|Introduction|Terms|A-E|F-K|L-P|Q-T|U-Z|Glossary|$|1|2|2.1|2.2|2.3|2.4|2.5|3|
|Introduction|Scope|Target Audience|List of FOSS Products|Free Open Source Software Credits and Copyrights|License Information and License Texts|GNU Lesser General Public License, version 2.1 (LGPL-2.1)|GNU General Public License, version 2|GNU GENERAL PUBLIC LICENSE, version 3|MIT License|MIT X License|PyCrypto License|GNU Lesser General Public License, version 3|Boost Software License 1.0|FreeBSD|Simplified BSD License|BSD|OpenLDAP|Apache License|Free Open Source Software Source Code|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|3|
|Introduction|Compute Requirements|Network Requirements|Storage Requirements|Security Requirements|Other Requirements|$|1|2|3|4|5|6|
|About This Document|vMRF Deployment Principles for OpenStack|vMRF Deployment Process for OpenStack|Prerequisites for vMRF Deployment|Download and Extract vMRF Software Delivery Package|vMRF Deployment Preparations for the Cloud Administrator|Cloud Hardware and Software Preparation and Configuration|Define an Availability Zone for vMRF|Configure CPU Core Isolation for the vMRF Compute Hosts|Configure CPU Settings for the vMRF Compute Hosts|Configure CPU Frequency Scaling for the vMRF Compute Hosts|Configure NTP Servers|Configure Project and Users|Create Flavor|Configure Heat Stack Domain Users|Create Network Topology|vMRF Deployment for the End User|Set Up Command-Line Access and Security|Set Up the OpenStack Heat Command-Line Client|Set Up Access and Security for Instances|Define Anti-Affinity Policy|Create Subnets|Prepare Deployment Parameters|Upload the vMRF Image|Instantiate and Check vMRF with One VM|Provide Initial Configuration|Check vMRF Status|Scale Out to Full VNF Size|$|1|2|3|4|4.1|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.1.5|5.1.6|5.2|5.3|5.4|6|6.1|6.1.1|6.1.2|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|
|Introduction|Configure SSL Connection|Enable the Customer Security Layer|Disable the Customer Security Layer|Update SSL Certificates|Configure the NeLS Connection|$|1|2|2.1|2.2|2.3|3|
|Function Overview|vMRF Architecture|Virtual Machine Functions in vMRF|Roaming SC in vMRF|Audio Codec Selection Principles|Audio Announcements|Detection of Dual Tone Multi Frequency (DTMF) Tones|Forwarding of DTMF Tones through Audio Conference|Playing Tones|Emergency and Priority Call Handling|Audio Conferencing|Overload Protection|Shared Storage|Automatic Backup and Restore|Address Resolution and Next Hop Supervision|Media Stream Processing Services|Adaptive Multi-Rate (AMR) Speech Coder Service|Adaptive Multi-Rate Wideband (AMR-WB) Speech Coder Service|Announcement Service|Audio Mixing Service|DTMF Receiver Service (DTMF-R)|DTMF Sender Service (DTMF-S)|Enhanced Voice Services (EVS)|G.729 Service (G.729)|Jitter Handling Service|Pulse Code Modulation Service (PCM)|Real-Time Transport Protocol and Real-Time Transport Control Protocol Service (RTP/RTCP)|Tone Sender Service|User Plane Frame Handler Service (UP FH)|Support for Watchdog Feature|VMware Tools|Limitations and Differences|$|1|1.1|1.2|1.3|2|3|4|5|6|7|8|9|10|11|12|13|13.1|13.2|13.3|13.4|13.5|13.6|13.7|13.8|13.9|13.10|13.11|13.12|13.13|14|15|16|
|Understanding User Management|Key User Management Concepts|User Authentication|User Management Authentication Procedures|User Management Authentication-Related Alarm|$|1|1.1|1.2|2|3|
|Event Description|Handle HeartBeat|Missing Heartbeat Event|Missing Alarm|Missing Alert|Configuration|Subscription|$|1|2|2.1|2.2|2.3|3|4|
|$|
|Introduction|Related Information|Key Features of ECLI|ECLI Modes|Start an ECLI Session|Use ECLI Online Features|Static Help|Information Model Help|Context-Sensitive Help|Auto-Completion|Navigate in MIB|Display ME Status|Change ME Configuration|Execute MO Actions|$|1|1.1|1.2|2|3|4|4.1|4.2|4.3|4.4|5|6|7|8|
|Introduction|Functions and Concepts|Modes of Operation|Autonomous Mode|Emergency Unlock Mode|Integration Unlock|Locked Mode|Normal Mode|LM Managed Object Model|Configuration Management|Fault Management|vMRF Licenses|Consumer Communication Base Package|Enhanced Voice Services Value Package|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|3|4|5|6|6.1|6.2|
|Introduction|CPI Library Types|Document Formats|Active Library Explorer Variants|Active Library Explorer Functions|Active Library Explorer Window|Frames|Library Collections|Active Library Explorer Toolbar|Context Menu|Basic Functions|Back and Forward|Search|Document View Search Syntax|Instant Document Search|Advanced Search Options|Search Library Collections|Change Sort Order|Show All Titles and Show Context|Next Search Hit|Search in Document Frame|PDF and Excel Document Searches|Navigation|Library Front Page Images|Filter Displayed Contents|Set Filters|Hide Filter Library Contents|Reset Filters|Add Bookmarks|Copy Links to Clipboard|Copy Links to Clipboard in Microsoft Internet Explorer|Copy Links to Clipboard in Other Web Browser|Create and Display Annotations|Provide Feedback|Add Note|Edit Note|Delete Note|Print|Save Document to Local Disk|View PDF Version of Current Document|Open a Document in Separate Window|Get Help|Find Active Library Explorer Version|Active Library Explorer Server|Active Library Explorer for Windows|Download Latest Active Library Explorer Version|Access Active Library Explorer Libraries Using URL Hyperlinks|Internet Address and Parameters|Open Libraries|Search for Documents|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.2.4|3.2.5|3.2.6|3.2.7|3.2.8|3.2.9|3.3|3.4|3.5|3.5.1|3.5.2|3.5.3|3.6|3.7|3.7.1|3.7.2|3.8|3.9|3.9.1|3.9.2|3.9.3|3.10|3.11|3.12|3.13|4|5|5.1|5.2|5.3|6|6.1|6.2|6.3|
|About Ericsson Library Explorer|Introducing Ericsson Library Explorer|CPI Library Types|Document Formats|Ericsson Library Explorer Variants|Ericsson Library Explorer Functions|Ericsson Library Explorer, Library View|Ericsson Library Explorer, Content View|Content View Overview|Search|Search Syntax|How to Search|Search Results|Navigate|Provide Feedback|Add Note|View Notes|Edit or Delete Note|Content Rating|Copy Links to Clipboard|Show Document in PDF|Save Document as PDF to Local Disk|$|1|1.1|1.2|1.3|1.4|1.5|2|3|3.1|3.2|3.2.1|3.2.2|3.2.3|3.3|3.4|3.4.1|3.4.2|3.4.3|3.4.4|3.5|3.6|3.7|
|General|Statement of Compliance|ETSI NFV Standards|ITU-T Standards|ETSI Standards|3GPP Standards|IETF Standards|IEEE Standards|GSMA Standards|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|
|$|
|Overview|Compute Resource Threshold Value Exceeded Alarm Description|Cease the Compute Resource Threshold Value Exceeded Alarm|Perform Concluding Routines|$|1|1.1|2|2.1|
|Introduction|Functions and Concepts|NBI User Authentication|NBI User Authorization|Transport Layer Security|Types of Operation|Managed Object Model|Rules for Default Roles|Configuration Management|$|1|2|2.1|2.2|2.3|2.4|3|3.1|4|
|Introduction|Command Access Restriction|mrf_appl Commands|announcement-counters|announcement-status|cache-test|compute-resource|context-info|h248-counters|h248interface-counters|internals|license-info|overload-control|sctp-pm-counters|sctp-status|service-pm-counters|smms-counters|status|ipp Commands|ipp conf|ipp debug-counters|ipp discard-counters|ipp dpdk-counters|ipp error-counters|ipp ethdev-counters|ipp internals|ipp mpd-usage|ipp neigh|ipp ping|ipp pm-counters|ipp signal-counters|mpd Commands|internals|vMRF Utility Scripts|verify_vmrf_cluster_status.py|verify_vmrf_node_status.py|collectData.py|cluster|mrf_export_conf.py|mrf_import_conf.py|Linux Commands|$|1|2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|4.8|4.9|4.10|4.11|4.12|5|5.1|6|6.1|6.2|6.3|6.4|6.5|6.6|7|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|General Impact|General Impact for vMRF 1.1|General Impact for vMRF 1.2|General Impact for vMRF 1.3|General Impact for vMRF 1.4|General Impact for vMRF 1.5.0|General Impact for vMRF 1.6.0|General Impact for vMRF 1.7.0|Other Network Elements|Interfaces|Interfaces in vMRF 1.1|Interfaces in vMRF 1.2|Interfaces in vMRF 1.3|Interfaces in vMRF 1.4|Interfaces in vMRF 1.5.0|Interfaces in vMRF 1.6.0|Interfaces in vMRF 1.7.0|Summary of Impacts per Feature|Impact on vMRF Features|Impact on vMRF Features from vMRF 1.0 to vMRF 1.1|Impact on vMRF Features from vMRF 1.1 to vMRF 1.2|Impact on vMRF Features from vMRF 1.2 to vMRF 1.3|Impact on vMRF Features from vMRF 1.3 to vMRF 1.4|Impact on vMRF Features from vMRF 1.4 to vMRF 1.5.0|Impact on vMRF Features from vMRF 1.5.0 to vMRF 1.6.0|Impact on vMRF Features from vMRF 1.6.0 to vMRF 1.7.0|$|1|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|4|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|##1_0_40#1_0_60#1_0_70#1_0_78###1_0_1###1_0_40#1_0_60#1_0_70#1_0_78#1_0_7c#1_0_7e#1_0_1###1_0_40#1_0_60#1_0_70#1_0_78#1_0_7c#1_0_7e#1_0_1
|Overview|Service Level Agreement Violation Alarm Description|Cease the Service Level Agreement Violation Alarm|Perform Concluding Routines|$|1|1.1|2|2.1|
|Media Stream Recording|Checking the Use of MSR for vMRF|$|1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|MRF IP Auto-Configuration Failure Alarm Description|Cease the MRF IP Auto-Configuration Failure Alarm|Perform Concluding Routines|$|1|1.1|2|2.1|
|Introduction|Prerequisites|Tools|Conditions|System Overview|Hardening during vMRF Life Cycle|Hardening before Installation|Hardening during Installation|Product Security Maintenance|$|1|1.1|1.1.1|1.1.2|2|3|3.1|3.2|4|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|License Management, Emergency Unlock Reset Key Required Alarm Description|Procedure|Prerequisites|Documents|Conditions|Cease the License Management, Emergency Unlock Reset Key Required Alarm|$|1|1.1|2|2.1|2.1.1|2.1.2|2.2|
|Description|Procedure|Check Alarm Status|$|1|2|2.1|
|Automatic Backup and Restore|Manual Backup and Restore|When to Make a Backup|Backup Procedure|When to Restore|Restore Procedure|Restore during Deployment|Restore after Deployment|Post-restore Checks|$|1|2|2.1|2.2|2.3|2.4|2.4.1|2.4.2|2.4.3|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Alarm Description|Prerequisites|Documents|Tools|Conditions|Procedure|Correct NeLS Configuration Issues|SSL Certificate Issues|Correct Issues When the Customer Security Layer is Disabled|Correct Issues with the Customer Security Layer|$|1|2|2.1|2.2|2.3|3|3.1|3.2|3.2.1|3.2.2|
|Introduction|Functions and Concepts|Traffic Separation|O&M Traffic Protection|O&M Administrator Access Control|Reserved POSIX Groups|Idle Session Time-out|Brute-Force Attack Protection|Services, Ports, and Protocols|Security Configuration|O&M Administrator Access Control|Configure LDAP Authentication and Authorization in vMRF|Recommended Periodic Operations|Handling of Patches|Privacy|Notice and Consent|Personal Data Classification|$|1|2|2.1|2.2|2.3|2.3.1|2.4|2.5|3|4|4.1|4.1.1|4.2|4.3|5|5.1|5.2|
|Overview|MRF Instance Overloaded Alarm Description|Procedure|Cease the MRF Instance Overloaded Alarm|Perform Concluding Routines|$|1|1.1|2|2.1|2.2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Alarm Description|Prerequisites|Procedure|$|1|1.1|1.2|2|
|Introduction|Prerequisites|Documents|Conditions|Tools|Emergency Procedure|Check Cloud Environment|Log in to the vMRF Instance|Check IP Configuration in the Active SC VM|Verify VNF Status|Recover the VNF by Deploying a New Instance|Concluding Actions|Problem Solved|Contact Cloud Administrator|Consult Next Level of Support|$|1|1.1|1.1.1|1.1.2|1.1.3|2|2.1|2.2|2.3|2.4|2.5|3|3.1|3.2|3.3|
|Introduction|Prerequisites|Prepare VNF Deployment Parameters|Onboarding|Small Stack Scenario|Onboard the Virtual Deployment Package on VNF-LCM|Full Stack Scenario|Onboard the Virtual Deployment Package on EO|Onboard the Virtual Deployment Package on VNF-LCM|Procedures|Instantiate VNF|Upgrade VNF|Scale VNF|Heal VNF|Terminate VNF|$|1|2|3|4|4.1|4.1.1|4.2|4.2.1|4.2.2|5|5.1|5.2|5.3|5.4|5.5|
|Overview|MRF Next Hop Router Unreachable Alarm Description|Cease the MRF Next Hop Router Unreachable Alarm|Perform Concluding Routines|$|1|1.1|2|3|
|Introduction|Prerequisites|Onboarding|Procedures|Instantiate VNF|Scale VNF|Terminate VNF|$|1|2|3|4|4.1|4.2|4.3|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|Trademarks Used in Library|$|1|
|$|
|About This Document|vMRF Deployment Principles for VMware|vMRF Deployment Process for VMware|Prerequisites for vMRF Deployment|Download and Extract vMRF Software Delivery Package|vMRF Deployment Preparations for the Cloud Administrator|Cloud Hardware and Software Preparation and Configuration|Group Compute Nodes for vMRF into DRS Cluster|Create Network Topology|vMRF Deployment for the End User|Initial VNF Configuration Data for Deployment|Create VNF Configuration ISO File|Deploy the OVF Template|Power On vMRF vApp|Check vMRF Status|$|1|2|3|4|4.1|5|5.1|5.1.1|5.2|6|6.1|6.1.1|6.2|6.3|6.4|
|Overview|MRF H.248 Link Unavailable Alarm Description|Procedure|Analyze the Alarm|Clear an Alarm when SCTP Association Is Down|Local Endpoint Configuration Fault|Remote Endpoint Configuration Fault|Clear an Alarm when No ServiceChange Response Is Received from MTAS|Clear an Alarm when Protocol Negotiation Failed|Perform Concluding Routines|$|1|1.1|2|2.1|2.2|2.2.1|2.2.2|2.3|2.4|2.5|
|Introduction|LDAP Client|LDAP Transport Layer Security|LDAP Schemas|Standard Schema|Extended POSIX Account Schema|Ericsson Role Aliases Schema|LDAP Account Management|Extended POSIX Account Management|LDAP Lookup Behavior|LDAP Authentication Behavior|LDAP Authorization Behavior|LDAP Referral Chase|LDAP Object Classes and Attribute Types|$|1|2|2.1|3|3.1|3.2|3.3|4|4.1|5|5.1|5.2|5.3|6|
|Introduction|Related Information|Key Features of Ericsson NETCONF Interface|Prerequisites|NETCONF Session|Start a NETCONF Session over SSH|Start a NETCONF Session over TLS|Session Inactivity Timer|Session End|NETCONF RPC Messages|Message <hello>|Message <ok>|Error Messages|NETCONF Data Model|Model Definition|Namespaces|Configuration and State Data|Distinguished Names|MO Attributes|MO Instances|MO Actions|NETCONF Operations|Operation <get>|Operation <get-config>|Operation <editconfig>|Operation <action>|Operation <create-subscription>|Operation <close-session>|Operation <kill-session>|Operation <copy-config>|Operation <delete-config>|NETCONF Notifications|Notification <replayComplete>|Notification <notificationComplete>|Non-Standard Notifications|NETCONF Validation|Create MO Instance|Delete MO Instance|Change Single-Valued Attributes|Delete MO Attribute Values|Change Sequence Attributes|Change Struct Attributes|System-Created Property|NETCONF Visibility Control|NETCONF Transaction|Transaction Start|Locking|Transaction Commit|Abort|Transaction Time-Out|NETCONF Capability <action>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|NETCONF Capability <notification>|Overview|Dependencies|Capability Identifier|New Operations|Modifications to Existing Operations|New Notifications|XML Schema|RFC Compliance Latest|NETCONF Statement of Compliance|NETCONF Capabilities|NETCONF Compliance to RFC 4741 and RFC 6241|NETCONF Compliance to RFC 4742 and RFC 6242|NETCONF Compliance to RFC 5277|NETCONF Compliance to RFC 5539|$|1|1.1|1.2|1.3|2|2.1|2.2|2.3|2.4|3|3.1|3.2|3.3|4|4.1|4.2|4.3|4.4|4.5|4.6|4.7|5|5.1|5.2|5.3|5.4|5.5|5.6|5.7|5.8|5.9|6|6.1|6.2|6.3|7|7.1|7.2|7.3|7.4|7.5|7.6|7.7|8|9|9.1|9.2|9.3|9.4|9.5|10|10.1|10.2|10.3|10.4|10.5|11|11.1|11.2|11.3|11.4|11.5|11.6|11.7|12|13|13.1|13.2|13.3|13.4|13.5|
|Introduction|Scope|vMRF Performance Management Overview|Resource Service KPIs in vMRF|KPIs and PIs for Accessibility|Session Setup Success Ratio KPI|KPIs and PIs for Retainability|Session Completion Ratio KPI|Service Level Agreement PIs in vMRF|CPU Steal Time PI|Allocated Memory PI|Swap Memory PI|Allocated Disk PI|$|1|1.1|2|3|3.1|3.1.1|3.2|3.2.1|4|4.1|4.2|4.3|4.4|
|Introduction|Network Connectivity Overview|Configuration|General Description|vNIC and IP Address Configuration|Cloud Platform IP Address Pools Provided for vMRF VMs|Provision of IP Address Pools in OpenStack, using cloud-init|Provision of IP Address Pools in CEE, using cloud-init|Provision of IP Address Pools in VMware vSphere Client, using cloud-init|Provision of IP Address Pools in VMware vCloud Director, using cloud-init|Manual IP Address Configuration during Deployment and Scaling|Manual IP Address Configuration in VMware vCloud Director|Manual IP Address Configuration in VMware vSphere Client|Redundancy|vMRF SC Redundancy|L2/L3 Router Redundancy|Connectivity|Internal Connectivity|External Connectivity|O&M Connectivity|H.248 Connectivity to MTAS|Core Media Network Connectivity|$|1|2|3|3.1|3.2|4|4.1|4.2|4.3|4.4|5|5.1|5.2|6|6.1|6.2|7|7.1|7.2|7.2.1|7.2.2|7.2.3|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|MRF IP Address Collision Alarm Description|Procedure|Resolve IP Address Collision in Deployments with Manual IP Allocation|Alarm Resolution in Deployments with Cloud Pool based IP Allocation|Resolve IP Address Collision in OpenStack and CEE Deployments with Cloud Pool based IP Allocation|Resolve IP Address Collision in VMware vCloud Director Deployments with Cloud Pool based IP Allocation|Resolve IP Address Collision in VMware vSphere Deployments with Cloud Pool based IP Allocation|Resolve IP Address Collision by Reconfiguring Peer IP Interface|Perform Concluding Routines|$|1|1.1|2|2.1|2.2|2.2.1|2.2.2|2.2.3|2.3|2.4|
|Introduction|Measurement Report File|File Location|Filename Format|Time Format|File Format|Supported XML Elements and Attributes|Example File|Example File in UTC Format|$|1|2|2.1|2.2|2.3|2.4|3|4|5|
|$|
|Description|Procedure|Change Heartbeat Interval|$|1|2|2.1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|About This Document|vMRF Deployment Principles for CEE|vMRF Deployment Process for CEE|Prerequisites for vMRF Deployment|Download and Extract vMRF Software Delivery Package|vMRF Deployment Preparations for the Cloud Administrator|Cloud Hardware and Software Preparation and Configuration|Define an Availability Zone for vMRF|Configure CPU Core Isolation for the vMRF Compute Hosts|Configure CPU Settings for the vMRF Compute Hosts|Configure CPU Frequency Scaling for the vMRF Compute Hosts|Configure NTP Servers|Configure Project and Users|Create Flavor|Create Network Topology|vMRF Deployment for the End User|Set Up Command-Line Access and Security|Set Up the OpenStack Heat Command-Line Client|Set Up Access and Security for Instances|Define Anti-Affinity Policy|Create Subnets|Prepare Deployment Parameters|Upload the vMRF Image|Instantiate and Check vMRF with One VM|Provide Initial Configuration|Check vMRF Status|Scale Out to Full VNF Size|$|1|2|3|4|4.1|5|5.1|5.1.1|5.1.2|5.1.3|5.1.4|5.1.5|5.1.6|5.2|5.3|6|6.1|6.1.1|6.1.2|6.2|6.3|6.4|6.5|6.6|6.7|6.8|6.9|
|Overview|MRF Instance 80% Capacity Limit Exceeded Alarm Description|Procedure|Cease the MRF Instance 80% Capacity Limit Exceeded Alarm|Perform Concluding Routines|$|1|1.1|2|2.1|2.2|
|Introduction|Related Information|Key Features of ECLI|Prerequisites|ECLI Version|CLI Concepts|CLI Modes|CLI Session|CLI Transaction|CLI Position|CLI Prompt|Context-Sensitive Help|Auto-Completion|Case Correction|Escaping of Special Characters|CLI Comments|Visibility Levels|Automatic Correction of ManagedElement ID|Limitations|CLI Commands|Summary of CLI Commands|Success and Error Indications|Display Information|Change and Display the Position in MO Tree|Change MO Attributes|Create MO|Reinitialize MO|Delete MO|MO Actions|Copy and Paste Configuration Data|Change Password Command|Display CLI Version|Pipe Utility Commands|Help Command|Deprecated Actions|Deprecated Options|CLI Commands Limitations|Terminal Properties|Terminal Types|Default Key Bindings|$|1|1.1|1.2|1.3|1.4|2|2.1|2.2|2.3|2.4|2.5|2.6|2.7|2.8|2.9|2.10|2.11|2.12|2.13|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|3.9|3.10|3.11|3.12|3.13|3.14|3.15|3.16|3.17|4|4.1|4.2|
|Introduction|Functions and Concepts|Types of Operation|Ericsson Definition of 3GPP Perceived Severity Values|Managed Object Model|Managed Object Model  SNMP|Managed Object Model  Fault Management|Configuration Management|Fault Management|File Management|$|1|2|2.1|2.2|3|3.1|3.2|4|5|6|
|$|
|About This Document|vMRF Deployment Principles for VMware vCloud Director|vMRF Deployment Process for VMware vCloud Director|Prerequisites for vMRF Deployment|Configure vCloud Director to Assign Unique UUIDs|Download and Extract vMRF Software Delivery Package|vMRF Deployment Preparations for the Cloud Administrator|Cloud Hardware and Software Preparation and Configuration|Group Compute Nodes for vMRF into DRS Cluster|Create Network Topology|vMRF Deployment for the End User|Initial VNF Configuration Data for Deployment|Create VNF Configuration ISO File|Onboard to the Catalog|Deploy vApp from the Catalog|Provide Initial Configuration from VNF Configuration ISO File|Power on vMRF vApp|Scaling Out to Full VNF Size|Scale-out Using the Catalog|Check vMRF Status|$|1|2|3|4|4.1|4.2|5|5.1|5.1.1|5.2|6|6.1|6.1.1|7|8|9|10|11|11.1|12|
|Introduction|License Management, Autonomous Mode Activated Alarm Description|Procedure|Prerequisites|Documents|Conditions|Cease the License Management, Autonomous Mode Activated Alarm|Correct NeLS Configuration Issues|SSL Certificate Issues|Correct Issues When the Customer Security Layer is Disabled|Correct Issues with the Customer Security Layer|$|1|1.1|2|2.1|2.1.1|2.1.2|2.2|2.2.1|2.2.2|2.2.2.1|2.2.2.2|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|2.1|3|4|5|6|
|Events|MRF H.248 Link Recovered after Temporary Outage|Information|COM SA, CLM Cluster Node Unavailable|Information|MRF Compute Resource Lost|Information|$|1|1.1|1.1.1|1.2|1.2.1|1.3|1.3.1|
|Configure the Compression for Performance Management XML Files|vMRF Configuration Export and Import|Export vMRF Configuration|Import vMRF Configuration|Manual Scaling|Manual Scaling in OpenStack|Scale-out Procedure|Scale-in Procedure|Manual Scaling in VMware|Scale-out Procedure in vCenter Environment|Scale-in Procedure in vCenter Environment|Scale-out Procedure in vCloud Environment|Scale-in Procedure in vCloud Environment|Lock a VM|Announcement Configuration|Announcement Storage|Announcement Storage Server|Local Storage|Modify the Default Language Code|Basic Announcements|Create a Basic Announcement|Variable Announcements|Logic File Type Examples|Create Logic Files|Lua Restrictions in Variable Logic Definition|Logic File Validator Tool|Check Logic File Syntax|Verify Logic File Behavior|Create a Variable Announcement|Handling of Announcement Files|Converting Existing Audio Files to vMRF Supported Format|Modify Tone Parameters|Codec Configuration|Configure EVS|Configure EVS Bandwidth and Bit Rate|$|1|2|2.1|2.2|3|3.1|3.1.1|3.1.2|3.2|3.2.1|3.2.2|3.2.3|3.2.4|4|5|5.1|5.1.1|5.1.2|5.2|5.3|5.3.1|5.4|5.4.1|5.4.2|5.4.2.1|5.4.3|5.4.3.1|5.4.3.2|5.4.4|5.5|5.6|6|7|7.1|7.1.1|
|$|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Collect Data for vMRF Troubleshooting|Overview of Data Collection|$|1|2|3|
|Introduction|Functions and Concepts|Managed Object Model|Configuration Management|Fault Management|Security Management|$|1|2|3|4|5|6|
|Introduction|Prerequisites|Troubleshooting Procedures|Perform Manual Recovery|Common Procedures|vMRF Status Check|Check vMRF Status on OpenStack|Trouble Cases|Deployment Related Trouble Cases|VNF Does not Start|Image Extraction Problem|Instantiation not Possible in OpenStack|Cyclic Kernel Restart|VM Stuck|No Console Connection in OpenStack|No ssh Connection into VM|No ssh Connection into VM in OpenStack|Wrong cloud-init Syntax|No Running MRF Processes on SC VM|VNF Restarts Unexpectedly|Scaling Related Trouble Cases|vMRF VM Joins Wrong Cluster|Signaling Related Trouble Cases|No Connection to NextHop|No Connection to O&M IP Address|Media Related Trouble Cases|No Connection to Client|Load Related Trouble Cases|Disturbances in Traffic|Speech Quality Problem|Bandwidth Limitation|Packet Loss in vSwitch|Packet Loss on Site|Announcement Related Trouble Cases|vMRF Cannot Play Announcement|Client Cannot Hear Announcement|$|1|1.1|2|2.1|2.2|2.2.1|2.2.1.1|3|3.1|3.1.1|3.1.1.1|3.1.1.2|3.1.2|3.1.3|3.1.4|3.1.5|3.1.5.1|3.1.6|3.1.7|3.1.8|3.2|3.2.1|3.3|3.3.1|3.3.2|3.4|3.4.1|3.5|3.5.1|3.5.2|3.5.2.1|3.5.2.2|3.5.2.3|3.6|3.6.1|3.6.2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF Component Cleanup Failed|$|1|2|2.1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF Component Instantiation Failed|$|1|2|2.1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Alarm Description|Procedure|Handle Alarm COM SA, AMF SI Unassigned|$|1|2|2.1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Alarm Description|Procedure|Handle Alarm COM SA, CLM Cluster Node Unavailable|$|1|2|2.1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Alarm Description|Procedure|Handle Alarm COM SA, Proxy Status of a Component Changed to Unproxied|$|1|2|2.1|
|Alarm Description|Procedure|Handle Alarm COM SA, MDF Detected Model Error|$|1|2|2.1|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|vMRF Media Stream Recording Active Alarm Description|Procedure|$|1|1.1|2|
|Introduction|Functions and Concepts|Types of Operation|Managed Object Model|Configuration Management|$|1|2|2.1|3|4|
|About This Document|Manual Upgrade Methods for vMRF|Network-Redundant Upgrade|Export Configuration Data from the Old Version|Lock and Scale-in VMs|Deploy the New Version|vMRF In-Service Upgrade|Export Configuration Data from the Old Version|Deploy the New Version|Commit to Using the New Version|Remove the Old Version|Rollback Procedure|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.2|2.2.1|2.2.2|2.2.3|2.2.4|3|
|Introduction|Target Groups|Managed Object Model|MOM Concepts|MOM Overview|MIB|Managed Objects|Managed Object Creation and Deletion|Managed Object Naming|Setting Attributes|Attribute Data Types|Calling Actions|Relationships between Managed Objects|Model Element Life Cycle|Presentation of MOM|Classes|Attribute Properties|Common Attributes|Deprecated Elements in MOM|$|1|1.1|2|2.1|2.2|3|3.1|3.2|3.3|3.4|3.5|3.6|3.7|3.8|4|4.1|4.2|4.3|4.4|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|MRF Announcement File Missing Alarm Description|Cease the MRF Announcement File Missing Alarm|Perform Concluding Routines|$|1|1.1|2|2.1|
|Understanding User Management|Key User Management Concepts|User Authorization|Permission Types|Default Roles|User Management Authorization Procedures|Rules for Default Roles|$|1|1.1|1.2|1.3|1.4|2|3|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Introduction|Prerequisites|Procedure|$|1|1.1|2|
|Overview|MRF Announcement Storage Unavailable Alarm Description|Cease the MRF Announcement Storage Unavailable Alarm|Perform Concluding Routines|$|1|1.1|2|2.1|
|About This Document|vMRF Initial Configuration Tasks|Configure vMRF Application|Manual Configuration|Configure Security|Configure vMRF User Plane|Emergency and Priority Call Handling|Configure the Priority Pool|Configure EVS|Configure EVS Bandwidth and Bit Rate|Configure vMRF Signaling|Announcement Configuration|Modify the Default Language Code|Create a Basic Announcement|Create a Variable Announcement|Importing Configuration Data from NETCONF Template|Create and Import Configuration Data|Additional Security Configuration|Initial Configuration Data for the vMRF Application|Configure SNMP for Fault Management|Configure Identity of the Managed Element|$|1|2|3|3.1|3.1.1|3.1.2|3.1.3|3.1.3.1|3.1.4|3.1.4.1|3.1.5|3.1.6|3.1.6.1|3.1.6.2|3.1.6.3|3.2|3.2.1|3.2.1.1|3.3|4|5|
|Introduction|Alarm Description|Prerequisites|Procedure|Analyzing Alarm|Actions for Installation|Actions for Renewal|Actions for Repairing Automatic Configuration|$|1|1.1|1.2|2|2.1|2.2|2.3|2.4|
|Introduction|Description of Changes|New and Changed Documents|Library Overview|Product Overview|Planning|Installation|Initial Configuration|Operation and Maintenance|Emergency|Removed Documents|$|1|2|2.1|2.1.1|2.1.2|2.1.3|2.1.4|2.1.5|2.1.6|2.1.7|2.2|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
|$|
