[go: up one dir, main page]

0% found this document useful (0 votes)
29 views10 pages

Master GUI Overview

The NetMaster user interface enables users to navigate between different perspectives for monitoring and managing network elements. The perspectives include Discover, Geographical Surveillance, Logical Surveillance, Network Explorer, Alarm Workflow, User Management, and Security Audit. Each perspective focuses on specific tasks like discovery, alarm monitoring, user administration, and security auditing.

Uploaded by

Ferriyanto Yanto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views10 pages

Master GUI Overview

The NetMaster user interface enables users to navigate between different perspectives for monitoring and managing network elements. The perspectives include Discover, Geographical Surveillance, Logical Surveillance, Network Explorer, Alarm Workflow, User Management, and Security Audit. Each perspective focuses on specific tasks like discovery, alarm monitoring, user administration, and security auditing.

Uploaded by

Ferriyanto Yanto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

NetMaster GUI Overview

17B00

Proprietary and Confidential 2019


The NetMaster User Interface
The NetMaster user interface enables users to easily navigate between views. The collection of views in
the user interface reflects specific ways of working which are referred to as perspectives. The user can
organize and move windows and dialogs individually within a perspective.

• Discover perspective
• Geographical surveillance perspective
• Logical surveillance perspective
• Network explorer perspective
• Alarm workflow perspective
• User management perspective
• Security audit perspective

Proprietary and Confidential 2


Discover Perspective
• The discovery process is the process by which

NetMaster identifies and manages new network

elements. This process is performed from the

Discover perspective.

• The operator defines IP-address-based search

ranges for discovering new elements. The IP

addresses defining the range can be in either

IPv4 or IPv6 format.

Proprietary and Confidential 33


Geographical Surveillance Perspective
• Geographical surveillance perspective is used for

surveillance and management of network elements

based on a geographical model.

• This perspective is tailored to the user whose main task

and responsibility is to perform alarm surveillance in the

network.

• The Active alarms, Historical alarm, and Alarm summary

views together with the Geographical map give the

operator full control of the total network alarm status.

Proprietary and Confidential 44


Logical Surveillance Perspective
• The Logical surveillance perspective is

used for monitoring and managing network

elements based on a user-defined logical

model.

• This view is for monitoring and managing

the network based on a logical model and

includes an editor for creating and editing

a visual representation of logical domains.

Proprietary and Confidential 55


Network Explorer Perspective
• In the Network Explorer perspective, users can monitor

and manage NEs based on either the Geographical model

or the Logical model. The choice of which model to link to

this perspective, is set in the Network Explorer Preferences

page.

• Any change done to domains and NEs in the Network

Explorer perspective, is automatically reflected in the

model to which this Network Explorer perspective is linked,

and vice versa.

Proprietary and Confidential 66


Alarm Workflow Perspective
• NetMaster provides a preset perspective

that helps focus on the alarm workflow.

The alarms initially appear in the Active

un-acknowledged view, and eventually

end up in the Historical acknowledged

view. The two intermediate views show

whether the alarm is cleared before it was

acknowledged or vice versa.

Proprietary and Confidential 77


User Management Perspective
• The User management perspective handles

users and user groups, as well as permission

assignment and restrictions for user groups.

• The User administration view is used to

manage users: create new users, change

passwords, and block, delete and/or allocate

permissions by assigning users to groups.

Proprietary and Confidential 88


Security Audit Perspective
• The Security audit perspective is used for

logging the events arising from user

activities.

• The system administrator can block or

delete user accounts to prevent unwanted

operations.

Proprietary and Confidential 99


Thank You

Proprietary and Confidential

You might also like