Bulk provisioning allows exporting configuration data from one BTS server and importing it to configure another BTS server. Components like Call Agents, Feature Servers, and EMS can be added to the inventory and configured. BTS components can be managed by checking their status, controlling their state, and adding, editing, or deleting multiple components simultaneously.
This session is aimed at the regular ISPF user who wants to learn about recent features of ISPF that can make life easier, and also at those that want to learn about the new features for ISPF in z/OS V2R2.
Learn about IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches. The IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches provide unmatched scalability and performance, while also delivering innovations to help address a number of networking concerns today and providing capabilities that will help you prepare for the future. These switches are capable of supporting up to sixty-four 10 Gb Ethernet connections while offering Layer 2/3 switching, in addition to OpenFlow and easy connect modes. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
IBM Configuration Assistant for z/OS Communications Server updatezOSCommserver
New capabilities for managing TCP/IP disaster recovery and planned outage configurations were shipped for the Network Configuration Assistant (formerly Configuration Assistant) via APAR PI97737 in July 2018. This presentation will provide a brief background on TCP/IP configuration with Network Configuration Assistant, and then introduce and explain the new capabilities.
This session is aimed at the regular ISPF user who wants to learn about recent features of ISPF that can make life easier, and also at those that want to learn about the new features for ISPF in z/OS V2R2.
Learn about IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches. The IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches provide unmatched scalability and performance, while also delivering innovations to help address a number of networking concerns today and providing capabilities that will help you prepare for the future. These switches are capable of supporting up to sixty-four 10 Gb Ethernet connections while offering Layer 2/3 switching, in addition to OpenFlow and easy connect modes. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
IBM Configuration Assistant for z/OS Communications Server updatezOSCommserver
New capabilities for managing TCP/IP disaster recovery and planned outage configurations were shipped for the Network Configuration Assistant (formerly Configuration Assistant) via APAR PI97737 in July 2018. This presentation will provide a brief background on TCP/IP configuration with Network Configuration Assistant, and then introduce and explain the new capabilities.
Motivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTPzOSCommserver
Change is Coming: Motivation and Considerations for Migrating from SMTPD/Sendmail to CSSMTP
In July of 2015, IBM issued a statement of direction indicating that z/OS V2R2 Communications Server would be the last release to include the SMTPD Mail Gateway and Sendmail mail transports. In this session, we will discuss the reasons for this removal, review CSSMTP-related enhancements in V2R2, and look at considerations when migrating to the CSSMTP mail gateway from SMTPD.
Cisco Internetworking Operating System (ios)Netwax Lab
Cisco IOS (originally Internetwork Operating
System) is software used on most Cisco Systems
routers and current Cisco network switches.
(Earlier switches ran CatOS.) IOS is a package of
routing, switching, internetworking and
telecommunications functions integrated into a
multitasking operating system.
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2zOSCommserver
IBM recently announced SMCv2 for SMC-Dv2. SMCv2 defines Shared Memory Communications for TCP/IP connections that span multiple IP subnets. This presentation will introduce how this new capability applies to SMC-Dv2 for z/OS V2R4 and ISMv2 for the IBM z15. The key concepts of the SMC-Dv2 will be introduced along with an overview of how to get started using the new solution with z/OS 2.4. The overview will also cover exploitation and configuration considerations for existing SMC-D users and for new SMC-Dv2 only users. In this presentation, customers will learn about this new capability and how this capability can extend the performance benefits of SMC-D to additional System Z workloads.
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session introduces a new z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
SMC-D with IBM z13 and z13s Internal Shared Memory (ISM) provides a highly optimized intra-CPC communications.
SMC-D is expected to provide substantial performance, throughput, response time, and CPU consumption
benefits compared to standard TCP/IP communications over HiperSockets.
This is the planning part of a two-part session for system programmers and their managers who are planning on upgrading to z/OS V2.4. In part one, the focus is on preparing your current system for upgrading to either release. The system requirements to run and how to prepare your system for the upgrade are discussed. Part two covers the only upgrade details for upgrading to z/OS V2.4 from either V2.2 or V2.3. It is strongly recommended that you attend both sessions for an upgrade picture for z/OS V2.4.
The general availability date for z/OS V2.4 happened September 30 2019.
Motivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTPzOSCommserver
Change is Coming: Motivation and Considerations for Migrating from SMTPD/Sendmail to CSSMTP
In July of 2015, IBM issued a statement of direction indicating that z/OS V2R2 Communications Server would be the last release to include the SMTPD Mail Gateway and Sendmail mail transports. In this session, we will discuss the reasons for this removal, review CSSMTP-related enhancements in V2R2, and look at considerations when migrating to the CSSMTP mail gateway from SMTPD.
Cisco Internetworking Operating System (ios)Netwax Lab
Cisco IOS (originally Internetwork Operating
System) is software used on most Cisco Systems
routers and current Cisco network switches.
(Earlier switches ran CatOS.) IOS is a package of
routing, switching, internetworking and
telecommunications functions integrated into a
multitasking operating system.
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2zOSCommserver
IBM recently announced SMCv2 for SMC-Dv2. SMCv2 defines Shared Memory Communications for TCP/IP connections that span multiple IP subnets. This presentation will introduce how this new capability applies to SMC-Dv2 for z/OS V2R4 and ISMv2 for the IBM z15. The key concepts of the SMC-Dv2 will be introduced along with an overview of how to get started using the new solution with z/OS 2.4. The overview will also cover exploitation and configuration considerations for existing SMC-D users and for new SMC-Dv2 only users. In this presentation, customers will learn about this new capability and how this capability can extend the performance benefits of SMC-D to additional System Z workloads.
With so much attention on cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their z/OS workloads. But with so many protocols and so many ways to configure and use them, this assessment can be daunting if not downright impossible. This session introduces a new z/OS V2R3 Communications Server feature called z/OS Encryption Readiness Technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.
SMC-D with IBM z13 and z13s Internal Shared Memory (ISM) provides a highly optimized intra-CPC communications.
SMC-D is expected to provide substantial performance, throughput, response time, and CPU consumption
benefits compared to standard TCP/IP communications over HiperSockets.
This is the planning part of a two-part session for system programmers and their managers who are planning on upgrading to z/OS V2.4. In part one, the focus is on preparing your current system for upgrading to either release. The system requirements to run and how to prepare your system for the upgrade are discussed. Part two covers the only upgrade details for upgrading to z/OS V2.4 from either V2.2 or V2.3. It is strongly recommended that you attend both sessions for an upgrade picture for z/OS V2.4.
The general availability date for z/OS V2.4 happened September 30 2019.
ICTFAX 3.0 is an open source multi-user and web based software solution for service providers based on open source Freeswitch and Drupal 7. ICTFAX is an email to fax gateway, supports G.711 faxing , PSTN faxing and T.38 origination and termination.
Information on planning to upgrade to z/OS 3.1, from z/OS V2.4 and V2.5. This is the planning information, and you will also need to review the Technical Actions presentation also.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
4 cfg bts
1. CH A P T E R 4
Configuring BTS Components
Bulk Provisioning
To use information on one BTS server to configure another BTS server:
1. use the bulk_export command to generate a CLI file from the first BTS server
2. use the bulk_import command to load that generated CLI file on the other BTS server; it uses SSL
to transfer the file from the EPOM server to the BTS server
bts_export looks like the following:
root@cyber229:opt 21> /opt/CSCOepom/bin/bts_export
NAME
bts_export - BTS Config Export
SYNOPSIS
bts_export -h hostname -v BTSver of hostname -o outfile [-l login -p password
]
DESCRIPTION
Export a BTS Configuration.
OPTIONS
-h Hostname
-v BTSversion of hostname (3.5,4.1,4.2,4.4.0,4.4.1. 4.5.0)
-o Output file
-l Login
-p Password
-s Site ID
EXAMPLES
1. bts_export -h bts_host -v host_bts_ver -o config.cli
2. bts_export -h bts_host -v host_bts_ver -l login -p passwd -s siteid -o con
fig.cli
bts_import looks like the following:
root@cyber229:opt 22> /opt/CSCOepom/bin/bts_import
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
OL-14433-01 4-1
2. Chapter 4 Configuring BTS Components
Bulk Data Export
NAME
bts_import - BTS Config Import
SYNOPSIS
bts_import -h hostname -u username -f inputfile
DESCRIPTION
Import a BTS Configuration.
OPTIONS
-h Hostname
-f Input file
-u User name
EXAMPLES
1. bts_import -h bts_host -u usrname -f config.cli
Bulk Data Export
Using the export.xml (input) file in /opt/CSCOepom/bin/, you can export all data in a BTS release from
the EPOM to the BTS.
Each noun has an entry in the export.xml file. For example:
<itemlist>
<item noun="call_agent"/>
<item noun="domain2route"/>
...
</itemlist>
When you enter bts_export the EPOM sequentially selects each noun and verb from export.xml. (Verbs
distinguish between add or change commands). For each noun and verb the following occurs:
1. The bts_export module picks a noun or verb from export.xml.
2. The bts_export module generates the show command.
3. EPOM sends the request as “show <noun>” to the BTS.
4. The BTS sends a response to EPOM containing all of that noun's or verb’s attributes in the BTS.
5. EPOM parses the response.
6. EPOM generates an add or change command, based on the noun's attributes and value. Some nouns
do not support the add command; they use change instead.
7. EPOM writes these add/change commands to the text output file you specify in
/opt/CSCOepom/bin/.
Exporting Data from EPOM to BTS
Step 1 Go to /opt/CSCOepom/bin/.
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
4-2 OL-14433-01
3. Chapter 4 Configuring BTS Components
Connecting EMS Servers
Step 2 Enter bts_export -h hostname -v BTSver of hostname -o outfile [-l login
-p password.
The text output file you specify containing all data in a BTS release appears in /opt/CSCOepom/bin/
Connecting EMS Servers
Before Adding EMS Servers
Before adding an EMS server complete the tasks in this checklist.
Tasks
Ensure you have the hostname and IP address of the EMS server.
Ensure you have the login and password of the EMS server.
Ensure you have the Site ID of the EMS server:
1. Log in to the EMS server as the root user.
2. Enter:
grep SITEID /etc/opticall.cfg
SITEID=rtpvtc2
Adding EMS Servers
Add an EMS server to the “all” domain and set up the initial configuration.
Step 1 Start EPOM.
EPOM opens to the Domain Management window.
Step 2 In the Domain pane, in the all domain row, click Edit.
The Modify component, Domain window opens.
Tip Because you are viewing the “all” domain, the Inventory and Groups items are also preceded by “all”
(all Inventory and all Groups).
Step 3 In the all Inventory pane, click Add.
The Add component window opens.
Step 4 Enter:
• Hostname: hostname or IP address of EMS server
• Type: BTS 10200
• Login: EMS server login
• Password: EMS server password
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
OL-14433-01 4-3
4. Chapter 4 Configuring BTS Components
Connecting EMS Servers
• Site ID: site ID for EMS server
Step 5 Click OK.
Configuring EMS Servers
Step 1 Expand the domain tree:
a. Click all.
b. Click BTS 10200s.
Step 2 Click the EMS server to configure.
The Details window opens.
Step 3 Click Config.
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
4-4 OL-14433-01
5. Chapter 4 Configuring BTS Components
Managing BTS Components
The navigation pane shows the Configuration tree, and the content area shows the status of the selected
EMS server.
Step 4 Click the noun to view the information on that EMS table and give a verb command for that noun ( add,
audit, sync, change etc. ).
Managing BTS Components
Adding BTS Components Using Domain Tree
Using EPOM you can add components.The BTS has the following independent logical components:
• Call Agent (CA)—Serves as a call management system and media gateway controller. It handles the
establishment, processing, and teardown of telephony calls.
• Feature Servers (FSs)—Provide POTS, Tandem, Centrex, and Advanced Intelligent Network (AIN)
services to the calls controlled by the CAs. The FSs also provide processing for service features such
as call forwarding, call waiting, and LNP.
• Element Management System (EMS)—Controls the entire BTS and acts as a mediation device
between an NMS and one or more CAs. It is also the interface for the provisioning, administration,
and reporting features of the BTS.
Step 1 From the left pane, select a device.
A window appears.
Step 2 Select a device
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
OL-14433-01 4-5
6. Chapter 4 Configuring BTS Components
Managing BTS Components
Adding BTS Inventory
BTS inventory is the BTS EMS server.
Step 1 Click Add.
Step 2 Define the:
• IP Address/Hostname—IP Address or hostname
• Type—host type
• Site ID
• Optiuser Password
• Confirm Optiuser Password
Step 3 Click OK.
Adding BTS Components
Add components to the EPOM inventory to build a managed network. The device information includes
static and dynamic selections to other parts of the configuration. Follow this example to add a dial plan.
Step 1 From the Domain window, select the domain > BTS10200s > the EMS server.
Step 2 Click Config.
The BTS Component Status window opens.
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
4-6 OL-14433-01
7. Chapter 4 Configuring BTS Components
Managing BTS Components
Step 3 In the Configuration tree, select Office Tables > dial_plan.
The BTS Component window opens showing a list of Dial Plans. If this is the first Dial Plan (or device
of this type) that you are adding, the list is empty.
Step 4 Click Add.
The BTS Component Add window opens.
Step 5 Define the device. Required fields are identified with a red checkmark.
Step 6 Click OK or Apply.
• When you click OK, the component is added and the list of components in the Component:name
window appears.
• When you click Apply, the component is added, but you remain in the Add component window for
further tasks.
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
OL-14433-01 4-7
8. Chapter 4 Configuring BTS Components
Managing BTS Components
Checking Status and Controlling Components
Step 1 From the Domain window, navigate to EMS server.
Step 2 Click Config.
The BTS Component Status window opens. The Configuration tree appears in the left navigation pane.
Step 3 Navigate to device and click to select it.
Step 4 In the Status window, click Control.
Step 5 From the Component Control window, verify that you have selected the correct component, then select
a target_state.
Step 6 Select state.
Options depend on the type of component that you selected.
Step 7 Click OK.
Adding Multiple Components
You can only perform bulk provisioning commands on the same type of devices. For instance, if a group
of subscribers use the same media gateway and subscriber profile, you can add or edit these subscribers
by using a single command.
Step 1 In the EMS-Server window left pane, click a component.
The Component:name window appears.
Step 2 Click Add.
The Add component window appears.
Step 3 Select the Expand range expression check box.
Step 4 In the ID field, enter a range expression in square brackets [ ].
For example, to add a group of 10 dial plans with the id prefix dp001_new, enter dp001_new[01-10].
Doing so adds dial plans dp001_new01, dp001_new02, through dp001_new10.
Step 5 Enter information in the remaining attribute fields.
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
4-8 OL-14433-01
9. Chapter 4 Configuring BTS Components
Managing BTS Components
Step 6 Click OK or Apply.
• When you click OK, the component is added and the list of components in the Component:name
window appears.
• When you click Apply, the component is added, but you remain in the Add component window for
further operations.
Editing Multiple Components
Step 1 In the ems-server window left pane, click a component.
The Component:name window appears.
Step 2 In the Component:name window, select one or more components that you want to edit.
Step 3 Click Edit.
The Change component window appears.
Note The first (blank) row with the checked box indicates that the component in the window title was selected
for displaying details, editing, or deletion.
Step 4 Make changes.
Step 5 Click OK.
Deleting Multiple Components
Step 1 In the ems-server window left pane, click a component.
The Component:name window appears.
Step 2 In the Component:name window, select one or more components to delete.
Step 3 Click Delete.
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
OL-14433-01 4-9
10. Chapter 4 Configuring BTS Components
Managing BTS Components
The Delete component window appears with the requested deletions.
Note The first (blank) row with the checked box indicates that this component was selected for displaying
details, editing, or deletion.
Step 4 Click OK.
Cisco BTS 10200 Softswitch EPOM Getting Started Guide
4-10 OL-14433-01