not locked, continue the procedure with 4If the serial number is correct and locked, continue the procedure with 7. If the serial number is correct but not locked, continue the procedure with 6. If the serial number is not correct, but is locked, this feature cannot be enabled and the remainder of this procedure cannot be performed. Contact the Customer Care Center to get an incorrect and locked serial number changed. Refer to My Oracle Support (MOS) for the contact information. The serial number can be found on a label affixed to the control shelf (shelf 1100).
  4. Enter the correct serial number into the database using the ent-serial-num command with the serial parameter.

    For this example, enter this command.

    ent-serial-num:serial=<EAGLE’s correct serial number>

    When this command has successfully completed, the following message should appear.

    
    rlghncxa03w 10-04-28 21:15:37 GMT EAGLE5 42.0.0
    ENT-SERIAL-NUM:  MASP A - COMPLTD
    
  5. Verify that the serial number entered into 4 was entered correctly using the rtrv-serial-num command. This is an example of the possible output.
    
    rlghncxa03w 10-04-28 21:15:37 GMT EAGLE5 42.0.0
    System serial number = nt00001231
    
    System serial number is not locked.
    
    rlghncxa03w 10-04-28 21:15:37 GMT EAGLE5 42.0.0
    Command Completed
    

    If the serial number was not entered correctly, repeat 4 and 5 and re-enter the correct serial number.

  6. Lock the serial number in the database by entering the ent-serial-num command with the serial number shown in 3, if the serial number shown in 3 is correct, or with the serial number shown in 5, if the serial number was changed in 4, and with the lock=yes parameter.

    For this example, enter this command.

    ent-serial-num:serial=<EAGLE’s serial number>:lock=yes

    When this command has successfully completed, the following message should appear.

    
    rlghncxa03w 10-04-28 21:15:37 GMT EAGLE5 42.0.0
    ENT-SERIAL-NUM:  MASP A - COMPLTD
    

    If the IP address for the E5-MCAP cards will be either a Class A or Class C IP address, continue the procedure with 8.

    If the IP address for either E5-MCAP card will be a Class B IP address, continue the procedure with 7.

  7. The subnet address that results from the ipaddr and submask parameter values of the chg-ip-lnk command cannot be the same as the subnet address that results from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command.

    Display the pvn, pvnmask, fcna, fcnamask, fcnb, and fcnbmask parameter values of the chg-netopts command by entering the rtrv-netoptscommand.

    If error message E3967 Cmd Rej: E5IS must be on is displayed after the rtrv-netopts command is executed, the pvn, pvnmask, fcna, fcnamask, fcnb, and fcnbmask parameters are not configured. Continue the procedure with 8.

    This is an example of the possible output if the E5IS feature is on.

    
    rlghncxa03w 10-04-28 21:17:37 GMT EAGLE5 42.0.0
    NETWORK OPTIONS
    ------------------
    PVN        = 128.20.30.40
    PVNMASK    = 255.255.192.0
    FCNA       = 170.120.50.0
    FCNAMASK   = 255.255.240.0
    FCNB       = 170.121.50.0
    FCNBMASK   = 255.255.254.0
    

    Choose ipaddr and submask parameter values for the IP link to the MCPM whose resulting subnet address is not be the same as the subnet address that resulting from the pvn and pvnmask, fcna and fcnamask, or fcnb and fcnbmask parameter values of the chg-netopts command. Continue the procedure with 8.

  8. Display the IP link information for both E5-MCAP cards by entering these commands.

    rtrv-ip-lnk:loc=1113

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-01 21:20:37 GMT EAGLE5 42.0.0
    LOC   PORT IPADDR           SUBMASK        DUPLEX SPEED MACTYPE AUTO MCAST
    1113  A    --------------- --------------- HALF   10    DIX     NO   NO
    1113  B    --------------- --------------- HALF   10    DIX     NO   NO
    

    rtrv-ip-lnk:loc=1115

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-01 21:20:37 GMT EAGLE5 42.0.0
    LOC   PORT IPADDR           SUBMASK        DUPLEX SPEED MACTYPE AUTO MCAST
    1115  A    --------------- --------------- HALF   10    DIX     NO   NO
    1115  B    --------------- --------------- HALF   10    DIX     NO   NO
    
  9. Assign an IP link to each E5-MCAP card by entering the chg-ip-lnk command for each E5-MCAP card with these parameters: loc, port=a, ipaddr, submask, speed=100, mcast=yes, duplex=full.

    For this example, enter these commands.

    chg-ip-lnk:loc=1113:port=a:ipaddr=150.1.1.1:submask=255.255.255.0 :speed=100:mcast=yes:duplex=full

    chg-ip-lnk:loc=1115:port=a:ipaddr=150.1.2.2:submask=255.255.255.0 :speed=100:mcast=yes:duplex=full

    When each of these commands have successfully completed, this message should appear.

    
    rlghncxa03w 10-04-01 21:20:37 GMT EAGLE5 42.0.0
    CHG-IP-LNK:   MASP A - COMPLTD
    
  10. Display the changes for each E5-MCAP card by entering these commands.

    rtrv-ip-lnk:loc=1113

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-01 21:20:37 GMT EAGLE5 42.0.0
    LOC   PORT IPADDR           SUBMASK        DUPLEX SPEED MACTYPE AUTO MCAST
    1113  A    150.1.1.1        255.255.255.0  FULL   100   DIX     NO   YES
    1113  B    --------------- --------------- FULL   10    DIX     NO   NO
    

    rtrv-ip-lnk:loc=1115

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-01 21:20:37 GMT EAGLE5 42.0.0
    LOC   PORT IPADDR           SUBMASK        DUPLEX SPEED MACTYPE AUTO MCAST
    1115  A    150.1.2.2        255.255.255.0  FULL   100   DIX     NO   YES
    1115  B    --------------- --------------- FULL   10    DIX     NO   NO
    
  11. Display the current IP host information in the database by entering the rtrv-ip-host:display=all command.

    The following is an example of the possible output.

    
    rlghncxa03w 07-13-13 09:12:36 GMT EAGLE5 45.0.0
    LOCAL IPADDR    LOCAL HOST
    150.1.1.2       GW102.NC.TEKELEC.COM
    150.1.1.3       GW103.NC.TEKELEC.COM
    
    REMOTE IPADDR   REMOTE HOST
    150.1.1.5       NCDEPTECONOMIC_DEVELOPMENT.SOUTHEASTERN_COORIDOR_ASHVL.GOV
    
    IP Host table is  (3 of 4096) <1% full
    
  12. Assign an IP host to each E5-MCAP card by using the ent-ip-host command.

    For this example, enter these commands.

    ent-ip-host:host=gw100.nc.tekelec.com:ipaddr=150.1.1.1

    ent-ip-host:host=gw200.nc.tekelec.com:ipaddr=150.1.2.2

    When each of these commands have successfully completed, the following message should appear.

    
    rlghncxa03w 10-04-01 21:18:37 GMT EAGLE5 42.0.0
    ENT-IP-HOST: MASP A - COMPLTD
    
  13. Display the changes for each E5-MCAP card by entering the rtrv-ip-host command with the host name specified in the 12.

    For this example, enter these commands.

    rtrv-ip-host:host=gw100.nc.tekelec.com

    The following is an example of the possible output.

    
    rlghncxa03w 07-13-13 09:12:36 GMT EAGLE5 45.0.0
    LOCAL IPADDR    LOCAL HOST
    150.1.1.1       GW100.NC.TEKELEC.COM
    
    IP Host table is  (5 of 4096) <1% full
    

    rtrv-ip-host:host=gw200.nc.tekelec.com

    The following is an example of the possible output.

    
    rlghncxa03w 07-13-13 09:12:36 GMT EAGLE5 45.0.0
    LOCAL IPADDR    LOCAL HOST
    150.1.2.2       GW200.NC.TEKELEC.COM
    
    IP Host table is  (5 of 4096) <1% full
    
  14. Display the IP card information associated with each E5-MCAP card by entering these commands.

    rtrv-ip-card:loc=1113

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-01 09:12:36 GMT  EAGLE5 42.0.0
       LOC 1113
         SRCHORDR  SRVR
         DNSA      ---------------
         DNSB      ---------------
         DEFROUTER ---------------
         DOMAIN    ---------------
         SCTPCSUM  crc32c
         BPIPADDR  ---------------
         BPSUBMASK ---------------
       

    rtrv-ip-card:loc=1115

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-01 09:12:36 GMT  EAGLE5 42.0.0
       LOC 1115
         SRCHORDR  SRVR
         DNSA      ---------------
         DNSB      ---------------
         DEFROUTER ---------------
         DOMAIN    ---------------
         SCTPCSUM  crc32c
         BPIPADDR  ---------------
         BPSUBMASK ---------------
       
  15. Assign a default router to each E5-MCAP card using the chg-ip-card command with these parameters: loc, srchordr=local, domain, and defrouter.

    For this example, enter these commands.

    chg-ip-card:loc=1113:srchordr=local:domain=nc.tekelec.com:defrouter=150.1.1.50

    chg-ip-card:loc=1115:srchordr=local:domain=nc.tekelec.com:defrouter=150.1.2.50

    When each of these commands have successfully completed, the following message should appear.

    
    rlghncxa03w 10-04-01 21:20:37 GMT EAGLE5 42.0.0
    CHG-IP-CARD:   MASP A - COMPLTD
    
  16. Display the changes for each E5-MCAP card by entering these commands.

    rtrv-ip-card:loc=1113

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-01 09:12:36 GMT  EAGLE5 42.0.0
       LOC 1113
         SRCHORDR  LOCAL
         DNSA      ---------------
         DNSB      ---------------
         DEFROUTER 150.1.1.50
         DOMAIN    nc.tekelec.com
         SCTPCSUM  crc32c
         BPIPADDR  ---------------
         BPSUBMASK ---------------
       

    rtrv-ip-card:loc=1115

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-01 09:12:36 GMT  EAGLE5 42.0.0
       LOC 1115
         SRCHORDR  LOCAL
         DNSA      ---------------
         DNSB      ---------------
         DEFROUTER 150.1.2.50
         DOMAIN    nc.tekelec.com
         SCTPCSUM  crc32c
         BPIPADDR  ---------------
         BPSUBMASK ---------------
       
  17. Display the FTP Server configuration using the rtrv-ftp-serv command.
    
    rlghncxa03w 10-04-01 09:12:36 GMT EAGLE5 42.0.0
    
    APP       IPADDR           LOGIN            PRIO
    --------  ---------------  ---------------  ----
    meas      1.255.0.100      ftpmeas3         3
       Path:  ~meas\local
    meas      1.255.0.101      ftpmeas2         2
       Path:  mp\measurements\backup\dat
    
    FTP SERV table is (2 of 10) 20% full
    

    The EAGLE allows a maximum of three measurements FTP servers (shown by the entry meas in the APP column of the rtrv-ftp-serv output). If there are less than three measurements FTP servers, perform the Adding an FTP Server procedure to add the required measurements FTP server. If there are three measurements FTP servers in the database, and you wish to change any of these measurements FTP servers, perform the Changing an FTP Server procedure.

  18. Enable the Integrated Measurements feature with the enable-ctrl-feat command specifying the part number for the Integrated Measurements feature and the feature access key. Enter this command.

    enable-ctrl-feat:partnum=893037301:fak=<Integrated Measurements feature access key>

    The Integrated Measurements feature cannot be enabled with a temporary feature access key.

    The value for the feature access key (the fak parameter) are provided by Oracle. If you do not have the feature access key for the Integrated Measurements feature, contact your Oracle Sales Representative or Account Representative.

    When the enable-crtl-feat command has successfully completed, this message should appear.

    
    rlghncxa03w 10-04-28 21:15:37 GMT EAGLE5 42.0.0
    ENABLE-CTRL-FEAT: MASP A - COMPLTD
    
  19. Turn the Integrated Measurements feature on with the chg-ctrl-feat command specifying the part number for the Integrated Measurements feature and the status=on parameter. Enter this command.

    chg-ctrl-feat:partnum=893037301:status=on

    Note:

    Once this feature is turned on, it cannot be turned off.

    When the chg-crtl-feat command has successfully completed, this message should appear.

    
    rlghncxa03w 10-04-28 21:15:37 GMT EAGLE5 42.0.0
    CHG-CTRL-FEAT: MASP A - COMPLTD
    
  20. Verify the changes by entering the rtrv-ctrl-featcommand with the Integrated Measurements feature part number. Enter this command.

    rtrv-ctrl-feat:partnum=893037301

    The following is an example of the possible output.

    
    rlghncxa03w 10-04-28 21:15:37 GMT EAGLE5 42.0.0
    The following features have been permanently enabled:
    
    Feature Name              Partnum    Status  Quantity
    Integrated Measurements   893037301  on      ----
    
    The following features have been temporarily enabled:
    
    Feature Name              Partnum    Status  Quantity     Trial Period Left
    Zero entries found.
    
    The following features have expired temporary keys:
    
    Feature Name              Partnum
    Zero entries found.
    
  21. Verify whether or nor the Integrated Measurement collection option for the E5-MCAP card is turned on (OAMHCMEAS = on) using the rtrv-measopts command.
    
    rlghncxa03w 10-04-01 16:02:05 GMT  EAGLE5 42.0.0
    PLATFORMENABLE   = on
    OAMHCMEAS        = off
    

    Note:

    The rtrv-measopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-measopts command, see the rtrv-measopts command description in Commands User's Guide.

    If the OAMHCMEAS value is on, continue the procedure with 24.

    If the OAMHCMEAS value is on, continue the procedure with 22.

  22. Turn on the Integrated Measurement collection option for the E5-MCAP card by entering this command.

    chg-measopts:oamhcmeas=on

    Once this option is turned on, it cannot be turned off.

    If more than 700 signaling links are provisioned, the scheduled UI measurement reports are disabled. The number of signaling links that are provisioned is shown in the rtrv-slk or rtrv-tbl-capacity outputs.

    If the PLATFORMENABLE option is set to on before this command is executed, these actions occur after the command is executed.
    • All of the historical measurements data on the MCPM is transferred to the E5-MCAP card. The data transfer provides continuity of data within the Measurements Subsystem and takes approximately 30 minutes to complete. UIM 1170 is displayed when the transfer has completed.

      The status of the transfer is shown in the AST field of the rept-stat-card output for the active E5-MCAP card. The value in the AST field shows a value that represents the percentage of the measurements data that has been transferred. When the value in the AST field is 100%, the data transfer is complete.

      Note:

      The transition of MEAS from the OAM to the MCPM and the other way around may disrupt the MEAS collection process during the transition period. It is possible to observe incorrect measurement reports during measurement cycles covering the transition period.
    • The PLATFORMENABLE option will be set to off.

    When the chg-measopts command has successfully completed, this message should appear.

    
    rlghncxa03w 10-04-01 00:22:57 GMT  EAGLE5 42.0.0
    CHG-MEASOPTS: MASP A - COMPLTD
    
  23. Verify the changes by entering the rtrv-measopts command.
    
    rlghncxa03w 10-04-01 16:02:05 GMT  EAGLE5 42.0.0
    PLATFORMENABLE   = off
    OAMHCMEAS        = on
    

    Note:

    The rtrv-measopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-measopts command, see the rtrv-measopts command description in Commands User's Guide.
  24. Verify that measurement collection is on or off using the rtrv-meas-sched command.

    This is an example of the possible output. The COLLECT field shows whether measurement collection is on or off.

    
    rlghncxa03w 10-04-01 12:22:55 GMT EAGLE5 42.0.0 
    COLLECT        =  off
    
    

    Note:

    The rtrv-meas-sched command output contains other fields that are not used in this procedure. Refer to the rtrv-meas-sched command description in Commands User's Guide to see these fields.
    • If measurement collection is off, continue the procedure with 25.
    • If measurement collection is on, continue this procedure with 27.
  25. Turn measurement collection on by entering this command.

    chg-meas:collect=on

    When this command has successfully completed, this message should appear.

    
    rlghncxa03w 10-04-01 00:22:57 GMT  EAGLE5 42.0.0
    CHG-MEAS: MASP A - COMPLTD
    
  26. Verify the changes by entering the rtrv-meas-sched command.

    This is an example of the possible output.

    
    rlghncxa03w 10-04-01 12:22:55 GMT EAGLE5 42.0.0 
    COLLECT        =  on
    
    

    Note:

    The rtrv-meas-sched command output contains other fields that are not used in this procedure. Refer to the rtrv-meas-sched command description in Commands User's Guide to see these fields.
  27. Back up the new changes using the chg-db:action=backup:dest=fixed command.

    These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.

    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.
    

Figure 4-34 Configuring the Integrated Measurements Feature



Sheet 1 of 4



Sheet 2 of 4



Sheet 3 of 4



Sheet 4 of 4

4.37 Configuring the MFC Option

This procedure is used to configure the option for the EAGLE to use Message Flow Control (MFC) to control the traffic in the EAGLE instead of Group Ticket Voucher (TVG). EAGLE Release 46.2 and later require MFC be turned on. This option is configured with chg-stpopts command using these parameters.
  • on=mfc - turns the MFC option on. When the MFC option is turned on, Message Flow Control controls the traffic in the EAGLE.

    Note:

    When turning on MFC, the following cards are not supported from EAGLE Release 44.0 or later, except during migration to the B-series cards:
    • DCM card (870-1945-xx)
    • DSM card (870-1984-xx)
    • EDCM card (870-2372-xx) used for STC functionality
    • EDCM-A card (870-2508-xx) used for STC functionality

Note:

For the complete list of cards supported by EAGLE Release 47.0, see Hardware Reference Guide.

Note:

A loss in MSU traffic may occur while running bi-directional traffic at 700 MSUs per second, 272 bytes on an E1-ATM or LIM-ATM card after GTT, while two STC cards are active.

Note:

If another chg-stpopts:on=mfc or chg-stpopts:off=mfc command is issued within 10 seconds, the second command is rejected.
  1. Enter the rtrv-stpopts command to display the existing value for the MFC option. The value for the MFC option is shown in the MFC field. This is an example of the possible output.
    
    
    rlghncxa03w 10-12-17 16:02:05 GMT  EAGLE5 43.0.0
    STP OPTIONS
    ---------------------------
    MFC                     off
    
    Command Completed.
    
    

    The rtrv-stpopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-stpopts command, see the rtrv-stpopts command description in Commands User's Guide.

  2. Turn the MFC option on by entering this command.

    chg-stpopts:on=mfc

    When this command has successfully completed, this message should appear.

    
    
    rlghncxa03w 10-12-07 00:22:57 GMT  EAGLE5 43.0.0
    CHG-STPOPTS: MASP A - COMPLTD
    
    
  3. Verify the changes using the rtrv-stpopts command. This is an example of the possible output.
    
    
    rlghncxa03w 10-12-17 16:02:05 GMT  EAGLE5 43.0.0
    STP OPTIONS
    ---------------------------
    MFC                      on
    
    Command Completed.
    
    

    The rtrv-stpopts command output contains other fields that are not used by this procedure. If you wish to see all the fields displayed by the rtrv-stpopts command, see the rtrv-stpopts command description in Commands User's Guide.

  4. Back up the new changes using the chg-db:action=backup:dest=fixed command. These messages should appear, the active Maintenance and Administration Subsystem Processor (MASP) appears first.
    
    
    BACKUP (FIXED) : MASP A - Backup starts on active MASP.
    BACKUP (FIXED) : MASP A - Backup on active MASP to fixed disk complete.
    BACKUP (FIXED) : MASP A - Backup starts on standby MASP.
    BACKUP (FIXED) : MASP A - Backup on standby MASP to fixed disk complete.