3 Routine Procedures
This chapter explains the procedures that system administrators regularly perform. These procedures include establishing remote login procedures, starting up and shutting down the LSMS system, setting the system clock, and managing user accounts.
Introduction
This chapter explains the procedures that system administrators regularly perform. These procedures include establishing remote login procedures, starting up and shutting down the LSMS system, setting the system clock, and managing user accounts.
The procedures in this chapter assume that you are familiar with the LSMS hardware. For more information about the hardware, refer to Application B Card Hardware and Installation Guide.
Using Login Sessions
Login sessions are used for the following user functions:
- To use the command line for any of the following functions:
- To access the
lsmsmgr
text interface, which is used for configuring and maintaining the LSMS system - To enter LSMS commands (generally used for managing LSMS applications); for more information, see Commands
- To access the
- To use the graphical user interface (GUI), which is generally used for the following functions:
- Configuration (for more information, refer to Configuration Guide)
- Database administration (for more information, refer to the Database Administrator's Guide)
- Synchronization of the LSMS LNP database with the LNP databases at network elements (for more information, refer to LNP Database Synchronization User's Guide)
Support of Multiple Users
The LSMS allows, as a standard feature, a maximum of eight simultaneous users. The Support for Additional Users optional feature enables you to have a maximum of 25 simultaneous users. A user is defined to be any of the following:
lsmsmgr
user (a user who logs in as thelsmsmgr
user to start thelsmsmgr
text interface)- Web-based GUI user (a user who has logged into the active server GUI over the web; this function requires the IP User Interface optional feature)
lsmsclaa
user (a user who is using the optional LSMSCommand Class Management optional feature)
Establishing Login Sessions
From any network-connected terminal, you can establish a variety of sessions with the active server or with a specific server in one of the following ways:
- Display the
lsmsmgr
text interface of either the active server or of a specific server. - Display the command line of either the active server or a specific server for entering commands; see Logging In to LSMS Server Command Line.
- Display the GUI remotely (if the optional IP User Interface feature is installed) by using a web browser; see Starting an Web-Based LSMS GUI Session.
Logging In to LSMS Server Command Line
You can log into the LSMS active server or into a specific server from any terminal that has a Secure Shell (ssh)
client installed.
Note:
If your terminal does not already have ssh installed, PuTTY (Oracle does not make any representations or warranties about this product) is an open sourcessh
utility for Windows that you can download from the web.
You must have a user ID and password before you can log in to LSMS.
Logging in from One Server to the Mate’s Command Line
Sometimes it may be necessary to have access to the command line interfaces for both servers. You can log into each server separately using ssh
, or you can use ssh
to go back and forth between servers.
To log in from one server’s command line to the mate server’s command line, use the following procedure:
Starting an Web-Based LSMS GUI Session
The LSMS offers, as the optional IP User Interface feature, a web-based graphical user interface (GUI) intended for remote users. The web-based GUI can be run:
- On a PC with Microsoft® Windows installed, using Microsoft Internet Explorer (version 8.0, 9.0, 10.0, or 11.0)
A 32-bit installation of Windows uses 32-bit Internet Explorer and 32-bit Java. A 64-bit installation of Windows includes both the 32-bit and 64-bit Internet Explorer. If you are using the 32-bit Internet Explorer, 32-bit Java is required, and if you are using the 64-bit Internet Explorer, 64-bit Java is required. You can check the Internet Explorer version by clicking on
. If 64-bit Edition is displayed as shown in the following example, you are using the 64-bit edition. If 64-bit Edition is not displayed, you are using the 32-bit edition.Figure 3-2 About Internet Explorer
- On a Linux workstation, using Mozilla® Firefox® 3.0.0 or later
The web-based GUI is accessible from any machine that can access the network on which the LSMS resides. The functionality of the web-based GUI is the same as that of the server-side GUI.
Note:
When you have completed logging into thea web-based LSMS GUI, the session has these operating characteristics:- Pressing the Back button from the browser from which the GUI was launched terminates that GUI session. To reopen the GUI, you must click the Refresh button and begin the login process again.
- Pressing the Refresh button from the browser from which the GUI was launched terminates that GUI session. To reopen the GUI, you must begin the login process again.
- You cannot use a browser window that was started by selecting File > New > Window from the browser window to launch another web-based LSMS GUI session.
- If the GUI is idle for an extended period, you may receive Server not responding or Invalid Session ID errors; close the existing GUI session and start a new GUI session.
The HTTPS support on LSMS feature allows you to configure the protocol(s) used for the GUI:
- Secure Hypertext Transfer Protocol (HTTPS)
- Hypertext Transfer Protocol (HTTP)
- Both HTTPS and HTTP
Both HTTPS and HTTP are enabled by default. HTTPS supports encryption of data exchanged between the web server and the browser, thus facilitating data privacy. HTTP is not encrypted/secure, allowing data to be captured by any network analyzer and viewed.
A script (/usr/TKLC/lsms/bin/httpConfig.pl
) is provided to toggle between protocols or to check what is currently enabled. The script can be run by the lsmsadm user with one of the following parameters:
- https
- Results in HTTPS being enabled and HTTP being disabled.
- http
- Results in HTTP being enabled and HTTPS being disabled.
- both
- Results in both HTTPS and HTTP being enabled. This is the default.
- status
- Displays whether HTTPS and HTTP are enabled or disabled.
Note:
After changing the protocol, the GUI must be refreshed to reflect the changes. A GUI notification will be displayed.To start the web-based GUIverify that the IP User Interface feature has been activated and, perform the following procedure:
Logging Into the LSMS Console Window
After one or more SPIDs have been defined, use the following procedure to log into the LSMS console.
Modifying Title Bar in LSMS Console Window
After you successfully log in to LSMS, the console window displays. If the /usr/TKLC/lsms/config/LSMSname
file exists and contains a (0–30 character) unique LSMS name, the name (in this example, “Oracle - Morrisville”) is displayed in the title bar along with the SPID and user name. If the file does not exist or is empty (null), no name will be displayed and the title bar will look as before—displaying only the SPID and user name.
Figure 3-29 LSMS Console Window with Modified Title Bar

Powering On the LSMS
For information about powering on the LSMS servers (LSMSPRI and LSMSSEC), refer to Application B Card Hardware and Installation Guide.
Note:
Powering on the LSMS servers (which can be done in any order) does not start the LSMS application and MySQL database services. To start those functions after restoring power to the servers, perform the following steps:Powering Off the LSMS
Before you turn off the system power, all applications on each server must be stopped and the operating system on each server must be stopped. Use the following procedure to power off the LSMS; contact the unresolvable-reference.html#GUID-646F2C79-C167-4B5A-A8DF-7ED0EAA9AD66 if additional assistance is needed.
warning:
Do not disconnect or connect any cables to the system while the power is on. This action can damage the internal circuits.- On the inactive server:
- On the active server:
Managing the System Clock
The NPAC and LSMS system times must be within five minutes of each other, with the NPAC serving as the master. If the NPAC and LSMS system times are not within five minutes of each other, one of the following GUI notifications may be posted:
[Critical]: <Timestamp> 2003: NPAC [<PRIMARY|SECONDARY>] Connection Aborted by PEER : Access Control Failure
[Critical]: <Timestamp> 2012: NPAC [<PRIMARY|SECONDARY>] Connection Attempt Failed : Access Control Failure
If one of these notifications appears, verify and, if necessary, reset the LSMS time using the methods described in either of the following sections:
-
Automatically Controlling the LSMS Time Using NTP. Using the Network Time Protocol (NTP) requires access to accurate NTP servers, but results in the LSMS rarely, if ever, being out of synchronization with the NPAC. This section describes how to troubleshoot the rare problems with NTP.
-
Manually Controlling the LSMS Time Without an External NTP Source. Using only manual methods to control the LSMS time can result in cases of the LSMS being out of synchronization with the NPAC.
Automatically Controlling the LSMS Time Using NTP
The LSMS allows you to configure the LSMS as an industry-standard Network Time Protocol (NTP) client that communicates with one or more NTP servers elsewhere in your network. NTP reads a time server’s clock and transmits the reading to one or more clients with each client adjusting its clock as required.
Configuring the LSMS as an NTP Client
The NTP client protocol is incorporated with the operating system that is included with LSMS. If you choose to implement the LSMS as an NTP client, you must set up one or more NTP servers in your own network (or synchronize with some portion of the existing NTP subnet that runs on the Internet) and configure the LSMS to contact those NTP servers. For information about selecting NTP servers and configuring the LSMS as an NTP client and about displaying current settings for NTP, refer to the Configuration Guide.
If you prefer not to configure the LSMS as an NTP client, you can manually reset the LSMS time when it drifts out of synchronization with the NPAC time, as described in Manually Controlling the LSMS Time Without an External NTP Source.
Troubleshooting NTP Problems
If you configure the LSMS to communicate with several NTP servers, you should rarely encounter any problems with NTP. This section describes how to troubleshoot the following rare, but possible, error conditions:
Reference Time Off By More Than Twenty Minutes
The LSMS’s NTP client daemon expects that the LSMS system time has been set close to the real time. If the reference time received from the NTP server is significantly different from the LSMS system time, the daemon waits up to twenty minutes until it sets the time. However, if the reference time is off more than about twenty minutes (which is rare), the daemon terminates and does not set the system time.
If you think that the daemon may have terminated, perform the following procedure:
Violation of Maximum Oscillator Frequency in Network
The NTP protocol specifies that systems should have a maximum oscillator frequency tolerance of plus or minus 100 parts-per-million (ppm). This tolerance allows relatively inexpensive workstation platforms to use the NTP protocol. For platforms that meet this tolerance, NTP automatically compensates for the frequency errors of the individual oscillator, such that no additional adjustments are required to either the configuration file or to various kernel variables.
However, some platforms routinely violate this tolerance, and their violation can affect other time servers or time clients in a network. Although the LSMS meets the tolerance requirement, if your network contains other systems that do not meet the tolerance requirement, you may need to adjust the values of certain kernel variables.
Manually Controlling the LSMS Time Without an External NTP Source
If you choose not to configure the LSMS to use an NTP server, you can use the following procedure to resynchronize the LSMS system time with the NPAC time when one of the notifications described in Managing the System Clock is posted:
Generally, the following procedure is used only when the LSMS is first installed. However, if you are not able to use another method of synchronizing time with an NPAC (as described in Automatically Controlling the LSMS Time Using NTP), you can contact the NPAC administrator, inquire the time used at the NPAC, and use the following procedure to manually set the LSMS system time and date.
Internal system times are stored in GMT; however, the time and date are typed in the local time zone and converted automatically. If you need to check the local time zone, you can use the env
command with the TZ
variable.
Managing User Accounts
This section provides information about the following topics:
- Overview information about user names and passwords
- Overview information about the SPID Security feature
- Non-configurable permission groups
- Configurable permission groups
- Managing user accounts on the primary and secondary servers
- Managing user accounts on the administration console
- Changing account passwords using Linux commands
- Activating the SPID Security feature
Overview of User Names and Passwords
The system administrator assigns user names and passwords. Each user name is assigned to one of the following permission groups:
Note:
It is possible for an individual user name to have the same value as a group name. For example, usually a user namedlsmsadm
is assigned to the lsmsadm
permission group. Some LSMS commands require the user to be logged in with the lsmsadm
user name.
-
lsmsall
-
lsmsadm
-
lsmsuser
-
lsmsuext
-
lsmsview
The permission groups govern which commands and which GUI functions the user is allowed to use.
Overview of SPID Security Feature
In addition, the LSMS offers the optional SPID Security feature that allows the LSMS administrator to assign only certain usernames to be allowed to log on with a specified Service Provider Identifier (SPID). Alternatively, the LSMS administrator can assign a username to be given access to all SPIDs; such a user is called a “golden user.”
Association of a username with a SPID allows the LSMS system administrator to restrict access to the following types of locally provisioned data (for more information about associating usernames with SPIDs, see Activating the SPID Security Feature):
- Default global title translation (GTT)
- Override GTT
- GTT Groups
- Telephone number (TN) filters
- Assignment of GTT groups and TN filters to an Element Management System (EMS). For more information about GTT groups, refer to the Database Administrator's Guide.
Accessibility to these types of data are protected by SPID security for any access method (for example, through the GUI, through input data by file, audit, and reconcile).
The SPID Security feature is especially useful for LSMS customers that act as service bureaus, offering LSMS services to other service providers. The service bureau may administer locally provisioned data for a client and may choose to allow the client to administer or view its own data without allowing that client to view or change data belonging to other clients.
Note:
Without this optional feature, any user can log in using any SPID that is defined on the LSMS. The user is able to view any data for any SPID, and depending on which user privileges were assigned to that username, may be able to change data associated with any SPID.Non-Configurable Permission Groups
Table 3-2 shows a summary of privileges allowed to each user type.
Table 3-2 User Types
User type | Privileges | User secondary group name | SPID value for logging in |
---|---|---|---|
Allows the user to inherit all the privileges of all other user types |
NPAC-assigned SPID (refer to the Configuration Guide). |
||
Allows the user to:
|
NPAC-assigned SPID (refer to the Configuration Guide). |
||
Allows the user to:
|
Any SPID. If a shadow LSMS exists, use the same SPID for similar functions on main and shadow LSMS. |
||
Allows the user the same access as |
Any SPID. If a shadow LSMS exists, use the same SPID for similar functions on main and shadow LSMS. |
||
Allows the user:
|
Any SPID. |
User Permissions for LSMS Commands
Table 3-3 shows the commands each user type has permission to execute. For more information about the commands, see Commands.
Table 3-3 Access to LSMS Commands
Command | root | lsmsadm | lsmsuser | lsmsview | lsmsall | lsmsuext | |
---|---|---|---|---|---|---|---|
Command permissions: X = Users in this group have permission to use this command. lsmsadm = The user must be logged in with the name lsmsadm to have permission to use this command. root = The user must be logged in with the name root to have permission to use this command. |
|||||||
|
X |
||||||
chglct
|
X |
||||||
chkfilter
|
X |
||||||
eagle
|
lsmsadm |
||||||
|
X |
X |
X |
X |
X |
||
keyutil
|
lsmsadm |
||||||
|
lsmsadm |
||||||
lsmsdb
|
root |
X |
X |
X |
X |
X |
|
|
X |
||||||
|
root |
||||||
massupdate
|
lsmsadm |
||||||
|
X |
X |
X |
X |
|||
|
lsmsadm |
||||||
npacimport
|
lsmsadm |
||||||
|
X |
X |
X |
X |
X |
||
|
lsmsadm |
||||||
|
X |
||||||
|
lsmsadm |
||||||
|
lsmsadm |
||||||
|
lsmsadm |
||||||
|
root |
X |
X |
X |
X |
X |
|
|
root |
User Permissions for GUI Functions
For information about the GUI functions each permission group can access, refer to the tables in the Configuration Guide (Admin GUI Access, Configure User Access, and Keys GUI Access) and the Database Administrator's Guide (User/Session GUI Access, NPAC GUI Access, LSMS GUI Access, Reports GUI Access, Logs GUI Access, and Popup Menus GUI Access).
Configurable Permission Groups (LSMS Command Class Mgmt)
When the optional LSMS Command Class Management feature is enabled, LSMS supports configurable GUI permission groups in addition to the five non-configurable GUI permission groups (lsmsadm
, lsmsuser
, lsmsview
, lsmsall
, and lsmsuext
).
The LSMS supports the creation of 128 additional, configurable GUI permission groups that can be used to ensure a specific and secure environment. After creating the new, configurable GUI permission groups, the system administrator can assign users to the appropriate group.
The configurable GUI permission groups control access to GUI commands, the CLAA (Command Line Administration Application) equivalent, or any command-line equivalent of GUI functions.
A method to control access to a fixed set of commands is provided. Existing commands, executables, and scripts are classified as follows:
- Command-line equivalents of GUI commands (Reports and functions of CLAA)
These commands are controlled by the assignment of the corresponding GUI function.
- Optional command-line capability for Report Generator (LQL)
This command may be assigned individually, similar to GUI commands, to one or more permission groups.
- Root privilege-only commands
These commands are root-only and are not assignable to any permission group.
- Other commands owned by
lsmsadm
These commands include those used by the LSMS application, those used to control processes, and those for setup and configuration. Commands in this category are grouped as a single set of administration commands. Users may or may not be granted access to this command-line group, in addition to being assigned to the appropriate GUI group.
Some commands in this group, although owned by
lsmsadm
, are accessible to non-owners for limited operation, such as status. The incorporation of this feature will not have any impact on the current privileges of commands for non-owners.
Example:
To set up a custom environment, system administrators should define the GUI permission groups and populate those groups with the appropriate commands:
Table 3-4 Define GUI Permission Groups and Assign Command Privileges
GUI Permission Group | Command Privileges |
---|---|
Custom GUICONFIG | All Configuration Commands |
Custom GUIEMS | All EMS-related Commands |
Custom GUISUPER | All GUI Commands |
Optionally, assign users (for example, Mike, Sally, and Bill) to a specific command-line permission group (in this example, lsmsadm
) or GUI permission group.
Table 3-5 User Assignment Examples
User | Linux Permission Group | GUI Permission Group |
---|---|---|
Mike | lsmsadm
|
Custom GUICONFIG |
Joe | lsmsall
|
Custom GUIEMS |
Sally | lsmsadm
|
lsmsadm
|
Bill | lsmsadm
|
Custom GUISUPER |
Note:
Secure activation is required because this is an optional feature.After activating this feature, you can create permission groups and assign users to these new groups.
Note:
Changes in privileges do not automatically occur upon feature activation.Permission Group Naming
-
The LSMS supports the ability to uniquely name each configurable GUI permission group.
-
A group name can consist of a minimum of one character to a maximum of 40 characters (only alphanumeric characters are permitted).
Permission Group Contents
- Each configurable GUI permission group supports any or all of the LSMS GUI commands.
Note:
The GUI command represents the function, via either the GUI, CLAA, or command-line equivalent of GUI commands. - Any GUI command may be associated with multiple GUI permission groups.
- The optional LQL command for the Report Generator feature can be placed in GUI permission groups.
- The LSMS supports a group containing the current LSMS
lsmsadm
commands with the exception of Report, Audit, and LQL.
Permission Group Commands
The LSMS enables you to perform the following tasks:
- Create and modify GUI permission groups.
- Assign a user to a single GUI permission group.
- Assign a user access to the command group in addition to a GUI permission group.
- Retrieve the names of all permission groups, all the commands permitted within a permission group, and the names of all permission groups that contain a particular command.
Permission Group Processing
GUI Functions:
The LSMS allows a GUI user access to GUI commands, CLAA commands, or command-line equivalents of GUI commands only if that user is an authorized user.
Command-Line-Level:
The LSMS allows a user access to command-line-level scripts and executables only if that user is an authorized user.
Note:
For more information about command class management and configurable permission groups, refer to the Configuration Guide.Managing User Accounts on the Primary and Secondary Servers
To manage user accounts, LSMS utilizes the lsmsdb command
. This command allows you to add and delete user accounts, change passwords, and list users. The lsmsdb
command makes the appropriate changes in the system /etc/password
file.
The following topics explain how to use the lsmsdb
command to administer LSMS user accounts:
-
Setting the System Level Password Timeout Using the Command Line
-
Setting the User Level Password Timeout Using the Command Line
-
Displaying All LSMS User Accounts
Note:
Thelsmsdb
command modifies files on the local system (the system on which lsmsdb is executed). It does not modify or update global network databases.Therefore, if you add or modify users on one server, make the same change on the other server. Sometimes, for specific administration purposes, you might add or modify users on the servers without adding or modifying them on the administration console.
The following topics explain how to use the LSMS GUI to administer LSMS user accounts:
Changing a User Password
Use the following procedure to change a user password:
Note:
Thelsmsdb -c chguserpw -u <username>
command must be run on both the primary and the secondary servers to completely change the password.
Setting the System Level Password Timeout Using the Command Line
Use the following procedure to set the system level password timeout using the command line:
Setting the System Level Password Timeout Using the GUI
Use the following procedure to set the system level password timeout using the GUI:
Setting the User Level Password Timeout Using the Command Line
Use the following procedure to set the system level password timeout using the command line:
Setting the User Level Password Timeout Interval Using the GUI
Use the following procedure to set the system level password timeout using the GUI:
Displaying All LSMS User Accounts
Use the following procedure to display a list of all LSMS GUI Users:
Activating the SPID Security Feature
This feature is activated by Oracle customer service using secure activation procedures. Once the feature is activated, the following actual usernames (not user group names) are defined to be “golden users” having access to all SPID and all other usernames are defined to have no access to any SPIDs:
-
lsmsadm
-
lsmsview
-
lsmsall
-
lsmsuser
-
lsmsuext
After the feature has been activated, the LSMS administrator (lsmsadm
) is advised to immediately define associations between usernames and SPIDs as described in the following procedure: