摩托罗拉BSS系统安全手册
- 格式:doc
- 大小:3.65 MB
- 文档页数:33
M o t o r o l a网络系统安全操作手册第 2 页 共 15 页2009-9-22目 录第一部分M O T O R O L A 网络系统操作方式 (3)导航图方式: (3)远程登录方式: .................................................................................................................... 4 Example ........................................................................................................................... 5 第二部分M O T O RO L A网络安全操作命令介绍 (7)命令安全等级介绍 .................................................................................................................. 7 命令介绍(按功能类型分) .......................................................................................................... 7 终端操作指令 ...................................................................................................................... 7 告警组 ........................................................................................................................ 8 问题小区组 ................................................................................................................... 10 GPRS 组 ....................................................................................................................... 12 保障组 ........................................................................................................................ 13 资源组 .. (15)第 3 页 共 15 页第一部分M o t o r o l a 网络系统操作方式OMC 提供了图形用户界面,使用户能方便地通过OMC 应用软件来对GSM 的无线网络进行管理。
复位/重启/锁i/reset_d/l 0 site 站号重启或锁基站i/l 站号 dri 0 0 复位或锁载频i/l 0 mms mms口复位或锁mmsi/l 0 path 站号 0/1 复位或锁pathi/l 0 rsl 站号 0 复位或锁rsll 站号 eas 0 0 锁外部告警(如高温告警,烟感,空调等)DISP(显示命令)disp_site 显示某站disp_act 站号显示某站的告警disp_cell_s 站号显示某小区占用disp_cell 4 6 0 0 0 29466 CI 显示某小区参数disp_equ 站号 dri 0 0 full 显示0 0载频定义数据(如载频类型,槽位,装备机柜,天线口选择等,double=ctu2 single=ctu1)disp_eq 站号 rtf 0 0 显示0 0 RTF定义数据disp_eq 站号 cab 1或0 显示M 或Hdisp_ele bsic 站号 all 查看基站所有小区的bsic 基站识别码disp_mms 0 mms口查看BSC的mms口时隙占用(亦可查看某站的mms口占用)disp_mms_ts_usage 0 mms口查看BSC的mms口时隙占用(亦可查看某站的mms口占用)disp_in 看时段disp_stats 时段 intf_on_idle cell=4 6 0 0 0 29466 CI 看干扰值disp_stats 时段 path_balance cell=4 6 0 0 0 29466 CI 看PB 值(PB过低,下行有问题,基站发射通路问题,PB过高,上行问题,接收有问题)disp_stats 时段 rf_losses_tch cell= 4 6 0 0 0 29466 CI 看掉话disp_stats 时段 ber cell=4 6 0 0 0 29466 CI 看误码率disp_stats 时段 fer cell=4 6 0 0 0 29466 CI 看误帧率disp_stats 时段 total_calls cell=4 6 0 0 0 29466 CI 通话总数disp_rtf_ch站号 rtf号看载频时隙占用情况disp_ho站号显示某站的跳频频点disp_p 0 看BSC gproc板状态disp_0 msi * * 看BSC msi板状态disp_nei 4 6 0 0 0 29466 CI 看某小区的相邻小区disp_nei 4 6 0 0 0 29466 CI 4 6 0 0 0 29466 CI(相邻小区)看某小区的相邻小区参数disp_bss 显示该BSC所有基站BCCH频点disp_gsm_cells 站号显示某站的所有小区disp_cal_d 站号 dri 0 0 显示某站00号DRI 数据SWAP (倒换命令)reassign 0 site 站号lcf 2(lcf数) 将站改到其他GPROC板swap 0 tdm 倒换业务到备用KSW板swap_device 站号 btp 倒换某站的备用主控板为主用主控扳swap_device 0或站号gclk 倒换BSC或某站的备用gclk板为主用gclk alarm 0 on 打开告警 alarm 20 on 打开20号站告警STATE命令(状态命令)BTS硬件状态:state 站号 dri/rtf * * 显示某站的所有DRI和RTF状态state 站号 cab/ btp/ gclk /msi/csfp/eas * * 显示某站所有的机柜/BTS主控板/通用时钟板/msi板(BTS中就是NIU板)/代码存储设施处理器状态/外部告警输入BTS 链路状态:State 站号 mms/rsl * * 显示某站所有2M物理信号端口/无线信令链路BSC硬件状态:State 0 cab/cage/gproc/gclk/bsp/msi/ksw/axcdr/lcf /pcu/ tdm * * 显示BSC 所有的机柜/机箱(机柜中有多个机箱)/GPROC板(通用处理器板)/通用时钟板/BSC处理器/MSI板(多端口串行接口板)/KSW(千端口交换板:1024 TDM时隙交换)/代码速率转换板(又名trascode变码器)/链路控制功能(完成各种链路控制,装备于gproc板上)/PCU(gprs处理器)的状态/时隙生成BSC链路状态:State 0 path/mms/mtl/oml/xbl/gsl/ lan * * 显示BSC所有的路径path/mms口(2M传输口)/MTP传送层链路(A-接口):连至MSC/操作维护链路:连至OMC/xcdr与bss之间的通信链路/未知/未知的状态BSC 四总线状态:State 0 pbus/cbus/sbus/tbus * *其他:state 0 oos site * * 显示BSC退服的所有站state all oos dri * * 显示BSC退服的所有载频CHANGE 命令(修改参数)Change_level 修改安全级别基站参数:(change_ele )格式:chg_cell 参数名参数值站号 cell=4 6 0 0 0 29466 CI 修改某小区的参数chg_ele phase_lock_gclk 0 站号消除BSC上的的时钟告警: GCLK 0 0 04 FMIC 260000B9 04-04-2006 Phase Lock Lost (会引起掉话)reat 0 站号消除BSC上的的时钟告警chg_ele max_tx_bts〈n〉站号 cell=4 6 0 0 0 29466 CI 降整小区功率〈n〉=3=6dB=原功率*1/2²)gsm_half_rate_enabled 1 42 all 开启42号站所有小区半速率chg_ele number_sdcchs_preferred 16 35 cell = 4 6 0 0 0 29466 49452(当小区SD拥塞,TCH空闲多时,可通过增加SD来解决) 修改35号站的SD为16个chg_ele bts_power_control_allowed 1 54 all小区参数:(change_cell_ele )格式:chg_cell_ele 参数名参数值 4 6 0 0 0 29466 CI 修改某小区的参数应用:chg_cell_id 4 6 0 0 29466 CI 4 6 0 0 0 29466 CI(新CI)修改CIchg_rtf_f 5 41 0 0 把41号站0 0载频的频点改为5 41=site号(不要乱用)ADD/COPY /DEL命令(增加/复制/删除命令)(开站或网优时用)复制小区命令格式:Copy_cell 源小区目标小区站号 BSIC码如:Copy_cell 4 6 0 0 0 29466 CI 4 6 0 0 29466 CI 3(站号) 6(BSIC)add_cell 4 6 0 0 0 29466 CI 站号某站增加小区add_nei 4 6 0 0 0 29466 CI(源小区)4 6 0 0 0 29466 CI(目标小区)internal增加BSC内相邻小区add_nei 4 6 0 0 0 29466 CI 4 6 0 0 0 29466 CI external 增加BSC之间相邻小区EQ/ UNEQ (装载/卸载命令)格式:eq/uneq 站号设备名eq/uneq 0 site BSC开站或卸载站eq/uneq 站号cab/path/msi/rtf/dri 装载或卸载某站的机箱/路径/MSI 板/RTF/载频MODIFY (修改参数值命令)modify_v 站号 antenna_select 天线口 dri 0 0 修改载频天线口(注:用此命令前需先锁该载频)modify_nei 4 6 0 0 0 29466 48872 4 6 0 0 0 29466 49030 ho_margin_cell 8帮助命令:help <command> 显示某个命令的帮助信息。
摩托罗拉BSS系统安全监控手册摩托罗拉浙江分公司协维组内容提要本部分内容综述GSM BSC级系统网络的硬件告警处理及一些日常监控方法,提供维护过程中分析问题的一般思路,对常见告警的处理,实际故障解析等。
对一些工具的使用,还有常见故障的案例和日常维护工作的注意事项。
通过本部分的学习读者将具有GSM BSC级网络维护的一般知识,掌握BSS系统基本维护技能,能够承担日常的网络维护工作。
目录序论 (4)维护工作的要旨--防患未燃 (4)分析问题的一般思路 (5)第一章日常监控数据收集 (6)一、ECT (6)二、EVENT LOG : (7)第二章BSS系统安全监控 (8)一、告警定义 (8)二、监控列表及描述 (8)GPROC告警 (9)GCLK告警 (10)KSW告警 (11)LAN告警 (13)BSP告警 (14)MSI告警 (15)MTL告警 (15)XBL告警 (17)数据总线告警 (17)BSS告警 (19)第三章故障处理分析 (20)一、常见故障分析处理 (20)GPROC的故障处理 (20)GCLK的故障处理 (21)KSW的故障处理 (22)KSWX/DSWX板的故障: (22)LANX的故障处理 (23)MSI的故障处理 (24)MTL的故障处理 (24)BSP的故障处理 (25)数据总线的故障处理 (26)单通故障的处理 (29)二、日常维护的注意事项 (29)三、典型问题汇总 (30)序论维护工作的要旨--防患未然系统建设完成经过验收后,就转入系统维护工作。
由于此时系统已经给终端用户提供服务,网络的任何故障均可能对终端用户产生影响,从而对运营商的形象产生影响。
所以维护工作的要旨是防患于未燃,将系统隐患尽早排除,不要使其成为系统故障而影响系统的性能。
预防性维护是我们的最佳选择,定期对任何一个BSS网元的巡检和对基站的安装调测都进行严格的检测调整,保证系统及其附属外围设备工作在正常状态,通过集中性预防维护,可以及时发现系统隐患并加以排除,最大限度地提高现行系统设备的利用率,增强系统设备的可靠性,从而减轻平时日常维护的压力。
Intrusion DetectorReference Guide2 | Bosch Security SystemsTable of ContentsIntroduction3Blue Line Series6Commercial Series8Professional Series10Classic Line12RADION wireless18Specialty Sensors20Detector Reference Guide | 3Security you can rely onWhether you are securing a home, retail store, bank, museum, commercial business or government facility, you need dependability from your systems. With decades of experience and an unwavering dedication to high-quality and high-performing products, Bosch detectors provide best-in-class false alarm immunity and catch performance while minimizing installation time and complexity. Millions of residential and commercial users rely on Bosch for superior intrusion detection.Bosch is recognized throughout the security industry as a global leader in intrusion detection expertise. We have earned this reputation by consistently providing products that meet your needs with a focus on performance, reliability, durability, and ease of installation.Bosch detectors fulfill the requirements of standards allover the world. In the state-of-the-art Bosch laboratory, we verify that our detectors pass the most stringent requirements of each certification standard. Bosch also designs its own, even more demanding, tests to ensure the detectors are virtually immune to environmental disturbances. As a result, false alarm protection and catch performance exceed the requirements of any single country. With Bosch detectors, there is no hiding place for intruders and zero tolerance for false alarms.4| Bosch Security SystemsWall-to-Wall coverageExcellent catch performanceFirst Step Processing intelligently analyzes motionfor an almost instant response to intruders. Thedetectors automatically adjust to their environment bycompensating for temperature fluctuations, so you areguaranteed optimal performance regardless of changesin room conditions.For more challenging applications, models with SensorData Fusion technology employ a sophisticated softwarealgorithm to analyze signals from multiple sensors,including microwave, temperature, and white light levels,to make the most intelligent alarm decisions in thesecurity industry.No more false alarmsBosch detectors feature Microwave Noise AdaptiveProcessing to easily differentiate humans from falsealarm sources, such as a ceiling fan or hanging sign.For increased reliability, dual sensors process the PIR andmicrowave Doppler radar signals independently and mustagree there is an alarm before the relay activates. Thesealed optical chamber also prevents drafts and insectsfrom affecting the detector. Bosch pet and small animalimmunity provides optimal sensitivity for any application.Minimize time on the ladderBosch detectors include a number of uniquedesign features to help you get the job done fasterand more reliably.▶ A self-locking, two-piece enclosure means no more lostscrews and an easy snap-to-lock installation▶ Integrated biaxial bubble level eliminates the guessworkto ensure proper alignment, requiring one lessinstallation tool▶ The removable, gap-free, liftgate-style terminal stripr educes mounting time to mere seconds and preventsincorrect wiring to eliminate future service calls▶ Optics and electronics are assembled into the frontenclosure and sealed with a protective cover to preventdamage during installation▶ A flexible mounting height makes positioning thedetector easy, and you get no-gap coverage withoutany optical or electronic on-site adjustmentsDetector Reference Guide | 5Ideal for any applicationIntelligent intrusion detection is a delicate balance between responding to real security breaches and ignoring sources of costly false alarms. Bosch offers a choice of detector models that set the standard for reliability and rapid detection.Our intrusion detectors suit the requirements of virtually any application — from residential to large commercial to high security. They stand up to multiple challenges, including strong drafts, moving objects, and the presence of pets.Our complete line includes:▶ Passive Infrared (PIR) and TriTech®(Combination PIR and microwave Dopper radar) – Long-range – 360° ceiling mount – Pet friendly®▶ Request-to-exit PIR ▶ Glass break ▶ Seismic and shock ▶ Photoelectric beam▶ Wireless communication6| Bosch Security SystemsBlue Line Gen2 Series Detection is PowerPIRStandardPet Friendly®Quad PIR* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useDetector Reference Guide | 7 TriTech® (PIR + MW)Standard Pet Friendly®8| Bosch Security SystemsCommercial SeriesDetection delivered. Reliability assured.TriTech (PIR + MW)StandardAnti-maskas curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useDetector Reference Guide | 910| Bosch Security SystemsProfessional SeriesIntelligent Motion DetectionPIRTriTech® (PIR + MW)StandardAnti-maskStandard* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useTriTech® (PIR + MW)Anti-mask CurtainAnti-mask CurtainClassic Line Long Range PIRLong-range* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useTriTech® (PIR + MW)Long-range OutdoorClassic Line Ceiling Mount PIRCurtain Wide angleLow-profile Panoramicas curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor usePIR TriTech®(PIR + MW)PIR TriTech® (PIR + MW)PanoramicHigh-Performance PanoramicPIRRecessedas curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useRADION wireless†Superior Range and Reliability PIR TriTech® (PIR + MW) Pet Friendly® Standard Pet Friendly® Curtain Pet Friendly®Standard† Wireless peripherals require a compatible receiver. B810 RADION receiver is compatible with SDI2 bus panels (B Series and G Series); RFRC-OPT is compatible with Option bus panels; RFRC-STR is compatible with Streamline bus panels.* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useGlass break Door/Window Contacts OtherAcoustic Surface Mount RecessedMount Universal Transmitter SmokePortable Other Keyfob Panic Button Bill TrapPremises Wireless (ZigBee) RADION ZB PIR TriTech® (PIR+MW) StandardStandard* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86°F (30°C), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32° to 120°F (0° to 49°C), indoor use.*** Power source has capacity for an additional battery increasing the battery life from 6 to 10 years (RFPR-ZB) or from 3 to 6 years (RFDL-ZB).**** All models feature a two-piece design, self-locking enclosure, interchangeable mounting base and integrated bubble level.Specialty Request-to-exit PIRStandardHigh-performance* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useSpecialty Glass Break AcousticStandardComboMagneticContactSpecialty Photoelectric Beam Dual BeamShort RangeMedium Range* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useSpecialty Photoelectric Beam Quad BeamMedium RangeLong Range* QS — single channel QF — four channelSpecialty Seismic/ShockSeismic Shock StandardHigh-performanceStandard* Difficult environments include rooms with potential false alarm sources, such as: air conditioning vents, strong drafts of cold or warm air, slow moving objects such as curtains, plants, or signs hanging from the ceiling, a fan that could be running when the system is activated, under floor heating, room temperatures exceeding 86℉ (30℃), a detector that could be exposed to bright white light (car headlights, floodlights, direct sunlight, etc.)** For UL installations the operating range is 32℉ to 120℉ (0℃ to 49℃), indoor useN e wAccessoriesNotesDetector Reference Guide | 31 NotesA Tradition of Quality and Innovation For 125 years, the Bosch name has stood for quality and reliability. Bosch is the global supplier of choice for innovative technology backed by the highest standards for service and support. Bosch Security Systems proudlyoffers a wide range of security, safety, communications and sound solutions that are relied upon every day in applications around the world, from government facilities and public venues to businesses, schools and homes. Bosch Security Systems, Inc.130 Perinton ParkwayFairport, NY 14450 USAPhone: 800.289.0096Fax: 585.223.9180For more information please visit © Bosch Security Systems, 2016 Modifications reservedPrinted in United States | 10/16BINBR_DETECT-REF_v20161028。
COMMUNICATION SYSTEMS FACE INCREASED SECURITY RISKIP-based systems face an increasing risk of intrusion and system compromises that are constantly evolving. As mission-criticalcommunications networks become interconnected to other IP-based systems, they are just as exposed to cyber threats and require proactive risk management.Having security elements like anti-malware, firewalls or intrusion detection systems inspecting traffic traversing the network are not enough. Enterprise systems must be constantly monitored by experienced security professionals trained to detect, characterize and respond to security events. Proactive security monitoring helps you stay a step ahead of threat detection and mitigation to maintain optimal network performance.Included with our Premier Services and optional in our Essential and Advanced Services packages, Motorola’s Security Monitoring service provides a comprehensive methodology to identify, protect, detect, respond and recover mission-critical communication systems and IT networks from cybersecurity incidents.By relying on Motorola for security monitoring, you are partnering with the global leader and innovator of mission-critical communications solutions providing unmatched experience, expertise and support for protecting land mobile radio systems and enterprise networks.In 2014, the National Institute of Standards and Technology (NIST) issued the Framework for Improving Critical Infrastructure Cybersecurity, which outlines drivers to guide cybersecurity activities and serves as a basis for organizations to formally consider cybersecurity risk as part of their risk management process. The framework provides a blueprint of activities to achieve specific cybersecurity outcomes and consists of five concurrent and continuous functions: identify, protect, detect, respond and recover.Motorola applies this framework to deliver comprehensive Security Monitoringand Management services.Respond to suspicious events by performing remote investigation, diagnostics and if necessary take action to neutralize the threat.Detect suspicious system faults, network traffic anomalies and potential security threats real-time, 24 x 7.Protect all networks from attacks with proactive security updates and monitoring for suspicious activity.Identify assets to be monitored, categorized and risk-prioritized.Recover by restoring affected components or the entire system to proper operational state.PROACTIVELY PROTECT MISSION-CRITICAL INFRASTRUCTURE FROM CYBER ATTACKS AND THREATS247MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registeredtrademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. ©2016 Motorola, Inc. All rights reserved. 02-2016REAL-TIME REMOTE MONITORING BY CERTIFIED PROFESSIONALSExperienced, highly trained and certified security professionals are staffed 24 x 7 at Motorola’s Security Operations Center (SOC)dedicated to monitoring the secure state of your IT systems. The skilled technologists are continuously updated on the latest cyber threat intelligence and apply event correlationand analytics tools to assess the monitored environment for potential threats and ready to take immediate action to protect network integrity. Remote security monitoring covers:• M anagement of firewalls, intrusion detection sensors, authentication and logging servers• W orm, virus, phishing, social engineering and other malicious activity •N etwork vulnerabilities • A bnormal network activity• C ompromised host command and control communication • W eb content filtering of domains and management of exemptions• E mail security with spam filtering and data loss protection (DLP) through email• F ull-packet capture that stores and analyzes all network traffic at the Internet Point of Presence (IPOP)• A dvanced behavioral analytics for internal data theft and extricationPotential incidents are investigated by security analysts whothoroughly research and analyze the event. If the event is a confirmed incident, the technologists will conduct remote diagnostics to remedy the situation immediately or dispatch a local technician to the site. The dedicated security team continues to monitor the event until fully resolved. Many times, security events are caught and resolved before impacting the network helping you minimize maintenance costs and ensuring reliable system performance.PROACTIVE COUNTERMEASURES FOR RISK MITIGATIONAs attacks become more sophisticated, prevention is critical for a successful security strategy. Motorola’s monitoring of customer networks enables the ability to rapidly identify emerging security threats that may potentially impact other customers. This visibility makes it possible to recommend proactive countermeasures to help mitigate network security risks. As soon as an issue is identified, the Security Operations Center has test labs to duplicate the issue and develop a resolution before it’s made available for deployment on the customer’s network.ANALYTICS FOR CONTINUOUS PROTECTIONMonthly reports are generated to keep you informed on the overall security risk posture of your system with details related to youroperational environment. When investigation is deemed necessary, our certified forensics experts can extract and examine critical intelligence for use as evidence or to establish future preventative safeguards.For more information about our Security Monitoring Service, contact your Motorola representative or visit /cybersecurity.。
. .文档类型:文档编号:亿赛通电子文档安全管理系统 V5.0安装手册亿赛通科技发展有限责任公司2016年1月页脚目录第一章引言 (3)1.1 目的 (3)1.2 围 (3)1.3 名词定义 (3)1.4 参考资料 (3)第二章运行环境 (4)2.1 硬件环境 (4)2.2 服务端的支持情况 (4)2.3 客户端的支持情况 (4)2.4 安装程序说明 (4)第三章服务器安装 (6)3.1 服务器安装流程 (6)3.2 CDG-Server安装 (6)3.2.1 数据库安装 (6)3.2.2 服务器安装过程 (6)3.2.3 运行检查 (9)3.2.4 数据库配置 (13)3.2.5 获取授权与导入 (14)3.2.6 F ileZilla FTP Server服务器部署 (16)3.3 MediaSec-Server安装................................. 错误!未定义书签。
第四章客户端安装. (25)4.1 CDG-Client安装...................................... 错误!未定义书签。
4.2 MediaSec-Client安装................................. 错误!未定义书签。
第五章服务器卸载. (28)5.1 CDG-Server器卸载.................................... 错误!未定义书签。
5.2 MediaSec-Server卸载................................. 错误!未定义书签。
第六章客户端卸载 (30)6.1 CDG-Client客户端的卸载.............................. 错误!未定义书签。
6.1.1 服务器终端卸载 (30)6.1.2 输入卸载码卸载 (33)6.2 MediaSec-Client卸载................................. 错误!未定义书签。
VSB手机门户管理平台技术白皮书申明所有,本手册中的任何信息未经博达软件的同意不得以任何方式〔包括纸、印刷品、电子出版物、电子文档等信息传播媒介〕复制、传播、摘抄、再发表。
就像我们始终确保高质量的优质产品一样,我们同样竭力保证本手册的精细以与准确性,但即便如此,我们依然无法绝对保证手册中的信息不存在偏差,所以根据本说明书进展操作之前,请对您要做的每一步都经过足够确实认。
我们保有因为产品的升级而修改本手册的权利。
最新信息本产品最新版本信息、升级信息以与相关技术文档将在博达软件产品.vsbclub.与时公布,敬请留意。
信息反应博达软件欢迎您通过以下各种的渠道向我们提供尽可能多的信息,您的意见和问题都会得到我们的重视和妥善处理,通过以下联系方式可以反应您宝贵的意见:➢通讯地址:中国·高新技术产业开发区科技4路209号4层➢:710065➢:1➢:9➢客服:400-605-1065➢公司.chinawebber.➢产品.vsbclub.➢电子:marketchinawebber.〔商业联系〕surpportchinawebber.〔技术支持〕1.概述据CNNIC统计,截至2012年12月份,我国手机网民达到4.2亿,年增长率达到18.1%,从2012年第二季度开始,中国移动互联网用户数已经超过了桌面互联网用户数。
中国移动互联网用户在全国互联网用户中比重不断提升,已占到74.2%,手机已成为第一上网终端。
中国手机网民对手机上网依赖性较强,根据调查,79.9%的手机网民每天至少使用手机上网一次,65%的手机网民每天使用手机上网屡次。
而且,中国手机网民手机上网的黏性较大,手机上网不仅挤占了手机网民的碎片化时间,也逐渐开始占据手机网民的其他时间,成为中国手机网民的一种生活方式,根据调查,中国手机网民平均每天累计手机上网时长为124分钟,其中,每天上网4小时以上的重度手机网民比例达到22%。
手机的便捷性使用户可以随时随地、碎片化时间使用手机上网,手机、平板电脑等移动终端接入互联网已经成为趋势。
MOTOROLA内部控制标准1.0一般控制要求2.0收人周期3.0采购周期4.0工资周期5.0制造周期6.0融资周期8.0计算机系统控制一、序言自1979年,摩托罗拉就已正式阐明一项公司完善经营和财务控制制度的政策。
内部控制标准的产生,以文件的形式证明哈托罗拉始终不渝地遵守适用的法律和规定,实行可靠的经营和财务报告制度,以及保证本公司业务活动和记录的完整。
“摩托罗拉内部控制制度”及与之相关的外部环境的概述如下。
此版标准的颁布,旨在保证控制标准符合自上一版以来由于不断变化的全球商业环境,新制定的法律规定以及计算机技术和应用的进步使之成为必需的控制要求。
此版亦加强了手册向使用者传达内部控制标准和准则的有效性。
对风险和标准信息进行了修正,以保证在全公司内得以适当地解释和应用。
对上一版未包括的业务活动增设了标准。
对1989版的重大更改的概要见附录C。
二、目标正如总裁和财务总监在引言中所述,良好的内部控制是实现我们的主要创意和目标之根本。
例如,要达到和超过六个西格玛质量和不断地缩短循环作业周期,不仅在我们的工厂,而且在维修中心,销售中心,行政管理部门以及整个组织,都需要良好的程序管理。
运用本文件所述的控制标准可以有助于消除瓶颈,冗余和不必要的步骤。
内部可以防止资源损失,其中包括固定资产,库存,专有资讯及现金。
内部控制可以有助于确保遵守适用的法律和内部规定。
按照内部控制准则定期进行审计,可以确保一个控制过程始终是受到控制的。
此文件的目标旨在确保全公司具备基本的和一致的内部控制。
摩托罗拉内部控制标准第三版是全公司各职能部门众多摩托罗拉同事不懈努力的成果。
其中的控制标准,是以达到我们内部控制制度的基本目标的方式撰写的。
这一制度认识到,必需符合我们的客户、股东的期望,遵循我们的法律规定,例如1977年国外反腐败法案(见附录B)和证券交易委员会条例。
遵循这些控制是义不容辞的。
摩托罗拉董事会审计委员会,公司审计部,以及我们各事业总部,集团和分部的财务部门将监察我们对这些标准的遵守。
P T T (Push-to-Talk) – Whole work teams can communicate instantaneously with a single button push. The large PTT button on MOTOTRBO radios makes communication easier than ever, even for workers wearing gloves.Text Messaging – When voice communication isn’t practical due to excessively high noise, workers can quickly and easily share information with colleagues using text messaging.Work Order Ticketing – Prioritises personnel and creates efficient workflows. Work order ticketing helps resolve issues fast, enhances the efficiency of personnel responding to issues and coordinates maintenance. It also helps generate reports to ensure efficient workflows.Telemetry – MOTOTRBO supports the transmission of simple telemetry messages that can be used to display messages or toggle output on a radio. Telemetry helps target specific commands to reduce downtime and optimise operational efficiency.Intelligent Audio – Factories can be noisy places and workers need to hear and be heard clearly. MOTOTRBO radios adjust volume automatically in line with fluctuating background noise to ensure commands are not misunderstood or requests for help mand & Control – Integrates powerful voice and data communications with advanced fleet control and dispatch functionalities. Control room personnel are better equipped to organise and deliver routine tasks, communicate with teams on the plant floor and make faster decisions.WAVE Work Group Communications – Instantly connects workers using different devices and networks. WAVE allows workers to communicate with colleagues over push-to-talk, whether on a smartphone, two-way radio, laptop, landline or tablet. It removes barriers to interoperability for better real-time coordination between teams.CONNECTING PROCESSES, THE SMART WAYSmart technology undoubtedly streamlines operations by automatingand connecting processes so more gets done and less wasted. Butfor automation to work effectively, the workforce has to be connectedthrough clear, immediate voice and data communications. Only thencan the plant work seamlessly and react to every event.ENHANCING EFFICIENCY WITH MOTOTRBO™Efficiency has shaped the development of the new generation of MOTOTRBO radios. Purpose built for plant communications, they include a range of mission critical features that bring efficiency to the fore.P T T Explore in more detail by downloading our ‘Intelligent Radio For Smart, Connected Manufacturing’ brochure or visit us at /manufacturingMOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings,LLC and are used under license. All other trademarks are the property of their respective owners. © 2016 Motorola, Inc. All rights reserved.MANUFACTURERS GUIDE TO SMART COMMUNICATIONSWITH SMART COMMUNICATIONSStreamlining manufacturing production by addressing current process and worker inefficiencies is key to keeping customers happy and maintaining a competitive advantage. Because when workers do more with less, factories work smarter.。
MOTOTRBO™Enhanced Campus Security CommunicationsACCELERATE PERFORMANCE.MOTOTRBO™ StrengthensSecurity for Campuses.Y ou know the challenges. Y ou face rapidly escalating costs that result in tighter budgets, requiring you to do more with less. Ensuring safety and security has never been more important—leading to a growing focus on incident prevention. Managing employees and students on the move isn't easy either. Clear communication is essential. MOTOTRBO offers enhanced communication performance that can strengthen both security and productivity.Powered by advanced Motorola technology, the MOTOTRBO Professional Digital Two-Way Radio System is ready to help you respond to those challenges with a remarkably cost-effective solution.More for Y our MoneyCompared to analog solutions, MOTOTRBO ™offers twice the calling capacity for the price of one license—thanks to Time-Division Multiple-Access (TDMA) technology. A second call doesn’t require a second repeater, saving on equipment. MOTOTRBO utilizes Motorola's IMPRES ™ technology in batteries, chargers and audio accessories in providing longer talk times and clearer audio delivery.Moreover, MOTOTRBO radios are built to last. They meet demanding standards: U.S. Military Standard 810 C, D, E, and F , and, for portable radios, IP57 for submersibility in water. So they're ready for the harsh conditions your employees may face.Better Communication—and More OptionsWith MOTOTRBO's digital technology, audio stays clear throughout the coverage area—for fewer mis-understandings and more effective conversations. Battery life that's up to 40 percent longer than that of a traditional analog radios helps ensureproductivity—no time wasted in changing batteries during a work shift. MOTOTRBO radios give you the fl exibility to call an individual radio, group of radios, or every radio in your system.But MOTOTRBO’s communication versatility doesn’t stop there. Advanced digital technology brings support for new applications, such as Text Messaging Services, which provides an easy way to send critical data and saves users from having to write it down.In addition, all MOTOTRBO radios support emergency call signaling—which provides fl exible emergency-response options even for operations that don't have a central dispatcher.Keep T rack of Y our Peopl eWith the GPS-based Location Services, you can track where your portables and mobiles are. This makes it easier to manage personnel and vehicles to ensure safety and productivity.A Complete, Flexible, Highly Capable System MOTOTRBO brings you a private, standards-based, cost-effective solution that can be tailored to meet your unique coverage and feature needs—with the fl exibility that a complete system offers—portables, mobiles, repeaters, applications, accessoriesand services.MOTOTRBO Location ServicesMOTOTRBO Text Messaging ServicesVoice andData IntegrationIncreased CapacityEnhanced PerformanceMOTOTRBO AccessoriesMotorola offers these, and many other accessories to enhance convenience and productivity.PortableNylon Carry CasePMLN5015AKeeps the radio secure and safe.Universal RadioPAK and Utility CaseRLN4815AWith zippered pouch for on-the-job necessities.Lightweight HeadsetRMN5058AFor high clarity and discrete communication in moderate noise environments.MobileIMPRES ™ Keypad MicrophoneRMN5065For navigating radio menus from the microphone.Motorola—A Name Y ou Know and T rustFor more than 75 years, Motorola has been a leader in creating state-of-the-art wireless communications for people like you. The MOTOTRBO™ Professional Digital Two-Way Radio System upholds that superior standard. Each radio and repeater is backed by a two-year Standard Warranty plus one-year Repair Service Advantage and at least a one-year warranty for accessories. So when you select MOTOTRBO, you’ll experience the same exceptional quality you’ve come to expect from all Motorola products.Portable Radio Standard Package Includes:• Radio • A ntenna—Standard whip included with XPR ™ 6500 and XPR ™ 6300Standard whip with GPS included with XPR ™ 6550 and XPR ™ 6350• IMPRES ™ Li-ion 1500 mAh Submersible Battery • IMPRES ™ Single Unit Charger • 2.5" Belt Clip • User Guide CD • 2-Y ear Standard Warranty plus 1-Y ear RepairService Advantage (US only)/Extended Warranty (Canada Only)Mobile Radio Standard Package Includes:• Radio • Trunnion• Cabling (power cord)• Compact Microphone • R eplaceable Button Kit • User Guide CD • 2-Y ear Standard Warranty plus 1-Y ear RepairService Advantage (US only)/Extended Warranty (Canada only)Repeater Standard Package Includes:• Repeater• 120V AC Power Cord • Installation Manual• 2-Y ear Standard WarrantyMotorola, Inc.United States:1309 E. Algonquin Road Schaumburg, Illinois 60196Phone: 1-800-422-4210TTY: 1-800-522-5210Fax: 1-800-622-6210MOTOROLA and the Stylized M Logo are registered in the U.S. Patent and Trademark Offi ce. All other product or service names are the property of their registered owners. © Motorola, Inc. 2007 MD-EU/TRBO/CAMPUS。
MOTOROLA BTS系统维护操作手册第一章基站BTS硬件设备介绍一、M-cell6基站设备介绍(一)M-cell6机柜外观图(二)M_cell 6机柜特性每个M_cell 6机柜最多能放6个载频,用它可以组成的站全向站最大配置是O 12站,三扇区站最大配置是8/8/8站。
M_cell 6机柜既可以配置成EGSM 900M的BTS,也可以配置成DCS 1800M的BTS,但一般每个站只支持一个频段,要么配置成900M BTS,要么配置成1800M BTS。
M_cell 6机柜支持-48V DC/+27V DC/88-264V AC三种电源,但需分别配置NPSM、PPSM、ACPM三种电源模块。
M_cell 6机柜的电源和2Mb/s接口在顶板上。
(三) M_cell 6机柜相关参数及性能指标电源:支持3种形式中的任意一种电源输入:①+27V DC (+20V — +30V)②-48V DC (-40V — -72V)③88V — 264V AC,45 — 66 Hz最大功耗: 2.4kw工作环境温度: -5℃— +45℃机柜尺寸(高×宽×深): 1760mm×710mm×450mm重量:150kg(不包括载频)M_cell 6基站的主要性能指标项目指标机柜的最大载频数 6基站的最大机柜数 4基站的最大配置24载频无线接收频率880-915MHz (EGSM 900)1710-1785MHz (DCS 1800) 无线发射频率925-960MHz (EGSM 900)1805-1880MHz (DCS 1800) 输出功率40W(一级合路后20W)(EGSM 900)32W(一级合路后16W)(DCS 1800)接收灵敏度-107 dBm (EGSM 900)-108.5dBm (DCS 1800)(四)M_cell 6基站设备板件介绍1、MCU全称:Main Control Unit中文:主控制单元功能:主要为时钟同步和控制相应的TCU的业务和控制信道。
主设备维护手册(MOTOROLA分册)第一章一般外围告警故障处理(等级:高级维护)第一节告警数据的制作由于现有MOTOLOLA设备种类繁多,为便于监控数据的制作,保证短信能及时收到,现将所有的数据罗列出来,同时因机房值班人员对现场情况不了解,区维在通知机房做数据时最好说出是下面的哪一种站形。
要保证短信能收到。
除在OMC上做数据外,还必须将站点的中文名称添加在基站短信系统上,这点很容易忘记。
操作命令说明:disp_equ * eas 0 0 查看某站的环境告警数据(*为站号,下同)lock * eas 0 0 锁某站的eas 的0 0口unequ * eas 0 0 删除某站eas 0 0口的监控数据equ * eas 开始做某站的eas监控数据ins * eas 0 0 激活某站的eas 0 0口以53号站做数据为例:第二节一般外围告警故障的处理1)检查外部告警的数据有无做错;2)如无做错数据,把动力接入PIX盒的告警线拔开,用万用表检查PIX盒插槽的电压,如果有24V的电压,则基站设备无问题,问题出在动力部分,由动力人员解决;如果无电压,则问题出在基站设备;3)检查告警线有无接错;4)如果告警线没接错,把告警线与机柜的接头拔开,看是否是插针有问题,是否是接头接触不好;5)用万用表检查机柜顶的告警线的电压,如有24V,则问题在由机柜顶到PIX盒的告警线,把该告警线换掉;如无电压,则问题出在由机柜顶告警线到AB6之间的设备段;6)换掉AB6,检查外部告警是否正常;7)如不正常,则换掉AB6到机柜顶的告警线。
PIX 色表图第二章 BTS中断抢修一般技术流程(等级:高级维护)1)从OMC观察该BTS断站前的历史告警,以确定故障点和故障模块;如不能确认,则进行下一步;2)从机柜顶2M口做自环,如正常,则可能是由DDF架2M口到机柜顶2M口这一段线之间的问题;如不正常,继续下一步;3)检查NIU(Hor_Cell)模块;4)进入第三层,确定BTS能否自检,自检能否通过;5)根据BTS内部模块故障易发顺序查找故障点;一般来说,BTS内部模块故障易发顺序为:Hor_Cell: NIU MCU NPSM BPSM SURF确定故障点后,把故障模块换掉。
Motorola 系统安全操作手册安全操作手册2009-9-22目录第一部分Motorola网络系统操作方式 2导航图方式:3远程登录方式:3Example 3第二部分Motorola 网络安全操作命令介绍6命令安全等级介绍6命令介绍(按功能类型分)6终端操作指令6告警组7咨询题小区组9GPRS组11保证组12资源组14第一部分Motorola网络系统操作方式OMC提供了图形用户界面,使用户能方便地通过OMC应用软件来对GSM的无线网络进行治理。
用户通过导远程登录航图或者远程登录的方式进行BSC/BTS系统配置治理和修改。
导航图方式:导航图界面如下,点击子项,可进入下一级系统菜单:远程登录方式:通过远程登录方式使用命令对网元进行操作:ExampleExample 1作用:激活BSC的MSI 1 0 0 接口板ins_device bsc msi 1 0 0警告:此命令会导致设备临时退服Example 2作用:闭锁15#基站的DRI 1 0 0lock_device 15 dri 1 0 0Example 3作用:解锁15#基站的DRI 1 0 0 unlock_device 15 dri 1 0 0Example 4作用:重启2#基站reset_site 2警告:此命令会导致基站或BSC重启Example 5作用:重启BSC的MSI 1 0接口板reset_device 0 msi 1 0警告:此命令会导致设备重启Example 6作用:显示Cell ID 5 4 3 2 1 61986 34944状态和信道信息: disp_cell_status 5 4 3 2 1 61986 34944Example 7作用:显示2#基站的告警:disp_act_alarm 2第二部分Motorola 网络安全操作命令介绍命令安全等级介绍按照网络操作命令的阻碍,将命令分5个等级,按无线中心要求和厂家建议,每个等级操作措施如下:命令介绍(按功能类型分)终端操作指令告警组咨询题小区组保证组通信保证组 5.8话务分流参数及切换参数运行GUI,开启树,查找并打开相应CELL的邻区拓展树,打开相应邻区BA表,选择edit模式,在相应切换门限修改所需门限值(差不多为:8、5、 2)。
FACT SHEET MOTOTRBO ION — SECURITYTRUSTED EXECUTION ENVIRONMENT (TEE)A TEE provides end-to-end security byimplementing ARM’s TrustZone technology and handles critical functions and services. It runs on the same processor as the Android operating system but is completely isolated from the rest of the system. This isolation ensures that critical data is stored, processed and protected in a secure environment.TRUSTED FIRMWAREA secure boot process verifies both firmware and software integrity. With secure boot, each stage of the boot process is cryptographically signed with approved keys, which prevents malicious attacks and unauthorized software updates, providing a safe and secure OS launch.THE ANDROIDKEYSTORE SYSTEMThe Android Keystore prevents unauthorized use of cryptographic keys. In addition, apps must specify authorized uses of their keys, and enforce these restrictions outside of the apps’ processes, providing further restrictions on how and when keys are used.DEVICE ACCESS SECURITYSingle- and multi-factor authenticationmechanisms are supported on MOTOTRBO Ion — from simple PIN to other authentication factors such as password, pattern, etc.Valid users will have access to only the data, applications and services for which the users are authorized.THE NIST CYBERSECURITY FRAMEWORKAll MOTOTRBO systems and devices strictly adhere to the NIST cybersecurity framework.NIST security practices are based on continuous monitoring, diagnosis, mitigation options and remediation. We use a risk-based approach throughout our entire product development, implementation and operational support life-cycle. Our protection and response-based controls are built in consultation with industry-leading experts, processes and technologies. For more details on MOTOTRBO systems’ security practices as part of the NIST framework, please click here to view.MOTOTRBO ION HELPS PREVENT HOSTILE CODE FROM RUNNING ON THE DEVICE AND UNAUTHORIZED USERS GAINING ACCESS.DEVICE SECURITY TO PREVENT UNAUTHORIZED ACCESSMOTOTRBO Ion helps you stay safe from cyber threats. A defense-in-depth approach provides multiple layers of security to help prevent unauthorized device access and malicious activity, and to safeguard your critical data. With the highest level of device and network security, combined with real-time threat monitoring, Ion lets you use dataand Android apps with confidence — even on public networks.SECURITY ISPAGE 2FACT SHEET MOTOTRBO ION — SECURITYMOBILE DEVICE MANAGEMENT AND MANAGED GOOGLE PLAYavailable from the Google Play Store and private applications built for corporate use.Through MDM’s, IT admins can:• R emotely distribute approved apps through the Managed Google Play Store and block malicious apps or remove apps • D efine and enable/disable app access for users depending on their profile • S etup real-time notifications on device usage to monitor for malicious activity or non-compliance of security policiesAPPLICATION SIGNINGAPPLICATION SECURITY TO PREVENT MALICIOUS ACTIVITYGOOGLE PLAY PROTECTSAFETYNETSafetyNet is a set of services and APIs that developers may use to protect apps against security threats and mitigate against device tampering, bad URLs, PHAs and fake users.FACT SHEET MOTOTRBO ION — SECURITYDATA IN TRANSIT SECURITYIon implements the industry-standard secure protocols used for data-in-transit, such as SRTP , HTTPS, etc. Available industry standard protocols and security requirements for connectivity interfaces such as WiFi, USB, BlueTooth and VPN have been implemented. In addition, Android provides securecommunications over the Internet for web browsing, email, instant messaging and other Internet apps, by supporting Transport Layer Security (TLS).WI-FIAndroid 10 supports the Wi-Fi Alliance’s Wi-Fi Protected Access version 3 (WPA3) and Wi-Fi Enhanced Open standards, which improve overall Wi-Fi security by providing better privacy and robustness against known attacks.VPNAndroid supports securely connecting to anenterprise network using VPN.DATA AT REST SECURITY SECURE STORAGECredentials, certificates and keys are securely stored in hardware-backed trusted storage on the device.CERTIFICATE HANDLINGCertificate authorities are critical for providing secure communications over a network using the public key infrastructure. With Android 7.0 and above, all compatible devices, including MOTOTRBO Ion will implement only the standardized system certificate authorities maintained in AOSP . All Ion devices will ship with the same certificate authority store.WORK PROFILEFor company-owned devices, IT administrators can implement one of two deployment options to manage the corporate data on these devices:• F ully managed device in which the device is used exclusively for work purposes. IT admins can enforce the full range of management policies to the entire device• F ully managed work profile option, in which the device supports the work profile and a personal profile simultaneouslyIn the second option, the work profile creates a separate, self-contained profile which holds corporate applications and data and isolates those from personal apps and data. Using MDM, device policies can be configured to prevent sharing of files and data from the work profile.DEVICE POLICIESDevice can be configured using MDM to prevent or restrict data transfer to/from the device such as:• P reventing transfer of files using Bluetooth • P reventing transfer of files from the device via USB• P revent access to external storage such as SD card• P reventing mounting of physical external media• D isallowing access to debugging capabilities• Setting device passcode policies • Disabling camera • Disabling screen capture • A llowing installation of apps from known sources such as the Google Play storeMOTOTRBO ION SAFEGUARDS CRITICAL DATA, AT REST AND IN TRANSIT.DATA SECURITY TOSAFEGUARD CRITICAL DATAMotorola Solutions, Inc. 500 West Monroe Street, Chicago, IL 60661 U.S.A. 800-367-2346 MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. © 2021 Motorola Solutions, Inc. All rights reserved. 01-2021For more information, please visit/ionADDITIONAL SECURITY MEASURESANDROID SECURITY UPDATESEvery month, Google publishes AndroidSecurity Bulletins to update users, partners and customers on the latest fixes. These security updates are available for Android versions for three years from the date of release.ANDROID ENTERPRISERECOMMENDED PROGRAMThe Android Enterprise Recommended program from Google provides a set of specifications for enterprise devices and services for hardware performance, deployment, security updates and user experience. These include security updates that are delivered to devices within 90 days of release from Google. In addition, OEMs receive an enhanced level of technical support and training.INDUSTRY STANDARDS AND CERTIFICATIONSAndroid Enterprise has received ISO 27001 certification and SOC 2 and 3 reports forinformation security practices and procedures for Android Management API, zero-touch enrollment and managed Google Play.This designation ensures these services meet strict industry standards for security and privacy.Certifications include:• FIPS 140-2 CAVP• C ommon Criteria/NIAP Mobile Device Fundamentals Protection Profile • D ISA Security Technical Implementation Guide (STIG)• General Data Protection Regulation (GDPR)。
m摩托罗拉天津主厂房承包商环境、健康、安全手册摩托罗拉联系人: 分机:承包商公司全称: 电话:承包商注意事项本程序旨在确保您在摩托罗拉公司所辖区的经营活动不会导致事故发生和人身安全。
任何违反本规定的行为将可能导致终止承包工程合同。
本通告适用于所有工程承包合同。
我承认在日期,收到摩托罗拉梁立国先生提供的摩托罗拉环境、健康、安全规定及以下文件:《摩托罗拉天津主厂房承包商环境、健康、安全手册》我已读懂此摩托罗拉天津主厂房承包商环境、健康、安全手册,并已有充足的机会提出关于本手册内容的问题。
在此我代表本公司表示将遵守此承包商环境、健康、安全手册的要求,并在本公司员工及分包商范围内传播、宣传其中的各项要求。
同时,我公司将遵守未被列入本手册的中华人民共和国及天津市地方的各项的法律、法规。
公司名称:公司代表:头衔:签名:日期:序言对于承包商而言,如果没有一整套完善可行的环境、健康、安全管理系统,不但工程质量无从保证,工程实施也无法顺利进行。
承包商对环境、健康、安全方面的承诺是保证系统正常运行的重要因素。
环境、健康、安全系统需要所有员工(本公司、承包商和分包商)的参与,找出并消除潜在的工作危害。
1、目的与范围•确保摩托罗拉员工及独立承包商及分包商员工的安全。
•分清职责,尽量减少潜在危害。
•保护摩托罗拉及承包商的财产不受损失。
•明确承包商责任与义务。
本规定适用于所有承包商、分包商、代理及驻厂代表在摩托罗拉境内的所有工程、维护及有关事宜。
在必要时,摩托罗拉将随时对本规定进行修补和补充。
2、独立承包商的责任摩托罗拉十分关注独立承包商及其员工的安全。
摩托罗拉要求所有独立承包商必须遵守中华人民共和国的相关法律、法规。
任何违反本规定的行为将导致终止合同,一切由此造成的损失由承包商负责。
3、培训摩托罗拉有权在任何时间向承包商索取其员工的各项培训记录。
独立承包商有义务将本规定的内容传达给分包商及其雇员,并保证各项培训的实施。
基本要求遵守国家及地方各项法律法规承包商有责任和义务搜集、了解并严格遵守国家及地方各项适用法律、法规。
复位/重启/锁i/reset_d/l 0 site 站号重启或锁基站i/l 站号dri 0 0 复位或锁载频i/l 0 mms mms口复位或锁mmsi/l 0 path 站号0/1 复位或锁pathi/l 0 rsl 站号0 复位或锁rsll 站号eas 0 0 锁外部告警(如高温告警,烟感,空调等)DISP(显示命令)disp_site 显示某站disp_act 站号显示某站的告警disp_cell_s 站号显示某小区占用disp_cell 4 6 0 0 0 29466 CI 显示某小区参数disp_equ 站号dri 0 0 full 显示0 0载频定义数据(如载频类型,槽位,装备机柜,天线口选择等,double=ctu2 single=ctu1)disp_eq 站号rtf 0 0 显示0 0 RTF定义数据disp_eq 站号cab 1或0 显示M 或Hdisp_ele bsic 站号all 查看基站所有小区的bsic 基站识别码disp_mms 0 mms口查看BSC的mms口时隙占用(亦可查看某站的mms口占用)disp_mms_ts_usage 0 mms口查看BSC的mms口时隙占用(亦可查看某站的mms口占用)disp_in 看时段disp_stats 时段intf_on_idle cell=4 6 0 0 0 29466 CI 看干扰值disp_stats 时段path_balance cell=4 6 0 0 0 29466 CI 看PB 值(PB过低,下行有问题,基站发射通路问题,PB过高,上行问题,接收有问题)disp_stats 时段rf_losses_tch cell= 4 6 0 0 0 29466 CI 看掉话disp_stats 时段ber cell=4 6 0 0 0 29466 CI 看误码率disp_stats 时段fer cell=4 6 0 0 0 29466 CI 看误帧率disp_stats 时段total_calls cell=4 6 0 0 0 29466 CI 通话总数disp_rtf_ch站号rtf号看载频时隙占用情况disp_ho站号显示某站的跳频频点disp_p 0 看BSC gproc板状态disp_0 msi * * 看BSC msi板状态disp_nei 4 6 0 0 0 29466 CI 看某小区的相邻小区disp_nei 4 6 0 0 0 29466 CI 4 6 0 0 0 29466 CI(相邻小区)看某小区的相邻小区参数disp_bss 显示该BSC所有基站BCCH频点disp_gsm_cells 站号显示某站的所有小区disp_cal_d 站号dri 0 0 显示某站00号DRI 数据SWAP (倒换命令)reassign 0 site 站号lcf 2(lcf数) 将站改到其他GPROC板swap 0 tdm 倒换业务到备用KSW板swap_device 站号btp 倒换某站的备用主控板为主用主控扳swap_device 0或站号gclk 倒换BSC或某站的备用gclk板为主用gclkalarm 0 on 打开告警alarm 20 on 打开20号站告警STATE命令(状态命令)BTS硬件状态:state 站号dri/rtf * * 显示某站的所有DRI和RTF状态state 站号cab/ btp/ gclk /msi/csfp/eas * * 显示某站所有的机柜/BTS主控板/通用时钟板/msi板(BTS中就是NIU板)/代码存储设施处理器状态/外部告警输入BTS 链路状态:State 站号mms/rsl * * 显示某站所有2M物理信号端口/无线信令链路BSC硬件状态:State 0 cab/cage/gproc/gclk/bsp/msi/ksw/axcdr/lcf /pcu/ tdm * * 显示BSC所有的机柜/机箱(机柜中有多个机箱)/GPROC板(通用处理器板)/通用时钟板/BSC 处理器/MSI板(多端口串行接口板)/KSW(千端口交换板:1024 TDM时隙交换)/代码速率转换板(又名trascode变码器)/链路控制功能(完成各种链路控制,装备于gproc板上)/PCU(gprs处理器)的状态/时隙生成BSC链路状态:State 0 path/mms/mtl/oml/xbl/gsl/ lan * * 显示BSC所有的路径path/mms口(2M 传输口)/MTP传送层链路(A-接口):连至MSC/操作维护链路:连至OMC/xcdr 与bss之间的通信链路/未知/未知的状态BSC 四总线状态:State 0 pbus/cbus/sbus/tbus * *其他:state 0 oos site * * 显示BSC退服的所有站state all oos dri * * 显示BSC退服的所有载频CHANGE 命令(修改参数)Change_level 修改安全级别基站参数:(change_ele )格式:chg_cell 参数名参数值站号cell=4 6 0 0 0 29466 CI 修改某小区的参数chg_ele phase_lock_gclk 0 站号消除BSC上的的时钟告警: GCLK 0 0 0 4 FMIC 260000B9 04-04-2006 Phase Lock Lost (会引起掉话)reat 0 站号消除BSC上的的时钟告警chg_ele max_tx_bts〈n〉站号cell=4 6 0 0 0 29466 CI 降整小区功率(〈n〉=3=6dB=原功率*1/2²)chg_ele gsm_half_rate_enabled 1 42 all 开启42号站所有小区半速率chg_ele number_sdcchs_preferred 16 35 cell = 4 6 0 0 0 29466 49452(当小区SD 拥塞,TCH空闲多时,可通过增加SD来解决) 修改35号站的SD为16个chg_ele bts_power_control_allowed 1 54 all小区参数:(change_cell_ele )格式:chg_cell_ele 参数名参数值 4 6 0 0 0 29466 CI 修改某小区的参数应用:chg_cell_id 4 6 0 0 29466 CI 4 6 0 0 0 29466 CI(新CI)修改CIchg_rtf_f 5 41 0 0 把41号站0 0载频的频点改为5 41=site号(不要乱用)ADD/COPY /DEL命令(增加/复制/删除命令)(开站或网优时用)复制小区命令格式:Copy_cell 源小区目标小区站号BSIC码如:Copy_cell 4 6 0 0 0 29466 CI 4 6 0 0 29466 CI 3(站号)6(BSIC)add_cell 4 6 0 0 0 29466 CI 站号某站增加小区add_nei 4 6 0 0 0 29466 CI(源小区)4 6 0 0 0 29466 CI(目标小区)internal增加BSC内相邻小区add_nei 4 6 0 0 0 29466 CI 4 6 0 0 0 29466 CI external 增加BSC之间相邻小区EQ/ UNEQ (装载/卸载命令)格式:eq/uneq 站号设备名eq/uneq 0 site BSC开站或卸载站eq/uneq 站号cab/path/msi/rtf/dri 装载或卸载某站的机箱/路径/MSI板/RTF/载频MODIFY (修改参数值命令)modify_v 站号antenna_select 天线口dri 0 0 修改载频天线口(注:用此命令前需先锁该载频)modify_nei 4 6 0 0 0 29466 48872 4 6 0 0 0 29466 49030 ho_margin_cell 8帮助命令:help <command> 显示某个命令的帮助信息。
摩托罗拉BSS系统安全监控手册摩托罗拉浙江分公司协维组内容提要本部分内容综述GSM BSC级系统网络的硬件告警处理及一些日常监控方法,提供维护过程中分析问题的一般思路,对常见告警的处理,实际故障解析等。
对一些工具的使用,还有常见故障的案例和日常维护工作的注意事项。
通过本部分的学习读者将具有GSM BSC级网络维护的一般知识,掌握BSS系统基本维护技能,能够承担日常的网络维护工作。
目录序论 (4)维护工作的要旨——防患未燃 (4)分析问题的一般思路 (5)第一章日常监控数据收集说明 (6)1、ECT的使用方法 (6)2、Event log的收集和说明 (7)3、SR数据的收集方法 (7)第二章BSS系统安全监控 (8)1、告警定义 (8)2、监控列表及描述 (9)第三章故障处理分析 (19)1 、常见故障分析 (20)2、日常工单汇总 (32)序论维护工作的要旨----防患未燃系统建设完成经过验收后,就转入系统维护工作。
由于此时系统已经给终端用户提供服务,网络的任何故障均可能对终端用户产生影响,从而对运营商的形象产生影响。
所以维护工作的要旨是防患于未燃,将系统隐患尽早排除,不要使其成为系统故障而影响系统的性能。
预防性维护是我们的最佳选择,定期对任何一个BSS网元的巡检和对基站的安装调测都进行严格的检测调整,保证系统及其附属外围设备工作在正常状态,通过集中性预防维护,可以及时发现系统隐患并加以排除,最大限度地提高现行系统设备的利用率,增强系统设备的可靠性,从而减轻平时日常维护的压力。
由于各个方面的原因,诸如传输、不同厂家设备配合、各个厂家硬件的稳定性、软件、气候、环境等,使得系统会出现一些不可预知的问题。
如何解决此类问题,尽快恢复系统工作。
分析问题的一般思路遇到问题时,保持清醒的头脑,认真仔细的分析问题,做好必要的检查,收集相关数据,最大限度的掌握材料对于我们迅速准确的判断问题是有很大的帮助。
首先我们要分清是局部问题,还是系统问题,是单个基站的问题,还是整个BSC的问题,是一个BSC的问题还是MSC下所有的BSC 问题。
通过初步的故障定位,进行初步的处理与测试,缩小故障范围,直到找到最终的故障原因。
其次我们要通过各种方法,寻找问题可能有的规律,如特定的时间,具有周期性等等。
寻找出规律,就能加快故障定位,在日常的维护中出现的最多是硬件故障,而系统的硬件又是整个网络运行的最基本保障,有些硬件故障是我们可以解决的,而有些硬件故障是需要CNRC来协助解决,所以就需要收集一些SWFM、LOG等数据。
每次出现的故障及处理好后都要做记录,以便为以后出现故障提供参考。
第一章日常监控数据收集机房维护人员经常碰到告警,有些告警是操作维护过程中自然产生的,有些告警是瞬时性的,不会影响系统正常运行,但频繁的出现也会加大系统的负荷,因此对于我们维护人员来说,怎么发现告警,怎么来定义告警,有些告警是需要通过历史事件来发现跟踪,还有一些告警故障是需要CNRC来协助我们解决,在CNRC处理的过程中当然会需要一些数据分析说明,所以需要我们来收集一些告警事件,SWFM、MMI LOG、EVENT LOG等数据,因此我们有必要知道日常维护中的一些命令和工具的使用。
一:ECT:Event count tool 是COP的工具之一,该Tool只统计ALARM 告警,可以统计出整个OMC的告警次数,也可以具体统计出某个设备产生告警的次数,所以我们可以通过ECT了解现网的告警趋势,对于一些EVENT如传输、信令的闪断,和硬件板主备用的倒换这样告警事件是无法统计的,而ECT保留的数据一般是一星期,所以我们在日常的维护中如何应用该工具、如何从ECT里发现告警、如何分析告警,具体操作可参考附件:二:EVENT LOG 是网元产生的所有告警信息,存放了所有的告警历史事件,存放的时间一般一星期,因此当网元出现故障时,我们一般要去收集几天的Event log 数据来进行分析,从Event log里可以发现具体的告警信息时间及出现的次数来找出故障的原因,对于现网中EVENT数据的收集,我们可以采用CELL 命令和OMC-R上的Event Logs的窗口来收集,具体方法参考附件。
三:在网络维护中经常需要CNRC的协助,所以也有必要知道开SR的流程和配合CNRC来解决问题,在我们开SR后,负责该CASE的CNRC人员需要一些数据,这些数据就需要我们及时的收集和发出,在硬件方面的CASE,CNRC一般是需要故障网元的一些SWFM、MMI LOG、EVENT LOG,如还需要其他数据,CNRC会给出详细的操作说明,具体操作说明详见附件。
第二章BSS系统安全监控日常的网络维护中,发现有些告警对系统影响不大,如EAS外部告警、IAS内部告警;而有些告警出现次数很少,往往出现会给系统带来严重后果,严重会导致系统重起,如 GPROC、BSP、KSW等一些的告警,因此日常对这些严重的告警(BSC级以上网元)要实时监控,对于这些监控的告警内容要熟悉掌握,这样才能在发现告警后做出准确的判断处理,对这些告警尽早发现、分析、定位、解决,让网络保持良好的运行。
一:告警定义在维护中一些实时告警是需要我们时时关注的,这些告警我们定义在OMC-R上Event Mgt窗口上,如何在OMC-R上Event Mgt窗口定义告警、如何在该窗口查看告警,请参考附件:二:监控列表及描述日常的安全监控应该从软件、硬件及信令负荷来分析处理,我们现在监控的主要是BSC级的告警,因为网络正常运行最基本的条件是硬件正常工作,如果网元都不能正常运行,所有的性能指标也毫无意义,所以在日常的网络维护中,掌握一定的告警分析和处理技能,显得非常重要,这里就对我们监控的告警进行说明解释。
1:GPROC告警GPROC:Generic Processor board 完成BSC站和RXCDR站的基站控制功能,如故障管理、交换控制等,支持第3层呼叫处理能力,支持信令链路,包括支持MTL、RSL、OML、XBL、CBL等信令链路✧239号告警:“ Process Safe test Audit Failure”处理器自检失败,处理板存在软件或硬件故障,应该去检查软件版本或硬件的相关连接,GPROC的CUP也有一定的工作极限,当BSP的CPU使用率达到100%,出现BSP[239]告警,BSC就会自动reset。
✧24号告警:“Bad Clock Source or SYNC OCXO(oscillator)Replacement Required”晶振震荡器的故障引起GPROC退服,检查SYNC硬件及更换。
✧35号告警:“ LAN Connection Failure”主用GPROC和某个GPROC的LAN连接失败,可能导致该GPROC重起,因为GPROC下挂的信令或BTS,所以GPROC的重起会引起其它设备的重起,因此在监控中要重点去分析处理,出现该告警要去检查LAN连接及LANX、GPROC硬件。
✧254号告警:“ Device Failure”GPROC管理系统的故障引起GPROC退服,如果该GPROC是BSP会导致BSC重起,检查处理板的连接、复位该硬件板无效、进行更换。
✧39号告警:“Software Failure”此告警表明此GPROC出现一个fatal SWFM,检查该系统的软件版本。
2:GCLK告警GCLK:Generic Clock board产生时钟信号,向上一级时钟锁相,对于BSS来说GCLK要与MSC的时钟同步,因此出现了该告警我们逐步往上查如提供时钟的MMS、GCLK硬件板等相关硬件。
✧15号告警:“ Watchdog Timer Expired ”此告警说明是SYNC处理器在MCU板上的Watchdog计数器超时,检查SYNC硬件及MCU板。
✧16号告警:“ Clock Output Failure”在系统里GCLK的同步硬件没有产生16.384MHz时钟信号,导致时钟输出失败,检查SYNC硬件及MCU板。
✧17号告警:“ SYNC Shutdown Request”该告警表明GCLK同步严重失败,检查GCLK状态、SYNC硬件及MCU板。
✧18号告警:“ Not Operational”MCU与GCLK的同步功能失败,无法操作,检查GCLK板及SYNC硬件。
✧19号告警:“ Warmup Failure”此告警表明GCLK不能在即定的时间内完成预热,检查SYNC处理器及硬件。
✧20号告警:“ Invalid Mode”此告警表明MCU的FM进程检测到GCLK完成初始化和预热后进入的操作模式不正确✧232号告警:“ Processor Bus Communication Failure”GCLK板与MUAP总线通信失败,检查GCLK板和相关的MCAP总线。
✧24号告警: “Bad clock source"此告警表明GCLK的同步时钟超出的范围会影响系统性能,或时钟源需要校准。
✧4号告警:“Phase lock lost ”此告警是GCLK锁相电路无法锁相,RXCDR或BSC出现该告警,会导致下面的所有的BTS时钟丢失,结果会引起切换失败,掉话等一些现象,所以在日常的监控中我们要重点关注。
3:KSW告警KSW :Kiloport SWitch board千端交换板,执行TDM HIGHWAY 上1024 个64Kb/s时隙的交换,还可以执行32kb/s 或16kb/s的交换,KSW在BSC站中完成16kb/s的动态交换功能,在RXCDR中完成静态交换功能。
当BSC超过一个CAGE时就需要KSWX板来扩展KSW板的1024个Ts到另外的CAGE ,KSWX板它支持TDM highway的扩展和扩容,接受扩展时钟。
KSWX Error时,有可能是KSWX板子的硬件问题,也有可能是连接KSWX板的光纤故时,应该先确认故障的原因。
当KSW OOS时,KSWX的故障也将不能被监控。
KSWX的问题一样会导致BSC自动reset,因为它负责了TDM highway的扩展和扩容,当它出现问题时,扩展的CAGE有可能就是失去时钟源,或者是没有了时隙分配,当然就不能正常工作了,所以系统为了尽可能恢复工作,会自动进行reset。
对于KSW告警的出现我们在日常监控中也进行了分析处理并及时的派发了工单。
✧4号告警:“ Clock A Signal Loss”主时钟信号丢失,表明一个KSW的CLOCK A 失败,可能引起BSS的重起,检查KSWX的相关连接及GCLK板,一般该告警都是GCLK板的故障引起。
✧5号告警:“ Clock B Signal Loss”该告警是相对与上面的4号告警,处理方法同4号告警,对于这两个告警任何一个告警出现我们都要综合分析处理。