3HE15110AAADTQZZA - V1 - NSP NFM-P 19.11 Integration Guide
3HE15110AAADTQZZA - V1 - NSP NFM-P 19.11 Integration Guide
3HE15110AAADTQZZA - V1 - NSP NFM-P 19.11 Integration Guide
Integration Guide
3HE-15110-AAAD-TQZZA
Issue 1
November 2019
NFM-P
Legal notice
Nokia is a registered trademark of Nokia Corporation. Other products and company names mentioned herein may be trademarks or
tradenames of their respective owners.
The information presented is subject to change without notice. No responsibility is assumed for inaccuracies contained herein.
© 2019 Nokia.
Release 19.11
November 2019
2 3HE-15110-AAAD-TQZZA Issue 1
Contents NFM-P
Contents
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 3
About this document NFM-P
Scope
NSP inter-module integration is not described in this document. For more information about such
deployments, see the NSP Deployment Overview.
Safety information
For your safety, this document contains safety statements. Safety statements are given at points
where risks of damage to personnel, equipment, and operation may exist. Failure to follow the
directions in a safety statement may result in serious consequences.
Document support
Customer documentation and product support URLs:
• Documentation Center
• Technical support
How to comment
Documentation feedback
Release 19.11
November 2019
4 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Single Sign On NFM-P
Overview
1.1 Overview
1.1.1 NFM-P integration with SANE client for SSO
Single Sign On, or SSO, enables user access to all resources in a domain after having entered their
credentials one time. SSO uses centralized authentication servers to ensure that users do not need
to enter their credentials repeatedly. Security is provided on all levels without the inconvenience of
multiple prompts.
You can gain access to the following through the SANE portal:
• NSP Launchpad
• NFM-P client GUI
After you configure the NFM-P for SANE portal access, you must configure a URL on the SANE
server for each type of access that you require.
1.2 “To configure NFM-P and SANE portal integration” (p. 5) describes the NFM-P and SANE
server configuration steps.
Note: A SANE client that opens the NSP Launchpad using Internet Explorer must deselect the
“Do not save encrypted pages to disk” security option in Internet Explorer.
Configuring TLS
TLS is mandatory and enabled by default between NFM-P components. The TLS certificate that
you intend to use for SANE access must be imported to the truststore on each NFM-P main server,
as described in 1.2 “To configure NFM-P and SANE portal integration” (p. 5).
See the “TLS configuration and management” chapter of the NSP NFM-P Installation and Upgrade
Guide for information about the NFM-P implementation of TLS.
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 5
NFM-P integration with Single Sign On NFM-P
To configure NFM-P and SANE portal integration
CAUTION
Service Disruption
Enabling NFM-P and SANE portal integration requires a restart of each NFM-P main server, which
causes a network management outage.
Ensure that you perform the procedure only during a scheduled maintenance period.
Note: You can perform this procedure as part of an NFM-P main server installation or
upgrade, or as a configuration activity on an installed main server.
Note: You must perform this procedure on each main server in the NFM-P system. In a
redundant system, you must perform the procedure on the standby main server first.
1.2.3 Steps
1
Perform the following steps on each main server to import your TLS certificate for SANE access
to the NFM-P truststore.
Note: If the certificate is signed by a CA, you must import the entire CA chain of
certificates to the truststore; see the CA documentation for information about importing
trusted certificates.
1. Log in to the main server station as the root user.
2. Enter the following:
# path/keytool -import -trustcacerts -alias alias -file
certificate_file -keystore truststore_file -storepass password ↵
where
path is the path to the keytool utility
Release 19.11
November 2019
6 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Single Sign On NFM-P
To configure NFM-P and SANE portal integration
2
Perform one of the following.
a. If you are performing this procedure as part of a main server installation or upgrade, perform
the initial installation or upgrade procedure steps in the NSP NFM-P Installation and Upgrade
Guide up to, but not including, the step that describes opening the samconfig utility.
b. If you are configuring SANE access on an installed main server, stop the main server if it is
running.
1. Log in to the main server station as the nsp user.
2. Open a console window.
3. Enter the following:
bash$ cd /opt/nsp/nfmp/server/nms/bin ↵
4. Enter the following:
bash$ ./nmsserver.bash stop ↵
5. Enter the following:
bash$ ./nmsserver.bash appserver_status ↵
The server status is displayed; the server is fully stopped if the status is the following:
Application Server is stopped
If the server is not fully stopped, wait five minutes and then repeat this step. Do not
perform the next step until the server is fully stopped.
3
Enter the following:
bash$ sudo samconfig -m main -sane ↵
The following is displayed:
Start processing command line inputs...
<main>
4
Enter the following:
<main> configure sane ↵
The prompt changes to <main configure sane>
5
Enter the following:
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 7
NFM-P integration with Single Sign On NFM-P
To configure NFM-P and SANE portal integration
6
Enter the following:
<main configure sane> linux-dir directory ↵
where directory is the absolute path of the GUI client installation location on each RHEL
client station
7
Enter the following:
<main configure sane> certificates "certificate-list" ↵
where certificate-list is a list of paired entities and certificate file paths in the following
format:
entity1#path1;entity2#path2...entityn#pathn
8
Enter the following:
<main configure sane> back ↵
The prompt changes to <main configure>.
9
To enable the propagation of the SANE TLS certificate to the required components, you must
specify the location of the truststore file that contains the SANE certificate.
Note: You must specify the truststore location, regardless of whether the location has
changed.
Enter the following:
<main configure> tls truststore-file truststore_file back ↵
where truststore_file is the absolute path and filename of the TLS truststore file on the main
server station
10
Perform one of the following.
a. If you are configuring SANE access during a main server installation or upgrade, perform the
remaining installation or upgrade procedure steps.
b. If you are configuring SANE access on an installed main server, perform the following steps.
1. Enter the following:
<main configure> back ↵
The prompt changes to <main>.
Release 19.11
November 2019
8 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Single Sign On NFM-P
To configure NFM-P and SANE portal integration
11
To enable NSP Launchpad access, configure the following URL on the SANE server:
Note: A SANE client that opens the NSP Launchpad using Internet Explorer must
deselect the “Do not save encrypted pages to disk” security option in Internet Explorer.
• https://NFM-P_address/cas/login?service=https://NFM-P_address/cas/login&client_
name=SANEClient&SAMLart=%%SAML_ART%%
where NFM-P_address is the NFM-P main server IP address or hostname, depending on which
is configured for client access
Note: Cross-launch from the SANE portal to the NSP Launchpad fails occasionally if
using IE 11. If this issue is encountered, repeat the cross-launch operation from SANE.
12
To enable direct NFM-P client GUI access, configure the following URL on the SANE server:
• https://NFM-P_address/session-manager/login?service=https://NFM-P_address/
?launchNFMPClient=true&client_name=SANEClient&SAMLart=%%SAML_ART%%
where NFM-P_address is the NFM-P main server IP address or hostname, depending on which
is configured for client access
END OF STEPS
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 9
NFM-P integration with Single Sign On NFM-P
To configure NFM-P and SANE portal integration
Release 19.11
November 2019
10 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
Overview
2.1 Overview
2.1.1 Purpose
The NFM-P supports IEEE 1588 PTP clocks for packet-based timing synchronization from a
primary clock to one or more secondary clocks in a network. You can use the NFM-P to configure
primary or secondary PTP clocks on network elements that support timing references. See the NSP
NFM-P User Guide for more information about configuring IEEE 1588 PTP clocks.
You can use the CPAM to manage synchronization domains and assign IP path monitors to PTP
peers. See the “Synchronization management” chapter in the NSP NFM-P User Guide for more
information.
The SyncWatch Probe provides a system for synchronization testing and monitoring for telecoms.
The NetSMART Server component provides remote management of multiple SyncWatch Probes.
The component collects data that can be used to alert users to potential synchronization problems.
The NFM-P provides integration support for both the SyncWatch Probe and the NetSMART Server
components. The NFM-P provides basic network element management support at the GNE level
for the probe, as well as a fault management framework to manage synchronization-related alarms.
2.1.2 Contents
2.1 Overview 11
2.2 Synchronization overview 12
2.3 NFM-P and Chronos SyncWatch 13
2.4 NetSMART Server and SyncWatch Probe in the NFM-P 16
2.5 Workflow for scripted SyncWatch integration 18
2.6 Workflow for manual SyncWatch integration 19
2.7 Manual SyncWatch Probe integration 20
2.8 Verify NFM-P SNMP communication with NetSMART Server 23
2.9 Verify NFM-P SNMP communication with SyncWatch Probes 24
2.10 To perform a NetSMART Server cross-launch 25
2.11 To configure a physical link 26
2.12 Chronos SyncWatch script bundle execution 27
2.13 To import the SyncWatch script bundle 28
2.14 To execute the SyncWatch script bundle 29
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 11
NFM-P integration with Chronos SyncWatch NFM-P
Synchronization overview
2.2.2 Clocks
Network clocks at the sending and receiving sites control the rate at which data is transmitted and
received. Timing synchronization ensures that the clocks on the source and target nodes are
operating in unison. When the clocks are synchronized, the receiver more effectively reads the
transmitted data. Synchronized clocks result in less dropped or retransmitted traffic.
Clocks can become out-of-synchronization when timing accuracy is not precise. Phase movements
such as jitter and wander can effect network clocks, which are distributed among network elements.
When timing synchronization deteriorates, service quality is impacted.
Release 19.11
November 2019
12 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
NFM-P and Chronos SyncWatch
By default, the NFM-P supports a limited number of standard system and interface SNMP traps for
GNEs. The NFM-P monitors SNMP reachability and interface status, and raises a standard alarm
for each the following events:
• coldStart—the GNE restarts
• linkDown—an interface goes out of service
• linkUp—an interface returns to service
The NFM-P also supports GNE alarm catalogs to import SyncWatch Probe traps from the
NetSMART Server and translate them into NFM-P alarms. An alarm catalog is a set of trap-to-alarm
mappings that can be associated with a GNE profile. A GNE profile can have at most one alarm
catalog, but each catalog can contain up to 150 alarm mappings. When a mapping is
administratively disabled, the NFM-P raises no alarm in response to an associated trap from a
GNE.
An alarm mapping can be static, which means that it maps to a specific alarm, or the mapping can
use one or more transform functions that extend the mapping customization. A transform function
defines conditions that enable the dynamic mapping of a trap to an alarm that is created using
varbind values in an SNMP trap PDU. For example, you can use a transform function to assign a
specific alarm name, severity, or probable cause to an alarm based on varbind values.
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 13
NFM-P integration with Chronos SyncWatch NFM-P
NFM-P and Chronos SyncWatch
When the NFM-P receives a GNE trap that is not one of the supported standard traps or a mapped
trap in an alarm catalog, the NFM-P drops the trap. When the NFM-P receives a high trap volume
and must discard traps that it cannot process, it does not distinguish between standard and user-
defined traps. To conserve system resources, Nokia recommends that you configure a GNE to send
only the required traps to the NFM-P.
Traps that map to user-defined alarms require extra processing by the NFM-P and are managed in
a separate, resource-limited queue. When this queue is full, the NFM-P discards some of the traps
and raises an alarm. You can monitor the queue length using the NFM-P Resource Manager.
Note: By default, only the NFM-P admin user, or an operator with an assigned admin scope of
command role, can manage GNE profiles and alarm catalogs. A non-admin user requires the
genericne scope of command role to manage GNE profiles.
To create, modify, or delete a GNE alarm catalog or mapping, you require a trapmapper scope
of command role with write, update, and execute permissions.
The NFM-P supports a system address and interface index in the alarm catalog such that the
alarms are not always raised against the network element object associated with the GNE that sent
the trap. Instead, the alarm can be raised:
• on a different GNE
• on an interface on the GNE, rather than only on the GNE
This index is necessary because the NetSMART Server sends traps on behalf of the SyncWatch
Probes and because each probe has multiple interfaces.
The following figure shows a SyncWatch alarm displayed by the NFM-P.
Release 19.11
November 2019
14 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
NFM-P and Chronos SyncWatch
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 15
NFM-P integration with Chronos SyncWatch NFM-P
NetSMART Server and SyncWatch Probe in the NFM-P
You can view and monitor SyncWatch Probe alarms from several places on the NFM-P GUI.
• The topology map displays outstanding alarms in the top right corner of network icons. See
Figure 2-4, “Topology map with physical link” (p. 27) .
• The GNE properties form for the SyncWatch Probe displays GNE interfaces with outstanding
alarms on the Generic NE Interfaces tab.
• The Generic NE Interface form lists alarms on the Faults tab.
• The Alarm Window displays a filterable list of network alarms. See Figure 2-2, “Alarm Window”
(p. 15) .
You can view the Alarm Info form for a selected alarm to see details about the alarmed object and
remedial actions. The additional text will depend on the configuration in the alarm catalog.
Release 19.11
November 2019
16 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
NetSMART Server and SyncWatch Probe in the NFM-P
Note: If the auto-generated string for the Element Management URL in the SyncWatch Probe
properties form displays a different IP address from that accessible by the NFM-P, you must
reconfigure it. Such a mismatch typically occurs in a multi-LAN topology. The URL string may
contain the in-band management interface for the NetSMART Server. For cross-launch, the
NFM-P has access only to the GUI interface.
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 17
NFM-P integration with Chronos SyncWatch NFM-P
Workflow for scripted SyncWatch integration
The procedures in this section assume that you have performed the following prerequisite tasks on
the NetSMART Server.
• Verify the SNMP license. The Server Licences tab on the Server: Manage panel displays the
SNMP license.
• Add users on the NetSMART Server. You can add new users from the Users: List panel. Ensure
that all access rights are unchecked for the new users. A verification email is sent to new users
with an automatically generated password.
2.5.2 Process
1
Verify from a CLI session that the NFM-P can communicate with the NetSMART Server via
SNMP. See 2.8 “Verify NFM-P SNMP communication with NetSMART Server” (p. 23) .
2
Verify from a CLI session that the NFM-P can communicate with the SyncWatch Probes via
SNMP. See 2.9 “Verify NFM-P SNMP communication with SyncWatch Probes” (p. 24) .
3
Import the script bundle into the NFM-P. See 2.13 “To import the SyncWatch script bundle”
(p. 28) .
4
Execute the script bundle. The NFM-P prompts you for the server IP and user information. See
2.14 “To execute the SyncWatch script bundle” (p. 29) .
5
Perform a NetSMART Server cross-launch, as required. See 2.10 “To perform a NetSMART
Server cross-launch” (p. 25) .
Release 19.11
November 2019
18 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
Workflow for manual SyncWatch integration
6
The first physical link is configured by the script bundle to port C on the SyncWatch Probe.
Other physical links need to be configured manually. Create additional physical links, as
required. See .
The procedures in this section assume that you have performed the following prerequisite tasks on
the NetSMART Server.
• Verify the SNMP license. The Server Licences tab on the Server: Manage panel displays the
SNMP license.
• Add users on the NetSMART Server. You can add new users from the Users: List panel. Ensure
that all access rights are unchecked for the new users. A verification email is sent to new users
with an automatically generated password.
2.6.2 Process
1
Verify from a CLI session that the NFM-P can communicate with the NetSMART Server. See
2.8 “Verify NFM-P SNMP communication with NetSMART Server” (p. 23) .
2
Verify from a CLI session that the NFM-P can communicate with the SyncWatch Probes. See
2.9 “Verify NFM-P SNMP communication with SyncWatch Probes” (p. 24) .
Note: 2.7 “Manual SyncWatch Probe integration” (p. 20) describes the configuration
tasks in workflow Stage 3 to Stage 12 .
3
Create an alarm catalog for the NetSMART Server. You must define raising alarm mappings
and transform functions for traps imported from the NetSMART Server.
4
Create a GNE profile for the NetSMART Server. You must assign the alarm catalog created in
Stage 3 .
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 19
NFM-P integration with Chronos SyncWatch NFM-P
Manual SyncWatch Probe integration
5
Create a mediation policy for the NetSMART Server.
6
Create and execute a discovery rule for the NetSMART Server. You must select the mediation
policy created in Stage 5 .
7
Create a GNE profile for the SyncWatch Probes. You must create three interface types.
8
Create a mediation policy for the SyncWatch Probes.
9
Create and execute a discovery rule for the SyncWatch Probes. You must select the mediation
policy created in Stage 8 .
10
Define a NetSMART Server cross-launch URL. The URL must have the format defined in
2.10.1 “NetSMART Server cross-launch mechanism” (p. 25) .
11
Perform a NetSMART Server cross-launch, as required. See 2.10 “To perform a NetSMART
Server cross-launch” (p. 25) .
12
Create physical links between the SyncWatch Probe and any managed NEs. See .
Release 19.11
November 2019
20 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
Manual SyncWatch Probe integration
Configuration forms for GNE alarm catalogs, GNE profiles, mediation policies, and discovery rules
can be accessed from the Administration menu on the NFM-P GUI.
Task Description
1. Create a GNE alarm Tasks:
catalog for the NetSMART
• Create a GNE alarm catalog and configure a name and description.
Server
• Create raising alarm mappings. Mappings are required to interpret the
various SNMP traps that are issued by the NetSMART Server.
- The System Address Varbind Position parameter allows the trap from the
NetSMART Server to generate an NFM-P alarm for the appropriate
SyncWatch Probe.
- The Interface Index Varbind Position parameter allows the trap from the
NetSMART Server to generate an NFM-P alarm for the appropriate
SyncWatch Probe interface.
• Create transform functions. Transform functions are required to define the
raising and clearing alarm pairs.
2. Create a GNE profile for Tasks:
the NetSMART Server
• Create a GNE profile.
• Select Server for the Generic NE Category parameter.
• Enter the sysObjectID derived in 2.8 “Verify NFM-P SNMP communication
with NetSMART Server” (p. 23) for the Sys Object ID parameter.
• Enter the NetSMART Server URL for the Default Element Manager URL
parameter.
- This step allows you to open the NetSMART Server from the NFM-P GUI.
• Assign the alarm catalog created in the previous task to the GNE profile.
• Complete the GNE profile creation.
- The CLI Profile tab is dimmed because CLI is not supported for the
NetSMART Server.
- Do not configure the trap configuration scripts because trap configuration is
handled from the NetSMART Server.
- Do not add interface types because the NetSMART Server MIB does not
include interface information.
3. Create a mediation Tasks:
policy for the NetSMART
• From the Mediation (Edit) form, click on the Mediation Security tab and
Server
create a mediation policy.
• Select SNMPv2c for the Security Model parameter.
• Enter “public” for the SNMP v1/v2c Community String parameter.
• Do not configure CLI or file transfer access because they are not accessible.
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 21
NFM-P integration with Chronos SyncWatch NFM-P
Manual SyncWatch Probe integration
Task Description
4. Create a discovery rule Tasks:
for the NetSMART Server
• Create a discovery rule.
• In step 1 of discovery rule creation, select a group into which the NetSMART
Sever is discovered.
• In step 2 of discovery rule creation, add the NetSMART Server IP address
with a 32-bit mask.
• Do not configure ACL in step 3 of discovery rule creation.
• In step 4 of discovery rule creation, select the mediation policy created in the
previous task for the read access, write access, and trap access mediation
policies.
• Do not perform other steps. Complete the discovery rule creation.
5. Create a GNE profile for Tasks:
the SyncWatch Probes
• Create a GNE profile.
• Select GNE1 for the Generic NE Category parameter.
• Enter the sysObjectID derived in 2.9 “Verify NFM-P SNMP communication
with SyncWatch Probes” (p. 24) for the Sys Object ID parameter.
• Enter the SyncWatch Probe element management URL for the Default
Element Manager URL parameter.
- See 2.10.1 “NetSMART Server cross-launch mechanism” (p. 25) for
information about the URL format.
• Create the following interface types:
- 1 — Other
- 6 — Ethernet Csmacd
- 24 — Software Loopback
• Complete the GNE profile creation.
- The CLI Profile tab is dimmed because CLI is not supported for the
SyncWatch Probe.
- Do not configure the trap configuration scripts because trap configuration is
handled from the NetSMART Server.
6. Create a mediation Tasks:
policy for the SyncWatch
• From the Mediation (Edit) form, click on the Mediation Security tab and
Probes
create a mediation policy.
• Select SNMPv2c for the Security Model parameter.
• Enter “public” for the SNMP v1/v2c Community String parameter.
• Do not configure CLI or file transfer access, as they are not accessible.
Release 19.11
November 2019
22 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
Verify NFM-P SNMP communication with NetSMART Server
Task Description
7. Create a discovery rule Tasks:
for the SyncWatch Probes
• Create a discovery rule.
• In step 1 of discovery rule creation, select a group into which the NetSMART
Sever is discovered.
• In step 2 of discovery rule creation, add the SyncWatch Probe IP addresses
with a 32-bit mask.
• Do not configure ACL in step 3 of discovery rule creation.
• In step 4 of discovery rule creation, select the mediation policy created in the
previous task for the read access, write access, and trap access mediation
policies.
• Do not perform other steps. Complete discovery rule creation.
8. Define a NetSMART See 2.10.1 “NetSMART Server cross-launch mechanism” (p. 25) for
Server cross-launch URL information about configuring the URL NetSMART Server cross-launch URL.
9. Create physical links See 2.11 “To configure a physical link” (p. 26) for information about
between the SyncWatch configuring a physical link.
Probes and a managed NE
2.8.2 Steps
1
Open a console window.
2
Navigate to the SNMP configuration in the server binary directory:
bash# cd /opt/nsp/nfmp/server/nms/bin/unsupported/snmp
3
Obtain the SNMPv2 sysDescr:
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 23
NFM-P integration with Chronos SyncWatch NFM-P
Verify NFM-P SNMP communication with SyncWatch Probes
4
Verify that the NFM-P can derive the sysObjectID:
END OF STEPS
2.9.2 Steps
1
Open a console window.
2
Navigate to the SNMP configuration in the server binary directory:
bash# cd /opt/nsp/nfmp/server/nms/bin/unsupported/snmp
3
Obtain the SNMPv2 sysDescr:
4
Verify that the NFM-P can derive the sysObjectID:
END OF STEPS
Release 19.11
November 2019
24 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
To perform a NetSMART Server cross-launch
Note: Only users with limited access rights can open a cross-launch session. This does not
include the default root user.
You can configure the element management URL in the Network Element properties form for the
selected SyncWatch Probe. Enter the URL using the following format:
Where:
• <SyncWatch_Server_IP> — IP (not resolvable host name) of NetSMART Server
• <user> <password> — NetSMART Server Username (Email) and password
• <probe_serial_no> — SyncWatch Probe serial number
2.10.2 Steps
1
Right-click on the SyncWatch Probe GNE icon on the topology map and choose Properties
from the drop-down menu. The Network Element (Edit) form opens.
2
Configure the Element Management URL parameter using the format described in this section.
3
Click on the OK button to close the form.
4
Right-click on the SyncWatch Probe GNE icon on the topology map and choose Open URL.
The cross-launch executes.
END OF STEPS
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 25
NFM-P integration with Chronos SyncWatch NFM-P
To configure a physical link
1
Right-click on the topology map and choose Equipment→Create Physical Link from the drop-
down menu. The Physical Link (Create) form opens.
2
Perform one of the following:
a. Configure a link representing the GPS reference input.
1. Configure the parameters:
• Name
• Description
• Endpoint A Type — choose Generic NE Interface
• Endpoint B Type — choose Unmanaged NE
• Notes
2. Click on the Select button for Endpoint A to specify the GNE interface.
3. Configure the parameters:
• Unmanaged — Name
• Unmanaged Management Address — enter 0.0.0.0
• Unmanaged Description
b. Configure a link representing the SAR BITS output to the SyncWatch Probe measurement
input.
1. Configure the parameters:
• Name
• Description
• Endpoint A Type — choose Generic NE Interface
• Endpoint B Type — choose Network Element
• Notes
2. Click on the Select button for Endpoint A to specify the GNE interface.
3. Click on the Select button for Endpoint B to specify the NE interface.
3
Click on the OK button to create the physical link.
Release 19.11
November 2019
26 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
Chronos SyncWatch script bundle execution
END OF STEPS
Perform these procedures to import and execute the Chronos SyncWatch script bundle. The script
bundle performs the following setup operations:
• creates a SyncWatch alarm catalog
• creates a NetSMART Server GNE profile
• creates a NetSMART Server mediation profile
• creates and executes a NetSMART Server discovery rule
• creates a SyncWatch Probe GNE profile
• creates a SyncWatch Probe mediation profile
• creates a SyncWatch Probe discovery rule
• adds the SyncWatch Probe IP address to the probe discovery rule and discovers the probe
• creates a SyncWatch Probe GNE URL for the NetSMART Server cross-launch
• creates a physical link
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 27
NFM-P integration with Chronos SyncWatch NFM-P
To import the SyncWatch script bundle
See the NSP NFM-P Scripts and Templates Developer Guide for more information about script
bundles and script management.
1
Choose Tools→Scripts from the NFM-P main menu. The Scripts manager opens.
2
Click on the Import button. The Specify file to import form opens.
3
Navigate to the Chronos SyncWatch Bundle.
4
Click on the Open button. The Import form opens and lists the operations to be carried out.
5
Click on the Continue button to execute the operations.
6
Click on the Close button when the operations are complete.
7
In the Scripts manager, choose Script Bundle (Scripting) from the object drop-down menu.
8
Search for the Chronos SyncWatch script bundle to confirm that it was successfully imported;
see Figure 2-5, “Scripts manager” (p. 28) .
END OF STEPS
Release 19.11
November 2019
28 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
To execute the SyncWatch script bundle
1
Choose Tools→Scripts from the NFM-P main menu. The Scripts manager opens.
2
Choose Script Bundle (Scripting) from the object drop-down menu and search for the
SyncWatch script bundle.
3
Select the script bundle and click on the Properties button. The Script Bundle (Edit) form opens;
see Figure 2-6, “Chronos SyncWatch script bundle” (p. 28) .
The Members tab displays the scripts included in the script bundle. The two control scripts are
labeled as starting points for the bundle.
• SetupChronosSyncWatch — the starting point when adding the NetSMART Server
• AddProbeCTL — the starting point when adding the SyncWatch Probe
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 29
NFM-P integration with Chronos SyncWatch NFM-P
To execute the SyncWatch script bundle
4
Select the SetupChronosSyncWatch script and click on the Execute Script button. The Execute
Script form opens with the Chronos SyncWatch tab displayed.
6
Click on the Select button for the Group and select the equipment group into which the
NetSMART Server is discovered.
7
Click on the Execute button. The component scripts are marked with green check marks when
they are complete.
Release 19.11
November 2019
30 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with Chronos SyncWatch NFM-P
To execute the SyncWatch script bundle
• Password — the username and password are automatically populated from the NetSMART
Server details configured in Step 5 .
9
Click on the Select button for the Probe SR and choose the node to which the first SyncWatch
Probe measurement port is connected.
10
Click on the Execute button. The component scripts are marked with green check marks when
they are complete.
11
Repeat Step 8 to Step 10 to configure parameters for additional SyncWatch Probes, as
required.
END OF STEPS
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 31
NFM-P integration with Chronos SyncWatch NFM-P
To execute the SyncWatch script bundle
Release 19.11
November 2019
32 3HE-15110-AAAD-TQZZA Issue 1
NFM-P integration with other systems NFM-P
Overview
3.1 Overview
3.1.1 Purpose
You can integrate the NFM-P with a variety of other systems. Integration allows the NFM-P to
provide a broader range of management functions from a single GUI. This chapter describes the
configuration of different integration scenarios.
3.1.2 Contents
3.1 Overview 33
3.2 NFM-P and 5520 AMS integration 33
3.3 NFM-P and CPAM integration 33
3.4 NFM-P and DSC integration 34
3.5 NFM-P and EM systems integration 34
3.6 NFM-P and LTE OMS integration 34
Release 19.11
November 2019
Issue 1 3HE-15110-AAAD-TQZZA 33
NFM-P integration with other systems NFM-P
NFM-P and DSC integration
Release 19.11
November 2019
34 3HE-15110-AAAD-TQZZA Issue 1