1 Introduction
This document acts as an entry point to the operation and maintenance procedures within virtualized MTAS. It specifies the tasks required to operate the system and references the documents needed to complete those tasks.
The tasks are primarily configuration-oriented, but can be ones that must be executed as actions.
The tasks are grouped into functional areas where appropriate, and presented on a functional level rather than managed object level. This allows mapping of a functional need into a set of documents required to achieve that functional need. This document can therefore be considered a functional or task based index to the virtualized MTAS operation and maintenance documentation suite.
1.1 Prerequisites
This section describes the prerequisites, which must be fulfilled before using the procedures.
1.1.1 Tools
MTAS provides several Northbound Interfaces (NBIs) for operation and maintenance. The included NBIs are as follows:
- NETCONF
The NETCONF interface is a machine to machine interface for configuration management of MTAS using the NETCONF protocol. For details, refer to Ericsson NETCONF Interface.
- ECLI
The Ericsson Command-Line Interface (ECLI) is a terminal-based command-line interface that allows the user to monitor and manage the MTAS. The ECLI enables the user to interact with the Management Information Base (MIB) through common, generic-purpose commands. For details, refer to Ericsson Command-Line Interface.
- SFTP
The SSH File Transfer Protocol (SFTP) is an interface for uploading and downloading files.
- SNMP
The Simple Network Management Protocol (SNMP) is an interface for reporting alarms through SNMP notifications.
To access the NBIs, except SNMP, a user must be authenticated and authorized. All user information is stored in a centralized Lightweight Directory Access Protocol (LDAP) server that provides authentication for NBIs. After a user passes the authentication, one or more roles are assigned to this user.
The Role-Based Access Control (RBAC) and the Target-Based Access Control (TBAC) authorization are used to ascertain the user access rights. For details, refer to Security Management for ECLI, NETCONF, and SFTP Users.
1.2 Generic Note for Configuration
To avoid traffic loss in the services provided by the MTAS, it is mandatory to create backup after any change has been made in the MTAS configuration that is meant to be persistent.
2 Services
The MTAS can fulfill several different functional roles in a Multimedia Telephony solution, such as Multimedia Telephony (MMTel) Application Server (AS), Scheduled Conference Application Server (Conf AS), Service Centralization and Continuity Application Server (SCC-AS), and SIP Trunking application server (ST AS).
The following sections describe tasks that are configurable for the offered services per AS.
2.1 MMTel AS Services
2.1.1 Call Handling
Table 1 lists the configuration-related tasks for call handling.
|
Configuring |
Function |
Reference |
|---|---|---|
|
MMTel administrative state |
Basic voice and multimedia communication (MMTel) |
|
|
Wholesale for MMTel | ||
|
MMTel terminated unregistered behavior | ||
|
Service data
| ||
|
Feature tag processing | ||
|
Prefix for voice and video calls (routing through BGCF (1)) | ||
|
Configuration and provisioning options for other services | ||
|
Media policy (block certain media streams in offered SDP)(2)) | ||
|
Control media streams of an established IP Multimedia session
|
Hold communication |
|
|
Announcement configuration | ||
|
Wholesale for Hold | ||
|
Announcement |
Communication Diversion (CDIV) |
|
|
Default voice mail address configuration | ||
|
Additional configuration (response values, timers, blacklist, and so on) | ||
|
DTM-related configuration | ||
|
Diversion for SSC | ||
|
CDIV administrative state | ||
|
Wholesale for CDIV | ||
|
Flexible Communication Distribution for CDIV | ||
|
Suppression by Flexible Service Format Selection (FSFS) | ||
|
Subscription rules (with examples) | ||
|
Diversion after BYE | ||
|
Service data
| ||
|
FCD administrative state |
Flexible Communication Distribution (FCD) |
|
|
Announcement | ||
|
Auto-answer-avoidance announcement | ||
|
Distribution to primary devices of the user | ||
|
Prefixes to specify routing in the network for non-IMS targets | ||
|
Subscription rules (with examples) | ||
|
Communication Diversion interaction with FCD | ||
|
Suppression by FSFS | ||
|
Wholesale for FCD | ||
|
FCD to primary devices of the user
| ||
|
Caller preference filtering | ||
|
Service data
| ||
|
FCD in case of "486 Busy Here" response | ||
|
CW administrative state |
Communication Waiting (CW) |
|
|
Announcement | ||
|
Communication Diversion interaction with CW | ||
|
Alerting timer | ||
|
Operate mode | ||
|
Wholesale for CW | ||
|
CW indication | ||
|
Service data
| ||
|
CC administrative state |
Communication Completion (CC) |
|
|
Communication Diversion interaction with CC | ||
|
Initial Filter Criteria in HSS | ||
|
CC timers | ||
|
CC notifier-configured minimum | ||
|
Announcements | ||
|
Additional configuration
| ||
|
Interactive Voice Recognition (IVR) specific attributes | ||
|
Wholesale for CC | ||
|
Service data
| ||
|
3PTY administrative state |
Three Party Call (3PTY) |
|
|
Suppression by FSFS | ||
|
Wholesale for 3PTY | ||
|
Service data
| ||
|
Conference administrative state |
Ad-hoc Conference |
|
|
Answer confirmation | ||
|
AS chaining (maximum number of sessions) | ||
|
Ad-hoc Conference configuration | ||
|
Wholesale for Ad-hoc Conference | ||
|
Service data
| ||
|
ECT administrative state |
Explicit Communication Transfer (ECT) |
|
|
Suppression by FSFS | ||
|
Wholesale for ECT | ||
|
Service data
| ||
|
STOD administrative state |
Session Transfer to Own Device (STOD) |
|
|
Auto-Answer Avoidance | ||
|
Suppression by FSFS | ||
|
Subscription rules (with examples) | ||
|
Wholesale for STOD | ||
|
Session timer | ||
|
Service data
| ||
|
OCT administrative state |
Operator Controlled Transfer (OCT) |
|
|
OCT configuration | ||
|
Announcement | ||
|
Call Return administrative state |
Call Return |
|
|
Call Return configuration
| ||
|
Announcement | ||
|
Wholesale for Call Return | ||
|
Auto call-back | ||
|
Service data
| ||
|
Hotline administrative state |
Hotline |
|
|
Announcements | ||
|
Wholesale for Hotline | ||
|
Service data
| ||
(1) Breakout Gateway Control Function (BGCF)
(2) Session Description Protocol (SDP)
(3) Serving Call
Session Control Function (S-CSCF)
2.1.2 Communication Barring and Address Policing
Table 2 lists the configuration-related tasks for Communication Barring (CB) and Address Policing.
|
Configuring |
Function |
Reference |
|---|---|---|
|
CB administrative state |
Communication Barring |
|
|
Barring rules | ||
|
User barring category (create, modify, delete) | ||
|
Operator barring category (create, modify, delete) | ||
|
Localness barring categories (modify) | ||
|
Barring program in single scheme (create, modify, delete) | ||
|
Barring program in multiple scheme (create, modify, delete) | ||
|
Global white list | ||
|
Dynamic Black List | ||
|
Announcement | ||
|
SIP error response codes from MTAS configuration | ||
|
Cause value | ||
|
Wholesale for CB | ||
|
Subscription rules | ||
|
Service data
| ||
|
Dial Plan administrative state |
Dial Plan |
|
|
Dial Plan configuration
| ||
|
Per-VTP Dial Plan
| ||
|
MCID administrative state |
Malicious Communication Identification (MCID) |
MTAS Malicious Communication Identification Management Guide |
|
Reporting method (CDS / local storage) | ||
|
CDS configuration | ||
|
Closure of ACR files for local storage | ||
|
Disk full and disk not full percentage levels | ||
|
File transfer | ||
|
Access rights to log files and directories | ||
|
Announcement | ||
|
Wholesale for MCID | ||
|
Service data
| ||
|
Long-distance Mobile Number Policing administrative state |
Address Policing |
|
|
Additional configuration
| ||
|
Wholesale for Long-distance Mobile Number Policing |
(1) Incoming
Communication Barring (ICB)
2.1.3 Number Handling
Table 3 lists the configuration-related tasks for number handling.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Abbreviated Dialing administrative state |
Abbreviated Dialing |
|
|
Supplementary Service Codes (SSC) | ||
|
Wholesale for Abbreviated Dialing | ||
|
Service data
| ||
|
SND administrative state |
Short Number Dialing (SND) |
|
|
Announcement | ||
|
Number Normalization data | ||
|
SND domains | ||
|
Wholesale for SND | ||
|
Behavior of the Number Normalization Common Component |
Number Normalization |
|
|
Localness exemption | ||
|
DNM administrative state |
Dialed Number Mapping (DNM) |
|
|
Method to access the database configuration | ||
|
Additional configuration | ||
|
DNM location data
| ||
|
DNM-specific number translation data
| ||
|
Number Translation administrative state |
Number Translation Service |
|
|
Wholesale for Number Translation | ||
|
Additional configuration (mechanism to load and cache the data) | ||
|
Number Translation profile | ||
|
Translation rules | ||
|
Activation mechanism | ||
|
Carrier Pre-Select administrative state |
Carrier Pre-Select |
|
|
Call type | ||
|
Local operator call type and number | ||
|
Carrier operator call type and number | ||
|
Service data
| ||
|
Carrier Pre-Select Rn administrative state |
Carrier Pre-Select Rn |
|
|
Carrier | ||
|
Test numbers | ||
|
Service data
| ||
|
Carrier Select administrative state |
Carrier Select |
|
|
Announcement | ||
|
Carrier Select IMS Common Component data | ||
|
Number Analysis IMS Common Component data | ||
|
Service data
| ||
|
Carrier Select Rn administrative state |
Carrier Select Rn |
|
|
Carrier | ||
|
Carrier Select Codes | ||
|
Service data
| ||
2.1.4 Identity Handling
Table 4 lists the configuration-related tasks for identity handling.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Identity Presentation administrative state |
Identity Presentation |
|
|
Additional configuration
| ||
|
Wholesale for Identity Presentation | ||
|
CNIP administrative state | ||
|
OCNIP administrative state | ||
|
Multi-Subscriber Number (MSN) administrative state | ||
|
Reason for lack of caller identity | ||
|
OCNIP mode | ||
|
Use of From header | ||
|
Removal of Privacy header | ||
|
Service data | ||
|
Activation / deactivation / modification of CNIP service |
Calling Name Identity Presentation (CNIP) |
|
|
Modification of | ||
|
Calling Name Server redundancy (DNS-based redundancy for SIP and SOAP/HTTP protocols) | ||
|
Activation / deactivation / modification of OCNIP service |
Originating Calling Name Identity Presentation (OCNIP) |
MTAS Originating Calling Name Identity Presentation Management Guide |
2.1.5 Charging
Table 5 lists the configuration-related tasks for charging.
|
Configuring |
Function |
Reference |
|---|---|---|
|
AoC administrative state |
Advice of Charge (AoC) |
|
|
Additional configuration
| ||
|
Wholesale for AoC | ||
|
Service data | ||
|
NP administrative state |
Number Portability (NP) |
|
|
Additional configuration | ||
|
Wholesale for NP | ||
|
Diameter stack
|
Charging |
|
|
Charging profile | ||
|
Activating charging for a service | ||
|
Deactivating charging
| ||
|
Deactivating charging destinations (starting / revoking) | ||
|
Default CDF address (adding / removing) | ||
|
CDS addresses (adding / removing) | ||
|
Charging attributes | ||
|
Communication details transfer attributes | ||
|
Ro announcement mapping (creating / deleting) | ||
|
Ro language mapping (creating / deleting) | ||
|
JC administrative state |
Japanese Charging (JC) |
|
|
Interconnection Charge Billing System (ICBS) database | ||
|
Wholesale for JC | ||
|
Service data
| ||
|
Enabling ACR Storage |
Charging ACR Storage |
|
|
Defining closure of ACR files | ||
|
Defining disk full and disk not full percentage levels | ||
|
Access rights to log files and directories |
2.1.6 Call Admission Control
Table 6 lists the configuration-related tasks for Call Admission Control.
|
Configuring |
Function |
Reference |
|---|---|---|
|
UCAC administrative state |
User Call Admission Control (UCAC) |
|
|
Suppression by FSFS | ||
|
Announcement | ||
|
Wholesale for UCAC | ||
|
Service data
| ||
|
GCAC administrative state |
Group Call Admission Control (GCAC) |
|
|
Suppression by FSFS | ||
|
GCAC Category
| ||
|
GCAC Profile
| ||
|
Connection allocation
| ||
|
Resetting GCAC counts | ||
|
Initial Filter Criteria for subscribers with GCAC service configuration | ||
|
Announcement | ||
|
Additional configuration
| ||
|
Wholesale for GCAC | ||
|
Service data
| ||
2.1.7 Multiple Numbers
Table 7 lists the configuration-related tasks for multiple numbers.
|
Configuring |
Function |
Reference |
|---|---|---|
|
DR administrative state |
Distinctive Ring (DR) |
|
|
Service data
| ||
2.1.8 Interworking
Table 8 lists the configuration-related tasks for interworking.
|
Configuring |
Function |
Reference |
|---|---|---|
|
GM administrative state |
Gateway Model (GM) |
|
|
GM mode | ||
|
FSFS administrative state |
Flexible Service Format Selection (FSFS) |
|
|
Suppression of configurable services | ||
|
Additional configuration
| ||
|
Wholesale for FSFS | ||
|
Video Fallback to Audio administrative state |
Video Fallback to Audio |
|
|
Q.850 cause code triggering fallback call | ||
|
Wholesale for Video Fallback to Audio |
2.1.9 Call Prioritization
Table 9 lists the configuration-related tasks for call prioritization.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Priority Call administrative state |
Priority Call |
|
|
Wholesale for Priority Call | ||
|
Service data
| ||
|
Priority Services administrative state |
Priority Services |
|
|
Priority Call termination on low credit | ||
|
CPC administrative state |
Calling Party Category (CPC) |
|
|
Wholesale for CPC | ||
|
Service data
| ||
2.1.10 Tone and Announcement Management
Table 10 lists the configuration-related tasks for tone and announcement.
|
Configuring |
Function |
Reference |
|---|---|---|
|
NA administrative state |
Network Announcement (NA) |
|
|
Originating MTAS audio-video announcement code for a specific SIP error code | ||
|
Terminating MTAS audio-video announcement code for a specific SIP error code | ||
|
SIP error response codes from MTAS | ||
|
Q.850 cause value and corresponding cause code | ||
|
Wholesale for NA | ||
|
Announcement codes and announcement names for services
|
Announcement |
|
|
Definitions
|
Generic Announcement |
|
|
Wholesale for Generic Announcement | ||
|
CAT administrative state |
Customized Alerting Tones (CAT) |
|
|
Suppression by FSFS | ||
|
Additional configuration for CAT
| ||
|
Service data
| ||
|
External CAT-S
| ||
|
RBT administrative state |
Ring Back Tone (RBT) |
|
|
RBT announcements | ||
|
Early media suppression | ||
|
Suppressing RBT | ||
|
Wholesale for RBT |
2.1.11 Third Party Service Interaction
Table 11 lists the configuration-related tasks for third party service interaction.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Call notification |
Parlay X |
|
|
Third-party call | ||
|
Changing local port | ||
|
IP protocol version | ||
|
Circuit Switched Integration (CSI) and Northbound Call Control (NCC) administrative state |
Parlay X in MMTel |
|
|
Parlay X in MMTel administrative state | ||
|
Service data | ||
|
Circuit Switched Integration (CSI) | ||
|
Northbound Call Control (NCC) | ||
|
SS7 configuration |
2.1.12 Language
Table 12 lists the configuration-related tasks for languages.
|
Configuring |
Function |
Reference |
|---|---|---|
|
MLS administrative state |
Multiple Languages (MLS) |
|
|
Announcement | ||
|
Segmented Announcements (both for Mp and Mr interfaces) | ||
|
Mp interface (embedded MRFC(1)), except Segmented Announcements | ||
|
Mr interface (External MRFC) | ||
|
Service data
| ||
(1) Media
Resource Function Controller (MRFC)
2.1.13 Emergency Call Handling
Table 13 lists the configuration-related tasks for emergency call handling.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Emergency Call charging profile configuration |
Emergency Call Notification |
2.1.14 Closed User Group
Table 14 lists the configuration-related tasks for Closed User Group.
|
Configuring |
Function |
Reference |
|---|---|---|
|
CUG administrative state |
Closed User Group (CUG) |
|
|
CUG reject announcement | ||
|
Wholesale for CUG | ||
|
Service data
| ||
2.1.15 Wholesale
Table 15 lists the configuration-related tasks for Wholesale.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Wholesale administrative state |
Wholesale |
|
|
Tables and activation for VTP-controlled dial plan
| ||
|
VTP-controlled dial plan | ||
|
Announcement |
2.1.16 Supplementary Service Codes
Table 16 lists the configuration-related tasks for SSCs.
|
Configuring |
Function |
Reference |
|---|---|---|
|
SSC codes administrative state |
Supplementary Service Codes (SSC) |
|
|
SSC attributes (modify) | ||
|
Announcement | ||
|
Additional configuration
| ||
|
Wholesale for SSC | ||
|
Communication Forwarding SSC Attributes | ||
|
Service data | ||
|
Service code command syntax attributes (with examples) | ||
|
GenSSC commands
|
Generic Supplementary Service Codes (GSSC) |
|
|
Troubleshooting command configuration
| ||
2.2 SCC-AS Services
Table 17 lists the configuration-related tasks for SCC-AS services.
|
Configuring |
Function |
Reference |
|---|---|---|
|
SCC administrative state |
||
|
Charging profile for the SCC-AS | ||
|
Mix of VoLTE and 2G/3G | ||
|
Policy for Network Provided Location Information (NPLI) retrieval | ||
|
Caching of registered contacts information | ||
|
GSM compatible SCF configuration |
Service Domain Selection (SDS) |
|
|
SDS administrative state | ||
|
Additional configuration
| ||
|
Conditional anchoring based on supported media call types
|
Service Domain Selection (SDS) |
|
|
Conditional anchoring based on roaming service profiles
| ||
|
Conditional anchoring based on local numbers and escape code
| ||
|
T-ADS administrative state |
Terminating Access Domain Selection (T-ADS) |
|
|
Additional configuration
| ||
|
CSI administrative state |
Terminating Access Domain Selection (T-ADS) |
|
|
GMSC role | ||
|
SRVCC administrative state |
Single Radio Voice Call Continuity (SRVCC) |
|
|
Additional configuration
| ||
(1) Home Subscriber Server (HSS)
2.3 Conference AS Services
Table 18 lists the configuration-related tasks for Conference AS services.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Conference administrative state |
Scheduled Conferencing |
|
|
Additional configuration
| ||
|
Cached Scheduled Conference data management in MTAS | ||
|
Service data
| ||
2.4 ST AS Services
Table 19 lists the configuration-related tasks for SIP Trunking application server (ST AS) services.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Announcement | ||
|
Service data | ||
|
ST AS Carrier Select Rn and Carrier Pre-Select Rn Management Guide | ||
|
ST carrier selection reason codes (Q.850 reason code for a congestion situation) | ||
|
Service data | ||
|
ST AS Carrier Select Rn and Carrier Pre-Select Rn Management Guide | ||
|
ST Carrier Pre-Select test number for remote preselection | ||
|
Service data | ||
|
ACR display name evaluation | ||
|
Operator barring category (create, modify, delete) | ||
|
Localness barring categories (modify) | ||
|
Global white list | ||
|
Generic announcement name | ||
|
Service data
| ||
|
Announcement | ||
|
Additional configuration
| ||
|
Service data | ||
|
ST AS Malicious Communication Identity Service Management Guide | ||
|
Reporting method | ||
|
Communication Details Server (CDS) | ||
|
Closure of ACR files for local storage definition | ||
|
Service data | ||
|
Contexts for the dialed numbers
|
ST Number Normalization |
|
|
Normalization data
| ||
|
Algorithm data | ||
|
Identity Presentation administrative state |
ST Identity Presentation |
|
|
Additional configuration
| ||
|
Reason for lack of caller identity | ||
|
Service data | ||
2.5 Co-Location of AS Roles
Table 20 lists the configuration-related tasks for Co-location of AS roles.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Node level functions |
Co-location of AS roles |
|
|
AS role-specific functions | ||
|
Service data
| ||
2.6 XML Document Management Server
Table 21 lists the configuration-related tasks for the XML Document Management Server (XDMS).
|
Configuring |
Function |
Reference |
|---|---|---|
|
Diameter stack for XDMS |
||
|
Sh interface | ||
|
Optional XDMS function parameters | ||
|
Access of Ut interface
| ||
|
Access of CAI3G interface
| ||
|
CAI3G interface | ||
|
Access of CCMP interface |
3 Quality of Service
Table 22 lists the configuration-related tasks for Quality of Service (QoS) assurance.
|
Configuring |
Function |
Reference |
|---|---|---|
|
Differentiated Services Code Point (DSCP) marking value in MTAS |
Differentiated Services |
4 Data Collection
The data collection procedures instruct which troubleshooting data to collect that can be enclosed in Customer Service Requests (CSRs) or Trouble Reports (TRs), if a problem is experienced with the MTAS.
Table 23 lists the tasks related to data collection.
|
Task |
Function |
Reference |
|---|---|---|
|
Perform data collection |
Data Collection |
5 Health Check
Health check means checking and monitoring the current state and health of the system, and searching for irregularities and deviations. During this procedure, MTAS health information is collected. The administrator can then decide if more actions are needed, or if a software or hardware configuration change is needed.
Table 24 lists the tasks related to health check.
|
Task |
Function |
Reference |
|---|---|---|
|
Perform health check |
Health Check |
6 Fault Management
Table 25 lists the various tasks for fault management.
|
Task |
Function |
Reference |
|---|---|---|
|
SNMP configuration in Alarm handling |
Section SNMP Configuration in Fault Management | |
|
Configure alarm severity |
Alarm handling |
Section Alarm Configuration in Fault Management |
|
Get the active alarm list |
Alarm handling |
Section Alarm Configuration in Fault Management |
|
Change the heartbeat |
Alarm handling |
Section Alarm Configuration in Fault Management |
7 File Management
Table 26 lists the various tasks for file management.
|
Task |
Function |
Reference |
|---|---|---|
|
Access to a logical file system through the MOM, based on security rules |
File management |
Section Types of Operation in File Management |
|
Access to a logical file system over SFTP, based on security rules |
File management |
Section Types of Operation in File Management |
|
Definition, modification, and deletion of preventive maintenance file group policies |
File management |
Section Types of Operation in File Management |
|
Collect alarm logs |
Alarm log handling |
Section File Management in Fault Management |
8 Performance Management
Table 27 lists the various tasks for performance management.
|
Task |
Function |
Reference |
|---|---|---|
|
Performance management |
Section Types of Operation in Performance Management | |
|
Create, start, stop, and delete measurement collection jobs |
Performance management |
Section Types of Operation in Performance Management |
|
Create, start, stop, and delete threshold monitoring jobs |
Performance management |
Section Types of Operation in Performance Management |
9 OAM Security Management
Table 28 lists the various tasks for the NBI users in the Operations, Administration, and Maintenance (OAM) security management area.
|
Task |
Function |
Reference |
|---|---|---|
|
View LDAP configuration |
LDAP Authentication in Security management |
Section LDAP Authentication in Security Management for ECLI, NETCONF, and SFTP Users |
|
Unlock/lock LDAP authentication method |
LDAP Authentication in Security management |
Section LDAP Authentication in Security Management for ECLI, NETCONF, and SFTP Users |
|
Change bind name and password for LDAP authentication |
LDAP Authentication in Security management |
Section LDAP Authentication in Security Management for ECLI, NETCONF, and SFTP Users |
|
LDAP Authentication in Security management |
Section LDAP Authentication in Security Management for ECLI, NETCONF, and SFTP Users | |
|
Change Target-Based Access Control (TBAC) |
LDAP Authentication in Security management |
Section LDAP Authentication in Security Management for ECLI, NETCONF, and SFTP Users |
|
View roles and rules |
Local Authorization in Security management |
Section Local Authorization in Security Management for ECLI, NETCONF, and SFTP Users |
|
Lock/unlock local authorization method |
Local Authorization in Security management |
Section Local Authorization in Security Management for ECLI, NETCONF, and SFTP Users |
|
Create, change, and delete custom roles and custom rules |
Local Authorization in Security management |
Section Local Authorization in Security Management for ECLI, NETCONF, and SFTP Users |
|
Understand MTAS-specific roles and rules |
Local Authorization in Security management |
Section MTAS Roles and Rules in Security Management for ECLI, NETCONF, and SFTP Users |
10 Software Management
Table 29 lists the various tasks for software management.
|
Task |
Function |
Reference |
|---|---|---|
|
Prepare an Upgrade Package |
Software upgrade in software management |
Section Software Upgrade in Software Management |
|
Upgrade using one-step activation |
Software upgrade in software management |
Section Software Upgrade in Software Management |
|
Upgrade using step-by-step activation |
Software upgrade in software management |
Section Software Upgrade in Software Management |
|
Cancel an upgrade operation |
Software upgrade in software management |
Section Software Upgrade in Software Management |
|
Delete an Upgrade Package |
Software upgrade in software management |
Section Software Upgrade in Software Management |
|
Delete an inactive software version |
Software removal in software management |
Section Software Removal in Software Management |
|
View software information |
Software Inventory Management |
Section Types of Operation in Software Inventory Management |
11 System Management
Table 30 lists the various tasks for system management.
|
Task |
Function |
Reference |
|---|---|---|
|
Address Managed Element |
System management |
Section Address Managed Element in System Management |
|
Identify DN Prefix |
System management |
Section Identify DN Prefix in System Management |
|
Identify Managed Element |
System management |
Section Identify Managed Element in System Management |
|
Identify Managed Element Location |
System management |
Section Identify Managed Element Location in System Management |
|
List Supported XML Model Files |
System management |
Section Manage XML Model Files in System Management |
|
Push of XML Model Files to External System |
System management |
Section Manage XML Model Files in System Management |
12 System Backup and Restore
Table 31 lists the various tasks for backup and restore management.
|
Task |
Function |
Reference |
|---|---|---|
|
Create Backup Restore Backup Delete Backup Cancel Backup and Restore Operation List Backups View Progress Report |
Backup and restore management |
Section Basic Backup Operations in System Backup and Restore |
|
Schedule Single Backup Schedule Backups Based on Calendar Event Schedule Backups Based on Periodic Event |
Backup and restore management |
Section Schedule Backups in System Backup and Restore |
|
Change Prefix for Scheduled Backup Name Delete Scheduled Event Set Maximum Number of Scheduled Backups Lock Backup Scheduler Unlock Backup Scheduler |
Backup and restore management |
Section Manage Scheduled Backups in System Backup and Restore |
|
Change Maximum Number of Manual Backups Enable Automatic Deletion of Manual Backups Disable Automatic Deletion of Manual Backups |
Backup and restore management |
Section Manage Manual Backups in System Backup and Restore |
|
Export Backup Import Backup Change Prefix for Exported Backup Names |
Backup and restore management |
Section Import and Export Backups in System Backup and Restore |

Contents