|Introduction|Terms|A-E|F-K|L-P|Q-T|U-Z|Glossary|$|1|2|2.1|2.2|2.3|2.4|2.5|3|
|Introduction|Scope|Target Audience|List of FOSS Products|Free Open Source Software Credits and Copyrights|License Information and License Texts|GNU Lesser General Public License, version 2.1 (LGPL-2.1)|GNU General Public License, version 2|GNU GENERAL PUBLIC LICENSE, version 3|MIT License|MIT X License|PyCrypto License|GNU Lesser General Public License, version 3|Boost Software License 1.0|FreeBSD|BSD|OpenLDAP|Apache License|Free Open Source Software Source Code|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|3|
|Trademarks Used in Library|$|1|
|Introduction|Compute Requirements|Network Requirements|Storage Requirements|Security Requirements|Other Requirements|$|1|2|3|4|5|6|
|About This Document|vMRF Deployment Principles for OpenStack|vMRF Deployment Process for OpenStack|Prerequisites for vMRF Deployment|Download and Extract vMRF Software Delivery Package|vMRF Deployment Preparations for the Cloud Administrator|Prepare and Configure Cloud Hardware and Software|Define an Availability Zone for vMRF|Configure CPU Core Isolation for the vMRF Compute Hosts|Configure CPU Settings for the vMRF Compute Hosts|Configure CPU Frequency Scaling for the vMRF Compute Hosts|Configure NTP Servers|Configure Project and Users|Create Flavor|Configure Heat Stack Domain Users|Create Network Topology|vMRF Deployment for the End User|Set Up Command-Line Access and Security|Set Up the OpenStack Heat Command-Line Client|Set Up Access and Security for Instances|Create Subnets|Upload the vMRF Image|Prepare Deployment Parameters|Instantiate and Check vMRF with One VM|Provide Initial Configuration|Check vMRF Status|Scale Out to Full VNF Size|$|1|2|3|4|4.1|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.1.5|5.1.6|5.2|5.3|5.4|6|6.1|6.1.1|6.1.2|6.2|6.3|6.4|6.5|6.6|6.7|6.8|
|Introduction|Configure SSL Connection|Enable the Customer Security Layer|Disable the Customer Security Layer|Update SSL Certificates|Configure the NeLS Connection|$|1|2|2.1|2.2|2.3|3|
|Function Overview|vMRF Architecture|Virtual Machine Functions in vMRF|Roaming SC in vMRF|Audio Codec Selection Principles|Audio Announcements|Detection of Dual Tone Multi Frequency (DTMF) Tones|Forwarding of DTMF Tones through Audio Conference|Playing Tones|Emergency and Priority Call Handling|Audio Conferencing|Overload Protection|Shared Storage|Automatic Backup and Restore|Address Resolution and Next Hop Supervision|Media Stream Processing Services|Adaptive Multi-Rate (AMR) Speech Coder Service|Adaptive Multi-Rate Wideband (AMR-WB) Speech Coder Service|Announcement Service|Audio Mixing Service|DTMF Receiver Service (DTMF-R)|DTMF Sender Service (DTMF-S)|Enhanced Voice Services (EVS)|G.729 Service (G.729)|Jitter Handling Service|Pulse Code Modulation Service (PCM)|Real-Time Transport Protocol and Real-Time Transport Control Protocol Service (RTP/RTCP)|Tone Sender Service|User Plane Frame Handler Service (UP FH)|Limitations and Differences|$|1|1.1|1.2|1.3|2|3|4|5|6|7|8|9|10|11|12|13|13.1|13.2|13.3|13.4|13.5|13.6|13.7|13.8|13.9|13.10|13.11|13.12|13.13|14|
|Introduction|Related Information|Key Features of ECLI|Prerequisites|ECLI Concepts|ECLI Modes|ECLI Session|ECLI Transaction|ECLI Position|ECLI Prompt|ECLI Help|Auto-Completion|Case Correction|Escaping of Special Characters|Visibility Levels|Automatic Correction of ManagedElement ID|Limitations|ECLI Commands|Summary of ECLI Commands|Success and Error Indications|Display Information|Change and Display the Position in MO Tree|Display MO Instances|Change MO Attributes|Create MO|Reset MO|Delete MO|MO Actions|Copy and Paste Configuration Data|Change Password Command|Display ECLI Version|Pipe Utility Commands|Deprecated Actions|Deprecated Options|ECLI Commands Limitations|Terminal Properties|Terminal Types|Default Key Bindings|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|4|4.1|4.2|
|Introduction|Event Description|Information|Usage|Configuration|Subscription|$|1|2|2.1|2.2|2.3|2.4|
|$|
|Introduction|Related Information|Key Features of ECLI|ECLI Modes|Start an ECLI Session|Use ECLI Online Features|Static Help|Information Model Help|Context-Sensitive Help|Auto-Completion|Navigate in MIB|Display ME Status|Change ME Configuration|Execute MO Actions|$|1|1.1|1.2|2|3|4|4.1|4.2|4.3|4.4|5|6|7|8|
|Introduction|Functions and Concepts|Modes of Operation|Autonomous Mode|Emergency Unlock Mode|Integration Unlock|Locked Mode|Normal Mode|LM Managed Object Model|Configuration Management|Fault Management|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|3|4|5|
|Introduction|CPI Library Types|Document Formats|Active Library Explorer Variants|Active Library Explorer Functions|Active Library Explorer Window|Frames|Library Collections|Active Library Explorer Toolbar|Context Menu|Basic Functions|Back and Forward|Search|Document View Search Syntax|Instant Document Search|Advanced Search Options|Search Library Collections|Change Sort Order|Show All Titles and Show Context|Next Search Hit|Search in Document Frame|PDF and Excel Document Searches|Navigation|Library Front Page Images|Filter Displayed Contents|Set Filters|Hide Filter Library Contents|Reset Filters|Add Bookmarks|Copy Links to Clipboard|Copy Links to Clipboard in Microsoft&#174; Internet Explorer&#174;|Copy Links to Clipboard in Other Web Browser|Create and Display Annotations|Provide Feedback|Add Note|Edit Note|Delete Note|Print|Save Document to Local Disk|View PDF Version of Current Document|Open a Document in Separate Window|Get Help|Find Active Library Explorer Version|Active Library Explorer Server|Active Library Explorer for Windows|Download Latest Active Library Explorer Version|Access Active Library Explorer Libraries Using URL Hyperlinks|Internet Address and Parameters|Open Libraries|Search for Documents|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.2.9|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.6|3.7|3.7.1|3.7.2|3.8|3.9|3.9.1|3.9.2|3.9.3|3.10|3.11|3.12|3.13|4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|
|General|Statement of Compliance|ETSI NFV Standards|ITU-T Standards|ETSI Standards|3GPP Standards|IETF Standards|IEEE Standards|GSMA Standards|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|
|$|
|Overview|Compute Resource Threshold Value Exceeded Alarm Description|$|1|1.1|
|Introduction|Functions and Concepts|NBI User Authentication|NBI User Authorization|Transport Layer Security|Types of Operation|Managed Object Model|Rules for Default Roles|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|3|3.1|4|
|Introduction|Command Access Restriction|mrf_appl Commands|announcement-counters|announcement-status|h248-counters|h248interface-counters|compute-resource|context-info|sctp-pm-counters|sctp-status|service-pm-counters|status|internals|license-info|overload-control|smms-counters|ipp Commands|ipp ping|ipp conf|ipp debug-counters|ipp discard-counters|ipp pm-counters|ipp error-counters|ipp signal-counters|ipp ethdev-counters|ipp dpdk-counters|ipp internals|vMRF Utility Scripts|verify_vmrf_cluster_status.py|verify_vmrf_node_status.py|collectData.py|mrf_export_conf.py|mrf_import_conf.py|Linux Commands|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|4|4.1|4.2|4.3|4.4|4.4.1|4.5|4.6|4.7|4.8|4.9|5|5.1|5.2|5.3|5.4|5.5|6|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Description of Changes|New and Changed Documents|Library Overview|Product Overview|Planning|Installation|Initial Configuration|Operation and Maintenance|Emergency|Removed Documents|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.1.7|2.2|
|Introduction|Description of Changes|New and Changed Documents|Library Overview|Product Overview|Planning|Installation|Initial Configuration|Operation and Maintenance|Emergency|Removed Documents|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.1.7|2.2|
|Introduction|Description of Changes|New and Changed Documents|Library Overview|Product Overview|Planning|Installation|Initial Configuration|Operation and Maintenance|Emergency|Removed Documents|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.1.7|2.2|
|Introduction|General Impact|General Impact for vMRF 1.1|General Impact for vMRF 1.2|General Impact for vMRF 1.3|General Impact for vMRF 1.4|Other Network Elements|Interfaces|Interfaces in vMRF 1.1|Interfaces in vMRF 1.2|Interfaces in vMRF 1.3|Interfaces in vMRF 1.4|Summary of Impacts per Feature|Impact on vMRF Features|Impact on vMRF Features from vMRF 1.0 to vMRF 1.1|Impact on vMRF Features from vMRF 1.1 to vMRF 1.2|Impact on vMRF Features from vMRF 1.2 to vMRF 1.3|Impact on vMRF Features from vMRF 1.3 to vMRF 1.4|$|1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|3.4|4|5|5.1|5.2|5.3|5.4|
|Overview|Service Level Agreement Violation Alarm Description|Cease the Service Level Agreement Violation Alarm|$|1|1.1|2|
|Media Stream Recording|$|1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|$|1|
|Introduction|Prerequisites|Tools|Conditions|System Overview|Hardening before Installation|Hardening during Installation|Product Security Maintenance|$|1|1.1|1.1.1|1.1.2|2|3.1|3.2|4|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|License Management, Emergency Unlock Reset Key Required Alarm Description|Procedure|Prerequisites|Documents|Conditions|Cease the License Management, Emergency Unlock Reset Key Required Alarm|$|1|1.1|2|2.1|2.1.1|2.1.2|2.2|
|Automatic Backup and Restore|Manual Backup and Restore|When to Make a Backup|Backup Procedure|When to Restore|Restore Procedure|Restore During Deployment|Restore After Deployment|Post-restore Checks|$|1|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.4.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|Correct NeLS Configuration Issues|SSL Certificate Issues|Correct Issues When the Customer Security Layer is Disabled|Correct Issues with the Customer Security Layer|$|1|2|2.1|2.2|2.3|3|3.1|3.2|3.2.1|3.2.2|
|Introduction|Functions and Concepts|Traffic Separation|O&amp;M Traffic Protection|O&amp;M Administrator Access Control|Idle Session Time-out|Brute-Force Attack Protection|Security Configuration|O&amp;M Administrator Access Control|Configure LDAP Authentication and Authorization in vMRF|Recommended Periodic Operations|Handling of Patches|Services, Ports, and Protocols|$|1|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.1.1|3.2|3.3|4|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Overview|Procedure|$|1|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Documents|Conditions|Tools|Emergency Procedure|Check Cloud Environment|Log in to the vMRF Instance|Check IP Configuration in the Active SC VM|Verify VNF Status|Recover the VNF by Deploying a New Instance|Concluding Actions|Problem Solved|Contact Cloud Administrator|Consult Next Level of Support|$|1|1.1|1.1.1|1.1.2|1.1.3|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|
|Introduction|Prerequisites|Onboarding|Prepare VNF Deployment Parameters|Procedures|Instantiate VNF|Upgrade VNF|Scale-out VNF|Scale-in VNF|Heal VNF|Terminate VNF|$|1|2|3|4|5|5.1|5.2|5.3|5.4|5.5|5.6|
|Overview|MRF Next Hop Router Unreachable Alarm Description|Cease the MRF Next Hop Router Unreachable Alarm|$|1|1.1|2|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|Overview|Procedure|Analyzing the Alarm|Clear an Alarm when SCTP Association Is Down|Clear an Alarm when Protocol Negotiation Failed|$|1|2|2.1|2.2|2.4|
|Introduction|LDAP Client|LDAP Transport Layer Security|LDAP Schemas|Standard Schema|Extended POSIX Account Schema|Ericsson Role Aliases Schema|LDAP Account Management|Extended POSIX Account Management|LDAP Lookup Behavior|LDAP Authentication Behavior|LDAP Authorization Behavior|LDAP Referral Chase|LDAP Object Classes and Attribute Types|$|1|2|2.1|3|3.1|3.2|3.3|4|4.1|5|5.1|5.2|5.3|6|
|Introduction|Scope|vMRF Performance Management Overview|Resource Service KPIs in vMRF|KPIs and PIs for Accessibility|Session Setup Success Ratio KPI|KPIs and PIs for Retainability|Session Completion Ratio KPI|Service Level Agreement PIs in vMRF|CPU Steal Time PI|Allocated Memory PI|Swap Memory PI|Allocated Disk PI|$|1|1.1|2|3|3.1|3.1.1|3.2|3.2.1|4|4.1|4.2|4.3|4.4|
|Introduction|Target Groups|Managed Object Model|MOM Concepts|MOM Overview|MIB|Managed Objects|Managed Object Creation and Deletion|Managed Object Naming|Setting Attributes|Attribute Data Types|Calling Actions|Relationships between Managed Objects|Model Element Life Cycle|Presentation of MOM|Classes|Attribute Properties|Common Attributes|Deprecated Elements in MOM|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|4.1|4.2|4.3|4.4|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Measurement Report File|File Location|Filename Format|Time Format|File Format|Supported XML Elements and Attributes|Example File|Example File in UTC Format|$|1|2|2.1|2.2|2.3|2.4|3|4|5|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|About This Document|vMRF Deployment Principles for CEE|vMRF Deployment Process for CEE|Prerequisites for vMRF Deployment|Download and Extract vMRF Software Delivery Package|vMRF Deployment Preparations for the Cloud Administrator|Prepare and Configure Cloud Hardware and Software|Define an Availability Zone for vMRF|Configure CPU Core Isolation for the vMRF Compute Hosts|Configure CPU Settings for the vMRF Compute Hosts|Configure CPU Frequency Scaling for the vMRF Compute Hosts|Configure NTP Servers|Configure Project and Users|Create Flavor|Create Network Topology|vMRF Deployment for the End User|Set Up Command-Line Access and Security|Set Up the OpenStack Heat Command-Line Client|Set Up Access and Security for Instances|Create Subnets|Upload the vMRF Image|Prepare Deployment Parameters|Instantiate and Check vMRF with One VM|Provide Initial Configuration|Check vMRF Status|Scale Out to Full VNF Size|$|1|2|3|4|4.1|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.1.5|5.1.6|5.2|5.3|6|6.1|6.1.1|6.1.2|6.2|6.3|6.4|6.5|6.6|6.7|6.8|
|Overview|Procedure|$|1|2|
|Introduction|Related Information|Key Features of Ericsson NETCONF Interface|Prerequisites|NETCONF Session|Start a NETCONF Session over SSH|Start a NETCONF Session over TLS|Session Inactivity Timer|Session End|NETCONF RPC Messages|Message &lt;hello&gt;|Message &lt;ok&gt;|Error Messages|NETCONF Data Model|Model Definition|Namespaces|Configuration and State Data|Distinguished Names|MO Attributes|MO Instances|MO Actions|NETCONF Operations|Operation &lt;get&gt;|Operation &lt;get-config&gt;|Operation &lt;edit&ndash;config&gt;|Operation &lt;action&gt;|Operation &lt;create-subscription&gt;|Operation &lt;close-session&gt;|Operation &lt;kill-session&gt;|Operation &lt;copy-config&gt;|Operation &lt;delete-config&gt;|NETCONF Notifications|Notification &lt;replayComplete&gt;|Notification &lt;notificationComplete&gt;|Non-Standard Notifications|NETCONF Validation|Create MO Instance|Delete MO Instance|Change Single-Valued Attributes|Delete MO Attribute Values|Change Sequence Attributes|Change Struct Attributes|System-Created Property|NETCONF Visibility Control|NETCONF Transaction|Transaction Start|Locking|Transaction Commit|Abort|Transaction Time-Out|NETCONF Capability &lt;action&gt;|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|NETCONF Capability &lt;notification&gt;|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|New Notifications|XML Schema|RFC Compliance Latest|NETCONF Statement of Compliance|NETCONF Capabilities|NETCONF Compliance to RFC 4741 and RFC 6241|NETCONF Compliance to RFC 4742 and RFC 6242|NETCONF Compliance to RFC 5277|NETCONF Compliance to RFC 5539|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|6.1|6.2|6.3|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|11.3|11.4|11.5|11.6|11.7|12|13|13.1|13.2|13.3|13.4|13.5|
|Introduction|Functions and Concepts|Types of Operation|Ericsson Definition of 3GPP Perceived Severity Values|Managed Object Model|Managed Object Model &ndash; SNMP|Managed Object Model &ndash; Fault Management|Configuration Management|Fault Management|File Management|$|1|2|2.1|2.2|3|3.1|3.2|4|5|6|
|$|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|License Management, Autonomous Mode Activated Alarm Description|Procedure|Prerequisites|Documents|Conditions|Cease the License Management, Autonomous Mode Activated Alarm|Correct NeLS Configuration Issues|SSL Certificate Issues|Correct Issues When the Customer Security Layer is Disabled|Correct Issues with the Customer Security Layer|$|1|1.1|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.2.2.1|2.2.2.2|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Events|Information|COM SA, CLM Cluster Node Unavailable|Information|COM SA, AMF SI Unassigned|Information|$|1|1.1.1|1.2|1.2.1|1.3|1.3.1|
|Emergency and Priority Call Handling|Configuration of Priority Pool|Manual Scaling|Manual Scaling in OpenStack|Scale-out Procedure|Scale-in Procedure|Locking a VM|EVS Configuration|Configure EVS Bandwidth and Bit Rate|Announcement Configuration|Announcement Storage|Announcement Storage Server|Local Storage|Modify the Default Language Code|Basic Announcements|Create a Basic Announcement|Variable Announcements|Logic File Type Examples|Create Logic Files|Lua Restrictions in Variable Logic Definition|Logic File Validator Tool|Check Logic File Syntax|Verify Logic File Behavior|Create a Variable Announcement|Handling of Announcement Files|Convert Existing Audio Files to vMRF Supported Format|Modifying Tone Parameters|vMRF Configuration Export and Import|vMRF Configuration Export|vMRF Configuration Import|$|1|1.1|2|2.1|2.1.1|2.1.2|3|4|4.1|5|5.1|5.1.1|5.1.2|5.2|5.3|5.3.1|5.4|5.4.1|5.4.2|5.4.2.1|5.4.3|5.4.3.1|5.4.3.2|5.4.4|5.5|5.6|6|7|7.1|7.2|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Troubleshooting|$|1|2|
|Introduction|Functions and Concepts|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|3|4|5|6|
|Introduction|Documents|Conditions|Troubleshooting Procedures|Manual Recovery Flow|Common Procedures|vMRF Status Check|vMRF Status Check on Openstack|Trouble Cases|Deployment Related Trouble Cases|VNF Does not Start|Image Extraction Problem|vMRF Instantiation not Possible in OpenStack|Cyclic Kernel Restart|VM Stuck|No Console Connection in Openstack|No ssh Connection into VM|OpenStack|Wrong cloud-init Syntax|No Running MRF Processes on SC|Scaling Related Trouble Cases|vMRF VM Joins Wrong Cluster|Signaling Related Trouble Cases|No IP Address Available for Signaling|No Connection to NextHop|No Connection to O&amp;M IP Address|Media Related Trouble Cases|No Connection to Client|Load Related Trouble Cases|Disturbances in Traffic|Speech Quality Problem|Bandwidth Limitation|Packet Loss in vSwitch|Packet Loss on Site|Announcement Related Trouble Cases|vMRF Cannot Play Announcement|$|1|1.1|1.1.1|2|2.1|2.2|2.2.1|2.2.1.1|3|3.1|3.1.1|3.1.1.1|3.1.1.2|3.1.2|3.1.3|3.1.4|3.1.5|3.1.5.1|3.1.6|3.1.7|3.2|3.2.1|3.3|3.3.1|3.3.2|3.3.3|3.4|3.4.1|3.5|3.5.1|3.5.2|3.5.2.1|3.5.2.2|3.5.2.3|3.6|3.6.1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|Procedure|$|1|2|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|About This Document|Manual Upgrade Methods for vMRF|Network-Redundant Upgrade|Export Configuration Data from the Old Version|Lock and Scale-in VMs|Deploy the New Version|vMRF In-Service Upgrade|Export Configuration Data from the Old Version|Deploy the New Version|Commit to Using the New Version|Remove the Old Version|Rollback Procedure|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.2|2.2.1|2.2.2|2.2.3|2.2.4|3|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|MRF Announcement File Missing Alarm Description|Cease the MRF Announcement File Missing Alarm|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|MRF Announcement Storage Unavailable Alarm Description|Cease the MRF Announcement Storage Unavailable Alarm|$|1|1.1|2|
|About This Document|vMRF Initial Configuration Tasks|Configure vMRF Application|Manual Configuration|Configure Security|Configure vMRF User Plane|Emergency and Priority Call Handling|Configuration of Priority Pool|EVS Configuration|Configure EVS Bandwidth and Bit Rate|Configure vMRF Signaling|Announcement Configuration|Modify the Default Language Code|Create a Basic Announcement|Create a Variable Announcement|Importing Configuration Data from NETCONF Template|Create and Import Configuration Data|Additional Security Configuration|Initial Configuration Data for the vMRF Application|Configure SNMP for Fault Management|Configure the networkManagedElementId Attribute|$|1|2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.3.1|3.1.4|3.1.4.1|3.1.5|3.1.6|3.1.6.1|3.1.6.2|3.1.6.3|3.2|3.2.1|3.2.1.1|3.3|4|5|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Installation|Actions for Renewal|Actions for Repairing Automatic Configuration|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
