Professional Documents
Culture Documents
XpandIP+ Additional For Advance Course PDF
XpandIP+ Additional For Advance Course PDF
1 P/Q
Prerequisites
• Ethernet Topologies
• OSI 7 Layers model
What is VLAN?
Advantages for using VLAN
Regular Ethernet frame
Tagged frame structure
Types of VLAN
Types of connections
802.1P implementations
• Prioritization
• Filtering
• Provisioning
• Mapping (e.g. - ATM to/from ETH)
VLAN 1
Switch ports
VLAN 547
4 Bytes
8 Bytes 6 Bytes 6 Bytes 2 Bytes 46 - 1500 Bytes (32-bit
CRC)
4 Bytes
TPID = 0x8100 TCI
• CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over
ETH backbones (some vendors may use CFI for internal purposes)
ARP 0x0806
It is important that you understand the Q‐in‐Q (CISCO) 0x8100
meaning and usage of this parameter
Q‐in‐Q (other vendors) 0x88A8
Q‐in‐Q (other vendors) 0x9100
For example – ports 1,2 and 3 can see each other but cannot PING
other ports (different VLAN membership)
1 2 3 4
VLAN 22 5 6 7 8
VLAN 5
VLAN 9
VLAN 333
VLAN 100
VLAN 1
00:20:8f:40:15:ef
00:20:8f:40:15:30
VLAN 44
00:33:ef:38:01:23
00:33:ef:38:01:a0
00:33:ef:38:01:25
VLAN 5
10.10.10.12
10.10.10.122
10.10.10.13
VLAN 44
11.1.1.10.12
11.1.1.10
11.1.1.10.23
VLAN 5
VLAN aware Switch
A
VLAN aware Switch
A T
Device unaware of VLANs Switch tags the ingress frames with VID according to
transmits untagged specific Tagging mechanism
(regular) ETH frames
Switch un-tags frames with VID received from network
and delivers untagged frames to Access ports
VLAN aware Switch
T
A
A A
This port is not a member of the Trunk
port membership list, hence, traffic is
discarded
4 Bytes 4 Bytes
+
VLAN
aware Switch
CN PN
To match the priority level with the appropriate ATM service class and other parameters, the
switch then consults a mapping table with pre-defined settings.
P-Tag 6 CBR
P-Tag 4 VBR
P-Tag 0 UBR
Hub
GE
Site
FE/GE RNC
GE
STM1/
n x T1/E1
IP+ OC3
Tail site MPLS
IP+ ATM Router
Router Core
Site BSC/MSC
Hub
GE
Site
FE/GE RNC
GE
STM1/
n x T1/E1
IP+ OC3
STM1/
Tail site OC3
MPLS
IP+ MPLS Router
Router
Core
Site BSC/MSC
IEEE Recommendation
Ingress Number of Available Traffic Classes
The following table shows P‐Tags
IEEE definition of traffic 1 2 3 4 5 6 7 8
classes 0 (default) 0 0 0 0 0 1 1 1
• With a single queue, there are no choices. All traffic is Best Effort
• Multiple queues are needed to isolate Network Control from the user data traffic
• ETH – Ethernet
• NIC – Network Internet Card
• VID – Vlan ID
• VLAN – Virtual LAN
• P-TAG – Priority Tag, Priority Bits
• CFI – Canonical Format Indicator
• TPID – Tag Protocol Identifier
• FCS – Frame Check Sequence
• DA – Destination Address
• SA – Source Address
• QoS – Quality of Service
• IEEE 802.3 : Ethernet (Max. frame size = 1518 bytes)
• IEEE 802.1 d : MAC Bridge first introduced the concept of Filtering
Services in a bridged local network
• IEEE 802.1 q : VLAN Tagging
• IEEE 802.1 p : Priority Tagging / Mapping
• IEEE 802.1ag : OAM (CFM)
I6.8
Agenda
2. Access Port
3. Trunk Port
5. General Guidelines
• All frames that are received through this port are tagged with
default VLAN (VID + P bits)
• All frames that exit through this port towards customer devices are
untagged (VLAN is removed)
L2 ETH SW
Tagging
Port #8
Port #1
Tagged frame
DA SA Type Payload FCS
Tagging
Port #8
Port #1
Tagged frame
DA SA Type Payload FCS
• The switch can individually tag multiple Access ports with same VID or
unique VID
Tagging
Port #8
Port #1 Port #2
DA SA VLAN TAG = 10 Type Payload FCS
• To be able to transmit & receive multiple VLANs, the common port has to
be configured as a Trunk Port
Trunk Port
Port #8
Port #1 Port #2
DA SA VLAN TAG = 10 Type Payload FCS
Trunk Port
Port #8
Port #2
DA SA VLAN TAG = 10 Type Payload FCS
SA VLAN
DA Untagged TAG = 33
frames Type Payload FCS
10 Proprietary and Confidential
Trunk & Access – Extracting frames out of a Trunk
• A certain VLAN can be extracted out of a Trunk via Access port assigned
with specific VLAN membership (Default VID)
SA
DA Untagged VLAN TAG = 33
frames Type Payload FCS
• Access port can only receive untagged frames from customer device
• Access port can only transmit untagged frames towards customer device
Port #2:
Hybrid Port #8: Trunk
SA
DA Untagged VLAN TAG = 33
frames Type Payload FCS
1
3
2. Guidelines
Any traffic coming from any GbE interface will be sent directly to the radio and
vice versa.
Single pipe does not forward “PAUSE” PDU (01-80-C2-00-00-01) and “Slow
protocols” PDU (01-80-C2-00-00-02).
All Ethernet ports are allowed for traffic. Each traffic port can be configured to
be "access" port, "trunk" port or “hybrid”:
Allowed Egress
Type VLANs Allowed Ingress Frames
Frames
Only Untagged frames
Specific VLAN should be
Access (or Tagged with VID=0 – Untagged frames
assigned to access the port
"Priority Tagged“ )
A range of VLANs should be
Trunk Only Tagged frames Tagged frames
assigned to access the Port
Specific VLAN and a range of Only tagged frame as listed
Tagged and
Hybrid VLANs should be assigned to on the port and untagged
Untagged frames
access the port frames
Untagged
VID 4 45
VID 51 IP+ Switch
VID 100
Port 3 (RJ45)
No need to configure
VID membership
Port #2 as Trunk (VID 200)
IFU‐B
IFU‐A
Radios as Trunk by
default Port #2 as Trunk
Port #3 as Trunk
(VID 200, VID 300)
(VID 300)
Next steps:
1. Go to Interfaces page
2
1
IP+
Transmits and
receives
Transmits and Untagged
PC
receives frames
Untagged PC
frames 192.168.1.200
192.168.1.100
IP+
Trunk Port
Multiple L2
streams, each
identified with Traffic Generator
unique VID
Trunk Port
Network #1
C‐VLAN 100
S-VLAN 9 C‐VLAN 101
C‐VLAN 102
Radio Network 1
C‐VLAN 103
Ports
C‐VLAN 100
(PN) S-VLAN 8 C‐VLAN 101
Network 2 C‐VLAN 102
C‐VLAN 103
Network #2
19
Proprietary and Confidential
Simplified Flow
IP+
S-VLAN 1000
S-VLAN 222
S-VLAN 1000 PN CN CN
S-VLAN 222
Radio Port
CN
CN
CN
BTS #1:
C‐VLAN 100 CN
C‐VLAN 101
C‐VLAN 102
C‐VLAN 103
21
Proprietary and Confidential
CN-PN-PN-PN
C‐VLAN 100
S-VLAN 9 C‐VLAN 101
C‐VLAN 102
Radio BTS 2
C‐VLAN 103
BTS #2: Ports
C‐VLAN 100 C‐VLAN 100
C‐VLAN 101 (PN) S-VLAN 8 C‐VLAN 101
BTS 1 C‐VLAN 102
C‐VLAN 102 C‐VLAN 103
C‐VLAN 103
CN
CN
PN
BTS #1:
C‐VLAN 100
C‐VLAN 101
Customer Network Provider Network
C‐VLAN 102
C‐VLAN 103
22
Proprietary and Confidential
Switch Mode Configuration
23
Proprietary and Confidential
CN Port Configuration
24
Proprietary and Confidential
CN Port Configuration
3
4
5
25
Proprietary and Confidential
PN Port Configuration
26
Proprietary and Confidential
PN Port Configuration
27
Proprietary and Confidential
PN Port Configuration – Setting the S-Tag
• 0x88A8
• 0x8100
• 0x9100
• 0x9200
7
28
Proprietary and Confidential
Additional Information
Link Configuration:
Metro switch can work with a remote Metro switch or remote Single Pipe switch
Metro switch cannot work with a remote Managed switch
29
Proprietary and Confidential
Thank You
QoS Concept and Configuration
Agenda
• Introduction
MW
Radio
GE
WiMAX / 4G / LTE
Cellular site
WiMAX
STM-1 / OC-3
XPAND IP+ XPAND IP+
Hub / Aggregation site
TDM
E1/T1
Multimedia
emails
FTP
Who’s first?
8 Proprietary and Confidential
Traffic Engineering as a Solution
Your 1st assignment is identifying needs & solutions:
Static
Dynamic WWW
What is the BW requirement per service ? WWW
emails
What is the delay sensitivity of each service? FTP
• Delayed Voice is inacceptable…
• FTP can tolerate delays
Skype
Your 2nd assignment is grouping services into SLAs:
• Video & Multimedia – Low Services (Best Effort)
• FTP – Moderate Service
• Skype – Highest Service
12
Proprietary and Confidential
Ingress VS. Egress
Every Switch port applies Ingress Rules and Egress Rules depending on traffic
characteristics (L2 header and applied policies)
Ingress Egress
port port
Customer Provider
Network Network
Egress Ingress
port port
Customer Provider
Network Network
Ingress
Egress
Radio Radio
Egress
Ingress
FE Max. 100Mbps
Rate
25 Discard
Max. Allowed
10 50 Rate
Pass
Actual
Customer
Traffic
Time
Every port of the L2 switch examines the ingress traffic and then it sorts it in a
buffer according to classification criteria
Users can configure up to 4 queues where Q4 has the max. priority and Q1
has the lowest priority
Q4 High
Q3
Q2
Q1 Low
Once the queues are filled with information, we need to empty them
Q1 Low
Q1
Q2 Q2
Q3 Q3
Q4
Q4 High
time
t1 t2 t3 t4
18 Proprietary and Confidential
Scheduling: Weighted Round Robin
Q1 Low
Q1
Q2 Q2
Q3 Q3
Q4
Q4 High time
t1 t2 t3 t4 t5
The switch will empty a queue as long as the higher queue is empty
No need for
Ingress Queuing
Radio Radio
Ingress Queuing is
required in port 8
Radio Radio
• Introduction to Ethernet
• 802.1p/q
• QoS (Concept)
• Introduction
• Process Review
• Basic Configurations
• Traffic shaping
NO
Frame qualifies YES
to 2nd criteria? Queue / Remap
NO
Frame qualifies YES
to 3rd criteria?
Queue / Remap
NO
Default Queue
9 Proprietary and Confidential
Process Review
Policer per port
25
10 50
Rate Limit
Queuing
Q4 Q4
Q1 Q3
Q2
Scheduling
Shaping
Click on the VLAN Pbits to Queue link to open the configuration table
Frames with MAC that do not comply to the table will be classified by the 2nd &
3rd classifiers
Frames with VID that do not comply to the table will be classified by the 3rd
classifier
• Reducing the egress rate to a value between 64kbps and 1Mbps requires
setting it in steps of 64kbps
• Reducing the egress rate to a value between 1Mbps and 100Mbps requires
setting it in steps of 1Mbps
• Reducing the egress rate to a value between 100Mbps and 1Gbps requires
setting it in steps of 10Mbps
• Introduction
• Interfacing IP+ with external devices
• Configuration VS. Functionality
• Dead Lock Example
• ASP in Managed / Metro Mode
The feature allows the user to configure which criteria will force GbE port (or ports in case
of “remote fault”) to be muted / shut down, in order to allow the network find alternative
paths.
Radio LOF
Need to find
alternative path
TX RX
RX TX
TX
LOC
RX
RX TX
TX
LOC
RX
RX X TX
TX
LOC
RX
LOC
RX X TX
TX
LOC
X RX
LOC
RX X TX
11
Single Pipe - Propagation Criteria
Local and remote IFUs must
Using Optical GbE (SFP) have identical settings:
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Local Criteria:
• LOC (GbE)
• Radio LOF
• LINK ID Mismatch
• Excessive BER
• ACM profile is below threshold
1 8 8 1
Actions: Actions:
Mute port 1 (GbE ‐SFP) Mute port 1 (GbE ‐SFP)
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Local Criteria:
• Radio LOF
• LINK ID Mismatch
• Excessive BER
• ACM profile is below threshold
8 8
Actions: Actions:
Shut down Elec. Shut down Elec.
port port
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Local GbE Criteria: 8 8
• LOC
LOC will not trigger port shut Remote LOC will not trigger
down (it will not be possible to port shut down (it will not be
enable the port when LOC is possible to enable the port
cleared) when LOC is cleared)
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Local Criteria:
• Radio LOF
• LINK ID Mismatch
• Excessive BER
• ACM profile is below threshold
8 8
Actions:
Shut down Radio
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Local criteria: 8 8
• GbE LOC Actions:
No action taken
Shut down Radio
UL
GAP
Low High
f9 f10 f11 f12 f13 f14 f15 f16 f9’ f10’f11’f12’f13’f14’f15’f16’
DL
UL
50% More Capacity
High
A B
14MHz 14MHz
A->B B->A
Low High
21MHz 7MHz
f1’ f2’
f2
Asymmetric 7+7+7=21MHzf1 f4
A->B B->A
Legend
21MHz 14MHz 7MHz
f1’f2’ UL f3f4 UL
• In regular planning we get capacity of ~100Mbps (200Bytes frame length) both ways but
only partially utilize it in the UL direction.
• We will split each 14MHz channel into two 7MHz segments. We are using over all 8
such segments (for down and up directions)
150Mbps
150Mbps
DL
DL f1f2 f3 f2’f3’f4’
f1’ UL f4 UL
100Mbps 200Mbps
DL f1f2 f5’f6’f7’f8’
DL
f1’f2’ UL UL
100/33Mbps f5 f6 f7 f8
100Mbps f3 f4
DL 200Mbps/used 66Mbps
f3’f4’
UL
100Mbps/used 33Mbps
• In regular planning we get ~200Mbps at the feed and 100Mbps for each tail.
f1’ UL
50/33Mbps f7 f8 UL
150Mbps f4 f5 f6
DL 100Mbps/used 66Mbps
f2’ UL
50Mbps/used 33Mbps
• We now have ~300Mbps at the feed using 42MHz channel for the DL and 14MHz for
the UL, and 150Mbps at the tails using 21MHz channels for the DL and 7MHz for the
UL. (200bytes)
• Overall we use the same spectrum (56MHz) and get 50% more capacity.
f1’ f2’
f3’ f4’
F B
f3’ f4’
f1’ f2’
f3 f4
f1 f2
E C
f1 f2
f3’ f4’ f3 f4
f1’ f2’
D
• In regular planning we have a 200Mbps ring (28MHz 200Byte). We can
sustain up to 66Mbps per site when there are no failure, and it can drop to
40Mbps per site if there is a failure near the root.
9 Proprietary and Confidential
Example 4 – Rings cont.
• We will spilt the 28MHz into four segments of 7MHz.
f1 f2 f3 f2 f3 f4
A
f1’
F f4’
f2’ f3’ f4’
B
f1’ f2’ f3’
f4
f1
E C
f1
f1’ f2’ f3’ f4’ f2 f3 f4
D
• We now have 300Mbps from the root in both direction, and 100Mbps toward
root. (when there are no failures in the ring).
• We increase capacity by 50%.
10 Proprietary and Confidential
Example 4 – Failures in the Ring
• Assume failure far from the root.
f1 f2 f3 f2 f3 f4
A
f1’
f4’
F B
f2’ f3’ f4’
f1’
f4
f1
E C
f1 f2 f3
f1’ f2’ f3’ f4’ f4
D
• We need to change segment allocation in nods C, D, E because the
direction of traffic changed in those nodes. We still have 300Mbps in the DL
direction
11 Proprietary and Confidential
Example 4 – Failures in the Ring
• Assume failure near the root.
f1 f2 f3 f4
A
f1’
f4’
F B
f2’ f3’ f4’
f1’
f4
f1 f2 f3
E C
f1 f2 f3
f2’ f3’ f4’ f4
f1’
D
• We need to change segment allocation in nods B, C, D, E because the
direction of traffic changed in those nodes. We still have 300Mbps in the DL
direction Æ 60Mbps per site in the DL direction which is 50% more
12 Proprietary and Confidential
Practical exercise
13
Content
• Preparation
• Theoretical link
• Configuration
• Practical example
• Make sure you have activated software license for asymmetrical link
2. TX / RX script
TX / RX TX / RX
DL
UL
DL
270Mbps
85Mbps
UL
DL
UL
• Student Perquisites
• General Overview
• Limitations
• Switchover Criteria
• In Band Management
• Configuration Example
• BRIDGE ID = 64 bit =
Bridge Bridge
A B
I am the
Root
Bridge ID:4261.00-00-00-00-00-02 Bridge
C
Bridge Bridge
A B
Bridge Bridge
A B
Root ID: 4261.00‐00‐00‐00‐00‐02
Root ID: 4261.00‐00‐00‐00‐00‐02
Bridge Bridge
A B
I am still
Bridge ID:4261.00-00-00-00-00-02 Bridge
Root ID: 4261.00-00-00-00-00-02 the Root!
C
Bridge Bridge
A B
I am still
Bridge ID:4261.00-00-00-00-00-02 Bridge
Root ID: 4261.00-00-00-00-00-02 the Root!
C
I am the
Bridge ID:4261.00-00-00-00-00-01 Root! Bridge ID:4261.00-00-00-00-00-09
Root ID: 4261.00-00-00-00-00-01 Root ID: 4261.00-00-00-00-00-02
Root ID: 4261.00‐00‐00‐00‐00‐01
Bridge Bridge
A B
Root ID: 4261.00‐00‐00‐00‐00‐01
Bridge Bridge
09>01
A B
Bridge A is
the Root
02>01
Bridge ID:4261.00-00-00-00-00-02 Bridge Bridge A is
Root ID: 4261.00-00-00-00-00-02
C the Root
Root ID: 4261.00‐00‐00‐00‐00‐01
Root Port
(RP)
Root Port
(RP) Designated
Port (DP)
Bridge ID:4261.00-00-00-00-00-02 Bridge
Root ID: 4261.00-00-00-00-00-01 Designated
C
Port (DP)
A designated port forwards traffic away from
the Root and towards the leaves…
RP DP
Bridge ID:4261.00-00-00-00-00-02 Forward
Bridge
Root ID: 4261.00-00-00-00-00-01
C
DP
DP = Forward Forward
NDP = Blocked (Listen, No-Talk)
RP = Forward
Bridge DP RP Bridge
A B
DP
DP DP NDP
Link Failure
Forward
RP DP
Bridge ID:4261.00-00-00-00-00-02 Bridge
Root ID: 4261.00-00-00-00-00-01
C
DP
STP errors:
With this feature enabled, XPAND IP+ can merge with existing
standard RSTP networks.
• The ring is revertible. When the ring is set up, it is converged according to
RSTP definitions. When a failure appears (e.g. LOF is raised), the ring is
converged. When the failure is removed (e.g. LOF is cleared) the ring reverts
back to its original state, still maintaining service disruption limitations.
• RSTP PDUs coming from “Edge” ports are discarded (and not processed or
broadcasted).
2. Ring RSTP gives improved performance for ring topologies. For any other
topology the algorithm will converge but performance may take several
seconds:
• For this reason, there should be only 2 edge ports in every node.
• Also, only one loop should be present
4. Ring RSTP may run with protection 1+1, but in some cases (change of root
node) the convergence time may be above 1sec.
1. Node/Site Type A:
• The site is connected to the ring with one Radio interface (e.g. East) and one
Line interface (e.g. West).
• The site contains only one IP+ IFU. The Radio interface towards one direction
(e.g. East), and one of the Gigabit (Copper or Optical) interfaces, towards the
second direction (e.g. West).
• Other line interfaces are in “edge” mode, meaning, they are user interfaces,
and are not part of the ring itself.
2. Node/Site Type B:
• The site is connected with Radios to both directions of the ring (e.g. East &
West).
• Site contains two IFUs. Each IFU support the Radio in one direction
• One IFU runs with the “Ring RSTP”, and the second
runs in “Single pipe” mode.
• Radio LOF
Note:
• Link ID mismatch. Ring port (non-edge port)
shutdown will initiate
• Radio Excessive BER (optional) convergence!
• “Managed Switch” IFUs will be configured to “In-Band”, while “Single Pipe” IFUs will be
configured to “Out-of-Band”.
• “Single Pipe” nodes will be connected with external Ethernet cable to the
“Managed Switch” for management.
Site #1 Site #2
1 6 7 1 6 7
Pipe (slot #2) Pipe (slot #2)
1 2 3 4 5 6 7 1 2 3 4 5 6 7
Managed (slot #1) Managed (slot #1)
Site #3
1 6 7
Managed (slot #2)
1 2 3 4 5 6 7
Managed (slot #1)
EMS
1. You may start with out of band configuration to avoid physical loops
2. Establish the Radio links according to the setup scheme
Site #1 Site #2
1 6 7 1 6 7
Pipe (slot #2) Pipe (slot #2)
1 2 3 4 5 6 7 1 2 3 4 5 6 7
Managed (slot #1) Managed (slot #1)
Site #3
1 6 7
Managed (slot #2)
1 2 3 4 5 6 7
Managed (slot #1)
EMS
3. Connect between slot 2 and slot 1 using ports number 1 and fibers
4. Enable RSTP in all Managed Switch IFUs (see next slide)
Site #1 Site #2
1 6 7 1 6 7
Pipe (slot #2) Pipe (slot #2)
1 2 3 4 5 6 7 1 2 3 4 5 6 7
Managed (slot #1) Managed (slot #1)
Site #3
1 6 7
Managed (slot #2)
1 2 3 4 5 6 7
Managed (slot #1)
EMS
Site #1 Site #2
1 6 7 1 6 7
Pipe (slot #2) Pipe (slot #2)
1 2 3 4 5 6 7 1 2 3 4 5 6 7
Managed (slot #1) Managed (slot #1)
Site #3
1 6 7
Managed (slot #2)
1 2 3 4 5 6 7
Managed (slot #1)
EMS
8. PING EMS to all Sites at the same time (multiple PING sessions)
9. Examine which switch is the Root Bridge and which ports are the Root Ports
10. Verify that the ring is set up properly (one Root)
11. Identify the Edge Ports and Non-Edge ports in your setup and make sure they are
configured correctly
• Disconnect a radio link and make sure PING to all Main units is maintained
• Restore connectivity.
• Disconnect a different radio link and make sure PING to all Main units is
maintained
The bigger the port capacity is, the lower this value
becomes
For example:
1GbE is given lower path cost than FE port
Definition
Advantages
Feature Review
Applications
LAG Configuration
IEEE Definition:
The capacity of the multiple links is combined into one logical link.
100 Mbps
2. Improved Resiliency
In case of a failed link, remaining links take over utilization of new available BW
When multiple ports are allocated between two ETH switches, broadcast storms are
created due to physical loops. STP is required to eliminate loops by blocking the redundant
port.
When multiple ports are allocated between 2 Routers, Routing Protocols are required to
control traffic paths.
With LA – STP or routing protocols are not needed, therefore, less processing is involved.
4. Reduced Cost
For sites with limited IP address space that nevertheless require large amounts of
bandwidth, you need only one IP address for a large aggregation of interfaces.
For sites that need to hide the existence of internal interfaces, the IP address of
the aggregation hides its interfaces from external applications.
Multiple
Interfaces
Single
Interface
Customer Public
Network Network
9 Proprietary and Confidential
Feature Review
LAG Distribution Policy
Traffic sent to ports in a group is distributed through a load balancing function.
Two methods are available for Link Aggregation Group traffic distribution:
1. Simple XOR:
In this method the 3 LSBs of DA and SA are XORed and the result is used to select
one of the ports in the group.
2. Hash (default):
In this method the hash function (used by the traffic switch for address table lookups)
is used to select one of the ports in the group.
8. LAGs are virtual ports that do not permanently exist in the system
10. The LAG will initially receive default values for these parameters
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
Single Pipe
1 2 3 4 5 6 7 8
GbE
1 2 3 4 5 6 7 8 PHY
Multiple FE
ports as a LAG
GbE
PHY Port #2 and Radio
form a LAG
1 2 3 4 5 6 7 8
Static LAG
3rd party
Switch or Router
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
No need for LAG
Switch or Router
1 2 3 4 5 6 7 8
Static LAG 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
Switch or Router Static LAG
Static LAG 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
Switch or Router Static LAG
• Any failure in the local GbE interfaces will be handled by the link aggregation
mechanism without triggering switch-over to the “back-up” IP+ unit!
1 2 3 4 5 6 7 8
50%
P
1 2 3 4 5 6 7 8
S
GbE 50%
PHY
Port #2 and Radio
form a LAG
Traffic injected via GbE port #1 is distributed evenly between Port #2 & Port #8
Port #2 is linked to a Pipe IFU, hence, a Multi-Radio system is achieved:
GbE port #1 = (50% via Radio #1) + (50% via Radio #2)
1 2 3 4 5 6 7 8
S
1 2 3 4 5 6 7 8
S
GbE X
50% 100%
PHY
100%
To improve system resiliency, Automatic State Propagation can shut down the
LAG interface when ACM degrades below a pre-determined profile.
Please note - ports with CFM MEP/MIPs will not be added to a LAG (which may
have its own MEP/MIPs).
• Admin status
• Flow control
• Ingress rate limiting Policer name
• Shaper (egress rate limiting)
• Peer port parameters
• MAC address
• IP address
• Slot ID
• Port number
• Description
:
• Ports removed from a LAG will keep the existing port parameters, but will
be initially disabled in order to prevent loops.
• In addition, when the last port is removed from a LAG, the LAG will be
deleted.
Open page:
Configuration / Ethernet Switch
2. QoS mismatch
3. VLAN membership mismatch
4. Physical properties mismatch (auto-neg, speed, flow control etc.)
Check the Ethernet Ports + QoS pages and compare these parameters if
problem continues
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Data stream
Data stream
Proprietary and Confidential
Using RMON (PM) to analyze LAG
Make note of received &
transmitted traffic through port 1
Please note:
Slight differences may appear
since EMS is a web based
application and data is
accumulating
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
Data stream
Proprietary and Confidential
Using RMON (PM) to analyze LAG
Check the received & sent
registers of port 1 and LAG
ports:
+
=
• SSH
• HTTPS
• SFTP
• Password
The status of the download operation can be monitored. The returned status
values are: “ready”, “in-progress”, “success”, “failed”.
To apply the new certificate, the WEB server should be restarted (“Admin”
privilege). WEB server will be automatically restarted when it is configured to
HTTPS.
Note:
This parameter is NOT copied when “copy to mate” operation is initiated,
for security reasons (unsecured unit should not be able to override security
parameters of secured unit).
• Configuration upload/download,
• Upload the unit info.
• Upload public key.
• Download certificate files.
• SW download
A valid password should be a mix of upper and lower case letters, digits, and other
characters.
You can use an 8 character long password with characters from at least 3 of these 4
classes. An upper case letter that begins the password and a digit that ends it do not
count towards the number of character classes used.
Good example:
L00pBack – using capital letters, small letters and digits (zeros instead of “O”)
Bad example:
Loopback – missing digits or other characters