background image

CHAPTER 5: SYSTEM TAB

MDU Solutions

®

 – UCrypt

®

 Monitoring Server - Operation Manual 

5-9

5 .2 .7  Install SSL Certifi cate

SSL (Secure Sockets Layer) Certifi cates are small data fi les that digitally bind a cryptographic key to an organization’s details. 

When installed on a secure web server such as the UCrypt Monitoring Server, it activates the padlock and the https protocol 

and allows secure connections from the Server to a browser. Once a secure connection is established, all traffi c between the 

server and the web browser will be secure. This tool allows the installation of your own self signed SSL certifi cates. This is 

useful if you already have an internally trusted self signing authority.

Procedure

This procedure explains how to install an SSL Certifi cate.

1.  Click the 

System

 Tab, Figure 5-22.  

2.  Click 

Confi gure

 under 

Network Confi guration

 section.          

3.  Click the 

+ SSL Certifi cate

 

button, Figure 5-23. 

4.  To upload an SSL Private Key, click the Private Key 

Browse

 button, Figure 5-24.

5.  To upload an SSL Public Certifi cate, click the Public Certifi cate 

Browse

 button.

6.  Click 

Save

.

1

2

Figure 5-22:  Confi gure Network

3

Figure 5-23:   Add SSL Certifi cate

4

5

6

Figure 5-24:   Upload Certifi cate Files

Summary of Contents for UCrypt

Page 1: ...Patent Pending UCrypt IP2Av2 OPERATION MANUAL UCrypt Cable Gateways Monitoring Server www atxnetworks com www atxnetworks com ...

Page 2: ...his symbol indicates that there is helpful related information available in this note Although every effort has been taken to ensure the accuracy of this document it may be necessary without notice to make amendments or correct omissions Specifications subject to change without notice Any use of the UCrypt product directly or indirectly for the decryption and unauthorized reproduction of content t...

Page 3: ...erts 2 10 2 5 Added or Monitored Remote Devices Servers 2 11 2 6 Site Identification for Devices 2 12 2 7 Acknowledge Alerts 2 14 3 EVENTS TAB 3 1 3 1 Chapter Contents 3 1 3 2 Events Page 3 1 3 3 Search by Field 3 2 3 4 Report Generation 3 4 4 PROFILES TAB 4 1 4 1 Chapter Contents 4 1 4 2 Create or Edit a Profile 4 1 4 3 Delete a Profile 4 2 4 4 Configure Email Notifications 4 3 4 5 Working with I...

Page 4: ...ement Error 6 5 6 9 UCrypt Tuner Lost PCR Lock Error 6 6 6 10 UCrypt Lost OOB Lock Error 6 7 6 11 UCrypt High Tuner Discontinuities Minute Error 6 8 6 12 UCrypt Program Lost Bitrate Error 6 9 6 13 UCrypt Multiplex Dropping Error 6 9 6 14 UCrypt Output QAM Lost Bitrate Error 6 10 6 15 UCrypt Output QAM Channel Restarting Error 6 11 6 16 UCrypt SDV Lost Resolve Error 6 12 6 17 UCrypt Tuning Resolver...

Page 5: ...me basic features of the GUI and addition of a single emote Device to the Monitoring Server Further configuration instruction may be found in the other chapters of this manual which are based on the tabs of the Monitoring Server GUI Firewall Open Ports Required Launch the GUI Log In The Monitoring Server GUI Add and Monitor a Remote UCrypt Device Delete a Remotely Monitored Device Next Steps in Co...

Page 6: ...s is because the security certificate is self signed and is a normal browser response This is not a security threat Accept the security warning This will be presented in differing ways depending on the specific browser being used 4 Login with credentials Figure 1 3 case sensitive User Name admin Password atx_monitoring_admin_password The GUI will open as shown in Figure 1 4 NOTE If you will be ena...

Page 7: ...page 2 1 1 5 Network Configuration By default the IP address of the Monitoring Server is 192 168 0 23 so before you are able to connect to emote Devices in your network the Ethernet Network port configuration must be changed to reside on your network Procedure The procedure to change network settings is described in section 5 2 Network Configuration on page 5 2 1 6 Add and Monitor a Remote UCrypt ...

Page 8: ...er Figure 1 9 If multiple servers have been added multiple servers may be started at the same time by clicking all applicable tick boxes for those servers NOTE Before being able to monitor a UCrypt Device the Master password of the remote Device must match the password for that Device that the Monitoring Server has been set to By default the Monitoring Server will use the Device Default Master Pas...

Page 9: ...og select the Default Profile or other defined profile from the drop down menu Figure 1 12 The profile defines the SNMP triggers that are monitored and reported The default profile includes all possible parameters to be monitored See 4 2 Create or Edit a Profile on page 4 1 to create a new or custom profile 16 Click Go 17 The confirmation of starting the remote Device monitoring process is confirm...

Page 10: ... must first be stopped for that Device then restarted NOTE If you make changes to the current profile for any device you will need to re start the monitoring process for those changes to take effect 1 7 Delete a Remotely Monitored Device Remote monitored Devices may be deleted from the Monitoring Server individually or as a group Procedure This procedure explains how to delete Devices from the Moni...

Page 11: ...nfirmation that the object was deleted Figure 1 17 1 8 Next Steps in Configuration Further detailed configuration and procedures may be found in the following locations Monitoring Server Global settings SYSTEM TAB on page 5 1 Monitored Remote Devices configuration STATUS TAB on page 2 1 Creating and Editing Monitoring Profiles PROFILES TAB on page 4 1 6 5 Figure 1 16 Servers for Deletion 7 Figure ...

Page 12: ...CHAPTER 1 QUICK START 1 8 MDU Solutions UCrypt Monitoring Server Operation Manual This page left intentionally blank ...

Page 13: ... changes in hardware Re Identify will not work for this as it does not poll for this type of hardware change 2 1 Chapter Contents This chapter covers the features and functions found on or initiated from the Status Page Status Page in Detail Device Filter Panel Device Identification and Events Alerts Added or Monitored Remote Devices Servers Site Identification for Devices Customize MSO Fields Dev...

Page 14: ...filter Grey Green Yellow Red indicates that the monitored Device with a corresponding indicator will be displayed by clicking the appropriate filter selection Show all Shows all UCrypt Devices that have been added to the Monitoring Server Show Inactive Shows all remote Devices with a status indicator of Grey These are Devices that have been monitored at least once but are not currently being monit...

Page 15: ...cian as the email recipient see 4 4 Configure Email Notifications on page 4 3 2 3 3 Status Page Tools These clickable controls Figure 2 6 add new remote Devices and add specific functionality to the Status page Add Servers Click Add Servers to add new remote Devices to the Monitoring Server Figure 2 7 This is one way to add individual Devices or a small number of Devices but it is possible to impo...

Page 16: ...all then click the Go button Start Monitoring Starts the monitoring process for selected remote Devices Stop Monitoring Stops the monitoring process for selected remote Devices Re Identify Queries the selected remote Devices for their identification parameters This may be necessary if a remote Ucrypt Device for example has been modified or had functionality added or removed ie CableCARDs Delete De...

Page 17: ... remote Devices that will have monitoring started 3 Verify the control selector is set to Start Monitoring the default setting 4 Click the Go button 5 Use the Profile dropdown menu Figure 2 12 to select the Monitoring Profile to be applied to this Device or group of Devices if more than one was selected There are default Profiles available for each type of Device UCrypt DVIS DigiVu and you may cre...

Page 18: ...ore remote Devices 1 Click the Status Tab if it is not already selected Figure 2 14 2 Tick the selection tick box of any remote Devices that will have monitoring stopped 3 Select Stop Monitoring from the control dropdown menu 4 Click the Go button 5 Verify that the correct remote Device or group of Devices is listed for monitoring to be stopped Figure 2 15 6 Click the Go button 7 A message indicat...

Page 19: ...is procedure describes the steps required to Re identify one or more remote Devices 1 Click the Status Tab if it is not already selected Figure 2 17 2 Tick the selection box of any remote Devices that need to be Re identified 3 Use the drop down menu to select Re Identify 4 Click the Go button 5 Verify that the correct Device is being Re Identified Figure 2 18 6 Click the Go button 7 A message ind...

Page 20: ... remote Devices 1 Click the Status Tab if it is not already selected Figure 2 20 2 Tick the selection box of any remote Devices that will be deleted 3 Use the dropdown menu to select Delete 4 Click the Go button 5 The Device to be deleted is highlighted but more can be highlighted from this dialog Figure 2 21 6 Click the Save button 7 A message indicating success is displayed Figure 2 22 1 2 3 4 F...

Page 21: ...g Server does not itself update the remote UCrypt Device passwords Procedure This procedure describes the steps required to Update Credentials on one or more UCrypt Devices 1 Click the Status Tab if it is not already selected Figure 2 23 2 Click one of the Server Filter selections as appropriate to show the Device that you are working with 3 Tick the selection box of any UCrypt Devices that will h...

Page 22: ...red data Address Yes An address assigned by an MSO to identify the site where the monitored Device is installed This parameter title is flexible and may be edited by the MSO to specify any required data Scanning Profile No The profile which contains the monitoring parameters that will be reported upon in the Monitoring Server Profiles may be changed and any number of customized profiles may be cre...

Page 23: ...or actively being monitored Yellow for new and never monitored as yet Red for actively being monitored but with unacknowledged alerts 3 The monitored Remote Device GUI may be directly accessed by clicking the GUI Icon If login credentials have been entered an automatic login to the remote Device account results Master for UCrypt admin for DVIS and DigiVu The Monitoring Server knows the default Mas...

Page 24: ...on on page 2 13 After adding the identity information and changing MSO Fields the new format is shown in Figure 2 30 To customize fields see 2 6 1 Customize MSO Fields on page 2 12 2 6 1 Customize MSO Fields MSO fields are part of the UCrypt Device Site Identification fields and may be changed from default to suit specific MSO needs and terminology Access the link to make these changes from the Sy...

Page 25: ...2 Device Site Identification Device Site Identification Information highlighted in Figure 2 35 will make it easier for technical staff to know which equipment and location requires attention This information will be displayed with the Device status but must be entered for each individual Device when added Procedure This procedure explains how to enter site specific identification to the monitored ...

Page 26: ...es when site information has been changed 2 7 Acknowledge Alerts Alerts received from monitored Devices will cause that Device to have a red indicator in the list Alerts need to be acknowledged to confirm that the reported problem has been investigated and corrected or has corrected itself The process of acknowledging alerts will cause an Intervention to be recorded against that Device along with ...

Page 27: ...resolution 9 Click Save 10 To record details not part of the intervention description click the link Edit the Field Notes 11 In the field notes dialog enter any information that will help others understand what happened Figure 2 41 12 Click Save 13 Field Notes are saved on the Events Details page for the specific remote Device Click the machine IP Address to see them Figure 2 42 5 6 Figure 2 39 Cl...

Page 28: ...CHAPTER 2 STATUS TAB 2 16 MDU Solutions UCrypt Monitoring Server Operation Manual This page left intentionally blank ...

Page 29: ...mote Device identification parameters This creates a filter which reduces the list to only items of interest Several search filters may be in play at one time and filters may be easily deleted Available search fields are explained in Table 3 2e 2 Report Generation Create a report based on selected calendar dates Reports include received Alerts and their Interventions if any exist 3 Sortable Event ...

Page 30: ... numeric string ACCT is a value for example SITE YES An MSO assignable field of any alpha numeric string SITE is a value for example HUB ID YES An MSO assignable field of any alpha numeric string HUB ID is a value for example MGMT AREA YES An MSO assignable field of any alpha numeric string MGMT AREA is a value for example ACCT STATUS YES An MSO assignable field of any alpha numeric string ACCT ST...

Page 31: ...ervers that match this particular search criteria 7 With all three criteria selected click the Search Icon 8 An Active Filter is created Figure 3 5 and multiple filters may be created in the same way to further refine the selection Filters may be deleted by clicking anywhere on the filter A Trash Can icon is on the filter to remind you of this 9 The list of Devices with the specified criteria is p...

Page 32: ... date for the report in the format YYYY MM DD This date will be included in the report 3 Enter the end date for the report in the format YYYY MM DD This date will be included in the report 4 Click Generate Report 5 An Intervention Report containing all events will be presented Figure 3 7 and summarized the following ways 6 Summary based on Devices affected 7 Summary based on TimeLine 8 Summary of ...

Page 33: ...sting profile share most of the same steps so we combine these two procedures to avoid needless repetition It is worthy of note that while UCrypt monitoring profiles default to all triggers enabled the DVIS DigiVu profiles default to only one trigger SNMP Online Transition When building DVIS DigiVu profiles all required triggers must be manually selected Procedure This procedure explains how to cr...

Page 34: ... be monitored within this profile Hold the Control key while clicking to select all applicable Triggers or hold the Shift key to select a block of Triggers The triggers may be added or subtracted from existing profiles in the same way 6 Click Save when done Click the Profiles tab to continue work on Profiles or any tab to continue configuration or monitoring 4 3 Delete a Profile Profiles that are ...

Page 35: ...any given Monitoring Server there can be only one configuration for email alerts per alert trigger This means that all monitored Devices sending an identical alert and configured with the same profile alert item will generate an email to all defined recipients All monitored Devices use the same fundamental trigger configuration even though they may be monitored with different profiles so if the al...

Page 36: ...nd lower section titled Trigger Scripts They relate directly to the familiar Device Alerts as there is one for each Alert that you are familiar with and a few new ones that relate to the interaction with the Monitor Server and the remitting of specific Alerts 4 Click the Trigger to be configured There is only one set of triggers per Monitoring Server All monitored Devices whose profile includes a ...

Page 37: ... 38 8 Mb s The bit stream from the internal multiplexer to the QAM modulator has failed This error indicates that the modulator has failed to acquire the bit stream properly SDV Lost Resolve Error Refers to a Tuning Adapter tried to determine the frequency of the channel but it received an error message Tuning Resolver Lost Lock Error Refers to Tuning Adapter lost lock to the Data Carousel Tempera...

Page 38: ...but the DQAM has not been detected System Booted Refers to the UCrypt Server main board being rebooted CableCARD stopped Decrypting Refers to a CableCARD that has stopped decrypting Program Lost Bitrate Refers to lack of presence of MPEG video packets for the program in question This error is reporting on a single program in a QAM and is not indicating the failure of the QAM as a whole SNMP Online...

Page 39: ...No User Report Required 40 Login Verified No User Report Required 41 Monitoring Failure No User Report Required 42 No Issue Found All programs are working No User Report Required 43 Plant Maintenance No User Report Required 44 RF level s were too high No User Report Required 45 RF level s were too low No User Report Required 46 SNR level s were too low No User Report Required 47 Server Power Cycle...

Page 40: ...CHAPTER 4 PROFILES TAB 4 8 MDU Solutions UCrypt Monitoring Server Operation Manual This page intentionally left blank ...

Page 41: ...uration LDAP Configuration Firmware Upgrades Power Management System Time SNMP and more 5 1 Chapter Contents Network Configuration Syslog Forwarding Configure SNMP User Configuration LDAP Authentication Configuration Location Current Date Power Management Email Alerts Customize Acceptable Software Customize MSO Fields Import Export Server Records Backup and Restore Database Figure 5 1 System Tab P...

Page 42: ...2 Network Configuration From this page you may edit the physical Ethernet port IP addresses and create VLANs NOTE Mousing over the configuration fields shows tool tips for help in configuration Figure 5 2 System Tab Part 2 Edit Network Interface Here Figure 5 3 Network Configuration Page ...

Page 43: ... have the Management GUI SNMP Access Support Access services enabled if desired via the respective toggle switches External IP Out The interface which will be used for IP output if a specific interface is not set when defining the output An interface defined as External IP Out may have the Management GUI SNMP Access Support Access services enabled if desired via the respective toggle switches 5 2 ...

Page 44: ...Host name used in DHCP requests IP Address IP Address IP Address v4 or v6 Network Mask IP Subnet Mask Network Mask ffff ffff ffff or 255 255 255 0 format Default Gateway IP Address Routing Gateway for the Interface DNS Server IP Address DNS Server only used if specified here DNS Search Domain URL As required by your network NTP Server IP Address URL Network Time Protocol server to which to synchro...

Page 45: ... 2 3 Monitor Network Performance It is possible to view the aggregate network traffic on any Ethernet interface occurring over a period of time Procedure This procedure describes monitoring of the network performance histogram 1 Click the System Tab Figure 5 9 2 Click Configure under Network Configuration section 3 Histogram of network data sent and received over each individual interface is updat...

Page 46: ...nterface to initiate the Ping function Figure 5 12 4 Enter the Target remote IPv4 address of the device to be pinged Figure 5 13 5 Click the Ping button 6 The ping results are shown Figure 5 14 To continue with another ping to this address click Ping again 7 Alternately try another target by entering its IP address then click Ping Click Cancel to exit the Ping function 1 2 Figure 5 11 Configure Net...

Page 47: ... filters 1 Click the System Tab Figure 5 15 2 Click Configure under Network Configuration section 3 Click the Edit Address Filters button Figure 5 16 4 In the window that opens enter the IPv4 addresses or networks in CIDR notation that will be allowed or denied access to this machine GUI in the corresponding dialog box Figure 5 17 CIDR Notation examples CIDR 192 168 100 0 32 is the same as 192 168...

Page 48: ...sily installed in the Server through an automated process but it will be necessary to have a registered domain name Detailed information about obtaining a certificate is available at https letsencrypt org 1 Click the System Tab Figure 5 19 2 Click Configure under Network Configuration section 3 Click the ACME SSL Certificate button Figure 5 20 4 Update the dialogue with Domain Names Figure 5 21 5 ...

Page 49: ...he server and the web browser will be secure This tool allows the installation of your own self signed SSL certificates This is useful if you already have an internally trusted self signing authority Procedure This procedure explains how to install an SSL Certificate 1 Click the System Tab Figure 5 22 2 Click Configure under Network Configuration section 3 Click the SSL Certificate button Figure 5...

Page 50: ...s procedure explains how to configure a VLAN on the Monitoring Server We do not include configuration of the far end switches or your equipment 1 Click the System Tab if it is not already selected Figure 5 25 2 Click Configure Network under Network Configuration section 3 Click VLAN on the eth0 interface to add a VLAN for remote Server management Figure 5 26 4 Edit or fill in the VLAN settings for...

Page 51: ... this interface Support Access Tick Box Switch If enabled the support ssh port will be enabled on this interface note it is strongly encouraged to leave this enabled on at least one interface 6 A VLAN is added to Interfaces with a name such as eth0 1 but is not yet activated Figure 5 28 7 Click Apply Configuration button to activate changes 8 If it is required to edit any existing interface click ...

Page 52: ...aps Northbound to a management server A MIB is available to download from the configuration page Procedure This procedure explains how to configure SNMP trap destination settings 1 Click the System tab if it is not already selected Figure 5 31 2 Click Configure Trap Destination Server under Network Configuration section 3 The SNMP Trap Configuration Northbound page opens see Figure 5 32 4 Click th...

Page 53: ... Use the LDAP configuration to add users Use this section to view users that have been added through LDAP Users are not actually configured here they are configured within LDAP Procedure This procedure outlines steps to view configured users previously done through LDAP 1 Click the System tab if it is not already selected Figure 5 33 2 Click Configure Users under the User Authentication section 3 ...

Page 54: ...the LDAP server and confirms established connection by displaying the Connection Established indicator 8 Select the Local Groups that an LDAP group maps to by checking the corresponding checkbox Note that LDAP users who belong to groups that are NOT mapped to local groups will be unable to login to the Monitoring Server This setting is saved automatically when ticked unticked 9 You can view the cu...

Page 55: ...igure 5 38 To activate TACACS click the tick box 4 Enter the TACACS Server IPv4 address Port and the Secret the shared secret password used to authenticate using the TACACS Server If the secret contains spaces enclose the whole secret within quotes You may click the EYE icon or Show Secret to view the secret password otherwise it is hidden 5 Additional options are available a Default to Admin Leve...

Page 56: ...TP server Access that by editing each any interface that has access to an NTP server see 5 2 2 Edit a Network Interface on page 5 3 5 8 2 Physical Location The system timezone controls the time used by the Monitoring Server internally The Physical Location field is used within this GUI and monitoring systems to provide a friendly identifier for the machine for its location which is displayed in th...

Page 57: ... example for May 26 2016 11 40 AM enter 2016 05 26 11 40 00 3 Click Set Current Time 4 If an incorrect time and date is entered there may be a discrepancy reported in the entered time against the time and date on your management PC which will manifest itself as the Time and Date being shown in red Figure 5 53 In this case adjust the entered date to the correct date and time 5 10 Power Management P...

Page 58: ...itoring Server is a Virtual Machine Periodic Reboot Dropdown Enables periodic reboot of machine at frequency chosen Disabled Daily or Weekly which will occur on Sunday Periodic Reboot Time Integer The system may be configured to perform a reboot at the time specified in the dialog box Time must be entered in 24 hour format using HH MM notation Save Periodic Reboot Button It is necessary to save th...

Page 59: ...ion link changes to reflect the actual email that is configured as shown in Figure 5 46 and Figure 5 47 Procedure This procedure explains how to configure SMTP settings to enable email Alert messages 1 Click the System tab if it isn t already selected 2 In the Email Alerts section click the Create link Figure 5 48 3 Enter the SMTP parameters in the form Email Recipients is used only for test purpo...

Page 60: ... for the test message then delete this email address after testing is done Save Button Click to save and apply changes Delete Button Link Click to delete the account entered Test Button Click to send a test message to the recipient listed in the dialog Alert Recipients using the configuration entered 5 15 Monitoring Server Details This section see Figure 5 50 provides links to two Monitoring Serve...

Page 61: ... event of a mismatch between installed and acceptable versions a warning will be displayed adjacent the Device with the mismatch Figure 5 52 The entered number is compared to the firmware version number installed in each machine and must match exactly so even a typo may cause a mismatch error 5 15 2 Customize MSO Fields MSO fields are the Monitored Device Identification column headings highlighted...

Page 62: ... and Documentation This link connects to a page that provides further links to all published documentation for products supported on this platform Figure 5 55 Click any of these links to go directly to online ATX documentation Figure 5 54 User Guides Documentation Figure 5 55 Technical Support Page ...

Page 63: ... template Procedure 1 Click the System tab if it isn t already selected 2 In the Data Management section click the link Import Export Server Records Figure 5 57 3 Click the Download CSV Template link to get a copy of the required template Figure 5 58 Save the file to your PC 4 Open the template file as a spreadsheet and under ip enter the IP addresses of the emote Devices Figure 5 59 5 Under produ...

Page 64: ...tton Figure 5 62 10 Click the Upload Server Records button 11 A confirmation page displays results Figure 5 63 Added servers will be listed in green 12 Servers that cannot be reached or cannot be added will have errors listed in red with the reasons they could not be added and possible solutions 13 Click Back to System Page to return to configuration 5 7 8 Figure 5 61 Select Server Records File 9 ...

Page 65: ...isn t already selected 2 In the Data Management section click the Backup and Restore Database link Figure 5 64 3 On the Backups page that opens click the Backup Now button Figure 5 65 4 A new backup is created without further announcement and is added to the list of Existing Backups further down the page Figure 5 66 Click the file link to download the backup file to your computer 5 Each date stamp...

Page 66: ...d 2 Click the Backup and Restore Database link Figure 5 67 3 From the Scheduled FTP Backups page tick the Enable Scheduled Backups tick box Figure 5 68 4 With the dropdown menus select the backup Frequency and day of the week if weekly was selected 5 Enter the Periodic Backup Time in 24hr notation HH MM 6 Enter the FTP Host address and login credentials 7 Click Save FTP Configuration button to app...

Page 67: ...starting Error UCrypt SDV Lost Resolve Error UCrypt Tuning Resolver Lost Lock Error UCrypt Power Supply Failure UCrypt Plant Maintenance Exception UCrypt DQAM Configured But Not Detected UCrypt Tuner Board Configured But Not Detected 6 2 DVIS HD SD Issue 6 2 1 Refers to A detected problem with an encoder input card The input cards can develop problems that may be detected 6 2 2 Repetition of Alert...

Page 68: ...Temperature Error 6 4 1 Refers to The internal operating temperature of the UCrypt CPU Cores The Mainboard CPU s core temperatures are monitored The alert threshold is at a core temperature of 167 F 75 C which reflects an ambient air temperature surrounding the UCrypt of about 107 F 42 C Due to normal variabilities these specified temperatures might be slightly different 6 4 2 Repetition of Alert ...

Page 69: ...sent only once per event that is if a fan fails an alert is sent but no further notification is generated Each fan is monitored and reported on independently When a fan is replaced the alarm condition for that fan is automatically remitted then the UCrypt will again send a failure alert if when that specific fan fails again 6 5 3 Urgency Low 6 5 4 Cases Where Alert is Likely a Result of Outside in...

Page 70: ...channel map update The Channel Map is also known as the Virtual Channel Table and is transmitted by the Cable Service Provider on the OOB carrier to inform the system STBs of the current location of each program carried on the cable system This relates the Cable Channel to the EIA QAM channel and MPEG program number the EIA Major and Minor Channel Numbers of each service The Channel Map is sent fr...

Page 71: ...eCARD are paired in the billing system CableCARD modules may not be moved between UCrypt devices without re pairing 6 8 2 Repetition of Alert This message is sent only once when it is determined that a specific CableCARD module no longer possesses entitlement to decrypt the associated program If the card re acquires entitlement then looses it again another alert is sent 6 8 3 Customer Symptoms Cus...

Page 72: ...NCS administrator may be necessary to completely remove the CableCARD module and host IDs from the DAC DNCS inventory and re enter it from scratch 7 There is a problem with the physical CableCARD module and replacement may be necessary 6 9 UCrypt Tuner Lost PCR Lock Error 6 9 1 Refers to The loss of Program Clock Reference on a specific multiplex or QAM channel PCR is required to process programs ...

Page 73: ...rypt has lost reception on the specified OOB carrier There is an OOB carrier tuner on each CableCARD module host slot port installed in the UCrypt Your UCrypt may have between 1 and 10 OOB tuners installed depending on the ordered configuration 6 10 2 Repetition of Alert This alert is sent only once each time a specific OOB carrier loses lock No further alert will be sent until the OOB carrier loc...

Page 74: ...ther 6 11 4 Urgency Low High 6 11 5 Cases Where Alert is Likely a Result of Outside influence or normal operation If the number of discontinuities is low a few hundred per minute and infrequently reported this is considered normal as just about all cable plants experience some brief moments of signal impairment for a multitude of reasons If the discontinuities are above 500 minute and occur freque...

Page 75: ...verified the same program is in fact operating properly on the plant this may be an indication of either a UCrypt software or hardware based issue 6 12 6 Probable Causes 1 If the error is seen immediately following an apply or reboot this is considered normal and is not an issue 2 The UCrypt software failed to re acquire the program video stream after an outage condition 3 The program was unavaila...

Page 76: ...ause 6 13 6 Probable Causes 1 There are too many programs assigned to the affected QAM and the aggregate bit rate of the programs exceeds 38 8 Mb s occasionally or frequently 2 Internal UCrypt multiplexer error 6 13 7 Next Steps 1 Analyze the number of programs and the maximum possible aggregate bite rate of those programs that are assigned to the specific troubled QAM and attempt to calculate if ...

Page 77: ...d 6 15 3 Customer Symptoms Customer experiences a very brief flicker impairment on all programs on the affected QAM at the time that the error condition occurs The impairment is so brief that it sometimes may only be noticed if there are many restarts per minute 6 15 4 Urgency Low High 6 15 5 Cases Where Alert is Likely a Result of Outside influence or normal operation If only a rare occurrence of...

Page 78: ...dapter 3 Require another Tuning Adapter 6 16 7 Next Steps 1 Verify the Tuning Adapter is properly provisioned 2 Check the configuration on the UCrypt device the number of SDV programs should be equal to or less than the number of Tuning Adapter tuners Add additional Tuning Adapter if required 6 17 UCrypt Tuning Resolver Lost Lock Error 6 17 1 Refers to Tuning Adapter lost lock to the Data Carousel...

Page 79: ...on of the equipment An Internal Issue This alert may be triggered by the failure of an internal power supply A site visit is required to resolve the cause 6 18 6 Probable Causes 1 Internal redundant power supply failure 2 No AC power in supply circuit 3 AC power cord for power supply has been removed or unplugged 6 18 7 Next Steps 1 Check AC power cord to power supplies 2 Check for presence of AC ...

Page 80: ...ly if the reoccurrence is rare and frequency of reports are very low 2 This alert received frequently could more likely be indicating an internal UCrypt software issue especially if many channels are reported missing over a period of time 6 20 UCrypt DQAM Configured But Not Detected 6 20 1 Refers to UCrypt device configuration has program assigned to a DQAM module but the DQAM has not been detecte...

Page 81: ...erts analyze the sum total of the alerts to determine a possible outside cause as there may be some common problem which cannot be predicted here This alert would not normally be expected The UCrypt may be installed in a dirty environment whereby the slots of the motherboard have become dirty and connections to tuner boards are failing An Internal Issue Dirty motherboard PCIe slot bad PCIe slot f ...

Page 82: ...CHAPTER 6 REMOTE DEVICE ALERTS 6 16 MDU Solutions UCrypt Monitoring Server Operation Manual This page intentionally left blank ...

Page 83: ... TECHNICAL SUPPORT Tel 905 428 6068 Toll Free 800 565 7488 USA Canada only Press 3 for Technical Support Then press 1 for Digital Video Products DVIS DigiVu UCrypt VersAtivePro Email digitalvideosupport atxnetworks com CUSTOMER SERVICE ATX Networks 1 501 Clements Road West Ajax ON L1S 7H4 Canada Tel 905 428 6068 Toll Free 800 565 7488 USA Canada only Press 1 for Customer Service Fax 905 427 1964 T...

Page 84: ... ON L1S 7H4 Canada Tel 905 428 6068 Toll Free 800 565 7488 support atxnetworks com ISO 9001 15 REGISTERED 2018 ATX Networks Printed in Canada Information in this document is subject to change without notice www atxnetworks com Rev 08 18 ANW1175 ...

Reviews: