5 Configuring Optional Features
This chapter describes configuration procedures that need to be performed one time only for various optional features.
Introduction
Other chapters in this book describe the configuration activities that you must perform to get the LSMS up and running. This chapter describes configuration procedures that need to be performed one time only for various optional features. Some optional features must be activated and configured before you perform the configuration procedures described in Completing Configuration and Starting Connections
Understanding How to Activate and Configure Optional Features
Starting with LSMS 13.0, all optional features are now customer configurable.
Some optional features do not require activation or additional configuration; those features are not described in this manual.
Increase Maximum Allowed SPID Procedure
Standard LSMS support allows you to configure up to 32 SPIDs for supported service providers; support for additional SPIDs, in groups of 16, can be enabled. To increase the maximum allowed SPID, perform this procedure:
Enable Number Pooling EDR
Number Pooling Efficient Data Representation (EDR) allows ported telephone numbers to be assigned to supported service providers in blocks of 1000. To enable this feature, perform this procedure:
Enable Remote Monitoring
Note:
See Database Administrator's Guide for additional information.Enable Automatic File Transfer
Note:
See Database Administrator's Guide for additional information.Enable Reception of WSMSC data from NPAC
Note:
In order to receive WSMSC data from the NPAC, the customer must also update their user profile with the NPAC to include transmission of WSMSC data.Note:
See Database Administrator's Guide for additional information.Enable Sending of WSMSC data to EAGLE
Note:
See Database Administrator's Guide for additional information.Update Maximum Supported GUI Users
Support for additional users allows up to 25 simultaneous users. This feature has a prerequisite of the Enabling IP GUI feature. To increase the maximum supported users, perform this procedure:
Note:
For more information, see Support of Multiple Users.Enable Enhanced Filtering
Enhanced LSMS Filters allows the user to filter data to be sent to NEs by NPAC region or by GTT group. To enable this feature, perform this procedure:
Update Maximum Supported EAGLE pairs
Support for additional EAGLE pairs allows up to 16 pairs. To increase the maximum supported EAGLES, perform this procedure:
Enable Report Generator
Report Generator allows the user to create a wide variety of reports beyond those available through the LSMS GUI. To enable this feature, perform this procedure:
Enable NANC 3.2 Enhancements Feature
The NANC 3.2 Enhancements Feature enhances the recovery download functionality of the NpacAgent, providing increased flexibility and efficiency in the recovery mechanism, as well as enhanced capabilities of Bulk Data Download (BDD) and mass updates of SPIDs. To enable this feature, perform this procedure:
Enable Customizable Login Message Feature
The Customizable Login Message Feature supports the display of a customized login message for Linux and GUI logins. To enable this feature, perform this procedure:
Enable Log Time for Successful EAGLE Response Feature
The Log Time for Successful EAGLE Response Feature supports the recording of timestamps for successful EAGLE responses. To enable this feature, perform this procedure:
Enable ResyncDB Query Server Feature
The ResyncDB Query Server feature enables the LSMS to directly host the ResyncDB Query Server. To enable this feature, perform this procedure:
Configure/Update LSMS Quantity Keys
LSMS Quantity Keys support the modification of lsmsdb
capacity from 120 million to 756
million. To enable this feature, perform this procedure:
Note:
The SERVDI feature will be automatically enabled upon the update of an LSMS quantity key to a value greater than 228. After SERVDI is automatically enabled, the feature will not be available within a GUI instance until the GUI is restarted.Enable Support ELAP Reload Via Database Image (SERVDI)
SERVDI performs BDDs that significantly reduces the time needed to reload an ELAP database. To enable this feature, perform this procedure:
Note:
Once SERVDI is activated, the feature will not be available within a GUI instance until the GUI is restarted.SERVDI Process
SERVDI has the following utilities:
- lsms2ridb - the default utility invoked when SERVDI is initiated from the LSMS GUI. This utility generates the SERVDI image for the 756M schema and is only compatible with ELAP 10.2 and later. If executed with ELAP 10.1, the file generation will be successful at the LSMS, but the restoration of that SERVDI file/image will fail on ELAP.
- lsms2ridb_504m - the default utility invoked when SERVDI is initiated from the LSMS GUI. This utility generates the SERVDI image for the 504M schema and is only compatible with ELAP 10.1 and later. If executed with ELAP 10.0, the file generation will be successful at the LSMS, but the restoration of that SERVDI file/image will fail on ELAP.
- lsms2ridb_384m - this utility generates the SERVDI image for the 384M schema and is only compatible with ELAP 10.0. If executed with ELAP 10.1 or later, the file generation will be successful at the LSMS, but the restoration of that SERVDI file/image will fail on ELAP. The user invokes this process through the command line by executing the following command:
Enable NANC 3.3 Feature Set
The NANC 3.3 Feature Set provides new capabilities for recovery, notifications, application level error codes, recovery of SPID, and support for the “Service Provider Type” field. To enable this feature, perform this procedure:
Enable Service Provider Type Feature
The Service Provider Type Feature supports . To enable this feature, perform this procedure:
Note:
This feature can only be enabled if the NANC 3.3 Feature Set has already been enabled.Enable SWIM Recovery Feature
The SWIM Recovery Feature supports enabling the SWIM (Send What I Missed) based recovery from NPAC as an alternative to time based recovery. To enable this feature, perform this procedure:
Note:
This feature can only be enabled if the NANC 3.3 Feature Set has already been enabled.Enable NANC 3.3 Error Codes Feature
The NANC 3.3 Error Codes Feature supports updating the database for the values of two sets of errors, i.e., ERROR_CODES_FOR_ACTIONS
and ERROR_CODES_FOR_NON_ACTIONS
. To enable this feature, perform this procedure:
Note:
This feature can only be enabled if the NANC 3.3 Feature Set has already been enabled.Increase Verify Npacagent Timeout
Configuring a Network Time Protocol Client
Number Portability Administration Centers (NPACs) require that the system time at the LSMS be within five minutes of the NPAC time. If the times are not within five minutes of each other, the following GUI notification is likely to be posted:
[Critical]: <Timestamp> 2003: NPAC <primary|secondary> Connection Aborted by PEER : Access Control Failure
To synchronize the time between the LSMS and NPACs, you can configure the LSMS as an industry-standard Network Time Protocol (NTP) client that communicates with one or more NTP servers elsewhere in your network. NTP is an Internet protocol used to synchronize clocks of computers to Universal Time Coordinated (UTC) as a time reference. In NTP, a time server’s clock is read, and the reading is transmitted to one or more clients, with each client adjusting its clock as required.
If you choose to implement the LSMS as an NTP client, you must set up one or more NTP servers in your own network (or synchronize with some portion of the existing NTP subnet that runs on the Internet) and configure the LSMS to contact those NTP servers. (If you prefer not to configure the LSMS as an NTP client, you can manually reset the LSMS time when it drifts out of synchronization with the NPAC time.)
Understanding Universal Time Coordinated
Universal Time Coordinated (UTC) is an official standard for determining current time. The UTC second is based on the quantum resonance of the cesium atom. UTC is more accurate than Greenwich Mean Time (GMT), which is based on solar time.
The term universal in UTC means that this time can be used anywhere in the world; it is independent of time zones. To convert UTC to your local time, add or subtract the same number of hours as is done to convert GMT to local time.
The term coordinated in UTC means that several institutions contribute their estimate of the current time, and the UTC is calculated by combining these estimates.
UTC is disseminated by various means, including radio and satellite navigation systems, telephone modems, and portable clocks. Special-purpose receivers are available for many time-dissemination services, including the Global Position System (GPS) and other services operated by various national governments.
Generally, it is too costly and inconvenient to equip every computer with a UTC receiver. However, it is possible to equip a subset of computers with receivers; these computers in turn disseminate the time to a larger number of clients connected by a common network. Some of those clients can also disseminate the time, in which case they become lower stratum servers. The industry-standard Network Time Protocol is an implementation of this time dissemination method.
Understanding the Network Time Protocol
The Network Time Protocol (NTP) is an Internet protocol used to synchronize clocks of computers using UTC as a time reference. NTP primary servers provide their clients time accurate within a millisecond on a Local Area Network (LAN) and within a few tens of milliseconds on a Wide Area Network (WAN). This first level of dissemination is called stratum-1. At each stratum, the client can also operate as a server for the next stratum.
A hierarchy of NTP servers is defined with stratums to indicate how many servers exist between the current server and the original time source external to the NTP network, as follows:
-
A stratum-1 server has access to an external time source that explicitly provides a standard time service, such as a UTC receiver.
-
A stratum-2 server receives its time from a stratum-1 server
-
A stratum-3 server receives its time from a stratum-2 server
-
And so on; the NTP supports up to 15 strata
Normally, client workstations that do not operate as NTP servers and NTP servers with a relatively small number of clients do not receive their time from a stratum-1 server. At each stratum, it is usually necessary to use redundant NTP servers and diverse network paths in order to protect against broken software, hardware, or network links.
NTP works in one or more of the following association modes:
-
Client/server mode, in which a client receives synchronization from one or more servers, but does not provide synchronization to the servers
-
Symmetric mode, in which either of two peer servers can synchronize to the other, in order to provide mutual backup
-
Broadcast mode, in which many clients synchronize to one or a few servers, reducing traffic in networks that contain a large number of clients. IP multicast can be used when the NTP subnet spans multiple networks.
The LSMS supports only client/server mode and functions as a client.
Obtaining an NTP Server
The most important factor in providing accurate, reliable time is the selection of modes and NTP servers to be used in your NTP configuration file. It is recommended that you configure at least three stratum-2 or stratum-3 NTP servers.
Specifying three or more NTP servers allows the protocol to apply an agreement algorithm to detect insanity on the part of any one of the servers. Normally, when all NTP servers are in agreement, the protocol chooses the best available server, where the best is determined by a number of factors, including the lowest stratum number, lowest network delay, and claimed precision.
Many public and private NTP servers are currently running on the Internet. If you do not already have an NTP server in your network, you can obtain synchronization services from some portion of the NTP subnetwork that runs on the Internet. However, you may want to consider creating your own NTP server so that you can more carefully control security and reliability. If you need to create an NTP server, refer to the following resources for more information:
-
The following Internet sites:
-
http://docs.sun.com (search for ntp, or choose the Network Time Protocol User’s Guide)
-
Configuring the Service Assurance Feature
The Service Assurance feature allows an external system to access subscription version data from the LNP databases in the LSMS. This information is useful in verifying correct porting of data, and helps in troubleshooting problems. There is one LNP database for each of the NPACs associated with the LSMS.
The external system uses Service Assurance Manager (SAM) application to initiate service assurance data requests and associations. Single or multiple SAMs may exist on the external computer system. The SAM communicates with the LSMS through the Service Assurance Agent (SAA) application in the LSMS. The SAM application is not Oracle Communications software and is resides only on the external system.
The SAA decodes the queries from the SAM and then accesses the LNP database. The SAA forms the subscription version data into a message and forwards that message to the SAM making the query.
Service Assurance works in conjunction with the Surveillance feature. The Surveillance feature issues the command to start the Service Assurance agent, and it monitors the status of the Service Assurance agent. A maximum of four SAM/SAA sessions are allowed at one time.
External Network Connections
External network connections should be on physically separate network segments and address spaces. During a system switchover, IP addresses will change if used on a single subnet network configuration.
Firewall Requirements
The customer should have a firewall between the Service Assurance system and the LSMS.
Figure 5-6 Service Assurance Firewall

Table 5-1 identifies the firewall parameters used to accept expected functions and to block unauthorized functions.
Table 5-1 Firewall Parameters for Service Assurance
Interface | TCP/IP Port | Use | Inbound | Outbound |
---|---|---|---|---|
Service Assurance to Application WAN |
102 |
OSI - TSAP 1 |
Yes |
Yes |
1 The OSI stack determines the Ethernet port assignments. |
The customer is responsible for setting the firewall parameters. The firewall can be alternatively located between the LSMS and the X-terminal WAN. If that is the case, the allowed functions specified in Table 5-1 should be used in addition to any other firewall parameters required for X-terminal access to the LSMS.
Configuring the LSMS for Service Assurance
To configure the LSMS for the Service Assurance feature, the LSMS system administrator must create a file that contains the systemName and the npacName of each allowed SAM/LNP database association. A single SAM can associated with more than one database, but each association must be listed in a separate line in the file. Each line of the file consists of the name of the user application (systemName) and the name of the LNP database (npacName) separated by a colon (:).
Many SAM/LNP database associations can be listed in the configuration file, but only four of these associations may be active at one time.
The configuration file must be saved as:
/usr/TKLC/lsms/config/sa.cfg
The following is an example of a configuration file using the user application names of “Service System” and “headquarters.” “Service System” is associated with one LNP database and “headquarters” is associated with two LNP databases.
Service System:Mid-Atlantic Regional NPAC SMS
headquarters:Midwest Regional NPAC SMS
headquarters:Mid-Atlantic Regional NPAC SMS
Enable Service Assurance Feature
To enable this feature, perform this procedure:
- As LSMS
lsmsadm
user, execute "sentry register -n1 sacw-rc 190 -pl". - Execute "Saagent allow".
- Create $LSMS_DIR/../config/sa.cfg file with information on Service Assurance Managers as described in this section.
To configure the LSMS for the Service Assurance feature, the LSMS system administrator must create a file that contains the systemName and the npacName of each allowed SAM/LNP database association. A single SAM can associated with more than one database, but each association must be listed in a separate line in the file. Each line of the file consists of the name of the user application (systemName) and the name of the LNP database (npacName) separated by a colon (:).
Many SAM/LNP database associations can be listed in the configuration file, but only four of these associations may be active at one time.
The configuration file must be saved as:
/usr/TKLC/lsms/config/sa.cfg
The following is an example of a configuration file using the user application names of “Service System” and “headquarters.” “Service System” is associated with one LNP database and “headquarters” is associated with two LNP databases.
Service System:Mid-Atlantic Regional NPAC SMS
headquarters:Midwest Regional NPAC SMS
headquarters:Mid-Atlantic Regional NPAC SMS
Configuring SPID Security for Locally Provisioned Data
Without this optional feature, any user is able to log in using any Service Provider Identifier (SPID) that is defined on the LSMS. The user is able to view any data for any SPID, and depending on which user privileges were assigned to that username, might even be able to change data associated with any SPID.
This optional feature allows the LSMS administrator to assign only certain usernames to be allowed to log on with a specified SPID. In addition, the LSMS administrator can assign a username to be given access to all SPIDs; such a user is called a “golden user.”
This feature is especially useful for LSMS customers that act as service bureaus, offering LSMS services to other service providers. The service bureau may administer locally provisioned data for a client and may choose to allow the client to administer or view its own data without allowing that client to view or change data belonging to other clients.
Types of Data Protected by SPID Security
Association of a username with a SPID allows the LSMS system administrator to restrict access to the following types of locally provisioned data:
- Default GTT (global title translation)
- Override GTT
- GTT Groups
- TN (telephone number) filters
- Assignment of GTT groups and TN filters to an EMS (element management system). For more information, refer to Database Administrator's Guide.
Accessibility to these types of data are protected by SPID security for any access method (for example, through the GUI, through input data by file, audit, and reconcile).
Enable SPID Security Feature
Note:
For customers that have been upgraded directly from LSMS Release 4.x to Release 6.1, all EMS components created in the prior release must be deleted and recreated under its appropriate SPID.Once the feature is activated, the following actual usernames (not user group names) are defined to be “golden users” having access to all SPID and all other usernames are defined to have no access to any SPIDs:
-
lsmsadm
-
lsmsview
-
lsmsall
-
lsmsuser
-
lsmsuext
After the feature has been activated, the LSMS administrator (lsmsadm
) is advised to immediately define associations between usernames and SPID using a new command, spidsec
, as described in the following procedure:
Enabling SV Type and Alternative SPID
To enable SV type and alternative SPID, perform this procedure:
Note:
These features can only be enabled with LSMS 10.0 or later. Once SV type is activated, the field is required. Therefore, it is strongly recommended that a bulk download from the NPAC be performed to obtain values for the new SV type field. Failure to perform a bulk download will result in inconsistent data between the NPAC and the LSMS. Although alternative SPID can be activated separately from SV type, it is recommended that both fields be activated at the same time so values for both fields can be obtained during one bulk download. In this procedure, it is assumed that both SV type and alternative SPID will be enabled at the same time.LSMS Command Class Management Overview
LSMS supports configurable GUI permission groups in addition to the five non-configurable GUI permission groups (lsmsadm
, lsmsuser
, lsmsview
, lsmsall
, and lsmsuext
).
The LSMS supports the creation of 128 additional, configurable GUI permission groups that can be used to ensure a specific and secure environment. After creating the new, configurable GUI permission groups, the system administrator can assign users to the appropriate group.
The configurable GUI permission groups control access to GUI commands, the CLAA (Command Line Administration Application) equivalent, or any Linux command equivalent of GUI functions.
A method to control access to a fixed set of Linux commands is provided. Existing Linux-level LSMS commands, executables, and scripts are classified as follows:
-
Linux command equivalents of GUI commands (Reports and functions of CLAA)
These commands are controlled by the assignment of the corresponding GUI function.
-
Optional Linux command capability for Report Generator (LQL)
This command may be assigned individually, similar to GUI commands, to one or more permission groups.
-
Root privilege-only commands
These commands are root-only and are not assignable to any permission group.
-
Other commands owned by
lsmsadm
These commands include those used by the LSMS application, those used to control processes, and those for setup and configuration. Commands in this category are grouped as a single set of Linux level admin commands and defined as a Linux permission group. Users may or may not be granted access to this Linux group, in addition to being assigned to the appropriate GUI group.
Some commands in this group, although owned by
lsmsadm
, are accessible to non-owners for limited operation, such as status. The incorporation of this feature will not have any impact on the current privileges of Linux commands for non-owners.Example:
To set up a custom environment, system administrators should define the GUI permission groups and populate those groups with the appropriate commands (see Table 5-2):
Table 5-2 Define GUI Permission Groups and Assign Command Privileges
GUI Permission Group Command Privileges Custom GUI CONFIG
All Configuration Commands Custom GUI EMS
All EMS-related Commands Custom GUI SUPER
All GUI Commands Optionally, assign users (for example, Mike, Sally, and Bill) to a specific Linux permission group (in this example, “lsmsadm”) or GUI permission group, as shown in Table 5-3.
Table 5-3 User Assignment Examples
User Linux Permission Group GUI Permission Group Mike
lsmsadm
Custom GUI CONFIG
Joe
lsmsall
Custom GUI EMS
Sally
lsmsadm
lsmsadm
Bill
lsmsadm
Custom GUI SUPER
Note:
Secure activation is required because this is an optional feature.After activating this feature, you can create permission groups and assign users to these new groups.
Note:
Changes in privileges do not automatically occur upon feature activation.
Permission Group Naming
-
The LSMS supports the ability to uniquely name each configurable GUI permission group.
-
A group name can consist of a minimum of one character to a maximum of 40 characters (alphanumeric characters only are permitted).
Permission Group Contents
-
Each configurable GUI permission group supports any or all of the LSMS GUI commands.
Note:
The GUI command represents the function, via either the GUI, CLAA, or Linux command equivalent of GUI commands.-
Any GUI command may be associated with multiple GUI permission groups.
-
The LQL optional Linux LSMS command for the Report Generator feature can be placed in GUI permission groups.
-
The LSMS supports a Linux group containing the current Linux LSMS
lsmsadm
commands with the exception of Report, Audit, and LQL.
Permission Group Commands
The LSMS enables you to perform the following tasks:
-
Create and modify GUI permission groups.
-
Assign a user to a single GUI permission group.
-
Assign a user access to the Linux group in addition to a GUI permission group.
-
Retrieve the names of all permission groups, all the commands permitted within a permission group, and the names of all permission groups that contain a particular command.
Permission Group Processing
GUI Functions:
The LSMS allows a GUI user access to GUI commands, CLAA commands, or Linux command equivalents of GUI commands only if that user is an authorized user.
Linux-Level:
The LSMS allows a user access to Linux-level scripts and executables only if that user is an authorized user.
Enable Command Class Management
LSMS Command Class Management supports the creation of additional, configurable GUI permission groups. Also, a new report, the “Permission Group Data” report, provides a listing of all permission groups, commands authorized for each permission group, and users assigned to each permission group. To enable this feature, perform this procedure:
Note:
No changes in privileges will happen automatically upon feature activation. Existing users will retain the same privileges upon initial activation of this feature. Existing permission groups (lsmsuser, lsmsadm, lsmsview, lsmsuext, and lsmsall) remain non-configurable.If this feature is disabled, all configurable permission groups created and users' assignments to them are retained. The ability to create, modify and delete permission groups and user assignments will no longer be permitted.
Admin Menu Component Information
The Admin menu, which consists of the following submenu items:
- Alarm Filter - When activated, the Alarm Filter feature enables the system administrator to filter unwanted alarms from being sent to remote alarm surveillance management systems.
- Users - Enables the system administrator to modify or view existing users' permission group assignment.
- Permission Groups - Enables the system administrator to create, modify, view, or delete permission groups.
- Inactivity Timeout - When activated, the Automatic Inactivity Logout feature logs out LSMSGUI and Linux users after a preset period of inactivity occurs.
- Password Timeout - Enables the system administrator to modify password timeout intervals that are specific to individual users or user groups.
- MySQL Port - Enables the system administrator to configure the MySQL port to any port between 34000 and 34099.
- LNP Threshold - Enables the system administrator to configure the LNP quantity threshold.
Note:
To access the Admin menu functions, you must log in as lsmsadm or lsmsall group.Figure 5-7 Admin Menu

The User dialog is used to modify and view permission group assignment for existing users.
When a user is initially created, the system administrator assigns that user to one of the non-configurable, default permission groups. After being initially assigned to a default permission group, the system administrator can assign a user to a different default permission group or to a configurable permission group. The permission group to which a user is assigned depends on the type of account it is and what it is to be used for. A user can only be assigned to a single permission group.
Note:
Default users of default permission groups cannot be re-assigned to another permission group. For example, an “lsmsadm” user assigned to the “lsmsadm” permission group cannot be re-assigned to the “lsmsview” permission group.The permission group to which a user is assigned can be modified or viewed using the Modify (see Modify Users) or View User (see View Users) dialog, respectively.
Configurable permission groups can be created, modified, viewed, and deleted using the Permission Groups dialogs (see “Permission Groups Submenu”).
Note:
Permission group assignments will only effect new logins. Users that are currently logged in will retain their current group permissions until their next login.Note:
Although the LSMS application does not impose a limit on the number of LSMS users that can be created on the system, a maximum of 128 users can be displayed in the Combo Box list of the LSMSGUI User Dialogs (when using LSMS local GUI). There is no limitation when running the LSMSGUI remotely on a Windows platform.Alarm Filter Submenu
The Alarm Filter enables the system administrator to prevent certain alarms from being sent to remote alarm/surveillance management systems. For example, certain low priority alarms, certain alarms for known issues, or certain alarms the customer deems unnecessary, can be filtered out of notifications. Alarm filters can be created, modified, viewed, and deleted.
Users Submenu
The Users submenu consists of a Modify and a View function.
Permission Groups Submenu
The Permission Groups dialog is used to manage configurable permission groups. A configurable permission group is a way for the system administrator to grant a group of users access privileges for a defined set of LSMS GUI and CLAA (Command Line Administration Application) equivalent functions.
Note:
The access privileges of the five default permission groups (lsmsadm
, lsmsuser
, lsmsview
, lsmsall
, and lsmsuext
) are not configurable.
The system administrator users may grant or deny command access privileges to members of a configurable permission group by selecting or deselecting menus and functions in the permissions hierarchical list by clicking on the checkbox or on its corresponding descriptive text.
-
A checked checkbox indicates that users assigned to that permission group will be granted access privileges for the corresponding GUI menus and/or functions and CLAA equivalent commands.
-
An unchecked (empty) checkbox indicates that users assigned to that permission group will not be granted access privileges for the corresponding GUI menus and/or functions and CLAA equivalent commands.
-
Sub-menus and functions are only available for selection when their higher-level menu's checkbox is checked.
-
Access privileges can be granted or revoked for every GUI menu and/or functions and CLAA equivalent commands with the exception of the User/Session menu and menu items.
Individual users are assigned to permission groups using the User dialogs (as described in Users Submenu).
Note:
Modifications made to permission groups will only effect new logins. Users that are currently logged in will retain their current permissions until their next login.Create Permission Group
The Create Permission Group dialog is used to create a new configurable permission group. You must enter a unique name for the group and select the commands that users of the group will be authorized to access. The hierarchical list of LSMS menus and command permissions is initially unselected (no access privileges granted).
To create a permission group, use the following procedure.
Modify Permission Group
The Modify Permission Group dialog is used to modify the access privileges for existing configurable permission groups. To modify the access privileges for an existing permission group, select the group name from the group list.
To modify a permission group, use the following procedure.
Inactivity Timeout Submenu
The Inactivity Timeout submenu is designed to manage the Inactivity Timeout feature, which will log out users from the LSMS GUI and Linux Shell after a specified period of inactivity. This is an optional feature and must be activated.
The Inactivity Timeout submenu includes two types of customizable timers—a system timer (see System Timer) and a user timer (see User Timer). The user timeout, if specified, will override the system timeout.
Inactivity Timeout Functionality for GUI Users
-
For tasks of extended duration, such as audits, where the user initiates a task which continues without further user input, the task execution will not constitute user input. However, updates to the GUI from the process will continue as normal past the logout. At the completion of the process, if the timeout has expired, the log-in screen will pop up and block access to the GUI. If a user successfully logs in again, the results of the task will be available for review. Any time that user input is received during the process the timer would be reset.
-
Any input by the user would constitute activity and reset the timer.
-
Members of the
lsmsadm
orlsmsall
default permission group (or members of any authorized configurable permission group) can modify the inactivity logout period. Values must be specified in whole minute intervals, and can range from 1 minute to a maximum value of 2147483647 minutes (which means, essentially, the logout period never expires). Specify this maximum value by using a zero (0).
Inactivity Timeout Functionality for Linux Users
-
Any user input or task execution would constitute activity and reset the timer.
-
For extended duration operations, where the user initiates a task which continues without additional user input, the operation will continue. The task execution is considered user activity in the Linux environment. The user will be logged off if the inactivity time expires.
Enable Inactivity Timeout Feature
Automatic Inactivity Logout automatically logs off GUI users and Linux users after the specified period of inactivity. This feature includes a configurable system timer and a configurable user timer. To enable this feature, perform this procedure:
System Timer
The system timer provides an easy way to specify the same inactivity logout period, in minutes, for each LSMS GUI or Linux user. The default inactivity logout period is 15 minutes, but this logout period is configurable via the GUI.
Note:
The User Inactivity Timeout value, if set, will override the System Inactivity Timeout.When the inactivity timer is activated, the LSMS Inactivity Timer Login window is displayed. It will accept only the username and password for the user that was last logged in.
Figure 5-26 LSMS Inactivity Timer Login Screen

User Timer
The user timer provides an easy way to specify different inactivity logout periods, in minutes, for individual LSMS GUI and Linux users. The inactivity logout period is configurable via the GUI.
Note:
The User Inactivity Timeout value, if set, will override the System Inactivity Timeout.When the inactivity timer is activated, the GUI Inactivity Timer Login Screen is displayed. It will accept only the user name and password for the user that was last logged in.
Password Timeout Submenu
The Password Timeout dialog enables users in the permission groups lsmsadm and lsmsall to view and modify password timeout intervals at both the system and user levels. Access the Password Timeout feature by selecting
.View System Level Password Timeout
The View System Level dialog is used to view the system level password timeout interval.
To view password timeout information at the system level, use the following procedure:
Modify System Level Password Timeout Interval
The Modify System Level dialog is used to modify the system level password timeout interval.
To modify the password timeout interval at the system level, use the following procedure:
MySQL Port Submenu
This optional feature enhances the security of LSMS databases by enabling the system administrator to change the MySQL port.
Through the LSMS GUI, the MySQL port can be configured to ports 34000 through 34099. The port can be maintained through the GUI, and any changes to the port setting will raise an alarm on the LSMS. The MySQL port can also be changed back to the default port, 3306.
Enable Configurable MySQL Port Feature
To enable this feature, perform this procedure:
Modify MySQL Port
Stopping the Node
Note:
Perform this procedure on the ACTIVE LSMS server first, then on the STANDBY LSMS server.Switching NPAC Agent Versions
LSMS provides support for both the NPAC agent versions. The
script to switch the NPAC agent versions
switch_NANC528
is
available at the directory path:
/usr/TKLC/lsms/bin
in
LSMS. This script serves the purpose of switching between the older NPAC agent
and newer NPAC agent. The newer agent supports NANC 528 features.
If a user needs to switch back to the older NPAC agent for some reasons, the
switch_NANC528
script can be used for that purpose.
Note:
The NANC 528 interface is only used by iConectiv. It is not supported by Neustar for the Canada region.The following sections describes the steps to switch across the NPAC agent versions:
Switching NPAC agent version - Newer to Older
Do the following steps to switch to the older npacagent version:
- Login to LSMS CLI with user lsmsadm.
- Shutdown both the LSMSPRI and LSMSSEC nodes.
- Login to LSMSMGR menu on LSMSPRI and go to Maintenance
Menu and then Stop Node.
Figure 5-51 Main Menu
Figure 5-52 Stop Node
- Repeat the same steps to stop the node on LSMSEC server. Login to LSMSMGR menu and then go to the Maintenance Menu and then Stop Node.
- Login to LSMSMGR menu on LSMSPRI and go to Maintenance
Menu and then Stop Node.
- Run the script with the
following command on CLI:
/usr/TKLC/lsms/bin/switch_NANC528
- User is prompted to enter
YES/NO depending upon the requirement of switching to the older npacagent
version as follows:
[lsmsadm@lsmspri ~]$ /usr/TKLC/lsms/bin/switch_NANC528 INFO: This script is used for switching between older and newer npacagent. LSMS should be stopped for this process to continue. Checking whether LSMS is stopped... INFO: No active node found, We can proceed... INFO: You are going to switch to older version of npacagent that will not have NANC 528 updates. Are you sure you want to continue? (y/n)
- Enter
Y to switch to
the older npacagent version.
Once the user enters Y to the above prompt, npacagent will move to the older version. Below mentioned output will be observed on entering Y or YES:
INFO: Binary replaced successfully on local server, Replacing it on mate now. FIPS integrity verification test failed. INFO: Binary replaced on mate successfully
- Start both LSMSPRI and LSMSSEC nodes.
- Login to LSMSMGR menu on LSMSPRI and go to Maintenance
Menu and then Start Node.
Figure 5-53 Maintenance
- Select Start Node from the menu.
Figure 5-54 Start Node
- Repeat step 6 to start node on the LSMSSEC server.
- Login to LSMSMGR menu on LSMSPRI and go to Maintenance
Menu and then Start Node.
Switching NPAC agent version - Older to Newer
Do the following steps to switch to the newer npacagent version:
- Login to LSMS CLI with user lsmsadm.
- Shutdown both the LSMSPRI and LSMSSEC nodes.
- Login to LSMSMGR menu on LSMSPRI and go to Maintenance
Menu and then Stop Node.
Figure 5-55 Main Menu
Figure 5-56 Stop Node
- Repeat the same steps to stop the node on LSMSEC server. Login to LSMSMGR menu and then go to the Maintenance Menu and then Stop Node.
- Login to LSMSMGR menu on LSMSPRI and go to Maintenance
Menu and then Stop Node.
- Run the script with the
following command on CLI:
/usr/TKLC/lsms/bin/switch_NANC528
- User is prompted to enter
YES/NO depending upon the requirement of switching to the newer npacagent
version as follows:
[lsmsadm@lsmspri ~]$ /usr/TKLC/lsms/bin/switch_NANC528 INFO: This script is used for switching between older and newer npacagent. LSMS should be stopped for this process to continue. Checking whether LSMS is stopped... INFO: No active node found, We can proceed... INFO: You are going to switch to newer version of npacagent that will have NANC 528 updates. Are you sure you want to continue? (y/n)
- Enter
Y to switch to
the newer npacagent version.
Once the user enters Y to the above prompt, npacagent will move to the newer version. Below mentioned output will be observed on entering Y or YES:
INFO: Binary replaced successfully on local server, Replacing it on mate now. FIPS integrity verification test failed. INFO: Binary replaced on mate successfully
- Start both LSMSPRI and LSMSSEC nodes.
- Login to LSMSMGR menu on LSMSPRI and go to Maintenance
Menu and then Start Node.
Figure 5-57 Maintenance
- Select Start Node from the menu.
Figure 5-58 Start Node
- Repeat step 6 to start node on the LSMSSEC server.
- Login to LSMSMGR menu on LSMSPRI and go to Maintenance
Menu and then Start Node.