• Back-up Tool: Enables the Web Element Manager to transfer a copy of the configuration file currently being used by a managed system at user-defined intervals. Files are transferred to the host server in a specific directory. The number of files to retain in the directory is also configurable. This tool provides a useful mechanism for testing configurations and/or quickly restoring a last-known-good configuration in the event of an error.
• Compare Tool: Provides a powerful tool for comparing the configuration files of two managed systems. Once the two files are specified, a dialog appears displaying the two documents side-by-side. Line numbers are added for convenience. Text additions, modifications, and deletions are displayed in different colors for easy recognition. This tool can be useful on its own to determine variations between multiple iterations of the same configuration file, or, when used in conjunction with the Back-up tool, it can provide an audit trail of configuration changes that occurred during system operation.The Web Element Manager’s accounting management functionality is compliant with TS 32.401, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Performance Management (PM); Concept and requirements and allows you to:
• Inspector: Inspectors are limited to a small number of read-only Exec Mode commands.The bulk of these are “show” commands giving the inspector the ability to view a variety of statistics and conditions. The Inspector cannot execute show configuration commands and do not have the privilege to enter the Config Mode.
• Operator: Operators have read-only privileges to a larger subset of the Exec Mode commands. They can execute all commands that are part of the inspector mode, plus some system monitoring, statistic, and fault management functions. Operators do not have the ability to enter the Config Mode.
• Administrator: Administrators have read-write privileges and can execute any command throughout the CLI except for a few security-related commands that can only be configured by Security Administrators. Administrators can configure or modify the system and are able to execute all system commands, including those available to the Operators and Inspectors.
• Security Administrator: Security Administrators have read-write privileges and can execute all CLI commands including those available to Administrators, Operators, and Inspectors.Important: The hardware required for the Web Element Manager server may vary, dependent upon the number of chassis being managed, the number of clients that require access, and other variables. This minimum configuration has been tested to support up to 30 Web Element Manager clients, managing up to 25 chassis.
Important: It is recommended that users ensure all recommended patches are installed before performing a new installation or software upgrade.
Important: Users based in the United States should ensure that the timezone patch 109809-05 (or later) and libc patch 108993-52 (or later) be installed in support of extended daylight savings time (DST) support.
Important: Users based in the United States should ensure that the timezone patch 113225-07 (or later) and libc patch 112874-33 (or later) be installed in support of extended daylight savings time (DST) support. In addition, if Solaris 9 is used, it must be installed using the “End User System support 64-bit” software group must be specified during the installation of the operating system. This option installs the libraries required for proper operation of the Web Element Manager.
Important: Solaris 10 Kernel patch released between 137137-09 and 142900-04 may result in kernel panic while executing/invoking system calls.
Important: If you plan to install software and maintain the Web Element Manager application and server remotely, it is recommended that you use an X-Windows client.
Important: It is recommended that users should use JRE 1.4.2_11 (or later) or 1.5 update 6 (or later).
Important: Web Element Manager clients cannot access the Web Element Manager server if the server is separated by an NAT'd firewall or other device that restricts access between the client workstation and server.
• Back-up Tool: Enables the Web Element Manager to transfer a copy of the configuration file currently being used by a managed system at user-defined intervals. Files are transferred to the host server in a specific directory. The number of files to retain in the directory is also configurable. This tool provides a useful mechanism for testing configurations and/or quickly restoring a last-known-good configuration in the event of an error.
• Compare Tool: Provides a powerful tool for comparing the configuration files of two managed systems. Once the two files are specified, a dialog appears displaying the two documents side-by-side. Line numbers are added for convenience. Text additions, modifications, and deletions are displayed in different colors for easy recognition. This tool can be useful on its own to determine variations between multiple iterations of the same configuration file, or, when used in conjunction with the Back-up tool, it can provide an audit trail of configuration changes that occurred during system operation.The Web Element Manager’s accounting management functionality is compliant with TS 32.401, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Performance Management (PM); Concept and requirements and allows you to:
• Inspector: Inspectors are limited to a small number of read-only Exec Mode commands.The bulk of these are “show” commands giving the inspector the ability to view a variety of statistics and conditions. The Inspector cannot execute show configuration commands and do not have the privilege to enter the Config Mode.
• Operator: Operators have read-only privileges to a larger subset of the Exec Mode commands. They can execute all commands that are part of the inspector mode, plus some system monitoring, statistic, and fault management functions. Operators do not have the ability to enter the Config Mode.
• Administrator: Administrators have read-write privileges and can execute any command throughout the CLI except for a few security-related commands that can only be configured by Security Administrators. Administrators can configure or modify the system and are able to execute all system commands, including those available to the Operators and Inspectors.
• Security Administrator: Security Administrators have read-write privileges and can execute all CLI commands including those available to Administrators, Operators, and Inspectors.
• Configuration: This database contains tables which maintain configuration information for user details, topology for maps and manageable systems.
• Trap: This database contains tables which maintain SNMP trap configuration information and all the received SNMP traps.
• MIB: This database contains all the information required to translate SNMP Object identifiers to proper MIB names and their types as given in the MIB file.
• Audit Trail: This database contains table that maintains the configuration trail including the following:
• Bulk Statistics: This database contains various tables containing counter values periodically received from the system via the File Transfer Protocol (FTP).
![]() |
Cisco Systems Inc. |
Tel: 408-526-4000 |
Fax: 408-527-0883 |