Professional Documents
Culture Documents
Egate-2000 MN
Egate-2000 MN
Egate-2000 MN
Egate-2000
Carrier Ethernet Aggregation for PDH and SDH/SONET
Version 1.0
Egate-2000
Carrier Ethernet Aggregation for PDH and SDH/SONET
Version 1.0
International Headquarters RAD Data Communications Ltd. 24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel: 972-3-6458181 Fax: 972-3-6498250, 6474436 E-mail: market@rad.com
North America Headquarters RAD Data Communications Inc. 900 Corporate Drive Mahwah, NJ 07430, USA Tel: (201) 5291100, Toll free: 1-800-4447234 Fax: (201) 5295777 E-mail: market@radusa.com
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the Egate-2000 to be delivered hereunder shall be free of defects in material and workmanship under normal use and service for a period of twelve (12) months following the date of shipment to DISTRIBUTOR. If, during the warranty period, any component part of the equipment becomes defective by reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect, RAD shall have the option to choose the appropriate corrective action: a) supply a replacement part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at the equipment's location. In the event that RAD requests the return of equipment, each party shall pay one-way shipping costs. RAD shall be released from all obligations under its warranty in the event that the equipment has been subjected to misuse, neglect, accident or improper installation, or if repairs or modifications were made by persons other than RAD's own authorized service personnel, unless such repairs by others were made with the written consent of RAD. The above warranty is in lieu of all other warranties, expressed or implied. There are no warranties which extend beyond the face hereof, including, but not limited to, warranties of merchantability and fitness for a particular purpose, and in no event shall RAD be liable for consequential damages. RAD shall not be liable to any person for any special or indirect damages, including, but not limited to, lost profits from any cause whatsoever arising from or in any way connected with the manufacture, sale, handling, repair, maintenance or use of the Egate-2000, and in no event shall RAD's liability exceed the purchase price of the Egate-2000. DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes relating to Egate-2000 and for ensuring that replacements and other adjustments required in connection with the said warranties are satisfactory. Software components in the Egate-2000 are provided "as is" and without warranty of any kind. RAD disclaims all warranties including the implied warranties of merchantability and fitness for a particular purpose. RAD shall not be liable for any loss of use, interruption of business or indirect, special, incidental or consequential damages of any kind. In spite of the above RAD shall do its best to provide error-free software products and shall offer free Software updates during the warranty period under this Agreement. RAD's cumulative liability to you or any other party for any loss or damages resulting from any claims, demands, or actions arising out of or relating to this Agreement and the Egate-2000 shall not exceed the sum paid to RAD for the purchase of the Egate-2000. In no event shall RAD be liable for any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD has been advised of the possibility of such damages. This Agreement shall be construed and governed in accordance with the laws of the State of Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste equipment in protecting the environment, the owner of this RAD product is required to refrain from disposing of this product as unsorted municipal waste at the end of its life cycle. Upon termination of the units use, customers should provide for its collection for reuse, recycling or other form of environmentally conscientious disposal.
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates potential safety hazards regarding product operation or maintenance to operator or service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while the product is energized or connected to outdoor telecommunication lines.
Protective ground: the marked lug or terminal should be connected to the building protective ground bus.
Warning
Some products may be equipped with a laser diode. In such cases, a label with the laser class and other warnings as applicable will be attached near the optical transmitter. The laser warning symbol may be also attached. Please observe the following precautions: Before turning on the equipment, make sure that the fiber optic cable is intact and is connected to the transmitter. Do not attempt to adjust the laser drive current. Do not use broken or unterminated fiber-optic cables/connectors or look straight at the laser beam. The use of optical devices with the equipment will increase eye hazard.
Use of controls, adjustments or performing procedures other than those specified herein, may result in hazardous radiation exposure. ATTENTION: The laser beam may be invisible! In some cases, the users may insert their own SFP laser transceivers into the product. Users are alerted that RAD cannot be held responsible for any damage that may result if non-compliant transceivers are used. In particular, users are warned to use only agency approved products that comply with the local laser safety regulations for Class 1 laser products. Always observe standard safety precautions during installation, operation and maintenance of this product. Only qualified and authorized service personnel should carry out adjustment, maintenance or repairs to this product. No installation, adjustment, maintenance or repairs should be performed by either the operator or the user.
Connecting AC Mains
Make sure that the electrical installation complies with local codes. Always connect the AC plug to a wall socket with a protective ground. The maximum permissible current capability of the branch distribution circuit that supplies power to the product is 16A. The circuit breaker in the building installation should have high breaking capacity and must operate at short-circuit current exceeding 35A. Always connect the power cord first to the equipment and then to the wall socket. If a power switch is provided in the equipment, set it to the OFF position. If the power cord cannot be readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or emergency switch is installed in the building installation. In cases when the power distribution system is IT type, the switch must disconnect both poles simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference to the ground. Any single pole can be externally grounded. Due to the high current capability of DC power systems, care should be taken when connecting the DC supply to avoid short-circuits and fire hazards. DC units should be installed in a restricted access area, i.e. an area where access is authorized only to qualified service and maintenance personnel. Make sure that the DC power supply is electrically isolated from any AC source and that the installation complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power to the product is 16A. The circuit breaker in the building installation should have high breaking capacity and must operate at short-circuit current exceeding 35A. Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate the circuit breaker of the panel board that services the equipment and switch it to the OFF position. When connecting the DC supply wires, first connect the ground wire to the corresponding terminal, then the positive pole and last the negative pole. Switch the circuit breaker back to the ON position. A readily accessible disconnect device that is suitably rated and approved should be incorporated in the building installation. If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Ports V.11, V.28, V.35, V.36, RS-530, X.21, 10 BaseT, 100 BaseT, Unbalanced E1, E2, E3, STM, DS-2, DS-3, S-Interface ISDN, Analog voice E&M xDSL (without feeding voltage), Balanced E1, T1, Sub E1/T1
Safety Status SELV Safety Extra Low Voltage: Ports which do not present a safety hazard. Usually up to 30 VAC or 60 VDC.
TNV-1 Telecommunication Network Voltage-1: Ports whose normal operating voltage is within the limits of SELV, on which overvoltages from telecommunications networks are possible. TNV-2 Telecommunication Network Voltage-2: Ports whose normal operating voltage exceeds the limits of SELV (usually up to 120 VDC or telephone ringing voltages), on which overvoltages from telecommunication networks are not possible. These ports are not permitted to be directly connected to external telephone and data lines. TNV-3 Telecommunication Network Voltage-3: Ports whose normal operating voltage exceeds the limits of SELV (usually up to 120 VDC or telephone ringing voltages), on which overvoltages from telecommunication networks are possible.
FXO (Foreign Exchange Office), xDSL (with feeding voltage), U-Interface ISDN
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance of a qualified safety engineer. Always make sure that the equipment is grounded before connecting telecommunication cables. Do not disconnect the ground connection before disconnecting all telecommunications cables. Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables. Extra caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both ends. The grounding and bonding of the ground connections should comply with the local codes. The telecommunication wiring in the building may be damaged or present a fire hazard in case of contact between exposed external wires and the AC power lines. In order to reduce the risk, there are restrictions on the diameter of wires in the telecom cables, between the equipment and the mating connectors.
Caution
To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line cords.
Attention
Pour rduire les risques sincendie, utiliser seulement des conducteurs de tlcommunications 26 AWG ou de section suprieure.
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In such cases, a notice will be given in the installation instructions. Do not attempt to tamper with any carrier-provided equipment or connection hardware.
Avertissement
Achtung
Franais
Avertissement
Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques potentiels de scurit pour l'oprateur ou le personnel de service, quant l'opration du produit ou sa maintenance.
Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le produit est sous tension ou connect des lignes externes de tlcommunications.
Mise la terre de protection : la cosse ou la borne marque devrait tre connecte la prise de terre de protection du btiment.
Avant la mise en marche de l'quipement, assurez-vous que le cble de fibre optique est intact et qu'il est connect au transmetteur. Ne tentez pas d'ajuster le courant de la commande laser. N'utilisez pas des cbles ou connecteurs de fibre optique casss ou sans terminaison et n'observez pas directement un rayon laser. L'usage de priphriques optiques avec l'quipement augmentera le risque pour les yeux.
L'usage de contrles, ajustages ou procdures autres que celles spcifies ici pourrait rsulter en une dangereuse exposition aux radiations. ATTENTION : Le rayon laser peut tre invisible ! Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par l'agence et conformes la rglementation locale de scurit laser pour les produits laser de classe 1. Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation, d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou l'utilisateur.
Franais
Certains produits peuvent tre quips d'une diode laser. Dans de tels cas, une tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant, sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut aussi tre joint. Avertissement Veuillez observer les prcautions suivantes :
Franais
Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par rapport la mise la terre. Tout ple doit tre mis la terre en externe. A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques d'incendie. Les units CC devraient tre installes dans une zone accs restreint, une zone o l'accs n'est autoris qu'au personnel qualifi de service et de maintenance. Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que l'installation est conforme la rglementation locale. La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant le produit est de 16A. Le coupe-circuit dans l'installation du btiment devrait avoir une capacit leve de rupture et devrait fonctionner sur courant de court-circuit dpassant 35A. Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le ple ngatif. Remettez le coupe-circuit en position ON. Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du btiment. Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC est flottante.
Declaration of Conformity
Manufacturer's Name: Manufacturer's Address: RAD Data Communications Ltd. 24 Raoul Wallenberg St. Tel Aviv 69719 Israel
Conforms to the following standard(s) or other normative document(s): EMC: EN 55022:1998 + A1:2000, A2: 2003 EN 55024: 1998 + A1:2001, A2:2003 Safety: EN 60950-1:2001 + A11:2004 Information technology equipment Radio disturbance characteristics Limits and methods of measurement. Information technology equipment Immunity characteristics Limits and methods of measurement. Information technology equipment Safety Part 1: General requirements
Supplementary Information: The product herewith complies with the requirements of the EMC Directive 2004/108/EC, the Low Voltage Directive 2006/95/EC and the R&TTE Directive 99/5/EC for wired equipment. The product was tested in a typical configuration. Tel Aviv, 14 January 2008
Haim Karshen VP Quality European Contact: RAD Data Ottobrunn-Riemerling, Germany Communications GmbH, Otto-Hahn-Str. 28-30, 85521
Glossary
Address Agent Analog ANSI AWG Balanced
A coded representation of the origin or destination of data. In SNMP, this refers to the managed system. A continuous wave or signal (such as human voice). American National Standards Institute. The American Wire Gauge System, which specifies wire width. A transmission line in which voltages on the two conductors are equal in magnitude, but opposite in polarity, with respect to ground. The range of frequencies passing through a given circuit. The greater the bandwidth, the more information can be sent through the circuit in a given amount of time. Unit of signaling speed equivalent to the number of discrete conditions or events per second. If each signal event represents only one bit condition, baud rate equals bps (bits per second). The smallest unit of information in a binary system. Represents either a one or zero (1 or 0). A process used in time division multiplexing where individual bits from different lower speed channel sources are combined (one bit from one channel at a time) into one continuous higher speed bit stream. A measure of data transmission rate in serial transmission. A device interconnecting local area networks at the OSI data link layer, filtering and forwarding frames according to media access control (MAC) addresses. A storage device. Commonly used to compensate for differences in data rates or event timing when transmitting from one device to another. Also used to remove jitter. A transmission path or channel. A bus is typically an electrical connection with one or more conductors, where all attached devices receive all transmissions at the same time. A group of bits (normally 8 bits in length). A continuous signal at a fixed frequency that is capable of being modulated with a second (information carrying) signal.
Bandwidth
Baud
Buffer
Bus
Byte Carrier
Cell
The 53-byte basic information unit within an ATM network. The user traffic is segmented into cells at the source and reassembled at the destination. An ATM cell consists of a 5-byte ATM header and a 48-byte ATM payload, which contains the user data. A path for electrical transmission between two or more points. Also called a link, line, circuit or facility. A term for the source(s) of timing signals used in synchronous transmission. Any of several techniques that reduce the number of bits required to represent information in data transmission or storage, thereby conserving bandwidth and/or memory. Device that serves as a wiring hub in a star-topology network. Sometimes refers to a device containing multiple modules of network equipment. A state in which the network is overloaded and starts to discard user data (frames, cells or packets). Information represented in digital form, including voice, text, facsimile and video. Layer 2 of the OSI model. The entity, which establishes, maintains, and releases data-link connections between elements in a network. Layer 2 is concerned with the transmission of units of information, or frames, and associated error checking. A unit used to measure relative increase or decrease in power, voltage or current, using a logarithmic scale. A measure of power in communications: the decibel in reference to one milliwatt (0 dBm = 1 milliwatt and -30 dBm = .001 milliwatt). See dB. The detection and isolation of a malfunction or mistake in a communications device, network or system. Differential delay is caused when traffic is split over different lines that may traverse shorter and longer paths. Products like the RAD IMX-2T1/E1 inverse multiplexer compensate for any differential delay (up to 64 msec) between the T1 lines, to properly reconstruct the original stream. The binary (1 or 0) output of a computer or terminal. In data communications, an alternating, non-continuous (pulsating) signal. The European standard for high speed digital transmission, operating at 34 Mbps.
Concentrator
dB (Decibel) dBm
Digital E3
Encapsulation
Encapsulating data is a technique used by layered protocols in which a low level protocol accepts a message from a higher level protocol, then places it in the data portion of the lower-level frame. The logistics of encapsulation require that packets traveling over a physical network contain a sequence of headers. A local area network (LAN) technology which has extended into the wide area networks. Ethernet operates at many speeds, including data rates of 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), 1,000 Mbps (Gigabit Ethernet), 10 Gbps, 40 Gbps, and 100 Gbps. Ethernet operation, administration and maintenance (OAM) are a set of standardized protocols for measuring and controlling network performance. There are two layers of Ethernet OAM: Service OAM (provides end-to-end connectivity fault management per customer service instance, even in multi-operator networks) and Link or Segment OAM (detailed monitoring and troubleshooting of an individual physical or emulated link). A congestion control mechanism that results in an ATM system implementing flow control. A logical grouping of information sent as a link-layer unit over a transmission medium. The terms packet, datagram, segment, and message are also used to describe logical information groupings. At the physical and data link layers of the OSI model, bits are fit into units called frames. Frames contain source and destination information, flags to designate the start and end of the frame, plus information about the integrity of the frame. All other information, such as network protocols and the actual payload of data, is encapsulated in a packet, which is encapsulated in the frame. A circuit or device permitting transmission in two directions (sending and receiving) at the same time. A voice interface, emulating a PBX extension, as it appears to the CO (Central Office) for connecting a PBX extension to a multiplexer. A voice interface, emulating the extension interface of a PBX (or subscriber interface of a CO) for connecting a regular telephone set to a multiplexer. Gateways are points of entrance and exit from a communications network. Viewed as a physical entity, a gateway is that node that translates between two otherwise incompatible networks or network segments. Gateways perform code and protocol conversion to facilitate traffic between data highways of differing architecture. In telecommunications, the process of separating and segregating channels by combing, such that the broadest channel possible can be assembled and sent across the longest practical link. The aim is to minimize de-multiplexing traffic and reshuffling it electrically.
Ethernet
Ethernet OAM
Framing
Full Duplex FXO (Foreign Exchange Office) FXS (Foreign Exchange Subscriber) Gateway
Grooming
A circuit or device capable of transmitting in two directions, but not at the same time. A shared boundary, defined by common physical interconnection characteristics, signal characteristics, and meanings of exchanged signals. Also known as an Internet address. A unique string of numbers that identifies a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers from 0 to 255, separated by periods (for example, 1.0.255.123). The deviation of a transmission signal in time or phase. It can introduce errors and loss of synchronization in high speed synchronous communications. A device that transmits an extremely narrow and coherent beam of electromagnetic energy in the visible light spectrum. Used as a light source for fiber optic transmission (generally more expensive, shorter lived, single mode only, for greater distances than LED). A type of diagnostic test in which the transmitted signal is returned to the sending device after passing through all or part of a communications link or network. A network that provides regional connectivity within a metropolitan area (such as a city). An application that receives Simple Network Management Protocol (SNMP) information from an agent. An agent and manager share a database of information, called the Management Information Base (MIB). An agent can use a message called a traps-PDU to send unsolicited information to the manager. A manager that uses the RADview MIB can query the RAD device, set parameters, sound alarms when certain conditions appear, and perform other administrative tasks. The source of timing signals (or the signals themselves) that all network stations use for synchronization. A fiber with a large core diameter; 50-200 microns compared with the wavelength of light. It therefore propagates more than one mode. With multimode fiber, light traverses multiple paths, some longer than others. This leads to dispersion, which reduces optical range. At one end of a communications link, a device that combines several lower speed transmission channels into a single high speed channel. A multiplexer at the other end reverses the process. Sometimes called a mux. See Bit Interleaving/Multiplexing. (1) An interconnected group of nodes. (2) A series of points, nodes, or stations connected by communications channels; the collection of equipment through which connections are made between data stations.
IP Address
Jitter
Laser
Loopback
Multiplexer
Network
A point of interconnection to a network. An ordered group of data and control signals transmitted through a network, as a subset of a larger message. Parameters are often called arguments, and the two words are used interchangeably. However, some computer languages such as C define argument to mean actual parameter (i.e., the value), and parameter to mean formal parameter. In RAD CLI, parameter means formal parameter, not value. The 48-byte segment of the ATM cell containing user data. Any adaptation of user data via the AAL will take place within the payload. Layer 1 of the OSI model. The layer concerned with electrical, mechanical, and handshaking procedures over the interface connecting a device to the transmission medium. The physical interface to a computer or multiplexer, for connection of terminals and modems. One or more characters in a command line interface to indicate that the computer is ready to accept typed input. A formal set of conventions governing the formatting and relative timing of message exchange between two communicating systems. Refers to the capability of a network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks. An interconnection device that connects individual LANs. Unlike bridges, which logically connect at OSI Layer 2, routers provide logical paths at OSI Layer 3. Like bridges, remote sites can be connected using routers over dedicated or switched lines to create WANs. A common mode of transmission, where the character bits are sent sequentially one at a time instead of in parallel. Describing an optical wave-guide or fiber that is designed to propagate light of only a single wavelength (typically 5-10 microns in diameter). In telecommunications, the absence of a signal. Equivalent to a binary 0. See Synchronous Transmission. Transmission in which data bits are sent at a fixed rate, with the transmitter and receiver synchronized.
Payload
Physical Layer
Router
T1
A digital transmission link with a capacity of 1.544 Mbps used in North America. Typically channelized into 24 DS0s, each capable of carrying a single voice conversation or data stream. Uses two pairs of twisted pair wires. A digital transmission link with a capacity of 45 Mbps, or 28 T1 lines. The virtual terminal protocol in the Internet suite of protocols. It lets users on one host access another host and work as terminal users of that remote host. Instead of dialing into the computer, the user connects to it over the Internet using Telnet. When issuing a Telnet session, it connects to the Telnet host and logs in. The connection enables the user to work with the remote machine as though a terminal was connected to it. The amount of information transferred through the network between two users in a given period, usually measured in the number of packets per second (pps). A portion of a serial multiplex of timeslot information dedicated to a single channel. In E1 and T1, one timeslot typically represents one 64 kbps channel. A device that is doing the Layer 2 bridging according to the VLAN tag in addition to the standard bridging parameters. A VLAN-aware device will not strip or add any VLAN header.
T3 Telnet
Throughput
Timeslot
VLAN-Aware
International Headquarters
24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel. 972-3-6458181 Fax 972-3-6498250, 6474436 E-mail market@rad.com
www.rad.com
Contents
Chapter 1. Hardware Description 1.1 Using this Guide ......................................................................................................... 1-1 Who This Guide Is For ............................................................................................. 1-1 What This Guide Covers .......................................................................................... 1-1 What You Should Already Know .............................................................................. 1-1 Safety Signs Conventions ........................................................................................ 1-1 Mouse Operation Conventions ................................................................................ 1-2 Chapter Organization .............................................................................................. 1-2 Introduction- Egate-2000 ........................................................................................... 1-3 Front Panel ............................................................................................................. 1-3 Cards Overview ....................................................................................................... 1-3 Card Population Rule .................................................................................................. 1-4 Telecom bus allocation details................................................................................. 1-4 Card slot details ...................................................................................................... 1-4 Slot allotment ......................................................................................................... 1-4 Power Supply Unit ...................................................................................................... 1-5 DC Power Supply Unit Egate-2000M-PS ................................................................ 1-5 Front Panel ........................................................................................................ 1-5 Functional Description ............................................................................................ 1-6 Design Specifications .............................................................................................. 1-6 Cross Connect Card .................................................................................................... 1-8 Traffic and Cross Connect Card Egate-2000M-Main............................................... 1-8 Front Panel ........................................................................................................ 1-8 Card Status ........................................................................................................ 1-8 Power Specifications .......................................................................................... 1-8 Visual Indicator Details ....................................................................................... 1-8 SFP Port Visual Indications .................................................................................. 1-9 Backplane Interface ............................................................................................ 1-9 Diag Interface .................................................................................................. 1-10 Functional Description ...................................................................................... 1-10 Optical Subsystems .......................................................................................... 1-10 Egate-2000M-MNG Card ........................................................................................... 1-11 Front Panel ........................................................................................................... 1-11 Power Specifications ........................................................................................ 1-11 Visual Indicator Details ..................................................................................... 1-11 Backplane Interface .......................................................................................... 1-12 Ext. Clock Interface........................................................................................... 1-12 MNG-ETH Interface ........................................................................................... 1-13 Control Interface .............................................................................................. 1-13 MNG Interfaces ................................................................................................ 1-13 External Alarms Interface.................................................................................. 1-14 Functional Description .......................................................................................... 1-15 Ethernet Switching Card ........................................................................................... 1-15 Ethernet Switching Card Egate-2000M-8GbE ...................................................... 1-15 Front Panel ...................................................................................................... 1-15 Power specifications ........................................................................................ 1-16 Visual indicator details...................................................................................... 1-16 Traffic interfaces available on the card ............................................................. 1-16 Ethernet interface (Copper Ports) ..................................................................... 1-16
1.2
1.3
1.4
1.5
1.6
1.7
Table of Contents
Ethernet interface (Optical Ports) ..................................................................... 1-17 Functional description ...................................................................................... 1-17 1.8 Fan Tray Unit ........................................................................................................... 1-18 Fan Tray Unit - FTU6 ............................................................................................. 1-18 Power specifications ........................................................................................ 1-18 Visual indicator details...................................................................................... 1-18 Functional description ...................................................................................... 1-18 1.9 Optical Interface Specification .................................................................................. 1-18 1.10 Glossary of Terms .................................................................................................... 1-19 Chapter 2. Installation and Comissioning Guide 2.1 Using this Guide ......................................................................................................... 2-1 Who This Guide Is For ............................................................................................. 2-1 What This Guide Covers .......................................................................................... 2-1 What You Should Already Know .............................................................................. 2-1 Safety Signs Conventions ........................................................................................ 2-1 Mouse Operation Conventions ................................................................................ 2-2 Chapter Organization .............................................................................................. 2-3 Understanding the Installation and Commissioning Process ........................................ 2-4 Understanding Installation Procedure ...................................................................... 2-5 Understanding Commissioning Procedure ................................................................ 2-5 Observing Safety Guidelines ....................................................................................... 2-5 Safety Standards Compliance .................................................................................. 2-5 Safety Recommendations ....................................................................................... 2-5 General Safety Guidelines ................................................................................... 2-5 Maintaining Safety With Electricity ...................................................................... 2-6 Preventing Electrostatic Discharge Damage......................................................... 2-6 General Site Requirements ................................................................................. 2-6 Site Environment ................................................................................................ 2-6 Preventive Site Configuration ............................................................................. 2-7 Configuring Equipment Racks ............................................................................. 2-7 Working with Power Supply Unit.............................................................................. 2-8 Preventing Damage to Card and Pluggable Module .................................................. 2-8 Dissipating Static Electricity .................................................................................... 2-9 Controlling Equipment Environment....................................................................... 2-10 Using Optical Fibers .............................................................................................. 2-10 Handling Optical Fibers ..................................................................................... 2-10 Splicing Optical Fibers....................................................................................... 2-11 Repairing Optical Fibers .................................................................................... 2-12 Receiving and Unpacking Network Elements ............................................................. 2-12 Verifying Shipment................................................................................................ 2-12 Handling Package.................................................................................................. 2-12 Storage ................................................................................................................ 2-12 Unpacking Network Element ................................................................................. 2-12 Installing the Network Element ................................................................................. 2-13 Installation Guidelines ........................................................................................... 2-13 Site Preparation .................................................................................................... 2-14 Installing Chassis into the Rack ............................................................................. 2-14 Connecting DC Power Supply ................................................................................. 2-15 Connecting 48 V Earthing Cable ............................................................................. 2-15 Connecting the Egate-2000M-Main Card ................................................................... 2-16 Alarm Connection ................................................................................................. 2-16 Craft Connection................................................................................................... 2-17
Egate-2000 Ver. 1.0
2.2
2.3
2.4
2.5
2.6
ii
Table of Contents
2.7
2.8
2.9
2.10
2.11
2.12
2.13
2.14
ESI Connection ...................................................................................................... 2-17 MNG-ETH Connection ............................................................................................ 2-18 MNG Connection ................................................................................................... 2-18 Connecting Optical Cards.......................................................................................... 2-19 STM-1/OC-3 Connection ........................................................................................ 2-19 STM-4/OC-12 Connection ...................................................................................... 2-20 STM-16/OC-48 Connection .................................................................................... 2-21 Connecting Ethernet Cards ....................................................................................... 2-21 Connecting 100Base-Tx/1000Base-T Interface ...................................................... 2-21 Connecting 1000BASE-X Interface ......................................................................... 2-22 Node Commissioning................................................................................................ 2-23 Logging Into an Un-commissioned Network Element ............................................. 2-23 Connecting the PC to the LAN interface of the Network Element ........................... 2-23 Downloading Software from SLAT Page ................................................................. 2-24 Setting Ethernet IP, Subnet Mask, Router ID, and Rate on the Network Element .... 2-25 Verifying the Serial Numbers of Cards and Pluggable Modules of the Network Element ............................................................................................................................ 2-26 Nominating a Synchronization Reference Clock Source for the Network Element ... 2-27 Setting Network Element Date and Time ............................................................... 2-27 Backing Up or Restoring Network Element Configuration Data ............................... 2-28 Recording Data and Test Results .............................................................................. 2-29 Site Verification Checklist ...................................................................................... 2-29 Commissioning and Testing Report........................................................................ 2-30 Receiver Sensitivity Measurements for STM-1/OC-3 ............................................... 2-31 Receiver Sensitivity Measurements for STM-4/OC-12 ............................................. 2-31 Receiver Sensitivity Measurements for STM-16/OC-48 ........................................... 2-31 Synchronization Tests ........................................................................................... 2-32 BER (BIT Error Rate) Performance .......................................................................... 2-32 Protection Switching on Fiber breaks, STM LOS ..................................................... 2-32 General Procedures .................................................................................................. 2-33 Cleaning Fiber Connectors ..................................................................................... 2-33 Cleaning Optical Connectors .................................................................................. 2-34 Inspecting Fiber Connectors .................................................................................. 2-34 Inserting and Ejecting Cards .................................................................................. 2-35 Inserting and Ejecting Fan Tray .............................................................................. 2-36 General Configuration .............................................................................................. 2-37 Switch ON Node and PC Configuration .................................................................. 2-37 Logging into the System ....................................................................................... 2-37 Configuring Optical Ports ...................................................................................... 2-38 Configuring OSPF Parameters ................................................................................ 2-38 Configuring Ethernet Ports .................................................................................... 2-38 Configuring VCG Ports ........................................................................................... 2-39 Adding New VC To VCG.......................................................................................... 2-39 Configuring Timing Manager .................................................................................. 2-40 Checking Alarms.................................................................................................... 2-40 Connector Pin Assignment........................................................................................ 2-41 Power Connector .................................................................................................. 2-41 Alarm Input Connector .......................................................................................... 2-41 Alarm Output Connector ....................................................................................... 2-42 Ext. Clock Connector ............................................................................................. 2-42 MNG Connector .................................................................................................... 2-42 MNG-ETH Connector ............................................................................................. 2-43 Cable Color Coding ................................................................................................... 2-43 Power Cable.......................................................................................................... 2-43
iii
Table of Contents
Alarm-In Cable ...................................................................................................... 2-44 Alarm-Out Cable ................................................................................................... 2-44 MNG Cable ............................................................................................................ 2-44 Ext. Clock Cable..................................................................................................... 2-45 Control Cable ........................................................................................................ 2-45 2.15 Glossary of Terms .................................................................................................... 2-46 B .......................................................................................................................... 2-46 D .......................................................................................................................... 2-46 E .......................................................................................................................... 2-46 F .......................................................................................................................... 2-46 L........................................................................................................................... 2-47 N .......................................................................................................................... 2-47 O .......................................................................................................................... 2-47 P .......................................................................................................................... 2-47 S .......................................................................................................................... 2-47 V .......................................................................................................................... 2-48 Chapter 3. Layer 2 Services 3.1 System Level Configuration ........................................................................................ 3-1 Viewing and Editing FDB Age and Mac-in-Mac Configuration .................................... 3-1 Port Configuration .................................................................................................. 3-2 Configuring or Editing Physical Port Parameters .................................................. 3-3 Configuring or Editing Switching Parameters ....................................................... 3-4 Creating Port Level Maintenance End Points (MEP) .............................................. 3-6 Verifying Performance Parameters At Port Level ................................................. 3-7 Provisioning Link Aggregation Group (LAG) Port....................................................... 3-8 Ethernet Ring Protection (ERP) ................................................................................. 3-10 Viewing Rings ....................................................................................................... 3-11 Viewing Ringlets ................................................................................................... 3-12 Services Provisioning ................................................................................................ 3-14 Link Protection Group (LPG) .................................................................................. 3-14 Service Configuration ....................................................................................... 3-15 ELINE Services ....................................................................................................... 3-15 Managing ELINE Services .................................................................................. 3-17 Working with ELAN Services .................................................................................. 3-19 Understanding CVLAN Forwarding ..................................................................... 3-19 Understanding SVLAN Forwarding ..................................................................... 3-20 Managing ELAN Services ................................................................................... 3-22 Viewing Static Unicast Entry ............................................................................. 3-23 Viewing Static Multicast Entry ........................................................................... 3-23 Viewing the Flowpoint Parameters.................................................................... 3-24 Adding Flowpoint to ELAN Service .................................................................... 3-25 Editing FlowPoint Template Parameters ............................................................ 3-27 Viewing Dynamic FDB Entries ............................................................................ 3-27 FlowPoint Template .............................................................................................. 3-28 802.1q Flowpoint Template .............................................................................. 3-28 802.1ad Flowpoint Template ............................................................................ 3-29 Provisioning FlowPoint Templates ..................................................................... 3-29 Viewing FlowPoint Templates ........................................................................... 3-30 Operation, Administration, and Maintenance (OAM) ................................................. 3-32 MEP/MIP ............................................................................................................... 3-33 Creating MEP .................................................................................................... 3-34 Creating MIP ......................................................................................................... 3-35
Egate-2000 Ver. 1.0
3.2
3.3
3.4
iv
Table of Contents
3.5
3.6
3.7
Enabling CFM ........................................................................................................ 3-36 Verifying Performance Parameters ........................................................................ 3-37 Provisioning LBM................................................................................................... 3-39 Provisioning LTM ................................................................................................... 3-40 Setting Y1731 Parameters .................................................................................... 3-41 Viewing Y1731 Counters ....................................................................................... 3-42 Viewing FDV .......................................................................................................... 3-42 Provisioning LTM ................................................................................................... 3-44 Configuring L2CP (BPDU) Tunneling ....................................................................... 3-45 Ingress Quality of Service (QoS) ............................................................................... 3-46 Understanding Ingress Quality of Service (QoS) ..................................................... 3-46 Policer.............................................................................................................. 3-47 Managing Ingress Bandwidth Profile parameters .................................................... 3-48 Viewing Provisioned Ingress Bandwidth Profiles ................................................ 3-48 Managing Ingress QoS ...................................................................................... 3-49 Provisioning IngressL2MfQos ................................................................................. 3-50 Viewing IngressL2MfQos ....................................................................................... 3-51 Managing L2 QoS class rule ................................................................................... 3-51 Security ........................................................................................................... 3-52 Managing L2 ACL .................................................................................................. 3-54 Provisioning an Ingress Bandwidth Profile ......................................................... 3-56 Editing an Ingress Bandwidth Profile ................................................................. 3-57 Deleting Ingress Bandwidth Profile ................................................................... 3-58 Egress Quality of Service (QoS) ................................................................................ 3-59 Understanding Egress QoS .................................................................................... 3-59 Managing Scheduler profile ................................................................................... 3-62 Managing WRED profiles ....................................................................................... 3-63 Managing Egress Shaper Profiles ........................................................................... 3-66 Managing Egress Queues ...................................................................................... 3-67 Establishing Data Communication Network (DCN) ..................................................... 3-69 Working with Data Communication Network (DCN) ................................................ 3-69 Management Networks ......................................................................................... 3-71 Establishing Management Bridge Using Static Route .............................................. 3-73
Chapter 4. User Interface Guide 4.1 4.2 Chapter Organization ................................................................................................. 4-1 Getting Started with the Network Element Application ............................................... 4-2 System Requirements ............................................................................................. 4-2 Accessing Web User Interface Using LAN ................................................................. 4-2 Configuring Caching Mechanism .............................................................................. 4-3 Logging to the Network Application ........................................................................ 4-3 Logging Using CHAP ........................................................................................... 4-4 Setting Up the Network Element ............................................................................. 4-5 Logging out of the Network Application .................................................................. 4-6 Network element Information Pane ............................................................................ 4-6 Working with Network Element Information Pane .................................................... 4-6 Alarm Banner ..................................................................................................... 4-7 Title Pane ........................................................................................................... 4-7 Navigation Pane ................................................................................................. 4-8 Preview Pane ..................................................................................................... 4-8 Working with System Time Menu ................................................................................ 4-9 Setting Date and Time of the Network Element ....................................................... 4-9 Setting Time Zone ................................................................................................. 4-10
v
4.3
4.4
Table of Contents
4.5
4.6
4.7 4.8
4.9
Setting Time Server for the Network Element ........................................................ 4-11 Node Slot View Page ................................................................................................ 4-13 Refreshing Node Slot View Page............................................................................ 4-13 Understanding Visual Indicators ............................................................................ 4-13 Viewing Card Parameters ...................................................................................... 4-14 Working with the Inventory Menu ............................................................................. 4-15 Understanding Node Inventory Parameters ........................................................... 4-15 Executing Forced Switch Over and Forced Sync Command...................................... 4-16 Deleting Card Configurations ................................................................................. 4-17 Deleting Pluggable Modules .................................................................................. 4-17 Working with the Shelf Sub-Menu ............................................................................ 4-18 Card Attributes ..................................................................................................... 4-18 Understanding the Protection Feature ...................................................................... 4-19 Working with Protection Menu .............................................................................. 4-20 Working with MSP/APS .......................................................................................... 4-20 Viewing MSP/APS Groups .................................................................................. 4-25 Provisioning MSP/APS Groups ........................................................................... 4-25 Editing MSP/APS Groups ................................................................................... 4-25 Executing External Commands on MSP/APS Groups ........................................... 4-26 Deleting MSP/APS Groups ................................................................................. 4-26 Working with Connection Protection ..................................................................... 4-26 Viewing SNCP/UPSR Protection ......................................................................... 4-28 Issuing External Commands .............................................................................. 4-28 Working with Timing Manager ............................................................................... 4-29 Viewing Timing Manager Protection Request ......................................................... 4-29 Executing External Command on a Synchronization Source .................................... 4-30 Adding Link Protection .......................................................................................... 4-30 Working with the Configuration Menu ...................................................................... 4-32 Managing MSP/APS Groups .................................................................................... 4-32 Viewing MSP/APS Groups .................................................................................. 4-33 Provisioning MSP/APS Group ............................................................................. 4-34 Editing MSP/APS Group ..................................................................................... 4-35 Deleting MSP/APS groups ................................................................................. 4-36 Managing Cross-connect ....................................................................................... 4-36 Filtering Cross-Connects ................................................................................... 4-40 Adding Cross-connects ..................................................................................... 4-40 Editing Cross-connects ..................................................................................... 4-40 Deleting Cross-connects ................................................................................... 4-40 Managing Overhead Tunnel ................................................................................... 4-41 Viewing Overhead Tunnels................................................................................ 4-42 Provisioning Overhead Tunnels ......................................................................... 4-42 Overhead Tunnels ............................................................................................ 4-42 Provisioning Environmental Alarm Input ................................................................. 4-42 Configuring SNMP Traps ........................................................................................ 4-43 Managing Facilities ................................................................................................ 4-44 Managing STM/OC Interfaces ............................................................................ 4-44 Provisioning STM/OC Ports ................................................................................ 4-46 Enabling Threshold Crossing Alert (TCA) Settings .............................................. 4-47 Setting TCA Profiles .......................................................................................... 4-48 Provisioning AUG/STS-N SPE ............................................................................. 4-48 Provisioning AU4/STS-3c/AU3/STS-1 ................................................................. 4-49 Editing AU4/STS-3c/AU3/STS-1 Performance Monitoring Parameters ................. 4-51 Provisioning Tributary Units (TU/VT).................................................................. 4-52 Configuring TU/VT Performance Monitoring Parameters .................................... 4-55
Egate-2000 Ver. 1.0
vi
Table of Contents
Provisioning PDH Ports ..................................................................................... 4-56 Viewing TCA Profiles for PDH Ports ................................................................... 4-58 Provisioning TCA Profile for PDH Ports .............................................................. 4-58 Deleting TCA Profile of a PDH Port .................................................................... 4-59 Managing Ethernet Interface ............................................................................ 4-59 Provisioning VCG Interface ................................................................................ 4-61 Managing VCG Interface ................................................................................... 4-63 Viewing VC/VT Group ........................................................................................ 4-63 Adding a VC/VT to VCG ..................................................................................... 4-65 Provisioning Link Capacity Adjustment Scheme (LCAS) ...................................... 4-65 Deleting VC/VT From VCG .................................................................................. 4-67 Managing and Configuring DCN ............................................................................. 4-67 Viewing the Network Interfaces ........................................................................ 4-70 Editing network interfaces................................................................................ 4-70 Provisioning/Editing Embedded Communication Channel ................................... 4-71 Provisioning Management Channel ................................................................... 4-72 Understanding OSPF......................................................................................... 4-73 Configuring OSPF Area...................................................................................... 4-73 Disabling OSPF Area ......................................................................................... 4-74 Understanding Static Route .............................................................................. 4-74 Viewing Static Routes ....................................................................................... 4-75 Adding Static Routes ........................................................................................ 4-75 Deleting a Static Route..................................................................................... 4-76 Managing Proxy ARP Neighbor .......................................................................... 4-76 Viewing Proxy ARP Neighbors Configuration ...................................................... 4-77 Adding a Proxy ARP Neighbor ........................................................................... 4-77 Deleting a Proxy ARP Neighbor ......................................................................... 4-77 Working with the Serial Port ............................................................................. 4-78 Viewing Serial Port Information ........................................................................ 4-79 Editing Serial Port ............................................................................................. 4-79 Synchronizing Network Element ............................................................................ 4-79 Viewing and Editing the Synchronization Status ................................................ 4-80 Viewing Selected Timing References ................................................................. 4-83 Editing Selected Timing References .................................................................. 4-84 Deleting Nominated Timing Reference .............................................................. 4-85 Nominating Timing Reference ........................................................................... 4-85 4.10 Managing Faults ....................................................................................................... 4-86 Understanding Alarms ........................................................................................... 4-86 Viewing Active Alarms ........................................................................................... 4-86 Viewing Suppressed Alarms ................................................................................... 4-87 Provisioning Alarm Filters ...................................................................................... 4-88 Viewing Provisioned Alarm Filters .......................................................................... 4-88 Deleting Alarm Filters ............................................................................................ 4-89 Viewing Event History ........................................................................................... 4-89 Alarm Severity ...................................................................................................... 4-90 Setting Alarm Severity........................................................................................... 4-91 4.11 Defining Profiles ...................................................................................................... 4-91 Understanding Profiles .......................................................................................... 4-91 Working with STM Port Profiles ............................................................................. 4-92 Viewing STM/OC Port Profiles............................................................................ 4-93 Editing STM Port Profiles ....................................................................................... 4-96 Working with Path Alarm Profiles .......................................................................... 4-96 Viewing Path Alarm Profiles ................................................................................... 4-97 Provisioning Path Alarm Profiles ............................................................................ 4-99
Egate-2000 Ver. 1.0 vii
Table of Contents
Deleting Path Alarm Profiles ................................................................................ 4-100 4.12 Performance Monitoring ......................................................................................... 4-100 Understanding Performance Monitoring .............................................................. 4-100 STM/OC Performance Statistics ........................................................................... 4-101 Viewing the Performance Statistics of the Regenerator Section - Multiplex Section ...................................................................................................................... 4-101 Viewing Performance Statistics of Path ........................................................... 4-104 Viewing performance statistics of tributary unit .............................................. 4-106 Viewing performance statistics of transceiver ................................................. 4-107 Viewing PDH (E1/DS1/E3/DS3) port performance statistics ............................. 4-108 Viewing Ethernet performance statistics ......................................................... 4-110 Viewing VCG performance statistics ................................................................ 4-112 Monitoring input voltage statistics ...................................................................... 4-114 Viewing Performance Statistics of Internal PDH Ports .......................................... 4-114 4.13 Security Management............................................................................................. 4-115 Access Group Privileges ....................................................................................... 4-115 4.14 Working with the Radius Server .............................................................................. 4-116 Working with RADIUS Server................................................................................ 4-116 Provisioning RADIUS Server............................................................................. 4-117 Enabling RADIUS Authentication ..................................................................... 4-118 Editing RADIUS Settings .................................................................................. 4-118 Managing User Accounts ..................................................................................... 4-118 Creating User Account .................................................................................... 4-119 Managing User Accounts ..................................................................................... 4-119 Creating User Account .................................................................................... 4-120 Disabling users ............................................................................................... 4-120 Enabling User-Lockout .................................................................................... 4-121 Provisioning Security Settings ......................................................................... 4-122 Blocking IPs .................................................................................................... 4-123 Audit Logs...................................................................................................... 4-125 HTTP Sessions .................................................................................................... 4-125 Viewing HTTP Session Information .................................................................. 4-126 Configuring HTTP Session ............................................................................... 4-126 Session history............................................................................................... 4-126 Invalid Logins History ..................................................................................... 4-127 4.15 Maintenance Operations ........................................................................................ 4-128 Viewing and Editing System Settings ................................................................... 4-128 Viewing System Changes ..................................................................................... 4-129 Viewing Load Availability ..................................................................................... 4-129 Rebooting cards ................................................................................................. 4-130 Warm Rebooting cards ........................................................................................ 4-130 Cold Rebooting cards .......................................................................................... 4-130 Restarting Network System ................................................................................. 4-131 Warm Restarting a network element .............................................................. 4-131 Cold Restarting a network element ................................................................. 4-131 Performing Loop-backs ....................................................................................... 4-131 Performing Loopback on STM ports ................................................................ 4-132 Viewing Stem Diagnostics ............................................................................... 4-133 Areas ............................................................................................................. 4-133 Database ....................................................................................................... 4-133 Interfaces ...................................................................................................... 4-134 Neighbors ...................................................................................................... 4-134 Statistics ........................................................................................................ 4-135 LSA expansions .............................................................................................. 4-136
viii Egate-2000 Ver. 1.0
Table of Contents
AS externals ................................................................................................... 4-136 Routing table ................................................................................................. 4-137 Opaque-LSAs ................................................................................................. 4-137 Viewing System Information ........................................................................... 4-138 Accessing OSPF diagnostics data .................................................................... 4-140 Backing Up Configuration .................................................................................... 4-140 Backing up of configuration data .................................................................... 4-140 Restoring Configuration ................................................................................. 4-141 Restoring Factory Default settings.................................................................. 4-142 Upgrading Software ............................................................................................ 4-143 Upgrading Software ....................................................................................... 4-144 Downloading SSL Certificate ........................................................................... 4-145 Upgrading Firmware ....................................................................................... 4-145 4.16 Glossary of Terms .................................................................................................. 4-146 A ........................................................................................................................ 4-146 C ........................................................................................................................ 4-147 D ........................................................................................................................ 4-147 E ........................................................................................................................ 4-147 F ........................................................................................................................ 4-148 I ......................................................................................................................... 4-149 L......................................................................................................................... 4-149 M ....................................................................................................................... 4-150 N ........................................................................................................................ 4-151 O ........................................................................................................................ 4-151 Q ........................................................................................................................ 4-151 R ........................................................................................................................ 4-151 S ........................................................................................................................ 4-151 T ........................................................................................................................ 4-152 V ........................................................................................................................ 4-153
ix
Table of Contents
This section describes who should read this guide, how it is organized, and what conventions are used in the document.
Danger
Situation that could cause bodily injury. Failure to observe this precaution may result in personal injury, death, or equipment damage.
1-1
Optical Safety
Staring directly into the optical connector output beam may cause irreparable damage to your eyes and even leading to loss of eye sight. Failure to observe this precaution may result in personal injury, death, or equipment damage.
Handle the equipment wearing a grounding wrist strap to discharge the static buildup. Failure to observe this precaution may result in equipment damage.
Chapter Organization
This document is organized as follows:
1-2
Installation and Operation Manual Chapter Ethernet Switching Card Fan Tray Unit Scope
This chapter describes about the Ethernet Switching Cards used in the Egate-2000 Network Element. This chapter describes about the Fan tray unit used in the Egate-2000 Network Element.
1.2
Introduction- Egate-2000
Egate-2000 is an STM-1/4/16, 4U high, multi-slot product (four service slots in addition to two aggregate card slots), supporting redundancy of cross-connect fabric, timing/synchronization subsystem, and control processor subsystem and east/west aggregate ports on separate cards. It also has redundant power supply modules enabling both power supply and power source redundancy.
Front Panel
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
5
ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
-48V/-60V
9
ACT LINK ACT
ESD
Cards Overview
Table 1-4. Cards Overview
Cards Egate-2000M-PS Egate-2000M-Main Overview Provides a stable DC power Supply One STM-16/OC-48+ 2STM-4/OC-12 Or One STM-4/OC-12+ 4STM-1/OC3 All ports are with pluggable optics (SFP). Egate-2000M-MNG Provides application interfaces namely LAN, Alarm, Craft, Modem, Orderwire and Ethernet Management Interfaces.
Introduction- Egate-2000
1-3
Provides line interface to 4 x Copper (100/1000Base-T) and 4 x Optical (1000BaseFX via SFP) Ethernet ports.
1.3
This chapter provides details regarding the card population rules to be followed while using a EGATE-2000 system.
Slot allotment
1-4
Slots 1 and 3 for Power supply unit Slot 2 for Egate-2000M-MNG module
Egate-2000 Ver. 1.0
Slot 4, 5, and 8, 9 for Egate-2000M-8GbE cards ( card occupies two slots) Slot 6 and 7 for Egate-2000M-Main cards Slot 10 for Fan tray unit
Note
Egate-2000M-8GbE is a double slot card occupying two tributary slots. This card is inserted into slots 5 and 9. The lower slot adjacent to the slot where Egate2000M-8GbE is jacked-in cannot be used. Example: If Egate-2000M-8GbE is jacked into slot-5, slot-4 gets blocked and if jacked in slot-9, slot-8 gets blocked."
1.4
When removing a card, the unit should not be replaced into the system for at least 5 seconds to ensure that unit capacitors have discharged.
Static charge can damage the equipment. While handling cards for making system interconnections, wear a ESD strap to discharge the static buildup.
Do not touch the heat sinks on the unit just after removal.
Front Panel
The front panel of this unit provides a power connector, a local safety ground connection, and the monitor ports to monitor the input and derived voltages from the card.
1-5
Egate-2000M-PS
-48V/-60V
Functional Description
The PSU consists of a single output DC-DC converter and all the cards including the base card have hot-swap controller and buck converters as required. The output voltage is set to 12 V. The cards are required to derive the suitable voltages from the stable 12 V supplied by the PSU. The PSU can uniquely be identified by the serial number. The serial number information is stored in the EEPROM located on each PSU. PSU has the following protections: Input under-voltage Input over-voltage Input reverse polarity Output over-current Output Over-Voltage Output short-circuit Over-temperature
The Power supply card supports the monitoring of the following parameters: Input voltage 12 V output Board temperature
Design Specifications
Table below gives the operational specifications of the DC Power supply unit.
1-6
Installation and Operation Manual Specification Reverse polarity protection Input current Operating temperature range Output voltage Output current Ripple Dynamic response Efficiency Fuse Under voltage protection Over voltage protection EMI/EMC/Safety compliance Range Continuous
10 A Continuous, 7 A Maximum -5 C to 55 C 12 V 0.4 V 21 A 120 mVPP 500 mV (50% to 100% load step) > 80% @ > 50% load, 48 V input 10 A fast acting fuse Shutdown: 38 V 4 V Shutdown: 72 V 4 V IEC 60950-1 EN 60950-1 UL 60950-1 In-rush Current limiting as per : ETSI EN 300 132-2 ETSI EN 300 386 v1.3.2 (2003-05) requirements as applicable (equipments operating in telecommunication centers) ETSI EN 300 019 Part 1-1 EN55022 Class A EN61000-4-4 (500V) EN61000-4-2 (4.0 kV contact discharge and 8.0kV Air Discharge)
2 ms Input: 3-pin Power D-connector Output: 16-pin PCIC series Over-temperature at 115C 10C and hysteresis of 8C min (Auto-recovery) Output Short-Circuit (Hiccup Mode) Output Over-Current (22.5A 1.25A) Output Over-Voltage (13.6 0.6V Latched Mode) Input Reverse Polarity Input Under-voltage (Auto Retry Mode)
Protections
1-7
1.5
This chapter gives an overview of the features and functional description of the traffic and cross-connect card.
Static charge can damage the equipment. While handling cards for making system interconnections, wear a ESD strap to discharge the static buildup.
Front Panel
Egate-2000M-Main
ACTIVE STATUS CONTROL SYNC 5 4 3 2 1 5 4 3 2 1 STM-1/OC-3 STM-4/OC-12 STM-4/OC-12 STM-16/OC-48
Card Status
Card Status LEDs: Two LEDs: Active and Status give the card status indication SONET/SDH Status: One LED per port: sync. Gives the ports status.
Power Specifications
Table 1-7. Name of Table
Parameter Input Voltage Power Consumption Description 12V 34W
1-8
Green
Off
Backplane Interface
Egate-2000M-Main card connects to the backplane through Euro connectors and receives the 12 V input through the backplane.
Diag Interface
The Diag interface is a USB connector located behind the name flap. This interface offers a serial connection to node using which a user can launch a terminal session to log onto the Operating System.
Note
The diagnostic interface is meant for use by authorized Networks personnel only.
Functional Description
Egate-2000M-Main card performs processing, data path processing, crossconnect switching, fabric and timing functions. Egate-2000M-Main card supports the following functional features:
Egate-2000 Ver. 1.0
Overhead and tributary processing on the optical ports. 64x64 STM-1/OC-3 cross-connect fabric. Visual indications for power and status/active. Hot-swap inrush current protection. Board temperature and voltage monitoring for extreme conditions. SONET/SDH port visual indication.
Cross Connect Card 1-9
The key functions of Egate-2000M-Main card are described below: Processor Function: EGATE-2000M-MAIN card has a processor that performs the configuration, control and processing of all the other subsystems. The processor is a micro controller which has an on-board external memory to implement the required functions. The software residing in this block controls the overall management of the system. Processor card is a daughter card that interfaces with different memory interfaces like SDRAM, Flash Memory,PCMCIA and other memory. This function is also responsible for implementing watchdog logic for the system. Cross-connect Function: EGATE-2000M-MAIN card has a non blocking 64x64 STM-1/OC-3 cross-connect capacity, grooming the traffic at higher and lower order levels. The cross-connect function provides Line to Line, Line to Tributary, Tributary to Line, Tributary to Tributary type of cross-connects. The EGATE-2000M-MAIN card supports features like sharing of bandwidth among tributary slots and providing cross-connect capacity with an equivalent bandwidth of 12.5 G. Synchronization Function: EGATE-2000M-MAIN card has a Stratum-3 compliant clock generation unit. The PLL in synchronization unit can synchronize to a variety of timing sources, selected via the user interface. Synchronization Status Messaging (SSM) is implemented in the software to propagate the clock quality information to neighbouring elements and to select the best quality clock among a set of nominated clock sources. The synchronization unit is commonly called the timing module.
Optical Subsystems
The EGATE-2000M-MAIN card supports STM-1/4/16 interfaces. The card supports two modes of operation. 1xSTM-16(OC-48)+ 2xSTM-4(OC-12) 1xSTM-16(OC-48)+ 4xSTM-1(OC-3) 1xSTM-4(OC-12)+4xSTM-1(OC-3)
Note
The different modes listed above are configurable from slat page only.
Don't stare or look directly into the optical connector output beam, as this can cause irreparable damage to your eyes and even loss of eye sight.
Warning
Optical interface on these cards have two LEDs each indicating the status of receive and transmit signals.
1.6
Egate-2000M-MNG Card
This chapter gives an overview of the features and functional description of the Egate-2000M-MNG Card.
1-10
Egate-2000M-MNG Card
Static charge can damage the equipment. While handling cards for making system interconnections, wear an ESD strap to discharge the static buildup.
Front Panel
Power Specifications
Table 1-9. Power Specifications
Field Input voltage Power consumption Description 12 V 10% 7W
Egate-2000M-MNG Card
1-11
Chapter 1 Hardware Description Card State Soft Reset: Software is restarted, devices are reinitialized with provisioning. Goes to initializing state next. Status LED Amber
Backplane Interface
Egate-2000M-MNG Card connects to the backplane through Euro connectors and receives the 12 V input through the backplane.
SONET Mode: The Ext. clock input is at 1.544 MHz and can be nominated as a reference for node synchronization. Loss-of-Signal (LOS) is detected on the clock input and this triggers a change over the next synchronization reference. The timing reference failed alarm is reported on the user interface. The Ext. data input is at 1.544 Mbps. Both SF and ESF (with or without CRC) framing can be used on the input. This input can be nominated as a reference for node synchronization. LOS, LOF and AIS are detected on this input and this triggers a change over the next synchronization reference. The Egate2000M-MNG card contains redundant timing interfaces. It can be synchronized from the following sources: Received OC-3 interfaces Clock derived from External clock Clock derived from External data
MNG-ETH Interface
The MNG-ETH Interface provides a CSMA/CD based LAN transceiver of an Ethernet link. The MNG-ETH interface is available as an RJ-45 connector. The Ethernet address is available in the non-volatile memory on the Egate-2000M-MNG Card.
1-12
Egate-2000M-MNG Card
The MNG-ETH interface physical layer is completely implemented in hardware. The physical layer device provides clock recovery, bit timing, equalization and a Jabber circuit. The Media Access Control (MAC) function is implemented in software available as part of the microcontroller. Jabber circuitry ensures that the transmitter does not hold up the interface for more than a full frame of data. The two available LEDs indicate the connector link status. The LAN interface is associated with two LEDs: Green and Amber. The following Table gives the possible LED status and their significance.
Green
On Blink on packet received
Amber
On -
Control Interface
The Local Control terminal is an additional LAN interface. The control port is provided through a RJ-45 connector. The additional LAN interface runs a DHCP server and the port has a fixed IP address192.168.1.254, which cannot be changed. The LAN port is therefore always available for debugging through the GUI or a telnet session if there is any problem with the local LAN. The active crossconnect and control card card directly drives the NMS interface LEDs. The crossconnect and control card does not do any processing on this interface.
MNG Interfaces
The MNG interface is a serial interface using which a network element can be managed remotely. The modem interface is provisioned using the PPP. A 64 kbps data channel is created between two network elements. The default baud rate setting is 9600 bauds with one stop bit and no parity. The F1 interface provides a RS-232C based serial interface for configuration using a local craft terminal. The network element can be remotely managed by provisioning user data channel. A 64 kbps data channel is created between two network elements. The MNG interface is multiplexed and is provided on the front panel for node/network management through RJ-45 connector. The NE is configured as the Data-Circuit terminating Equipment (DCE) and the local craft terminal is configured as the Data Terminating Equipment (DTE).
Egate-2000M-MNG Card
1-13
interface. The severity, alarm text and the SNMP trap ID can be edited from the network element user interface. The Alarm-In interface is through a RJ-45 connector. Alarm-Out: The alarm outputs can be used to trigger the operation of external equipment, such as a generator, fan or audible alarm. The alarm outputs are caused by alarms detected by the NE. The alarm-out are classified as minor, major and critical. The Alarm-Out interface is through a RJ-45 connector. There are three alarm visual indications on the faceplate of the Egate-2000M-MNG Card card: Critical Alarm Major Alarm Minor Alarm
The following Table gives the Power and Alarm LED status of Egate-2000M-MNG Card.
Default State. No Major alarm detected Minor alarm detected by NE Default State. No Minor alarm detected
Functional Description
The Egate-2000M-MNG Card provides static user interfaces for configuration and visual indications. Egate-2000M-MNG Card has the following functional features: 10/100BaseTLAN interface ( MNG-ETH and Control I/F) LAN interface LEDs MNG I/F Craft interface (V.24 Asynchronous, with modem control lines Phy is RS232) M1 interface (V.24 Asynchronous, with modem control lines Phy is RS232)
1-14
Egate-2000M-MNG Card
F1 user channel interface (64 kbps V.24 Synchronous, with contradirectional clock interface Phy is RS232) (multiplexed with the Modem Interface)
Alarm LEDs (Critical, Major, Minor, Deferred) User configurable alarm inputs Alarm outputs for Critical, Major, Minor, Power and orderwire call
1.7
This chapter gives an overview of the features and functional description of the Ethernet switching card.
Static charge can damage the equipment. While handling cards for making system interconnections, wear a ESD strap to discharge the static buildup.
Front Panel
Egate-2000M-8GbE
GbE GbE CONTROL
ACT
LINK
ACT
Power specifications
Table 1-13. Power Specifications
Parameter Input Voltage Range Power Consumption Specification 12 V 10% 60 W
1-15
Link Up No Activity
Activity
Two LEDs for each optical port is used for transmitter and receiver laser status. Table gives the transmit and receive LED Status of the Laser.
Link Up No Activity
Activity
You should not stare directly into the optical connector output beam, as this can cause irreparable damage to your eyes and even loss of eye sight.
Functional description
Egate-2000M-8GbE card supports the following features: Four optical Ethernet client interfaces (1000BASE-FX) Four Ethernet client interfaces (100Base-TX /1000BASE-T) STM-4/OC-12 wan capacity and 128 wan interfaces (VCGs) for ETHoPDH and mixed ETHoPDH and ETHoSDH mode STM-16/OC-48 wan capacity and 64 wan interfaces (VCGs) for ETHoSDH mode only. PtP amd MPtMP Ethernet services Packet processing Layer 2 processing
1.8
1-17
Power specifications
Table 1-17. Power Specifications
Parameter Input voltage Power consumption Value 12 V 3W
Functional description
The following are the functional features of FAN: Supports four fans Fuse on each fan power supply to isolate any failed fan from other fans Fan speed monitoring and Power supply monitoring through on board temperature sensing device Temperature monitoring on the airflow path Field replaceable Hot-swap capability Air filters are provided in the FAN to prevent the entry of dust particles
1.9
1-18
Glossary of Terms
include their usually higher data-transfer rates, smaller geographic place, and lack of a need for leased telecommunication lines.
LOS
Loss of Signal is generally an indicator on a networking device to indicate that a network signal or connection has been lost.
MAC
Media Access Control. A sublayer of the Data Link Layer specified in the sevenlayer OSI model (layer 2). It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multipoint network, typically a local area network (LAN) or metropolitan area network (MAN).
MDI
Medium Dependent Interface. An Ethernet port connection typically used on the
Network Interface Card (NIC) or Integrated NIC port on a PC. Also referred to as an uplink port.
MDIX
Medium Dependent Interface Crossover. A female RJ-45 port connection on a
computer, router, hub, or switch. Straight through cables connect pins 1 and 2 (transmit) on an MDI device to pins 1 and 2 (receive) on an MDIX device. The X refers to the fact that transmit wires on an MDI device must be connected to receive wires on an MDIX device.
MSP
Multiplex Section Protection. A port level protection supported on the STM
interfaces. MSP schemes involve reserving a dedicated protection channel with the same capacity as the work channel.
PCMCIA
Personal Computer Memory Card International Association. An international standards body that defines and promotes the PC Card (formerly known as PCMCIA card) and ExpressCard standards. Although the organizations name refers to memory cards, their standards are not limited to memory devices.
PSU
Power Supply Unit.
PSU
Network Element. A manageable logical entity uniting one or more physical
devices.
Glossary of Terms
1-19
RAI
Remote Alarm Indication; represents that the far end equipment has a problem
with the signal it is receiving from the upstream equipment.
SDH
Synchronous Digital Hierarchy. A standard technology for synchronous data
transmission on optical media that provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. In digital telephone transmission, synchronous means the bits from one call are carried within one transmission frame. Plesiochronous means almost (but not) synchronous, or a call that must be extracted from more than one transmission frame.
SDRAM
Synchronous Dynamic Random Access Memory. A type of DRAM that can run at much higher clock speeds than conventional memory.
SFP
Small Form-factor Pluggable. A compact optical transceiver used in optical
communications for both telecommunication and data communications applications. It interfaces a network device mother board (for a switch, router or similar device) to a fiber optic or unshielded twisted pair networking cable.
TU
Path Overhead. Refers to overhead accessed, generated and processed by pathterminating equipment.
VC
Virtual Concatenation. A technique that allows SONET/SDH circuits to be grouped
into arbitrarily sized bandwidth increments for more efficient transport of client protocols.
VCAT
Virtual Concatenation. An inverse multiplexing technique used to split SDH/SONET
bandwidth into logical groups, which may be transported or routed independently.
VCG
Virtual Concatenation Group. The VC channel bandwidth is divided into smaller individual containers, which are grouped together and logically represented by a VCG.
1-20
Glossary of Terms
This section describes who should read this guide, how it is organized, and what conventions are used in the document.
the local safety standards required by your company. The following symbols inserted in the document at various places represent important situations.
Danger
Situation that could cause bodily injury. Failure to observe this precaution may result in personal injury, death, or equipment damage. Situation that could result in bodily burns.
Hot Surface
Optical Safety
Staring directly into the optical connector output beam may cause irreparable damage to your eyes and even leading to loss of eye sight. Failure to observe this precaution may result in personal injury, death, or equipment damage.
Handle the equipment wearing a grounding wrist strap to discharge the static buildup. Failure to observe this precaution may result in equipment damage.
2-2
Chapter Organization
This document is organized as follows:
Node Commissioning
2-3
This appendix describes the general procedures for configuring EGATE-2000 network element. It includes switching ON the node and PC configuration, logging into the network element, configuring optical ports, OSPF, Ethernet ports, VCG ports, timing manager, and checking alarms. This appendix provides connector pin details used for installing the network element. This appendix describes the color coding scheme used for different cables.
2.2
This chapter describes procedure followed during installation and commissioning process of Egate-2000 network element. Installation and Commissioning Process Overview The flowchart below shows the installation and commissioning process.
2-4
2.3
This chapter provides important safety guidelines that you must follow for personnel safety and to operate the equipment correctly. It also describes about the site environment and instructions to be followed during site preparation and network element rack configuration. You must read and follow all the precautionary procedures before starting to operate the network element.
Safety Recommendations
This section lists the safety recommendations that need to be followed for safe operation of the network element.
Site Environment
Network element can be mounted in a rack. The location of the network element, the layout of your network element rack including wiring room are extremely important for proper system operation. network element placed closer
2-6 Observing Safety Guidelines Egate-2000 Ver. 1.0
inadequate ventilation, and inaccessible panels can cause system malfunctions and shutdowns, which results in system maintenance. While planning your site layout and network element locations, consider the precautions described in the section Preventive Site Configuration that follows to help avoid network element failures and reduce the possibility of environmentally caused shutdowns. If you are currently experiencing shutdowns or unusually high errors with your existing network element, these precautions may help you isolate the cause of failures and prevent potential problems.
Baffles helps isolating exhaust air from intake air, which also helps to draw cooling air through the chassis. The best placement of the baffles depends on the airflow patterns in the rack. Experiment with different arrangements to position the baffles effectively.
2-7
The green LED continuously lit at the faceplate on the base card indicating that the card is functioning correctly and is powered up. If the green LED on the PSU is ON, the power at the associated feeder is present and the conditions can be assumed to be normal. Some of the possible cases when the green LED on the base card is not ON are: Damaged or non functional power supply unit Damaged or non functional base card Feeder low voltage or power failure Over-current failure Blown fuse in the power supply unit due to the reverse polarity condition at the input terminals.
The circuit breaker on the power supply unit is an electronic circuit breaker that cuts off the power to the card on over-current condition. Danger of electric shock! Avoid any contact with the marked surface while the product is energized or connected to outdoor telecommunication lines.
Warning
Risk of personal injury, energy hazard: The battery feeds are capable of supplying very high current which, during an un intentional short, can cause burns. Read and understand the power procedures you are performing. Take necessary precautions and use the appropriate insulated tools when working with power.
Note
2-8
Follow installation and removal procedures for each module. Make sure to understand and perform each precautionary message in these procedures (for example, opening or closing the latches of the card simultaneously). Do not touch the solder side of the module, the pin connector, or the components. Inspect all pin connectors for damage before using them on each module. Inspect each module for damage before inserting the component into the shelf. Store uninstalled cards separately in a shielded box. Do not stack cards on or against each other. Do not force cards into their packaging material. Do not store several cards in the same container. Allow each module to reach room temperature before you insert the module into the shelf. When not in use store pluggable modules in their protective static-dissipative containers to prevent damage to the exposed connector terminals. Leave spare cards in the original shielded containers until you need the cards. To prevent damage to cards in storage, follow procedures that prevent accumulation of dirt or dust on the pin connectors and damage to the printed-circuit board or its components wrapage. This situation is typical for printed-circuit boards stored in areas where the humidity can exceed 95% and the temperature can exceed 70 C.
While transporting cards, pack each module in its original shielded container and padding, or in an electrostatically shielded bag. In case the original packing material is lost, place the module in a shielded bag and use another container with sufficient padding.
Any one of the previously mentioned grounding devices dissipate electrostatic charges to the ground quickly and safely. Use grounding devices correctly to eliminate the ESD threat you pose to the equipment. When you wear an antistatic wrist-strap or a heel grounder, you must make sure the grounding straps are in contact with a moist part of your skin. Connect the grounding cord to the grounding plug on a grounded fixture of the product you
2-9
are working on, such as the shelf ESD jack, grounded fixtures are accessible on most of the products.
Caution Heel grounders or similar worn footwear attachments work when the floor is designed to dissipate static electricity. Also check for the ESD foot wear attachment connectivity to ground using suitable ESD tester. If the properties of the floor are unknown or in doubt, use a wrist-strap and make sure it is connected to a piece of electrostatic discharge (ESD) grounding equipment before proceeding with any maintenance or installation activity.
The following guidelines provide an optimal electrostatic discharge protection: Install bays on conductive floor coverings. Provide conductive shoes, antistatic wrist-straps and heel grounders to all personnel working on the equipment. Maintain local environmental conditions so that relative humidity around equipment to be serviced is in excess of 20% (preferably higher than 40%). This lowers the threat of developing damaging electrostatic levels.
Implement an ESD training and control program that educates personnel on the hazards of ESD and simple mitigation procedures that can easily be applied.
2-10
Warning
Do not look directly into the optical connectors while the unit is operating. The laser beams are invisible. Do not attempt to adjust the laser drive current. The use of optical instruments with this product will increase eye hazard. Laser power up to 1 mW at 1300 nm and 1550 nm could be collected by an optical instrument. Use of controls or adjustment or performing procedures other than those specified herein may result in hazardous radiation exposure.
Follow the manufacturer instructions when you use an optical test set. Incorrect calibration or control settings can create hazardous levels of radiation.
Eye Injury Risk: If you have a piece of a glass in your eye, get medical assistance immediately. Warning
2-11
2.4
This chapter describes the procedures to be followed during receiving and unpacking of the Egate-2000 Network Element. These procedures must be followed when equipment is delivered to the customer as part of a supply-only contract.
Verifying Shipment
The network element and the corresponding accessories are delivered in two different cartons. Compare the package list information with the alphanumeric information provided on the shipping labels. The package list and shipping labels should contain the same information.
Handling Package
Identify the top face of the container, (identifiable by packing labels) and keep the top face uppermost at all times. The package contents are to be considered fragile at all times. Apply sufficient water-proofing if packages are to be handled in wet weather conditions.
Storage
Follow the below instructions when storing the packages: Unpack the network element only during installation. Preserve the packaging materials (after unpacking the network element) for future use. If the network element is damaged during shipment, preserve as much of the packaging as possible to allow customer service and the shipper to analyze the damage.
2-12
To unpack the system: 1. Remove the plastic shrink-wrap and open the top of the cardboard shipping container. 2. Take the equipment out of the shipping carton and remove the packing material. 3. Take the equipment out of the plastic protective bag. 4. The product shipping container contains the product configured as ordered. Static charge can damage the equipment. While unpacking and handling cards, or making network element interconnections, wear a grounding wrist strap to discharge the static buildup.
Warning
2.5
This chapter describes procedures to be followed when installing Egate-2000 network element. These instructions are limited to address the installation of the Egate-2000 network element and cards supplied. The installation of racks, electrical wiring, raceways, and other equipment are not covered in this guide. The relevant local/state/federal or international (if applicable) codes and regulations should be followed during the installation process.
Installation Guidelines
The guidelines for Egate-2000 network element installation are as follows: Consider the effect of additional electronic equipment and its generated heat on the Egate-2000 network element. Make sure the equipment rack is properly bolted to the ground. Install the first network element on the rack in the lowest possible position. Ensure that the wire size and dimension requirements are based on cable length and local engineering standards and practices.
Note
Egate-2000 network element must only be installed in a Restricted Access Location (RAL) in accordance with IEC 950. In this context, RAL are defined as locations where access can be restricted to suitably trained personnel and where unsupervised members (of the general public) are not allowed. Egate-2000 must be properly installed in a rack with brackets or in other ways properly connected to a safety ground. The Egate-2000 48 V DC must not be powered on from a source external to the RAL. All the electrical interfaces used must be limited to Safety Extra-Low Voltage (SELV). During installation, do not use the handle of the FRU to lift or align the shelf. In an unlikely event of fan not rotating while installing the FTUs, though the power supply cord is working, it is recommended to remove those specific FTUs.
2-13
Site Preparation
The installation site should meet the following criteria: Power supply requirements: -40 V DC to -60 V DC. Circuit breaker requirements: 8 A.
Note
The instructions in this chapter primarily address the installation of the Egate2000 network element and cards supplied. The installation of racks, electrical wiring, raceways, and other equipment are not covered in this guide. The relevant local/state/federal or international (if applicable) codes and regulations should be followed when assembling the same.
To install the chassis into the rack: 1. Move the Egate-2000 network element to the desired rack position. 2. Affix the Egate-2000 network element to the rack with four M6 screws and nuts. Figure below shows the installation of the chassis to the rack.
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
2-14
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
2-15
2.6
This chapter describes the Egate-2000M-Main card configuration supported in Egate-2000 network element.
Alarm Connection
The alarm terminals communicate to Egate-2000 through RJ-45 connectors on the Egate-2000M-Main card. Egate-2000 supports 7 inputs and 4 outputs. For cable color details, refer to the Alarm-In Cable and Alarm-Out Cable sections in the Appendix Cable Color Coding To connect the alarm cable: 1. Identify and label the cables. 2. Connect the cable to RJ-45 connector accordingly as indicated by the arrowheads marked against the connectors. 3. Route the alarm cable from the Alarm Out port securely along the right side of the rack and connect it to the audio/visual unit. Figure below shows the Alarm In connection of the chassis to the subrack.
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
2-16
Control Connection
Control access terminals communicate to Egtate-2000 using an RJ-45 connector on craft interface of Egate-2000M-Main card. For cable color details, refer to the Control/MNG cable in the Appendix Cable Color Coding. Follow the given procedure for connecting control cable: 1. Identify and label the cables. 2. Connect the cable to RJ-45 connector. 3. Route the control cable securely along the right side of the rack. Figure below shows the control connection of the chassis to the rack.
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
STATUS gate
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
2-17
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
MNG-ETH Connection
MNG-ETH access terminals communicate to EGATE-2000 using an RJ-45 connector on MNG-ETH interface on Egate-2000M-MNG card. For cable color details, refer to the Control Cable section in the Appendix Cable Color Coding. To connect the LAN cable: 1. Identify and label the cables. 2. Connect the cable to RJ-45 connector. 3. Route the LAN cable securely along the right side of the rack. Figure below shows the LAN connection of the chassis to the subrack.
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
MNG Connection
MNG access terminals communicate to Egate-2000 using an RJ-45 connector on MNG interface on Egate-2000M-Main card. For cable color details, refer to the Control/MNG CAble section in the Appendix Cable Color Coding.
2-18
To connect MNG cable: 1. Identify and label the cables. 2. Connect the cable to RJ-45 connector. 3. Route the MNG cable securely along the right side of the rack. Figure below shows the MNG connection of the chassis to the subrack.
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
2.7
This chapter describes the optical card configuration which includes STM-1/OC-3, STM-4/OC-12, and STM-16/OC-48 connections.
STM-1/OC-3 Connection
STM-1/OC-3 traffic is received and transmitted from the Egate-2000 network element through a LC connector. This connectivity is available on the STM-1/OC-3 interface of Egate-2000M-Main card.
Note
Egate-2000-Main base card mode 1xSTM-4/OC-12/4xSTM-1/OC-3 and STM16/OC-48 + 2xSTM-4/OC-12 can be configured from SLAT only. To configure the STM-1/OC-3 connection: 1. Identify and label the LC connector cables. 2. Connect the cable to the LC connector securely. 3. Route the cables securely along the right side of the rack. Figure below shows the STM-1/OC-3 connection of the chassis to the rack for Egate-2000Main card.
2-19
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
STM-4/OC-12 Connection
STM-4/OC-12 traffic is received and transmitted from the EGATE-2000 network element through STM-4/OC-12 interface of Egate-2000-Main card. The connectivity is made through LC connectors.
Note
Egate-2000-Main base card mode 1xSTM-4/OC-12+4xSTM-1/OC-3 or STM-16/OC48 + 2xSTM-4/OC-12 or STM-16/OC-48 + 4xSTM-1/OC-3 can be configured from SLAT only. To configure the STM-4/OC-12 connection: 1. Identify and label the LC connector cables. 2. Connect the cable to the LC connector securely. 3. Route the cables securely along the right side of the rack. Figure below shows the STM-4/OC-12 connection of the chassis to the rack for Egate2000-Main card.
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
STATUS gate
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
2-20
STM-16/OC-48 Connection
STM-16/OC-48 traffic is received and transmitted from the EGATE-2000 network element through STM-16/OC-48 interface of Egate-2000-Main card. The connectivity is made through LC connectors.
Note
Egate-2000-Main base card mode 1xSTM-4/OC-12+4xSTM-1/OC-3 or STM-16/OC48 + 2xSTM-4/OC-12 or STM-16/OC-48 + 4xSTM-1/OC-3 can be configured from SLAT only.
To configure the STM-16/OC-48 connection: 1. Identify and label the LC connector cables. 2. Connect the cable to the LC connector securely. 3. Route the cables securely along the right side of the rack. Figure below shows the STM-16/OC-48 connection of the chassis to the rack.
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
2.8
This chapter describes Egate-2000M-8GbE card connections which include 100Base-Tx/1000Base-T and 1000BASE-X interface connections.
2-21
3. Route the Ethernet cables securely along the right side of the rack. Figure below shows 100Base-Tx/1000Base-T connection of the chassis to the subrack.
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
STATUS gate
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
Egate-2000M-PS
Egate-2000M-8GbE
GbE GbE CONTROL
4
8 7 6 5 4 3 2 1
FAN
STATUS
-48V/-60V
RESET
5
LINK ACT LINK ACT
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 S /OC 3 S /OC STM-1/OC-3 STM-4/OC-12 STM-1/OC-3 STM-4/OC-12 3 3 2 2 2
S /OC S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 S /OC 1 S 6/OC 8 STM-4/OC-12 STM-16/OC-48 STM-4/OC-12 STM-16/OC-48 1 1 1
CO
CONTROL CONTROL
C 3 4 4 3 3 2 2 1 1 5 5 5 4 4 4
SYNC 5 SYNC 5 5
3 3 3
2 2 2
Egate-2000M-PS
Egate-2000M-8GbE
GbE
-48V/-60V
RESET
GbE
CONTROL
9
LINK ACT LINK ACT
ESD
2-22
2.9
Node Commissioning
Note
Change the default username and for the default user account on the network element. The default user accounts and passwords are widely known.
To Login to an un-commissioned network element: 1. Launch the Netscape 4.75/ Internet Explorer 6.0 / Mozilla 1.7.15 browser and enter the URL http://192.168.1.254:20080/ . The default IP address of the MNG-ETH interface is 192.168.1.254. 2. If the network element does not respond, check the physical connection. Otherwise, contact your next level of support. 3. If the login screen appears enter the default user id and password at the login prompt, where: Username: su Password:1234
4. The Navigation menu of the network element is displayed. Node View is the default page of the WUI. 5. If the default page of the WUI does not appear or login failed, check whether the user id and password entered are correct. The user id and the password rules are given below:
Password
Ensure that you have a PC and an Ethernet crossover cable with an RJ-45 connector. Ensure you have the network element IP address information, if the network element has already been commissioned.
Note
After powering up the network element you have to wait for approximately 5 minutes for the network element software to be up. The Status/Active LED indicates the up status of the network element. The IP address of the PC should be in the same IP subnet as that configured on the node.
Follow the procedure for connecting the PC to the MNG-ETH interface of the network element. 1. Connect the MNG-ETH port of the network element and the PC terminal with an Ethernet cable of RJ-45 connector type. 2. Configure the IP address of the PC to be in the same sub net as the network element. 3. If the above steps fail, check whether that you have used correct cables.
Note
While connecting to an un-commissioned network element, your PC IP address must be 192.168.1.xxx where xxx is between 1 and 253. While connecting to a commissioned network element, your PC IP address must reside in the same subnet as the network element. Also, configure the PC subnet mask to match the network elements subnet mask and the PC default gateway must be in the same LAN, where gateway is there.
To download software from SLAT page: 1. Connect the laptop with static IP 192.168.1.x to the node so that, it can be accessed. 2. Launch the Netscape 4.75/Internet Explorer 6.0/ Mozilla 1.7.15 browser and enter the URL http://192.168.1.254:20080 3. Restore from a previous back up configuration. 4. Initialize node parameters. 5. Please install the software to proceed. 6. Click Please install the software to proceed. 7. Select the software download options 8. Deliver release from local machine 9. Deliver release from remote machine
2-24
Node Commissioning
10. If local machine is selected, provide the path of the file where you have the file store. 11. If a remote machine is selected, provide the following: User name Password IP of remote machine FTP (optional) Directory
12. Click Submit. The new software gets downloaded to the NE. On completing the download, the system will prompt you to initialize the node parameters like Node Name, Ethernet IP address, location and Router ID. On initializing the node parameters, node will go for warm reboot and while the node is coming up the software gets initialized on the NE. Once the node is up, issue a service disruptive reboot for the FPGAs to get programmed on the NE.
Note
After restoring the new database, the network element requires a hard reboot for the new configuration to take effect. You can verify the software Version from the description field of the default WUI page. The software version is in the format x.y, where "x" and y represents major and minor release respectively.
Setting Ethernet IP, Subnet Mask, Router ID, and Rate on the Network Element
Ethernet IP Each network element has a network management system (NMS) interface which is a 10/100 Mbps network interface controller (NIC) port. Ethernet IP is the IP address with which the network element communicates with the external world. Subnet mask length The subnet mask length is an optional parameter that corresponds to the Ethernet IP address. Sub-netting is used to set the subnet mask parameters.
Note
The subnet mask for a point-to-point connection (that is, a direct Ethernet connection between the WUI host and the network element) should be set to 32.
Router ID Network element communicate in the network over the embedded communication channel (ECC), using the router ID. A network element can be configured either as a gateway element (interconnecting two networks) or just a pass-through network element. Before setting the Ethernet IP, Subnet Mask, Router ID, and rate on the Network Element: 1. Log into network element WUI using the MNG-ETH port. 2. Ensure your PC is correctly connected to the network element through the MNG-ETH interface.
Node Commissioning
2-25
3. Ensure that you have the Ethernet IP address, router ID, sub net mask and static route IP of the network element to be configured. 4. Ensure the PC is configured in the same LAN as the network element. 5. To set the Ethernet IP, Subnet Mask, Router ID, and Rate on the Network Element, Click Initialize Node Parameters. 6. Enter the network element name in the name field. 7. Enter the functional router ID of the network in the router ID field of the NE information page. Network element uses same entered ID for communication over ECC path. 8. In the Ethernet IP field the IP address must be entered. The Ethernet IP of each network element in the network must be in different networks and unique. 9. Select the SDH/SONET mode in which the network element needs to function. 10. Click Submit. A confirmation page is displayed. 11. Click Accept Valid Modifications. A network element reboot warning is displayed.
Note
The network element name can be alphabetic/numeric/alphanumeric consisting of 1-20 characters. Special characters can also be used, except space. The default router ID displayed is 192.168.1.254. The node IP is to be set as 192.168.1.xxx, where xxx must be between 1 to 253. The last octet of the router ID and Ethernet IP must not be provisioned as 0 and 255 as they are reserved addresses and therefore should not be provisioned, The default Ethernet IP displayed is 192.168.1.254 The network element reboots after the Ethernet IP, subnet mask and the router ID are entered. After the network element is up, verify whether all the changes are reflected. If the changes are not reflected correctly, contact your next level of support. The PC IP configuration must be updated to ensure reachability to the newly provisioned IP address for the network element. Software Version is displayed in the description field of the default WUI page. The software Version is in the format x.y, where "x" is the major release and "y" is the minor release.
Note
Note Note
Verifying the Serial Numbers of Cards and Pluggable Modules of the Network Element
To verify the serial numbers of the chassis and the cards present in the network element: 1. Click Inventory in the Navigation menu. 2. Click on Node inventory link. The Node inventory page is displayed. 3. View the serial numbers of all the cards in the network element in the Node Inventory page.
2-26 Node Commissioning Egate-2000 Ver. 1.0
4. Verify the serial numbers of all the cards with the shipment report. 5. Verify whether all the cards present in the chassis are listed with the correct information in the WUI Inventory application. 6. Verify whether the Power LED is turned on with green color for all the cards.
Node Commissioning
2-27
Hour Minute
7. Click Submit. Changes are applied and a confirmation message is displayed. Setting time server for a network element: Click System Time in the Navigation menu. 1. Click Set time server link. Set Time Server page is displayed 2. Enable the field NTP Client Enable. 3. Enter the IP address of the server from which the network element is to derive the date and time. 4. Select the Synchronization interval from the drop-down menu. 5. Click Submit. Changes are applied and a confirmation message is displayed.
Note
Set the timing server of stratum level to 14 or less than 10. The network element will not synchronize to the server if the stratum level is not within the specified range. NTP servers provisioned may take five minutes to update current NTP server parameter.
Note
If you have a Linux or Unix machine, enable the FTP server that comes along with it. If you are using a Windows machine, you must install FTP server such as 3Com. The FTP server for Windows is retrieved from the following location: http://support.3com.com/software/utilities_for_windows_32_bit.htm
To back up the network element configuration data, perform the following steps: 1. Click Maintenance > Configuration Management > Backup configuration/Restore configuration in the Navigation menu. Restore or Backup configuration page is displayed. 2. Enter the parameters for restoring/backing up the configuration data. 3. Click Submit. 4. Click Accept Valid Modifications. 5. A confirmation page displaying the successful completion of the restoration process appears.
2-28
Node Commissioning
Note
The network element goes for a automatic reboot after committing the database for the new configuration to take effect.
Is the Existing Rack width in line with the standard measurements details (19", 21", 23 ")? If yes, is there a Clearance for equipment with existing rack?
Can the existing room accommodate new Racks? If no, has a recommendation been done to the Customer or any alternative method suggested? Has the suggestions /recommendations recorded in the Remarks Column?
Please provide the flooring details False flooring Non False flooring
4 5
Is the AC Power Supply at the Site being evaluated? Is the DC Power Cable and the Ground Cable extended till the Rack? If no, has a suggestion / recommendation been communicated? This should be recorded in the Remarks Column
2-29
Chapter 2 Installation and Comissioning Guide SI No Site Verification Checkpoints Status (Yes/No)
Is there adequate distance between DCDB and rack for extension of Power cables If no, has a suggestion or recommendation been communicated? This has to be recorded in the Remarks Column
Is there adequate distance between Ground point and the rack? If no, has a suggestion or recommendation been communicated? Has this been recorded in the Remarks Column?
8 9
Is Rectifier available at Site and is powered on? Has Type of E1 DDF available and verified (Poyet, Krone, Wrapping, RJ45)? Is there adequate distance between Equipment and the DDF (For D62 to Open-end E1 Cable)? Is there an FDF available at the site? Is there adequate distance between the FDF and the equipment for fiber patch chords? Is there adequate distance between the DS3 DDF Panel and the Equipment?
10
11 12
<< Record the measurement here >> << Record the measurement here >>
13
2-30
2-31
Chapter 2 Installation and Comissioning Guide Parameter Laser Type L16.1 L16.2 Receiver Sensitivity (dBm) S16.1 L16.1 L16.2 Spec 3 to -2 3 to -2 -18 to 0 -27 to -7 -28 to -7
Synchronization Tests
Table 2-9. Synchronization Tests
Clock Status
2-32
15. Inspect the fiber-optic connector with an optical fiber scope to verify whether it is free of dirt and dust. 16. Cover the connector with a protective dust cover until it is ready to be used.
Caution Improper cleaning may result in high attenuation due to dirt or dust or may cause mechanical damage to the fiber end, resulting in performance degradation. While handling an optical fiber, take care not to exceed the minimum bed radius, 35 mm, Do not over tighten the cable tie wraps while dressing the cable.
Warning
DANGER: Do not look into the end of fiber-optic connectors or into faceplate connectors of installed circuit packs. The light source used in fiber-optic devices can damage your eyes
The following items are recommended for cleaning the optical connectors: 99% isopropyl or ethyl alcohol Lint-free, non abrasive optical-quality cleaning pads or lens tissue, or cotton or urethane-foam swabs. Pressurized dry-air duster. Optical fiber scope.
2-34
General Procedures
3. Inspect the end of the fiber face with the optical fiber scope. Compare with figure below to determine the condition of the fiber end face. If you need to clean or polish the end face, refer to Cleaning Fiber Connectors
Caution Static electricity: Static electricity can damage the equipment. While unpacking and handling cards, or making network element interconnections, wear a grounding wrist strap to discharge the static buildup.
General Procedures
2-35
Caution If any of the plug-in units or interface modules need to be inserted or ejected, it is imperative that the following procedures are adopted to avoid possible damages to the connectors or spring fingers.
To insert a card in a network element: 1. Identify the correct position of the chassis. 2. Identify the appropriate slot into which the card is to be inserted. 3. Slide in the card along the guide ways provided on the chassis with the ejector levers in the horizontal position to engage the ejectors to the chassis groove. 4. Operate the two ejector levers (inwards) simultaneously to engage the card to the backplane. 5. Fasten the face plate to the chassis using Philips (PH1) screwdriver.
Caution RISK OF PERFORMANCE DEGRADATION: Failure to fasten the face plate to the chassis may result in intermittent failures, because of poor connectivity.
To eject a card from the network element: 1. Identify the card that is to be ejected. 2. Remove both screws located at either end of the face plate using Philips (PH1) screwdriver. 3. Operate the two ejector levers (outwards) to disengage the card from the backplane. 4. Slide out the card with the ejector levers in horizontal position along the guide ways.
Caution RISK OF PERFORMANCE DEGRADATION: Failure to fasten the face plate to the chassis may result in intermittent failures because of poor connectivity.
To eject a fan tray from a network element: 1. Remove the two screws located at either end of the carrier plate using Philips (PH1) screwdriver. 2. Pull the carrier handle to disengage the fan tray from the backplane connector.
2-36 General Procedures Egate-2000 Ver. 1.0
3. Slide the fan assembly with carrier along the guide way till it comes out of the slot.
7. Submit changes and Accept the Modifications. The network element will go for a soft reboot if values of Ethernet IP and Router ID are changed and after 3 minutes, you can login to the system. If you are connecting another Node
Egate-2000 Ver. 1.0 General Configuration 2-37
to this Local Node, then set the Remote node with the router ID and Ethernet IP as follows: 8. Router ID: Enter the Router ID (Ex: 192.168.254.2) 9. Ethernet IP: Enter the Ethernet IP
3. Submit changes and Accept Valid Modifications. 4. Click Configuration >Facilities > STM Ports > AU4 and change Signal Label to tug_structure 5. Submit changes and Accept Valid Modifications.
2-38
General Configuration
Flow Control: Manual TX-Rx (select the flow control mode depending on the end equipment configuration). Threshold Enable for 15 min Interval: Enable or Disable Circuit Identifier: User dependent /Convenient
2. Click the intended Ethernet port. 3. Click Submit. A confirmation page is displayed. 4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. Repeat the above steps to configure the more Ethernet ports.
2. Click Submit. A confirmation page is displayed. 3. Click Accept Valid Modifications. Repeat the above steps to configure more VCG ports.
General Configuration
2-39
4. Click Submit. A confirmation page is displayed. 5. Click on Accept Valid Modifications. A "Successfully Modified" message is displayed. 6. Repeat the above steps to add more VCs.
2. Click Submit. 3. Click Nominate timing reference. Provide the second reference source and assign the second priority to it. 4. Select a value from the drop-down menu for the following: Clock Reference Clock reference Port Priority
5. Click View Nominated timing reference to verify the nominated clock. Repeat the above steps to nominate more than one clock source.
Checking Alarms
To check the alarms: 1. To view current active alarms, click Faults > Active Alarms in the navigation menu. 2. To view all the alarms suppressed on the node, click Faults > Suppressed Alarms in the navigation menu. 3. To provision new alarm filters, click Faults > Alarm Filters in the Navigation menu.
2-40
General Configuration
4. To provision the alarm history, click Faults > Event history in the Navigation menu. 5. To view and change the severity of alarms, click Faults > Alarm Severity in the navigation menu. An asterisk appears before the name of alarms for which severity has been changed.
Power Connector
Table 2-13. Power Connector
Diagram Pin 1 2 3 Signals RET GND -48 V
RJ-45
1 2 3 4 5 6 7 8 ALARMIN1 ALARMIN2 ALARMIN3 ALARMIN4 ALARMIN5 ALARMIN6 ALARMIN7 GND
2-41
RJ-45
1 2 3 4 5 6 7 8 ALARMOUT4_COM ALARMOUT4 ALARMOUT3_COM ALARMOUT3 ALARMOUT2_COM ALARMOUT2 ALARMOUT1_COM ALARMOUT1
MNG Connector
Table 2-17. MNG Connector
Diagram Pin 1 2 3 4 Description DSR CD DTR GND
2-42
MNG-ETH Connector
Table 2-18. MNG-ETH Connector
Diagram Pin 1 2 3 4 5 6 7 8 Description TX_P TX_N RX_P Unused Unused RX_N Unused Unused
Power Cable
Table 2-19. Power Cable
Pin 1 2 3 Color code Red Green Black
2-43
Alarm-In Cable
Table 2-20. Alarm-In-Cable
Pin Color code Signal Pair
RJ-45
1 2 3 6 5 4 7 8 White/Orange Orange White/Green Green White/Blue Blue White/Brown Brown ALARMIN_1 ALARMIN_2 ALARMIN_3 ALARMIN_4 ALARMIN_5 ALARMIN_6 ALARMIN_7 GND P4 P3 P2 P1
Alarm-Out Cable
Table 2-21. Alarm-Out-Cable
Pin Color code Signal Pair
RJ-45
1 2 3 4 5 6 7 8 White/Orange Orange White/Green Green White/Blue Blue White/Brown Brown ALARMOUT4_COM ALARMOUT4 ALARMOUT3_COM ALARMOUT3 ALARMOUT2_COM ALARMOUT2 ALARMOUT1_COM ALARMOUT P4 P3 P2 P1
MNG Cable
Table 2-22. MNG Cable
Pin Color Code Signal Pin
RJ-45
1 2 3 Black White Red DSR CD DTR
DB9
6 1 4
2-44
Installation and Operation Manual Pin 4 5 6 7 8 Color Code Green Brown Blue Orange Yellow Signal TD RD GND CTS RTS
Color Code
Signal
Pair
P2
P3
P4
Control Cable
Table 2-24. Control Cable
Pin Color Code Signal Pin
RJ-45
1 2 3 4 5 6 7 8 White/Orange Orange White/Green Blue White/Blue Green White/Brown Brown RXP RXN TXP Unused Unused TXN Unused Unused 3 6 1 4 5 2 7 8
2-45
D
DCN
Data Communication Network is SDH network that enables OAM communication
between individual network elements as well as inter network element communication.
DHCP
Dynamic Host Configuration Protocol. A protocol used by networked devices (clients) to obtain various parameters necessary for the clients to operate in an Internet Protocol (IP) network. By using this protocol, system administration workload greatly decreases, and devices can be added to the network with minimal or no manual configurations.
DNS
Domain Name System. A database system that translates an IP address into a
domain name.
E
ELAN
Emulated Local Area Network. An emulated LAN is a set of clients and servers connected by virtual circuits over a network.
F
FTP
File Transfer Protocol. A standard network protocol used to exchange and manipulate files over a TCP/IP based network, such as the Internet.
2-46
Glossary of Terms
L
LC Connector
Lucent Connector. An optical fiber connector terminates the end of an optical fiber, and enables quicker connection and disconnection than splicing. The connectors mechanically couple and align the cores of fibers so that light can pass. LC connectors are replacing SC connectors in corporate networking environment due to its smaller size.
LFD
Plesiochronous Digital Hierarchy (PDH). A technology used in telecommunications
networks to transport large quantities of data over digital transport equipment such as fibre optic and microwave radio systems.
N
NMS
Network Management System. An integrated platform for managing network
elements across an intelligent optical network. The NMS collects and represents data from geographically dispersed network elements on to a console in a centralized Network Operations Center (NOC).
O
OSPF
Open Shortest Path First. A dynamic routing protocol for use in Internet Protocol
(IP) networks.
P
PSU
Network Element. A manageable logical entity uniting one or more physical
devices.
S
SDH
Synchronous Digital Hierarchy. A standard technology for synchronous data
transmission on optical media that provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. In digital telephone transmission, synchronous means the bits from one call are carried within one transmission frame. Plesiochronous means almost (but not) synchronous, or a call that must be extracted from more than one transmission frame.
Egate-2000 Ver. 1.0 Glossary of Terms 2-47
SONET
Synchronous Optical Network is an American National Standards Institute (ANSI) standard for high speed communication over fiber-optic networks. SONET uses time division multiplexing to send multiple data streams simultaneously.
STM
Synchronous Transport Module. The rate of transmission of the SDH (ITU-T fiber
optic network transmission) standard. The levels are STM-1, STM-4, STM-16 and STM-64.
V
VC
Virtual Concatenation. A technique that allows SONET/SDH circuits to be grouped
into arbitrarily sized bandwidth increments for more efficient transport of client protocols.
VCG
Virtual Concatenation Group. The VC channel bandwidth is divided into smaller individual containers, which are grouped together and logically represented by a VCG.
2-48
Glossary of Terms
System Level Configuration Port Configuration Ethernet Ring Protection (ERP) Services Provisioning Operation, Administration, and Maintenance (OAM) Ingress Quality of Service (QoS) Egress Quality of Service (QoS) Establishing Data Communication Network (DCN).
3.1
One system level parameter of the L2 service configuration is the FDB (MAC table) Aging Time; this configures the aging time for E-Lan service VBIs (see ELAN services configuration later in this chapter).
3-1
Port Configuration
Port configuration is composed of physical and logical (switching and service related) parameters. Port status and statistics are also viewed through the port screen. To view port information: Click L2 Services>ServiceSwitch-(SlotNo) >Port Configuration. The View Service Switch Port page is displayed.
3-2 System Level Configuration Egate-2000 Ver. 1.0
3-3
Chapter 3 Layer 2 Services Parameter MTU Auto-Negotiation Default Value 9600 Enable Description
Displays the maximum transmission unit size for Ethernet frame in bytes. Allows you to enable or disable AutoNegotiation. When enabled, the communicating network elements exchange information about their speed and duplex capabilities and automatically configure themselves to take maximum advantage of their abilities. Displays the Autonegotiation status of the Ethernet port. Displays the speed and duplex mode of the link partner. Displays type of Ethernet port. Allows you to enter the name (Identity) of the Ethernet port.
Auto-Negotiation Status Link Partner Capabilities Medium Type LAN Circuit Identifier
Note
Performance parameters are available for these ports. Table 3-3. Edit Switching Parameters
Default Value For copper ports: 802.1 q port {dot1 q Port} For optical ports: {dot1q Port} 1
Description Describes the port type. The following is available: 802.1 q port {dot1 q Port} QinQ port {dot1 ad Port}. PVID is port VLAN ID which is user configurable and can assign any no. between 1 and 4094 of any Ethernet or VCG port on per-port basis (default is 1).
Port Vlan ID
3-4
Installation and Operation Manual Parameter Port default priority Acceptable Frame Policy Default Value 0 Accept Only Vlan Tagged Description
Priority assigned to the port. The value can range from 0 to 7. It is per-port feature that controls the reception of VLAN Tagged and non VLAN Tagged frames on that port.
Note
EoPDH card supports 128 VCGs by default and can be configured for 28 VCG support.
3-5
3-6
Installation and Operation Manual Parameter Maintenance Domain Default Value Description
Name assigned to the maintenance domain. A Maintenance domain is an Administrative Domain for the purpose of managing and administering a network. Indicates the format of the Maintenance Association (MA) name. The name given to the MA. The name can be a set of alphanumeric characters. It is an interval at which CCMs are sent by a MEP. Acceptable values include - 3.33ms, 10ms, 100ms, 1s, 10s, 1min, 10min. The identifier assigned to a local MEP. Acceptable values range from 1 - 8191. The identifier assigned to a remote MEP at the same domain level. Acceptable values range from 1 - 8191.
Character_String 3.33ms
3-7
Parameter Octets Received Frames Transmitted Octets Transmitted FCS Errors RX Frames Too Short RX
Description Count of number of bytes received Count of number of frames transmitted Count of number of bytes transmitted Count of number of received frames with incorrect FCS Count of number of received frames less then 64 bytes, with a correct FCS value. When in half-duplex mode, the actual Receive undersize frame count is determined by TUND, TXCL and TLCL - TBD Count of number of pause frames received on the interface Count of number of broadcast frames received on the interface. Count of number of broadcast frames transmitted on the interface. Count of number of multicast frames received on the interface. Count of number of multicast frames transmitted on the interface. Count of number of fragment frames transmitted on the interface. Count of number of received frames transmitted on the interface. Count of number of jabber frames transmitted on the interface. Count of number of jabber frames received on the interface. Count of number of receive frames discarded Count of number of transmit frames discarded Count of ingress frames which doesnot match any of the FP definitions. Count of frames discarded apart from the ingress definitions Count of frames discarded based on MT Count of number of 1522-9600 byte length packets
Pause Frames Received Broadcast Frames Received Broadcast Frames Transmitted Multicast Frames Received Multicast Frames Transmitted Frame Fragment TX Frame Fragment RX Frame Jabber TX Frame Jabber RX Discarded Rx packets Discarded Tx Packets Service Lookup Failure Ingress Other Discards MTU Discards Packets RX/TX > 1522 (Jumbo Frames)
For VCG Performance Counters, refer to Viewing VCG performance statistics section in the Performance Monitoring chapter.
3-8
Egate-2000 supports static LAG (no LACP). Two LAG models are supported: Protection mode: up to 2 LAG members while only one of the ports is active (Tx and Rx) a given time. The STDBY port is down and brought up upon the Active port failure. Regular mode: Up to 8 LAG members, simultaneous Rx from all members and Tx distribution across all members.
A LAG group may include (and protect) members from the same Egate-2000M8GbE card. To provision LAG port: 1. Click L2 Services > ServiceSwitch-(slot number)> LAG Configuration. 2. The View LAGPort page is displayed.
Note
Select only MemberPorts with same bandwidth for provisioning LAG Ports.
3.2
In ERP, a node in a ring is designated as Ring Protected Link (RPL) owner. The RPL owner has a RPL port and a non-RPL port. Under normal working condition, the RPL owner blocks traffic through the RPL port for the data VLANs that are protected by the ringlet. All nodes sends R-APS messages over control VLAN to all other nodes connected to them indicating their port status. RPL owner sends NR_RB (No request Root blocked) message to other nodes that its root port is blocked. NR_RB message is sent only by the RPL owner. This message indicates that link between the node adjacent to the RPL owner towards the RPL port and the RPL port is down for the protected Data VLANs, and thus avoiding the loops. Each link is monitored by its adjacent nodes. Protection switching is initiated when signal fail condition is detected on the link by the adjacent nodes. The nodes on both ends of the link on which failure occurred block the ports and report the failure by sending the R (SF) message to all the nodes in the ring. On receiving the link failure message, the RPL owner unblocks the RPL port and all the nodes flush their Forwarding Database (FDB). After the broken link is set right, the adjacent nodes of the link transmit R-APS (NR) message indicating they no longer have any request for protection. The RPL owner starts WTR timer on receiving the R-APS (NR) message. After the WTR timer expires, the RPL owner blocks the RPL node and transmits R_APS (NR_ NB) message to the nodes. Only the RPL port is blocked. All other ports are unblocked. After Flushing, the ring functions in normal working condition. The following figure illustrates the sequence of steps in ERP.
3-10
3-11
Viewing Rings
To view configured rings, click L2 Services > ServiceSwitch-(slot number)> ERP> Ring in the navigation menu. The View Ring page is displayed. The configured rings are listed on the View Ring page.
3-12
Installation and Operation Manual Field Ring Name Open Port Description
The name given to the Ring. The Ring name can be a set of alphanumeric characters. Special characters are also allowed. The Open port is of three types: East Port West Port None The default value is none.
Viewing Ringlets
A Ringlet is a part of a ring and contains the set of VLANs in the ring which needs to be protected. A VLAN in a ring can be protected by only one Ringlet. A Ringlet has a unique Ringlet Id within a ring and a unique Control VLAN ID. An ELINE is internally created with the Control VLAN ID for forwarding the ERP control packets. Packets matching the ERP destination address and the VID are identified and forwarded to the other side of the ring if the ports are not blocked. To view configured Ringlets: Click L2 Services > ServiceSwitch-(slot number)> ERP > Ringlet in the navigation menu. View Ringlet page is displayed. The configured ringlets are listed on the View Ringlet page.
3-13
3.3
Services Provisioning
Egate-2000 supports two types of services: E-Line services, E-LAN services. The following sections describe the services and related terms and concepts. Service Configuration: Basic Terms
Port Type Each pot (Ethernet or VCG) can be configured to one of two port types: .1q port: Relates to VLAN as CVID .1ad port: Relates to VLAN as SVID and allows tag stacking at port egress. ( and SVID pop at port ingress)
The port type impacts port functionality regarding QOS, OAM etc.
3-14
Services Provisioning
Installation and Operation Manual FPCR Classification Type FPCR Flow Point Template FPCR Flow Point Template Flow Point Micro Flows
The frames classified by flow points can be further classified into a micro flow based on DA, SA, Ethertype, P-bit and SVLAN. Each micro flow can be given a priority treatment that overrides the priority assigned at the flow level. For more details see Ingress Quality of Service (QoS). Point-to-point service Multipoint-to-multipoint service
ELINE Services
An ELINE service is a point-to-point service involving only two network interfaces on any constituent network element. The following figure shows an example of ELINE service involving different interfaces.
Services Provisioning
3-15
In an ELINE service, for the traffic at customer site A to reach customer site B, the traffic has to be forwarded through each of the switches (1,2,3) using flow points. At A, customer services CVID 10-20 are being directed to .1ad interface with SVID = 100. The FP2 is SVID based. The FP-2 assigns an SVID tag of 100 and forwards the packet to the switch 2. At the ingress of the Switch 2, flowpoint FP-3 and FP4 are configured to allow packets with SVID value of 100. At the ingress of switch 3, the flowpoint FP-5 is configured to allow packets with SVID=100 and FP=6 with CVID value of 10-20.
Note
The encapsulation of .1q to .1ad will push SVID towards the .1ad port and from .1ad to .1q will pop the SVID towards the .1q port.
3-16
Services Provisioning
The provisioned ELINE services are displayed. Refer to the following table for a description of the ELINE Service Parameters.
Admin State
Up
To view FlowPoint Template parameters: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELINE services are displayed. 2. From the Service Name column, click the desired service name. The Edit ELINEService page is displayed. 3. Click the desired FlowPoint Template. The FlowPoint Template parameters are displayed.
Services Provisioning
3-17
3-18
Services Provisioning
Services Provisioning
3-19
3-20
Services Provisioning
Services Provisioning
3-21
Services Provisioning
View FlowPoint Parameters Add Flowpoint to ELAN Service Edit FlowPoint Template Parameters View Dynamic FDB Entries.
Services Provisioning
3-23
Chapter 3 Layer 2 Services Parameter FlowPoint list Description The flowpoints available in the ELAN service.
Notes:
If CoS trust mode is set as false, only the following cases are supported: 1q to 1ad If there is a DSCP match, the traffic is through. If there is a DSCP mismatch, traffic is dropped.
Color Source
The source of the packet color. None: The packets are not colored. DEI: The color of the packet is indicated by the DEI field.
3-24
Services Provisioning
Installation and Operation Manual Parameter Policer DropAction Description Displays the action on the packet by the flowpoint. Drop_None: Packets are not dropped.
Drop_Red: Packets marked red as per the Ingress Color Source are dropped. All packets are colored. The DEI bit is marked as G (0), Y (1) or R (1) irrespective of drop action. But this happens only when frame transformation happens from lower to higher encapsulation. Trust IngressPriority Parameter to indicate if flowpoint should classify packets based on priority. true: The packets are classified based on priority. false: The packets are not classified based on priority. Ingress PrioritySource The source of packet priority. Trust_None: No priority source is used to classify the packets. Trust_dot1p: The 802.1p priority is used to classify the packets. Default CoS Queue Id The identifier of the default CoS queue to which the packet is assigned. CoS Queue Id is used when the priority of the incoming packet is not trusted.
Egress QoS: Treatment to frames before they leave the switch CoS Queue Profile Shaper Profile Scheduler Profile Security Ingress L2 ACL Broadcast and Multicast Storm Control Profile DLF Flood Control Profile The Ingress ACL profile is the ingress QoS, a feature that allows filtering the frames based on L2 field. The Broadcast and Multicast Storm Control Profile used in the Flowpoint. NOTE: Feature available only for ELAN service. The DLF Flood Control Profile used in the Flowpoint. NOTE: Feature available only for ELAN service. The CoS Queue profile used in the Flowpoint. The Shaper Profile used in the Flowpoint. The Scheduler Profile used in the Flowpoint.
Services Provisioning
3-25
A confirmation page is displayed. 6. Click Yes. A Successfully Created message is displayed. To verify the performance parameters at FP level in ELAN service: 1. Click L2 Services> ServiceSwitch-(slot number) > Services provisioning> ELAN Services in the navigation menu. The Add new ELAN service page is displayed. 2. Click the desired service name. The Edit ELANService page is displayed. 3. Click Running Counters against appropriate FP. The page with the performance parameter as shown in the following table is displayed.
Performance parameters are available at two levels: port level FlowPoint level
3-26
Services Provisioning
Chapter 3 Layer 2 Services Parameter Unicast MAC Address/vlanid Flow point Backbone MAC address Description
Displays the Source Address (SA) of customer unicast MAC with respective VLAN ID. Displays the flowpoint from which the Unicast MAC address/vlanid is received. The address used to statically route a packet out of a .1q and .1ad interface. Unicast values are allowed.
FlowPoint Template
Flow Point is a combination of Flow Point Template and a Physical Interface. Flow Point (FP) acts like a virtual link below interface that directs traffic from interface, conforming to FPT, to the service of which FP is a part. FP also acts as a virtual link that directs traffic from service, conforming to FPT, to the interface over which FP is configured. A maximum of 400 Flow Points are supported. The type of FPT to be used for FP creation depends on the kind of service FP is being added to and on the type of interface over which FP is created. A flowpoint is an object that interfaces between EVC and the physical port. Its function is to identify flows belonging to a particular service (EVC) out of many associated with the port. The flowpoint template (FPT) is a collection of rules (FPCR) that get assigned to a flowpoint to identify flows on the port. An FPT can have many FPCRs (implying vlan ranges) but all based on the same FPT type.
Note
CVID value can be a single value or a range of values and the multiple VLAN ranges should be separated by commas.
3-28
Services Provisioning
Note
SPVID value can be a single value or a range of values and the multiple VLAN ranges should be separated by commas.
Note
Flow point template is set based on port FPCR Classification Type. The FPCR Classification Type can be VLAN only or VLAN+Prio or VLAN+DSCP.
Services Provisioning
3-29
Note: If there is a DSCP match, the traffic is through. If there is a DSCP mismatch, traffic is dropped.
3-30
Services Provisioning
Installation and Operation Manual Parameter Color Source Description The source of the packet color. None: The packets are not colored.
DEI: The color of the packet is indicated by the DEI field. Ingress Bandwidth Profile Policer DropAction The bandwidth profile used at the Ingress. Displays the action on the packet by the flowpoint. Drop_None: Packets are not dropped. Drop_Red: Packets marked red as per the Ingress Color Source are dropped. All packets are colored. The DEI bit is marked as G (0), Y (1) or R (1) irrespective of drop action. But this happens only when frame transformation happens from lower to higher encapsulation. Trust IngressPriority Parameter to indicate if flowpoint should classify packets based on priority. true: The packets are classified based on priority. false: The packets are not classified based on priority. Ingress PrioritySource The source of packet priority. Trust_None: No priority source is used to classify the packets. Trust_dot1p: The 802.1p priority is used to classify the packets. Default CoS Queue Id The identifier of the default CoS queue to which the packet is assigned. CoS Queue Id is used when the priority of the incoming packet is not trusted.
Egress QoS - Treatment to frames before they leave the switch CoS Queue Profile Shaper Profile Scheduler Profile Security Ingress L2 ACL Broadcast and Multicast Storm Control Profile DLF Flood Control Profile The Ingress ACL profile is the ingress QoS, a feature that allows filtering the frames based on L2 field. The Broadcast and Multicast Storm Control Profile used in the Flowpoint. NOTE: Feature available only for ELAN service. The DLF Flood Control Profile used in the Flowpoint. The CoS Queue profile used in the Flowpoint. The Shaper Profile used in the Flowpoint. The Scheduler Profile used in the Flowpoint.
You can perform following actions from the Edit Flow point page: Provision IngressL2MfQos View All IngressL2MfQos
To edit a flowpoint Template: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > FlowPoint templates. View FlowPointTemplate page is displayed. 2. Click on the Flowpoint template you want to edit.
Services Provisioning
3-31
Service Configuration
Each port (ETH or VCG) can be configured to one of the two port types: .1q port: relates to VLAN as CVID .1ad port: relates to VLAN as SVID and allows tag stacking at the port egress (and SVID pop at port ingress).
In addition, the port type impacts functionality regarding QoS, OAM etc. FPCR classification type: Per port classification key configuration. Defines the type of flow point templates (classification profiles) allowed to be used on this port. For the .1q port there are three options: VLAN VLAN+P-bit VLAN+DSCP
For the .1ad port it is VLAN only. FPCR: Classification rule Flow Point Template: Classification profile that can be several FPCRs Flow Point: Virtual link identified by a flow point template and ingress port. Micro Flows: The frames classified by flow points can be further classified into a microflow based on DA, SA, Ethertype, P-bit and SVLAN. Each microflow can be
3-32
Services Provisioning
given a priority treatment that overrides the priority assigned at the flow level, for details see ingress QoS section.
Maximum number of FP templates Maximum number of FPCRs Maximum number of FPCRs per template Maximum of E-LINE/E-LAN services Maximum of flow points Maximum of flow points per E-LAN service
3.4
Operation, Administration, and Maintenance (OAM) is implemented using Connectivity Fault Management (CFM) per 802.1ag/Y.1731 and PM (performance monitoring) per Y.1731. CFM monitors Ethernet links to locate and debug any faults in the network. CFM comprises of the Continuity Check Message (CCM) protocol. As per the CCM protocol, the Maintenance End Points (MEP) issues messages to detect faults in connectivity amongst themselves. CCM also allows MEPs to discover other MEPs within a domain. In addition, Egate-2000 supports Loopback(LBM/LBR) and Link Trace (LTM/LTR). The following PM (Y.1731) functionality is supported: 2-way Delay measurements Dual ended Loss Measurements
Once enabled, DM and LM are auto triggered every 15 minutes and results are binned. In CFM, a network is divided hierarchically into several domains for administrative purpose. Each domain is identified by a Maintenance Domain level (0-7). Higher identifier indicates higher hierarchy. A maintenance point is any port in a domain. MEPs reside at the edge of a domain. At each level, the connectivity between the MEPs can be checked using the CCM.
3-33
MEP/MIP
The figures below illustrate the different cases where MEP and MIP are utilized in Egate-2000. The following figure illustrates Down MEP on a 1.ad flowpoint connected to an ELINE.
3-34
Creating MEP
To create a MEP 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed. 3. In FlowPoint Configuration table FlowPoint 1 column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click Create Mep. Provision New MEP page is displayed.
3-35
A "Successfully Created" message is displayed. Refer to the following table for a description of the CFM parameters.
7 None None
Creating MIP
To create a MIP: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELNE services are displayed. 2. In FlowPoint Configuration table Service Name column, click the flowpoint name provisioned with 1ad port. Edit ELINEService page is displayed. 3. Click Create MIP. Provision New MIP page is displayed. 4. Select or enter the parameters. 5. Click Create. A "Successfully Created" message is displayed.
3-36
Enabling CFM
To enable CFM at port level: 1. Click L2 Services > Port Configuration in the navigation menu. The View Service Switch Port is displayed. 2. From the Edit Switching Parameters column, click Edit. The Edit Ethernet Switching Params page is displayed. 3. Click Create MEP. The Provision New MEP page is displayed. 4. Configure the parameters according to the CFM Parameters table above. 5. Click Submit. The confirmation page is displayed. 6. Click Yes. A "Successfully Created" message is displayed.
Figure 3-23. Provisioning MEP Table 3-19 lists the CFM parameters and Table 3-20 lists the CFM alarms raised
against MEPs.
3-37
Chapter 3 Layer 2 Services Parameter Maintenance Domain Level Short MA Format Short MA Name CCM Interval Default Value None Character_String 3.33ms Description
The level assigned in the domain hierarchy. Acceptable values range from 0 - 7. Indicates the format of the Maintenance Association (MA) name. The name given to the MA. The name can be a set of alphanumeric characters. It is an interval at which CCMs are sent by a MEP. Acceptable values include - 3.33ms, 10ms, 100ms, 1s, 10s, 1min, 10min The identifier assigned to a local MEP. Acceptable values range from 1 - 8191 The identifier assigned to a remote MEP at the same domain level. Acceptable values range from 1 - 8191.
None None
Provisioning LBM
To provision LBM: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELANService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name. Edit <flowpoint name> page is displayed. 4. Click View Mep. 5. Click LBM. View LBM page is displayed. 6. Click Start LBM.
3-38 Operation, Administration, and Maintenance (OAM) Egate-2000 Ver. 1.0
Provisioning LTM
To provision LTM: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELANService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name. Edit <flowpoint name> page is displayed. 4. Click View Mep. 5. Click LTM. View LTM page is displayed. 6. Click Start LTM.
Egate-2000 Ver. 1.0 Operation, Administration, and Maintenance (OAM) 3-39
3-40
Viewing FDV
For setting parameters for FDV, refer to Setting Y1731 Parameters.
Egate-2000 Ver. 1.0 Operation, Administration, and Maintenance (OAM) 3-41
To view FDV: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELAN services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELANService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name. Edit <flowpoint name> page is displayed. 4. Click View Mep. 5. Click FDV. View FDV page is displayed.
3-42
Frames with 01-80-C2-00-00-0y DA will be associated with the PVID on the port for ELINE service identification and port prio for QOS treatment if tunneling is enabled for a particular MAC address Tagged frames with 01-80-C2-00-00-0y DA will be treated as data frame If the identified service is of type ELAN, the frame will be dropped.
To configure BPDU tunneling: 1. Click L2 Services > ServiceSwitch-(slot number) > Port Configuration in the navigation menu. View Service Switch Port page is displayed. 2. Click edit in Edit Switching Parameters column against a ETH port in which BDPU Tunneling is enabled. Edit ETH<chassis-slot-port> Switching Params page is displayed. 3. Click Configure BPDU Tunneling. Edit INTERFACEL2CP-<chassis-slot-port-STM> page is displayed.
3.5
This section covers L2 ACL, L2 QoS class rule, and Bandwidth Profile.
congestion or availability of bandwidth), and prioritize or throttle traffic. For example, QoS technologies can be applied to prioritize traffic for latency-sensitive applications (such as voice or video) and to control the impact of latencyinsensitive traffic (such as bulk data transfers). QoS also provides controlled jitter and improved loss characteristics. Ingress QoS in Egate-2000 determines packet color (later used by WRED for the enqueu process) and the packet priority used for P-bit remarking and priority queue.
3-44
based on both .1q and .1ad interfaces. The following parameters can be used for the Micro flows classification: CVLANID Range SPVLANID Range P-Bit Range Source MAC Address Source MAC Mask Destination MAC Address Destination MAC Mask Ethernet Type Ethernet Type value.
The following are the steps to define Ingress QoS at the flowpoint level. 1. Define bandwidth profile. 2. Set the Trust Ingress Color for the flowpoint. Trust Ingress Color can be true or false (see behavorial diagram below). 3. Apply the bandwidth profile to the flowpoint. 4. Set the policer action: Red or Drop None. 5. Set whether to trust the Ingress Priority. When the trust ingress priority is set to false, at the egress, the packets are assigned to the Default CoS Queue Id assigned to the flowpoint. When the trust ingress priority is set to true, at the egress, the packets are assigned to the queue as indicated in the priority field of the packet. This goes for FP a .1q ports for 1.ad ports Trust prioirity configuration is NA as it is always Trust. The following are the steps to define microflows and ingress QoS per microflows (L2MFQoS): 1. Define the QoS class rules to identify a micrflow (L2_QoSClassRule). 2. Define an ingress bandwidth profile. The bandwidth profile at the MF level overrides the bandwidth profile selection at the FP level in case of MF hit. The bandwidth profile instance ID if equal and non-zero, bandwidth profile of MF created first will be shared. 3. Assign an instance for the Bandwidth profile. If the same Bandwidth profile and Bandwidth profile instance is assigned to two or more MFs, the token bucket of the bandwidth profile is shared among the MFs. If Bandwidth profile instance ID is equal and non-zero, first created Bandwidth profile of microflow will be shared. 4. Assign a CoS Queue ID. The CoS Queue ID is used to assign the packets to the queues at the egress. It is also used to assign priority to S-tag. The queue assignment here overrides the default queue assignment at the FP level in case of MF hit.
3-45
Figure 3-30. Ingress Color Handling Table 3-21. Ingress QoS-priority Handling
Incoming frame type/ port type C-tagged/untagged frame/.1q port Configuration Trust Priority=False Behavior The outgoing S/C-tagged frame is per the priority from the flowpoint COS Queue ID The outgoing C-tagged frame is per the original priority The outgoing S-tagged frame has the priority copied from the Ctagged/priority field
Trust Priority=True
Outgoing S/C tagged frame has an unchanged priority Outgoing S/C tagged frame has an unchanged priority
3. In FlowPoint Configuration table FlowPoint 1 column orFlowPoint 2 column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click Provision IngressL2MfQos. 5. Select or enter the parameters. 6. Click Create. A "Successfully Created" message is displayed. To provision IngressL2MfQos through ELAN Services menu, 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. T he provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click Provision IngressL2MfQos. 5. Select or enter the parameters. 6. Click Create. A "Successfully Created" message is displayed.
3-47
Viewing IngressL2MfQos
You can view IngressL2MfQos, through ELINE Services menu or ELAN Services menu. To view IngressL2MfQos via ELINE Services menu: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELINE Services in the navigation menu. The provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed. 3. In FlowPoint Configuration table FlowPoint 1 column orFlowPoint 2 column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click View All IngressL2MfQos. To view IngressL2MfQos via ELAN Services menu: 1. Click L2 Services > ServiceSwitch-(slot number) > Service provisioning > ELAN Services in the navigation menu. The provisioned ELINE services are displayed. 2. Click a FlowPoint Template with SPVLAN Forwarding. Edit ELINEService page is displayed. 3. In FlowPoint Configuration table FlowPoint column, click the flowpoint name provisioned with 1ad port. Edit <flowpoint name> page is displayed. 4. Click View All IngressL2MfQos.
3-48
4. Click Create. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed. To delete L2 QoS class rule: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2QoSClassRule in the navigation menu. The View L2_QoSClassRule page is displayed. 2. In the delete field, select the check box for the class rule(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.
Table 3-22. L2 QoS Class Rule and Access Control Entity (ACE) Parameters
Parameter CVLANID Range SPVLANID Range PBit Range Default Value 0 0 0 Description The range of values which the CVLANID can take. Acceptable values range from 1 to 4094. The range of values which the SVLANID can take. Acceptable values range from 1 to 4094. The range of values which the priority bit can take. Acceptable values range from 0 to 7. Source MAC Address. Value ranges from 00:00:00:00:00:01 to FF:FF:FF:FF:FF:FF. Source MAC Address. Value ranges from 00:00:00:00:00:01 to FF:FF:FF:FF:FF:FF. Destination MAC Address. Value ranges from 00:00:00:00:00:01 to FF:FF:FF:FF:FF:FF. Destination MAC Address. Value ranges from 00:00:00:00:00:01 to FF:FF:FF:FF:FF:FF. The type of L2 Ethernet packets: ether_custom, ether_appletalk, ether_arp, ether_ibmsna, ether_ip4, ether_ip6, ether_ipx, ether_mplsmcast, ether_mplsucast, ether_netbios, ether_novell, ether_pppos, ether_rarp. Field is applicable only when ether_custom is selected for Ether Type. Values range from 1536 to 65535.
Source MAC Address Source MAC Mask Destination MAC Address Destination MAC Mask Ether Type
Policer
The Bandwidth profiles include the following profilers to police the incoming traffic:
Egate-2000 Ver. 1.0 Ingress Quality of Service (QoS) 3-49
Simple Two Color Marker (sTCM): Packets exceeding the CIR and CBS rate are marked Red and below CBS/CIR are marked as green Single rate Three Color Marker (srTCM): Packets exceeding the CIR and PBS rate are marked Red. Packets between PBS and CBS are marked yellow and packets below the CIR/CBS rate are marked green. Two rate Three Color Marker (trTCM): Packets exceeding PIR/PBS are marked red, packets between the CIR/CBS and PIR/PBS are marked yellow, while packets below the CIR/CBS are marked green.
Color aware profiles can only be applied if the color source is selected as DEI and trust ingress color as none. When we trust incoming color (by default color source is selected as DEI) no ingress bandwidth profile (color aware/ color unaware) can be applied. If color source and trust ingress color parameters are both selected as none, then, only color unaware profiles can be applied. If the Trust Ingress Color is set to False at the flowpoint, the DEI field in the packet is marked 0 for green and 1 for red for sTCM. In case of srTCM or trTCM profilers, the packets are marked as 0 for green and 1 for red or yellow. The marking happens only when the packet is forwarded from a .1q interface to .1ad interface.
3-50
Security
Security is implemented using the ACLs. An ACL has Access Control Entities (ACE) which define the matching criteria. Packets matching the matching criteria in an ACE get dropped by the ACL. An ACL can have any number of ACEs. A packet is dropped if the packet matches the matching criteria of any ACE. An ACL can be assigned to .1q and .1ad interfaces only. The following are the steps to assign an ACL to the flowpoint. 1. Define an ACL. 2. Assign ACEs for the ACL. 3. Assign the ACL to the flowpoint.
Managing L2 ACL
To view provisioned L2ACLs: Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. The View L2_ACL lists all the L2 ACLs configured on the network element. To provision an L2 ACL: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. Click the Provision a new L2_ACL link.
3-51
The Provision New L2_ACL page is displayed. 3. Enter a name for the L2ACL. The name can be set of alphanumeric characters. Space and special characters are also allowed. 4. Click Create. A confirmation page is displayed. 5. Click Yes. A "Successfully Created" message is displayed. To provision an L2 ACE: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. Click the L2 ACL to be edited. The L2 ACL page is displayed. 3. Click the Edit link or click the edit link in the Edit column for the L2 ACL to be updated. 4. Click the Create L2 ACE link. The Provision New L2_ACE page is displayed. 5. Enter values referring to the L2 QoS Class Rule Parameters/Access Control Entity parameters. 6. Click Create. A confirmation page is displayed. 7. Click Yes. A "Successfully Created" message is displayed. To apply ACL to FP in ELAN: 1. To apply ACL to FP, click L2 Services > ServiceSwitch-(slot number) > Services Provisioning > ELAN services in the navigation menu. The ELAN services page is displayed. 2. Click the desired Service Name. The Edit ELAN service page is displayed. 3. Click on the desired Flow point. The edit FP port page is displayed. 4. Select the desired Ingress L2 ACL. 5. Click Submit. A "Successfully Created" message is displayed. To apply ACL to FP in ELINE: 1. To apply ACL to FP Click L2 Services > ServiceSwitch-(slot number) > Services Provisioning > ELINE services in the navigation menu.
3-52 Ingress Quality of Service (QoS) Egate-2000 Ver. 1.0
The ELINE services page is displayed. 2. Click the desired Flow point. The edit FP port page is displayed. 3. Select the desired Ingress L2 ACL. 4. Click Submit. A "Successfully Created" message is displayed. While editing an L2 ACL, you can add or remove the associated ACEs, or edit the name of the L2 ACL. To edit an L2 ACL: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. Click the L2 ACL to be edited. The L2 ACL page is displayed. 3. Click the Edit link or click the Edit link in the Edit column for the L2 ACL to be updated. 4. Edit the L2ACL name. 5. Click Submit. A confirmation page is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. To delete an L2 ACL: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. In the delete field, select the check box for the L2 ACL(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed. To delete an ACE from an L2 ACL: 1. Click L2 Services > ServiceSwitch-(slot number) > Ingress QoS > L2 ACL in the navigation menu. The View L2_ACL page is displayed. 2. Click the L2 ACL to be edited. The L2 ACL page is displayed.
3-53
3. Click the Edit link or click the edit link in the Edit column for the L2 ACL to be updated. The page is displayed. 4. In the L2ACE section, click the delete link for the ACE to be deleted. A confirmation page is displayed. 5. Click Confirm Delete. A "Successfully Deleted" message is displayed.
3.6
This section covers L2 ACL, L2 QoS class rule, and Bandwidth Profile.
3-54
Scheduler Level
FP_level
3-55
Red Queue Maximum or Red Max(KBytes) Red Queue Maximum Drop (% age) or MaxDrop Probability(%age) Green Queue Minimum or Green Min(KBytes)
Green Queue Maximum or Green Max(KBytes) Green Queue Maximum Drop (% age) or MaxDrop Probability(%age) -
Queue size (in kilobytes) below minimum no frame drops, between minimum and maximum probability of frame drops based on dropage, beyond maximum all yellow packets get dropped. Minimum acceptable value is 0 KBytes. Queue size (in kilobytes) that marks the queue threshold for yellow frames beyond which all yellow packets get dropped. Acceptable values include 0 - MBytes. Maximum percentage value for Yellow packets to be dropped. Acceptable values include 1 - 100.
WRED is a queue management algorithm with congestion avoidance capabilities. Level at which the WRED profile is applied to. CoS_level: WRED profile is applied at the CoS level. This field is not configurable.
Note: Maximum limit of the WRED value should not be greater than 1MB.
3-56
CBS
3-57
Chapter 3 Layer 2 Services Parameter Queue Mgmt Type Default Value taildrop Description
Mechanism for managing queues. taildrop: The packets exceeding the maximum threshold of a queue are dropped. Green packets are dropped beyond 200Kbytes, Yellow packets are dropped beyond 144Kbytes and red packets are dropped beyond 72Kbytes. Wred: A packet is dropped based on its color and the queue length. The drop probability of a packet is set based on its position in the queue with respect to the minimum and maximum thresholds defined for the queue. Lists all the configured WRED Profiles.
WRED Profile
None
Profiles are listed only when Queue management type is chosen as WRED.
5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. To delete the Scheduler profile: 1. Click L2 Services > ServiceSwitch-(slot number) > Egress QoS > SchedulerProfile in the navigation menu. The View SchedulerProfile page is displayed. 2. In the delete field, select the check box for the profile(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.
3-59
A confirmation page is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
Note
Queues minimum should satisfy the condition " RedQueueMin <= YellowQueueMin <= GreenQueueMin"
The following table describes the WRED Profile parameters.
Red Queue Maximum or Red Max(KBytes) Red Queue Maximum Drop (% age) or MaxDrop Probability(%age) Green Queue Minimum or Green Min(KBytes)
Green Queue Maximum or Green Max(KBytes) Green Queue Maximum Drop (% age) or MaxDrop Probability(%age) -
Queue size (in kilobytes) below minimum no frame drops, between minimum and maximum probability of frame drops based on dropage, beyond maximum all yellow packets get dropped. Minimum acceptable value is 0 KBytes. Queue size (in kilobytes) that marks the queue threshold for yellow frames beyond which all yellow packets get dropped.
Maximum percentage value for Yellow packets to be dropped. Acceptable values: 1 to 100.
3-60
Installation and Operation Manual Parameter WREDProfile Level Default Value Description
WRED is a queue management algorithm with congestion avoidance capabilities. Level at which the WRED profile is applied to. CoS_level: WRED profile is applied at the CoS level. This field is not configurable.
Note: Maximum limit of the WRED value should not be greater than 1MB.
Note
Queues maximum should satisfy the condition " RedQueueMax <= YellowQueueMax <= GreenQueueMax"
To delete WRED profiles: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>WRED Profile in the navigation menu. The View WRED Profile page is displayed. 2. In the delete field, select the check box for the profile(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.
To edit an Egress shaper profile: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>Egress Shaper Profile in the navigation menu. The View EgressShaperProfile page is displayed. 2. Click the profile to be edited. The Shaper Profile page is displayed. 3. Click the Edit link or click the edit link in the Edit column for the profile to be updated. 4. Edit required values referring to the Egress Shaper Profile Parameters table. 5. Click Submit. A confirmation page is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. The following table describes the Egress Shaper Profile parameters.
CBS
To delete Egress shaper profile: 1. Click L2 Services>ServiceSwitch-(slot number)>Egress QoS>Egress Shaper Profile in the navigation menu. The View EgressShaperProfile page is displayed. 2. In the delete field, select the check box for the profile(s) to be deleted. 3. Click Delete. A confirmation page is displayed.
3-62
3-63
Chapter 3 Layer 2 Services Parameter Scheduler Mode Queue Scheduler Type Default Value Strict or Weighted Round Robin Description
The Scheduler Mode assigned at the Egress. This is not editable. The provisioned CoS Queues. The field is not editable. The scheduler type for the CoS queue. The field is not editable. Strict: Bandwidth is allocated to the queue on priority. Strict or Weighted Round Robin: Bandwidth is allocated based on weights assigned to the queues. NOTE: In Strict or Weighted Round Robin, bandwidth is allocated to the Weighted Round Robin queues only after serving the strict queues.
Scheduler Profile
Configured scheduler profiles. The scheduler profiles assign weight to the queues. Default value is Default COS Level Scheduler. Mechanism for managing queues. taildrop: The packets exceeding the maximum threshold of a queue are dropped. Green packets are dropped beyond 200Kbytes, Yellow packets are dropped beyond 144Kbytes and red packets are dropped beyond 72Kbytes. Wred: A packet is dropped based on its color and the queue length. The drop probability of a packet is set based on its position in the queue with respect to the minimum and maximum thresholds defined for the queue.
taildrop
WRED Profile
None
Lists all the configured WRED Profiles. Profiles are listed only when Queue management type is chosen as WRED.
To delete Egress Queues: 1. Click L2 Services>ServiceSwitch-(SlotNo)>Egress QoS>Egress Queues Configuration in the navigation menu. The CoS Queue EgressQoS Configuration page is displayed. 2. In the delete field, select the check box for the queue(s) to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete. A "Successfully Deleted" message is displayed.
3-64
3.7
The Data Communication Network (DCN) is established using static routes. The DCN gives you in-band communications and helps in achieving remote connectivity to all the nodes in the network through a single gateway node. The DCN scheme supports connectivity using static routes.
3-65
sL2 DCN with .1ad interfaces does not support ingress or egress of untagged frames On .1ad interface only single or outer tag is supported at egress or ingress. A SP-VLAN + C-VLAN as ip-interface is not supported. L2 DCN with .1q ports support ingress or egress of untagged frames based on the PVID configured on the .1q interfaces L2 DCN interfaces do not support OSPF Enabling L3 DCN by running either OSPF over NMS port or over optical DCC interfaces is not recommended.
Management Networks
To view Management Network: Click L2 Services > ServiceSwitch> DCN > ManagementNetwork in the navigation menu. The View ManagementNetwork page is displayed.
Figure 3-35. Provisioning Management Network Table 3-30. Management Network Parameters
Parameter Management Network Type Description Displays the type of interface. You can select QinQ port{dot1ad Port} or 802.1q port {dot1q Port}. Management CVLAN Management Bridge MAC Enter the CVLAN ID participating in the Management Network. Enter any Unicast MAC address apart from the Mac address of the system. System shows the chassis MAC address as default. Management Bridge IP Management Bridge IPMaskLength Member Ports Enter the IP address of the network element participating in Management Network. Enter the mask length of the IP address participating in Management Network. Select the checkbox for the ports participating in the Management Network.
To delete Management Network: 1. Click L2 Services > ServiceSwitch> DCN > ManagementNetwork in the navigation menu. The View ManagementNetwork page is displayed. 2. In the delete field, select the check box for the Management Network to be deleted. 3. Click Delete. A confirmation page is displayed. 4. Click Confirm Delete.
3-67
Note
ManagementNetwork
3-68
Note
Management network should be created prior to creating management bridge using static routes.
To delete a MgmtBridgeStaticRoute: 1. Click L2 Services > ServiceSwitch-(slot number) > DCN > ManagementBridge StaticRoute in the navigation menu. 2. Select the MgmtBridgeStaticRoute that you want to delete in Delete column. 3. Click Delete. A Deleted successfully message is displayed.
3-69
3-70
Network element Information Pane Working with System Time Menu Node Slot View Page
Defining Profiles
Performance Monitoring
Chapter Organization
4-1
This chapter describes about users and their privileges to access the network element. The network element provides four different user access groups (ADMIN, OPERATOR, OPERATOR2 and USER). The chapter describes the maintenance operations available on the network element.
Maintenance Operations
4.2
This section introduces the Network Element Application Interface. The Network Element user interface enables you to provision and monitor the node parameters. It also provides sequential procedure method to access, create, edit and delete the node details.
System Requirements
Before running the application, make sure your system satisfies the following configuration requirements.
256 MB RAM or greater Mozilla 1.6 or 1.7 on Red Hat Linux and HP-UX Firefox 1.0 on Red Hat Linux 7.O and later Internet Explorer 7.0 and later on Windows
Caution During multiple administrative and diagnostic logins, ensure that actions performed do not affect the work of other users. The commands are implemented on first-come-first-serve basis.
4-2 Getting Started with the Network Element Application Egate-2000 Ver. 1.0
The URL http://192.168.1.254 has the default factory setting. After the system is commissioned, the network element is assigned the element specific URL. If you are unable to access the URL, ensure that Ethernet connectivity to the network element is proper Type of cable used is same (straight/cross) Ethernet interface on the PC/terminal is provisioned Correct URL entered to access the network element and There is no malfunction of the network element software
Note
To access the Web User Interface of the network element using LAN, connect the Ethernet interface of the craft PC/terminal to the MNG-ETH port of Egate-2000MMNG Card.
An Ethernet cross cable is used for direct connectivity between the Ethernet interface of the PC and the NMS port on the network element. An Ethernet straight cable connects the network element and the PC terminal through an Ethernet hub or switch.
Note
Ensure that you are using Netscape Navigator version 4.75 or higher or Internet Explorer version 5.0 or higher for setting up the network element software.
4-3
Note
4-4
Default Value
-
Description
Displays the identification label of the network element name. 0 - 20 character string. This field supports all alphanumeric, numbers, alphabets, underscore, and hyphen characters. Displays the configuration of the node. Displays the product code of the node. Displays the data mapping mode of the node. Allows the user to enter the IP address of the network element for in-band communication. The Router ID is unique in a network and is used by the Network Management System (NMS) to identify and enroll the network element. The value can be from 0.0.0.0 - 254.254.254.254. Allows the user to the IP address and the subnet mask for the network element for LAN port communication. The value can be from 0.0.0.0 254.254.254.254 The mask can take a value of 8, 16, or 24. Displays the MAC address of the network element.
192.168.1.254
Ethernet IP
192.168.1.254/24
MAC Address
4-5
Parameter
Contact
Default Value
-
Description
Allows the user to enter the contact details and contact number of the person maintaining the network element. The character string is 0 - 255. This field supports all alphanumeric and special characters. Allows the user to enter the location or site information where the network element is physically installed. The character string is 0 - 255. This field supports all alphanumeric and special characters. Displays the version of the software installed on the network element. Displays the mode of operation of the node.
Location
4.3
The NE information pane is the first screen that appears when you log into the network element application. The pane provides you with basic configuration information of a network element such as the node name, Ethernet IP, software version, location of the node and the name of an authorized user maintaining the node.
4-6
You can expand Navigation menu to access the nested submenus. On clicking an option, the details appear in the preview pane. When you delete, modify, or provision any feature; the system prompts for a confirmation and the changes made are applicable only after you click on Confirm button. During confirmation, the Cancel button is selected by default to avoid inadvertent submission of changes, as some web browsers automatically submit the form when Enter key is pressed on the keyboard. On confirming a change, system prompts for initiating a reboot and traffic disruption. The main screen is divided into four parts namely: Alarm Banner Title Pane Navigation Pane Preview Pane
Alarm Banner
The Alarm Banner displays the active alarms on the network element along with their severity levels. The Alarm Banner displays a check box, which provides an option to enable/disable auto refresh. The auto-refresh is enabled by default. Select the check box if you want to disable Auto-refresh option. The Alarm area also displays the last refresh time of the network element application.
Title Pane
The Title Pane is located at the top frame in the application window and includes the following:
Egate-2000 Ver. 1.0
NMS port IP Address of the network element Network element name Uptime (the time duration for which the node has been up) Log out link
Network element Information Pane 4-7
Navigation Pane
The Navigation Pane displays a nested menu items for accessing the various network element functionalities, where you can access and review the card details.
Preview Pane
The Preview Pane displays the details of the menu items that are nested in the Navigation menu and list the parameters required to configure the network element as desired. Using Preview Pane you can: View the card details Modify the card details Delete the card details
4-8
4.4
This chapter describes the System Time menu in the user interface.
4-9
Default Value
IST
Description
The time zone of the area in which the network element is placed. Acceptable values: any relevant time zone.
Offset Hours
-5
The hours by which the local time is offset from GMT. Acceptable values: -12 to 11.
4-10
Parameter
Offset Minutes
Default Value
30
Description
The minutes by which the local time is offset from GMT. Acceptable values: 0 to 59.
Daylight Saving
Disable
Parameter to configure Daylight saving. Enable: Daylight saving can be configured in the network element. Disable: Daylight saving cannot be configured in the network element.
DST String
The instance when DST starts. Month: January to December Week: 1st week - 4th week, Last week Day: Sunday to Saturday Hour: 0 - 23 Min: 0-59
The instance when DST stops. Month: January to December Week: 1st week - 4th week, Last week Day: Sunday to Saturday Hour: 0 - 23 Min: 0-59
4-11
Note
In case the network elements in a network are synchronized to more than one NTP server, ensure that the NTP servers are synchronized to a common clock. Non-synchronous NTP servers may result in frequent reset of internal clock in the network elements, and it can be frequent oscillations of internal clock. Up to five NTP servers can be nominated on the network element. Timing server nominated must be of stratum level of 14 or less than 14. The network element will not synchronize to the server if the stratum level is out of range.
Note Note
4-12
4.5
This chapter describes the Node Slot View page options and provides the graphical representation of how the cards are allotted to the slots of the chassis.
4-13
Chapter 4 User Interface Guide This LED Alarm LED With this Color Red Green Amber Active LED Red Green Amber
Installation and Operation Manual Represents Major/Critical alarms present on the network element Normal working Minor alarms present on the network element Card failure Normal working Power cycle mismatch
4-14
Installation and Operation Manual This Parameter Serial Number Does This Displays the unique serial number of a specific module
Chapter 4 User Interface Guide Applies To Base Card Chassis Fan Line Cards PSU Base Card Line Cards Base Cards Base Card Line Cards
Software Version
Displays the version of the software installed in the node Displays the temperature of the network element Displays the MAC address of the network element
Note
The slot view shows all the cards physically present in the network element. The view of the cards may or may not match with the physical orientation of the cards. Interfaces on Aggregate cards, Tributary cards and Ethernet cards can be provisioned by clicking the Ports link provided on the respective pages.
Note
4.6
This chapter covers the functions of Inventory menu. The Inventory menu in the Web user interface provides the inventory of the modules, cards, and SFPs in the network element. You can view the details of physical presence, operation status, product code, and serial number of the elements in the Inventory.
The following table describes various parameters associated with the Node Inventory.
Note
The Node inventory does not refresh automatically. You need to manually refresh the page or the pane to view any changes made to the node inventory.
4-16
The name of the SFP. The STM-N port of the SFP in the network element. The operational status of the SFP. The physical presence of the SFP in the network element.
Present: The SFP is present in the network element. Not Present: The SFP is not present in the network element.
The laser type. Also specifies the capacity and range of the laser used in the particular interface. The product equipment code of the SFP.
4-17
Note
Lasers are specific to the interfaces. For example, a STM-N laser can be inserted only into an STM-N interface. The ranges that a Laser can have are Long Reach, Short Reach and Intermediate Reach.
To delete the configuration of pluggable modules from the network element: 1. Click Inventory > Node Inventory in the Navigation menu. 2. In the SFP section, click the Delete button in the Name column for the SFP to be deleted. 3. Click Confirm Delete. The Delete button enables you to delete the SFP. You do not require to physically remove the SFP before deleting. The SFP will auto provision with the slotted SFP values. The Node inventory page displays modules pluggable status along with the chassis information.
4.7
The Shelf submenu lists all the cards present in the network element. Each individual card link, when clicked, displays the physical parameters of the card.
Card Attributes
The following table gives general information about the physical attributes of the cards present in the network element:
4-18
Installation and Operation Manual Parameter Equipment Attributes Present indicates that the card is present in the node. Not Present indicates that the card is not present in the node.
Chapter 4 User Interface Guide Applicable To Chassis Line cards Aggregate Card Cross connect card FAN PSU Chassis Line cards Aggregate Card Cross connect card FAN PSU Chassis Line cards Aggregate Card Cross connect card FAN PSU
Product Code
Serial Number
The version of the software installed in the node. The temperature of the network element. The MAC address of the network element Chassis Line cards Chassis
MAC Address
Note
Interfaces on Aggregate cards, Tributary cards and Ethernet cards can be provisioned by clicking the Ports link provided on the respective pages.
Card
4.8
This chapter describes the protection feature for a network element. The linear protection switching mechanism is coordinated by the K1 and K2 bytes in the Line Overhead. Protection switching comes into effect in case of: Signal failure Signal degradation User initiated request
4-19
The MSP/APS configuration table lists the maximum number of connections supported in the MSP/APS configuration.
4-20
84 63 3 1
The following figure shows the MSP/APS protection scheme in 1WAY and 2WAY configuration.
Note
The local and remote network element must be provisioned with the same protection configuration. Configure the MSP/APS group before creating the desired cross-connects on the working port.
The MSP/APS configuration is applicable to STM-1/4 and OC-3/12 ports. The number of MSP/APS provisioned depends on the availability of optical ports. One MSP/APS protection group can be provisioned for every two optical ports in an network element. The work to protect switching between the A018 cards is more than 1000ms in case the card is jacked out. To minimize the traffic downtime to
Note
4-21
around 50 ms, remove the fibers from the ports of the A018 cards and then jack out the card. Also the cards should be jacked in with the fibers removed. The fibers should be inserted one by one, only after card comes up fully and the status and active LEDs are green. The MSP/APS Parameters table given below describes the MSP/APS parameters.
Default Value
-
Description
The name of the MSP/APS group, when you click MSP/APS, the Protection provisioning page is displayed. The channel configured to carry the traffic under normal working conditions. 'N' indicates the slot number. The channel configured to carry the traffic under protected (failure of work channel) conditions. 'N' indicates the slot number. The protection Mode is used as. 1+1, where the traffic is carried in both the work and the protect channel. The signal best received among the work and protect channel is considered by the receiver. The revertive mode of the protection. Revertive: This mode enables automatic switching to work channel from protect channel, once the fault on work channel is fixed. Non-Revertive: In this mode, traffic has to be manually switched from protect to work channel. Until traffic is manually switched back to work channel, traffic is carried on protect channel.
Working port
STM1-1-N-1/OC3-1-N-1
Protection port
STM1-1-N-2/OC3-1-N-2
Protection mode
1+1
Non-Revertive
1 WAY
Parameter to indicate if the protection is either in transmitting/receiving direction only or in both transmitting and receiving direction. 1WAY: Protection is in only one direction, either transmitting or receiving. 2WAY: Protection is in both transmitting and receiving directions.
4-22
Parameter
WTRTime (minutes)
Default Value
5
Description
Time interval (in minutes) where the traffic must switch back to work channel on rectification of work channel, when admin reversion mode is set to revertive. The acceptable values range between 1 to 12 minutes. The protection architecture used on the network element is 1+1. The protection switching mode on the network element are between 1 WAY 2 WAY The reversion mode configured on the network element (Revertive/NonRevertive). The protection architecture used on the remote network element(1+1) The protection switching mode on the remote network element (1 WAY/2 WAY). Any external request is on the remote network element. Any external request is on the network element. External command issued on the MSP/APS protection. Parameter to enable or disable route diversity. Enable: Allows you to have two DCC links. You can also provision both on the work and protect ports. The ports act independently. Disable: When disabled, you are not allowed to delete the MSP/APS since the ports are not independent.
Operational Protection Architecture Operational Protection Switching Mode Operational Reversion Mode
Non-Revertive
Remote Protection Architecture Remote Protection Switching Mode Remote Request Current Standing Request External Command Route Diversity
Current status
Work
The active channel in which traffic is being currently carried. Work: The work channel carries the traffic. Protect: The protect channel carries the traffic if work channel is not functioning.
4-23
Parameter
Protection request
Default Value
Clear
Description
Protection request issued on the network element. None: Indicates no request for protection has been made Lockout Protection: Indicates MSP protection request is locked out and protection switching cannot be initiated. Clear: Indicates the lockout is cleared and protection switching can be initiated.
Switch status
No Request
The state of protection switching. Signal Failure in the Work port: if failure on the work port. Signal Fail on Protection: failure on the protect port. WTR: traffic is being switched from protect to work and the failure on the work has been cleared. No Request: ports are working properly. Force Switch to Work: Force Switch to Work command is issued on the protect port and the traffic is switched from protect to work port. Force Switch to Protect: Force Switch to Protect command is issued on the work port and the traffic is switched from work to protect port. Manual Switch to Work: Manual Switch to Work command is issued on the protect channel and the traffic is switched from the protect to work port. Manual Switch to Protect: Manual Switch to Protect command is issued on the work port and the traffic is switched from work to protect port. Reverse Request: MSP/APS protection request is locked out in the link partner and protection switching cannot be initiated. Do Not Revert: traffic has switched from protect to work and the failure on work has been cleared in non-revertive mode. Equip Fail on Protect: failure on the far end network element due to card jackout or FMECA failure.
4-24
Automatic protection switches are initiated by the network element and are triggered by signal fail and degrade conditions at the section and line level only.
Note
MSP/APS on VC12 management channel is not supported for all the products. On failure of work channel, VC12 management channel goes down and comes up only on restoring the work channel.
4-25
Note
The MSP/APS group can be deleted only if there are no cross-connects or In Band Communication (IBC) interfaces (F2, F3 and F2F3) provisioned on the ports which make up the MSP/APS group.
4-26
The SNCP/UPSR is provisioned only if the port used for working or protection is not a part of MSP/APS. There should be availability of minimum bandwidth on both the working and protection port. For example, to provision SNCP/UPSR, there should be at least one TU12/VT2 available on the working and protection ports. The SNCP/UPSR configuration is supported on STM-1/4/OC-3/12 interfaces. The SNCP/UPSR is provisioned in revertive and non-revertive mode. In revertive mode, traffic switches back to the work path once the fault condition has cleared, after the WTR period has elapsed. In non-revertive mode, traffic remains on the protect path until switched back to the work path manually, after the fault is cleared. The following table lists the maximum number of connections supported in the SNCP/UPSR configuration for STM -1/4/OC-3/12 interfaces.
Table 4-14. Maximum Number of Connections Supported in the SNCP/UPSR Configuration for STM -1/4/OC-3/12 Interfaces
Capacity Maximum number of connections for STM 84 63 3 1 Maximum number of connections for STM-4/OC-12 336 252 12 4
SNCP/UPSR is provisioned while configuring protection for cross-connects. Refer to the Cross-Connects section for information on creating/editing cross-connects. The following figure illustrates switching in the case of single and dual fiber cuts.
4-27
The Synchronization Source external commands table describes parameters and the descriptions issued on synchronization sources.
4-30
4-31
Allows you to select the protection type AdminDown for Ethernet ports. For VCG ports, by default AdminDown will be selected. Displays the external command provisioned for the destination traffic. Select the desired command: ext_cmd_none ext_cmd_clear ext_cmd_lockout ext_cmd_FS ext_cmd_MS_to_protect ext_cmd_MS_to_working
External Command
4.9
This chapter describes the Configuration menu in the WUI. Using the Configuration menu.
4-32
Note
The local and remote network element must be provisioned with the same protection configuration. Configure the MSP/APS group before creating the desired cross-connects on the working port. MSP/APS configuration is applicable to STM-1/4 and OC-3/12 ports. The number of MSP/APS provisioned depends on the availability of optical ports. One MSP/APS protection group can be provisioned for every two optical ports in a network element.
Automatic protection switches are initiated by the network element and are triggered by signal fail and degrade conditions. Using MSP/APS group menu you can: view configured MSP/APS groups provision a new MSP/APS group edit MSP/APS groups delete MSP/APS groups
Note
Working port
4-33
Chapter 4 User Interface Guide Field Protection port Reversion Mode Description
Displays the channel configured to carry the traffic under protected (failure of work channel) conditions. Revertive: This mode enables automatic switching to work channel from protect channel, once the fault on work channel is fixed. Non-Revertive: In this mode, traffic has to be manually switched from protect to work channel. Until traffic is manually switched back to work channel, traffic is carried on protect channel.
Select a time interval (in minutes) after which the traffic must switch back to work channel on rectification of work channel, when admin reversion mode is set to revertive. Displays the active channel in which traffic is being currently carried. 1WAY: Only the Head end network element's receiver switches to the alternate receiver on receiving an alarm. 2WAY: Both the head end and tail end network element's receiver switches to the alternate receiver on receiving an alarm.
Delete
Note
MSP/APS on VC12 management channel is not supported for all the products. On failure of work channel, VC12 management channel goes down and comes up only on restoring the work channel.
Table below gives the configurable MSP/APS protection group parameters with their default and acceptable values.
4-34
(where N is the slot number in which the card is placed.) Protection port STM1-1-N-2/ OC3-1-3-2 STM1-1-N-1/OC3-1-N-1 STM1-1-N-2/OC3-1-N-2 STM4-1-N-1/OC12-1-N-1 STM4-1-N-2/OC12-1-N-2
(where N is the slot number in which the card is placed.) Protection Mode Admin Reversion Mode 1+1 Non-Revertive 1+1 WTRTime (minutes) Protection Switching mode 5 1 Way Non-Revertive Revertive
Route Diversity
Disable
Note
The WTR Time is applicable and provisionable only if the reversion mode is set to revertive. The default value for the work port is the first available port (in the ascending order either STM-1/OC-3 or STM-4/OC-12 interface).
The default value for the protect port will be the first available port, depending upon the type of interface chosen in the work port.
Note
Note
4. Select suitable values for the editable parameters. 5. Click Submit. A confirmation page is displayed. 6. Click Accept Valid Modifications. A Successfully Modified message is displayed.
Managing Cross-connect
The Cross-connect option enables you to create cross-connects in a network element and provision 1WAY, 2WAY, protected or unprotected cross-connects of different capacities.
4-36
The different type of cross-connects that can be configured are: Add Drop Add-drop Pass-through Hairpin
The cross-connects can be created on Ethernet and STM-1/4/OC-3/12 interfaces. The cross-connect can be 1-WAY or 2-WAY. Using the Cross-connect menu you can perform functions like Filter cross-connects Add cross-connects Edit a cross-connect Delete a cross-connect Edit VCG
4-37
Provisioning Cross-connects
Number of Connections 1 The number of cross-connects that need to be created. The capacity of the cross-connect. Acceptable values: Capacity VC12/VT2 VC11/VT1.5 VC12/VT2 VC3/STS1 VC4/STS3C VC4_4c/STS12C
Circuit Identifier
The name given for the cross-connect. The name can be a set of alphanumeric characters up to a maximum of 40 characters. Space and special characters such as '-' or '_' are allowed. The direction of the data flow in the crossconnect. Acceptable values: 1WAY 2WAY
Directionality
2 WAY
Working Source Port Working Destination Port Working Source STM No. Working Destination STM No.
The source port for work channel. All the available ports. The source port for the destination channel. All the available ports. The STM number at the source and destination of the work channel. Acceptable values range between 1 and STM4.
4-38
Installation and Operation Manual Parameter Working Source Node ID Working Destination Node ID Default Value Description
The Node ID of the traffic source. The Node ID of the traffic destination. Parameter to enable or disable source protection.
Disable
Enable: The protection path is enabled at the source/destination. Disable: The protection path is disabled at the source/destination.
Protection Source Port Protection Destination Port Protection Source STM No. Protection Destination STM No. K/STS L/VT M/VT
1 1 1 1
The source and the destination port for the protection channel. The STM number, at the source and destination for the protection channel. The TUG3 number. Acceptable values range between 1 to 3. The TUG2 number. Acceptable values range between 1 to 7. The TU number. Acceptable values range between 1 to 3 for VC12/VT2 and 1 - 4 for VC11/VT1.5.
5 Non-revertive
1 to 12 minutes The reversion mode of the protection at destination. Revertive: The traffic is automatically switched to the work path from the protect path after the fault in the work path is rectified. Non-revertive: The traffic has to be manually switched to the work path from the protect path after the fault in the work path is rectified.
4-39
Chapter 4 User Interface Guide Parameter Destination Wait-to-Restore Time (minutes) or Destination WTR Time Default Value 5
Filtering Cross-Connects
When you click on the Filter button, it filters cross-connect based on the selected criteria for capacity, card, port number, etc. The filtered results are displayed in the Cross connects section of the Configure Cross-connects preview pane. The Select all button when clicked selects all the filtered cross-connects. The Deselect all button when clicked de-selects all the selected cross-connects. To filter cross-connects: 1. Click Configuration > Cross-connects. 2. Select criteria for filtering in the Filter Cross-connects section. 3. Click Filter.
Adding Cross-connects
To add cross-connects: 1. Click Configuration > Cross-connects. 2. Click the Add Cross-connect link. 3. Select the desired source and destination port. 4. Click Submit. A confirmation window is displayed. 5. Click Yes. A message "Successfully Added Cross-Connect" is displayed.
Editing Cross-connects
To edit cross-connects: 1. Click Configuration > Cross-connects in the Navigation menu. 2. Click the entry to be edited. The entry preview pane is displayed. Click the Edit link Or click the edit link in the Edit column for the entry to be updated. 3. Edit required values referring to Cross-connects parameters table. 4. Click Submit. 5. Click Accept Valid Modifications.
Deleting Cross-connects
To delete cross-connects: 1. Click Configuration > Cross-connects in the Navigation menu. 2. In the delete field, select the check box for the entries to be deleted.
4-40 Working with the Configuration Menu Egate-2000 Ver. 1.0
Note
Note
Bytes used for In-band communication and orderwire cannot be used for configuring overhead tunnel.
Using Overhead tunnel menu, you can: View configured overhead tunnels Create new overhead tunnels Delete overhead tunnels
STM1-1-N-1/OC3-1
STM1-1-N-1/OC3-1
Overhead Byte
E1
4-41
Note
Overhead Tunnels
To delete overhead tunnel: 1. Click Configuration > Overhead tunnel in the Navigation menu. 2. In the delete field, select the check box for the entries to be deleted. 3. Click Delete. 4. Click Confirm Delete.
Note
The Environmental alarm can be a set of alphanumeric characters. The maximum number of characters allowed is 40.
4-42
To configure SNMP traps: 1. Click Configure > SNMP traps in the Navigation menu. The SNMP trap destination IP addresses preview pane is displayed. 2. Enter the IP Address, Port and select the SNMP Version. 3. Click Submit. A Modify SNMP trap destination IP addresses preview pane is displayed.
4-43
Managing Facilities
Using the the Facilities option, you can check, view, or edit the attributes of Optical ports, PDH ports, Ethernet ports, and VCG ports.
Default Value
Up
Description
The administrative status of the port. Up: Sets the interfaces in service. Down: Sets the interfaces out of service.
Report
The alarm reporting status. Report: Enables reporting of alarms on STM/OCn port. No-Report: Disables reporting of alarms on STM/OCn port.
Internal-NNI -
The STM/OCn port profile. The type of line coding being used (NRZ coding). This field is not configurable. The Laser being used. Click the link to view the Laser provisioning page.
4-44
Parameters
ECC Byte Selection
Default Value
-
Description
The established Embedded Communication Channel (field is not configurable): ecc_DCC_M ecc_DCC_R ecc_F1 ecc_F2 ecc_F3 ecc_F2F3
Transmit J0
The section trace message is transmitted with Maximum length as specified by the Transmit J0 Length, padded with spaces for strings less than specified length. The length of the section trace is transmitted with values ranging between 1 to 16. The expected received section trace value. The length of expected received section trace with values ranging between 1 to 16. The received Section trace message. TIM Action settings control handling of mismatches between received and expected trace messages. tim_report: Reports alarm traffic affecting, on trace identifier mismatch. tim_ignore: Reports no action on trace identifier mismatch. tim_downstream_ais: Reports alarm indication signal (AIS) downstream (traffic affecting), on trace identifier mismatch.
Transmit J0 Length
16
16 -
TIM Action
tim-ignore
TIM Action
tim-ignore
tim_report: Reports alarm traffic affecting, on trace identifier mismatch. tim_ignore: Reports no action on trace identifier mismatch. tim_downstream_ais: Reports alarm indication signal (AIS) downstream (traffic affecting), on trace identifier mismatch.
4-45
Parameters
Signal Fail BER Threshold (B2)
Default Value
Disable
Description
Parameter to enable or disable Signal Fail BER thresholds. Enable: Enables selecting the threshold, on crossing, which Signal Fail alarm is raised for errors detected by B2. Threshold range is between 10e-3 to 10e-5. Disable: Signal Fail BER Thresholds are disabled.
Disable
BER thresholds. Enable: Threshold on crossing, which Signal Degrade alarm is raised for errors detected B2. Threshold can be set in the range between 10e-5 to 10e-9. Disable: Signal Degrade BER Thresholds are disabled.
Disable
Parameter to enable threshold crossing alerts (TCA) for 15-min duration. Enable: TCA is user configured for 15 minutes interval. If this field is enabled, an alert/event is raised on Performance Monitoring counts crossing the threshold value. The thresholds are changed from the TCA Settings link on the same page. Disable: TCA are disabled. Default -Default values for the thresholds are used.
Disable
Parameter to enable TCA for 1-day duration. Enable: TCA is user configured for 1 day interval. If this field is enabled, an alert/event is raised on Performance Monitoring counts crossing the threshold value. The thresholds are changed from the TCA Settings link on the same page. Disable: TCA are disabled. Default: Default values for the thresholds are used.
Identifier
The name for the STM/OC port. The name can be a set of alphanumeric characters.
Note
2. Click the desired STM/OC port link. The corresponding Provisioning Interface preview pane is displayed. 3. Select or enter values referring to the STM/OCn Interface Parameters table. 4. Click Create. A confirmation preview pane is displayed. 5. Click Yes. A "Successfully Created" message is displayed.
114 10 27000
To enable TCA settings for 15-minute interval or 1-day duration: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired STM/OC port. The Provisioning interface preview pane for that STM/OC port is displayed. 3. Click Submit. A confirmation preview pane is displayed. 4. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
4-47
Note
In the MSP/APS configuration, the AUG/STS-N SPE parameters need to be provisioned only for the working STM-1/4/OC-3/12 port of the protection group. The provisioned values are automatically propagated to the protection port. The signal label field is provisionable, but should not be edited as it will be automatically assigned a value depending on the type of cross-connect provisioned. AUG/STS-N SPE can be provisioned only if all the cross-connects associated with that AUG/STS-N SPE are unprovisioned or deleted. Options available in the Mapping structure depend on the mapping selected while initializing the network element. Refer to the Installation and Commissioning Procedures manual of the corresponding product for more information.
Note
Note
Note
4-48
Provisioning AU4/STS-3c/AU3/STS-1
AU4/STS-3c is only for STM/OCn capacity. To provision AU-4/STS-3c/AU3/STS1: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired AU4/STS-3c or AU3/STS1 link. The corresponding Provision preview pane is displayed. 3. Select/Enter values referring to the AU4/STS-3c/AU3/STS1 Parameters table. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modification. A Successfully Modified message is displayed. The table below describes the parameters and default values for AU4/STS3C/AU3/STS-1.
4-49
Chapter 4 User Interface Guide Parameter Received Signal Label Default Value -
Installation and Operation Manual Description The payload type or the Signal label received on the AU path. For example, tug_structure, asynchronous_container3, unequipped, etc. The message transmitted in the AU/STS on J1 byte. The trace message can be of 16 or 64 characters long. The length of the section path trace to be sent. The length can be 16 or 64. The Transmit Trace Length and Expected Trace Length must be the same. The path trace that is expected to be received on AU/STS path. The received message can be 16 or 64 characters long. The Transmit Trace Length and Expected Trace Length must be the same. The length of the section path trace that is expected to be received. The length can be 16 or 64. The AU/STS path trace that is received. Parameter to indicate the threshold for signal fail Bit Error Rates (BER) beyond which alarm is raised. Acceptable values include 1e3, 1e-4, 1e-5 and Disable. When Disable is selected, no threshold exists for the signal fail BERs and alarms are not raised.
Transmit Trace
abcdabcdabcdabc
16
Expected Trace
abcdabcdabcdabc
16
1e-3
4-50
Installation and Operation Manual Parameter Signal Degrade BER Threshold Default Value 1e-6
Chapter 4 User Interface Guide Description Parameter to indicate the threshold for signal degrade Bit Error Rates (BER) beyond which alarm is raised. Acceptable values include 1e-3 to 1e-9 and Disable. When Disable is selected, no threshold exists for the signal degrade BERs and alarms are not raised. Parameter to enable or disable reporting of alarms raised on the interface. Report: Alarms raised are reported. Disable: Alarms raised are not reported.
Report
Connection Type
Parameter to select the type of cross-connects that can be created. Allow both Lower Order and Higher Order Connections: Both lower and higher order connections can be created Allow Only Lower Order Connections: Only lower order connections can be created In Use Higher Order Connection: Only higher order connections can be created.
Mask TIM
Parameter to assign the alarm profile for the Path. mask TIM suppress TIM mask all except LOP mask all
4-51
Table below describes the performance monitoring parameters associated with AU4/STS-3c/AU3/STS-1.
Threshold SES
15
1440
Threshold BBE/CV
1100
105600
To edit AU4/STS-3c/AU3/STS-1: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired AU4/STS-3c or AU3/STS-1 link. The corresponding Provision preview pane is displayed. 3. Click TCA Settings for 15-min duration link to edit TCA settings for 15-min duration, or click TCA Settings for 1-day duration link to edit TCA settings for 1day duration. The corresponding TCA settings page is displayed. 4. Enter values referring to the AU4/STS-3c/AU3/STS-1 Parameters table. 5. Click Submit. A confirmation preview pane is displayed. 6. Click Accept Valid Modifications. A Successfully Modified message is displayed.
4-52
To provision TU/VT: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click on desired AU4/STS-3c. The Provision AU4/STS-3c preview pane is displayed. 3. Click the desired AU3/STS-1. The Provision AU3/STS-1 preview pane is displayed. 4. Click on the desired TU/VT link. The Provision TU/VT preview pane is displayed. 5. Select/Enter values referring to the TU/VT Parameters table. 6. Click Submit. A confirmation preview pane is displayed. 7. Click Accept Valid Modifications. A Successfully Modified message is displayed. Table below describes the TU/VT parameters.
The value assigned depends on the cross-connect provisioned. The Signal Label field is made user provisionable to avoid the Signal Label Mismatch in case of connectivity between network elements of multi vendor networks.
4-53
Chapter 4 User Interface Guide Parameter Extended Signal Label Default Value GFP for add drop Ethernet crossconnects
Installation and Operation Manual Description The payload type or the Signal label received on the TU path. Acceptable values: ATM HDLC_PPP HDLC_LAPS VCAT_TEST GFP
The value assigned depends on the cross-connect provisioned. The Extended Signal Label option is ignored for TU-3/STS-1 and TU12/VT-2 pass through crossconnects. Received Signal label The payload type or signal label received on the TU/VT path. For example, tug structured, asynchronous_container3. The path transmitted in the TU. The trace length is not editable and it can be 16 characters long. The length of the section path trace to be sent. The length can be 16 or 64 The path trace that is expected on the TU path. The trace message is not editable and it can be 16 characters long. The length of the expected section path trace. The Length can be 16 or 64. The TU/VT path trace that is received. Parameter to indicate the threshold for signal fail Bit Error Rates (BER) beyond which alarm is raised. Acceptable values include 1e-3, 1e4, 1e-5 and Disable. When Disable is selected, no threshold exists for the signal fail BERs and alarms are not raised.
Transmit Trace
TX_Unallocated
1e-3
4-54
Installation and Operation Manual Parameter Signal Degrade BER Threshold Default Value 1e-6
Chapter 4 User Interface Guide Description Parameter to indicate the threshold for signal degrade Bit Error Rates (BER) beyond which alarm is raised. Acceptable values include 1e-3 to 1e-9 and Disable. When Disable is selected, no threshold exists for the signal degrade BERs and alarms are not raised. Parameter to enable or disable reporting of alarms raised on the interface. Report: Alarms raised are reported. Disable: Alarms raised are not reported.
Report
mask TIM
Parameter to assign the alarm profile for the Path. mask TIM suppress TIM mask all except LOP mask all TIM-new
Note
Presence of unprovisioned TU/VT on the far end network element leads to no VCAT overhead transmission. The alarm raised due to this consequence is Loss of VCAT multiframe on TU/VT. If the STM/OCn ports are provisioned in an MSP/APS configuration, select the TU/VT for the corresponding work port to edit the TU/VT parameters. The settings will be automatically propagated to the protection TU/VT.
Note
The TU/VT Performance Monitoring Parameters table describes the parameters, default value, description.
4-55
Threshold SES
15
1440
Threshold BBE/CV
300
28800
Note
To configure the TU/VT Performance monitoring thresholds, enable the corresponding Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM/OCn port preview pane.
To edit the TU/VT performance monitoring thresholds for 15-minutes and 1-day duration: 1. Click Configuration > Facilities > STM/OC in the Navigation menu. The STM/OC Port interface configuration preview pane is displayed. 2. Click the desired AU4/STS-3c or AU3/STS-1. The corresponding provisioning preview pane is displayed. 3. Click the desired TU/VT link. The Provision TU/VT preview pane is displayed. 4. Click TCA Settings for 15-min duration link to edit TCA settings for 15-min duration, or click TCA Settings for 1-day duration link to edit TCA settings for 1-day duration. The corresponding TCA settings page is displayed. 5. Enter values referring to the TU/VT Performance Monitoring Parameters table. 6. Click Submit. .A confirmation preview pane is displayed. 7. Click Accept Valid Modifications. A Successfully Modified message is displayed.
4-56
3. Click the desired E1/DS1/E3/DS3 port. The Provision interface preview pane is displayed. 4. Select/Enter values referring to the PDH Interface Parameters table. 5. Click Submit. A confirmation preview pane is displayed. 6. Click Accept Valid Modifications. A "Successfully Modified" message is displayed. Table below describes the PDH Interface Parameters.
The alarm reporting status of the PDH port. Report: Reports alarms raised on the port. No-Report: Alarms raised at the port are not reported.
Disable
Parameter to enable or disable TCAs for 15minutes/24-hour duration on the PDH ports. Enable: Enables configuring threshold level (for TCA-15minutes/ 1-day) for TCA. Disable: Disables threshold level for TCA-15 min/1-day. Default TCA Profile: The default TCA profile is assigned.
Identifier -
The identifier for the port. The identifier can be any alphanumeric string. This string can be used to search on list of port. The framing application being used.
Unframed framed
4-57
Chapter 4 User Interface Guide Parameter Line build out type Default Value DSx_0_133ft (for DS1) DS3_0_225ft (for DS3)
Installation and Operation Manual Description The Line build out type. This parameter is not applicable for E1/E3 ports. For DS1: DSx_0_133ft DSx_133_266ft DSx_266_399ft DSx_399_533ft DSx_533_655ft For DS3: DS3_0_225ft DS3_225_450ft Enable: The E1 signal is reconstituted to the primary reference source performance specifications. Disable: The E1 signal is not reconstituted to the primary reference source performance specifications and hence the synchronization information is lost.
E1 Retiming
Enable
4. Click the Provision a new TCA Profile link. The Provision New TCA Profile preview pane is displayed. 5. Enter values referring to the PDH TCA Profile Parameters table. 6. Click Create. A confirmation preview pane is displayed. 7. Click Yes. A "Successfully Created" message is displayed.
4-59
Installation and Operation Manual Parameter Status of links originating from the port. The field is not configurable. Up: The link is up and is capable of forwarding traffic. Down: The link is down and is not capable of forwarding traffic
MTU Auto-negotiation
9600 Disable
Maximum size of a packet that can be sent through the interface. Indicates if information on traffic speed, communication mode etc is shared while establishing a link between the ports. Enable: Information on traffic speed, communication mode, etc., is shared while establishing a link. Disable: Information on traffic speed, communication mode, etc., is not shared while establishing a link.
1000 Mbps, Full Duplex when link is Up and autonegotiation is enabled Complete 1000 Full for optical links Disable
The speed and Duplex mode of the port. The field is not editable. The status of auto-negotiation with the link partner. The capabilities of the link partner. Performance monitoring thresholds for 15 minute intervals. Enable: Allows thresholds for 15 minute intervals to be defined. Disable: Does not allow thresholds to be defined for 15 minute intervals.
100 Base-TX -
Ethernet port type: 100 Base-Tx or 100 Base-Fx. Ethernet port name.
To provision Ethernet interface: 1. Click Configuration > Facilities > Ethernet in the Navigation menu. The Ethernet Interface configuration preview pane is displayed. 2. Click the Ethernet port to be provisioned. The Provision Ethernet Interface Port is displayed. 3. Select or enter values referring to the Ethernet Interface Physical parameter table. 4. Click Submit. A confirmation preview pane is displayed.
4-60
4-61
Chapter 4 User Interface Guide Parameter Framing Type Default Value GFP-F
Installation and Operation Manual Description The framing standards for Ethernet over SDH/SONET as chosen while configuring the ETH card. The acceptable values include GFP-F. The maximum difference delay allowed. The value is not configurable. The CRC type. The field is not configurable. CRC-16: Configures VCG for CRC-16 type. CRC-32: Configures VCG for CRC-32 type.
63msc CRC-32
VCAT
Enable
Parameter to indicate if the VC Group is provisioned to enable or disable virtual concatenation (VCAT). Enable: VCAT is enabled. Disable: VCAT is disabled.
Operating Granularity
VC-12/VT2
Granularity of the signals as chosen while configuring the ETH card. Acceptable values include VC11/VT11 VC12/VT2 VC3/STS1 VC4/STS3c VCG_E1/VCG_DS1 VCG_E3 VCG_DS3
Payload FCS
Enable
Parameter to enable or disable adding FCS. Enable: Allows the addition of the payload FCS as specified in GFP. Disable: Does not allow the addition of payload FCS as specified in GFP. It is recommended to keep the Payload FCS enabled.
4-62
Installation and Operation Manual Parameter Remove channels with SD Default Value Disable
Chapter 4 User Interface Guide Description Parameter to enable or disable removal of channels with SD from VCAT. Enable: Channels are removed from a VCAT group when there is a signal degrade on any of the TUs related to the channels. Disable: Channels are not removed from a VCAT group when there is a signal degrade on any of the TUs related to the channels.
Enable
Allows you to enable or disable the removal of channels with MND (member not deskewable). Allows you to enable or disable the IgnoreRDI. IgnoreRDI in LFE should be enabled when 8XETH/4X10/100BT + 4X100FXL1 card is present on one end of the link and any Ethernet card (transport/switch) is present on the other end of the link and the link is provisioned for the 1+1 APS unidirectional protection. The identifier for the VCG. The name can be a set of alphanumeric characters of maximum 40 characters including space.
IgnoreRDI in LFE
Disable
Number of Channels
The number of channels configured for the group. Parameter not configurable.
The View VC Group preview pane is displayed. Table below describes VC/VT parameters:
Defaullt Value
-
Description
The number of identical cross-connections to be created.
Working Port Protection Port STM #/OCn K (TUG 3)/STS# L (TUG 2)/VT M (VC number)/VT#
1 1 1 1
Revertive -
4-64
Parameter
Rx Control Rx Channel MST Rx Seq Internal PDH Port ID
Defaullt Value
-
Description
The received LCAS control value on the associated Rx channel. The receiving member channel status. The receiving member sequence number Displays the PDH port ID based on the operating granularity selected for VCG (VCG_E1/VCG_E3/VCG_DS3) Displays the protect PDH port ID, the protect channel created for any (VCG_E1/VCG_E3/VCG_DS3).
Note
You can configure the protection feature in the revertive mode, to enable reversion of traffic from the protect fiber to the working fiber. This happens after a specified time (wait to restore time).
4-65
Note
LCAS support needs to be enabled or disabled at both the transmitter and receiver.
To provision LCAS: 1. Click Configuration > Facilities > VCG in the Navigation menu. 2. Click the VCG to be provisioned in the sub menu. The VCG Interface configuration preview pane is displayed. 3. Click the desired VCG. The Provisioning VCG interface preview pane is displayed. 4. Click View VC/VT Group. The View VC Group preview pane is displayed. 5. Click the Lcas link in the edit LCAS column for the VC you want to edit. The corresponding Provisioning VCG Association preview pane is displayed. 6. Select Add for Transmit LCAS provision to enable the LCAS support. Select Remove for Transmit LCAS provision to disable LCAS support. 7. Click Submit. A confirmation preview pane is displayed. 8. Click Accept Valid Modifications. A Successfully Modified message is displayed. Table below describes the LCAS parameters.
4-66
Installation and Operation Manual Parameter Tx CTRL (Tx Channel) Rx MST (Rx Channel) Rx CTRL (Rx Channel) (minutes) Default Value Description
Displays the Transmitted LCAS control value on the associated Tx channel. Displays the receiving member channel status. Displays the Received LCAS control value on the associated Rx channel.
communication channel (ECC) to allow the remote EMS/NMS to communicate to the network element for OAM&P applications. The following are supported provisioning of ECC over the following bytes or sets of bytes: DCC-R/SDCC DCC-M/LDCC F1 F2 F3 F2F3
Each SDH/SONET frame includes two Embedded Communication Channels (ECC) called Regenerator Section/Section and Multiplex Section/Line ECC for transporting management messages between network elements and management systems. These in-band data communication channels enable service providers Operation Support Systems (OSS) to manage SDH/SONET network elements without the need for an expensive out-of-band data communication network. VC12/VT2 management channel can be used to transport management communications between network elements and management systems. These management channels enable service providers to manage SDH/SONET network elements without the need of expensive out-of-band data communications network.
Note
If the ECC_bytes are enabled on the STM-1/4/OC-3/12 port, then the corresponding bytes cannot be used for tunneling.
The Network interface feature gives a list of all the active Network Interfaces with their attributes. Using Network interface menu, you can View network interface configuration Edit network interface configuration Provision ECC Delete network interface configuration
4-68
Layer 2 Layer 2 protocol PPP, HDLC Framing The Layer 2 protocol used for the interface. The available Layer 2 protocols are: PPP, HDLC Framing Standard PPP, RFC 1661 The Layer 2 Protocol is MAC and is not editable. Magic Number Enable Enable: The network element distinguishes the packets received from other network elements from the packets received from itself during loopback. Disable: The network element cannot distinguish the packets received form other network elements from packets received from itself. Magic number is editable only when Standard PPP, RFC 1661 is selected for Layer 2 Protocol. Magic number is not applicable for LAN. OSPF
4-69
Installation and Operation Manual Description Parameter to enable or disable OSPF. Enable: Enables OSPF on the network element. Disable: Disables OSPF on the network element.
10
The time interval after which the network element sends Hello messages. Acceptable values range from 1 to 65535. The Router Dead Interval should be an integral multiple of Hello Interval.
30
The maximum duration for which the network element waits for response for the hello packet sent by it to the neighboring network element. Acceptable values include: Disable Authentication: The hello packets received are not authenticated. Simple Password: The hello packets received are authenticated against the password or key provisioned in the network element.
Disable Authentication
OSPF Authentication
Applicable only when Simple password is selected for OSPF Authentication mode. The password can be a set of alphanumeric characters having a maximum length of 8 characters.
Password/Key
2. Click the edit link in the Edit column for the entry to be updated. The Edit Network interface provisioning preview pane is displayed. 3. Edit required values referring to Network Interface Parameters table. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
where N is the slot number in which the card is placed. ECC Byte Selection ecc_disable The byte used for the embedded communication channel. ECC Path ecc_disable ecc_F1 ecc_F2 ecc_F3 ecc_F2F3 ecc_DCC_R/ecc_SDCC ecc_DCC_M/ecc_LDCC
To provision or edit embedded communication channels: 1. Click Configuration > DCN > Network interface in the Navigation menu. The Network interface configuration preview pane is displayed. 2. Click the Provision ECC link. The Provision ECC preview pane is displayed. 3. Select or enter values referring to the Embedded Communication Channel table.
4-71
4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
Default Value
-
Description
The type of the management channel. Available values include: E1 VC12
Unprovisioned SDH Path Port STM1-1-N-1 The STM port used for the management channel when VC12 is selected for Management Channel Type. Acceptable values include: STM1-1-N-M STM4-1-N-M
Where N is the slot number in which the card is placed and M the STM port number. STM No 1 The STM used for the Management channel. 1 when STM1 port is selected. 1-4 when STM4 port is selected. K L M 1 1 1 The TUG3 number. Acceptable values range from 1 to 3. The TUG2 number. Acceptable values range from 1 to 7. The TU number. Acceptable values range from 1 to 3.
To provision management channel: 1. Click Configuration > DCN > Network interface in the navigation menu. The Network interface configuration preview pane is displayed. 2. Click the Provision Management Channel link. The Management channel configuration preview pane is displayed. 3. Select or enter values referring to the Management Channel Parameters table. 4. Click Submit.
4-72
A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
Understanding OSPF
The Open Shortest Path First (OSPF) is an interior gateway routing protocol based on the shortest path first or link-state algorithm. Routers use link-state algorithms to send routing information to all nodes in an internetwork by calculating the shortest path to each node based on the topography of the internet constructed by each node. Each router sends that portion of the routing table (keeps track of routes to particular network destinations) that describes the state of its own links, and the complete routing structure (topography). The advantage of shortest-path first algorithms is that it results in smaller and more frequent updates everywhere. The converge is quick, thus preventing problems like routing loops and count-toinfinity (when routers continuously increment the hop count to a particular network) which results in a stable network. The OSPF feature enables monitoring neighbors of a network element and debugging the routing information for In Band Communication (IBC). The OSPF parameters can be configured for all embedded control channel interfaces and for the LAN port to enable routing between these interfaces. OSPF as a routing algorithm is used to route IP packets through the shortest path. For this to happen, the routers need to properly establish the adjacency and then exchange their routing database with each other. OSPF authentication is used to avoid any malicious intentions of establishing adjacency, thereby avoiding any malicious intentions of knowing routing database of a network. The password configured in OSPF authentication mode is sent in OSPF packets. This is used to establish adjacency where the same password needs to be configured on both interfaces connected to each other. OSPF network can be divided into sub-sections called areas. An area is a group of OSPF networks, routers and links that have the same area identification. It helps in reducing the size of the router database, as router only possesses information about network topology that is within the area. The default area parameter is 0.0.0.1. Any valid IP address is an acceptable area parameter.
Note
The default OSPF area 0.0.0.1 is the area address of the backbone. Changing the OSPF area may cause a loss of communication to the network element.
Caution Changing OSPF area may cause a loss of communication to the network element.
Note
Any invalid static route added on a point to point interface is added in the WUI but is not added in the Kernel routing table. Any invalid static route added on a broadcast interface (eth) is blocked. The next hop IP Address has to be specified only when the static route is provisioned on eth0. If it is ecc interface, the Next Hop IP Address need not be specified. If the address is not specified or is invalid for eth0 interface, an error message is displayed on submit. For a redundant system, only one port is available for provisioning. Hence, for STM1/OC-3 and STM4/OC-12 redundant mode, ports STM4-1-N-2/OC12-1-N-2 are not available for provisioning.
Using Static Route menu, you can: View all the configured static routes Add a new static route Delete static routes
Note Note
4-74
Table below describe Static route parameters and their default value..
Advertise Route
Disable
Network Interface
4-75
Note
The user has to manually add all the IP addresses of the network elements for which the network element has to respond. The network element sends a proxy ARP response for all ARP requests that contain the IP address of an added network element (regardless of whether that IP address is reachable or not from the network element).
The network element software supports viewing and adding of proxy ARP neighbors. Table below describes the parameters and default value for Proxy ARP Neighbor.
LAN-1-6 (Eth0)
Using Proxy ARP Neighbours menu, you can: View all the proxy ARP neighbors
4-76
Note
The maximum number of Proxy Address Resolution Protocol (ARP) entries supported is 50. Ensure that the router ARP timers are set to less than 10 minutes to limit the DCN outage to 10 minutes.
Note
Note
In the absence of static route, deleting Proxy ARP neighbours will result in loss of communication to the remote network elements.
4-77
For UDC application, overhead byte F1 is used for data communication purpose. Serial communication requires that you specify the transmission baud rate and application. PPP is used for modem application. The modem facility provides a serial point-to-point connectivity using PPP protocol and is terminated on IP. Table below describes the parameters associated with Serial port.
where N is the slot number in which the STM-1/4/OC3/12 cards are present. AUG AUG/STS3-1 The AUG involved in the serial port communication. Acceptable values include: AUG/STS3-1-N-1-1-1 AUG/STS3-1-N-1-2-1 AUG-/STS3-1-N-1-3-1 AUG-/STS3-1-N-1-4-1 AUG/STS3-1-N-1-3-1 AUG/STS3-1-N-1-4-1 AUG/STS3-1-N-1-1 to AUG/STS3-1
where N is the slot in which the STM/OC card is present. AU AUG/STS3-1 The AU involved in the serial port communication. Acceptable values include: AUG/STS3-1-N-1-1-1 AUG/STS3-1-N-1-2-1 AUG-/STS3-1-N-1-3-1 AUG-/STS3-1-N-1-4-1 AUG/STS3-1-N-1-1 to AUG/STS3-1
where N is the slot in which the STM/OC card is present. AUG/STS3-1-N-1-2-1, AUG/STS3-1-N-1-3-1, AUG/STS3-1N-1-4-1 are available only if the network element is working with STM-4/OC-12 capacity.
Note
When Login is selected for Application, the supported Baud Rate is 9600.
Egate-2000 Ver. 1.0
4-78
Note Note
The UDC application does not allow you to set the data rate for the baud rates listed. The Baud Rate is fixed at 9600.
A PPP connection between the network element M1F1 port and a PC is not possible without a modem.
Using Serial port menu, you can view and edit serial port configuration.
4-79
Priorities assigned to the source (user provisionable) Quality of the available signal on the nominated source (ppm offset less than or equal to +/- 9 ppm)
Default Value
Unprovision Application 9600 Down
Description
The application running on the serial interface. The operating rate of serial interface. The administrative status of the Serial port. Up: The port is in service Down: The port is out of service.
PPP Application IP Address IP address of the network element The IP address of the network element. Acceptable values range between 000.000.000.000 to 255.255.255.254. The maximum data unit that can be received. Acceptable values range from 128 to 1500. The maximum data unit that can be transmitted. Acceptable values range from 128 to 1500.
1500
1280
4-80
Parameters
UDC Application Overhead Byte
Default Value
Description
F1
STM/OC port
STM1-1-N
where N is the slot number in which the STM-1/4/OC-3/12 cards are present.
4-81
Chapter 4 User Interface Guide Parameter Node output quality level Default Value DNU Description
The quality of clock output. This parameter is editable only if the Output QL mode is set to Manual. Acceptable values include: PRC SSU_A SSU_B SEC DNU INVALID
DNU
The minimum quality level expected by the network element to lock to a particular clock. If the clock does not have the QL as expected, then the BITS clock output will be squelched. Squelching is not done at the STM/OCn interfaces. Acceptable values include: PRC SSU_A SSU_B SEC DNU
The actual value for the Quality of clock output. This field is not configurable. The status of the PLL within the network elements synchronization module. The clock source being used. This field is not configurable.
Table below describes the Configurable synchronization status parameters in SONET mode.
4-82
Installation and Operation Manual Parameter Reversion Mode Default Value Manual Description
Parameter to decide the clock switch mode in case of failure. Auto: The switching of the clock happens automatically. Manual: The switching of the clock has to be selected manually.
WTRTime (minutes)
The time the clock takes to switch to previously locked clock when it is restored from failure. Acceptable values range from 1- 12 minutes. Changes made to the WTR will not impact clocks that are already in WTR. The changes to the clocks will be applied on the next switch.
INVALID
The quality of clock output. This parameter is editable only if the Output QL mode is set to Manual. Acceptable values include: PRS STU ST2 TNC ST3E ST3 SMC DUS INVALID
INVALID
The minimum quality level expected by the network element to lock to a particular clock. If the clock does not have the QL as expected, then the BITS clock output will be squelched. Squelching is not done at the STM/OCn interfaces. Acceptable values include: PRS STU ST2 TNC ST3E ST3 SMC DUS INVALID
Quality Level
DNU
Clock Status
Normal
To view selected timing references, click on Configuration > Synchronization > View Nominated timing references in the navigation menu.
The View nominated timing references preview pane is displayed. 2. Click the Clock Source link to edit the clock source information. The View nominated timing references preview pane is displayed. 3. Edit required values referring to the Nominated Timing References Parameters table. 4. Click Submit. A confirmation preview pane is displayed. 5. Click Accept Valid Modifications. A "Successfully Modified" message is displayed.
Note
If the network element is locked to a clock source that needs to be deleted, then lockout the network element from the clock source before deleting the clock.
Note
4-85
Understanding Alarms
Based on their severity, alarms are categorized as follows: Critical Major Minor Warnings
To view active alarms, click Faults > Active Alarms in the Navigation menu. The Active Alarms page is displayed.
4-86
Managing Faults
The Active alarms page is automatically refreshed for every few seconds. A Start/Stop Refresh button is provided to facilitate or stop the refreshing of the page. The Active alarms page is automatically refreshed for every few seconds.
Note
The Active alarms page may not display the updated alarms on refreshing the Active alarms page in Internet Explorer versions 6.0.x on Windows XP and Windows 2000. To ensure display of the updated alarm list, set your browser settings as follows: On the menu bar of your browser, click Tools > Internet Options > General. In the General dialog box, click Settings in the Temporary Internet files section. In the Settings dialog box, for Check for newer versions of stored page select Every visit to the page. Click OK to close the Settings dialog box and click OK again to close the Internet dialog box.
Note
Managing Faults
4-87
The reason why the alarm is being suppressed and not being reported on the active alarms page
To view suppressed alarms, click Faults > Suppressed Alarms in the Navigation menu. The Suppressed Alarms page is displayed.
4-88
Managing Faults
Managed Object
Any object on the network element such as the Synchronization source, Timing reference, the Tributary Unit, Arithmetic Unit, cross-connect and so on All configured alarms on the network element -
Alarm that is filtered by the Alarm filter. The type of the managed object. For example, if the Managed Object is 'Port', the Type is all the ports available on the network element. If the Managed Object is 'Card', the Type is all the cards available on the network element.
To view provisioned alarm filters, click Faults > Alarm Filters in the Navigation menu. The View Alarm Filter page is displayed.
Managing Faults
4-89
Alarm Severity
Based on the severity levels, alarms are categorized as critical, major, minor, and warning based on their severity. You can set the severity of alarms in Alarm severity page. The alarm for which severity is changed is marked with an asterisk (*) in the Alarm column. The Restore Defaults button when clicked restores the default severity for the modified alarms. The Back to Node View link takes you to the NE information page.
4-90
Managing Faults
Understanding Profiles
The Profiles menu provides following two types of profiles: STM Port Profiles: define the path profiles to be applied for all Higher order/Lower order terminating/non-terminating cross-connects. Path Alarm Profiles: enable the alarm reporting control on all alarms available in the AU and TU objects.
Defining Profiles
4-91
There are two STM port profiles provided by default: Internal NNI: The Internal NNI profile indicates preferences within EMS domains. External NNI: The External NNI profile indicates preferences between different management domains.
Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all
4-92
Defining Profiles
Installation and Operation Manual Parameter Passthrough and Unprotected TU Alarm Profile Default Value Mask all except LOP
Chapter 4 User Interface Guide Description Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all
Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all
Using STM/OC Port Profile menu, you can: View STM/OC port profiles Edit STM/OC port profiles
To view STM/OC Port Profiles: 1. Click Profiles > STM/OC Port Profile. The View STM/OC Port Profile preview pane is displayed. 2. Click the STM/OC port profile provided by default: Internal NNI: The Internal NNI profile indicates preferences within EMS domains. External NNI: The External NNI profile indicates preferences between different management domains. Figure 22: External and Internal NNI
4-94
Defining Profiles
Installation and Operation Manual Parameter Terminating and Protected TU Alarm Profile Default Value Mask TIM
Chapter 4 User Interface Guide Description Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all
Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all
Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include: Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all
Mask TIM
Acceptable values include Mask TIM Suppress TIM Mask all except LOP Mask all
Defining Profiles
4-95
4-96
Defining Profiles
List of masked alarms. The alarms that can be masked are: Alarm Indication Signal Remote Defect Indication Loss Of Pointer Signal Degrade Signal Fail
Defining Profiles
4-97
To view path alarm profiles,click Profiles > Path Alarm Profiles. The View Path Alarm Profile preview pane is displayed.
TIM Action
Suppress TIM
4-98
Defining Profiles
Installation and Operation Manual Parameter UNEQ Signal Label Action Default Value Report UNEQ, No downstream AIS Description
Report UNEQ, No Downstream AIS: Reports the UNEQ alarm without affecting traffic. Ignore UNEQ: No alarm is reported or traffic affecting action is taken on an UNEQ. Downstream AIS on UNEQ: Reports the UNEQ alarm and also transmits downstream AIS. Traffic is affected. Suppress UNEQ: Reports the UNEQ alarm in the suppressed alarm page. There are no traffic affecting alarms.
List of masked alarms. The alarms that can be masked are: Alarm Indication Signal Remote Defect Indication Loss Of Pointer Signal Degrade Signal Fail
Delete
NOTE: Note Default path for alarm profiles are indicated with an asterisk and cannot be deleted.
Defining Profiles
4-99
Note
Default path alarm profiles are indicated with an asterisk. Default path alarm profiles cannot be deleted. A path alarm assigned to an AU/STS, TU/VT or STM cannot be deleted.
The network element monitors performance parameters for working and protection facilities separately. You can use performance monitoring to isolate intermittent faults without interrupting service. SDH/SONET performance monitoring is based on block error measurement. If one or more of the parity bits indicate a parity error when the BIP, BIP-8/BIP24xN or BIP-2 byte is checked, then only one block error is counted. The network element monitors the performance parameters and records the data for Current Interval: The Current interval statistics displays the performance statistics for the current time interval, previous 15 minutes, current day and the previous day. 15min intervals: The Interval statistics displays the performance statistics for 32 previous 15-minute intervals.
Egate-2000 Ver. 1.0
4-100
Performance Monitoring
Previous day: The Previous day's history displays the performance statistics for previous day. The performance monitoring parameters are categorized as follows: STM/OC performance monitoring parameters: You can monitor the performance of Regenerator section-Multiplex section/Section-Line, path, Tributary unit and Transceiver performance attributes. PDH performance monitoring parameters: You can monitor the path performance attributes of Ethernet performance monitoring parameters and VCG performance monitoring parameters
The Reset options are provided to reset the performance counter at the near and far end network elements. A value of '1' in the Interval Valid column indicates that there has been no interruption in the performance counter during the 15 minutes, current day or 24 hours interval. A value of '0' indicates that there has been an interruption in the performance counter such as the network element software restarting, facility administered down, reset, card being jacked out, etc.
Performance Monitoring
4-101
6. Reset options available under STM-Regenerator Section are: Reset Regeneration Section/Section Current 15 Min Statistics and Reset Regeneration Section/Section Current Day Statistics. 7. Reset options available under Multiplex section are: Reset Multiplex Section/Line Current 15 Min Statistics, Reset Multiplex Section/Line Current Day Statistics, Reset Multiplex Section/Line Current 15 Min (Far End), Reset Multiplex Section/Line Current Day (Far End) describes the Regenerator Section performance parameters when the network element is operated in SDH mode. Table below describes the Regenerator Section Performance Parameters in SDH mode.
Table below describes the Section performance parameters when the network element is operated in SONET mode.
Table 4-53. Performance Parameters when the Network Element is Operated in SONET Mode
Parameter CV ES SES SEFS Description The code violations in the section. The errored second in the section. The severely errored second in the section. The severely errored framing seconds in the section.
4-102
Performance Monitoring
Interval Valid is the validity of the interval and the validity of data during that interval in the section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid
Table describes the Multiplex Section performance parameters when the network element is operated in SDH mode.
ES SES UAS SEP EB BBE ESR SESR BBER SEPI Interval Valid The errored second in the multiplex section. The severely errored second in the multiplex section. The unavailable second in the multiplex section. The severely errored period in the multiplex section. The errored blocks in the multiplex section. The background block errors in the multiplex section. The errored seconds ratio in the multiplex section. The severely errored seconds ratio in the multiplex section. The background block error ratio in the multiplex section. Displays the severely errored period intensity in the multiplex section. Interval Valid is the validity of the interval and the validity of data during that interval in the multiplex section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. ES-FE SES-FE BBE-FE UAS-FE SEP-FE Far End Interval Valid The errored seconds at far end in the multiplex section. The severely errored seconds at far end in the multiplex section. The background blocked errors at far end in the multiplex section. The unavailable seconds at far end in the multiplex section. The severely errored period at far end in the multiplex section. Displays the validity of data during that interval at far end in the multiplex section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.
Table below describes the Line performance parameters when the network element is operated in SONET mode.
Performance Monitoring
4-103
The unavailable second in the line section. The failure count in the line section. Interval Valid is the validity of the interval and the validity of data during that interval in the line section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.
The errored seconds at far end in the line section. The severely errored seconds at far end in the line section. The code violation errors at far end in the line section. The unavailable seconds at far end in the line section. The validity of data during that interval at far end in the line section. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.
Note
4-104
Performance Monitoring
The following table describes the Path performance parameters when the network element is configured in SONET mode.
Performance Monitoring
4-105
CV ES SES UAS FC PPJE NPJE Interval Valid ES-FE SES-FE CV-FE UAS-FE Far End Interval Valid
The code violations in the path. The errored second. The severely errored second. The unavailable second. The failure count in the path The positive pointer justification events. The negative pointer justification events. Interval Valid is the validity of the interval and the validity of data during that interval. The errored seconds at far end. The severely errored seconds at far end. The code violation errors at far end in the line section. The unavailable seconds at far end. The validity of data during that interval at far end.
Note
The current interval statistics of the Tributary Unit is available for the current time interval, previous 15 minutes, current day and the previous day.
Reset options available for each TU areReset All Current 15 Min Statistics, Reset All Current Day Statistics and Reset All Current 15 Min (Far End), Reset All Current Day (Far End). The following table describes the Tributary Unit/Virtual Tributary performance parameters.
4-106
Performance Monitoring
SES-L
4-108
Performance Monitoring
Indicates the validity of the interval. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid.
The following table describes DS1 Path Performance Parameters in SONET Mode.
Performance Monitoring
4-109
Errored Seconds Line (ES-L) is a count of the seconds containing one or more anomalies and/or defects on the line. The severely errored seconds in the line. Indicates if interval is valid. 1 indicates the data displayed during that Interval is valid, while 0 indicates the data is not valid.
The following table describes DS3 Path Performance Parameters in SONET Mode.
Note
The frame status of the port is displayed on the performance statistics page.
4-110
Performance Monitoring
To view Ethernet performance statistics: 1. Click Performance in the navigation menu. 2. Click Current interval to view performance statistics on current interval. 3. Click Ethernet. The Ethernet-Current interval statistics page is displayed. 4. Click the desired Ethernet port. The performance statistics of the selected Ethernet port is displayed. The following table describes the Ethernet Performance Parameters
Ethernet Interval Valid Packets RX/TX 64 Bytes Packets RX/TX 65-127 Bytes Packets RX/TX 128-255 Bytes Packets RX/TX 256-511Bytes Packets RX/TX 512-1023 Bytes Packets RX/TX 1024-1518 Bytes Packets RX/TX 1519-1522 Bytes Unacceptable Frame Type Frames Received Octets Received Frames Transmitted Octets Transmitted FCS Errors Frames Too Short RX
Pause Frames Received Broadcast Frames Received Broadcast Frames Transmitted Multicast Frames Received
Chapter 4 User Interface Guide Parameter Multicast Frames Transmitted Frame Fragment TX Frame Fragment RX Frame Jabber TX Frame Jabber RX Discarded Rx packets Discarded Tx Packets Service Lookup Failure Ingress Other Discards MTU Discards Packets RX/TX > 1522 (Jumbo Frames) Description
Count of number of multicast frames transmitted on the interface. Count of number of fragment frames transmitted on the interface. Count of number of received frames transmitted on the interface. Count of number of jabber frames transmitted on the interface. Count of number of jabber frames received on the interface. Count of number of receive frames discarded. Count of number of transmit frames discarded. Count of ingress frames which does not match any of the FP definitions. Count of frames discarded apart from the ingress definitions. Count of frames discarded based on MT. Count of number of 1522-9600 byte length packets.
4-112
Performance Monitoring
ES SES UAS Valid Frames Transmitted Valid Frames Received Valid bytes Transmitted Valid bytes Received Core Header Single Error Corrections Type Header Single Error Corrections Core Header CRC Errors Type Header CRC Errors Payload FCS Errors
Running Counters
Parameter Description Indicates whether the interval is valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. Count of frames discarded based on frame policy. Count of frames discarded based on MT Count of ingress frames which does not match any of the FP definitions. Count of frames discarded apart from the ingress definitions Count of number of valid frames received with correct FCS value Count of number of bytes received Count of number of frames transmitted Count of number of bytes transmitted Count of number of receive frames discarded
VCG Interval Valid Unacceptable Frame Type MTU Discards Service Lookup Failure Ingress Other Discards Frames Received Octets Received Frames Transmitted Octets Transmitted Discarded Rx packets
Performance Monitoring
4-113
Card Name Index Voltage Value Current Voltage Value (volts) Voltage high Threshold (volts) Voltage low Threshold (volts) Admin Status
The name of the card. The index value of the card. The voltage value required to be provided at the backplane. The voltage value received currently at the backplane. The maximum voltage threshold. The minimum voltage threshold. The admin status of the card.
4-114
Performance Monitoring
Installation and Operation Manual Parameter SES-P UAS-P Path Interval Valid Description
Displays the severely errored second on the path. Displays the unavailable second on the path. Displays the valid interval on the path.
OPERATOR2
Security Management
4-115
Can create and delete logins on the network element. Can configure Location, Contact, as well as management parameters such as Ethernet/Router IP Address/Masks.
Note
If a user account is not authenticated, the user session expires after the maximum of three retries.
The network element keeps sending authentication request for every one hour. The caching mechanism implemented in the network element prevents every command or web-page access to be sent to the RADIUS server(s) for authentication. An already logged in session does not terminate if connectivity to the RADIUS server is lost or if username or password information is changed on the RADIUS server. However, when the RADIUS server is reachable, the cached authentication information is valid only for an hour, after which authentication failed message is displayed and the user is prompted to login again with the new username and password. If the RADIUS server is not reachable, the active session continues and the user is prompted to login again in the next hour.
Note
If the password has been changed in the RADIUS server, and if a user uses the new password to log into the network element, all logged in users will have to relogin with the new password.
The following table describes the configurable RADIUS Parameters.
4-116
Displays the time in which communication should be established with the RADIUS server. Displays the domain name. Code for encrypting data sent to the RADIUS server. The same code needs to be configured on the RADIUS server also. Time duration (in seconds) within which communication should be established with the RADIUS server. Communication port of the RADIUS Server Priority of the RADIUS server
Timeout
Port Priority
To provision RADIUS server: 1. Click Security > RADIUS settings in the navigation menu. The View RADIUS page is displayed. 2. Click Provision a new RADIUS Server link. The Provision New RADIUS Server is displayed. 3. Select or enter values referring to table RADIUS Parameters. 4. Click Create. A "Successfully Created" message is displayed.
4-117
User Name
Access
USER
4-118
Parameter to indicate whether access is allowed or denied to the user. User Lockout Deny Access Allow access: The user is allowed to log-in to confirm the password access to the network element. Deny access: The user is denied access to the network element. Password assigned to the user for the user account. Acceptable value is a set of alphabetic, numeric or alphanumeric characters having exactly 8 characters. Password is case-sensitive. Password should be unique and different from User Name. Re-enter password to confirm the password.
Password
Confirm Password
4-119
User Name
Name assigned to the user account. Acceptable value is a set of alphabetic, numeric or alphanumeric characters having a maximum of 32 characters. User Name should be unique and is case sensitive. Access privilege assigned to the user account. Parameter to indicate whether access is allowed or denied to the user.
Access
USER
User Lockout
Deny Access
Allow access: The user is allowed to log-in to confirm the password access to the network element. Deny access: The user is denied access to the network element. Password assigned to the user for the user account. Acceptable value is a set of alphabetic, numeric or alphanumeric characters having exactly 8 characters. Password is case-sensitive. Password should be unique and different from User Name. Re-enter password to confirm the password.
Password
Confirm Password
Disabling users
The users with administrator privileges can disable a user account by setting the "User lockout" parameter. When the user is locked out during an active session, the authentication information stored in the cache is used for the session till the user logs out. The next time the user attempts to log into the network element, access is denied.
4-120 Working with the Radius Server Egate-2000 Ver. 1.0
Enabling User-Lockout
User-Lockout is usually done to prevent password guessing and unauthorized access to network element. Administrator needs to configure the following parameters to the network element: Max Invalid Login attempts: The maximum invalid login attempts, after which the user account would get locked out. Lockout Time: Time duration during which the locked users cannot connect to network element. During this lockout time, the authorized users cannot even connect to network element. After the lockout time expires, the user authentication would proceed as normal.
NOTE: In User lockout feature RADIUS users with ADMIN privilege can be locked through debug interfaces, namely telnet, ssh, ftp. RADIUS user, created with same name as LOCAL user will not be locked out, if the LOCAL user is an ADMIN.
To Enable Users Lockout: 1. Login to the network element with admin access privilege. 2. Click Security in the Navigation menu. 3. Click Security Settings. The Security settings page is displayed. 4. Select Enable UserLock Settings. 5. Click Submit. A success message is displayed. The following table describes the parameters on the Locked Users page
To configure UserLock: 1. Log on to the network element with admin access privilege.
4-121
2. Click Security in the Navigation menu. 3. Click Lock Users. 4. Set Lockout Time (seconds) 5. Set Maximum Invalid Attempt Count. 6. Click Submit. A success message is displayed. To View/Unlock Locked Users: 1. Log into the network element with admin access privilege. 2. Click Security in the Navigation menu. 3. Click Lock Users. 4. Select a user from the list. 5. Set Maximum Invalid Attempt Count. 6. Click Unlock.
Allows to enter the Login warning Allows to enter the Login Notice Enable Disable Enable Disable
Challenge-Response Authentication (CHAP) is a method for proving your identity over an insecure medium without giving any information out to eavesdroppers
4-122 Working with the Radius Server Egate-2000 Ver. 1.0
that may enable them to identify themselves as you. When CHAP method is enabled on the network element, the network element will use CHAP algorithm. The feature enables a secure authentication mechanism which can be used along with the normal LOCAL/RADIUS authentication mechanisms. To Enable Challenge-Response Authentication: 1. Click Security in the Navigation menu. 2. Click Security Settings. 3. Set the secret in TextBox, CHAP Secret (By default it is "testing123"). 4. Select Enable for CHAP Settings (By default it is enabled). 5. Click Submit. A success message is displayed. 6. To log into the node using Challenge-Response Authentication, 7. Enter Username. 8. Select Domain as CHALLENGE 9. Click Submit. 10. Enter response. 11. Click Submit. Authentication result is displayed.
Blocking IPs
Admin can block the IP's so that it disallows complete access to Network Element from that source IP. This feature is useful to block the malicious IP Address attempting to gain unauthorized access to Network Element. To View Blocked IPs: 1. Click Security in the Navigation menu. 2. 3. Click Security Settings. Select BlockedIPs link. The list of Blocked IPs is displayed. 4. To Block IP, 5. Log into the network element with admin access privilege. 6. Click Security in the Navigation menu. 7. Click Security Settings. 8. Select BlockedIPs link The list of Blocked IPs page is displayed. 9. Click Block a New IP link. 10. Enter IP in the IPAddress. 11. Click BlockIP.
Egate-2000 Ver. 1.0 Working with the Radius Server 4-123
A success message is displayed. 12. To Unblock IP, 13. Click Security in the Navigation menu 14. Click Security Settings. 15. Select BlockedIPs link 16. Select one of the IP in the list 17. Click UnblockIp. The open ports to NE might be unused and can be vulnerable to attacks from outside. Port scanners such as nmap utility can be used to determine the open ports on the NE. The hacker can stop/affect NE functionalities by detecting the vulnerabilities in any of these open ports. Administrator should block such vulnerable ports. After upgrading the services with latest patches, administrator can unblock these ports. To View Blocked Ports: 1. Click Security in the Navigation menu 2. Click Security Settings. 3. Click BlockedPorts link. The list of Blocked Ports is displayed. 4. To Block Ports, 5. Log into the network element with admin access privilege. 6. Click Security in the Navigation menu. 7. Click Security Settings. 8. Select BlockedPorts link List of Blocked Services page is displayed 9. Click Block a New Service. 10. Enter port number to be blocked. 11. Click BlockService. A success message is displayed. 12. To Unblock Port, 13. Click Security in the Navigation menu. 14. Click Security Settings. 15. Select BlockedPorts link. 16. Select one of the Ports from the list. 17. Click DeleteService. A success message is displayed.
4-124
Audit Logs
To view Audit logs: 1. Click Security in the navigation menu. The sub menu items are listed, based on the type of operation done 2. Click Audit Logs. The Audit Log page is displayed. The following table describes the parameters on the Audit Log page.
Displays the object ID on which the operation is done. Displays the attributes associated with object. Displays the Date and Time of the operation. Displays the Session number. Displays the type of interface used for the operation. Displays the name of the user. Displays the IP address of the Host. Click link to display the latest set of audit log. Click link to display the older set of audit log.
HTTP Sessions
The HTTP sessions menu enables you to configure the maximum number of HTTP sessions on the network element and the HTTP session timeout. The menu also displays all the active HTTP sessions at any point in time. The following table describes the HTTP Session Parameters:
The time duration after which the session times out. The maximum number of HTTP sessions allowed on the network element. Working with the Radius Server 4-125
Index User Host Client Established Last Activity Domain Connection Security Force-out
The Index number assigned to the session. The user logged into the network element. The remote IP address from which the network element is accessed. Displays the Browser name at the Host IP which is being used for the HTTP session. The date and time when the session was established. The date and time when the session was closed.
Displays the domain name. Displays Secure if login is HTTPS session and Insecure if the login is HTTP session The admin can terminate the HTTP session of the user or operator forcibly
Session history
To view active Sessions History: 1. Click Security in the navigation menu. The sub menu items are listed. 2. Click User Sessions.
4-126
3. Click Sessions History. The information on the Sessions history page is displayed. The following table describes the parameters on the Sessions History Page
To view InvalidLogins History: 1. Click Security in the navigation menu. The sub menu items are listed.
4-127
2. Click User sessions. The sub menu items are listed. 3. Click InvalidLogins History. The Invalid Login Sessions History page is displayed.
To view and edit system settings: 1. Click Maintenance > System Settings in the navigation menu. The System Settings preview pane is displayed.
4-128
Maintenance Operations
To view system changes, click Maintenance > System Changes in the navigation menu. The System Changes preview pane is displayed.
Maintenance Operations
4-129
Rebooting cards
Cards need to be rebooted in case of FPGA upgrades or when alarms are not reported properly on the card. Cards can be rebooted in two ways: Warm reboot: Warm reboot does not affect traffic on the card. Cold reboot: Cold reboot disrupts traffic on the card for the period while the card is rebooting.
4-130
Maintenance Operations
Performing Loop-backs
Loopbacks are performed to check the continuity on SDH/SONET or Ethernet ports. The ports can be configured for facility loopback. The exact location of failure can be detected using loopbacks. You can perform facility to test the optical (STM-1/4 or OC-3/12) connectivity of the network element. When a facility loopback is operated on optical ports, AIS is sent downstream.
Maintenance Operations
4-131
4-132
Maintenance Operations
Areas
The Area indicates the Open Shortest Path First area to which an attached network belongs. The area data structure contains all the information used to run the basic OSPF routing algorithm. Each area maintains its own link-state database. A network belongs to a single area, and a router interface connects to a single area. Each router adjacency also belongs to a single area. The following table describes the OSPF area parameters:
Database
The Database member displays the format and function of the LSA. The following table describes the OSPF Database Parameters:
Maintenance Operations
4-133
Interfaces
The Interfaces member displays the type of physical network interface. Different interfaces are eth, hdlcppp or ecc. The following table describes the OSPF interface parameters:
Neighbors
The Neighbors member displays the name of the physical network interface, address, router ID and state of the neighbors. The following table describes the OSPF neighbors parameters:
4-134
Maintenance Operations
Statistics
The Statistics member displays the checksum of number of external LSAs received by the network element and also the checksum of the Autonomous System (AS) externals. The following table describes the OSPF statistics parameters:.
Maintenance Operations
4-135
Chapter 4 User Interface Guide Field #Nbrs in Exchange MOSPF enabled Inter-area multicast Inter-AS multicast In overflow state Ospfd version Description
Displays the number of #Nbrs undergoing a database exchange. Displays if multicast OSPF is enabled or not. Displays if Inter-area multicast is supported or not. Not supported. Displays if the number of external LSAs has exceeded the upper limit. Displays the version of the OSPF software running in the network element.
LSA expansions
The LSA Expansion member allows selecting the format and function of the LSA. The following table describes the OSPF LSA expansions parameters:
Description Select the identity of set of networks grouped together by the OSPF. Select the format and function of the LSA. The following formats are available:
LS ID Adv Rtr
Enter the routing domain that is being described by the LSA. Enter the OSPF Router ID of the router originating the LSA.
AS externals
The AS externals member displays the number of LSAs in the database of the autonomous system. The following table describes the OSPF AS externals parameters:
4-136
Maintenance Operations
Installation and Operation Manual Field LS Seqno Xsum Length Age Description
Displays the signed 32-bit integer used to detect old and duplicate LSAs. Displays the checksum of the complete contents of the LSA, excepting the LS age field. Displays the size in bytes of the LSA. Displays the age of the LSA in seconds.
Routing table
The Routing Table member displays all the neighboring network element information indicating the number of hops to reach any node. The following table describes the OSPF Routing table parameters:
Opaque-LSAs
The Opaque-LSA member displays the checksum of the complete contents of the Opaque LSAs. The following table describes the OSPF Opaque-LSAs parameters:
Maintenance Operations
4-137
Ping
Trace route
4-138
Maintenance Operations
Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics.
To view system information: 1. Navigate to Maintenance > Diagnostic > DCN Monitor > System in the navigation menu. 2. Click on the desired System menu parameter that you want to view the information. The following table describes the Routing Table parameters.
Netstat
Maintenance Operations
4-139
Chapter 4 User Interface Guide Parameter Field Recv-Q Send-Q Local Address Foreign Address State PID/Program name Description
Specifies the number of bytes which are not received. Specifies the Number of Bytes not send to destination. Displays the local IP address. Displays the remote IP address. Unused Displays the program name.
Backing Up Configuration
The user interface provides options for backing up the configuration and storing it on a selected server. Backup configuration is used for saving the network element configuration. This command copies the existing snapshot of the configuration and stores it to the server mentioned using the FTP protocol. In case of backup failure, a backup operation failure alarm is raised. This command obtains the configuration, using the FTP protocol from a remote server, performs checks and accepts the configuration if applicable to the network element. In case of failure, a restore failure alarm is raised. Restoring the configuration can be done by either restoring from remote machine via FTP or from the local machine using HTTP. The network element gives an error message for the cause of the failure. The messages may be due to one of the following reasons: Username, password authentication failure Unable to reach the server IP address Incorrect permissions to transfer file
The network element can recover from restoration operation failures due to network unavailability by using FTP timeout of 15 seconds. The network element verifies the validity of the restored configuration. The activation of restored configuration shall be non-service affecting for the unaffected configuration. If the verification fails, the restored configuration is rejected and configuration restore failure alarm is raised. The network element raises an alarm on detecting configuration corruption or version mismatch without affecting traffic.
The Backup Configuration preview pane is displayed. 2. Select or enter values referring to Configuration Backup Parameters table. 3. Click Submit. You are connected to a PC on which you want to back up the configuration data. 4. Create a backup file in the PC.
Note
Note
The Node Configuration state is displayed at the bottom of the preview pane and is refreshed for every few seconds. The Configuration state displayed is the last operation performed with the configuration management.
Restoring Configuration
To restore configuration: 1. Click Maintenance > Configuration management > Restore Configuration in the navigation menu. The Restore Configuration preview pane is displayed. 2. Edit required values referring to the below table. 3. Click Submit. You are connected to the PC from which you want to restore configuration. 4. Locate and click the configuration file. The configuration is restored on the network element. 5. Click Commit for the restored configuration to take effect.
Maintenance Operations
4-141
Note
The remote server should have an FTP server installed on it to carry out the Restore configuration data command. For a Linux system, FTP server is inbuilt. For a windows system, an IIS server provided along with windows or any third party server such as 3com server needs to be installed.
The following table describes the Restore Configuration Parameters
Note
Cold reboot the shelf after committing the configuration. The Node Configuration state is displayed at the bottom of the preview pane.
Note
The password used for login is the same as the login password of the node. If the wrong password is entered, WUI will log out.
4-142
Maintenance Operations
To restore factory default settings: 1. Click Maintenance > Configuration management > Restore factory defaults in the navigation menu. The Restore factory defaults preview pane is displayed. 2. Check the option "Also Delete All User Profiles" to delete all the user profile. 3. Enter the password to proceed. 4. Click Restore factory defaults button.
The network element is re-initialized. Note All configuration information, event history and performance data will be deleted on restoring factory default settings. The Restore factory default operation brings down existing traffic. Perform this action only when the network element requires re-initialization. A power cycle is necessary after the operation. The Restore factory default operation does not delete configured user names and profiles. To delete the user names and profiles, select the Also delete All User Profiles check box.
Upgrading Software
Users with ADMIN privileges can download software, firmware and documentation from either the local machine using HTTP or a remote machine using FTP with all the upgrade binaries available on the FTP server. The process of downloading and activating software does not affect services. During the software download operation, existing functionality of the network element remains unaffected, unless otherwise stated in the release notes. You can download the SSL certificate through the user interface. A firmware upgrade involves the upgrade of boot loader, root file system and operating system. The firmware bundle is checked for checksum and the version. Firmware download is non-service affecting and requires a warm restart to take effect. During documentation upgrade, the documentation bundle is checked for checksum and the version. The five steps involved in the unified upgrade operations are: Software download: Downloads the software from remote or local machine onto the network element. The upgrade bundle present in the remote server is usually in the form of a tar kit containing a catalogue, the software and firmware. If the upgrade bundle does not contain the software and firmware, the software and firmware needs to be upgraded separately. When upgrading from a local machine, the software and firmware is usually upgraded separately. Check upgrade: Checks the downloaded software files for corruption. Also checks if the downloaded software file is the correct one required for upgrade. Load upgrade: Loads the downloaded content into the proper directory on the network element.
Maintenance Operations
4-143
Invoke upgrade: Invokes the new software on the network element. The node goes for a warm reboot. After invoking, the new software and firmware comes into effect and the network element is upgraded. Commit upgrade: On committing upgrade, the user cannot revert back to the previous software.
Note
Only software image files (with extension .img) can be downloaded using HTTP, where as firmware files, software load and documentation can be downloaded using FTP. The Upgrade operations menu is applicable only for some products.
Upgrading Software
To upgrade software: 1. Click Maintenance > Upgrade Operations > Unified Upgrade in the navigation menu. The Unified Upgrade preview pane is displayed. 2. Edit required values referring to the table. 3. Click Submit. The software download state is displayed at the bottom of the preview pane. 4. Click Stop/Start Refresh button to stop or start the refreshing of the software download state. The following table describes the Unified upgrade parameters.
User name of the system where the catalog. xml along with software, firmware resides. The password of the system where the catalog. xml along with software, firmware resides. The IP address of the system where the catalog.xml along with software, firmware resides.
4-144
Maintenance Operations
Installation and Operation Manual Parameter FTP Port (optional) Directory Default Value Description
The FTP port number for establishing connection with system where the catalog.xml along with software, firmware resides. The Directory where the catalog.xml along with software, firmware resides.
Note
User name, Password, IP Address, FTP Port and Directory are present only when the 'Deliver release from remote machine' is selected for Software Download Operation. For 'Deliver release from local machine', the File Name text field is displayed to enter the file name.
Upgrading Firmware
To upgrade firmware from remote machine: 1. Click Maintenance > Upgrade Operations > Firmware in the navigation menu. The Firmware download preview pane is displayed.
Egate-2000 Ver. 1.0 Maintenance Operations 4-145
2. Enter or select required values referring to table below. 3. Click Submit. The desired firmware is downloaded to the network element. 4. To upgrade firmware from local machine, 5. Click Maintenance > Upgrade Operations > Firmware in the navigation menu. The Firmware download preview pane is displayed. 6. Click the Download Firmware from local machine link. Enter or browse for the Firmware file name and click Submit. The firmware is downloaded on to the cross-connect card.
Note
While upgrading firmware in the Primary cross-connect card, the firmware is downloaded to both the primary and the secondary cross-connect cards. After the system is up after warm reboot on successful download, the primary and the secondary cross-connect cards have the same firmware.
The following table describes the Firmware download parameters
ARP
Address Resolution Protocol. A protocol in the TCP/IP suite used to associate logical addresses to physical addresses.
AU
Administrative Unit is the information structure which provides adaptation between the Higher-Order path layer and the Multiplex Section layer. The Virtual Container (VC) plus the pointers (H1, H2, H3 bytes) is called the Administrative Unit (AU).
C
CFM
Connectivity Fault Management. Ethernet CFM is an end-to-end, per-serviceinstance (refers to per VLAN) Ethernet layer OAM protocol, that includes proactive connectivity monitoring, fault verification, and fault isolation. End-toend can be PE to PE or Customer Edge to Customer Edge.
CRC
Cyclic Redundancy Check. A type of function that takes as input a data stream of
any length and produces as output a value of a certain fixed size. The term CRC is often used to denote either the function or the function's output.
CVLAN
Customer VLAN. Two sets of VLAN tags are used so that customers and carriers
can define a C-VLAN (customer VLAN).
D
DCN
Data Communication Network is SDH network that enables OAM communication between individual network elements as well as inter network element communication.
E
ELAN
Emulated Local Area Network. An emulated LAN is a set of clients and servers connected by virtual circuits over a network.
Glossary of Terms
4-147
EPLAN
Ethernet Private Local Area Network puts service access points as a basic unit to
realize the multipoint-to-multipoint transparent transmission of Ethernet MAC frame.
ERP
Ethernet Ring Protection. A mechanism used for reliable switching and avoiding
loops without using spanning tree protocols.
EVC
Ethernet Virtual Circuit. An entity that associates ports subscribing to the same
service.
EVPLAN
Ethernet Virtual Private Local Area Network. Permit service multiplexing at the Ethernet user-to-network interface. In EVPLAN, different users share the SDH bandwidth, the VLAN tag distinguishes data from different users.
F
FDB
Forwarding Database is a database that contains information that maps the
Media Access Control (MAC) address of each known device to the switch port where the device address was learned. The FDB also shows which other ports have seen frames destined for a particular MAC address.
FPCR
Flowpoint Classification Rule.
FPT
Flowpoint Template is a collection of rules (FPCR) that get assigned to a flowpoint to identify flows on the port. A flowpoint is based on a template comprising one or more classification rules. The flowpoint template is specific for 802.1q and 802.1ad interface.
FTP
File Transfer Protocol. A standard network protocol used to exchange and manipulate files over a TCP/IP based network, such as the Internet.
4-148
Glossary of Terms
I
IP
Internet Protocol. Network layer protocol in the TCP/IP stack offering a
connectionless internetwork service and providing features for addressing, typeof-service specification, fragmentation and reassembly, and security.
IP-Address
Internet Protocol Address. A 32-bit address assigned to host using TCP/IP. An IP
address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated by periods (dotted decimal format). Each address consists of a network number, an optional sub-network number, and a host number.
L
L2CP
Layer 2 Control Protocol is a set of different protocol that is applied at the UNI or per EVC. Link Aggregation Control Protocol (LACP) and Spanning Tree Protocol (STP) are Layer 2 control protocols.
LAG
Link Aggregation Group. A method for using multiple parallel links between a pair of devices as if it is a single higher-bandwidth channel.
LAN
Local Area Network. A computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics of LANs, in contrast to wide-area networks (WANs), include their usually higher data-transfer rates, smaller geographic place, and lack of a need for leased telecommunication lines.
LCAS
Link Capacity Adjustment Scheme. A method to dynamically increase or decrease
the bandwidth of virtual concatenated containers.
LED
Light Emitting Diode. A semiconductor diode that emits incoherent narrowspectrum light when electrically biased in the forward direction of the p-n junction. This effect is a form of electro-luminescence.
LFD
Plesiochronous Digital Hierarchy (PDH). A technology used in telecommunications
networks to transport large quantities of data over digital transport equipment such as fibre optic and microwave radio systems.
Egate-2000 Ver. 1.0 Glossary of Terms 4-149
M
MAC
Media Access Control. A sublayer of the Data Link Layer specified in the sevenlayer OSI model (layer 2). It provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multipoint network, typically a local area network (LAN) or metropolitan area network (MAN).
MAC Address
Media Access Control address. An addresstypically made up of numbers and lettersassigned to your hardware that uniquely identifies its place on the network.
MEP
Maintenance End Points. Connectivity Fault Management (CFM) divides the network into maintenance domains in the form of hierarchy levels, which are then allocated to users, service providers and operators. CFM assigns maintenance end points (MEPs) to the edges of each domain. This helps define the relationships between all entities from a maintenance perspective, to allow each entity to monitor the layers under its responsibility and easily localize problems.
MIM
MAC-in-MAC is an encapsulation scheme used by provider edge node for frame
forwarding and to make Ethernet frame more scalable. The MiM encapsulation scheme reduces the forwarding table size in the core network, but not in the provider edge nodes which need to maintain the entries of mapping end users MAC address to provider edge MAC address.
MSP
Multiplex Section Protection. A port level protection supported on the STM
interfaces. MSP schemes involve reserving a dedicated protection channel with the same capacity as the work channel.
MSPP
Multi-Service Provisioning Platform enable service providers to offer customers new bundled services at the transport, switching and routing layers of the network.
4-150
Glossary of Terms
N
NMS
Network Management System. An integrated platform for managing network
elements across an intelligent optical network. The NMS collects and represents data from geographically dispersed network elements on to a console in a centralized Network Operations Center (NOC).
NNI
Network to Network Interface. An interface which specifies signaling and
management functions between two networks.
O
OAM
Operation Administration Maintenance. A general term used to describe the
processes, activities, tools, standards, etc involved with operating, administering, managing and maintaining any system.
OSPF
Open Shortest Path First. A dynamic routing protocol for use in Internet Protocol
(IP) networks.
Q
QoS
Quality of Service. A mechanism that allows service providers to offer different classes of service to their customers.
R
RPL
Ring Protected Link. RPL owner node is a central node in Ethernet ring protection
switching which blocks one of the ports to ensure that there is no loop formed for the Ethernet traffic. The link which gets blocked by the RPL is called Ring Protection Link.
S
SD
Signal Degrade.
Glossary of Terms
4-151
SDH
Synchronous Digital Hierarchy. A standard technology for synchronous data
transmission on optical media that provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. In digital telephone transmission, synchronous means the bits from one call are carried within one transmission frame. Plesiochronous means almost (but not) synchronous, or a call that must be extracted from more than one transmission frame.
SFP
Small Form-factor Pluggable. A compact optical transceiver used in optical
communications for both telecommunication and data communications applications. It interfaces a network device mother board (for a switch, router or similar device) to a fiber optic or unshielded twisted pair networking cable.
SNMP
Simple Network Management Protocol. SNMP is used in network management
systems to monitor network-attached devices for conditions that warrant administrative attention. It consists of a set of standards for network management, including an Application Layer protocol, a database schema, and a set of data objects.
SONET
Synchronous Optical Network is an American National Standards Institute (ANSI) standard for high speed communication over fiber-optic networks. SONET uses time division multiplexing to send multiple data streams simultaneously.
STM
Synchronous Transport Module. The rate of transmission of the SDH (ITU-T fiber
optic network transmission) standard. The levels are STM-1, STM-4, STM-16 and STM-64.
SVLAN
S-VLAN Service Provider VLAN. A port VLAN ID configurable by the service provider
and can assign any value between 1 and 4094 of any Ethernet or VCG port on per-port basis.
T
TCA
Threshold Crossing Alert is set on B1, B2 and B3 bytes for Signal Failure (SF) and Signal Degrade (SD) conditions. The SD and SF conditions are sourced from error counts of B1, B2 and B3 parity bytes. TCA set for the B1, B2 and B3 bytes print a log message to the console when the TCA setting is enabled.
4-152
Glossary of Terms
TU
Tributary Unit is an information structure which provides adaptation between the
lower order path layer and the higher order path layer. It contains the Virtual Container and a tributary unit pointer.
V
VC
Virtual Container. A technique that allows SONET/SDH circuits to be grouped into arbitrarily sized bandwidth increments for more efficient transport of client protocols.
VCAT
Virtual Concatenation. An inverse multiplexing technique used to split SDH/SONET
bandwidth into logical groups, which may be transported or routed independently.
VCG
Virtual Concatenation Group. The VC channel bandwidth is divided into smaller
individual containers, which are grouped together and logically represented by a VCG.
Technical Support
4-153
4-154
Technical Support
International Headquarters
24 Raoul Wallenberg Street Tel Aviv 69719, Israel Tel. 972-3-6458181 Fax 972-3-6498250, 6474436 E-mail market@rad.com
www.rad.com