Professional Documents
Culture Documents
ETX-5 MN
ETX-5 MN
INSTALLATION AND
ETX-5
Ethernet Service Aggregation Platform
Version 2.8
ETX-5
Ethernet Service Aggregation Platform
Version 2.8
Installation and Operation Manual
Notice
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD").
No part of this publication may be reproduced in any form whatsoever without prior written
approval by RAD Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other
intellectual property or other proprietary rights relating to this manual and to the ETX-5 and any
software components contained therein are proprietary products of RAD protected under
international copyright law and shall be and remain solely with RAD.
The ETX-5 product name is owned by RAD. The ETX-5 product name is owned by RAD. No right,
license, or interest to such trademark is granted hereunder, and you agree that no such right,
license, or interest shall be asserted by you with respect to such trademark. RAD
products/technologies are protected by registered patents. To review specifically which product
is covered by which patent, please see ipr.rad.com. The RAD name, logo, logotype, and the
product names MiNID, Optimux, Airmux, and IPmux, are registered trademarks of RAD Data
Communications Ltd. All other trademarks are the property of their respective holders.
You shall not copy, reverse compile or reverse assemble all or any portion of the Manual or the
ETX-5. You are prohibited from, and shall not, directly or indirectly, develop, market, distribute,
license, or sell any product that supports substantially similar functionality as the ETX-5, based
on or derived in any way from the ETX-5. Your undertaking in this paragraph shall survive the
termination of this Agreement.
This Agreement is effective upon your opening of the ETX-5 package and shall continue until
terminated. RAD may terminate this Agreement upon the breach by you of any term hereof.
Upon such termination by RAD, you agree to return to RAD the ETX-5 and all copies and portions
thereof.
For further information contact RAD at the address below or contact your local distributor.
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the ETX-5 to be delivered hereunder shall be
free of defects in material and workmanship under normal use and service for a period of twelve
(12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by
reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect,
RAD shall have the option to choose the appropriate corrective action: a) supply a replacement
part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at
the equipment's location. In the event that RAD requests the return of equipment, each party
shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or
modifications were made by persons other than RAD's own authorized service personnel, unless
such repairs by others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no
warranties which extend beyond the face hereof, including, but not limited to, warranties of
merchantability and fitness for a particular purpose, and in no event shall RAD be liable for
consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not
limited to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the ETX-5, and in no event shall
RAD's liability exceed the purchase price of the ETX-5.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to ETX-5 and for ensuring that replacements and other adjustments required in
connection with the said warranties are satisfactory.
Software components in the ETX-5 are provided "as is" and without warranty of any kind. RAD
disclaims all warranties including the implied warranties of merchantability and fitness for a
particular purpose. RAD shall not be liable for any loss of use, interruption of business or
indirect, special, incidental or consequential damages of any kind. In spite of the above RAD
shall do its best to provide error-free software products and shall offer free Software updates
during the warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the ETX-5 shall not
exceed the sum paid to RAD for the purchase of the ETX-5. In no event shall RAD be liable for
any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD
has been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of
Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal waste at
the end of its life cycle. Upon termination of the unit’s use, customers should
provide for its collection for reuse, recycling or other form of environmentally
conscientious disposal.
ii ETX-5
Installation and Operation Manual Front Matter
Safety Symbols
This symbol may appear on the equipment or in the text. It indicates
potential safety hazards regarding product operation or maintenance to
operator or service personnel.
Warning
Danger of electric shock! Avoid any contact with the marked surface while
the product is energized or connected to outdoor telecommunication lines.
Some products may be equipped with a laser diode. In such cases, a label
with the laser class and other warnings as applicable will be attached near
the optical transmitter. The laser warning symbol may be also attached.
Warning Please observe the following precautions:
• Before turning on the equipment, make sure that the fiber optic cable is
intact and is connected to the transmitter.
• Do not attempt to adjust the laser drive current.
• Do not use broken or unterminated fiber-optic cables/connectors or look
straight at the laser beam.
• The use of optical devices with the equipment will increase eye hazard.
• Use of controls, adjustments or performing procedures other than those
specified herein, may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
In some cases, the users may insert their own SFP laser transceivers into the product. Users are
alerted that RAD cannot be held responsible for any damage that may result if non-compliant
transceivers are used. In particular, users are warned to use only agency approved products that
comply with the local laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation and maintenance of
this product. Only qualified and authorized service personnel should carry out adjustment,
maintenance or repairs to this product. No installation, adjustment, maintenance or repairs
should be performed by either the operator or the user.
ETX-5 iii
Front Matter Installation and Operation Manual
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.
iv ETX-5
Installation and Operation Manual Front Matter
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A (20A for USA and Canada). The circuit breaker in the building installation
should have high breaking capacity and must operate at short-circuit current exceeding 35A (40A
for USA and Canada).
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF
position. When connecting the DC supply wires, first connect the ground wire to the
corresponding terminal, then the positive pole and last the negative pole. Switch the circuit
breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.
ETX-5 v
Front Matter Installation and Operation Manual
When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.
Caution To reduce the risk of fire, use only No. 26 AWG or larger telecommunication
line cords.
Attention Pour réduire les risques s’incendie, utiliser seulement des conducteurs de
télécommunications 26 AWG ou de section supérieure.
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
vi ETX-5
Installation and Operation Manual Front Matter
ETX-5 vii
Front Matter Installation and Operation Manual
Symboles de sécurité
Ce symbole peut apparaitre sur l'équipement ou dans le texte. Il indique des
risques potentiels de sécurité pour l'opérateur ou le personnel de service,
quant à l'opération du produit ou à sa maintenance.
Avertissement
viii ETX-5
Installation and Operation Manual Front Matter
Certains produits peuvent être équipés d'une diode laser. Dans de tels cas,
Français
une étiquette indiquant la classe laser ainsi que d'autres avertissements, le
cas échéant, sera jointe près du transmetteur optique. Le symbole
d'avertissement laser peut aussi être joint.
Avertissement
Veuillez observer les précautions suivantes :
• Avant la mise en marche de l'équipement, assurez-vous que le câble de
fibre optique est intact et qu'il est connecté au transmetteur.
• Ne tentez pas d'ajuster le courant de la commande laser.
• N'utilisez pas des câbles ou connecteurs de fibre optique cassés ou sans
terminaison et n'observez pas directement un rayon laser.
• L'usage de périphériques optiques avec l'équipement augmentera le
risque pour les yeux.
• L'usage de contrôles, ajustages ou procédures autres que celles
spécifiées ici pourrait résulter en une dangereuse exposition aux
radiations.
ATTENTION : Le rayon laser peut être invisible !
Les utilisateurs pourront, dans certains cas, insérer leurs propres émetteurs-récepteurs Laser SFP
dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas être tenue responsable de
tout dommage pouvant résulter de l'utilisation d'émetteurs-récepteurs non conformes. Plus
particulièrement, les utilisateurs sont avertis de n'utiliser que des produits approuvés par
l'agence et conformes à la réglementation locale de sécurité laser pour les produits laser de
classe 1.
Respectez toujours les précautions standards de sécurité durant l'installation, l'opération et la
maintenance de ce produit. Seul le personnel de service qualifié et autorisé devrait effectuer
l'ajustage, la maintenance ou les réparations de ce produit. Aucune opération d'installation,
d'ajustage, de maintenance ou de réparation ne devrait être effectuée par l'opérateur ou
l'utilisateur.
ETX-5 ix
Front Matter Installation and Operation Manual
Connexion d'alimentation CC
Sauf s'il en est autrement spécifié dans le manuel, l'entrée CC de l'équipement est flottante par
rapport à la mise à la terre. Tout pôle doit être mis à la terre en externe.
A cause de la capacité de courant des systèmes à alimentation CC, des précautions devraient
être prises lors de la connexion de l'alimentation CC pour éviter des courts-circuits et des risques
d'incendie.
Assurez-vous que l'alimentation CC est isolée de toute source de courant CA (secteur) et que
l'installation est conforme à la réglementation locale.
La capacité maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A (20A aux Etats-Unis et Canada). Le coupe-circuit dans l'installation du
bâtiment devrait avoir une capacité élevée de rupture et devrait fonctionner sur courant de
court-circuit dépassant 35A (40A aux Etats-Unis et Canada).
Avant la connexion des câbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'équipement et fixez-le
en position OFF. Lors de la connexion de câbles d'alimentation CC, connectez d'abord le
conducteur de mise à la terre à la borne correspondante, puis le pôle positif et en dernier, le
pôle négatif. Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapté et approuvé devrait être intégré à l'installation du
bâtiment.
Le disjoncteur devrait déconnecter simultanément les deux pôles si l'alimentation en courant CC
est flottante.
x ETX-5
Installation and Operation Manual Front Matter
EU Declaration of Conformity
Manufacturer's Name: RAD Data Communications Ltd.
Supplementary Information: The product herewith complies with the requirements of the EMC
Directive 2014/30/EU, the Low Voltage Directive 2014/35/EU and the
ROHS Directive 2011/65/EU.
The product was tested in typical configurations.
Signed for and on behalf of
RAD Data Communications Ltd.
Tel Aviv, 4 April 2016
Nathaniel Shomroni
Homologation Team Leader
ETX-5 xi
Front Matter Installation and Operation Manual
Glossary
Address A coded representation of the origin or destination of data.
AWG The American Wire Gauge System, which specifies wire width.
Balanced A transmission line in which voltages on the two conductors are equal
in magnitude, but opposite in polarity, with respect to ground.
Bandwidth The range of frequencies passing through a given circuit. The greater
the bandwidth, the more information can be sent through the circuit
in a given amount of time.
Bit A process used in time division multiplexing where individual bits from
Interleaving/Multiplexing different lower speed channel sources are combined (one bit from
one channel at a time) into one continuous higher speed bit stream.
bps (Bits Per Second) A measure of data transmission rate in serial transmission.
Bridge A device interconnecting local area networks at the OSI data link layer,
filtering and forwarding frames according to media access control
(MAC) addresses.
Cell The 53-byte basic information unit within an ATM network. The user
traffic is segmented into cells at the source and reassembled at the
destination. An ATM cell consists of a 5-byte ATM header and a 48-
xii ETX-5
Installation and Operation Manual Front Matter
Channel A path for electrical transmission between two or more points. Also
called a link, line, circuit or facility.
Compression Any of several techniques that reduce the number of bits required to
represent information in data transmission or storage, thereby
conserving bandwidth and/or memory.
Congestion A state in which the network is overloaded and starts to discard user
data (frames, cells or packets).
Data Link Layer Layer 2 of the OSI model. The entity, which establishes, maintains,
and releases data-link connections between elements in a network.
Layer 2 is concerned with the transmission of units of information, or
frames, and associated error checking.
Differential Delay Differential delay is caused when traffic is split over different lines
that may traverse shorter and longer paths. Products like the RAD
IMX-2T1/E1 inverse multiplexer compensate for any differential delay
(up to 64 msec) between the T1 lines, to properly reconstruct the
original stream.
Ethernet A local area network (LAN) technology which has extended into the
wide area networks. Ethernet operates at many speeds, including data
rates of 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), 1,000 Mbps
(Gigabit Ethernet), 10 Gbps, 40 Gbps, and 100 Gbps.
ETX-5 xiii
Front Matter Installation and Operation Manual
Ethernet OAM Ethernet operation, administration and maintenance (OAM) are a set
of standardized protocols for measuring and controlling network
performance. There are two layers of Ethernet OAM: Service OAM
(provides end-to-end connectivity fault management per customer
service instance, even in multi-operator networks) and Link or
Segment OAM (detailed monitoring and troubleshooting of an
individual physical or emulated link).
Framing At the physical and data link layers of the OSI model, bits are fit into
units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame, plus
information about the integrity of the frame. All other information,
such as network protocols and the actual payload of data, is
encapsulated in a packet, which is encapsulated in the frame.
FXO (Foreign Exchange A voice interface, emulating a PBX extension, as it appears to the CO
Office) (Central Office) for connecting a PBX extension to a multiplexer.
FXS (Foreign Exchange A voice interface, emulating the extension interface of a PBX (or
Subscriber) subscriber interface of a CO) for connecting a regular telephone set to
a multiplexer.
Half Duplex A circuit or device capable of transmitting in two directions, but not at
the same time.
xiv ETX-5
Installation and Operation Manual Front Matter
MAN (Metropolitan Area A network that provides regional connectivity within a metropolitan
Network) area (such as a city).
Master Clock The source of timing signals (or the signals themselves) that all
network stations use for synchronization.
Multimode Fiber A fiber with a large core diameter; 50-200 microns compared with the
wavelength of light. It therefore propagates more than one mode.
With multimode fiber, light traverses multiple paths, some longer than
others. This leads to dispersion, which reduces optical range.
parameters Parameters are often called arguments, and the two words are used
interchangeably. However, some computer languages such as C define
argument to mean actual parameter (i.e., the value), and parameter
to mean formal parameter. In RAD CLI, parameter means formal
parameter, not value.
Payload The 48-byte segment of the ATM cell containing user data. Any
adaptation of user data via the AAL will take place within the payload.
Physical Layer Layer 1 of the OSI model. The layer concerned with electrical,
mechanical, and handshaking procedures over the interface
connecting a device to the transmission medium.
ETX-5 xv
Front Matter Installation and Operation Manual
QoS (Quality of Service) Refers to the capability of a network to provide better service to
selected network traffic over various technologies, including Frame
Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1
networks.
Serial Transmission A common mode of transmission, where the character bits are sent
sequentially one at a time instead of in parallel.
Synchronous Transmission in which data bits are sent at a fixed rate, with the
Transmission transmitter and receiver synchronized.
Telnet The virtual terminal protocol in the Internet suite of protocols. It lets
users on one host access another host and work as terminal users of
that remote host. Instead of dialing into the computer, the user
connects to it over the Internet using Telnet. When issuing a Telnet
session, it connects to the Telnet host and logs in. The connection
enables the user to work with the remote machine as though a
terminal was connected to it.
xvi ETX-5
Installation and Operation Manual Front Matter
VLAN-Aware A device that is doing the Layer 2 bridging according to the VLAN tag
in addition to the standard bridging parameters. A VLAN-aware device
will not strip or add any VLAN header.
ETX-5 xvii
Front Matter Installation and Operation Manual
xviii ETX-5
Quick Start Guide
This section describes the minimum configuration needed to prepare ETX-5 for
operation.
Notes • The number of available Ethernet ports depends on the options you
purchased.
• Lock the wire latch of each XFP or SFP module by lifting it up until it clicks into
place. For additional information, refer to Chapter 2.
Connecting to a Terminal
To connect the unit to a terminal:
1. Connect the male DB-9 connector of terminal cable to the 9-pin D-type
female connector on E4-MC-4 card, designated CONTROL DCE.
2. Connect the other side of the cable to the ASCII terminal equipment.
To connect to AC power:
• Connect each power cable first to the connector on the E5-PIM/AC module,
and then to the power outlet.
The unit turns on automatically upon connection to the mains, and the
PWR indicator lights up.
To connect to DC power:
1. Strip 7 mm (1/4 inch) of insulation from the leads.
Caution
Pay attention to polarity. For each source, connect the positive lead first, and the
negative lead second.
Refer to the Connection of DC Mains section at the beginning of this manual.
8. To log in, enter your user name (su for full configuration and monitoring
access) and your password.
9. The device prompt appears:
ETX-5#
You can now type the necessary CLI commands.
Note RAD recommends using the 115.2 kbps data rate for CLI management sessions.
10. Navigate to config>terminal# prompt and change the default terminal baud
rate (9.6 kbps) to 115.2 kbps.
11. Configure the PC communication port parameters to a baud rate of
115.2 kbps to match the new ETX-5 setting.
12. Continue with product configuration.
#***************************Adding Classifier_Profiles***********************
config flows classifier-profile classall match-any
match all
exit all
match untagged
exit all
#*********************************End****************************************
#***************************Configuring_Flows********************************
config flows flow mng_in
classifier classutg
ingress-port mng-ethernet main-a/0
egress-port svi 99
no shutdown
exit all
#*********************Configuring_Router_Interface***************************
configure router 1 interface 1
address 172.18.219.116/24
bind svi 99
no shutdown
exit
static-route 0.0.0.0/0 address 172.18.219.1
exit all
#**********************************End***************************************
#*********************Configuring_SNMP_View/Mask/Type************************
configure management snmp
view internet 1
mask 1
type included
no shut
exit all
#**********************************End***************************************
#*********************Configuring_SNMP_Access_Group************************
configure management snmp
access-group initial usm no-auth-no-priv
context-match prefix
exit all
#**********************************End***************************************
#**************************Configring_SNMP_Traps*****************************
configure management snmp
target-params p
message-processing-model snmpv3
version usm
security name initial level no-auth-no-priv
no shutdown
exit
target a
target-params p
tag-list unmasked
address udp-domain 172.17.176.35
no shutdown
exit
notify unmasked
tag unmasked
no shutdown
exit all
#**********************************End************************************
Saving Configuration
Type save in any level to save your configuration in startup-config.
4. Verifying Connectivity
At the ASCII terminal, ping the IP address assigned to management router
interface and verify that replies are received. If there is no reply to the ping,
check your configuration and make the necessary corrections.
5. Configuring Services
Proceed with service configuration. Chapter 5 details different scenarios for
provisioning supported Ethernet services.
ETX-5 i
Table of Contents Installation and Operation Manual
ii ETX-5
Installation and Operation Manual Table of Contents
ETX-5 iii
Table of Contents Installation and Operation Manual
iv ETX-5
Installation and Operation Manual Table of Contents
ETX-5 v
Table of Contents Installation and Operation Manual
Chapter 5. Services
5.1 Service Elements .................................................................................................................. 5-1
Profiles .............................................................................................................................. 5-1
Scheduling and Shaping Entities......................................................................................... 5-2
Physical Ports .................................................................................................................... 5-2
Logical Ports ...................................................................................................................... 5-3
Forwarding Entities ............................................................................................................ 5-4
Flows ............................................................................................................................ 5-5
Bridge ........................................................................................................................... 5-5
Router........................................................................................................................... 5-5
5.2 E-Line Service ....................................................................................................................... 5-6
I/O-to-Main Path ................................................................................................................ 5-6
Main-to-I/O Path ................................................................................................................ 5-9
I/O-to-I/O Path................................................................................................................. 5-11
Main-to-Main Path ........................................................................................................... 5-13
5.3 E-LAN Service ..................................................................................................................... 5-15
5.4 Routing Services ................................................................................................................. 5-18
I/O-to-Main via Router Path ............................................................................................. 5-18
Router-to-Bridge Path ..................................................................................................... 5-21
5.5 Pseudowire Services ........................................................................................................... 5-25
Point-to-Point L2 Pseudowire Service .............................................................................. 5-25
L2 Pseudowire Service over Bridge ................................................................................... 5-28
L3 Pseudowire Service ..................................................................................................... 5-31
vi ETX-5
Installation and Operation Manual Table of Contents
ETX-5 vii
Table of Contents Installation and Operation Manual
Chapter 7. Resiliency
7.1 Dual Homing ........................................................................................................................ 7-1
Benefits ............................................................................................................................. 7-1
Factory Defaults ................................................................................................................ 7-1
Functional Description ....................................................................................................... 7-2
Protection Groups ......................................................................................................... 7-2
Port Combinations in Dual Homing Groups .................................................................... 7-2
Traffic Switching ........................................................................................................... 7-4
Switching Triggers ......................................................................................................... 7-5
Timers ........................................................................................................................... 7-5
Force Switch Command ................................................................................................. 7-5
Configuring Dual Homing ................................................................................................... 7-5
Displaying Ethernet Group Status ...................................................................................... 7-6
Example ............................................................................................................................. 7-7
Configuration Errors ........................................................................................................... 7-7
7.2 Ethernet Link Aggregation (LAG) .......................................................................................... 7-8
Standards and MIBs ........................................................................................................... 7-9
Benefits ............................................................................................................................. 7-9
Factory Defaults ................................................................................................................ 7-9
Functional Description ....................................................................................................... 7-9
Intra-Card LAG............................................................................................................... 7-9
Inter-Card LAG ............................................................................................................ 7-10
Load-Balancing LAG..................................................................................................... 7-11
Configuring a LAG ............................................................................................................ 7-14
LACP Traffic ................................................................................................................. 7-14
Special Considerations for I/O Cards............................................................................ 7-15
Deleting the LAG .............................................................................................................. 7-20
Displaying LAG Members .................................................................................................. 7-21
Displaying LAG Status ...................................................................................................... 7-21
Displaying LACP Status ..................................................................................................... 7-21
Displaying LACP Statistics ................................................................................................ 7-23
Displaying LAG Statistics .................................................................................................. 7-23
Examples ......................................................................................................................... 7-27
viii ETX-5
Installation and Operation Manual Table of Contents
ETX-5 ix
Table of Contents Installation and Operation Manual
x ETX-5
Installation and Operation Manual Table of Contents
ETX-5 xi
Table of Contents Installation and Operation Manual
xii ETX-5
Installation and Operation Manual Table of Contents
ETX-5 xiii
Table of Contents Installation and Operation Manual
xiv ETX-5
Installation and Operation Manual Table of Contents
ETX-5 xv
Table of Contents Installation and Operation Manual
xvi ETX-5
Installation and Operation Manual Table of Contents
ETX-5 xvii
Table of Contents Installation and Operation Manual
xviii ETX-5
Chapter 1
Introduction
1.1 Overview
ETX-5 is a 10G Carrier Ethernet access platform for aggregating SLA-based
business Ethernet, legacy TDM and mobile backhaul services.
ETX-5 Carrier Ethernet aggregator enables advanced rate policing and shaping,
and performs class of service differentiation through traffic editing. MEF-9, MEF-
14, MEF-22 and MEF-26 certified for E-Line (EPL, EVPL), E-LAN (EPLAN, EVPLAN),
E-Tree (EP-Tree and EVP-Tree) and E-Access services, ETX-5 ensures five nines
(99.999%) service reliability and exact service level agreement (SLA)
management. Its automatic fault localization capabilities also help carriers and
service providers to reduce operational costs and minimize expensive truck rolls.
In addition, ETX-5 delivers high-quality E1/T1, STM-1/OC-3 and STM-4/OC-12
streams, using Circuit Emulation Services (CES).
The ETX-5 system also features advanced Timing over Packet capabilities, allowing
for clock synchronization over packet switched networks. Clocking mechanisms
include Precision Time Protocol (IEEE 1588-2008), Synchronous Ethernet and
adaptive clock recovery. These Timing over Packet features, combined with
powerful Carrier Ethernet service delivery attributes, make the ETX-5 an ideal
solution for LTE mobile backhaul applications.
Product Options
ETX-5 is available with the following interface cards:
• GbE card with 20 copper or fiber optic GbE ports
• 10GbE card with two 10GbE ports
• STM-1/OC-3 card with up to four channelized STM-1/OC3 ports
• E5-cTDM-STM4 card with one channelized STM-4/OC12 port, or two ports
when using line APS
In addition, the chassis is designed to receive power from AC and/or DC sources.
Applications
In a typical service aggregation application, ETX-5 concentrates SLA-based traffic
coming from RAD’s or third-party Ethernet NTUs. It performs class of service
differentiation through traffic editing, uses advanced rate policing and shaping
techniques to ensure service reliability and exact service level agreement (SLA)
management.
ETX-5
TDM
ETX-5 ETX-2
RNC BSC BTS/Node B
Features
ETX-5 aggregates SLA-based business Ethernet, mobile backhaul and legacy TDM
services. It combines high-capacity aggregation and carrier-grade performance,
enabling cost optimization and freeing up expensive capacity at the PE (provider
edge). With efficient traffic management techniques, hardware-based OAM and
performance monitoring, carrier-grade service resiliency and strong Timing over
Packet capabilities, ETX-5 represents a robust multifunctional Ethernet service
delivery platform.
• E-Line (EPL and EVPL) for LAN-to-LAN, VoIP and IP-VPN connectivity, as well
as for storage and dedicated Internet access
• E-LAN (EP-LAN and EVP-LAN) for multipoint Layer 2 VPN, transparent LAN
services and multicast networks
• E-Tree (point-to-multipoint) for combining multiple Ethernet technologies
across different domains
• E-Access for reaching the service provider’s out-of-franchise subscriber
locations as part of the end-to-end service
• 2G, 3GPP and LTE transport.
The 3U modular system features high port density for space-restricted facilities,
delivering user traffic via the following interfaces:
• Two redundant main cards, each housing four 10GbE network ports
• Up to four service cards, each housing either 20 UTP/SFP 1-GbE tributary
ports, or four channelized STM-1/OC-3 ports, or two 10GbE ports or their
combinations.
Forwarding Schemes
Traffic forwarding is performed using point-to-point (E-Line), bridge (E-LAN) or
static router mechanisms.
Front Panel
The front side of the chassis has physical slots in which plug-in modules are
installed to obtain the desired equipment configuration:
• The main and power inlet modules, and the fan tray, are always installed in
dedicated chassis slots, called system slots
• GbE, 10GbE and SDH/SONET service modules are installed in the other chassis
slots (called I/O slots).
All the external connections are made to connectors located on the plug-in
modules.
Figure 1-4 shows typical ETX-5 rear views, and identify the functions of the
various slots.
DCE
CLK PWR ETX-5300A
LINK ACT LINK ACT LINK ACT LINK ACT 10MHz LINK ACT FLT
RMV
E5-MC-4 10/100/1000BASE-T
10GbE EXT CLK GPS MNG
1 2 3 4 MNG ETH PRI
EXT CLK IN OUT TOD 1PPS CONTROL E5-PIM
FLT
CLK PWR
DCE ALARM CRITICAL
LINK ACT LINK ACT LINK ACT LINK ACT 10MHz LINK ACT FLT
RMV MAJOR
E5-MC-4 10/100/1000BASE-T
MINOR
11 20 LINK ACT
TEST
LINK FLT 11 FLT
ACT LED
RMV RMV
1 1
E5-GBE-20 100/1000BASE-X E5-GBE-20 10/100/1000BASE-T FAN
OK
11 20 20
FLT OC-3/STM-1 FLT FLT
LINK FLT FLT FLT FLT
ACT LINK 1 LINK 2 LINK 3 LINK 4 F MAIN-B PS-B
I
RMV RMV L MAIN-A PS-A F
1 T A
I/O 2 I/O 4 N
LOS LOS LOS LOS E
E5-GBE-20 100/1000BASE-X E5-cTDM-4 R I/O 1 I/O 3 E5-FAN
Rear Panel
The ETX-5 rear panel may have mechanical extension for housing two AC power
supplies.
Available Cards
Table 1-1 lists the cards currently available for the ETX-5, their functions, and
ETX-5 system capacity.
E5-FAN Fan tray with eight fans and alarm relay port 1
System Structure
The ETX-5 is a fully redundant 3U chassis for Ethernet aggregation applications.
The chassis accommodates four I/O cards and two main cards.
Figure 1-5 illustrates a high-level structure of an ETX-5 system, in which:
• Two main cards include forwarding engines (packet processors) responsible
for bridging, point-to-point VLAN cross-connect, and Level-3 forwarding
(router). They also perform post-forwarding scheduling and shaping (at port
egress). Four 10GbE ports on each main card forward aggregated traffic
towards network.
• Four I/O cards are interconnected with the main card via the chassis
backplane in a star topology. Ethernet I/O cards include 20 GbE or two 10GbE
ports. The cards perform ingress traffic processing and management
(pre-forwarding scheduling and shaping).
TDM I/O cards include four channelized STM-1/OC-3 ports. The TDM cards
handle TDM pseudowire traffic.
• System modules (power inlets and AC power supplies, fan module) provide
DC or AC power to the system and cool the chassis.
4 x 10GbE 4 x 10GbE
Timing Timing
Power
GbE, 10GbE or
SDH/SONET
I/O Card
Fans
Pre-Forwarding Post-Forwarding
Map CoS Scheduling Scheduling and
Classify Police Forward Edit
and Color and Shaping Shaping
Post-Forwarding
Scheduling and Map CoS
Edit Forward Classify
Shaping and Color
Port Types
ETX-5 ports can be either of two types:
• Attached directly to the main card packet processor (directly-attached ports).
These are 10GbE ports on the main cards.
• Attached to the packet processor via the classification and traffic
management engine (indirectly-attached ports). These are GbE, 10GbE and
TDM ports on the I/O cards.
These ports differ in the way they admit traffic, classify flows, and perform traffic
management.
Data Path
Figure 1-7 illustrates the general traffic path within the ETX-5 system in the
ingress-to-egress direction.
Note SAG (Service Aggregation Group) is a logical port (management entity) that
represents a physical connection between Ethernet I/O and main cards. Pre-
forwarding scheduling and shaping are performed at the SAG level.
Flow aggregation and pseudowire aggregation entities are logical ports that
create an aggregated classification identification for all Ethernet flows and
pseudowires going in the same direction. This identification allows the main card
to make forwarding decisions. The Ethernet flow aggregation entity is referred to
as SAP (Service Attachment Point); for pseudowires it is called SVI (Service Virtual
Interface).
Pre-forwarding
Processing Drop Precedence
(VLAN/Ethertype Per Port L2CP Classification Per Flow L2CP Traffic Class
Handling to Flows Handling (CoS) Mapping (Color) Ingress
recognition and Mapping
admission)
Main Cards
Two types of main card are supported by the ETX-5:
• E5-MC-4 - Standard Main Card
• E5-MC-SFP-P-4 - SFP/SFP+ Main Card
The ETX-5 automatically detects the card type upon card insertion. Both card
types can be used at the same time, each in one of the two main card slots.
Power
ToD/1 PPS
Timing
BITS/10 MHz
RS-232
CPU
10/100/1000BT
10GbE Interface
ETX-5 main cards provide four interfaces (10GBase-SR, 10GBase-LR, 10GBase-ER)
for full duplex connection to 10GbE packet-switched networks. They support IP
and Ethernet networks, and are capable of processing data at wire speed. In the
case of the SFP+ card, each interface is equipped with SFP+ interfaces.
Each 10GbE port has its own MAC address, and can be assigned its own IP
address for Layer-3 forwarding.
Packet Processor
With 100 Gbps full duplex performance, the packet processor (PP) serves as:
• Main engine for point-to-point (E-Line), bridging (E-LAN, E-Tree) and routing
(Layer-3) forwarding schemes
• Post-forwarding scheduler and shaper (see Figure 1-10, Figure 1-11 and
Figure 1-12)
• Hardware-based OAM utility.
With 2- or 3-levels hierarchical scheduler, multiple queues per shaper, strict and
WFQ priorities, WRED congestion avoidance, the egress traffic management (TM)
mechanism consists of the following queue group types:
Level-0 SEs
CIR
Shapers
SP 1
SP 2 CIR/EIR
SP 3 Shapers
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2 CIR
WFQ 4
Shaper
WFQ 3
Up to 8 Up to 8
WFQ 4
CIR WFQ 5
Shapers
WFQ 6
SP 1
WFQ 7
SP 2
WFQ 8
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
Level-0 SEs
CIR
Shapers Level-1 SEs
SP 1 WFQ 1
CIR/EIR
SP 2 Shapers WFQ 2
CIR/EIR
SP 3
Shapers
SP4
WFQ 1
Level-2 SE
WFQ 2
WFQ 1
WFQ 3 WFQ 383
WFQ 2
CIR
WFQ 4 WFQ 384
Shaper
Up to 384 Up to 384 Up to 64 Up to 64
CIR WFQ 1
Shapers
WFQ 2
SP 1 WFQ 63
WFQ 64
SP 2
SP 3
SP4
WFQ 1 WFQ 383
WFQ 2 WFQ 384
WFQ 3
WFQ 4
Level-1 SEs
WFQ 1
Level-0 SEs WFQ 2
CIR/EIR CIR/EIR
SP 1 Shapers Shapers
SP 2
Level-2 SE
SP 3
SP4 WFQ 1
Up to 768 Up to 768 Up to 64 Up to 64
WFQ 1
WFQ 2 WFQ 63
SP 1 WFQ 64
SP 2
SP 3
SP4
WFQ 383
WFQ 384
Level-0 SEs
CIR
Shapers
SP 1
SP 2 CIR/EIR
SP 3 Shapers
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2 CIR
WFQ 4
Shaper
Up to 40 Up to 40
CIR
Shapers
SP 1
SP 2
WFQ 40
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
Level-0 SEs
CIR
Shapers
SP 1
SP 2 CIR/EIR
SP 3 Shapers
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2 CIR
WFQ 4
Shaper
WFQ 3
Up to 50 Up to 50
WFQ 4
CIR WFQ 5
Shapers
WFQ 6
SP 1
WFQ 7
SP 2
WFQ 8
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
Timing Subsystem
See Timing Mechanism section below for detailed description of clocking schemes
supported by ETX-5.
Management Subsystem
The main functions of the management subsystem located on the main card
module are as follows:
• Interfacing with external management and monitoring functions. The
following options are available:
Supervision terminal: ASCII terminal or a PC running a terminal emulation
program, connected directly to ETX-5. This terminal can perform all the
ETX-5 supervision and configuration functions, and in particular the
preliminary system configuration.
Telnet: by means of any host capable of IP communication with ETX-5.
The functions available under the Telnet protocol are similar to those
available from a supervisory terminal.
SSH: secure access using the SSH (Secure Shell) protocol, using any
standard SSH client utility running on a PC or laptop capable of IP
communication with ETX-5.
SNMP: ETX-5 includes an internal SNMP agent that enables full SNMP
management by SNMP-based network management, for example, the
RADview family of management stations for element and network
management available from RAD.
Syslog: ETX-5 supports automatic event notification to user-specified
Syslog servers in accordance with the Syslog protocol per RFC 3164. ETX-
5 can report all the supported traps and alarms, but also enables
configuring the minimal severity level for reporting to each Syslog server.
To protect network operations against unauthorized access, ETX-5 supports a
wide range of security features for every management facility: RADIUS
authentication for supervision terminal and Telnet access, SSH for secure
Telnet access, and SNMP management with authentication and privacy per
SNMPv3 using selectable security models, with support for SNMPv1 and
SNMPv2.
To record and track information on device operation and user activity on it,
ETX-5 supports TACACS+ client application. The application provides shell,
system and command accounting.
• Control of ETX-5 system operation.
• Storage of application software, which determines the capabilities and
features provided by the ETX-5. This software can be remotely downloaded
and updated through the management link without taking the equipment off-
line. The stored software includes both system software, run by the main
card, and software for the other modules installed in the chassis.
• Storage of configuration databases (factory-default, running, startup or user-
default). See Chapter 3 for explanation of startup procedure and different
types of configuration databases.
• Collection of operational history (alarms, performance statistics, etc.), and of
internal chassis temperature, as read by an internal temperature sensor. The
collected information can be read by maintenance personnel through the
management link.
A real-time clock provides time stamps for all the collected information. The
real-time clock can be set either manually or automatically, using the NTP
(Network Time Protocol). A network operator can use NTP to periodically
synchronize the local equipment time within the managed network to the
accurate time provided by the worldwide network of NTP time servers, and
thus is able to reliably correlate alarm reports from different sources. To use
NTP, it is necessary to configure the IP address of the desired NTP server, and
select a time zone.
The performance statistics collected for the modules installed in the chassis
are also synchronized to the real-time clock.
Serial Port
The supervisory port of the ETX-5 has a serial RS-232 asynchronous DCE interface
terminated in a 9-pin D-type female connector, designated CONTROL DCE. This
port is connected directly to terminals using the CBL-DB9F-DB9M-STR cable
available from RAD.
Power
20 x GbE
SFPs/RJ-45s Physical Packet
or Interface Processor
2 x 10GbE XFPs
Timing
CPU
Packet Processor
Packet processor (PP) located on the E5-GbE-20 and E5-10GbE-2 cards serves for
classification, CoS/color mapping, policing and pre-forwarding traffic management
(Figure 1-16).
Level-0 SEs
SP 1
SP 2
CIR
SP 3
Shapers
SP4
WFQ 1 Level-1 SE
WFQ 2
WFQ 1
WFQ 3 WFQ 2
WFQ 4
Up to 50 Up to 50
SP 1
SP 2 WFQ 49
SP 3 WFQ 50
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
Timing Subsystem
See Timing Mechanism section below for detailed description of clocking schemes
supported by ETX-5.
Flow
SAP
Flow SAP
Flow
SAP
Flow SAP
SDH/SONET Card
The E5-cTDM-4 and E5-cTDM-STM4 cards operate as a quad/dual-port
SDH/SONET terminal multiplexer for the ETX-5 chassis that terminates STM-1/OC-
3 or STM-4/OC-12 links and their overhead. The E5-cTDM-4 card has four
independent channelized STM-1/OC-3 ports, where each port is capable of
multiplexing up to 63 E1 or 84 T1 internal streams into one STM-1 or OC-3 data
stream. The card uses pseudowire emulation to deliver E1/T1 streams over
packet-switched networks (UDP/IP or Ethernet MEF-8).
The E5-cTDM-4 card features two STM-4/OC-12 ports which can support a single
channelized STM-4 interface (second port for APS and cannot be an independent
interface). The card supports 252 E1s or 336 T1s with TDM pseudowire
emulation ( UDP/IP or Ethernet MEF-8)
Figure 1-18 illustrates the E5-cTDM-4 card block diagram.
SDH/SONET Interfaces
The TDM interfacing subsystem provides interfaces to the TDM user’s equipment
or network. The physical STM-1/OC-3 or STM-4/OC-12 ports support a wide
variety of SFP transceivers with optical interfaces for meeting a wide range of
operational requirements.
SDH Interface
The SDH interface provides physical STM-1/STM-4 interfaces for direct access to
the Synchronous Digital Hierarchy (SDH) transmission cores at the STM-1 level
(155.520 Mbps) or STM-4 level(622,080 Mbps), and also handle the TDM traffic
flow between ETX-5 internal E1 ports, and the SDH network. Total module
capacity is 252 E1 data streams.
For the E5-cTDM-4 Card:
E1/T1 mapping to STM-1 is performed using the G.707 mapping scheme:
• E1 > VC-12 > TU-12 > TUG-2 > TUG-3 > VC-4 > AU-4 > STM-1
• T1 > VC-11 > TU-11 > TUG-2 > VC-3 > AU-3 > STM-1.
For the E5-cTDM-STM4 Card:
E1 mapping to STM-4 is performed using the G.707 mapping scheme:
• E1 > VC-12 > TU-12 > TUG-2 > TUG-3 > VC-4 > AU-4 > STM-4
SONET Interface
SONET interface provides physical OC-3/OC-12 interfaces for direct access to the
Synchronous Digital Hierarchy (SONET) transmission cores at the OC-3 level
(155.520 Mbps) or at the OC-12 level (622.080 Mbps), and also handles the TDM
traffic flow between ETX-5 internal T1 ports, and the SONET network. Total
module capacity of 336 T1 data streams.
T1 mapping to OC-3 is performed using the G.707 mapping scheme: T1 > VT1.5 >
VT group > STS-1 > OC-3.
Pseudowire Services
The pseudowire processing subsystem performs the conversion between the
circuit-switched (TDM) and packet-switched networks, using pseudowire
emulation technology. The main steps of the circuit emulation procedure are the
following:
• SDH/SONET payload received via STM-1or STM-4interfaces is processed by
the framer to extract timing information and separate E1/T1 timeslots (the
framer creates an internal E1/T1 ports, which are connected through the
mapper to the SDH/SONET link).
• The resulting payload is provided to packet processor. The packet processor
converts the payload of each E1/T1 into packets suitable for transmission
over the packet-switched network.
• The resulting packets are encapsulated in Ethernet frames and sent to the
main card for analyses and forwarding to the UDP/IP or Ethernet (MEF-8)
network.
ETX-5 uses the following payload encapsulation techniques during packet
processing:
• CESoPSN transports raw TDM data, that is, packets are formed by inserting a
user-specified number of complete TDM frames in the packet payload area.
Therefore, CESoPSN pseudowires can only be configured on framed ports.
• SAToP is different from the CESoPSN, in that it is used to transparently
transfer a bit stream at the nominal port rate (2.048Mbps for E1 or 1.544
Mbps for T1). Therefore, SAToP can be used only when the port uses the
unframed mode.
Notes Only one pseudowire can be configured per port. In ETX-5 this is the only option
for both SAToP and CESoPSN.
The SAToP packet overhead is large, and therefore, for efficient bandwidth
utilization, the number of raw TDM bytes per packet should be as large as
possible.
Packetizing Considerations
The number of TDM bytes per frame affects several performance aspects:
• Bandwidth utilization. Because of the relatively short payload, the bandwidth
utilization efficiency depends on the overhead that must be transmitted to
the network in order to support the transmission of a certain amount of
payload.
The overhead depends on the packet structure: for example, for UDP/IP
networks the overhead is 50 bytes when using VLANs, and 46 bytes
without VLANs
The payload depends on the number of TDM bytes.
For example, when using the payload size of 48 bytes, bandwidth utilization
efficiency is around 50%.
• Packetizing delay. Bandwidth utilization efficiency increases when using a
large payload size per frame. However, there is additional aspect
(packetization time) that must be considered when selecting the size of the
packet payload. When E5-cTDM-4 or E5-cTDM-STM4 card builds a frame, a
packetization delay is introduced. The packet creation time (PCT) is different
for the different payload encapsulation methods. It is calculated according to
the following formulas:
Mode Delay
SAToP N × 0.125
PCT (ms) = TS
To compensate for deviations from the expected packet arrival time, each
pseudowire emulation module uses jitter buffers that temporarily store the
packets arriving from the PSN (that is, from the far end equipment) before being
transmitted to the local TDM equipment, to ensure that the TDM traffic is sent to
the TDM side at a constant rate.
For each pseudowire, the jitter buffer must be configured to compensate for the
jitter level expected to be introduced by the PSN; that is, the jitter buffer size
determines the Packet Delay Variation Tolerance (PDVT).
Two conflicting requirements apply:
• Since packets arriving from the PSN are first stored in the jitter buffer before
being transmitted to the TDM side, TDM traffic suffers an additional delay.
The added delay time is equal to the jitter buffer size configured by the user.
• The jitter buffer is filled by the incoming packets and emptied out to fill the
TDM stream. If the PSN jitter exceeds the configured jitter buffer size,
underflow/overflow conditions occur, resulting in errors at the TDM side:
A jitter buffer overrun occurs when it receives a burst of packets that
exceeds the configured jitter buffer size + packetization delay. When an
overrun is detected, the pseudowire packet processing subsystem clears
the jitter buffer, causing an underrun.
A jitter buffer underrun occurs when no packets are received for more
than the configured jitter buffer size, or immediately after an overrun.
When the first packet is received, or immediately after an underrun, the buffer is
automatically filled with a conditioning pattern up to the PDVT level in order to
compensate for the underrun. Then, the pseudowire packet processing
subsystem starts processing the packets and empty out the jitter buffer toward
the TDM side.
To minimize the possibility of buffer overflow/underflow events, two conditions
must be fulfilled:
• The buffer must have sufficient capacity. For this purpose, the buffer size can
be selected by the user in accordance with the expected jitter characteristics,
separately for each pseudowire, in the range of 0 to 32 msec.
• The read-out rate must be equal to the average rate at which frames are
received from the network. For this purpose, the read-out rate must be
continuously adapted to the packet rate, a function performed by the
adaptive clock recovery mechanism of each packet processor.
After the jitter buffer mechanism reaches a stable state, there may still be
temporary changes in network delay, which occur before the mechanism can
readjust.
Adaptive Timing
Each PDH port can use the adaptive timing mode to lock its transmit timing to the
clock signal associated with the payload carried by this pseudowire.
The adaptive clock recovery mechanism estimates the average rate of the
payload data received in the frames arriving from the packet-switched network.
Assuming that the packet-switched network does not lose data, the average rate
at which payload arrives will be equal to the rate at which payload is transmitted
by the source.
Note
Generally, lost packets, as well as packets that did not arrive in the correct order,
are replaced by special dummy packets. However, for CESoPSN and SAToPSN,
packets can be reordered.
Timing Subsystem
See Timing Mechanism section below for detailed descriptions of clocking
schemes supported by ETX-5.
Timing Mechanism
ETX-5 timing subsystem includes a central timing subsystem, located on the main
card, and local timing subsystems located on the individual I/O modules. Since
ETX-5 is normally equipped with two main cards, redundancy is also available for
the central timing subsystem.
The figure below shows the functional block diagram of the ETX-5 timing
mechanism.
Main Card
System 10GbE
Clock Ports
I/O
Clock 1
I/O
Clock 2
1588v2 T0 1588v2
(master) SEC Mux (slave) Station Clock
Station Clock Output (T4)
(BITS/GPS)
Station Clock
Output (T4)
I/O Card 2
I/O Card 3
I/O Card 4
The timing system in ETX-5 is based on one domain with master and fallback
clocks. The domain has its own system clock derived after selection process
implemented via SEC (Synchronous Equipment Clock). Clock sources (SEC inputs)
are based on:
• Clock derived from a physical port on a main or I/O card
• External clock (BITS)
Ethernet Ports
Ethernet ports located on E5-MC-4, E5-MC-SFP-P-4, E5-10GbE-2 or E5-GbE-20
support Synchronous Ethernet (Sync-E) master and slave modes according to ITU-
T G.8261–G.826 requirements. This allows each port to:
• Extract the port clock to be used a source clock to the clock selection
mechanism
• Set the port Tx clock according the domain clock available from the main card.
Sync-E mode can be used for clock frequency distribution. If the ToD (time) is not
required, the 2-way 1588v2 slave entities can be used. The main advantage of
Sync-E over 1588v2 clock is that it is distributed over physical layer; it is a
Stratum-3 clock with near SDH/SONET holdover properties; it is not packet-
oriented and is considered to be more stable.
SDH/SONET Ports
An Rx clock of any STM-1/OC-3 or STM-4/OC-12 port on the E5-cTDM-4 card can
be extracted and supplied to the main card clock selection mechanism (via
backplane clock bus).
Note When APS is enabled, the clock is used from a selected interface and not from an
APS group.
E1/T1 Ports
An Rx clock of any internal E1 or T1 port on the E5-cTDM-4 or E5-cTDM-STM4
card can be extracted and supplied to the main card clock selection mechanism
(via backplane clock bus). Moreover, ETX-5 can use an adaptive clock, recovered
from a TDM pseudowire stream as an Rx clock source.
A Tx clock of an internal E1/T1 port can be locked to:
• ETX-5 system clock
Master Mode
Using 1588v2 master mode eliminates the need for an external timing device
installed in the core of the network to support 1588v2 timing distribution. The
ETX-5 device can be located near the core of the network to supply up to 512
clock reference streams to remote Ethernet CPEs. Currently, only UDP/IP
encapsulation is supported.
Slave Mode
In the 1588v2 slave mode, ETX-5 provides clock recovery mechanism with
frequency and phase alignment. Currently, only UDP/IP encapsulation is
supported.
Transparency Mode
If there is a 1588v2 grandmaster in the network, ETX-5 can operate in
transparent clock mode, transferring 1588 packets to remote Ethernet CPEs with
updated correction field. In this case remote a CPE can operate in a slave mode, if
a NodeB has no slave clock capabilities, or in transparent mode if a NodeB
supports 1588v2.
GPS Clock
ETX-5 accepts GPS-based frequency and phase reference signal from GPS units,
using the following interfaces on the E5-MC-4 or E5-MC-SFP-P-4 card:
• Input or output of 10 MHz sinewave synchronization signal via mini-BNC
connector
• Input and output of ToD timestamp signal via RJ-45 connector with RS-422
interface
• Input or output of 1 pps TTL synchronization signal via mini-BNC (DIN 1.0/2.3)
connector.
When only one GPS clock source is available, you can improve hardware
protection by connecting the GPS clock inputs in parallel, by means of a Y-cable.
Max Throughput 100 Gbps, full duplex (100 Gbps ingress and 100 Gbps
egress)
Connector LC
SFP-P-1DH
Standards: 10GBASE-LR
Wavelength: 1310nm
Length: 10KM over 9/125 SM fiber
Mapping SDH: E1 > VC-12 > TU-12 > TUG-2 > TUG-3 > VC-4 > AU-4
> STM-1
• T1 > VC-11 > TU-11 > TUG-2 > VC-3 > AU-3 > STM-1
SONET: T1 > VT1.5 > VT group > STS-1 > OC-3
Mapping • E1 -> VC-12 -> TU-12 -> TUG-2 -> TUG-3 -> VC-4 ->
AU-4 -> STM-N
• T1 -> VT1.5 -> VT Group -> STS-1 -> OC-N
Number of EVCs 4K
Hierarchical 3-level
Scheduler
Number of Instances Up to 32
MAC Table Size 64 (default), 256, 512, 1024, 4094, 16384, user-
configurable per broadcast domain
Pseudowire Number of TDM 1344 (336 per E5-cTDM-4 and E5-cTDM-STM4 cards)
Pseudowires
E5-cTMD-4 and For SDH: 1+1 unidirectional MSP per G.841 (section 7.1),
E5-cTDM-STM4
For SONET: 1+1 unidirectional APS per GR-253-CORE
cards
(section 5.3)
Number of MDs Up to 4K
Number of PM Up to 2K
Services
LLDP
Alarm Relay Alarm Outputs Major alarm indication by floating change-over dry-
contact contacts
Minor alarm indication by floating change-over contacts
Power Consumption AC: 590W max, 540W average under full traffic load
DC: 520W max, 480W average under full traffic load
2.1 Safety
Before starting, read the following safety precautions, which are applicable
throughout the installation procedures. Where necessary, specific precautions
also appear before certain procedures.
Caution Delicate electronic components are installed on both sides of the printed circuit
boards (PCBs) of the ETX-5 cards. To prevent physical damage:
• Always keep cards in their protective packaging until installed in the
ETX-5 chassis, and return them to the packaging as soon as they are removed
from the enclosure.
• Do not stack cards one above the other, and do not lay any objects on PCBs.
• After removing a card from a slot, wait at least four seconds before
reinserting it.
• When inserting a card into its chassis slot, align it carefully with the chassis
slot guides, and then push it in gently. Make sure the card PCB does not touch
the adjacent cards, or any part of the chassis. If resistance is felt before the
card fully engages the mating backplane connector, retract the card, realign it
with the slot guides and then re-insert.
Grounding
For your protection and to prevent possible damage to equipment when a fault
condition, e.g., a lightning stroke or contact with high-voltage power lines, occurs
on the lines connected to the equipment, the ETX-5 case must be properly
grounded (earthed) at any time. Any interruption of the protective (grounding)
Grounding connection inside or outside the equipment, or the disconnection of the
protective ground terminal can make this equipment dangerous. Intentional
interruption is prohibited.
Before connecting any other cable and before applying power to this equipment,
the protective ground terminal of the equipment must be connected to protective
ground. The grounding connection is made to the grounding terminal located on
the ETX-5 rear panel.
Whenever ETX-5 units are installed in a rack, make sure that the rack is properly
grounded and connected to a reliable, low-resistance grounding system, as the
rack can also provide a connection to the ground.
In addition, the grounding connection is also made through each one of the AC
power cables. Therefore, the power cable plug must always be inserted in a
socket outlet provided with a protective ground.
Laser Safety
ETX-5 modules may be equipped with a laser diode. In such cases, a label with
the laser class and other warnings as applicable will be attached near the optical
transmitter. The laser warning symbol may be also attached.
Warning
For your safety:
• Before turning on the equipment, make sure that the fiber optic cable is intact
and is connected to the optical transmitter.
• Do not use broken or unterminated fiber-optic cables/connectors.
• Do not look straight at the laser beam, and do not directly into the optical
connectors while the unit is operating.
• Do not attempt to adjust the laser drive current.
• The use of optical instruments with this product will increase eye hazard.
Laser power up to 1 mW at 1300 nm and 1550 nm could be collected by an
optical instrument.
• Use of controls or adjustment or performing procedures other than those
specified herein may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
ETX-5 modules equipped with laser devices provided by RAD comply with laser
product performance standards set by governmental agencies for Class 1 laser
products. The modules do not emit hazardous light, and the beam is totally enclosed
during all operating modes of customer operation and maintenance.
In some cases, the users may insert their own SFP or XFP laser transceivers into
ETX-5 modules. Users are alerted that RAD cannot be held responsible for any
damage that may result if non-compliant transceivers are used. In particular,
users are warned to use only agency approved products that comply with the
local laser safety regulations for Class 1 laser products.
Wherever applicable, ETX-5 modules are shipped with protective covers installed
on all the optical connectors. Do not remove these covers until you are ready to
connect optical cables to the connectors. Keep the covers for reuse, to reinstall
the cover over the optical connector as soon as the optical cable is disconnected.
Whenever feasible, during installation works use standard ESD protection wrist
straps to discharge electrostatic charges. It is also recommended to use garments
and packaging made of antistatic materials or materials that have high resistance,
yet are not insulators.
Before connecting this product to a power source, make sure to read the
Handling Energized Products section at the beginning of this manual.
Warning
Caution ETX-5 does not have a power switch, and therefore will start operating as soon
as power is applied to one of the power supply inlets.
The external circuit breaker used to protect the input power line can be used as
an ON/OFF power switch, or an external ON/OFF switch may be installed.
Power
ETX-5 can be equipped with either AC or DC power inlet (PI) modules, which
conduct power from external sources to the ETX-5 backplane. There are two PI
module types:
• DC for 40–72 VDC (48 or 60 VDC nominal), up to 12A current
• AC for 100–240 VAC, up to 6A current. It operates in conjunction with AC
power supplies installed in a hardware extension at the back of the chassis.
The AC power supplies convert AC voltage into 48 VDC voltage.
ETX-5s with AC power supplies can be powered via any combination of PI cards: 2
× AC, AC and DC, 2 × DC.
ETX-5 without AC power supplies can be powered only via 2 × DC PI cards.
If one of the power feeds fails all the power is delivered by the redundant feed.
AC Power
AC-powered ETX-5 units should be powered via easily-accessible grounded AC
outlets capable of furnishing 100, 115 or 230 VAC, 50/60 Hz.
The connection of AC power is made through the front panel AC power inlet
module. This module has a separate input connector for each AC power supply
module installed in the mechanical extension at the back of the chassis.
It is necessary to arrange a single ON/OFF power switch to simultaneously apply
power to all the ETX-5 power inlets. Powering AC power supply modules one at a
time may cause undesirable effects.
DC Power
DC-powered ETX-5 units require a 48 or 60 VDC (nominal voltage) power source
supplied over 14 AWG (1. 5 mm2) wires. The connection of DC power is made
through DC power inlet modules, which deliver the DC input voltage to power
supplies installed on main and I/O cards via two redundant backplane buses.
The second DC input enables connecting a separate DC input voltage, and thus
when power is connected to both DC input connectors, availability is increased by
having a redundant power source. The two DC inputs are isolated, and therefore
it is not possible for current to flow from one DC input to the other.
Caution The same nominal DC voltage must be supplied to both DC input connectors.
Each DC input must be protected by its own circuit breaker rated at 25A
maximum.
Warning
Within the ETX-5, the DC input supply lines are not referenced to the chassis
(frame) ground.
Panel Clearance
ETX-5 can be installed on shelves and in telecommunication racks. RAD offers
rack mount kits for installation in 19 inch (ANSI) racks or in ETSI racks.
Allow at least 70 mm (2.7 inches) of clearance at front, top, bottom and side for
cables and module replacement.
Note 70 mm (2.7 inches) clearance is sufficient for most telecommunication and power
connections (including fiber optic lines), but some more rigid cables (such as
Krone) require as much as 110 mm (4.3 inches) of clearance.
Ambient Requirements
The ambient operating temperature range of the ETX-5 is 32 to 122°F
(0 to +50°C), at a relative humidity of up to 93%, non-condensing.
Caution Do not operate ETX-5 without the fan tray installed. Irreversible damage to
hardware will occur if the chassis is operated without the fan tray installed, even
for a few minutes (maximum allowed at room temperature is 5 minutes).
Covering all empty slots is also required for reasons of personal safety and for
efficient cooling of the chassis.
Warning
Figure 2-2. Attaching Brackets for Front Edge Installation in 19” Racks
Figure 2-3. Attaching Brackets for Front Edge Installation in 23” Racks
Figure 2-5 shows how to attach the front and rear brackets supplied in the
RM-ETX-5300-AC-3U-19-FRONT kit for front edge installation of AC-powered ETX-
5 devices in 19” racks.
AC power supplies increase the unit’s depth and weight. Installation of
AC-powered ETX-5 devices in 19” racks requires additional brackets attached to
the rear of the chassis.
Figure 2-5. Attaching Brackets for Front Edge Installation and Rear Fastening in 19” Racks
3. While the other person holds ETX-5 in place, fasten the chassis to the rack
side rails with four screws, washers and nuts.
4. After installing the enclosure, check and install the required modules, in
accordance with the installation plan.
Figure 2-6 illustrates a 19” rack fully populated with twelve ETX-5 units.
ALARM CRITICAL
MAJOR
MINOR
TEST
LED
FAN
OK
FLT
F MAIN-B PS-B
I
L MAIN-A PS-A F
T A
I/O 2 I/O 4 N
E
R I/O 1 I/O 3 E5-FAN
Note The I/O slots labels are located on the fan tray panel.
Caution The cooling fan tray exhausts air from the chassis. The chassis cooling vents are
located in the side panel. Do not obstruct these vents. Leave at least 80 mm
(3.1 inch) clearance for sufficient airflow.
When replacing the ETX-5 fan tray in an operating chassis, do it quickly;
irreversible damage to hardware will occur if the chassis is operated without the
fan tray installed, even for a few minutes (maximum allowed at room
temperature is 5 minutes).
Caution Damage to the air filter and intake panel can restrict the airflow, causing
overheating in ETX-5, and degrading its performance. Be careful when cleaning
and replacing the air filter.
Caution Do not vacuum the air filter while it is installed in the chassis. You must remove
the air filter completely before you clean it to prevent contaminants from being
drawn into the enclosure.
E5-PIM
PWR
FLT
E5-PIM
PWR
FLT
E5-PIM/AC Module
The E5-PIM/AC module is used for connecting to 100–240 VAC power sources. The
E5-PIM/AC can be used only in ETX-5 units, that have AC power supplies installed
in the mechanical extension at the back of the chassis.
E5-PIM/DC Modules
The E5-PIM/DC modules are used for connecting to 40–72 VDC (48 VDC nominal)
power sources.
Installing PI Modules
Caution ETX-5 units with AC power supplies can be powered via any combination of PI
cards: 2 × AC, AC and DC, 2 × DC. ETX-5 without AC power supplies can be
powered only via 2 × DC PI cards.
To install a PI module:
1. Check that the two fastening screws of the PI module move freely.
2. Insert the PI module in its chassis slot, and slide it in until its rear connector
engages the mating connector on the backplane.
3. Secure the PI module by tightening its two screws.
1P
P
S
M
NG
ET MN
H G
10
M
Hz
LI N CO
K NT
10 AC RO
/1 0 T L
0 /1
00 PR
0B I
AS DC
E- E FL
T T
CL
K
RM
V
4. Insert the card in its chassis slot, and slide the card in. Make sure that the
inner side of the locking levers (item 3 in Figure 2-12) engages the chassis
frame.
5. Push the locking levers forward to fully insert the rear connector of the card
into the mating connector on the backplane.
Make sure that the locking hooks (item 2 in Figure 2-12) snap into place.
6. Secure the main card by tightening its two screws.
5. You can now disconnect the supervision terminal, and remove the module.
Before connecting any cables and before switching on this instrument, the
protective ground terminal of this instrument must be connected to the
protective ground conductor of the (mains) power cord. The mains plug shall only
Warning be inserted in a socket outlet provided with a protective ground contact. Any
interruption of the protective (grounding) conductor (inside or outside the
instrument) or disconnecting the protective ground terminal can make this
instrument dangerous. Intentional interruption is prohibited.
Caution ETX-5 does not have a power switch, and therefore it will start operating as soon
as power is applied to one of the power supply inlets.
The external circuit breaker used to protect the input power line can be used as
an ON/OFF power switch, or an external ON/OF switch may be installed.
Before connecting power to an AC-powered device, verify that every power inlet
card has a corresponding AC power supply installed in the chassis. The top E5-PIM
card is connected to AC power supply B, and the bottom E5-PIM card is
connected to AC power supply A.
Grounding
A grounding terminal is located on the front panel of the ETX-5 chassis.
Connecting to AC Power
To connect to AC power:
• Connect each power cable first to the connector on the E5-PIM/AC module,
and then to the power outlet.
Note When redundant power supplies are used, it is recommended to connect the
power cables to outlets powered by different circuits. However, it is necessary to
use one ON/OFF switch to simultaneously connect/disconnect all of them.
Connecting to DC Power
To connect to DC power:
1. Strip 7 mm (1/4 inch) of insulation from the leads.
Caution
Pay attention to polarity. For each source, connect the positive lead first, and the
negative lead second.
Refer to the Connection of DC Mains section at the beginning of this manual.
4 8/
PW 6 0V
R
F LT
-
+
E5
-PI
M
d
ea
eL
ti v
g a ad
Ne Le
e
s iti v
Po
Figure 2-11 shows the front panel of the main card. Chapter 3 explains the
functions of the indicators located on the panel.
11 20
LINK FLT
ACT
RMV
1
E5-GBE-20 100/1000BASE-X
10GbE
1 2
FLT
RMV
LINK ACT LINK ACT
E5-10GBE-2
20
OC-3/STM-1 FLT
FLT LINK 1 FLT LINK 2 FLT LINK 3 FLT LINK 4
RMV
LOS LOS LOS LOS
E5-cTDM-4
OC-12/STM-4
APS FLT
ON LINE 1 ON LINE 2
LASER
RMV
CLASS
1
LOS LOS
E5-cTDM-1
Caution When calculating optical link budget, always take into account adverse effects of
temperature changes, optical power degradation and so on. To compensate for
the signal loss, leave a 3 dB margin. For example, instead of the maximum
receiver sensitivity of -28 dBm, consider the sensitivity measured at the Rx side
to be -25 dBm. Information about Rx sensitivity of fiber optic interfaces is
available in SFP/SFP+/XFP Transceivers data sheet.
2. Carefully remove the dust covers from the SFP/SFP+ or XFP slot.
3. Insert the rear end of the SFP/SFP+ or XFP into the socket, and push it in
slowly until the SFP/SFP+ or XFP clicks into place. If you feel resistance before
the connectors are fully mated, retract the transceiver using the latch wire as
a pulling handle, and then repeat the procedure.
Caution Insert the transceiver gently. Using force can cause damage to the connecting
pins.
4. Remove the protective rubber caps from the SFP/SFP+ or XFP modules.
Caution Do not remove the SFP/SFP+ or XFP while the fiber optic cables are still
connected. This may result in physical damage (e.g., a chipped SFP or XFP module
clip or socket) or cause malfunction (e.g., the network port redundancy switching
may be interrupted).
10GbE
1 2
FLT
RMV
LINK ACT LINK ACT
E5-10GBE-2
11 20
LINK FLT
ACT
RMV
1
E5-GBE-20 100/1000BASE-X
LINK ACT
11 FLT
RMV
1
E5-GBE-20 10/100/1000BASE-T
20
OC-3/STM-1 FLT
FLT LINK 1 FLT LINK 2 FLT LINK 3 FLT LINK 4
RMV
LOS LOS LOS LOS
E5-cTDM-4
LOS LOS
E5-cTDM-1
Caution Terminal cables must have a frame ground connection. Use ungrounded cables
when connecting a supervisory terminal to a DC-powered unit with floating
ground. Using improper terminal cable may result in damage to supervisory
terminal port.
ALARM CRITICAL
MAJOR
MINOR
TEST
LED
FAN
OK
FLT
F MAIN-B PS-B
I
L MAIN-A PS-A F
T A
I/O 2 I/O 4 N
E
R I/O 1 I/O 3 E5-FAN
To turn on ETX-5:
Caution
ETX-5 does not have a power on/off switch, and will start operating as soon as
power is applied.
For an ETX-5 equipped with AC-powered power supply modules, be sure to
simultaneously connect the power to all the installed PS modules, for example, by
means of a common circuit breaker or an ON/OFF switch.
1. Connect the ETX-5 to power (see detailed instructions in Chapter 2). The PWR
indicators on all the E5-PIM PS modules that are powered light up, and remain
lit as long as the ETX-5 is powered.
You may also hear the fans in the ETX-5 fan tray start operating.
2. Wait for the completion of the power-up initialization process (this takes
about one minute). During this interval, monitor the power-up indications:
After power is applied, all the ETX-5 indicators turn on for a few seconds.
This allows you to check that the equipment indicators are functioning
properly.
After a few seconds, all the indicators turn off (except for the E5-PIM
PWR indicators as ETX-5 performs its power-up initialization.
3. After the power-up initialization ends, all the PWR indicators and the PRI
indicator of the active main card are lit steadily; the PRI indicator for the
standby main card starts blinking.
ETX-5 performs the startup procedure. See the Startup section below.
4. After startup ends, you may log in, using the supervision terminal.
3.2 Indicators
The unit's LEDs are located on the system and I/O modules. Table 3-1 lists the
functions of the ETX-5 LED indicators.
FLT Red ON – Card hardware, software or power failure has been E5-PIM, E5-FAN,
detected E5-MC-4,
OFF – No hardware, software or power fault has been E5-MC-SFP-P-4,
detected E5-10GBE-2,
E5-GBE-20,
E5-cTDM-4
E5-cTDM-STM4
OK Green ON – E5-FAN receives power and all fans are operational E5-FAN
3.3 Startup
Note Configuration files should contain only printable ASCII characters (0x20–0x7E),
<Enter> (0x0D), <Line Feed> (0x0A), and <Tab> (0x09).
Note It is recommended to use only 3 sw-pack files (and not 4). When the device is
configured to full scale and 4 sw-pack files are in use – there may not be enough
free space on the disk. In such a case, it is recommended to delete one of the
unused sw-pack files.
Caution Always wait until all main cards installed in the chassis are up and running before
executing any file operation commands.
Note The save command is used to save the user configuration. Some commands that
reset the device also erase the saved user configuration by copying another file
to it before the reset.
Loading Sequence
At startup, the device boots from the startup-config file, the user-default file, or
the factory-default file, in the sequence shown in Figure 3-2 . If none of these
files exist, the device boots using hard-coded defaults.
Start
Fail
No
Fail No
Boot from
Factory-default-config
End
Zero Touch
The Zero Touch feature allows ETX-5 to receive software and configuration files
automatically, eliminating the need to manually log into ETX-5 in order to transfer
the required files to it.
You can specify that ETX-5 sends a trap periodically to the management system
to notify it of its existence in the network (by default, this trap is not sent).
Manager Management
Method Port Transport Method Comments
Location Protocol
Terminal emulation
Running CLI commands &
applications such as
scripts from prompt
HyperTerminal, Procomm,
CONTROL Local Out-of-band RS-232
Putty, SecureCRT, Tera Term
(see Working with Terminal
below)
Note
By default, terminal, Telnet (SSH) and SNMP management access methods are
enabled.
You can enable or disable access to the ETX-5 management system via Telnet,
SSH, or SNMP applications. By disabling Telnet, SSH, or SNMP, you prevent
unauthorized access to the system when security of the ETX-5 IP address has
been compromised. When Telnet, SSH, and SNMP are disabled, ETX-5 can be
managed via an ASCII terminal only. In addition, you can limit SFTP and TFTP
operation.
Factory Defaults
By default, access is enabled via Telnet, SSH, and SNMP.
Allowing SSH (Secure Shell) access ssh no ssh blocks access by SSH
no ssh
ETX-5
LB IP
Router
RIF
SVI
ETX-2 NMS
SVI
Management SVI BP SVI Management
Network Network
VLAN X VLAN X
VLAN X VLAN X
User BP BP OOB Out-of-Band
VLAN X VLAN X Access
Bridge
PSN VLAN X VLAN X PSN
VLAN X VLAN X
User BP BP NET Inband
VLAN X VLAN X Access
SVI SVI
ETX-2 NMS
ETX-5
ETX-2 NMS
SVI SVI
Out-of-Band
Access
Router
SVI SVI
Layer-3 PSN Layer-3 PSN
User RIF 3 RIF 2 NET
Inband
Access
ETX-2 LB IP NMS
The ETX-5 host can be accessed by defining IP address and enabling management
on any of the internal router interfaces (RIFs), including virtual loopback (LB) IP
addresses.
By default, ETX-5 has RIF 1 connected to an out-of-band Ethernet management
port via ingress and egress untagged flows (see the figure below).
To enable remote management, it is necessary to:
• Define IP address of RIF 1
• Enable management access for RIF 1
• Enable RIF 1.
ETX-5
SVI
Note Management is disabled for loopback RIFs, which are used for TDM pseudowire or
Precision Time Protocol (IEEE 1588v2) traffic.
Note RAD recommends using the 115.2 kbps data rate for CLI management sessions.
10. Navigate to config>terminal# prompt and change the default terminal baud
rate (9.6 kbps) to 115.2 kbps.
11. Configure the PC communication port parameters to a baud rate of
115.2 kbps to match the new ETX-5300A settings.
12. Continue with product configuration.
configuration, you can use a Telnet host connected to it directly or via a local
area network.
Login
To prevent unauthorized modification of the operating parameters, ETX-5
supports four access levels.
• Superuser (su) can perform all the activities supported by the system,
including creating new users, changing its and other user access levels and
passwords, deleting and disabling other users.
• Operator (oper) can perform all the activities, except for defining, deleting or
disabling other users
• Technician (tech) can monitor the device (info, show status, show statistics)
• User (user) can monitor the device (info, show status, show statistics).
The default users cannot be deleted, but can be disabled (shut down). The
regular users (oper, tech, user) cannot define, delete or disable other users, or
change their own access levels. They are allowed to change their current
passwords. All users can view all CLI levels.
To enter as a superuser:
1. Enter su for user name.
2. Enter 1234 for password.
To enter as an operator:
3. Enter oper for user name.
4. Enter 1234 for password.
To enter as a technician:
1. Enter tech for user name.
2. Enter 1234 for password.
To enter as a user:
1. Enter user for user name.
Note Most commands are available only in their specific context. Global commands are
available in any context. You can type ? at any level to display the available
commands.
CLI Prompt
The base level prompt contains the device name, which is ETX-5 by default (the
device name can be configured in the system level; refer to the Device
Information section in this manual). The prompt ends with $, #, or >, depending
on the type of entity being configured and the user level.
If a new dynamic entity is being configured, the last character of the prompt is $.
Examples of dynamic entities include flows, QoS profiles, and OAM CFM entities.
If a new dynamic entity is not being configured, the last character of the prompt
is > (for tech or user access levels) or # (for other access levels).
Note The examples in this manual use # as the last character of the prompt, unless the
creation of a new dynamic entity is being illustrated.
After you type a command at the CLI prompt and press <Enter>, ETX-5 responds
according to the command entered.
Navigating
To navigate down the tree, type the name of the next level. The prompt then
reflects the new location. To navigate up, use the global command exit. To
navigate all the way up to the root, type exit all.
At the prompt, one or more level names separated by a space can be typed,
followed (or not) by a command. If only level names are typed, navigation is
performed and the prompt changes to reflect the current location in the tree. If
the level names are followed by a command, the command is executed, but no
navigation is performed and the prompt remains unchanged.
Note To use show commands without navigating, type show followed by the level
name(s) followed by the rest of the show command.
In the following example, the levels and command were typed together and
therefore no navigation was performed, so the prompt did not change.
ETX-5# configure system date-and-time date-format yyyy-mm-dd
ETX-5# show configure system system-date
2013-06-10 15:08:20 UTC +00:00
ETX-5#
In the following example, the levels were typed separately and the navigation is
reflected by the changing prompt.
ETX-5# configure
ETX-5>config# system
ETX-5>config>system# date-and-time
ETX-5>config>system>date-time# date-format yyyy-mm-dd
ETX-5>config>system>date-time# exit
ETX-5>config>system# show system-date
2013-06-10 15:13:23 UTC +00:00
ETX-5>config>system#
Command Tree
The tree command displays a hierarchical list of all the commands in the CLI tree,
starting from the current context.
ETX-5# tree
|
+---admin
| |
| +---factory-default-all
| |
| +---factory-default
| |
| +---reboot
| |
| +---software
| | |
| | +---install
| | |
| | +---software-confirm-required
| | |
| | +---undo-install
| | |
| | +---show status
| |
| +---startup-confirm-required
more..
1. Press <Enter> to see more or <CTRL-C> to return to the prompt.
When adding the detail parameter, the output also includes the parameters and
values for each command.
Command Structure
CLI commands have the following basic format:
command [parameter]{ value1 | value2 | … | valuen }
[ optional-parameter <value> ]
where:
You can type only as many letters of the level, command, or parameter as
required by the system to identify it. For example you can enter config manag
to navigate to the management level.
Special Keys
The following keys are available at any time:
Getting Help
You can get help in the following ways:
• Type help to display general help (see General Help)
• Type help <command> to display information on a command and its
parameters (see Command Help)
• Type ? to display the commands available in the level (see Level Help)
• Use <Tab> while typing commands and parameters, for string completion
(see Command-Line Completion)
• Use ? after typing a command or parameter, for interactive help (see
Interactive Help).
General Help
Enter help at any level to display general CLI help, including:
• Short description of CLI interactive help
• Commands and levels available at the current level
Command Help
Enter help <command> to display command and parameter information.
ETX-5>config>system# help name
- name <name-of-device>
- no name
<name-of-device> : Adds free text to specify the device name [0..255 chars]
Level Help
Enter ? at the command prompt to display the commands available in the current
level.
ETX-5>file# ?
delete - Deletes a file from the device
dir - Lists all files in the device
Command-Line Completion
Command-line completion saves you command-line entry time and reminds you
the syntax of command-line entities (levels, commands, parameters, flows, and
profiles).
In a command-line, ETX-5 completes command-line entities, when you press
<Tab> immediately following a string (one or more characters).
Some user-defined entity names, such as flow names or profile names, can be
completed as well. If you enter an entity name (flow, profile, or similar) that does
not exist in the database, ETX-5 creates this entity with the selected name.
• If the command-line entity name can be completed in only one way, when
you press <Tab>, ETX-5 autocompletes the entire name and appends a space.
• If the command-line entity name can be completed in more than one way,
ETX-5 appends the characters that are common to all possibilities, and
displays a list of the completion possibilities beginning with those characters.
• If the string is already a complete entity name
(level/command/parameter/flow/profile) or cannot be completed to a
complete name, no completion is done.
• Pressing <Tab> following a complete command name (followed by a space),
displays a list of available command arguments, if they exist (same behavior
as ?).
• Pressing <Tab> following a string and a space returns a CLI error: Ambiguous
Command. This is because the string entered could be completed to more
than one command and is therefore ambiguous.
Interactive Help
To get interactive help, type ?.
In general, typing a ? directly after a string displays possibilities for string
completion, while typing <space> and then a ? displays possibilities of the next
argument.
When a <CR> appears in a ? list, the string you entered is itself a valid command
needing no further additions. Pressing <Enter> executes the command or
navigates to the indicated level.
Typing ? immediately after a command or partial command with no space before
the ?, tells ETX-5 to display all possibilities for completing the string. Help output
is always followed by the string you typed with the cursor at the end of the
string waiting for input.
ETX-5>config>flows# classifier-profile myclass m?
match-any
ETX-5>config>flows# classifier-profile myclass m
ETX-5>admin# fact?
factory-default-all - Resets all configuration and counter
factory-default - Loads factory default configuration
ETX-5>admin# fact
ETX-5>admin# factory-default?
factory-default-all - Resets all configuration and counters
<CR>
ETX-5>admin# factory-default
When a string cannot be completed, ETX-5 displays “cli error: Invalid Command”.
ETX-5>admin# stac?
# cli error: Invalid Command
ETX-5>admin# stac
ETX-5>file# da ?
# cli error: Invalid Command
ETX-5>file# da
Typing <?> after a space between a command or level name and the ? tells ETX-5
to display possibilities of the next argument. If the string preceding the ? is
ambiguous or invalid, an explanatory message is displayed. The string does not
have to be a complete command.
If there is only one possible command starting with that string, pressing <Enter>
will execute the command. If there is more than one command that starts with
the string, the CLI displays a message that it can’t clarify which command you
want.
ETX-5>admin# factory?
ETX-5>admin# factory ?
# cli error: Ambiguous Command
ETX-5>admin# factory
A string that is a complete command name followed by a space ? displays all
possible command parameters.
ETX-5>config>flows# show ?
summary - Displays list of flows
ETX-5>config>flows# show
ETX-5>config>flows# classifier-profile ?
<classification-n*> : [1..32 chars]
ETX-5>config>flows# classifier-profile
The next example shows a complete command to which a parameter could be
appended. It also shows how a string that is a complete command is executed by
pressing <CR>, or <Enter>.
ETX-5>config>access-control# resequence access-list acl_1 ?
<CR>
<number> : [0..100000]
The next example shows a complete command that has no parameters.
ETX-5>config>flows# classifier-profile myclass match-any ?
<CR>
ETX-5>config>flows# classifier-profile myclass match-any
Refreshing Output
You can specify that ETX-5 should periodically refresh the output of a show
command.
Note The example uses a slot number to reference the port, which may not be
applicable to every device.
Administrative Status : Up
Operational Status : Down
Connector Type : SFP Out
Auto Negotiation : Other
Name ETH-1/1
Administrative Status : Up
Operational Status : Down
Connector Type : SFP Out
Auto Negotiation : Other
MAC Address : 00-20-D2-50-E3-84
To exit the refresh-mode press ESC or Ctrl+C
ETX-5>config>port>eth(1/1)#
Filtering Output
Some commands, such as info and show display large amounts of information as
their output. It is possible to control the type and amount of information
displayed, by filtering the output.
To filter a command’s output, append to the command:
| [include | exclude | begin] <filter-expression>
I.e., add a pipe, one of the following keywords and a filter-
expression.
Keyword Description
include The output includes only lines that match the filter
expression.
exclude The output includes only lines that do not match the filter
expression.
begin The output starts with the first line that matches the filter
expression and continues with all further lines.
Metacharacters
Metacharacters are characters with special meaning. They allow you to define
filter criteria, while not being part of the filter criteria themselves. Some are place
holders or wildcards. Some allow you to define ranges of characters to either
include or exclude. You can construct complex filter expressions to see the exact
output you want. Table 4-4 describes filter metacharacters.
. Matches any single character r.t matches the strings rat, rut, and r t, but not
root
$ Matches the end of a line device$ matches the end of the string header
device but not the string header device-name
^ Matches the beginning of a line ^device matches the beginning of the string
device loaded from but not the string header
device-name
* Matches zero or more occurrences of .* means match any number of any characters
the preceding character
\ This character is used to treat the \$ is used to match the $ character rather than
following metacharacter as an ordinary match the end of a line
character \. is used to match a period rather than match
any single character
[] Matches any one of the characters r[aou]t matches rat, rot, and rut, but not ret
[c1-c2] between the brackets [0-9] matches any digit
[^c1-c2] Ranges of characters are specified by a [A-Za-z] matches any upper or lower case letter
beginning character (c1), a hyphen,
[^269A-Z] matches any character except 2, 6, 9,
and an ending character (c2); multiple
and uppercase letters
ranges can be specified as well
To match any character except those in
the range, use ^ as the first character
after the opening bracket
| Logical OR two conditions together (band|comp) matches the lines bandwidth cir
999936 cbs 65535 and compensation 0
{i} Matches a specific number (i) or range A[0-9]{3} matches A followed by exactly three
{i,j} (i through j) of instances of the digits, i.e. it matches A123 but not A1234
preceding character [0-9]{4,6} matches any sequence of 4, 5, or 6
digits
with quote metacharacters. All characters found after a space not enclosed by
quotes are ignored by the CLI.
The following table provides some example of regular expressions and the
resulting string that will be used to filter the CLI output.
“str” str
“s t r” str
“str “str
“str\”str” str”str
“str\”str “str\”str
“str”str str
\”str” \”str”
Enabling Entitites
Some dynamic entities are created as inactive by default. After the configuration
is completed, the no shutdown command activates the entity, as shown below.
Note The example uses a slot number to reference the port, which may not be
applicable to every device.
Using Scripts
CLI commands can be gathered into text files. They may be created using a text
editor, by recording the user commands or by saving the current configuration.
These files can be configuration files or scripts. Configuration files have specific
names and contain CLI commands that ETX-5 can use to replace the current
configuration, while scripts contain CLI commands that add to the current
configuration. Configuration files can be imported from and exported to RAD
devices via file transfer protocols.
For more information on configuration files, refer to the description in the
Operation chapter.
In order to execute a CLI script, you have to copy/paste it to the CLI terminal, or
send it to ETX-5 via the RADview Jobs mechanism, CLI script option.
Factory Defaults
By default, authentication is via the locally stored database (1st-level local).
Specifying authentication method auth-policy 1st-level radius [2nd-level ETX-5 first attempts authentication via the
preferably via RADIUS/TACACS+, then tacacs+ [3rd-level {local | none}]] server specified by 1st-level. If the server
optionally TACACS+/RADIUS, then auth-policy 1st-level tacacs+ [2nd-level does not answer the authentication
optionally local radius [3rd-level {local | none}]] request, then ETX-5 attempts to
authenticate via the server specified by
2nd-level. If the server does not answer the
authentication request, then ETX-5
attempts to authenticate according to
3rd-level:
• local – ETX-5 authenticates via the local
database
• none –No further authentication is
done, and the authentication request is
rejected.
Note: If at any time in this process, an
authentication server rejects an
authentication request, ETX-5 ends the
authentication process and does not
attempt authentication at the next level.
Specifying authentication method auth-policy 1st-level tacacs+ [2nd-level { If 2nd-level is set to local, authentication is
preferably via TACACS+, then local | none } ] performed via the TACACS server. If the
optionally local TACACS server does not answer the
authentication request, then ETX-5
authenticates via the local database. .If the
TACACS server rejects the authentication
request, ETX-5 ends the authentication
process.
If 2nd-level is set to none, authentication is
performed via the TACACS server only.
Standards
RFC 2865, Remote Authentication Dial In User Service (RADIUS)
RFC 2618, RADIUS Authentication Client MIB
Benefits
The RADIUS protocol allows centralized authentication and access control,
avoiding the need to maintain a local user data base on each device on the
network.
Functional Description
When a login attempt occurs at ETX-5, it submits an authentication request to
the RADIUS server. The RADIUS server checks the database and replies with either
Access Rejected or Access Accepted.
Factory Defaults
By default, no RADIUS servers are defined. When the RADIUS server is first
defined, it is configured as shown below.
address 0.0.0.0
retry 2
timeout 2
auth-port 1812
Assigning an IP address to the server address <ip-address> Possible IP addresses range from
1.1.1.1 to 255.255.255.255
Defining a non-disclosed string (shared key <string> [hash] The shared secret is a secret key
secret) used to encrypt the user consisting of free text known to
password. the client and the server for
encryption. It is hashed if
specified.
Defining the UDP port to be used for auth-port <udp-port-number> Range 1–65535
authentication
Counter Description
Access Rejects Number of Access-Reject packets received from the RADIUS server
Pending Requests The number of RADIUS Access-Request packets destined for this server
that have not yet timed out or received a response. This counter is
incremented when an Access-Request is sent and decremented due to
receipt of an Access-Accept, Access-Reject or Access-Challenge, a
timeout or retransmission.
Counter Description
Timeouts Number of times a server did not respond, and the RADIUS server re-
sent the packet
Unknown Types Number of RADIUS packets of unknown type which were received
Packets Dropped Number of incoming packets silently discarded for some reason other
than malformed, bad authenticators or unknown types
Standards
RFC 1492, An Access Control Protocol, sometimes called TACACS.
Benefits
The TACACS+ protocol allows centralized authentication and access control,
avoiding the need to maintain a local user data base on each device on the
network. The TACACS+ server encrypts the entire body of the packet but leaves a
standard TACACS+ header.
Factory Defaults
By default, no TACACS+ servers are defined. When the TACACS+ server is first
defined, it is configured as shown below.
retry 1
timeout 5 seconds
authentication-port 49
accounting-port 49
Functional Description
TACACS+ is a protocol that provides access control for routers, network access
servers and other networked computing devices via one or more centralized
servers. TACACS+ is based on AAA model:
• Authentication – The action of determining who a user is.
• Authorization – The action of determining what a user is allowed to do. It can
be used to customize the service for the particular user.
• Accounting – The action of recording what a user is doing, and/or has done.
The TACACS+ client can be configured to use authentication/authorization with or
without accounting functionality.
When configuring users on external TACACS+ servers, refer to Table 4-6 to define
authorization levels for ETX-5 standard users.
Components
The TACACS+ remote access environment has three major components: access
client, TACACS+ client, and TACACS+ server.
• The access client is an entity which seeks the services offered by the
network.
• TACACS+ client running on ETX-5, processes the requests from the access
client and pass this data to TACACS+ server for authentication.
• The TACACS+ server authenticates the request, and authorizes services over
the connection. The TACACS+ server does this by matching data from the
TACACS+ client`s request with entries in a trusted database.
TACACS+ server decides whether to accept or reject the user's authentication or
authorization. Based on this response from the TACACS+ server, the TACACS+
client decides whether to establish the user's connection or terminate the user's
connection attempt. The TACACS+ client also sends accounting data to the
TACACS+ server to record in a trusted database.
TACACS+ uses TCP for its transport and encrypts the body of each packet.
TACACS+ client and server can agree to use any port for authentication and
Accounting
ETX-5 supports up to five accounting groups, with up to five TACACS+ servers per
group. However, each TACACS+ server can be bound to a single accounting group
only.
A group can be defined with its own accounting level:
• Shell accounting, which logs the following events:
Successful logon
Logon failure
Successful logoff
ETX-5-terminated management session.
• System accounting, which records system events/alarms registered in local
log file
• Command accounting, which logs the following events:
Any shell command that was successfully executed by ETX-5
Any level that was successfully changed in a shell.
Defining a non-disclosed string (shared key <string> [hash] The shared secret is a secret
secret) used to encrypt the user key consisting of free text
password known to the client and the
server for encryption. It is
hashed if specified.
Note You can enter any combination of shell, system, and commands, but you must
enter at least one of them.
ETX-5>config>mngmnt>tacacsplus>group(TAC1)$ exit
ETX-5>config>mngmnt>tacacsplus# server 175.18.172.150
ETX-5>config>mngmnt>tacacsplus>server(175.18.172.150)# group TAC1
ETX-5>config>mngmnt>tacacsplus>server(175.18.172.150)# info detail
key "244055BF667B8F89829AB8AB0FE50885" hash
retry 1
timeout 5
authentication-port 49
accounting-port 49
group "TAC1"
no shutdown
Displaying Statistics
To display TACACS+ statistics:
• At the config>mngmnt>tacacsplus>server <ip-address># prompt, type:
show statistics.
The TACACS+ statistic counters are displayed.
ETX-5>config>mngmnt>tacacsplus>server(175.18.172.150)$ show statistics
Requests 0
Request Timeouts 0
Unexpected Responses 0
Server Error Responses 0
Incorrect Responses 0
Transaction Successes 0
Transaction Failures 0
Pending Requests 0
Counter Description
Request Timeouts Number of transaction timeouts that occurred between the client and
server
Unexpected Responses Number of times the TACACS+ client receives a TACACS+ packet that is
not expected at that time. Usually, this occurs due to a delayed response
to a request that has already timed out
Server Error Responses Number of errors received from the TACACS+ server
Transaction Failures Number of times the TACACS+ client’s request is aborted by the TACACS+
server or the server fails to respond after maximum retry is exceeded
Pending Requests Number of TACACS+ client’s requests minus number of TACACS+ server
responses or timeouts
Enabling TACACS+ accounting for the accounting [shell] [system] Accounting can be of any
group [commands] combination
no accounting disables
TACACS+ accounting for the
group
Applicable Products
This feature is applicable to all ETX-5 products, with the following conditions:
Standards
Relevant sections of RFC 1812
Benefits
Service providers use ACLs to maintain network security by preventing malicious
traffic from entering the device. ACLs can be used to save network resources by
dropping unwanted packets.
When management data is marked via ACLs, service providers can apply various
traffic management techniques to the marked packets, such as allocating more
bandwidth to a certain traffic type.
Functional Description
Devices featuring ACLs can flexibly filter management traffic, by denying or
permitting IP packets to enter the host, according to the packet’s
source/destination address, protocol type, or other criteria.
ACL entries are sequentially numbered rules containing statements (Deny, Permit,
or Remark) and conditions. Remarks are free-text ACL entries used for
commenting and visually organizing ACLs.
Packets are permitted or denied access, based on the following conditions:
• IP source and destination address or address range
• IP protocol
• TCP port – TCP/23 (TELNET), TCP/22 (SSH)
Note By default, logging is disabled. If you choose to enable it, the default logging
interval is 5 minutes.
Two packets matching the same rule on the same entity in the same direction are
logged only if the time between them exceeds the logging interval.
After a match, the rest of the rules are ignored. Packets not matching any rule
are dropped. Empty ACLs deny access of all packets matched to them.
Show Me Demo
Note If the video cannot be viewed, make sure that you have the latest version of
Adobe Reader.
Statistics
The device collects ACL statistics per management entity and direction. The
statistic counters include the number of rule matches that occurred since the
counters were last cleared. The statistic counters are cleared upon device reboot.
The user may also clear ACL statistics of any entity and direction pair.
Factory Defaults
Parameter defaults are alphabetically listed in the tables below.
All ACL Rules ACL statement sequence Highest number in use in the ACL plus 10
log Disable
sequence-number –
Configuring ACL
The ACL configuration tasks are performed at the access control and
management levels.
To configure ACL:
1. Create an access control list.
2. Add deny and permit rules to the ACL.
3. Bind the ACL to a management entity.
4. Configure additional ACL parameters (such as logging interval and ICMP
Unreachable messages), if necessary.
Access-Control-Level Tasks
The following commands are available in the CLI access-control context:
config>access-control#. The exception to this are the deny, permit and remark
commands, which are performed in the access-list(acl_name) context:
configure>access-control>access-list(acl_name)#.
Creating and access-list [{ipv4 | ipv6}] <acl_name> Creating an ACL is performed by assigning
deleting an ACL no access-list <acl_name> a name and specifying the ACL IP type.
The ACL names must be unique.
The ACL name contains up to
252 alphanumeric characters.
Adding deny deny {tcp | udp} {any | <src-address> [/<src- The arguments of the deny rule vary
rules to an ACL prefix-length>]} [<src-port-range>] any depending on the protocol (TCP, UDP). The
[<dst-port-range>] [log] [sequence command is repeated three times, each
<sequence-number>] protocol with its relevant arguments.
Management-bound ACLs have the
following configuration limitations:
• Only TCP- or UDP-based rules can be
defined.
• The destination IP address must be
any.
• For TCP/UDP, the destination port must
be tcp/23 (Telnet), tcp/22 (SSH) or
udp/161 (SNMP).
• The source port must remain any (i.e.
optional src-port-range field should not
be configured).
• DSCP and IP Precedence are not
supported.
Sequence number range is 1–
2147483648.
log enables logging match events of the
rule into the event log and sending SNMP
traps.
Adding permit permit {tcp | udp} {any | <src- The arguments of the permit rule vary
rules to an ACL address>[/<src-prefix-length>]} [<src-port- depending on the protocol (TCP, UDP).
range>] any [<dst-port-range>] [log] The command is repeated three times,
[sequence <sequence-number>] each protocol with its relevant arguments.
Management-bound ACLs have the
following configuration limitations:
• Only TCP- or UDP-based rules can be
defined.
• The destination IP address must be
any.
• For TCP/UDP, the destination port must
be tcp/23 (Telnet), tcp/22 (SSH), or
udp/161 (SNMP).
• The source port must remain any (i.e.
optional src-port-range field should not
be configured).
• DSCP and IP Precedence are not
supported.
Sequence number range is 1–
2147483648.
log enables logging match events of the
rule into the event log and sending SNMP
traps.
Adding remarks remark <description> [sequence <sequence- The description contains up to 255
to an ACL number>] characters.
Setting the logging access-list <value> Enable logging at the maximum rate of the
logging interval no logging access-list value set at Access Control level. <0> is
of all ACLs equivalent to no logging access-list
command.
no logging access-list disables event
logging for all rules in the ACL.
Management-Level Tasks
The following commands are available in the CLI management context:
configure>management>access#.
Binding the ACL access-group <acl-name> {in | out} The management entity supports the ACLs
to a no access-group {in | out} only in the in direction.
management When binding the ACL to the management
entity and entity, or when adding/editing rules in an
defining the ACL ACL that is bound to the management
direction entity, the rules must conform to the
following limitations:
• The protocol rules must be of TCP/UDP
type.
• The destination address must be set to
any.
• The source port must be set to any.
• The destination port must be tcp/23
(Telnet), tcp/22 (SSH) or udp/161
(SNMP).
• DSCP, IP precedence or P-bit cannot be
used.
Displaying the show access-list summary Displays ACL status at the current level
summary of ACLs See Displaying Status below.
bound to a
management
entity
Example
Management ACL
The table below summarizes the rules configured for the ACL. Items in red are
either implied or unavailable for the current parameter or serve as system
settings that cannot be changed. The deny rule appearing in the bottom row is a
system rule that is used to deny all non-compliant data.
Sequence Action Protocol Source IP TCP/UDP Dest. IP TCP/UDP Dest. Port Log
Number Source Port
Configuration Errors
The table below lists the messages generated by the device when a configuration
error is detected.
Message Description
Cannot execute; invalid statement Invalid matching rule. For example, binding the ACL with a rule,
using a protocol other than TCP or UDP to the management
entity.
Cannot add statement; sequence Invalid sequence number of the rule. Allowed sequence number
number out of range range is 1–2147483648.
Cannot resequence; sequence number Resequence has failed because the ACL interspace value is
out of range invalid.
Cannot clear; no such router interface Statistic counters cannot be cleared on the non-existing router
interface.
Cannot bind; no such access list A non-existing ACL cannot be bound to the router interface or
the management entity.
Cannot show; no such router interface Statistic counters cannot be displayed on the non-existing
router interface.
Cannot bind; invalid statement An access list with statements, which are not supported by the
management ACL, cannot be attached to the management
entity.
Displaying Status
The ACL status displays information on the ACL name, type (IPv4 or IPv6), the
entity that the ACL is bound to and its direction. The status information is
available for the ACLs at the management access levels.
Displaying Statistics
The ACL statistic counters gather information on the number of rule matches
registered on the ACL since the last reboot or counter clearing.
Note All ACLs have an implied last rule that denies all packets. The device does not
provide statistic counters for this rule. If you intend to collect statistics on the
number of packets discarded by the default ACL mechanism, you must add the
deny ip any any rule at the end of the ACL.
4.8 Default IP
ETX-5 allows local management access using a PC to an ‘out-of-the-box’ ETX-5
over the OOB management port in the factory default configuration. This is an
untagged management access.
Benefits
Default IP allows you to power up a device and connect a local management
console to it out-of-the-box with no configuration necessary.
Functional Description
The IP address of the RI is 169.254.1.1/16. When the PC is using DHCP, access to
ETX-5 is automatically established (the PC address defaults to 169.254.x.y as no
DHCP server according to Microsoft protocol). The configuration includes flows to
and from an SVI Router and a Router interface.
Flows, SVI and RI are assigned with indexes at the high end of the range and
reserved flow names.
• SVI # : 4000
• RI # : 128
• Flows : mng_access_default_in , mng_access_default_out
A ‘no route’ configuration is supported per RI and is configured by default over
this RI. There is no default Gateway configuration.
The factory default configuration is only loaded if there is no startup-config or
user-default-config.
Note If you copy a script and paste it to the terminal after factory-default-config is
loaded, make sure the configuration the pasted script contains does not conflict
with the factory default configuration.
Access group
Trap report policy.
Script below provides all necessary configuration steps. Replace IP addresses and
entity names with values relevant for your network environment.
#*******************************Adding_SVI***********************************
config port svi 99 router
exit all
#**********************************End***************************************
#***************************Adding Classifier_Profiles***********************
config flows classifier-profile classall match-any
match all
exit all
#***************************Configuring_Flows********************************
config flows flow mng_in
classifier classutg
ingress-port mng-ethernet main-a/0
egress-port svi 99
no shutdown
exit all
config flows flow mng_out
classifier classall
ingress-port svi 99
egress-port mng-ethernet main-a/0
no shutdown
exit all
#**********************************End***************************************
#*********************Configuring_Router_Interface***************************
configure router 1 interface 1
address 172.18.219.116/24
bind svi 99
no shutdown
exit
static-route 0.0.0.0/0 address 172.18.219.1
exit all
#**********************************End***************************************
#*********************Configuring_SNMP_View/Mask/Type************************
configure management snmp
view internet 1
mask 1
type included
no shut
exit all
#**********************************End***************************************
#*********************Configuring_SNMP_Access_Group************************
configure management snmp
access-group initial usm no-auth-no-priv
context-match prefix
exit all
#**********************************End***************************************
#**************************Configring_SNMP_Traps*****************************
configure management snmp
target-params p
message-processing-model snmpv3
version usm
security name initial level no-auth-no-priv
no shutdown
exit
target a
target-params p
tag-list unmasked
address udp-domain 172.17.176.35
no shutdown
exit
notify unmasked
tag unmasked
no shutdown
exit all
#**********************************End************************************
Performance Management
ETX-5 maintains performance management (PM) statistics for selected entities in
the device. The PM statistics are collected into a file periodically, for retrieval by
RADview, for display in the RADview PM portal (refer to the RADview System
User’s Manual for further details on the PM portal). The PM collection process can
be globally enabled or disabled for the entire device. In addition, the statistics
collection can be enabled for all entities of a specific type, or for specific entities.
The PM data is useful for analyzing ETX-5 service quality. The flexible statistics
collection allows only the necessary data to be collected.
PM statistics collection is configured for the device, entity type, and specific
entities. PM statistics maintenance is configured for specific entities. PM statistics
are maintained and collected for the following types of entities:
• Ethernet ports
• Flows
• OAM CFM services
• OAM CFM destination NEs.
Notes • PM statistics collection is performed only if it is enabled for the entire device,
regardless of whether it is enabled for any entity
• PM statistics are not collected for entities that are administratively disabled.
PM statistics collection is configured for the entire device via the pm command,
and for entity types via the pm-collection command, in the reporting level. For
specific entities, PM statistics collection is configured via pm-collection and PM
statistics maintenance is configured via pm-enable, in the specific entity level.
The interval parameter for the pm-collection command can range from 1 to
900 seconds (15 minutes), however the value must divide evenly into 3600.
Different intervals can be specified for an entity type and for specific entities of
that type. For example, if the PM statistics collection interval for all flows is
configured to 15 minutes, and the PM statistics collection interval for flow-1 is
configured to 1 minute, the data displayed in the RADview PM portal shows flow
data for every 15 minutes, and flow-1 data for every minute.
The following shows the PM statistics collection configuration tasks, and their
corresponding commands, as well as the level of each command.
Enabling PM statistics oam > cfm > md(<mdid>) > pm-collection interval Type no pm-collection to
collection for a specific ma(<maid>) > mep(<mepid>) <seconds> disable PM statistics
OAM CFM service and > service(<serviceid>) collection for the service
defining interval
Enabling PM statistics oam > cfm > md(<mdid>) > pm-collection interval Type no pm-collection to
collection for a specific ma(<maid>) > mep(<mepid>) <seconds> disable PM statistics
OAM CFM destination > service(<serviceid>) > collection for the
NE and defining interval dest-ne(<dest-ne-index>) destination NE
Note PM statistics are collected for entities for which PM statistics collection is
specifically enabled in the entity level via pm-collection and statistics
maintenance (if applicable) is enabled via pm-enable, even if PM statistics
collection for the entity type is disabled.
To view the performance management configuration for the device and for entity
types:
1. Navigate to configure reporting.
2. Enter info detail | include pm to view PM-related commands in the
configuration.
Examples
Note In this example, PM statistics are collected only for flow10 and Ethernet port 3.
exit all
configure reporting
#**** Enable PM in device
pm
#**** Enable PM for Eth ports, collection interval=2 min
pm-collection eth interval 120
#**** Enable PM for flows, collection interval=5 min
pm-collection flow interval 300
#**** Enable PM for OAM CFM dest NEs, collection interval=15 min
pm-collection dest-ne interval 900
exit all
#**** Configure PM statistics collection interval for Eth port 0/3, to 1 min
configure port ethernet 0/3
pm-collection interval 60
pm-enable
exit all
save
Configuration Errors
The table below lists the messages displayed by ETX-5 when a configuration error
is detected.
Message Description
Invalid interval; must divide evenly into The pm-collection command was entered with an interval value
3600 that does not divide evenly into 3600
Cannot execute; too many different Attempt was made to configure more intervals than the
intervals supported maximum
PM Flow Scale
Statistics Scaling
Main card flows statistics:
• Device level Configuration of flow PM scale.
Small PM scale of 2000 flows or flow pairs (Bridge case) , involves per
flow counter set including color aware counters.
Large PM scale of 4000 flows or flow pairs (Bridge case) , involves per
flow counter set excluding color aware counters
• Changing PM scale configuration involves a device reset
• PM scale change from high scale to low scale is possible if no more than 2000
flows or flow pairs are configured with PM enabled (sanity)
• PM scale change from low scale to high scale is supported with no limitation.
The CLI command to change the PM scale is: config>flows>pm-scale {low | high}
PtP flows and MP flows at bridge port Ingress support the following running and
interval statistics counters (interval statistics are supported only in PM portal
phase 3.0).
Scaling
• Small-scale flow PM mode: Up to 1000 MEPs (EVCs) support PM (LM/DM)
• High-scale flow PM mode: Up to 2000 MEP’s (EVC’s) shall support PM
(LM/DM)
• Up to a total of 2000 PM sessions
Counters
A different set of counters is supported for the two PM scale modes as shown
below.
Benefits
Allows management of devices over IPv6.
Functional Description
ETX-5 supports IPv6 for device management. The ETX-5 router is an internal
Layer-3 interworking device that forwards traffic between its interfaces. Each
router interface is assigned an IP address and can be bound to one of the
following:
• Physical port on Ethernet I/O or main card
No limit on number of RIF’s per port (up to the RIF shelf limit).
• Bridge port
The router uses service virtual interfaces (SVIs) for connecting to logical and
physical ports. The connection is always made by directing flows from a port to
an SVI, and then binding the SVI to a router interface.
Note 1588 UDP/IP and UDP/IP TDM PW are not supported for IPv6
Each RI supports dual stack forwarding, i.e concurrent IPv4 and IPv6 forwarding.
Each router interface can simultaneously support both IPv4 and IPv6 packets.
Each packet is forwarded per the Routing table according to packet type (IPv4 or
IPv6). Multiple IP addresses (IPv4, IPv6) are supported per Router interface.
Note The section of RFC-4213 related to “Configured tunneling of IPv6 over IPv4” is
not supported.
• TFTP
• SFTP
Standards
IEEE 802.1ag-D8, ITU-T Y.1731
LLDP
MEF 36
Factory Defaults
By default, OAM functionality is disabled.
Functional Description
OAM (Operation, Administration, and Maintenance) describes the monitoring of
network operation by network operators. OAM is a set of functions used by the
user that enables detection of network faults and measurement of network
performance, as well as distribution of fault-related information. OAM may trigger
control plane or management plane mechanisms, by activating rerouting or by
raising alarms, for example, but such functions are not part of the OAM itself.
OAM functionality ensures that network operators comply with QoS guarantees,
detect anomalies before they escalate, and isolate and bypass network defects.
As a result, the operators can offer binding service-level agreements.
OAM Elements
The Ethernet OAM mechanism monitors connectivity in Maintenance Association
(MA) groups, identified by a Maintenance Association Identifier (MAID). Each
maintenance association consists of two or more maintenance end points (MEP).
Every MA belongs to a maintenance domain (MD), and inherits its level from the
MD to which it belongs. The MD levels are used to specify the scope of the MA
(provider, operator, customer, etc).
• Maintenance Domain (MD) – The network or the part of the network for
which faults in connectivity can be managed. Each maintenance domain has
an MD level attribute which designates the scope of its monitoring.
OAM Functions
RAD’s carrier Ethernet aggregation and demarcation devices feature a
comprehensive hardware-based Ethernet OAM and performance monitoring for
SLA assurance:
• End-to-end Connectivity Fault Management (CFM) per IEEE 802.1ag:
Continuity check (CC)
Non-intrusive loopback
Link trace for fault localization
• End-to-end service and performance monitoring per ITU-T Y.1731
Loss measurement (single-ended)
Delay measurement (two-way).
Note Loss measurement is supported only if the MEP-connected flows have their
statistic counters enabled (PM-enabled).
OAM Connectivity
The figure below shows how the various levels of OAM sessions supported by
RAD equipment allow each entity to monitor the layers under its responsibility
and easily isolate problems. The Maintenance Entities (MEs) are created at
different levels:
• Lowest-level OAM session (subscriber ME) between two subscriber devices
(devices 1 and 8). ETX-2xxA devices serve as a MIPs
• End-to-end OAM session (EVC ME) between two ETX-2xxAs, which serve as
MEPs. ETX-5 devices act as MIPs.
• Segment OAM session (operator service ME) between ETX-2xxA and the
network side of ETX-5.
• Transport OAM session (tunnel ME) between network ports of two ETX-5
devices.
Subscriber Subscriber
Equipment Operator A NEs Service Provider Operator B NEs Equipment
1 2 3 4 5 6 7 8
Subscriber ME
EVC ME
Ethernet
Operator A Service ME
Operator B Service ME
UNI ME UNI ME
Transport Tunnel ME
ETX-2 ETX-2
ETX-5 Router Router ETX-5
Legend:
Triangle – MEP (Maintenance End Point)
Circle – MIP (Maintenance Intermediary Point)
10 GbE BP 10 GbE
MEP Bridge BP MEP
A MEP is transparent to OAM frames whose MD level is higher than the MEP level,
and drops OAM packets whose MD level is lower than the MEP level. It fully
supports connectivity check (CC), loopback, link trace and PM counters,
Down MEP
Down MEPs reside at port egress and are bound to physical ports. These MEPs
receive and send CFM PDU from and to the network. Down MEPs are supported
for either point-to-point (E-Line) or multipoint (E-LAN) services. Different MEP
locations are illustrated below.
The figure below illustrates a point-to-point service between two main card ports
with the MEP bound to port B. Tx flow in the service is directed to a queue block.
Tx Flow
MEP
Rx Flow
Main Card Main Card
Port A Port B
Figure 4-8. PtP Service with Down MEP Bound to Main Card Port B
The figure below illustrates a point-to-point service between main and I/O card
ports with the MEP bound to port B. Tx flow in the service is directed to a queue
block.
Tx Flow
MEP
SAP
Rx Flow
Main Card I/O Card
Port A Port B
Figure 4-9. PtP Service with Down MEP Bound to I/O Card Port B
The figure below illustrates a point-to-point service between main and I/O card
ports with MEP bound to port A. Tx flow in the service is directed to a queue
block.
Rx Flow
MEP
SAP
Tx Flow
Main Card I/O Card
Port A Port B
Figure 4-10. PtP Service with Down MEP Bound to Main Card Port A
Figure 8-46 illustrates a point-to-point service between two I/O card ports with
the MEP bound to port B. Tx flow in the service is directed to a queue block.
Tx Flow
SAP
MEP
SAP
Rx Flow
I/O Card I/O Card
Port A Port B
Figure 4-11. PtP Service between Two I/O Card Ports with Down MEP Bound to Port B
The figure below illustrates a multipoint service between main card and bridge
ports with the MEP bound to port A. Tx flow in the service is directed to a queue
block.
Tx Flow
BP Bridge BP SVI MEP
Rx Flow
Main Card
Port A
Figure 4-12. Multipoint Service with Down MEP Bound to Main Card Port A
The Down MEP is defined over the physical port, inheriting its MAC address. The
Down MEP EVC/location is characterized by:
• Rx flow, whose classification profile can be one of the following:
Untagged
Single VLAN
Single VLAN+P-bit
Single outer + single inner VLAN
Single outer VLAN + P-bit + single inner VLAN
Match all. If configured over an IO port, the flow from the corresponding
SAP must be used. It also needs a classification profile to specify the
packet tag structure (as it cannot be taken from the flow classification
profile).
• Tx flow to a destination queue to forward OAM frames.
Up MEP
Up MEPs are supported for either point-to-point (E-Line) or multipoint (E-LAN)
services.
E-Line Up MEP
Up MEPs can be used on point-to-point (port-to-port) services. The Up MEP is
bound to an adjacent Ethernet port, inheriting its MAC address; it also faces the
egress port of the service.
The E-Line Up MEP is characterized by:
• Rx flow
• Tx flow.
Different E-Line MEP locations are illustrated below.
The figure below illustrates a point-to-point service between two main card ports
with the Up MEP bound to port A.
Tx Flow
MEP
Rx Flow
Main Card Main Card
Port A Port B
Figure 4-13. PtP Service with Up MEP Bound to Main Card Port A
The figure below illustrates a point-to-point service between two I/O card ports
with the Up MEP bound to port A.
Tx Flow
SAP
MEP
SAP
Rx Flow
I/O Card I/O Card
Port A Port B
Figure 4-14. PtP Service between Two I/O Card Ports with Up MEP Bound to Port
A
E-LAN Up MEP
Up MEPs may reside at bridge ingress and are bound to bridge ports. These MEPs
receive and send CFM PDU from and to the bridge entity. The Up MEPs inherit
their MAC addresses from the corresponding physical ports (egress ports of Tx
flows). Different E-LAN Up MEP locations are illustrated below.
The figure below illustrates a multipoint service between I/O card and bridge
ports with the Up MEP bound to the bridge port. Tx flow in this service is directed
to the BP SVI.
Rx Flow
BP Bridge BP SVI MEP SAP
Tx Flow
I/O Card
Port A
The figure below illustrates a multipoint service between main card and bridge
ports with the Up MEP bound to the bridge port. Tx flow in this service is directed
to the BP SVI.
Rx Flow
BP Bridge BP SVI MEP
Tx Flow
Main Card
Port A
Multipoint Up MEP is defined over the bridge port. The Up MEP is characterized
by:
• Rx flow with a single VLAN classification profile
• Tx flow.
MIPs
Unlike MEP, which is a directional entity acting as a service termination point, MIP
is defined as a bidirectional intermediate entity, consisting of half functions
(MHFs). There are two types of intermediate entities: service-level and MD-level
MIPs. These MIP modes differ in functionality, scale, configuration, and cannot be
activated simultaneously.
Service-Level MIPs
Service-level MIP responds to link trace messages (LTMs) and loopback messages
(LBMs), whose MD level is equal to the MIP MD level. ETX-5 supports up to 256
service-level MIPs.
MIP
LBM/LTM LBM/LTM
Flow X Flow X
LBR/LTR LBR/LTR
MHF MHF
Like MEPs, the MIPs are bound to physical ports (directly- or indirectly-attached),
inheriting the MAC address of the port for LTM purposes. The MIPs have two
MHFs (up and down), each directed towards a physical port or bridge port. They
also have Rx and Tx flows attached to them:
• MHF 1 facing the physical port to which the MIP is bound
• MHF 2 facing the physical or bridge port.
MIP locations are similar to those of MEP.
The MIPs are defined under MD level and are characterized by the following:
• The physical port to which they are bound, inheriting the port’s MAC source
address
• Rx flow, originating from the MIP-bound port, which faces MHF 1, and whose
classification profile can be one of the following:
Untagged
Single VLAN
Single VLAN+P-bit
Single outer + single inner VLAN
Single outer VLAN + P-bit + single inner VLAN
• Rx classification, when Rx flow originates from SA with the Match All
classification profile
• Tx flow, originating from the physical port facing MHF 2
• CoS mapping profile
• Optional egress queue for the Tx flow.
The two figures below illustrate service-level MIPs in point-to-point and
multipoint services.
MIP
(bound to port B)
Rx Flow
Tx Flow
Main Card MHF 2 MHF 1 Main Card
Port A Port B
MIP
(bound to port B)
Rx Flow
SAP
Tx Flow
Main Card MHF 2 MHF 1 I/O Card
Port A Port B
MIP
(bound to port B)
Rx Flow
BP Bridge BP SVI
Tx Flow
MHF 2 MHF 1 Main Card
Port B
MD-Level MIPs
MD-level MIPs are activated per device per MD level (or several MD levels).
Flows
When MD-level MIP mode is activated, ETX-5 creates a MIP for each flow at each
Ethernet port and bridge port. This includes the flows that already existed in the
system, and the new ones, which are added after device-level MIP creation. The
MIP inherits source MAC address from the adjacent Ethernet port.
MD-level MIPs can be defined over flows with one of the following classification
profiles:
• Single VLAN
• Single outer + single inner VLAN
MD-level MIPs cannot be provisioned over flows connected to router- and
pseudowire-type SVIs.
The two figures below illustrate device-level MIPs over point-to-point and
multipoint services.
MIP MIP
(bound to port A) (bound to port B)
MIP MIP
(bound to port A) (bound to port B)
SAP
MIP
(bound to port A)
SAP BP
MIP
Port A MHF 2 MHF 1 (bound to port C)
MIP
Bridge BP SVI
(bound to port B)
Port C
MHF 2 MHF 1
SAP BP
Measurements
MD-level MIPs respond to link trace messages (LTMs), whose MD level is equal to
the MIP MD level. MD-level MIPs do not interfere with active MAC swap loopbacks
on specific flows.
When a valid LTM is received:
• LTR is sent back:
E-Line: always
E-LAN: If a target MAC address in LTM is learned by the bridge
LTM is relayed:
E-Line: always
E-LAN: if a target MAC learned by the bridge, LTM is relayed to the port,
from which the MAC address is learned.
LTR includes:
• Ingress TLV replied with ingress MIP MAC address
MIP
LTM LTM
Flow X Flow X
LTR LTR
MHF MHF
Messaging System
The Ethernet service OAM mechanism uses cyclic messages for availability
verification, fault detection, and performance data collection. The main message
types are detailed below.
Note OAM cyclic messages (CCMs, LBMs and LTMs) packet priority (P-bit value) is
user-configurable at MEP level.
CC Messages
Continuity Check Messages (CCMs) are sent from the service source to the
destination node at regular periodic intervals. They are used to detect loss of
continuity or incorrect network connections. A CCM is multicast to each MEP in a
MA at each administrative level. CCM status information is available at the MEP
and RMEP levels.
AIS
When a MEP detects a connectivity failure at a physical port, it propagates an
Alarm Indication Signal (AIS) in the direction away from the detected failure to
the next higher level. The AIS is sent over the MEP Rx flow with the level as
configured by the client MD level (default is the MEP level + 1) for the following
trigger events:
• LOC
• LCK
• Rx AIS.
The signal is carried in dedicated AIS frames. The transmit interval is configured
per MEP, and can be set to one frame per second (default) or one frame per
minute. The AIS message priority is set per MEP via P-bit (0–7) configuration.
AIS, LCK, LOC
Rx Flow
MEP
Tx Flow
RDI
When a downstream MEP detects a defect condition, such as a receive signal
failure or AIS, it sends a Remote Defect Indication (RDI) upstream in the opposite
direction of its peer MEP or MEPs. This informs the upstream MEPs that there has
been a downstream failure. The Tx RDI is also initiated when a LOC is detected on
at least one of the associated RMEPs.
CCM Interval
CCM interval is user-configurable at the MA level to 3.33 ms, 10 ms, 100 ms, 1s,
1m, 10m.
CCM Multcast DA
CCM multicast destination MAC addresses per 802.1ag definition are detailed in
the table below.
01-80-C2-00-00-3y
7 7
6 6
5 5
4 4
3 3
2 2
01-80-C2-00-00-3y
1 1
0 0
Loopback Messages
MEPs send loopback messages (LBMs) to verify connectivity with another MEP or
MIP for a specific MA. Loopback is a ping-like request/reply function. A MEP sends
a loopback request message to another MEP or MIP, which generates a
subsequent LBR (loopback response). LBMs/LBRs are used to verify bidirectional
connectivity.
The LBMs are always marked green. LBM priority uses the CCM priority that is
configurable as a P-bit value at the MEP level. LBM CoS is set according to a P-bit-
to-CoS profile, with up to four such profiles per chassis.
LBMs are generated on demand and sent up to 500 times at a rate of 10 pps.
LTM Priority
The LBMs are always marked green. CCM priority is configurable as a P-bit value at
the MEP level, according to a P-bit-to-CoS profile with up to four such profiles per
chassis.
MEP
LTR
Main Card Main Card
Port A Port B
Figure 4-24. MEP with LTM Sent from the Card Port in Point-to-Point Service
In the figure below, the MEP responds with LTR if the target MAC address of the
received LTM is the same as the MEP MAC address (inherited from the port to
which the MEP is bound). LTM is not relayed.
LTM
Figure 4-25. MEP with LTM Sent from the Bridge Port in Multipoint Service
In the figure below, the MIP always responds with LTR and relays the LTM.
LTM LTM
LTR
MIP
Main Card Main Card
Port A Port B
Figure 4-26. MIP with LTM Sent from the Card Port in Point-to-Point Service
In the figure below, the MIP responds with LTR if the target MAC address of the
received LTM has been learned on the bridge port. The MIP relays the LTM if the
target MAC address of the received LTM has been learned on the bridge port or
has not been learnt at all. If the target MAC address has been learned on another
bridge port, the LTM is discarded.
LTM LTM
BP Bridge BP SVI
LTR
MIP
Main Card
Port A
Figure 4-27. MIP with LTM Sent from the Bridge Port in Multipoint Service
In the figure below, the MIP responds with LTR if the target MAC address of the
received LTM has been learned on another bridge port. The MIP relays the LTM to
the bridge port with the target MAC address. If the target MAC is unknown, the
MIP floods the LTM.
LTM LTM
BP Bridge BP SVI
LTR
MIP
Main Card
Port A
Figure 4-28. MIP with LTM Sent from the Card Port in Multipoint Service
Performance Monitoring
ETX-5 Ethernet service OAM PM functionality complies with the Y.1731
requirements. ETX-5 provides per-service loss and delay measurement and event
reporting.
Note Loss measurement is supported only if the MEP-connected flows have their
statistic counters enabled (pm-enable).
tunnels. It can be activated even if the MEP flows do not have statistic counters
enabled (no pm-enable). Up to 64 destination NEs are supported by a MEP
service (E-Line and E-L AN). Figure 8-64 details standard Y.1731 counters used in
the synthetic loss measurements.
LMM
TxFcf: Tx DMM+DMR Counter
MEP MEP
Configuring OAM
Ethernet OAM configuration procedure includes the following steps, detailed in
this section:
Note Before deleting any of the OAM CFM components, verify that it is not used by
other ETX-5 elements, such as ERP.
Note A maintenance domain can be deleted only if it has all its MEPs/MIPs deleted or
disabled.
Specifying the maintenance md-level <md-level> The allowed range for md-level is 0–7
domain level Note: If the pre-standard OAM protocol
is used, the only value allowed for the
maintenance domain level is 3.
Specifying the name of the name string <md-name-string> • Maximum length of MD name string is
maintenance domain no name 43 characters
• Maximum combined length of MD
name and MA name strings is
44 characters
• ETX-5 supports up to 2048 MEPs with
MDs and/or MAs, using name strings
Note A maintenance association can be deleted only if it has all its MEPs/MIPs deleted
or disabled.
Specifying MA name in UINT, name uint <0–65535> • Maximum length of MD name string is
string, or icc format name string <ma-name-string> 43 characters
Configuring MEP for the MA mep <mepid> Refer to Configuring Maintenance Endpoints
Enabling AIS sending and ais [ interval { 1s | 1min }] To disable AIS sending, enter no ais
defining interval [priority <priority>]
Binding the MEP to an bind ethernet <slot/port> To remove the MEP from an Ethernet port,
Ethernet port, LAG or SVI bind lag <port_number> LAG or SVI, enter no bind
Specifying the priority of ccm-priority <priority> The allowed range for <priority> is 0–7
CCMs, LBMs and LTMs
transmitted by the MEP
Associating the MEP with a classification profile <profile_name> Classifier profile is needed when the MEP
classifier profile no classification profile Rx flow has the SAP ingress port (in this
case the flow classifier profile is Match
All).
To delete classifier profile assignment,
enter no classification profile.
Defining client MD level client-md-level <md_level> Client MD level is a level for sending
upstream AIS
Associating the MEP with a cos-mapping profile <profile_name> The CoS mapping profile must be
CoS profile no cos-mapping profile P-bit-to-CoS to assign the class of service
to the packets transmitted by the MEP
(CCMs, LBTs etc).
To delete CoS mapping profile assignment,
enter no cos-mapping profile.
Assigning unidirectional Rx flow uni-direction rx <rx_flow_name> [tx To delete flow assignment, enter no flow
and Tx flows to the MEP <tx-name>] uni-direction
no flow uni-direction
Activating OAM link trace linktrace See Performing OAM Link Trace
Defining the queue for the queue queue-mapping To delete queue assignment, enter no
MEP <queue_mapping_profile_name> queue queue-mapping
[block <level_id>/<queue_id>]
no queue queue-mapping
Defining remote MEP with remote-mep <remote_mep_id> Allowed range for remote MEP is 1–8191
which the MEP no remote-mep <remote_mep_id> The MEP ID and the remote MEP ID must
communicates be different. You can define up to 512
remote MEPs for the local MEP if standard
OAM protocol is being used for the MD
and the destination address type is
multicast; otherwise you can define only
one remote MEP.
To delete remote MEP, enter no
remote-mep <remote_mep_id>
MD-Level MIP
When MD-level MIP mode is activated, ETX-5 creates a MIP for each flow at each
Ethernet port and bridge port. The MIPs are added for each specified MD level, or
MD level range.
Service-Level MIP
MIPs are bidirectional intermediate entities, consisting half functions (MHFs). MIPs
respond to link trace messages (LTMs) and loopback messages LBMs, whose MD
level is equal to the MIP MD level. ETX-5 supports up to 256 MIPs.
To add a maintenance intermediate point (MIP):
• At the config>oam>cfm>md(<mdid>)# prompt enter: mip <mipid>
The maintenance intermediary point is created and the
config>oam>cfm>md(<mdid>)>mip(<mipid>)$ prompt is displayed.
Binding the MIP to an bind ethernet <slot/port> To remove the MIP from an Ethernet port,
Ethernet port, LAG or SVI bind lag <port_number> LAG or SVI, enter no bind
Assigning unidirectional Rx flow uni-direction rx <rx_flow_name> [tx To delete flow assignment, enter no flow
and Tx flows to the MIP <tx-name>] uni-direction
no flow uni-direction
The following marking actions can be performed at the mhf level, at the
config>oam>cfm> md(<mdid>)>mip(<mipid>)>mhf(1 or 2)# prompt.
Associating the MHF with a classification profile <profile_name> Classifier profile is needed when the MHF
classifier profile no classification profile Rx flow has the SAP ingress port (in this
case the flow classifier profile is Match
All).
To delete classifier profile assignment,
enter no classification profile.
Associating the MHF with a cos-mapping profile <profile_name> The CoS mapping profile must be
CoS profile no cos-mapping profile P-bit-to-CoS to assign the class of service
to the packets transmitted by the MHF
(CCMs, LBTs etc).
To delete CoS mapping profile assignment,
enter no cos-mapping profile.
Defining the queue for the queue queue-mapping To delete queue assignment, enter no
MHF <queue_mapping_profile_name> queue queue-mapping
[block <level_id>/<queue_id>]
no queue queue-mapping
Associating this service with a classification priority-bit <p-bit> The allowed range is 0–7
priority for LMMs and DMMs
Specifying delay threshold in delay-threshold <delay-thresh> The allowed range for delay
microseconds threshold is: 1–5,000,000. If the
threshold is exceeded, the
service is declared as degraded.
Specifying delay variation delay-var-threshold <delay-var-thresh> The allowed range for delay
threshold in microseconds variation threshold is:
1–5,000,000. If the threshold is
exceeded, the service is
declared as degraded.
Selecting loss measurement loss { single-ended} [{synthetic | user- no loss disables loss
method data}] measurement
no loss
Activating the MEP service no shutdown You can activate a service only if
the corresponding MEP is active
and you have defined at least
one destination NE.
Viewing running statistics show statistics running The statistics are displayed
as listed in Table 8-62
Viewing statistics for the current show statistics current The statistics for the current
interval interval are displayed as
listed in Table 8-62
Viewing the statistics for a show statistics interval <interval-num> Allowed values for
selected interval interval-num: 1–96
The statistics for the
selected interval are
displayed as listed in
Table 8-62
If you specified an interval
that has not yet ended, a
message indicates that the
interval does not exist.
Viewing statistics for current day show statistics current-day The statistics for the current
day, as listed in Table 8-62
Viewing statistics for previous show statistics previous-day The statistics for the
day previous day, as listed in
Table 8-62
Viewing statistics for all intervals show statistics all-intervals Performance measurement
counters for all available
Intervals, as listed in
Table 8-62
Parameter Description
Far End Tx Frames Total number of OAM frames transmitted from the local MEP to the
remote MEP since the service was activated
Far End Rx Frames Total number of OAM frames received by the remote MEP since the
service was activated
Far End Lost Frames Total number of OAM frames lost from the local MEP to the remote MEP
since the service was activated
Far End Frame Loss Ratio (%) Total number of OAM frames lost from the local MEP to the remote MEP,
divided by the total number of OAM frames transmitted since the service
was activated
Far End Unavailable Seconds Total number of unavailable seconds in the remote MEP since the service
(sec) was activated
Parameter Description
Near End Tx Frames Total number of OAM frames transmitted from the remote MEP to the
local MEP since the service was activated
Near End Rx Frames Total number of OAM frames received by the local MEP since the service
was activated
Near End Lost Frames Total number of OAM frames lost from the remote MEP to the local MEP
since the service was activated
Near End Frame Loss Ratio (%) Total number of near end lost OAM frames divided by the total number
of near end transmitted OAM frames
Near End Unavailable Seconds Total number of unavailable seconds in the local MEP since the service
(sec) was activated
Average Two Way Delay (msec) Average delay
Frames Above Delay Threshold Number of frames that exceeded the delay threshold
Frames Above Delay Variation Number of frames that exceeded the delay variation threshold
Threshold
Min Two-Way Frame Delay The minimum two-way frame dealy measurement in microseconds
(interval statistics only)
Max Two-Way Frame Delay The maximum two-way frame dealy measurement in microseconds
(interval statistics only)
Average Two Way Delay Var The average (arithmetic mean) two-way FDV measurement in
(mSec) microseconds (interval statistics only)
Min Two-Way Frame Delay The minimum two-way frame dealy variation measurement in
Variation microseconds (interval statistics only)
Max Two-Way Frame Delay The maximum two-way frame dealy variation measurement in
Variation microseconds (interval statistics only)
Elapsed Time (sec) Time (in seconds) elapsed since the service was activated
ETX-5>config>oam>cfm>md(1)>ma(1)>mep(205)>service(1)>dest-ne(1)# show
statistics running
Running Counters
-----------------------------------------------------------------------------
Forward Backward
Tx Frames : 0 0
Rx Frames : 0 0
Frames Loss : 0 0
Unavailable Seconds : 119 119
ETX-5>config>oam>cfm>md(1)>ma(1)>mep(205)>service(1)>dest-ne(1)# show
statistics current
Current
-----------------------------------------------------------------------------
Forward Backward
Tx Frames : 0 0
Rx Frames : 0 0
Frames Loss : 0 0
Frame Loss Ratio (%) : 0.0000% 0.0000%
Unavailable Seconds : 0 0
ETX-5>config>oam>cfm>md(1)>ma(1)>mep(205)>service(1)>dest-ne(1)# show
statistics interval 1
Interval
-----------------------------------------------------------------------------
Interval : 1
Valid Data : Valid
Time Stamp : 2014-07-06 08:45:00.0
Duration (Sec) : 900
Forward Backward
Tx Frames : 0 0
Rx Frames : 0 0
Frames Loss : 0 0
Frame Loss Ratio (%) : 0.0000% 0.0000%
Unavailable Seconds : 0 0
Specifying remote the MEP by linktrace address <mac-address> The TTL parameter specifies
MAC or mep-id address [ttl <1–64>] the number of hops. Each unit
linktrace remote-mep <mep-id> in the link trace decrements
[1..8191] the TTL until it reaches 0,
which terminates the link trace.
Destnation MAC address LTM
cannot be multicast.
Examples
This section illustrates OAM configuration for three MEP instances (two Down
MEPs and one Up MEP).
LMMs
MEP PSN MEP
EVC1_eg LMRs DMMs
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet main-b/2 queue-group profile q_group_2_level_default
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-b/1 classification-key vlan p-bit
config port ethernet main-b/2 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Enabling_Main_Card_Ports*********************************
config port ethernet main-b/1 no shutdown
config port ethernet main-b/2 no shutdown
exit all
#*********************************End********************************************
************************Defining_Classifier_Profile******************************
config flows classifier-profile class20 match-any
match vlan 20
exit all
#*********************************End****************************************
************************Defining_Policer_Profiles********************************
config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0
config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0
exit all
#*********************************End********************************************
************************Defining_CoS_Mapping_Profile*****************************
cos-map-profile cos1 classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
******************************Adding_Flows***************************************
configure flows flow EVC1_eg
classifier class20
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1
ingress-color profile color1
cos-mapping profile cos1
no shutdown
exit all
*********************Defining_Measurement_Bin_Profiles***************************
config oam cfm measurement-bin-profile bin_profile_delay1 thresholds
20,100,300,1000
config oam cfm measurement-bin-profile bin_profile_delay_var1 thresholds
40,200,600,1000
exit all
#*********************************End********************************************
#**************************Defining_MEP_and_MEP_Service**************************
config oam cfm
maintenance-domain 1
md-level 4
maintenance-association 1
name uint 265
mep 1
bind ethernet main-b/1
cos-mapping profile cos1
direction down
service 1
classification priority-bit 1
dest-ne 1
remote mac 00-20-d2-50-1d-28
delay-measurement-bin bin_profile_delay1
delay-var-measurement-bin bin_profile_delay_var1
exit
no shutdown
exit all
#*********************************End********************************************
#*******************Configring_OAM_Reporting_Thresholds**************************
config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60
config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60
SAG
SAP
CCMs
ECV2COS1
EVC2_eg LMMs
Port 1 SAP 1 Port 1 PSN MEP
ECV2COS2 MEP LMRs DMMs
EVC2_ing
DMRs
Remote NE
SAP
Figure 4-34. Down MEP between Main and I/O Card Ports
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet 1/1 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-b/1 classification-key vlan inner-vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Enabling_Main_and_I/O_Card_Ports*************************
config port ethernet main-b/1 no shutdown
config port ethernet 1/1 no shutdown
exit all
#*********************************End********************************************
************************Defining_Classifier_Profiles*****************************
config flows classifier-profile class100pbit6 match-any
match vlan 100 p-bit 6
exit all
************************Defining_Policer_Profiles********************************
config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0
config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0
exit all
#*********************************End********************************************
************************Defining_CoS_Mapping_Profile*****************************
cos-map-profile cos1 classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
******************************Adding_Flows***************************************
configure flows flow ECV2COS1
classifier class100pbit6
cos-mapping fixed 0
ingress-color green
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 1
no shutdown
exit all
*********************Defining_Measurement_Bin_Profiles***************************
config oam cfm measurement-bin-profile bin_profile_delay1 thresholds
20,100,300,1000
config oam cfm measurement-bin-profile bin_profile_delay_var1 thresholds
40,200,600,1000
exit all
#*********************************End********************************************
#**************************Defining_MEP_and_MEP_Service**************************
config oam cfm
maintenance-domain 1
maintenance-association 2
name uint 22
mep 2
bind ethernet main-b/1
cos-mapping profile cos1
direction down
flow uni-direction rx EVC2_ing tx EVC2_eg
queue queue-mapping QueueMapDefaultProfile block 0/1
ccm-initiate
ccm-priority 0
remote-mep 110
no shutdown
service 1
classification priority-bit 1
dest-ne 1
remote mac 00-20-d2-50-2e-55
delay-measurement-bin bin_profile_delay1
delay-var-measurement-bin bin_profile_delay_var1
exit
no shutdown
exit all
#*********************************End********************************************
#*******************Configring_OAM_Reporting_Thresholds**************************
config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60
config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60
SVI
Flow 1 1
Port 1 MEP BP 1
Flow 2
SVI
Flow 3 2
Port 2 BP 2
Flow 4
SVI
Flow 5 3
Port 3 BP 3
Flow 6
Bridge
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-a/1 queue-group profRile q_group_2_level_default
config port ethernet main-a/2 queue-group profile q_group_2_level_default
config port ethernet main-a/3 queue-group profile q_group_2_level_default
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet main-a/2 classification-key vlan p-bit
config port ethernet main-a/3 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Enabling_Main_and_I/O_Card_Ports*************************
config port ethernet main-a/1 no shutdown
config port ethernet main-a/2 no shutdown
config port ethernet main-a/3 no shutdown
exit all
#*********************************End********************************************
************************Defining_Classifier_Profiles*****************************
config flows classifier-profile class20 match-any
exit all
#*********************************End****************************************
************************Defining_CoS_Mapping_Profile*****************************
cos-map-profile cos1 classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
***********************Configuring_Bridge_and_Bridge_Ports***********************
config port svi 1 bridge
exit all
******************************Adding_Flows***************************************
config flows flow 1
classifier class20
ingress-port ethernet main-a/1
egress-port svi 1
ingress-color profile color1
cos-mapping profile cos1
no shutdown
exit all
*********************Defining_Measurement_Bin_Profiles***************************
config oam cfm measurement-bin-profile bin_profile_delay1 thresholds
20,100,300,1000
config oam cfm measurement-bin-profile bin_profile_delay_var1 thresholds
40,200,600,1000
exit all
#*********************************End********************************************
#**************************Defining_MEP_and_MEP_Service**************************
config oam cfm
maintenance-domain 2
md-level 3
maintenance-association 3
name uint 37
mep 3
bind svi 1
cos-mapping profile cos1
direction up
flow uni-direction rx 2 tx 1
ccm-initiate
ccm-priority 0
remote-mep 101
no shutdown
service 1
classification priority-bit 1
dest-ne 1
remote mac 00-20-d2-50-1d-28
delay-measurement-bin bin_profile_delay1
delay-var-measurement-bin bin_profile_delay_var1
exit
no shutdown
exit all
#*********************************End********************************************
#*******************Configring_OAM_Reporting_Thresholds**************************
config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60
config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Mismatch between flow and MIP The classification profile bound to the MIP and the classification
classification profiles profiles of its Rx/Tx flows do not match
Flow must be enabled The flow must be administratively enabled before it is bound to
the MEP/MIP
Maximum number of MEPs (8) associated A single flow can be bound to up to eight MEPs
with the flow has been reached
Different MEPs/MIPs, using the same When the same flow is bound to different MEPs/MIPs, the flow
flow, must have different MD levels must have different MD levels
MIP bound to Ethernet port or LAG must When a MIP is bound to an Ethernet port or LAG, the MIP must
have classification profile have a classification profile assigned to it
MIP-bound bridge port is not a member The bridge port of the SVI to which the MIP is bound is not a
of the MHF’s classification profile VLAN member of the VLAN defined in the VLAN-based classification
profile used by the MIP’s MHF
MEP is not bound to a port A MEP must be bound to an Ethernet port, LAG or bridge-type
SVI
Cannot bind CoS mapping profile to a The CoS profile cannot be bound to a MEP bound to an Ethernet
MEP bound to an Ethernet port or LAG port or LAG
Cannot bind queue mapping profile to a The queue mapping profile cannot be bound to a MEP bound to
MEP bound to an Ethernet port or LAG an Ethernet port or LAG
Up MEPs are bound to SVI (B), Down The Up MEP must be bound to a bridge-type SVI. The Down MEP
MEPs are bound to Ethernet port or LAG must be bound to an Ethernet port or LAG
Cannot delete MA with MEPs The MA cannot be deleted if it has MEPs defined under it
Cannot change MA with MEPs The MA parameters cannot be changed if the MA has MEPs
defined under it
Cannot change MA with MIPs The MA parameters cannot be changed if the MA has MIPs
defined under it
The value is out of range The value entered not within the allowed range
MA name is out of range The MA name value is not within the allowed range (0–6535)
Max number of MEs has been reached The maximum number of MEs (4096) has been reached
Max value has been reached The maximum value for the current parameters has been
reached. This may refer to the number of MEPs/MIPs, remote
MEPs, destination NEs, etc.
Max number of Down MEPs per MA has Only one Down MEP is allowed per MA
been reached
Message Description
Entity must be in shutdown The entity (MEP, MIP, port, etc.) must be administratively
disabled in order to delete or change its parameters
Port does not exist The port to which you are trying to bind a MEP/MIP does not
exist
MEP/MIP port is not Ethernet, LAG or SVI The port to which you are trying to bind a MEP/MIP is not
Ethernet, LAG or SVI
SVI must be of bridge type The SVI to which you are trying to bind a MEP/MIP is not a bridge
type
VLAN ID is out of range The selected VLAN ID is not within the allowed range (0–4094)
VLAN ID can be changed in MEP/MIP The VLAN ID can be changed only when the MEP/MIP is
shutdown administratively disabled
Classification profile can be changed in Assigned classification profile can be changed only when the
MEP/MIP shutdown MEP/MIP is administratively disabled
Invalid classification profile The classification profile bound to the MEP/MIP is not valid.
Profile does not exist A non-existing classification or CoS mapping profile has been
bound to MEP/MIP
CoS mapping profile must be P-bit-to- Only a P-bit-to-CoS CoS mapping profile can be bound to
CoS MEP/MIP
Only default queue mapping profile is Only a default queue mapping profile (QueueMapDefaultProfile)
allowed can be bound to MEP/MIP
Port can be changed, when MEP/MIP is in The port to which a MEP/MIP is bound can be changed only
shutdown when the MEP/MIP is administratively disabled
LTM destination MAC cannot be multicast The destination MAC address for OAM link trace messages
cannot be a multicast type
Cannot enable OAM service if no The OAM service can be administratively enabled only if a
destination NE exists destination NE has been defined for it
Cannot enable OAM service if no The OAM service can be administratively enabled only if a
destination NE MAC exists destination NE MAC address has been defined
Destination NE MAC can be unicast only The MAC address of the destination NE can be a unicast type
only
MEP Rx flow must be configured The Rx flow for the MEP has not yet been configured
MEP Tx flow must be configured The Tx flow for the MEP has not yet been configured
I/O port-to-SAP flow must be configured For Rx flow with ingress port defined as SAP, there must be a
for Rx flow with SAP as ingress port matching flow between I/O port and SAP
Illegal ingress port for Rx or Tx flow The ingress port for Rx and Tx flows must be an Ethernet port,
LAG, bridge-type SVI or SAP
Classification profile must be bound to If Rx flow uses the Match All classification mode, a separate
MEP/MIP, if Rx flow uses Match All classification profile must be bound to the MEP/MIP
classification
Message Description
Classification profile must be bound to If Tx flow uses the Match All classification mode, a separate
MEP/MIP, if Tx flow uses Match All classification profile must be bound to the MEP/MIP
classification
Classification profile cannot be bound to If Rx flow does not use the Match All classification mode, a
MEP/MIP, if Rx flow uses other than separate classification profile cannot be bound to the MEP/MIP
Match All classification
OAM service must be in shutdown The OAM service must be administratively disabled for this
action
MEP must be in no shutdown The MEP to be administratively enabled for this action
Cannot delete MD with MA or MIP under An MD with existing MAs or MIPs cannot be deleted
it
Cannot change MD level The MD level cannot be changed if the MD has MEPs/MIPs under
it
Max number of MDs has been reached The maximum number of MDs (4096) has been reached
Bin profile is in use and cannot be The measurement bit profile is in use and cannot be deleted or
changed modified
Standards
IEEE 802.3ah
Benefits
Ethernet OAM (EFM) provides remote management and fault indication for the
Ethernet links. Remote link failure can be detected via OAM (EFM).
65B
Factory Defaults
By default, OAM EFM is not enabled for Ethernet ports.
Functional Description
OAM EFM is specified by IEEE 802.3ah and can be implemented on any full-duplex
point-to-point or emulated point-to-point Ethernet link.
OAM EFM messages are sent in untagged slow protocol frames called OAM
Protocol Data Units, or OAMPDUs. They cannot propagate beyond a single hop
within an Ethernet network and have modest bandwidth requirements (frame
transmission rate is limited to a maximum of 10 frames per second).
802.3ah 802.3ah
Ethernet Ethernet
OAMPDUs MPLS OAMPDUs
Access Access
Core Network
Network Network
Layer-2 Operation
OAM EFM operates purely at the Ethernet layer, and so (unlike SNMP or ping)
does not require an IP address. This means that Ethernet service providers do not
need to run IP protocols or manage IP addresses. Furthermore, special Ethernet
features may be directly supported, such as Ethernet multicast and slow protocol
frames. When an OAM frame is received by an OAM-enabled Ethernet MAC, it is
passed to the OAM client for processing; such a frame is simply discarded if
received by a MAC that does not support link-layer OAM. In any case, link-layer
OAM frames are never forwarded.
Since the IEEE link-layer OAM is generally used over a link between a service
provider and a customer, it defines two modes for OAM entities: active or
passive. The elements of the provider network (e.g. DSLAMs or provider Ethernet
switches) operate in active mode, and can exert control over the passive-mode
devices (e.g. DSL modems or customer premises switches). Thus, the active-mode
entity can send an LB command forcing the passive-mode device into loopback
mode, and query the configuration parameters of the passive-mode device.
However, the reverse is not possible.
OAMPDUs
The OAMPDUs perform the following functions:
• Discovery is the procedure whereby OAM-enabled entities discover each
other and exchange information regarding their OAM capabilities and
configuration. The OAM capabilities may be used to determine whether it is
worthwhile to run the OAM protocol.
Disovery is initiated by an active ETX-5 Ethernet port. It advertises the
following capabilities:
Mode
RAD OUI
OAMPDUs use RAD OUI (Organizationally Unique Identifier) – 00-20-D2.
MAC Address
OAMPDUs use the relevant port MAC as the MAC SA. To support OAM EFM, the
user must configure trap the 01-80-C2-00-02, using L2CP mechanism.
To ensure correct distribution of EFM traffic, you must configure flow with an
L2CP profile with peer action for the OAM EFM address (01-80-c2-00-00-02). The
flow must have the following attributes:
• Untagged classification
• Ingress port – Ethernet port
• Egress port – according to application requirements.
If you use the flow only to peer the EFM frames and do not need to forward the
untagged traffic, discard it, using the drop command on the flow.
Enabling OAM EFM, and defining efm-descriptor <1–2> {active | The EFM descriptor must exist
its operation mode passive} before you can assign it to a
port.
Note: In order for OAM EFM to
function properly, the relevant
Ethernet port must be
associated with an L2CP profile
that specifies peer action for
MAC 01-80-C2-00-02.
Example
To enable OAM EFM on Ethernet port B/4:
#******************Assigning_Default_Queue_Group_Profiles********************
config port ethernet main-a/3 queue-group profile q_group_2_level_default
config port ethernet main-b/4 queue-group profile q_group_2_level_default
#*********************************End****************************************
************************Defining_Classifier_Profiles*************************
config flows classifier-profile untagged match-any
match untagged
exit all
#***************************Adding_L2CP_Profile******************************
configure port l2cp-profile l2cp1 mac 01-80-c2-00-00-02 peer
#*********************************End****************************************
#**************************Adding_Flow_for_Peering_EFM_Traffic***************
config flows flow 121
classifier classutg
ingress-port ethernet main-b/4
egress-port ethernet main-a/3 queue-map-profile QueueMapDefaultProfile block
0/1
l2cp profile l2cp1
drop
pm-enable
no shutdown
exit all
#*********************************End****************************************
#***************************Adding_OAM_EFM_Descriptor************************
configure oam efm-descriptor 2 passive
exit all
#*********************************End****************************************
#**************************Configuring_Ethernet_Port*************************
configure port ethernet main-b/4 efm descriptor 2
exit all
Standards
This section lists the standards on which the supported SNMP versions are
based.
• RFC 1901, Introduction to Community-Based SNMPv2. SNMPv2 Working
Group.
• RFC 1902, Structure of Management Information for Version 2 of the Simple
Network Management Protocol (SNMPv2). SNMPv2 Working Group.
• RFC 1903, Textual Conventions for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group.
• RFC 1904, Conformance Statements for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group.
• RFC 1905, Protocol Operations for Version 2 of the Simple Network
Management Protocol (SNMPv2). SNMPv2 Working Group.
Benefits
The SNMP protocol allows you to remotely manage multiple units from a central
work station using RADview EMS. RADview EMS offers a graphical user interface
that resembles the front panel of your unit with its interfaces and LEDs.
ETX-5 supports SNMPv3, which allows data to be collected securely from SNMP
devices. Confidential information such as SNMP commands can thus be encrypted
to prevent unauthorized parties from being able to access them.
Functional Description
SNMPv1 and SNMPv2 can neither authenticate the source of a management
message, nor provide privacy (encryption).
To overcome these limitations, SNMPv3 provides a security framework for
SNMPv1 and SNMPv2 that adds the following main capabilities:
• Security features:
Authentication – checks the integrity of management data and verifies its
origin, and thus ensures that unauthorized users cannot masquerade as
authorized users
Privacy – ensures that unauthorized users cannot monitor the
management information passing from managed systems to the
management system
Authorization and access control – ensures that only authorized users
can perform SNMP network management functions and contact the
managed entities.
• Administrative features:
Naming of entities
People and policies
Usernames and key management
Notification destinations
Proxy relationships
Remote dynamic configuration of agents via SNMP operations.
SNMP Engine ID
An important parameter related to SNMPv3 is the SNMP engine ID, a unique and
unambiguous identifier of the function that processes SNMP messages. It also
identifies the SNMP entity that corresponds to the engine.
The SNMP engine ID is a string that has three segments:
• An automatically-generated, fixed segment
• A selectable segment that identifies the configuration type (method) used to
derive the user-defined segment
• A user-defined segment, which must be unique within the SNMP-managed
network. The method used to configure this segment depends on the
configuration type.
The automatically-generated segment of the SNMP engine ID changes after each
restart (reboot) of the SNMPv3 protocol. As explained below in the SNMPv3
Administrative Features section, the SNMP engine ID is the first parameter to be
set whenever SNMPv3 is used and the configuration data and authorized users
must be reconfigured.
Factory Defaults
The default configuration of the SNMP parameters is as follows:
• SNMP engine ID set to device MAC address
• View named “internet” providing access to IETF MIBs and IEEE MIBs
• User named "initial", with security level no authentication and no privacy
• Group for SNMPv3 named "initial":
Security levels: no authentication and no privacy, authentication and no
privacy, authentication and privacy
User: “initial”
Views for read/write/notify: "internet".
• Group for SNMPv2c named “v2_read”:
Security level: no authentication and no privacy
SNMPv3 Configuration
ETX-5 supports SNMP version 3, providing secure SNMP access to the device by
authenticating and encrypting packets transmitted over the network.
The SNMPv3 manager application in RADview-EMS provides a user-friendly
graphical interface to configure SNMPv3 parameters. If you intend to use it, you
must first use the device CLI to create users with the required encryption method
and security level, as the application can create users based only on existing
users; the new user has the same encryption method, and the same security level
or lower. The ETX-5 default configuration provides only one standard user named
“initial” with no encryption and the lowest security level.
To configure SNMPv3:
1. Set SNMP engine ID if necessary
3. Add users, specifying authentication protocol and privacy protocol
4. Add groups, specifying security level and protocol
5. Connect users to groups
6. Add notification entries with assigned traps and tags
7. Configure target parameter sets to be used for targets
8. Configure targets (SNMPv3 network management stations to which ETX-5
should send trap notifications), specifying target parameter sets and
notification tags
To configure SNMPv3 parameters:
1. Navigate to configure management snmp.
2. The config>mngmnt>snmp# prompt is displayed.
Note When you enter password parameters, they should contain at least eight
characters.
Assigning trap to bind {coldStart | linkDown | linkUp | snmp>notify You can assign more than
notification authenticationFailure | one trap to a notification, in
systemDeviceTemperatureOra | separate commands
systemSoftwareInstallEnd |
systemAlternateConfigLoaded |
systemDyingGasp | systemDeviceStartup |
systemSwUnconfirmed |
systemStartupConfigUnconfirmed | fanFailure |
systemSuccessfulLogin | systemFailedLogin |
systemLogout | powerDeliveryFailure |
systemTrapHardSyncStart |
systemTrapHardSyncEnd | systemUserReset |
smartSfpMismatch | systemRfc2544TestStart |
systemRfc2544TestEnd |
clockDomainSystemClockUnlock |
sourceClockFailure | stationClockLos |
clockDomainStationClockUnlock |
ptpRecoveredUnacceptableFrequencyAccuracy
| ptpRecoveredMasterDisqualification |
ptpRecoveredPtpStateChange |
ptpRecoveredSevereFrequencyCondition |
epsConfigurationMismatch | epsPortSwitchover
| sfpRemoved | ethLos |
oamEfmRemoteLoopback |
oamEfmRemoteLoopbackOff |
oamEfmCriticalLinkIndication |
oamEfmFeCriticalLinkIndication |
oamEfmDyingGaspIndication |
oamEfmFeDyingGaspIndication | sdhSonetLos |
e3t3Los | e1t1Los | systemDownloadEnd |
oamCfmMepAis | oamCfmMepLck |
oamCfmMepMismatch | oamCfmRmepLoc |
oamCfmRmepRdi | oamCfmDestNeDelayTca |
oamCfmDestNeDelayTcaOff |
oamCfmDestNeDelayVarTca |
oamCfmDestNeDelayVarTcaOff |
oamCfmDestNeLossRatioTca |
oamCfmDestNeLossRatioTcaOff |
oamCfmDestNeLossRatioTcaFe |
oamCfmDestNeLossRatioTcaFeOff |
oamCfmDestNeUnavailableRatioTca |
oamCfmDestNeUnavailableRatioTcaOff |
oamCfmDestNeUnavailableRatioTcaFe |
oamCfmDestNeUnavailableRatioTcaFeOff}
Setting SNMP snmp-engine-id mac [ <mac-address> ] snmp If you use the mac option
engine ID, as MAC snmp-engine-id ipv4 [ <ip-address> ] and don’t specify the MAC
address or IP address, the SNMP engine ID
snmp-engine-id text <string>
address or string is set to the device MAC
address
If you use the ipv4 option
and don’t specify the IP
address, the SNMP engine ID
is set to the device IP
address
Assigning tag(s) to tag-list <tag> snmp>target If you specify more than one
target (the tag(s) tag-list [ <tag> ] tag, you must enclose the
must be defined in list in square brackets; if you
tag-list [ <tag1>,<tag2>,…<tagn> ]
notification entries) specify just one tag, the
brackets are optional
Specifying SNMP version { snmpv2c | usm } snmp>target Use usm for SNMPv3 version
version to be used
when generating
SNMP messages for
the set of target
parameters
Setting user privacy privacy [ password <password> ] snmp>user no privacy disables privacy
password and [ key <key-change> ] protocol
optional key for
changes
Example
To create SNMPv3 user and connect it to group:
• User named “MD5_priv”:
Security level – MD5 authentication, DES privacy
• Group named "SecureGroup":
All security levels
Contains set of views named "internet" (from default configuration).
ETX-5# configure management snmp
ETX-5>config>mngmnt>snmp# user MD5_priv md5-auth des
ETX-5>config>mngmnt>snmp>user(MD5_priv)$ privacy password MD654321
ETX-5>config>mngmnt>snmp>user(MD5_priv)$ authentication password MD654321
ETX-5>config>mngmnt>snmp>user(MD5_priv)$ no shutdown
ETX-5>config>mngmnt>snmp>user(MD5_priv)$ exit
ETX-5>config>mngmnt>snmp# access-group MD5Group usm no-auth-no-priv
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ context-match prefix
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ read-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ write-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ notify-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ no shutdown
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/no-auth-no-priv)$ exit
ETX-5>config>mngmnt>snmp# access-group MD5Group usm auth-no-priv
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ context-match prefix
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ read-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ write-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ notify-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ no shutdown
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-no-priv)$ exit
ETX-5>config>mngmnt>snmp# access-group MD5Group usm auth-priv
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ context-match prefix
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ read-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ write-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ notify-view internet
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ no shutdown
ETX-5>config>mngmnt>snmp>access-group(MD5Group/usm/auth-priv)$ exit
To create notifications:
• Notification named “TrapData”:
Tag = “Data”
Bound to agnStatusChangeTrap, agnUploadDataTrap.
• Notification named “TrapPower”:
Tag = “Power”
Bound to agnPowerFailureTrap, coldStart.
ETX-5# configure management snmp
ETX-5>config>mngmnt>snmp# notify TrapPort
ETX-5>config>mngmnt>snmp>notify(TrapPort)$ tag Port
ETX-5>config>mngmnt>snmp>notify(TrapPort)$ bind ethLos
ETX-5>config>mngmnt>snmp>notify(TrapPort)$ bind sfpRemoved
ETX-5>config>mngmnt>snmp>notify(TrapPort)$ no shutdown
ETX-5>config>mngmnt>snmp>notify(TrapPort)$ exit
ETX-5>config>mngmnt>snmp# notify TrapPower
ETX-5>config>mngmnt>snmp>notify(TrapPower)$ tag Power
ETX-5>config>mngmnt>snmp>notify(TrapPower)$ bind powerDeliveryFailure
ETX-5>config>mngmnt>snmp>notify(TrapPower)$ bind systemDeviceStartup
ETX-5>config>mngmnt>snmp>notify(TrapPower)$ no shutdown
ETX-5>config>mngmnt>snmp>notify(TrapPower)$ exit
ETX-5>config>mngmnt>snmp#
4.15 Syslog
ETX-5 uses the Syslog protocol to generate event notification messages and
transport them over IP networks to Syslog servers.
Benefits
Syslog protocol collects heterogeneous data into a single data repository. It
provides system administrators with a single point of management for collecting,
distributing and processing audit data. Syslog standardizes log file formats,
making it easier to examine log data with various standard tools. Data logging can
be used for:
• Long-term auditing
• Intrusion detection
• Tracking user and administrator activity
• Product operation management.
Factory Defaults
By default, Syslog operation is disabled. When enabled, the default parameters
are as follows:
facility local1
port 514
severity-level informational
Functional Description
The Syslog protocol provides an instrument for generating and transporting event
notification messages from ETX-5 to servers across IP networks.
Mess
ages
PSN
ETX-5
Syslog
ages Server
Mess
ETX-5
Elements
Typical Syslog topology includes message senders (devices) and message
receivers (servers). ETX-5 supports up to five Syslog servers. The receiver
displays, stores or forwards logged information. The standard designates two
types of receivers:
• Relay, which forwards messages
• Collector which displays and stores messages.
Transport Protocol
Syslog uses User Datagram Protocol (UDP) for its transport. The UDP port
assigned to Syslog is 514, but devices and servers can be defined to use any port
for communication.
Message Format
The length of a Syslog message is 1024 bytes or less. It contains the following
information:
• Facility and severity (see below)
• Host name or IP address of the device
• Timestamp
• Message content.
A typical Syslog message looks like this: <145>Jan 15 13:24:07 172.17.160.69
Eth 1: Loss of signal (LOS)
4 Warning Event
Syslog Configuration
When configuring Syslog parameters, it is necessary to define Syslog device and
servers.
Defining Syslog device UDP port for port <udp-port-number> Range is 1–65535
communication Port configuration is allowed
only if a Syslog device is
administratively disabled
Defining severity level severity-level { emergency | alert | The log messages that contain
critical | error | warning | notice | severity level above or equal
informational | debug} the specified level are
transmitted
Parameter Description
Defining Syslog server UDP port for port <udp-port-number> Range 1–65535
communication Port configuration is allowed
only if a Syslog server is
administratively disabled
Example
• Server IP address: 178.16.173.152
• UDP port: 155
ETX-5# configure system syslog server 1
ETX-5>config>system>syslog(server/1)#
ETX-5>config>system>syslog(server/1)# address 178.16.173.152
ETX-5>config>system>syslog(server/1)# port 155
ETX-5>config>system>syslog(server/1)# no shutdown
Configuration Error
The table below lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Syslog Port is out of range Selected UDP port value is out of allowed range (1–65535)
Port is illegal or Device Port is already in Selected UDP port is already in use
use
Parameter cannot be changed if Logging Device/server UDP port or server IP address cannot be changed
Status/Server Access is enabled while Syslog server is enabled
Factory Defaults
Parameter defaults are listed in the table below.
baud-rate 9600bps
timeout 10
Specifying the desired data baud-rate {300bps | The default data rate is 9600 bps.
rate 1200bps | 2400bps|
9600bps | 19200bps |
38400bps | 57800bps |
115200bps}
Specifying the number of length <0–20> The number of rows can be 0, to indicate no limit
rows to display on the number of lines displayed, or 20.
Configuring STP
When configuring STP it is required to peer BPDU packets for protocol handling to CPU.
For this purpose user should configure an untagged flow from port / LAG with an L2CP
profile attached to it with the MAC address:
01-80-c2-00-00-00 with ‘peer’ action
BPDU Peer
For proper STP functionality, you must configure an L2CP profile with peer action
for the BPDU address (01-80-c2-00-00-00). The flow must have the following
attributes:
• Untagged classification
• Ingress port – Port/LAG
• Egress port – according to application requirements
If the STP runs over a VLAN aware bridge (VLAN traffic), than you use the
untagged flow only to peer the BPDU frames, and do not need to forward the
untagged traffic, discard it using the drop command on the flow.
The figure below illustrates BPDU peer configuration for main card ports.
Untagged flow
L2CP profile: BPDU
address peer
Traffic flow
The figure below illustrates BPDU peer configuration for main card ports
Untagged flow
L2CP profile: BPDU address
peer
Traffic flow
(VLAN)
Profiles
Most packet processing features are defined by creating and applying various
profiles. Profiles comprise sets of attributes related to a specific service entity.
Profiles must be defined before other managed objects.
Shaper Queue, queue block Defines CIR, CBS, EIR and EBS 256
parameter
Queue Queue block Defines queue type with shaper and 16K
WRED profile
Queue block Queue block within Defines queue block parameters 384
queue group (queues, scheduling scheme,
weights)
Policer, policer Flow Defines CIR, CBS, EIR and EBS 128
aggregate parameters
Physical Ports
GbE and 10GbE ports located in I/O and main cards serve as ingress (UNI) and
egress (NNI) ports for Ethernet flows. The following packet processing attributes
are assigned to them:
• Tag Ethertype for identifying VLAN-tagged frames at ingress and setting
Ethertype value for VLAN editing (stack, swap) at egress
• L2CP profile for defining L2CP frame handling (discard, peer, tunnel, and
tunnel with MAC swap)
• Queue group profile for associating a port with a queue group
• Classification key for mapping traffic into flows according to classification profiles.
ETX-5 ports can be either of two types:
• Attached directly to the main card packet processor (directly-attached ports).
These are 10GbE ports on the main cards.
• Attached to the packet processor via the classification and traffic
management engine (indirectly-attached ports). These are GbE, 10GbE and
TDM ports on the I/O cards.
Logical Ports
Logical ports maintained by ETX-5 serve as internal aggregation or forwarding
points for Ethernet flows. The following logical ports exist:
• Service Virtual Interface (SVI) used for binding flows to bridge ports, router
interfaces or Layer-2 TDM pseudowires. SVIs serve as intermediaries for
bridges and routers, which must comply with standards of their own (VLAN
domains for bridge ports or IP address for router interfaces) and do not have
physical port attributes. They also serve as aggregation points for TDM PWs.
ETX-5
LB IP
Router
RIF
SVI
SVI
SVI BP SVI
User BP BP OOB
Bridge
User BP BP NET
SVI SVI
SVI SVI
SVI
Flow
SAG
Ethernet Port
I/O Card
SAP
• Link Aggregation Groups (LAGs) – used for link protection. They have the
same attributes as the physical ports that serve as their members.
Forwarding Entities
Several internal entities carry traffic and make forwarding and switching
decisions. These are:
• Flows – the main traffic-carrying elements
• Bridge – traffic-forwarding element for Layer-2 E-LAN services
• Router – traffic-forwarding element for Layer-3 services.
Flows
Flows are unidirectional entities that interconnect two physical or logical ports.
Flow processing is performed as follows:
• Ingress traffic is mapped in flows using classification match criteria defined
via a classification profile.
• L2CP frames are handled per flow according to L2CP profile settings.
• User priority (P-bit, IP Precedence, DSCP) is mapped into internal Class of
Service (CoS) according to a CoS mapping profile or assignment per flow.
• User priority (P-bit, IP Precedence, DSCP or DEI) can be mapped to packet
color (yellow or green) according to a color mapping profile or assignment per
flow.
• VLANs can be edited per flow by stacking (pushing), removing (popping), or
swapping (marking) tags on single-, or double-tagged packets. P-bit and DEI
values are either copied or set according to a CoS marking profile.
CoS marking profile maps CoS value and/or packet color into the egress
priority tags (P-bit, DEI).
• A single policer can be applied to a flow or a policer aggregate can be
assigned to a group of flows, using a policer profile or policer aggregate
profile.
• A flow is mapped to a specific queue block within a queue group associated
with an egress port. A specific queue in the queue block is defined 1:1 by the
packet CoS (0–7) according to a CoS-mapping profile.
Bridge
The bridge is a forwarding entity used by ETX-5 for delivering E-LAN services in
multipoint-to-multipoint topology and G.8032 ring protection. With up to 32
bridge instances, ETX-5 provides up to 128 bridge ports per bridge entity. The
bridge uses SVIs for connecting to logical and physical ports.
The bridge is defined by a bridge number, bridge ports and a VLAN membership
table that specifies which bridge ports are members in a certain broadcast
domain (VLAN). The bridge supports one level of VLAN editing on ingress and one
level on egress. The editing is performed at the flow level.
Router
The ETX-5 router is an internal Layer-3 interworking device that forwards traffic
between its interfaces. Each router interface is assigned an IP address and can be
bound to one of the following:
• Physical port on Ethernet I/O or main card
• Bridge port
• TDM pseudowire card for UDP/IP forwarding or 1588v2 clock entity, by
defining a virtual loopback address on a router interface.
The router uses service virtual interfaces (SVIs) for connecting to logical and
physical ports. The connection is always made by directing flows from a port to
an SVI, and then binding the SVI to a router interface.
I/O-to-Main Path
Figure 5-4 illustrates a typical Ethernet service created in I/O-to-main card
direction. Table 5-2 details the configuration steps needed for service
provisioning.
WRED Shaper
Queue
SAG
Flow N x 1
I/O Card Flow 2 Main Card
SAP
Ethernet Port Ethernet Port
Configure Configure
physical layer physical layer
Define Define
classifier key classifier key
Layer 2 Control l2cp-profile Define policy for L2CP traffic handling by port
Protocol (L2CP) and/or flow (peer, tunnel, tunnel with MAC swap,
or drop)
CoS Mapping cos-map-profile Define criteria for mapping flow 1 user priority
into internal CoS values. Not relevant for flow 2.
When creating a flow, you can either bind it to
the CoS mapping profile or use a fixed value.
Color Mapping color-map-profile Define criteria for mapping flow 1 user priority
into color values. Not relevant for flow 2.
When creating a flow, you can either bind it to
the color mapping profile or use a fixed color
value.
1. Define profiles
Priority Queue queue-map-profile Define profile for mapping CoS values to queues.
Mapping Always use 1:1 mapping
(QueueMapDefaultProfile)
Queue Group queue-group-profile Define queue group profile for SAG and main
card port
Ethernet ports
Main-to-I/O Path
Figure 5-5 illustrates a typical service created in main-to-I/O card directions. See
Table 5-3 details the configuration steps needed for service provisioning.
Bind L2CP
profile
Bind classifier
profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Define VLAN
editing actions
Bind marking
profile
Define TPID
editing policy
Bind queue
Legend: mapping profile
Mandatory
Bind queue
Optional block instance
Same as detailed in Same as detailed in Flows with ingress main card ports do not
1. Define profiles
Same as detailed in Same as detailed in Define flow with ingress port set to main card
Table 5-2 Table 5-2 port, and egress port set to I/O card port
I/O-to-I/O Path
Figure 5-6 illustrates a typical service created in I/O-to-I/O direction. Table 5-4
details the configuration steps needed for service provisioning.
SAG SAG
Flow N x 1 Flow 2
I/O Card I/O Card
Ethernet Port SAP SAP Ethernet Port
Main-to-Main Path
Figure 5-6 illustrates a typical service created in main-to-main direction. Table 5-4
details the configuration steps needed for service provisioning.
Bind L2CP
profile
Bind classifier
profile
Bind CoS
mapping profile
or use fixed value
Bind color
mapping profile
or use fixed value
Define VLAN
editing actions
Bind marking
profile
Define TPID
editing policy
Bind queue
Legend: mapping profile
Mandatory
Bind queue
Optional block instance
Same as detailed in Same as detailed in Define one flow with ingress and egress port set
Table 5-2 Table 5-2 to main card ports
SAG Bridge
Flow 1 Flow 2a Flow 3a
I/O Card SAP Main Card
SVI BP BP SVI Flow 3b
Ethernet Port Flow 2b Ethernet Port
Define
bridge-type SVI
Define bridge
port
Configure VLAN
membership
5. Configure VLAN
membership Define VLANs
Configure bridge
ports as VLAN
members
Configure MAC
table size
6. Configure Configure flow 1 Configure flow 2a Configure flow 2b Configure flow 3a Configure flow 3b
flows
Bind ingress and Bind ingress and Bind ingress and Bind ingress and Bind ingress and
egress ports egress ports egress ports egress ports egress ports
Bind L2CP Define VLAN Bind classifier Define VLAN Bind classifier
profile editing actions profile editing actions profile
Bind classifier Bind marking Bind queue Bind marking Bind CoS
mapping profile
profile profile mapping profile profile or use fixed value
Bind CoS Define TPID Bind queue Bind queue Bind color
mapping profile mapping profile
or use fixed value editing policy block instance mapping profile or use fixed value
Bind color Bind classifier Bind queue Define VLAN
mapping profile Define VLAN
or use fixed value profile editing actions block instance editing actions
entity
Service Virtual svi Define bridge-port type SVIs, add ports to the
4. Define SVIs and
Interface (SVI) bridge bridge and bind the bridge ports to the SVIs
bridge ports
Bridge
Note • Ingress flows with an untagged classification profile do not require VLAN
editing. In this case editing must be set to None.
• Egress editing action for untagged flows must be set to None.
SAG Router
Flow 1 Flow 2a Flow 3a
I/O Card SAP Main Card
SVI RIF RIF SVI Flow 3b
Ethernet Port Flow 2b Ethernet Port
4. Configure flows Configure flow 1 Configure flow 2a Configure flow 2b Configure flow 3a Configure flow 3b
Bind ingress and Bind ingress and Bind ingress and Bind ingress and Bind ingress and
egress ports egress ports egress ports egress ports egress ports
Bind L2CP Define VLAN Bind classifier Define VLAN Bind classifier
profile editing actions profile editing actions profile
Bind classifier Bind classifier Bind queue Bind marking Bind CoS
mapping profile
profile profile mapping profile profile or use fixed value
Bind CoS Bind queue Bind queue Bind color
Define TPID mapping profile
mapping profile
or use fixed value editing policy block instance mapping profile or use fixed value
Bind color Bind queue Define VLAN
mapping profile Define VLAN
or use fixed value editing actions block instance editing actions
Define router
interfaces
Legend:
Mandatory Bind router
interfaces to SVIs
Optional
Router router Add interfaces to the router and bind the RIFs to
6. Add RIFs and
bind them to
the SVIs
SVIs
Router-to-Bridge Path
When adding Layer-3 services to Layer-2 topology, such as G.8032 Ethernet ring,
a router interface must be connected to a bridge port.
1. Define
profiles See Figure 5.1
Configure VLAN
5. Configure VLAN membership
membership
Define VLANs
Configure bridge
ports as VLAN
members
Configure MAC
address ranges
6. Configure Configure flow 1 Configure flow 2a Configure flow 2b Configure flow 3a Configure flow 3b
flows 1-3
Bind ingress and Bind ingress and Bind ingress and Bind ingress and Bind ingress and
egress ports egress ports egress ports egress ports egress ports
Bind L2CP Define VLAN Bind classifier Define VLAN Bind classifier
profile editing actions profile editing actions profile
Bind classifier Bind classifier Bind queue Bind marking Define VLAN
profile profile mapping profile profile editing actions
Bind CoS Define TPID Bind queue Define TPID
mapping profile
or use fixed value editing policy block instance editing policy
Bind color Bind queue
mapping profile Define VLAN
or use fixed value editing actions mapping profile
Bind queue
mapping profile
Bind queue
block instance
Define RIFs
Define router
interfaces
Bind router
interfaces to SVIs
Define TPID
editing policy
entity
Service Virtual svi Define bridge-port type SVIs, add ports to the
4. Define SVIs and
Interface (SVI) bridge bridge and bind the bridge ports to the SVIs
bridge ports
Bridge
Router router Add interfaces to the router and bind the RIFs to
7. Add RIFs and
bind them to
the SVIs
SVIs
Table 5-2 Table 5-2 • Flow 4a: ingress – SVI (B), egress – main card
port
• Flow 4b: ingress – main card port, egress –SVI
(B)
Flow 1a
I/O Card TDM PW Main Card
Port
SVI Ethernet Port
Flow 1b
Configure SDH/
SONET ports See Figure 5.1
Configure E1/T1
ports
3. Define SVI
Define SVI (PW)
6. Configure timeslot
cross-connections Configure cross-
connections
Configure timeslot
cross-connection
for CESoPSN PW
Table 5-2
T1 Ports
address
connections
•
flows
Flow Bridge
PW 1a Flow 2a
I/O Card TDM
SVI SVI BP BP SVI Flow 2b Main Card
Port
Ethernet Port
Flow
Configure I/O card 1b
2. Configure ports TDM port Configure main
card Ethernet port
Configure SDH/
SONET ports See Figure 5.1
Configure E1/T1
ports
3. Define bridge
Define bridge
Define Define
PW-type bridge-type SVIs
SVI
Define bridge
ports
Define VLANs
Configure bridge
ports as VLAN
members
Configure MAC
table size
8. Configure timeslot
Configure cross-
cross-connections
connections
Configure timeslot
cross-connection
for CESoPSN PW
9. Configure flows
Configure flow 1a Configure flow 1b Configure flow 2a Configure flow 2b
Bind ingress and Bind ingress and Bind ingress and Bind ingress and
egress ports egress ports egress ports egress ports
Define TPID
editing policy
Bind queue
mapping profile
Bind queue
block instance
T1 Ports
entity
Service Virtual svi Define bridge-port type SVIs, add ports to the
4. Define SVIs and
Interface (SVI) bridge bridge and bind the bridge ports to the SVIs
bridge ports
Bridge
address
connections
L3 Pseudowire Service
Figure 5-13 illustrates a L3 pseudowire-over-router service. Table 5-11 details the
configuration steps needed for service provisioning.
Router
PW LB Flow 1a
Main Card
I/O TDM Card RIF SVI Flow 1b
RIF Ethernet Port
Define loopback
2. Define LB RIF RIF
Define loopback
router interface
Configure SDH/
SONET ports
Configure E1/T1
ports
4. Define SVI
Define SVI (R)
Define router-
type SVI
5. Define PW peer
Define PW peer
Define
pseudowire peer
Add and
configure a
pseudowire
7. Configure timeslot
cross-connections Configure cross-
connections
Configure timeslot
cross-connection
for CESoPSN PW
Define router
interfaces
Bind router
interfaces to SVIs
9. Configure flows
Configure flow 1a Configure flow 1b
Bind queue
mapping profile
Legend:
Bind queue
Mandatory block instance
Optional
IP address to it.
SDH/SONET Ports port When defining TDM I/O card in chassis slot, bind
3. Configure TDM
I/O card and card
T1 Ports
Configure physical layer parameters of the
SDH/SONET and E1/T1 ports.
address
connections
6.1 Cards
Table 6-1 lists the cards currently available for the ETX-5, their functions, and
ETX-5 system capacity.
E5-FAN Fan tray with eight fans and alarm relay port 1
Mode Card protection status Standalone – Card is not a protection group member
Protection – Card is a protection group member
Provisioning I/O Cards main {main-10ge-4 | main- main-10ge-4 – Main card with 4 XFP ports
Provisioning Main cards sfp-plus-4} main-sfp-plus-4 – Main card with 4 SFP+
ports
This section explains how to provision I/O cards in slots 1 to 4. ETX-5 service
cards (power inlets, power supplies, fan card) and main cards are detected and
provisioned automatically.
Provisioning Ethernet I/O cards eth {gbe-20-sfp | gbe-20-utp | gbe-20-sfp – GbE card with 20 SFP ports
10g-2-xfp} gbe-20-utp – GbE card with 20 UTP ports
10g-2-xfp – 10GbE card with two XFP ports
Provisioning TDM I/O cards sdh-sonet [stm-1-ch-4 | stm-1- Provisioning of a TDM card defines its
t1-ch-4 | oc-3-ch-4] | stm-4-ch- interface type:
1 | oc-12-ch-1] stm-1-ch-4 – STM-1 E1 card with four TDM
ports
stm-1-t1-ch-4 – STM-1 AU-3 card with four
TDM ports
oc-3-ch-4 – OC-3 card with four TDM ports
stm-4-ch-1 – STM-4 E1 card with one* TDM
port
oc-12-ch-1 – OC-12 card with one* TDM
port
Binding TDM I/O card to bind loopback-address <value> Binding TDM I/O card to loopback router
previously configured loopback interface is required for PW operation on
router interface UDP/IP networks.
The card can be bound only if it is in
shutdown state.
no before bind loopback-address unbinds
from loopback router interface.
Defining slot as vacant no card-type no card-type defines all unused chassis slots
as vacant
Configuration Errors
Software Version : 0.92D001
Table 6-3 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
No protection. Shutdown is not allowed. Card cannot be shut down if no backup card has been
configured
Message Description
Cannot change card type in no shutdown The type of an active card cannot be changed
Cannot change card type in requested The type of card in the selected slot cannot be modified
slot
Cannot set the card type in requested The type of card in the selected slot cannot be set
slot
A service is defined on a card, card type the type of card cannot be changed if a service is configured on
cannot be changed the card
Remove a card before changing card The type of card cannot be changed if the card is in a slot;
type remove it
A card port is used by flow: card type The type of card cannot be changed if a flow is configured on
cannot be changed/deleted the card
A card port is used by PW: card type The type of card cannot be changed if a pseudowire connection
cannot be changed/deleted (PW) is configured on the card
6.2 E1 Ports
Internal E1 ports of the E5-cTDM-4 and E5-cTDM-STM4 cards deliver pseudowire
services, emulating PDH traffic over PSN. Each internal E1 is permanently mapped
to a VC-12 channel, handling its payload in accordance with the defined ITU-T
framing mode and signaling format.
Factory Defaults
ETX-5 is supplied with all E1 ports disabled. Other parameter defaults are listed in
the table below.
line-type g732n
path-interval-threshold cv 0
path-interval-threshold es 80
path-interval-threshold ses 10
path-interval-threshold sefs 0
path-interval-threshold css 0
path-interval-threshold uas 10
idle-code 7F
out-of-service 00
tx-clock-source domain 1
loopback no loopback
trail-mode terminated
Functional Description
E1 Signal Structure
The E1 line operates at a nominal rate of 2.048 Mbps. The data transferred over
the E1 line is organized in frames. Each E1 frame includes 256 bits.
The E1 frame format, as defined in ITU-T Rec. G.704, is shown in Figure 6-2.
below.
FAS MAS
Channel Data
b. Odd Frames (1,3,5-15) b. Frames 1-15
I 1 A N N N N N A B C D A B C D 1 2 3 4 5 6 7 8
TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS
32 Time Slots/Frame 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR
16 Frames/Multiframe 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Notes
I International Bit ABCD ABCD Signaling Bits
N National Bits (Sa4 through Sa8) X Extra Bit
A Alarm Indication Signal (Loss of Frame Alignment - Red Alarm) Y Loss of Multiframe Alignment
FAS Frame Alignment Signal, occupies alternate MAS Multiframe Alignment Signal
(but not necessarily even) frames
The 256 bits included in a frame are organized in 32 timeslots of eight bits each.
The frame repetition rate is 8,000 per second; therefore the data rate supported
by each timeslot is 64 kbps.
Timeslot 0
Timeslot 0 of E1 frames is used for two main purposes:
• Delineation of frame boundaries. For this purpose, in every second frame,
timeslot 0 carries a fixed pattern, called frame alignment signal (FAS). Frames
carrying the FAS are defined as even frames, because they are assigned the
numbers 0, 2, 4, etc. when larger structures (multiframes) are used.
The receiving equipment searches for the fixed FAS pattern in the data
stream using a special algorithm, a process called frame synchronization.
Once this process is successfully completed, the equipment can identify each
bit in the received frames.
• Interchange of housekeeping information. In every frame without FAS (odd
frames), timeslot 0 carries housekeeping information. This information is
carried as follows:
Bit 1 – this bit is called the international (I) bit. Its main use is for error
detection using the optional CRC-4 function (CRC-4 stands for Cyclic
Redundancy Check, using a fourth-degree polynomial). This function is
described below.
Bit 2 is always set to 1, and used by the frame alignment algorithm.
Bit 3 is used as a remote alarm indication (RAI), to notify the equipment
at the other end that the local equipment lost frame alignment, or did
not receive an input signal.
The other bits, identified as Sa4 through Sa8, are designated national
bits, and are actually available to the users, if there is an agreement
regarding their use. The total data rate that can be carried by each
national bit is 4 kbps.
Multiframes
To increase the information carrying capacity without wasting bandwidth, the
frames are organized in larger patterns, called multiframes. ITU-T Rec. G.704
recommendations define the following types of multiframes:
• Basic G.704 framing
• G.704 framing with timeslot 16 multiframe.
E1 Alarm Conditions
• Excessive bit error rate. The bit error rate is measured on the frame
-3
alignment signal. The alarm threshold is an error rate higher than 10 that
persists for 4 to 5 seconds. The alarm condition is canceled when the error
-4
rate decreases below 10 for 4 to 5 consecutive seconds.
• Loss of frame alignment (also called loss of synchronization). This condition
is declared when too many errors are detected in the frame alignment signal
(FAS); for example, when 3 or 4 FAS errors are detected in the last 5 frames.
Loss of frame alignment is cleared after no FAS errors are detected in two
consecutive frames.
The loss of frame alignment is reported by means of the A bit (Figure 6-2).
• Loss of multiframe alignment (applicable only when the G.704 multiframe
structure is used). This condition is declared when too many errors are
detected in the multiframe alignment signal (MAS) (same conditions as for
loss of frame alignment).
The loss of multiframe alignment is reported by means of the Y bit
(Figure 6-2).
• Alarm indication signal (AIS). The AIS signal is an unframed “all-ones” signal,
and is used to maintain line signal synchronization in case of loss of input
signal; for example, because an alarm condition occurred in the equipment
that supplies the line signal. The equipment receiving an AIS signal loses
frame synchronization.
E1 Port Diagnostics
Diagnostic tools at the E1 level include local and remote loopback for checking
connections to E1 ports.
Local Loopback
Figure 6-3 shows the signal paths during a local loopback on an internal E1 port.
Internal E1
TDM PSN
Framer Mapper
To ensure that the remote equipment is capable of providing a good signal, the
local loopback should be activated on the local E1 port only after checking that
the remote end user’s equipment connected to the tested E1 port operates
normally while its own local loopback is activated.
While the local loopback is activated on the local port, the remote end user
equipment must receive its own signal, and thus it must be frame-synchronized.
This test fully checks the operation of the local E1 path serving the tested port; it
also checks the signal paths that end at the corresponding E1 port, including the
transmission through the packet network connecting the remote equipment to
ETX-5.
Remote Loopback
Figure 6-4 shows the signal paths during a remote loopback on an internal E1
port.
As shown in Figure 6-4 when a remote loopback is activated on an internal E1
port, the E1 framer of that port returns the transmit signal via the receive path of
the same port. The transmit signal is received from the local end user equipment
served by the tested port, through the corresponding E5-cTDM-4 or E5-cTDM-
STM4 card.
While the loopback is activated, the signal received from the remote E1 port is
ignored. The signal received from the local end user equipment remains
connected to the packet processor and it is transmitted to the remote E1 port.
To ensure that the user equipment is capable of providing a good signal, the
remote loopback should be activated on E1 port only after checking that the local
end user equipment operates normally while its own local loopback is activated.
Internal E1
TDM PSN
Framer Mapper
While the remote loopback is activated on the local E1 port, the local end user
equipment must receive its own signal, and thus it must be frame-synchronized.
This test checks the transmission path between the local end user equipment to
the local port, including the transmission plant and SDH equipment connecting
the user’s equipment to the ETX-5, and part of the internal ETX-5 signal path that
handle the routing of the signals up to the tested E1 port, including the SDH
mapper of the E5-cTDM-4 or E5-cTDM-STM4 card.
Note An internal E1 port becomes active only if an enabled pseudowire with a valid
cross-connection is assigned to the port.
Specifying E1 framing line-type {unframed | g732n When using one of the framed modes, you
mode | g732n-crc} select specific timeslots for transport by
configuring the appropriate bundle at the
pwe# prompt.
The specific timeslots are selected using the
pw-tdm command at the cross-connect#
prompt.
Specifying the code idle-code { 00 to FF (hexa) } This parameter is valid for framed modes
transmitted to fill unused only.
timeslots in E1 frames Only one idle code value is allowed per the
E5-cTDM-4 and E5-cTDM-STM4 card.
Selecting the code out-of-service <00–FF> The hexadecimal number is in the range of 0
transmitted during to FF (two digits).
out-of-service period The selected out-of-service code is also
sent, instead of the external data stream,
during out-of-service periods when the
unframed mode is used.
Only one out-of-service code value is
allowed per the E5-cTDM-4 or E5-cTDM-
STM4 card.
Controls the propagation trail-mode {terminated | extended} See Alarm Indications and Fault Propagation
of alarm indications in the TDM Pseudowires of Chapter 8
Selects the reference tx-clock-source {domain <domain-num> | Tx clock setting becomes active only after a
source used by the loopback | pw } E1 port is disabled and enabled (shutdown
transmit path of this port > no shutdown).
If an E1 port is assigned to a PW, reset
(disable and enable) the PW after any
change in the tx-clock-source parameter.
Activating diagnostic loopback { local | remote } [ duration <0– Loopback duration is within 0 (forever) –
loopback 86400>] 86400 second range.
no loopback no loopback deactivates loopback.
Displaying Status
You can display current status of any internal E1 port on an E5-cTDM-4 or E5-
cTDM-STM4 card.
Displaying Statistics
Internal E1 ports of ETX-5 collect performance monitoring data at the path level.
Displaying statistics show statistics {current | interval <interval- • current –Displays the current
num 1..96> | current-day | previous-day | interval statistics
all-intervals | all} • interval (1–96) – Displays
statistics for a selected interval
• current-day – Displays statistics
for current day starting from
12:00 midnight
• previous-day – Displays statistics
for 24 hours before last 12:00
midnight
• all-intervals – Displays statistics
for all existing intervals (up to
96)
• all –Displays all statistics in
succession: current > all intervals
> current day > previous day
Path
---------------------------------------------------------------
CV : 0 UAS : 0
ES : 0 FC : 0
BES : 0
SES : 0
SEFS : 0
Note
For unframed E1 ports, only FC counter is available.
Parameter Description
ES Number of seconds during which at least one FE or CS was detected or a SEF defect or
an AIS defect was present
UAS Number of seconds for which the E1 path is unavailable. The E1 path becomes
unavailable at the onset of 10 contiguous SESs. The 10 SESs are included in
unavailable time. Once unavailable, the E1 path becomes available at the onset of 10
contiguous seconds with no SESs. The 10 seconds with no SESs are excluded from
unavailable time.
BES Number of seconds during which at least 2 and no more than 804 CRC-4 errors were
detected while neither OOF nor AIS defects were present.
Parameter Description
FC Number of E1 path failure events. A failure event begins when a LOF failure or an AIS
failure is declared, and ends when the failure is cleared. A failure event that begins in
one period and ends in another period is counted only in the period in which it begins.
SES Number of seconds during which 805 or more CRC-4 errors were detected or an OOF
defect was present
SEFS Number of seconds during which at least one OOF defect or an AIS defect was present
To clear statistics:
• At the prompt config>slot>port>t1 (<slot/port/tributary>)#, enter
clear-statistics.
Running Loopbacks
ETX-5 supports activation of local and remote loopbacks at the E1 level. You can
initiate a local loopback on a single E1 port and remote loopbacks on any number
of E1 ports on an E5-cTDM-4 or E5-cTDM-STM4 card at a time. E1 Port
Diagnostics section above details signal paths when local and remote loopbacks
are activated.
To activate a loopback:
1. Navigate to configure port e1 <slot/port/tributary> to select the E1 port to
test.
The config>port>e1>(slot/port/tributary)# prompt is displayed.
2. At the config>port>e1>(slot/port/tributary)# prompt, enter loopback,
followed by loopback type (local or remote) and its duration 0–86400 sec.
To deactivate a loopback:
• In the config>port>e1>(slot/port/tributary)# prompt, enter no loopback.
Example
To configure internal E1 interface:
• E1 name – e1_1_1_1
• Line type – G.732N
• Idle code – 0xFF
• Transmit clock source – Loopback
• Performance monitoring is enabled
• Administratively enabled.
Configuration Errors
Table 6-5 below lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Cannot change line type when service is Line type cannot be changed if a pseudowire service has been
defined defined on a port
Cannot change loopback type, disable Loopback type cannot be changed while the loopback is active
the loopback first
Invalid SES threshold value SES threshold value is out of range (0–900)
Invalid SEFS threshold value SEFS threshold value is out of range (0–900)
Invalid CSS threshold value CSS threshold value is out of range (0–900)
Invalid UAS threshold value UAS threshold value is out of range (0–900)
Invalid LES threshold value LES threshold value is out of range (0–900)
Invalid loopback timeout value Loopback duration value is out of range (0–86400 sec)
LLDP Benefits
Ethernet interfaces located on the E5-MC-4, E5-MC-SFP-P-4, E5-GBE-20 and E5-
10GBE-2 cards provide high-speed connection to GbE and 10GbE networks using
fiber optic (SFP/SFP+/XFP) or copper RJ-45 ports.
Factory Defaults
By default, Ethernet ports are not enabled.
Functional Description
Autonegotiation
The speed and duplex mode of an Ethernet interface is set either manually by the
operator or negotiated with the peer interface. The autonegotiation procedure
enables automatic selection of the operating mode on a LAN. It allows equipment
connecting to an operating LAN to automatically adopt the LAN operating mode
(if it is capable of supporting that mode). In ETX-5 all Ethernet ports operate in
full duplex mode only.
When autonegotiation is disabled, the user must manually define MAU (Medium
Attachment Unit) type. The port ‘MAU Type’ parameter determines if the port is
1G or 10GbE. The default ‘MAU Type is 10GbE. Changing the MAU type can be
done only if the port is in ‘shutdown’ mode.
Note A port can have a No shutdown status only if it’s MAU type is the same as the
second port MAU Type (ONLY if the second port is in ‘no shutdown’, otherwise
‘no shutdown’ is allowed with no limitation).
Flow Control
A flow control is a mechanism that allows an Ethernet receiving end that is
unable to process all the traffic sent to it, to hold the transmitted traffic until it is
able to process packets again.
The mechanism uses a PAUSE frame, which is a packet that instructs the far-end
device to stop transmission of packets until the receiver is able to handle traffic
again. The PAUSE frame includes a timer value (set by the originating receiver),
which tells the far-end device how long to suspend transmission. If that timer
expires or is cleared by getting a PAUSE frame whose timer value is set to 0, the
far-end device can then send packets again. Flow control is an optional port-level
parameter.
Flow control is supported on both directly- and indirectly-attached ports:
• Directly-attached ports support symmetrical flow control (both Rx and Tx)
• Indirectly-attached ports support Rx flow control only, without issuing Tx
PAUSE frames (asymmetric flow control).
When autonegotiation is enabled, flow control mode is negotiated and a port
advertises its user-selected flow control capabilities to the peer. The actual flow
control mode, as well as duplex mode and transmission speed are set after the
negotiation is completed.
When autonegotiation is disabled, the flow control mode is manually selected by
the user.
All ETX-5 Ethernet interfaces, except the OOB management port, support flow
control.
Frame Format
ETX-5 supports Ethernet II frames. It does not support IEEE 802.3 LLC packets.
Jumbo Frames
All Ethernet ports, except out-of-band management port, support jumbo frames
(12 kbytes). The OOB management port accepts frames of up to 1518-byte size.
Ethertype
Ethertype configured per-port is used for identification of VLAN-tagged frames at
ingress and Ethertype stacking at egress. This refers to outer VLAN only. The
outer VLAN of an incoming packet must match the configured Ethertype of the
port in order to be considered a VLAN-tagged frame (otherwise frame is
considered untagged or dropped). See the Ethertype section in Chapter 8 for
details.
L2CP Handling
ETX-5 handles Layer-2 control protocol traffic on a per-port and/or per-flow
basis. If no per-flow L2CP profile is configured, per-port-level profile is used. It
affects both tagged and untagged L2CP frames.
L2CP traffic is processed using a two-stage mechanism comprising per-port or
per-flow profiles (set of rules for traffic handling). In total, ETX-5 supports up to
16 L2CP profiles:
• Up to 4 (including default) port-level and a single flow-level profile can be
defined on directly-attached ports
• Up to 32 different addresses/protocols selected per L2CP profile.
If no default action is configured for unspecified address or protocol, this traffic
is tunneled.
Note If an L2CP profile has been attached to a port or a flow, the profile cannot be
deleted or modified.
See the Layer 2 Control Protocol (L2CP) section in Chapter 8 for details.
Classification Key
The ingress traffic is first classified into flows according to classification profiles.
A per-port classifier key configuration defines which types of classification
profiles are supported for this type of port. The classifier key also defines the
CoS mapping and color mapping methods.
See the Classification section in Chapter 8 for details.
Defining Ethernet interface type, mau-type { 10-t | 100-t | 1000- mau-type is also used to define SFP/XFP
when autonegotiation is disabled t | 10-100-1000-t | 100-any | 1000- type
any | 10g-any | 100-fx | 1000-
sx | 1000-lx | 10g-sr | 10g-
lr | 10g-er }
Setting maximum frame size (in bytes) egress-mtu <size> <64–12288> default packet size 1790
to transmit (frames above the Note:
specified size are discarded) The MTU can be set only on IO card ports.
The MTU on Main card ports is fixed to
12288 and cannot be changed.
Assigning queue group profile to queue-group <queue- no queue-group removes queue group
Ethernet port group-profile-name> association
no queue-group
Setting the VLAN tagged frame tag-ethernet-type <0x0000-0xFFFF> This value must be either 8100 or the same
Ethertype (tag protocol identifier) as Ethertype value configured at chassis
level
Associating a Layer-2 control l2cp <l2cp-profile-name> Defines discarding or tunneling policy for
processing profile with the port no l2cp Layer-2 protocols. To enable LACP (LAG) on
the port, the port must have an untagged
flow with an L2CP profile defined at the
flow level that specifies peer action for MAC
0x02.
no l2cp removes association with L2CP
profile.
Associating a policer profile with the policer-profile <policer-profile-name> Policer profiles can be bound, unbound or
port no policer-profile replaced with another profile on-the-fly.
Policer profile with traffic type “all” cannot
be bound to an Ethernet port.
Policer profile with traffic type “unknown-
unicast” cannot be bound to Ethernet ports
on I/O cards.
no policer-profile removes association with
policer profile.
Enabling OAM EFM efm descriptor <1–2> The EFM descriptor must exist before you
can assign it to a port.
Note: In order for link OAM (EFM) to
function properly, the relevant Ethernet
port must be associated with an L2CP
profile that specifies peer action for MAC
0x02.
Controlling OAM EFM loopback loopback no loopback disables OAM EFM loopback.
no loopback This command is relevant for active OAM
EFM ports.
Administrative Status : Up
Operational Status : Up
Displaying Statistics
Ethernet ports of ETX-5 collect performance monitoring data.
Jabber Frames 0 0
L2CP Discarded 0 0
OAM Discarded 0 0
ACL Discarded 0 0
FCS Error Frames 0 0
64 Octets 0 0
65-127 Octets 0 0
128-255 Octets 0 0
256-511 Octets 0 0
512-1023 Octets 0 0
1024-1518 Octets 0 0
1519-2047 Octets 0 0
2048-Max Octets 0 0
Too Long Frames 0 0
Description
Parameter Note
Rx Tx
Unicast Frames Total number of received good Total number of transmitted good
unicast packets, excluding packets unicast packets
with bad CRC and short packets
Description
Parameter Note
Rx Tx
64 Octets Total number of received packets Total number of transmitted Not available
(including bad packets) that were packets (including bad packets) for OOB
64 octets in length, excluding that were 64 octets in length, management
framing bits and including FCS excluding framing bits and port
octets including FCS octets
65–127 Octets Total number of received packets Total number of transmitted Not available
(including bad packets) that were packets (including bad packets) for OOB
65–127 octets in length, excluding that were 65–127 octets in management
framing bits and including FCS length, excluding framing bits and port
octets including FCS octets
128–255 Octets Total number of received packets Total number of transmitted Not available
(including bad packets) that were packets (including bad packets) for OOB
128–255 octets in length, that were 128–255 octets in management
excluding framing bits and length, excluding framing bits and port
including FCS octets including FCS octets
256–511 Octets Total number of received packets Total number of transmitted Not available
(including bad packets) that were packets (including bad packets) for OOB
256–511 octets in length, that were 256–511 octets in management
excluding framing bits and length, excluding framing bits and port
including FCS octets including FCS octets
512–1023 Total number of received packets Total number of transmitted Not available
Octets (including bad packets) that were packets (including bad packets) for OOB
512–1023 octets in length, that were 512–1023 octets in management
excluding framing bits and length, excluding framing bits and port
including FCS octets including FCS octets
Description
Parameter Note
Rx Tx
1024–1518 Total number of received packets Total number of transmitted Not available
Octets (including bad packets) that were packets (including bad packets) for OOB
1024–1518 octets in length, that were 1024–1518 octets in management
excluding framing bits and length, excluding framing bits and port
including FCS octets including FCS octets
1519-2047 Total number of received packets Total number of transmitted Not available
Octets (including bad packets) that were packets (including bad packets) for OOB
1519–2047 octets in length, that were 1519–2047 octets in management
excluding framing bits and length, excluding framing bits and port
including FCS octets including FCS octets
2048-Max Total number of received packets Total number of transmitted Not available
Octets (including bad packets) that were packets (including bad packets) for OOB
2048 to maximum allowed size that were 2048 to maximum management
octets in length, excluding framing allowed size octets in length, port
bits and including FCS octets excluding framing bits and
including FCS octets
Too Long Total number of received packets Total number of transmitted Not available
Frames that exceeded the maximum packets that exceeded the for OOB
allowed packet size maximum allowed packet size management
port
Connector Type : LC
Vendor Revision : 1a
Fiber Type : MM
SFP
---------------------------------------------------------------
Current Minimum Maximum
RX Power (dBm) : -8.2 -8.2 -7.9
TX Power (dBm) : -2.4 -2.4 -2.1
Laser Bias (mA) : 1.3 1.2 1.3
Laser Temperature (Celsius) : 32.4 18.0 32.5
Power Supply (V) : 3.2 3.2 3.2
Table 6-7 explains the parameters of the SFP installed for selected link port.
Parameter Description
Typical Maximum The maximum range expected to be achieved over typical optical fibers, in meters
Range (Meter)
Fiber Type The type of optical fiber for which the SFP/XFP is optimized: SM (single mode) or MM
(multimode)
RX Power (dBm) The current optical power, in dBm, received by the SFP/XFP
TX Power (dBm) The current optical power, in dBm, transmitted by the SFP/XFP
Example
To configure Ethernet interface:
• Port – port 2 on main card A
• Autonegotiation – enabled
• Classification key – VLAN
• L2CP profile – l2cp_prof_1
• Queue group profile – queue_group_1
• Performance monitoring is enabled
• Administratively enabled.
ETX-5# configure port eth main-a/2
ETX-5>config>port>eth(main-a/2)# auto-negotiation
ETX-5>config>port>eth(main-a/2)# classification-key vlan
ETX-5>config>port>eth(main-a/2)# l2cp l2cp_prof_1
ETX-5>config>port>eth(main-a/2)# queue-group queue_group_1
ETX-5>config>port>eth(main-a/2)# pm-enable
ETX-5>config>port>eth(main-a/2)# no shutdown
Port Loopback
ETH Port level loopback is supported, and applies for the following ports:
• 1GbE IO card
• Main Card
This is a PHY-level loopback.
• Local loopback is supported (ETH Tx looped back into the PSN).
• Remote loopback is supported (ETH Rx looped back toward ETH line)
The loopback is timed per a configurable value. When initiated it affects the
‘TEST’ LED. Events Loopback on/off is supported
CLI: loopback {local|remote} [duration <seconds>]
• The duration is in seconds, with range 0–86400. Entering 0 or not specifying
the duration disables the timer, e.g. the loopback runs forever until disabled
• Loopback is released after device reset
Configuration Errors
Table 6-8 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Autonegotiation enabled not allowed for Autonegotiation cannot be enabled for 10GbE ports
10G port
Invalid MAU type for 10G port Invalid MAU type has been selected for a 10GbE port
Invalid MAU type for SFP port Invalid MAU type has been selected for an SFP port
Invalid MAU type for UTP port Invalid MAU type has been selected for a UTP port
Invalid MAU type for autonegotiation Autonegotiation must be disabled for 100BaseFX interfaces
enabled
Invalid MAU type for autonegotiation Autonegotiation must be enabled for 1000BaseBT interfaces
disabled
Modify failed: Ethertype tag value is in The Ethertype cannot be changed if an active flow is attached to
use the port
Invalid port Ethertype tag value The selected default Ethertype value is different from 0x8100 or
the second Ethertype value is equal to 0x8100
Max number of allowed Ethertype tag Only two Ethertype values (default and another one) are
values has been exceeded allowed
Cannot delete default Ethertype tag The default Ethertype value 0x8100 cannot be deleted
value
Delete failed: Ethertype tag value is in The Ethertype value cannot be deleted because it is use by
use another port
Benefits
TDM ports provide access to SDN/SONET networks at STM-1 and OC-3 levels
(155.520 Mbps), and STM-4 and OC-12 levels (622.080Mbps), using fiber optic
SFP ports.
In addition, the SDH/SONET interface operation can be configured to comply with
the TTC standard requirements (STM-1J).
Factory Defaults
ETX-5 is supplied with all SDH/SONET ports disabled. Other parameter defaults
are listed in the table below.
overhead-mode itu-ansi
loopback disabled
tx-ssm disabled
tx-clock-source domain 1
ber-threshold sd e-6
Functional Description
The TDM interfacing subsystem provides interfaces to the TDM user equipment or
network. The physical STM-1/OC-3 and STM-4/OC-12 ports support many types of
SFP transceivers with optical interfaces to meet a wide range of operational
requirements.
N x M Bytes
Order of
Transmission
F F F F
F B B
B B B
N x M Bytes 1
N Rows
2
Order of
Transmission
B B B
M Columns
Legend
B Signal Byte
F Framing Byte
The frame bytes are transmitted bit by bit, sequentially, starting with those in the
top row (see arrow in Figure 6-5). After the transmission of a row is completed,
the bits in the next row are transmitted. Transmission within each row is from
left to right. After transmission of the last byte in the frame (the byte located in
row N, column M), the whole sequence repeats - starting with the framing byte
of the following frame.
F F F F
Path Overhead (One Column)
Section
Virtual Container
N Rows Overhead
(VC)
M Columns
Section Overhead
In SDH networks, the term section refers to the link between two consecutive
SDH equipment units of the same type.
Some signal carrying capacity is allocated in each SDH frame for the section
overhead. This provides the facilities (alarm monitoring, bit error monitoring, data
communications channels, etc.) required to support and maintain the
transportation of a VC between nodes in an SDH network.
The section overhead pertains only to an individual SDH transport system. This
means that the section overhead is generated by the transmit side of a network
node, and is terminated at the receive side of the next network node.
Therefore, when several SDH transport systems are connected in tandem, the
section overhead is not transferred together with the payload (VC) between the
interconnected transport systems.
VC Assembly/Disassembly Process
The concept of inserting a tributary signal into a virtual container for end-to-end
transport across a SDH network, is fundamental to the operation of SDH
networks. This process of inserting the tributary signal into the proper locations
of a VC is referred to as “mapping”.
In all SDH signal structures, the carrying capacity provided for each individual
tributary signal is always slightly greater than that required by the tributary rate.
Thus, the mapping process must compensate for this difference. This is achieved
by adding stuffing bytes, e.g., path overhead bytes, to the signal stream as part
of the mapping process. This increases the bit rate of the composite signal to the
rate provided for tributary transport in the SDH structure. In the TTC mode
(STM-1J), synchronous byte mapping is used.
At the point of exit from the SDH network, the tributary signal must be recovered
from the virtual container, by removing the path overhead and stuffing bits. This
process is referred to as “demapping”. After demapping, it is necessary to
restore the original data rate of the recovered tributary data stream.
1 Column
STM-1 frames are transmitted at a fixed rate of 8000 frames per second.
Note At a transmission rate of 8000 frames per second, each byte supports a data rate
of 64 kbps.
The STM-1 signal frame comprises 9 rows by 270 columns, resulting in a total
signal capacity of 2430 bytes (19440 bits per frame). Considering the STM-1
frame repetition rate, 8000 frames per second, this yields a bit rate of
155.520 Mbps.
Pointers
In Figure 6-7, the VC-4 appears to start immediately after the section overhead
part of the STM-1 frame.
Actually, to facilitate efficient multiplexing and cross-connection of signals in the
SDH network, VC-4 structures are allowed to float within the payload part of
STM-1 frames. This means that the VC-4 may begin anywhere within the STM-1
payload part. The result is that a given VC-4 typically begins in one STM-1 frame
and ends in the next.
Were the VC-4 not allowed to float, buffers would be required to store the VC-4
data up to the instant it can be inserted in the STM-1 frame. These buffers
(called slip buffers), which are often used in PDH multiplex equipment, introduce
long delays. Moreover, they also cause disruptions in case a slip occurs.
achieved by simply recalculating and updating the pointer value at each SDH
network node. In addition to clock offsets, updating the pointer will also
accommodate any other adjustment required between the input SDH signal rate
and the timing reference of the SDH mode.
Pointer adjustments introduce jitter. Excessive jitter on a tributary signal degrades
signal quality and may cause errors. Therefore, SDH networks must be designed
to permit reliable distribution of timing to minimize the number of pointer
adjustments.
SDH Cross-Connect
VC Path VC
Assembly Disassembly
Regenerator
BIP-8 Orderwire User BIP-8
Section B1 E1 F1 B3
Overhead
(Rows 1 - 3)
DCC DCC DCC Signal Label
D1 D2 D3 C2
Multiplex
DCC DCC DCC
Section D7 D8 D9
Z3
Overhead
(Rows 5 - 9)
DCC DCC DCC
D10 D11 D12
Z4
Orderwire
Z1 Z1 Z1 Z2 Z2 Z2
E2
Z5
Alarm Signals
Alarm information is included as part of the MSOH. These functions are explained
in the SDH Maintenance Signals and Response to Abnormal Conditions section
below.
Alarm Signals
Alarm and performance information is included as part of the path overhead.
These functions are explained in SDH Maintenance Signals and Response to
Abnormal Conditions.
The TU frame is then multiplexed into a fixed location within the VC-4.
Because of the byte interleaving method, a TU frame structure is distributed over
four consecutive VC-4 frames. It is therefore more accurate to refer to the
structure as a TU multiframe. The phase of the multiframe structure is indicated
by the H4 byte contained in the VC-4 path overhead.
1 Column
As shown in Figure 6-10, 63 TU-12s can be packed into the 260 columns of
payload capacity (i.e., the C-4 container) provided by a VC-4. This leaves
8 unused columns in the C-4 container. These unused columns result from
intermediate stages in the TU-12 to VC-4 multiplexing process, and are filled by
fixed stuffing bytes.
Note For simplicity, reference is made only to VCs (the actual structure needed to
transport a VC can be found in the SDH or SONET multiplexing hierarchy).
×4 ×1 139.264 Mbps
×1 AU-4 VC-4
C-4
(E4)
STM-1
AUG1
(155.520 Mbps) ×1
AU-3 VC-3
×3
44.736 Mbps
(DS3)
×3 VC-3
C-3
TU-3
×7
34.368 Mbps
×1 (E3)
TUG-
3
C-2 6.312 Mbps
TU-2 VC-2
×1 (DS2)
×7
×2 3.152 Mbps
VT3
TUG- (DS1C)
2
Legend ×4
TU-11 C-11
1.544 Mbps
VC-11
Pointer Processing (DS1)
×3
TU-12 C-12
2.048 Mbps
Mapping VC-12
(E1)
The flexibility of the SDH multiplexing approach is illustrated by the many paths
that can be used to build the various signal structures. For example, Figure 6-11
shows that the E1 signal is incorporated into STM-1/STM-4 signal using following
multiplexing paths:
• Each E1 signal is mapped into a VC-12, which is then encapsulated in a TU-12.
• Each group of 3 TU-12 is combined to obtain a TUG-2 (3 E1 signals per TUG-2.)
• Seven TUG-2 are combined to obtain one TUG-3 (21 E1 signals per TUG-3).
TUG-3 is carried in a VC-3.
• Three VC-3 are combined to generate one VC-4 (63 E1 signals per VC-4). The
STM-1 signal carries one VC-4.
• Four AUG-1 are combined to generate one AUG-4 (63 E1 signals per each
VC-4). The STM-4 signal carries four VC-4.
Signal Description
Loss of Signal (LOS) LOS defect is declared if an all zeros pattern is detected for more than 100 ms. If
an all-zeros pattern lasts 2.3 ms or less, a LOS defect is not declared. A LOS
defect is terminated if no 100 ms of zero pattern is detected during a 250 ms
period.
Out of Frame (OOF) OOF state entered when 4 or 5 consecutive SDH frames are received with invalid
(errored) framing patterns. Maximum OOF detection time is therefore 625 µs.
OOF state exited when 2 consecutive SDH frames are received with valid framing
patterns.
Loss of Frame (LOF) LOF state entered when OOF state exists for up to 3 ms. If OOFs are
intermittent, the timer is not reset to zero until an in-frame state persists
continuously for 0.25 ms.
LOF state exited when an in-frame state exists continuously for 1 to 3 ms.
Loss of Pointer (LOP) LOP state entered when N consecutive invalid pointers are received where N = 8,
9 or 10.
LOP state exited when 3 equal valid pointers or 3 consecutive AIS indications are
received.
Note
The AIS indication is an “all 1’s” pattern in pointer bytes.
Multiplexer Section AIS Sent by regenerator section terminating equipment (RSTE) to alert downstream
MSTE of detected LOS or LOF state. Indicated by STM signal containing valid
RSOH and a scrambled “all 1’s” pattern in the rest of the frame.
Detected by MSTE when bits 6 to 8 of the received K2 byte are set to “111” for
3 consecutive frames. Removal is detected by MSTE when 3 consecutive frames
are received with a pattern other than “111” in bits 6 to 8 of K2.
Far End Receive Failure Sent upstream by multiplexer section terminating equipment (MSTE) within
(FERF or MS-FERF) 250 µs of detecting LOS, LOF or MS-AIS on incoming signal. Optionally
transmitted upon detection of excessive BER defect (equivalent BER, based on B2
bytes, exceeds 10 ). Indicated by setting bits 6 to 8 of transmitted K2 byte to
-3
“110”.
Detected by MSTE when bits 6 to 8 of received K2 byte are set to “110” for 3
consecutive frames. Removal is detected by MSTE when 3 consecutive frames are
received with a pattern other than “110” in bits 6 to 8 of K2.
Transmission of MS-AIS overrides MS-FERF
AU Path AIS Sent by MSTE to alert downstream high order path terminating equipment (HO
PTE) of detected LOP state or received AU Path AIS. Indicated by transmitting “all
1’s” pattern in the H1, H2, H3 pointer bytes plus all bytes of associated VC-3 and
VC-4).
Detected by HO PTE when “all 1’s” pattern is received in bytes H1 and H2 for 3
consecutive frames. Removal is detected when 3 consecutive valid AU pointers
are received
Signal Description
High Order Path Remote Generated by high order path terminating equipment (HO PTE) in response to
Alarm Indication received AU path AIS. Sent upstream to peer HO PTE. Indicated by setting bit 5 of
(HO Path RAI, also known POH G1 byte to “1”.
as HO Path FERF) Detected by peer HO PTE when bit 5 of received G1 byte is set to “1” for 10
consecutive frames. Removal detected when peer HO PTE receives 10
consecutive frames with bit 5 of G1 byte set to “0”
TU Path AIS Sent downstream to alert low order path terminating equipment (LO PTE) of
detected TU LOP state or received TU path AIS. Indicated by transmitting “all 1’s”
pattern in entire TU-1, TU-2 and TU-3 (i.e., pointer bytes V1-V3, V4 byte, plus all
bytes of associated VC-1, VC-2 and VC-3 loaded by “all 1’s” pattern).
Detected by LO PTE when “all 1’s” pattern received in bytes V1 and V2 for 3
consecutive multiframes. Removal is detected when 3 consecutive valid TU
pointers are received.
Note
TU Path AIS is only available when generating and/or receiving “floating
mode” tributary unit payload structures.
Low Order Path Remote Generated by low order path terminating equipment (LO FTE) in response to
Alarm Indication received TU Path AIS. Sent upstream to peer LO PTE.
(LO Path RAI, also known Indicated by setting bit 8 of LO POH V5 byte to “1”.
as LO Path FERF)
Detected by peer LO PTE when bit 8 of received V5 byte is set to “1” or 10
consecutive multiframes. Removal detected when peer LO PTE receives 10
consecutive multiframes with bit 8 of V5 byte set to “0”.
Note
LO Path RAI is only available when generating and/or receiving “floating
mode” tributary unit payload structures.
This section describes the response to the various conditions that can be
detected by the maintenance functions built into the SDH frames, and the flow
of alarm and indication signals.
Figure 6-12 provides a graphical representation of the flow of alarm and
indication signals through an SDH transmission path.
Multiplexer Section
Regenerator Regenerator
Section Section
LOS LOS
LOF LOF
Tributary
AIS (X2) AIS AIS AIS
(H1H2) (V1V2)
FERF
(X2)
RAI RAI (G1)
(G1)
RAI
(VS) RAI (VS)
B1(BIP-8) B1(BIP-8)
B2(BIP-24)
B3(BIP-8)
FEBE FEBE
(G1)
(G1)
BIP-2
(VS)
FEBE FEBE
(VS) (VS)
Legend
Collection LO Low Order PTE Path Terminating Equipment
Transmission HO High Low Order RS TE Regenerator Section Terminating Equipment
Generation MS TE Multiplexer Section Terminating Equipment
Figure 6-12. Flow of Alarm and Indication Signals through an SDH Transmission
Path
• A Remote Alarm Indication (RAI) for a low order path is sent upstream after a
low order path AIS or LOP condition has been detected by equipment
terminating a low order path.
Performance Monitoring
Performance monitoring at each level in the maintenance hierarchy is based on
the use of the byte interleaved parity (BIP) checksums calculated on a frame by
frame basis. These BIP checksums are sent downstream in the overhead
associated with the regenerator section, multiplexer section and path
maintenance spans.
In response to the detection of errors using the BIP checksums, the equipment
terminating the corresponding path sends upstream Far End Block Error (FEBE)
signals.
SONET Environment
SONET (Synchronous Optical Network) is an alternative standard to SDH, widely
used in North America and other parts of the world. SONET uses implementation
principles and even frame structures that are very similar to those used by SDH.
Therefore, the following description is based on the information already
presented for SDH.
Figure 6-13 shows the SONET multiplexing hierarchy.
139.264 Mbps
×1 STS-3c ×1 STS-3c
STS-3 (E4)
STS-3 SPE
(155.520 Mbps)
×3 ×3
44.736 Mbps
(DS3)
VT6
VT6 6.312 Mbps
SPE (DS2)
×1
The main signal structures in the SONET hierarchy are designated as follows:
• Containers are replaced by synchronous payload envelopes (SPE) for the
various virtual tributaries (VTs)
• Virtual containers (VCs) are replaced by virtual tributaries (VTs); however the
rates are similar to those used in the SDH hierarchy
• Tributary unit groups (TUGs) are replaced by virtual tributary groups
• The VC-3 level is replaced by the Synchronous Transport Signal level 1
(STS-1), and has the same rate (51.840 Mbps).
• 3 STS-1 can be combined to obtain one Synchronous Transport Signal level 3
(STS-3) at the same rate as STM-1 (155.520 Mbps). The corresponding
optical line signal is designated OC-3.
• 12 STS-1 can be combined to obtain one Synchronous Transport Signal level
12 (STS-12) at the same rate as STM-4 (622.080 Mbps). The corresponding
optical line signal is designated OC-12.
Remote Loopback
The recovered STM-1/OC-3 and STM-4/OC-12 receive signal provided by the
STM-1/OC-3 and STM-4/OC-12 transceiver of the tested port is returned by the
remote loopback toward the equipment connected to the local STM-1/OC-3 or
STM-4/OC-12 port. The loopback is activated at the line side of the STM-1/OC-3
or STM-4/OC-12 framer serving the tested port.
Figure 6-14 shows the signal paths when a remote loopback is activated.
E5-cTDM-4 Card
RX
Transceiver Framer
TX
RX
Transceiver Framer
TX
The test signal is provided by the equipment connected to the local STM-1/OC-3
or STM-4/OC-12 port, that must receive its own transmission. While the loopback
is activated, the local STM-1/OC-3 or STM-4/OC-12 port continues sending the
received payload to the ETX-5 transmit path, for transmission through the packet
network to the equipment at the remote end of the link.
This test checks the connections to the local STM-1/OC-3 or STM-4/OC-12 port,
including the transmission plant connecting the local equipment to the E5-cTDM-
4 or E5-TDM-1 card, and the STM-1 transceiver of the E5-cTDM-4 or E5-TDM-1
card.
Local Loopback
The local loopback connects the STM-1/OC-3 or STM-4/OC-12 transmit signal
generated by the STM-1/OC-3 or STM-4/OC-12 framer of the tested port, to the
receive input of the framer. This returns the STM-1/OC-3 or STM-4/OC-12 signal
toward the equipment at the remote end of the link.
Figure 6-15 shows the signal paths when a local loopback is activated.
E5-cTDM-4 Card
RX
Transceiver Framer
TX
RX
Transceiver Framer
TX
While the loopback is activated, the local STM-1/OC-3 port continues sending the
transmit signal to the STM-1/OC-3 or STM-4/OC-12 line.
The test signal is provided by the remote equipment whose payload is routed to
the tested STM-1/OC-3 or STM-4/OC-12 port; that equipment must receive its
own transmission.
This test fully checks the operation of the local STM-1/OC-3 or STM-4/OC-12 port,
except for the STM-1/OC-3 or STM-4/OC-12 line interface (transceiver). It also
checks the ETX-5 signal paths that end at the corresponding STM-1/OC-3 or
STM-4/OC-12 port, including the transmission through the packet network
connecting the remote equipment to ETX-5.
Defining the administrative unit aug <aug number> AUG is relevant for SDH modes. See
group (AUG) Configuring AUG/OC-3 below.
Setting the type of operation in frame-type {sdh | sonet} frame-type parameter is included for
accordance with the SDH or information only. Interface type is
SONET standards selected when a TDM module is defined
in chassis slot.
Controlling EED response eed-action [ { soh } ] [ { EED response is enabled for SOH, path
(sending AIS downstream and path } ] [ { vt } ] and VT levels
RDI upstream) no eed-action
Defining transmitted and j0-pathtrace [ {tx-string <tx- When TIM monitoring is enabled and
expected section trace labels trace-string> ] [exp-string ETX-5 receives J0 trace string that is
(carried in byte J0 of the <exp-string>}] different from the expected one, it
SOHoverhead) declares section TIM defectETX-5
*In SONET mode [0-0xFF]
Activating diagnostic loopback loopback { local | remote } Loopback duration is within 0 (forever) -
[ duration <0-86400>] 86400 second range.
no loopback no loopback deactivates the loopback.
Controlling TIM response tim-action [ { soh } ] [ { path TIM response is enabled for EOH, path
(sending AIS downstream and } ] [ { vt } ] and VT levels
RDI upstream) no tim-action
Defining STM-1 frame overhead overhead-mode { itu-ansi | This value defines value for unused
type ttc } overhead bytes.
Note: This parameter is valid for STM-1
mode of E5-cTDM-4 card only
It is valid for STM-1 T1 mode only. In the
TTC mode (STM-1J), the unused bytes are
filled with FFs.
Selecting the timing reference tx-clock-source {loopback | Tx clock source set for one SDH/SONET
source used by the port for the domain <domain-number>} port is automatically copied to the rest
transmit-to-network direction three TDM ports of the card.
Currently, it is recommended to use
domain clock as a Tx clock source.
Defining OC-3 oc3<oc3 number> This parameters is valid for SONET mode
only (for E5-cTDM-4 card must be set to
1)
Controlling carrying SSM code in tx-ssm If enabled, the TDM port carries SSM
S1 byte for system clock quality no tx-ssm code in S1 byte for system clock QL. In
level definition the following cases, the S1 byte is set to
DNU (SDH) or DUS (SONET) mode:
• SSM transmission is disabled
• Port Rx clock is set to loopback
• Port clock is used as a selected source
for system timing.
To configure AUG/OC-3:
1. At the config>port>sdh-sonet(slot/port)# prompt, enter aug <aug number*>
or oc3 <oc3 number*>.
The config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)# prompt is
displayed.
* For E5-cTDM-4 card <aug number> must be set to 1
2. Enter all necessary commands according to the tasks listed below.
Defining transmitted and J1-pathtrace [ {tx-string <tx- When TIM monitoring is enabled and ETX-
expected path trace labels trace-string> ] [exp-string 5 receives path trace string that is
(carried in byte J1 of the AUG <exp-string>}] different from the expected one, it
overhead) declares path TIM defect
Assigning path profile to AUG or path <profile_name> Path profile configuration is detailed in
OC-3 Configuring Path Profile
Selecting path width path-width { au4 | au3} This value defines T1-AU-3 and E1 to
AU-4 mapping mode. It is valid for SDH
mode only.
Note: not relevant for E5-cTDM-STM4
card
Defining TUG-3 (Tributary Unit tug3 { 1 | 2 | 3} This parameter is valid for both STM-1
Group) and STM-4 E1 ports.
Defining STS-1 port sts1 { 1 | 2 | 3} This parameter is valid for both OC-3 and
OC-12 ports. See Configuring
TUG3/AU3/STS-1 below.
To configure TUG3/AU3/STS-1:
1. At the config>port>sdh-sonet(slot/port)>aug(number) or oc3(number)#
prompt, enter tug3 1–3, au3 1–3 or sts1 1–3.
The config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)>tug3(number),
au3(number) or sts1(number)# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Definingtransmitted and J1-pathtrace [ {tx-string <tx- When TIM monitoring is enabled and ETX-
expected path trace labels trace-string> ] [exp-string 5 receives path trace string that is
(carried in byte J1 of the <exp-string>}] different from the expected one, it
STS1overhead) declares path TIM defectETX-5
Assigning path profile to STS-1 path <profile_name> Path profile configuration is detailed in
or AU3 Configuring Path Profile
Defining VC-12 ports vc12 {<1–7> | <1–3>} Use space to separate TUG2 and VC-12
values. This parameter is valid for STM-1
E1 ports only.
Defining VC-11 ports vc11{ <1–7> | 1–4>} Use space to separate TUG2 and VC-11
values. This parameter is valid for STM-1
T1 ports only. See Configuring VC-12/VC-
11/VT-1.5 below.
Note: not relevant for E5-cTDM-STM4
card
Defining VT-1.5 ports vt1-5 {<1–7> | <1–4>} Use space to separate TUG2 and VT-1.5
values. This parameter is valid for OC-
3and OC-12 ports.
To configure VC-12/VC-11/VT-1.5:
1. At the config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)>tug3(number),
au3(number) or sts1(number)# prompt, enter vc12 number number, vc11
number number or vt1-5 number number.
The config>port>sdh-sonet>(slot/port)aug(1) or oc3(1)>tug3(number),
au3(number) or sts1(number)> vc12 (TUG2 number/VC-12 number), vc11
(TUG2 number/VC-11 number) or vt1-5 (TUG2 number/VT-1.5 number)#
prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Defining transmitted and J2-pathtrace [ {tx-string <tx- When TIM monitoring is enabled and ETX-
expected path trace labels trace-string> ] [exp-string 5 receives path trace string that is
(carried in byte J2 of the VC/VT <exp-string>}] different from the expected one, it
overhead) declares path TIM defectETX-5
Assigning path profile to VC-12, path <profile_name> Path profile configuration is detailed in
VC-11 or VT-1.5 Configuring Path Profile
Enabling/disabling performance pm-enable no pm-enable disables PM data collection
monitoring data collection at VC- no pm-enable
12, VC-11 or VT-1.5 levels
Defining EED (error rate ber-threshold [eed {e-3 | e- If the selected BER value is exceeded,
degradation) and SD (signal 4 | e-5} ] [ sd {e-5 | e-6 | e-7 ETX-5 generates the relevant (EED or SD)
degrade) thresholds | e-8 | e-9}] alarm.
Currently, SD BER threshold uses E-5
only.
Defining EED (error rate ber-threshold [eed {e-3 | e- If the selected BER value is exceeded,
degradation) and SD (signal 4 | e-5} ] [ sd {e-5 | e-6 | e-7 ETX-5 generates the relevant (EED or SD)
degrade) thresholds | e-8 | e-9}] alarm
Currently, SD BER threshold uses E-5
only.
Example
The script below shows the configuration of SDH/SONET port 1 on the E5-cTDM-4
card installed in slot 1.
#***************************Defining_SDH_SONET_Card**************************
configure slot 1
card-type sdh-sonet stm-1-ch-4
no shutdown
exit all
#*********************************End****************************************
#**************************Configuring_SOH_Profile***************************
#**************************Configuring_HVC_Profile***************************
configure port path-profile PATH-PROFILE-1
payload-label hvc 0x02
tim-monitoring
exit all
#*********************************End****************************************
#**************************Configuring_LVC_Profile***************************
configure port path-profile VC-PROFILE-1
payload-label lvc asynchronous
tim-monitoring
exit all
#*********************************End****************************************
#**************************Configuring_SDH_Port******************************
configure port sdh-sonet 1/1
j0-pathtrace tx-string "ETX-5300A" exp-string "EGATE-2000"
soh profile SOH-PROFILE-1
tim-action soh
tim-action path
tim-action vt
eed-action soh
eed-action path
eed-action vt
tx-clock-source domain 1
tx-ssm
no shutdown
#*********************************End****************************************
#**************************Configuring_HVC***********************************
aug 1
path-width au-4
j1-pathtrace tx-string "ETX-AUG-1" exp-string "EGATE-AUG-1"
path profile PATH-PROFILE-1
pm-enable
no shutdown
#*********************************End****************************************
#**************************Configuring_LVC***********************************
tug3 1
vc12 1 1
j2-pathtrace tx-string "ETX-VC12-1-1" exp-string "EGATE-VC12-1-1"
path profile VC-PROFILE-1
pm-enable
no shutdown
exit all
#*********************************End****************************************
Displaying Status
You can display current status of TDM port on E5-cTDM-4 card at any level. For
viewing the status of the SDH/SONET hierarchical entities, follow the instructions
below.
Name : HVC-1/1/1
Administrative Status : Down
Operational Status : Down
Signal Label
Expected : 0x00
Received : 0x00
Name : HVC-4/1/1
Administrative Status : Down
Operational Status : Down
Signal Label
Expected : 0x00
Received : 0x00
Name : LVC-4/1/1
Administrative Status : Down
Operational Status : Down
Signal Label
Expected : 0x00
Received : 0x00
Displaying Statistics
SDH/SONET ports of ETX-5 feature the collection of performance monitoring data
at different hierarchical levels, per ANSI T1.403. The PM data is collected for 15-
minute and 24-hour intervals.
Displaying statistics show statistics {current | interval <interval- • current –Displays the current
num 1..96> | current-day | previous-day | interval statistics
all-intervals | all} • interval (1–96) – Displays
statistics for a selected interval
• current-day – Displays statistics
for current day starting from
12:00 midnight
• previous-day – Displays
statistics for 24 hours before
last 12:00 midnight
• all-intervals – Displays statistics
for all existing intervals (up to
96)
• all –Displays all statistics in
succession: current > all
intervals > current day >
previous day
ETX-5>config>port>sdh-sonet(l/1)# pm-enable
ETX-5>config>port>sdh-sonet(l/1)# show statistics current
Current
Time Elapsed (Sec) : 0
Valid Intervals : 0
Invalid Intervals : 0
Section
ES : 0 SES : 0
SEFS : 0 CV : 0
Line
ES : 0 SES : 0
UAS : 0 CV : 0
FC : 0
Far End
ES : 0 SES : 0
UAS : 0 CV : 0
FC : 0
Figure 6-16. SDH/SONET Statistics
ETX-5>config>port>sdh-sonet(1/1)>oc3(1)>sts1(1)# vt1-5 1 1
ETX-5>config>port>sdh-sonet(1/1)>oc3(1)>sts1(1)>vt1.5(1/1)# pm-enable
ES : 0 SES : 0
UAS : 0 CV : 0
FC : 0
Far End
ES : 0 SES : 0
UAS : 0 CV : 0
FC : 0
Figure 6-17. SDH/SONET Statistics, VT-1.5 Level
Parameter Description
ES SONET: Number of seconds during which at least one Section BIP error was detected
or an SEF or LOS defect was present
SDH: Number of seconds during which at least one RS errored block was detected or
an SEF or LOS defect was present
SES SONET: Number of seconds during which 155 or more Section BIP errors were
detected or an SEF or LOS defect was present
SDH: Number of seconds during which 2400 or more RS errored blocks were detected
or an SEF or LOS defect was present
SEFS Number of the seconds during which an SEF defect was present
CV SONET: Number of BIP errors detected at the Section layer (B1 byte)
SDH: Number of errored blocks at the RS layer (B1 byte)
Parameter Description
ES SONET: Number of seconds during which at least one Line BIP error was detected or a
compound AIS-LINE defect was present
SDH: Number of seconds during which at least one MS errored block was detected or
a compound AIS-LINE defect was present
SES SONET: Number of seconds during which 154 or more Line BIP errors were detected or
a compound AIS-LINE defect was present
SDH: Number of seconds during which 2400 or more MS errored blocks were detected
or a compound AIS-LINE defect was present
Parameter Description
UAS Number of seconds for which the Line is unavailable. The line becomes unavailable at
the onset of 10 contiguous SES-Ls. The 10 SES-Ls are included in unavailable time.
Once unavailable, the line becomes available at the onset of 10 contiguous seconds
with no SES-Ls. The 10 seconds with no SES-Ls are excluded from unavailable time.
CV SONET: Number of BIP errors detected at the Line layer (B2 byte)
SDH: Number of errored blocks at the MS layer (B2 byte)
FC Number of Line failure events. A failure event begins when a compound AIS-LINE
failure is declared, and ends when the failure is cleared. A failure event that begins in
one period and ends in another period is counted only in the period in which it begins.
Parameter Description
ES SONET: Number of seconds during which at least one Line BIP error was reported by
the far-end (using the REI-L) or an RDI-LINE defect was present
SDH: Number of seconds during which at least one MS errored block was reported by
the far-end (using the REI-L) or an RDI-LINE defect was present
SES SONET: Number of seconds during which154 or more Line BIP errors were reported by
the far-end or an RDI-LINE defect was present
SDH: Number of seconds during which 2400 or more MS errored blocks were reported
by the far-end or an RDI-LINE defect was present
UAS Number of seconds for which the Line is unavailable at the far-end. The far-end line
becomes unavailable at the onset of 10 contiguous FE-SES-Ls. The 10 FE-SES-Ls are
included in unavailable time. Once unavailable, the line becomes available at the onset
of 10 contiguous seconds with no FE-SES-Ls. The 10 seconds with no FE-SES-Ls are
excluded from unavailable time.
CV SONET: Number of Line BIP errors detected by the far-end and reported back to the
near-end using the REI-L indication in the LOH (M1 byte)
SDH: Number of MS errored blocks detected by the far-end and reported back to the
near-end using the REI-L indication in the MSOH (M1 byte)
FC Number of far-end Line failure events. A far-end failure event begins when an RFI-LINE
failure is declared, and ends when the failure is cleared. A failure event that begins in
one period and ends in another period is counted only in the period in which it begins.
To clear statistics:
• At the prompt config>slot>port>sdh-sonet (<slot/port>)#, enter
clear-statistics.
To activate a loopback:
1. Navigate to configure port sdh-sonet <slot>/<port> to select the SDH/SONET
port to test.
The config>port>sdh-sonet>(slot/port)# prompt is displayed.
2. At the config>port>sdh-sonet>(slot/port)# prompt, enter loopback , followed
by loopback type (local or remote) and its duration 0 (forever) - 86400
seconds..
To deactivate a loopback:
• At the config>port>sdh-sonet>(slot/port)# prompt, enter no loopback.
Configuration Errors
The table below lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Cannot change loopback type, disable Loopback type cannot be changed while the loopback is active
the loopback first
Invalid entity for VC profile to be added Invalid port entity has been assigned to a SOH or path profile
The profile is not defined yet Non-existing SOH or path profile has been assigned to a port
Invalid inband loopDown length Invalid length of inband loopback deactivation code
Invalid SES threshold value SES threshold value is out of range (0–900)
Invalid SEFS threshold value SEFS threshold value is out of range (0–900)
Invalid CSS threshold value CSS threshold value is out of range (0–900)
Invalid UAS threshold value UAS threshold value is out of range (0–900)
PathWidth is wrong for the LineType Invalid path width value for STM-1 port
Invalid SonetMedium SsmTX value Invalid value for SSM code carried in S1 byte
Invalid loopback timeout value Loopback duration value is out of range (0 - 86400)
Invalid transmitted trace length Invalid length of J0, J1 or J2 transmitted path trace label
Invalid expected trace length Invalid length of J0, J1 or J2 expected path trace label
Invalid CV section interval threshold CV section threshold value is out of range (0–16383)
Message Description
Invalid ES section interval threshold ES section threshold value is out of range (0–900)
Invalid SES section interval threshold SES section threshold value is out of range (0–900)
Invalid SEFS section interval threshold SEFS section threshold value is out of range (0–900)
Invalid CV line interval threshold CV line threshold value is out of range (0–16383)
Invalid ES line interval threshold ES line threshold value is out of range (0–900)
Invalid SES line interval threshold SES line threshold value is out of range (0–900)
Invalid CvFe line interval threshold CV far-end line threshold value is out of range (0–16383)
Invalid EsFe line interval threshold ES far-end line threshold value is out of range (0–900)
Invalid SesFe line interval threshold SES far-end line threshold value is out of range (0–900)
Invalid UasFe line interval threshold UAS far-end line threshold value is out of range (0–900)
Invalid EED response value Invalid EED response value has been selected
Invalid EED threshold value Invalid EED threshold value has been selected
Invalid CV1 5min interval threshold value CV 5-min interval threshold value is out of range (0–16383)
Invalid ES1 5min interval threshold value ES 5-min interval threshold value is out of range (0–900)
Invalid SES1 5min interval threshold SES 5-min interval threshold value is out of range (0–900)
value
Invalid UAS1 5min interval threshold UAS 5-min interval threshold value is out of range (0–900)
value
Invalid FeCv1 5min interval threshold CV far-end 5-min interval threshold value is out of range (0–
value 16383)
Invalid FeEs1 5min interval threshold ES far-end 5-min interval threshold value is out of range (0–
value 900)
Invalid FeSes1 5min interval threshold SES far-end 5-min interval threshold value is out of range (0–
value 900)
Invalid FeUas1 5min interval threshold UAS far-end 5-min interval threshold value is out of range (0–
value 900)
Invalid payload label Invalid expected higher order path signal label (byte C2) has
been selected
Medium type SONET does not match Frame type is not compatible with selected card type
card type
Medium type SDH does not match card Frame type is not compatible with selected card type
type
Path width sts1 is illegal for SDH E1 Selected STS-1 path width value is incompatible with SDH E1
port type
Path width sts3cSTM1 is illegal for SONET Selected STS-3 path width value is incompatible with SONET port
type
Default profile cannot be deleted Default SOH or path profile cannot be deleted
Message Description
Profile can't be created: max number of Maximum number or SOH or path profiles has been reached
profiles has been reached
Profile name must be unique SOH or path profile name is already taken
Profile name cannot be changed SOH or path profile name cannot be changed when it has ports
assigned to it
Profile does not exist Cannot assign a port to a non-existing SOH or path profile
Benefits
SAGs represent blocks of I/O card ports with ability to aggregate their flows into
Service Attachment Points (SAPs), supporting pre-forwarding scheduling and
shaping.
Factory Defaults
By default, two SAGs exist per I/O Ethernet card.
Functional Description
GbE and 10GbE cards introduce logical ports that serve as management entities
(SAG) and flow aggregation points (SAP). Figure 6-18 illustrates Ethernet I/O card
schematics. The SAPs aggregate several I/O ingress flows to a single forwarding
path (E-Line or E-LAN) towards the main card and help avoid re-classification to
different forwarding paths from the same SAG.
Flow
SAP
Flow SAP
Flow
SAP
Flow SAP
Each I/O Ethernet card has two SAGs, serving 1–10 and 11–20 ports on
E5-GbE-20 card respectively. Likewise, SAG 1 serves port 1 and SAG 2 serves port
2 on E5-10GbE-2 card. Each SAG includes 1024 SAPs, which aggregate ingress
flows from I/O card ports.
Configuring SAGs
To configure a SAG:
1. Navigate to config>port.
2. Enter sag <slot/port>.
The config>port>sag(slot/port)# prompt is displayed.
3. Enter all necessary commands according to the tasks listed below.
Associating SAG with queue group queue-group < queue-group-name> no queue-group removes SAG
association with the queue group
Example
To configure a SAG:
• Slot 1
• Port 1
• Name – SAG_1_1
• Queue group – q_group_SAG_2_level_default.
ETX-5>config>port>sag 1/1
ETX-5>config>port>sag(1/1)# name SAG_1_1
ETX-5>config>port>sag(1/1)# queue-group profile q_group_SAG_2_level_default
Configuration Errors
Table 6-14 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Illegal ingress/egress SAP number Maximum number of ingress/egress SAPs (1024) has been
reached
Cannot bind SAG queue group to A queue group that has already been bound to a SAG cannot be
Ethernet port or LAG used for an Ethernet group or LAG
Cannot bind level-3 queue group to SAG A level-3 queue group cannot be bound to a SAG
Shaping profile is bound to level-1 SAG Level-1 queue block bound to SAG cannot include shaper
queue block
Factory Defaults
By default, ETX-5 does not have SVIs.
Functional Description
SVIs are used as ingress and egress ports for flows, serving as intermediaries for
bridges and routers, which must comply with standards of their own (VLAN
domains for bridge ports or IP address for router interfaces). They do not have
physical port attributes. They also serve as aggregation points for TDM PWs (see
Figure 6-20). ETX-5 supports up to 4000 SVIs.
Note For bridge-type SVIs, each ingress flow within a certain VLAN domain must have
an accompanying egress flow.
ETX-5
LB IP
Router
RIF
SVI
SVI
SVI BP SVI
User BP BP OOB
Bridge
User BP BP NET
SVI SVI
Flow
BP BP
I/O Card STM-1/OC-3 Port
Bridge
SVI
MEF-8
Pseudowire Flow BP BP
SVI SVI
MEF-8 SVI
Pseudowire Flow
TDM Pseudowire
Processing
Configuring SVIs
To configure an SVI:
1. Navigate to config>port.
2. Enter the svi <svi_number>, followed by the SVI type (bridge | pw | router),
depending on whether you intend to attach a flow to a bridge, a pseudowire
or a router.
The config>port>svi(number)# prompt is displayed.
Note no svi <svi_number> entered at the config>port prompt, deletes the SVI.
Example
To configure SVI:
• Number – 1
• Type – bridge
• Name – svi_1_bridge
ETX-5>config>port>svi 1 bridge
ETX-5>config>port>svi(1)# name svi_1_bridge
Configuration Errors
Table 6-15 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
SVI cannot be created: max number of SVI cannot be created because the maximum number of SVIs per
SVIs has been reached chassis (4000 interfaces) has been reached
SVI number is out of range SVI number cannot be used because it is out of allowed range
Delete failed: SVI is bound SVI cannot be deleted because it is currently in use
Delete failed: SVI is used by flow SVI cannot be deleted because it has flows bound to it
SVI is not configured Binding to the SVI failed because the SVI does not exist
Modify failed: only bridge-type SVI can SVI cannot be modified because only bridge-type SVIs can be
be bound bound to this entity
Message Description
Modify failed: SVI is already bound to SVI cannot be modified because it is already bound to another
another bridge port bridge port
Modify failed: flow is bound to SVI SVI cannot be modified because flows are bound to it
6.7 T1 Ports
Internal T1 ports of the E5-cTDM-4 and E5-cTDM-STM4 cards deliver pseudowire
services, emulating PDH traffic over PSN. Each internal T1 is permanently mapped
to a VT-1.5 channel, handling its payload in accordance with the defined ITU-T
framing mode and signaling format.
Factory Defaults
ETX-5 is supplied with all T1 ports disabled. Other parameter defaults are listed in
the table below.
line-type unframed
path-interval-threshold cv 0
path-interval-threshold es 80
path-interval-threshold ses 10
path-interval-threshold sefs 0
path-interval-threshold css 0
path-interval-threshold uas 10
idle-code 7F
out-of-service 00
tx-clock-source loopback
loopback no loopback
trail-mode terminated
Functional Description
T1 Signal Structure
The T1 line operates at a nominal rate of 1.544 Mbps. The data transferred over
the T1 line is organized in frames.
The T1 frame format is shown in the figure below.
8 Other Frames Bit B Conveys
Byte Organization 8 Bits/Channel 1 2 3 4 5 6 7 A Frame 6 Signaling
(D4 Frame - See NOTE) B Frame 12 Information
Ft C H C H CH CH
Frame 24 Channels/Frame
or
Organization Frame = 193 Bits 1 2 13 24
Fs
Multiframe
FR FR FR FR FR
Organization
1 2 7 11 12
Multiframe
SF (D4) 12 Frames
NOTE: ESF: 24 Frames
In addition, ESF has a C-bit in frame 18 and a D-bit in frame 24
Each T1 frame includes 193 bits. 192 bits are organized in 24 timeslots of eight
bits each that carry the payload data. An additional timeslotconsisting of one bit
(the F-bit) carries framing and supervision information. As a result, the data rate
supported by each payload timeslot is 64 kbps. The data rate of the framing slot
is 8 kbps.
The T1 frame does not include a dedicated timeslot for the transfer of channel
signaling. When end-to-end transfer of signaling is necessary, a technique called
“robbed-bit signaling” is used. The robbed-bit is the least significant bit (bit 8) of
the channel byte, and is actually “robbed” only once in every six frames. A
channel signaling information is transmitted transparently without any special
treatment.
In order to enhance link/system supervision capabilities, the frames are organized
in larger patterns, called super-frames. Two types of super-frames are used:
• SF (also called D4), consists of 12 T1 frames.
• Extended SF (ESF), consists of 24 T1 frames
The SF format provides limited supervision capabilities, such as end-to-end
reporting of local loss-of-signal (yellow alarm), and line loopback.
The ESF format provides improved supervision capabilities, and allows better
utilization of the 8 kbps framing timeslots. The major advantage of the ESF
format is that it supports on-line link performance monitoring (by means of a
2 kbps Cyclic Redundancy Check (CRC) channel) and also provides a 4 kbps
end-to-end supervision and control data link. The data link can be used for
performance monitoring and failure reporting, for activation of maintenance
loopbacks, and for transmission of various commands to the far end equipment.
The implementation of the multiframing format is based on the use of various
F-bit patterns. The F-bit pattern is used to perform three functions:
T1 Alarm Conditions
The basic alarm conditions are the red alarm and the yellow alarm. Note that with
the ESF format, the FDL link can be used for more sophisticated status
transmissions, in accordance with the ANSI Standard T1.403-1989 and AT&T Pub.
54016.
• Red Alarm. A red alarm is generated when the local unit has lost frame
synchronization for more than 2.5 consecutive seconds, or the bit error rate
-2
exceeds 10 for 2.5 consecutive seconds. Loss of frame synchronization may
be caused either by Fs or Ft errors, by the reception of an AIS signal, or by
the loss of the input signal (receive data remains zero for 31 consecutive
bits). In accordance with AT&T TR-62411, a system automatically recovers
synchronization when there has been a period of 10 to 20 consecutive
seconds free of the loss of sync condition.
• Yellow Alarm. A yellow alarm is sent from the remote unit to inform the local
unit that a red alarm exists at the remote end.
• Alarm Indication Signal (AIS). The AIS signal is an unframed “all-ones” signal,
and is used to maintain line signal synchronization when an alarm condition
occurs in the equipment that supplies the line signal.
T1 Port Diagnostics
Diagnostic tools at the T1 level include:
• Local and remote loopback for checking connections toT1 ports
• Code-activated local and remote loopbacks. These loopbacks are activated
and deactivated by the detection of user-specified patterns in the TDM data,
a function enabled and configured as part of the physical parameters of the
port.
Note You can run only one regular or inband-activated local loopback per the
E5-cTDM-4 and E5-cTDM-STM4 cards.
Local Loopback
The figure below shows the signal paths during a local loopback on an internal T1
port.
Internal T1
TDM PSN
Framer Mapper
Remote Loopback
Figure 6-23 shows the signal paths during a remote loopback on an internal E1
port.
As shown in Figure 6-23 when a remote loopback is activated on an internal E1
port, the T1 framer of that port returns the transmit signal via the receive path of
the same port. The transmit signal is received from the local end user equipment
served by the tested port, through the corresponding E5-cTDM-4 or E5-cTDM-
STM4 cards.
While the loopback is activated, the signal received from the remote T1 port is
ignored. The signal received from the local end user equipment remains
connected to the packet processor and it is transmitted to the remote T1 port.
To ensure that the user equipment is capable of providing a good signal, the
remote loopback should be activated on T1 port only after checking that the local
end user equipment operates normally while its own local loopback is activated.
Internal T1
TDM PSN
Framer Mapper
While the remote loopback is activated on the local T1 port, the local end user
equipment must receive its own signal, and thus it must be frame-synchronized.
This test checks the transmission path between the local end user equipment to
the local port, including the transmission plant and SONET equipment connecting
the user equipment to the ETX-5, and part of the internal ETX-5 signal path that
handle the routing of the signals up to the tested T1 port, including the SONET
mapper of the E5-cTDM-4 or E5-cTDM-STM4 cards.
Inband Loopbacks
ETX-5 supports code-activated local and remote loopbacks. These loopback
functions are activated and deactivated by the detection of user-specified
patterns in the TDM data.
When a T1 port is configured to activate a local loopback in response to the
configured pattern sent using PW OAM messaging, it monitors the incoming TDM
data stream:
• To activate the loopback, the user equipment sends the configured activation
pattern several times in sequence.
• When the configured activation pattern is detected, the port activates its
local loopback.
• The user equipment detects the activation of the loopback because it starts
receiving the loopback activation pattern. After detecting the loopback, the
equipment can stop transmitting the activation pattern, and send any other
desired test signals.
• To deactivate the loopback and return the port to normal operation, the user
equipment sends the configured deactivation pattern several times in
sequence, until it detects the deactivation of the local loopback.
ETX-5 supports the following inband loopback activation methods:
• CSU, according to ANSI T1.403 and AT&T TR 54016. This method is relevant
for framed modes only.
• NIU (FAC1 and FAC2), according to Telecordia GR-312. This method is relevant
for framed and unframed modes.
• Custom, user-defined 3–8 bit long loopback activation and deactivation
patterns. This method is relevant for framed and unframed modes.
Note An internal T1 port becomes active only if an enabled pseudowire with a valid
cross-connection is assigned to the port.
Specifying T1 framing line-type {unframed | esf | sf} When using one of the framed modes, you
mode select specific timeslots for transport by
configuring the appropriate bundle at the
pwe# prompt.
The specific timeslots are selected using the
pw-tdm command at the cross-connect#
prompt.
Specifying the code idle-code { 00 to FF (hexa) } This parameter is valid for framed modes
transmitted to fill unused only.
timeslots in T1 frames Only one idle code value is allowed per the
E5-cTDM-4 or E5-cTDM-STM4 cards.
Selecting the code out-of-service <00–FF> The hexadecimal number is in the range of 0
transmitted during to FF (two digits)
out-of-service period The selected out-of-service code is also
sent during out-of-service periods instead
of the external data stream when the
unframed mode is used.
Only one out-of-service code value is
allowed per the E5-cTDM-4 or E5-cTDM-
STM4 card.
Controls the propagation trail-mode {terminated | extended} See Alarm Indications and Fault Propagation
of alarm indications in the TDM Pseudowires of Chapter 8
Selects the reference tx-clock-source {domain <domain-num> | Tx clock setting becomes active only after a
source used by the loopback | pw } T1 port is disabled and enabled (shutdown
transmit path of this port > no shutdown).
If a T1 port is assigned to a PW, reset
(disable and enable) the PW after any
change in the tx-clock-source parameter.
Activating diagnostic loopback { local | remote } [ duration <0– Loopback duration is within 0 (forever) –
loopback 86400>] 86400 second range.
no loopback no loopback deactivates it.
Displaying Status
You can display current status of any internal T1 port on an E5-cTDM-4 or E5-
cTDM-STM4 card.
Displaying Statistics
Internal T1 ports of ETX-5 collect performance monitoring data at path level.
Displaying statistics show statistics {current | interval <interval- • current –Displays the current
num 1..96> | current-day | previous-day | interval statistics
all-intervals | all} • interval (1–96) – Displays
statistics for a selected interval
• current-day – Displays statistics
for current day starting from
12:00 midnight
• previous-day – Displays statistics
for 24 hours before last 12:00
midnight
• all-intervals – Displays statistics
for all existing intervals (up to
96)
• all –Displays all statistics in
succession: current > all intervals
> current day > previous day
Path
---------------------------------------------------------------
CV : 0 UAS : 0
ES : 0 FC : 0
BES : 0
SES : 0
SEFS : 0
Note
For unframed T1 ports, only FC counter is available.
Parameter Description
Parameter Description
ES Number of seconds during which at least one FE or CS was detected or a SEF defect or
an AIS defect was present
UAS Number of seconds for which the T1 path is unavailable. The T1 path becomes
unavailable at the onset of 10 contiguous SESs. The 10 SESs are included in
unavailable time. Once unavailable, the T1 path becomes available at the onset of 10
contiguous seconds with no SESs. The 10 seconds with no SESs are excluded from
unavailable time.
BES Number of seconds during which at least 2 and no more than 319 CRC-4 errors were
detected while neither OOF nor AIS defects were present.
FC Number of T1 path failure events. A failure event begins when a LOF failure or an AIS
failure is declared, and ends when the failure is cleared. A failure event that begins in
one period and ends in another period is counted only in the period in which it begins.
SES Number of seconds during which 805 or more CRC-4 errors were detected or an OOF
defect was present
SEFS Number of seconds during which at least one OOF defect or an AIS defect was present
To clear statistics:
• At the prompt config>slot>port>t1 (<slot/port/tributary>)#, enter
clear-statistics.
Example
To configure internal T1 interface:
• T1 name – t1_1_1_1
• Line type – ESF
• Idle code – 0xFF
• Transmit clock source – Loopback
• Performance monitoring is enabled
• Administratively enabled.
ETX-5# configure port t1 1/1/1
ETX-5>config>port>t1(1/1/1)# name t1_1_1_1
ETX-5>config>port>t1(1/1/1)# line-type esf
ETX-5>config>port>t1(1/1/1)# idle-code 0xFF
ETX-5>config>port>t1(1/1/1)# tx-clock-source loopback
ETX-5>config>port>t1(1/1/1)# pm-enable
ETX-5>config>port>t1(1/1/1)# no shutdown
Configuration Errors
Table 6-17 below lists messages generated by ETX-5 when a configuration error
is detected.
Message Description
Cannot change line type when service is Line type cannot be changed if a pseudowire service has been
defined defined on a port
Cannot change loopback type, disable Loopback type cannot be changed while the loopback is active
the loopback first
Invalid inband loopDown length Invalid length of inband loopback deactivation code
Invalid SES threshold value SES threshold value is out of range (0–900)
Invalid SEFS threshold value SEFS threshold value is out of range (0–900)
Invalid CSS threshold value CSS threshold value is out of range (0–900)
Invalid UAS threshold value UAS threshold value is out of range (0–900)
Invalid LES threshold value LES threshold value is out of range (0–900)
Invalid loopback timeout value Loopback duration value is out of range (0–86400 sec)
Benefits
Dual homing technology enhances network reliability by activating a backup
connection, when a main link fails. This allows traffic re-routing and protection,
using an alternative communication path through the network.
Factory Defaults
By default, no dual homing groups exist. A new group is created with the
following default settings:
tx-down-duration-upon-flip 2 sec
Functional Description
In the 1:1 bidirectional mode, two Ethernet ports are connected to different
switch/routers, as illustrated in Figure 7-1. This topology is referred to as
Ethernet group protection or dual homing.
PE
Tx
Working
Rx
PSN
PE
Protection
ETX-5300
PE
Note Switchover time for 1000BaseT ports, using physical layer indication only, may
exceed 50 ms due to the link failure detection time requirements in the IEEE
802.3 standard.
Protection Groups
ETX-5 supports up to eight Ethernet protection groups with two GbE or 10GbE
member ports per group. An Ethernet port cannot be a member of more than
one dual homing protection groups. A port in LAG or ERP cannot be defined as a
group member. Likewise, a dual homing group member cannot belong to a LAG or
to an ERP.
Following member port combinations are supported:
• Ethernet ports residing on the same type card: E5-MC-4, E5-MC-SFP-P-4 or
E5-GbE-20 or E5-10GbE-2. For example, port residing on the main and I/O
cards cannot be mixed.
• Ethernet ports residing on the same or different main cards
• Ethernet ports residing on the same or different I/O cards.
Valid Combinations
The following ports can be combined into dual homing groups:
• (A) Ports belonging to the different 10-port groups on the same E5-GBE-20
card
• (B) Ports belonging to the same 10-port groups on the different E5-GBE-20
cards
• (C) The same ports on the same E5-10GBE-2 card
• (D) The same ports on different E5-10GBE-2 cards
1
E5-GBE-20
B
LINK
11
1
E5-GBE-20
LINK
11
1
E5-GBE-20
C
1 2
E5-10GBE-2
D
1 2
E5-10GBE-2
1 2
E5-10GBE-2
E
1 2 3 4
E5-MC-4
F
1 2 3 4
E5-MC-4
1 2 3 4
E5-MC-4
Invalid Combinations
The following ports cannot be combined into dual homing groups:
• (A) Ports belonging to the same 10-port group on the same E5-GBE-20 card
• (B) Ports belonging to the different 10-port groups on the different
E5-GBE-20 cards
• (C) Different ports on different E5-10GBE-2 cards.
A
LINK
11
1
E5-GBE-20
B
LINK
11
1
E5-GBE-20
LINK
11
1
E5-GBE-20
C
1 2
E5-10GBE-2
1 2
E5-10GBE-2
Traffic Switching
Dual homing protection technique requires defining one port as “working” and
the other as “protection”. Unlike the LAG, which has the Rx line blocked on the
protection port, the dual homing mechanism requires opening the Rx and Tx lines
on the working port only. The protection port does not receive or transmit traffic.
When the working port fails, the traffic is switched to the protection port. The
switch is performed only if the protection port is enabled and operates properly.
The traffic is flipped back to the working port, when the protection port fails and
working port is restored, and the dual homing operates in the revertive mode. If
the non-revertive mode is enabled, the traffic remains to be sent and received via
the protection port, even when the working port is restored.
Switching Triggers
There are two events that trigger switching traffic between working and
protection ports:
• Ethernet link signal failure
Note Currently, propagation of failure conditions from the OAM (CFM) layer is not
supported.
• Port shutdown
• Card extraction, reset or failure.
Timers
To further improve flexibility of the dual homing mechanism, ETX-5 provides the
following timers:
• Wait-to-restore (WTR). The WTR timer defines a period of time (1–720 sec)
between the port recovery and switching traffic back to the working port.
• Tx down duration. The Tx down duration timer specifies a period of time
(0-30 sec) during which the failed port transmits the Tx down signal upon link
flip. This timer is used together with the force switch and clear commands
(see below) to inform the opposite device about intended traffic switch.
Note Using the force switch or clear command when the Tx down duration timer is
running, may cause loss of traffic for several seconds.
Defining working (active) and bind { working ethernet <slot/port> Using no before bind removes a
protection (standby) links | protection ethernet <slot/port>} link from protection group
Group
-----------------------------------------------------------------------------
Mode : 1:1
Administrative Status : Up
Last Switchover Time : 2013-04-07 21:08:58
Last Switchover Reason : User Initiated
Last Command : Clear
Ports
-----------------------------------------------------------------------------
Working Type Slot Admin Oper Active
-----------------------------------------------------------------------------
Protection Ethernet main-b/3 Up Up --
Working Ethernet main-a/3 Up Up Yes
Ethernet group status screen provides information on:
• Protection mode: 1:1
• Administrative status:
Up – Ethernet group is enabled
Down – Ethernet group is disabled
• Last Switchover Time: Last time the link switchover occurred
• Last Switchover Reason: Reason for last link switchover
None – No switchover has occurred
Port fail (SF) – Switchover occurred due to the Signal Failure condition on
the working port
User initiated – Switchover occurred due to the force command
Port recovers (revertive) – Switchover to the working port occurred
because the working port has been restored (revertive mode only)
• Administrative and operational status of Ethernet group port members.
Example
To define link protection:
• Ethernet group 1
• Working port – Ethernet port 1 on main card A
• Protection port – Ethernet port 1 on main card B.
exit all
configure protection ethernet-group 1
bind eth working ethernet main-a/1 protection ethernet main-b/1
exit all
Configuration Errors
Table 7-1 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Max number of Ethernet protection The maximum number of Ethernet protection groups (8) per
groups has been reached chassis has been reached. Delete a group to add a new one.
Message Description
Cannot delete Ethernet protection group: An Ethernet protection group with ports bound to it cannot be
a port is bound the group deleted
Cannot activate Ethernet protection An Ethernet protection group with less than two ports bound to
group: only one port is bound to the it cannot be activated
group
Manual switch failure: secondary card is Traffic cannot be manually switched to a protection port,
not active because its card has not been activated yet
Cannot modify Ethernet protection An active Ethernet protection group cannot be modified, disable
group: the group is active it first
Invalid card type for Ethernet protection Selected working or protection port resides on an I/O card that
group cannot be used for Ethernet protection
Card type has not been defined yet A port on an Ethernet I/O card that has not been provisioned
yet, cannot be bound to an Ethernet protection group
Invalid port number for the current card Invalid Ethernet port number has been selected
type
This port is already bound to an Ethernet Ethernet port cannot be bound to more than one Ethernet
protection group protection group
Cannot bind LAG member to Ethernet Ethernet ports that serve as LAG members cannot be bound to
protection group an Ethernet protection group
Cannot bind ERP member to Ethernet Ethernet ports that serve as Ethernet ring members cannot be
protection group bound to an Ethernet protection group
Cannot bind protection port: the port An Ethernet port with flows attached to it cannot be bound to
has flows attached to it an Ethernet protection group as a protection port
Cannot delete Ethernet protection group: An Ethernet protection group cannot be deleted if its working
working port has flows attached to it port has flows attached to it
Cannot modify ports bound to Ethernet Ethernet ports bound to an Ethernet protection group that has
protection group that has ever been been activated in the past, cannot be modified. Delete and re-
activated create the group.
Cannot execute force command twice, A force command is currently active, use the clear command to
use clear command first terminate it and try again
Benefits
Ethernet link aggregation ensures increased service availability. If a link within a
LAG fails or is replaced, the traffic is not disrupted and communication is
maintained.
Factory Defaults
By default, no LAG groups exist.
Functional Description
The two Ethernet ports can be operated as a single logical interface, using link
aggregation in accordance with IEEE 802.3-2005. The two ports must be
connected to the same switch/router. LAG uses 1:1 distribution mechanism. ETX-
5 supports up to 44 LAGs per chassis.
Using link aggregation inherently provides redundancy; if one of the GbE ports
fails, the other can continue transferring traffic. Link failure is detected by
sensing the loss of valid signals, or receiving a failure report via Link Aggregation
Control Protocol (LACP) if applicable, in which case all traffic is sent through the
other link.
ETX-5 supports LAG for up to two members, consisting of Ethernet ports located
on the same or different cards.
Note Switchover time for 1000BaseT ports, using physical layer indication only, may
exceed 50 ms due to the link failure detection time requirements in the IEEE
802.3 standard. To achieve a sub-50 ms switchover, use LACP for signal failure
indication.
Intra-Card LAG
With intra-card LAG, the two aggregation group members reside on the same
E5-MC-4, E5-MC-SFP-P-4, E5-10GBE-2 or E5-GBE-20 card. For E5-GBE-20 card,
the LAG ports must belong to the different 10-port groups (ports 1–10 or ports
11–20). In this case, and in the case of the E5-10GBE-2 cards, the LACP is
permanently enabled. The LACP uses the STBY option to force the opposite party
to receive and transmit on the same port.
For the E5-MC-4 and E5-MC-SFP-P-4 cards, LACP can be enabled or disabled by
the user. In this mode, both ports receive traffic at the same time, but only one
of them transmits data.
LAG
Rx
Tx
Main or I/O Card
Tx
Rx
Inter-Card LAG
With inter-card LAG, the two aggregation group members reside on different
E5-MC-4, E5-MC-SFP-P-4, E5-GBE-20 or E5-10GBE-2 card. However, the ports
must belong to:
• The same card type (LAG between ports residing on I/O and main cards is not
allowed)
• The same 10-port group on E5-GBE-20 cards:
Permitted – port 2/1 (port 1 on E5-GBE-20 card in slot 2) and port 3/3
(port 3 on E5-GBE-20 card in slot 3)
Not permitted – Port 2/1 and port 3/12.
• The same port on E5-10GBE-2 cards:
Permitted – port 1/1 (port 1 on E5-10GBE-2 card in slot 1) and port 3/1
(port 1 on E5-10GBE-2 card in slot 3)
Not permitted – Port 2/1 and port 3/2.
In this LAG scheme, data flow redundancy can be provided at a card and port
levels.
LAG
Rx
Main or I/O Card
Tx
Tx
Main or I/O Card
Rx
When an inter-card LAG is active, only one port receives and transmits traffic. The
second LAG member is forced by LACP to be out-of-sync. In this type of link
aggregation LACP is always enabled.
Load-Balancing LAG
In addition to protection mode, ETX-5 LAGs can be configured to operate as a
load-balancing group. In this mode, traffic load is distributed among different
ports assigned as members of a LAG, according to user-configured distribution
method. When LACP is enabled for a load-balancing LAG, the STBY LACP option is
not in use.
Port Combinations
Below are the port combinations allowed for load-balancing link aggregation
groups:
• E5-GBE-20 card: the ports must belong to the same 10-port group (ports 1–
10 or ports 11–20) on the same card
• E5-10GBE-2:
Same card
Different cards
Mix of the above (some LAG ports may reside on the same card and some
– on a different one)
• E5-MC-4 and E5-MC-SFP-P-4: the ports must belong to the same card.
Scale
ETX-5 supports up to 44 LAGs of any type (protection or load-balancing).
However, the following limitations apply to the different port types:
• GbE ports on E5-GBE-20 cards – up to 40 load-balancing LAGs
• 10GbE ports on E5-MC-4, E5-MC-SFP-P-4 and E5-10GBE-2 cards – up to 8
load-balancing LAGs.
Traffic Distribution
TLAG traffic distributed across LAG members according to the following criteria:
• MAC SA
• MAC DA
• MAC SA + MAC DA
• IP SA (default)
• IP DA
• IP SA + IP DA
• MAC SA + MAC DA + IP SA + IP DA.
All load-balancing LAGs on the same E5-GBE-20 card must use the same
distribution method.
All load-balancing LAGs with 10GbE ports (E5-10GBE-2, E5-MC-4 and E5-MC-SFP-
P-4 cards) must use the same distribution method.
Note An active link is a link a physical layer status OK and synchronized LACP (if LACP is
enabled for the LAG).
Traffic Management
This section details traffic management conventions for load-balancing LAG
traffic.
GbE Ports
For load-balancing LAG on GbE ports, traffic distribution and load balancing are
performed after queuing.
SP 1
SP 2
SP 3
SP4
WFQ 1
WFQ 2
WFQ 1
WFQ 3
WFQ 2
WFQ 4
WFQ 3 GbE Port
WFQ 4
SP 1 WFQ 5
LAG Traffic
SP 2 WFQ 6
Distribution
SP 3 WFQ 7
SP4 WFQ 8
Note When ETX-5 performs L3 forwarding, the source MAC distribution method uses
the ingress port frame MAC address (MAC of the ingress router interface). This
means that SA MAC traffic distribution is not available (single MAC).
10GbE Ports
For load-balancing LAG on 10GbE ports, traffic distribution and load balancing are
performed before queuing.
SP 1
SP 2
SP 3
SP4
WFQ 1
WFQ 2 10GbE Port
WFQ 3
WFQ 4
LAG Traffic SP 1
Distribution SP 2
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3 10GbE Port
Shapers
WFQ 4
Level-0 SEs
Note When ETX-5 performs L3 forwarding, the destination MAC distribution method
uses the egress port frame MAC address (MAC of the egress router interface).
This means that DA MAC traffic distribution is not available (single MAC).
Load-balancing LAG for 10GbE ports (main or I/O cards) uses a single queue block
per member port. Each queue block has eight queues.
Only the first queue block in a queue group (0/1) can be used as a port queue
block. This means that all flows with egress port at load-balancing LAG must have
destination queue block 0/1 only.
Policing
For load-balancing LAGs over 10GbE ports on I/O cards, port policers are
supported at port level, and not at the LAG level.
When a policer is applied to a flow, using an I/O 10GbE load-balancing LAG as an
ingress port, the policer is applied to each of the 10GbE port members of the
LAG. The user must adjust the policer rate, according to the number of ports and
Rx distribution requirements.
Load-Balancing LAG
1/1
1/2
E5-10GBE-2 Card
A. User Configuration
Load-Balancing LAG
B. Actual Configuration
Shaping
Aggregate egress for load-balancing LAG can be shaped at the LAG level to the
maximum rate of 10 Gbps, using a level-1 shaper.
Configuring a LAG
This section explains how to define a link aggregation group (LAG) and enable link
aggregation control protocol (LACP). ETX-5 supports up to 44 LAGs.
LAG is defined with two Ethernet ports bound to the group. LAG serves as a
logical port with all relevant port attributes (queue block profile, classification
key, L2CP profile, etc). Service flows to and from the LAG, use the LAG as their
ingress/egress port.
LACP Traffic
To ensure correct distribution of LACP traffic among the members of the LAG,
you must configure an L2CP profile with peer action at the port or flow level. (See
Layer 2 Control Protocol in chapter 8.3) The peer must be directed to the MAC
address (01-80-c2-00-00-02).
When configuring the L2CP profile at the flow level, the flow must have the
following attributes:
• Untagged classification
• Ingress port – LAG
• Egress port – according to application requirements.
If you use the flow only to peer the LACP frames and do not need to forward the
untagged traffic, discard it, using the drop command on the flow.
Figure 7-9 illustrates flows in inter-card LAG between two main cards. LACP flow
can be optionally dropped.
Flow 1*
Port
A/X (LACP)
Flow 2 Any
LAG (Data) Port
Port Flow 3
B/X (Data)
LAG/SAP Connection
When configuring LAG between ports on the E5-GBE-20 or E5-10GBE-2 cards,
follow these guidelines for establishing flows between the LAG and the SAP:
• Intra-card LAG: Connect LAG to a SAP, belonging to the first 10-port group
(SAP slot/1/x)
Data
Flow
Data
Flow
Figure 7-11. LAG-SAP Connection in Inter-Card LAG over Ports 1–10 in E5-GBE-20 Cards
Data
Flow
Figure 7-12. LAG-SAP Connection in Inter-Card LAG over Ports 11–20 in E5-GBE-20 Cards
Data
Flow
Figure 7-13. LAG-SAP Connection in Inter-Card LAG over Ports 1 and 1 in E5-10GBE-2 Cards
Data
Flow
Figure 7-14. LAG-SAP Connection in Inter-Card LAG over Ports 2 and 2 in E5-10GBE-2 Cards
Note • The same rules apply to flows carrying LACP traffic from LAG to SAP.
• Always leave the mirror SAPs located on the second I/O card unused (i.e. have
no flows attached to them). These SAPs serve as internal peers for SAPs which
are used by the LACP and data flows.
Point-to-Point Flows
ETX-5 does not support point-to-point flows between ports that belong to the
same 10-port group. In the same manner, point-to-point flows from a LAG to a
port which is in the same 10-port group as one of the LAG members is not
allowed. For example:
• Permitted: Flow from the LAG on port 1/2 and port 3/2 to port 1/15.
Flow 5
(Data)
• Not permitted: Flow from the LAG on port 1/2 and port 3/2 to port 1/3.
Flow 5
(Data)
Assigning an admin key to the admin-key { fast-ethernet | You must define admin key before
LAG to indicate the port speed giga-ethernet | ten-giga-ethernet } binding ports to the LAG. If the
admin-key setting does not match
the port type, LAG configuration will
fail.
For copper ports, autonegotiation
must be either disabled or
configured to a value (rate or
capability) matching the admin-key
setting.
Adding a port to the LAG bind etherent <slot/port > no bind removes a link from the LAG
Selecting classification key classification-key [ {vlan }] [{ inner- See the Classification section in
vlan }] [ { p-bit }] [ { ip-precedence
Chapter 8 for description of
}] [ { ip-dscp }]
classification keys available for
directly- and indirectly-attached
ports
Defining sharing method for LAG distribution-method [src-mac | src-mac – Distribution according to
traffic load dest-mac | src-and-dest-mac |src-ip source MAC address. When ETX-5
| dest-ip | src-dest-mac-ip} performs L3 forwarding (routing),
this method cannot be used for
load-balancing GbE LAG.
dest-mac –Distribution according to
destination MAC address. When ETX-
5 performs L3 forwarding (routing),
this method cannot be used for
load-balancing 10GbE LAG.
src-and-dest-mac – Distribution
according to source and destination
MAC addresses
src-ip – Distribution according to
source IP address
dest-ip – Distribution according to
destination IP address
src-dest-mac-ip – Distribution
according source and destination
MAC and IP addresses
Assigning L2CP profile l2cp profile <l2cp profile name> no l2cp profile removes L2CP profile
association source and destination
MAC and IP addresses
Enabling LACP and setting LACP lacp [tx-activity {active | passive}] tx-activity:
parameters: operation mode [tx-speed {slow | fast}] • active – LAG interface periodically
(active or passive) and time to [sys-priority <sys-priority>] transmits LACP frames (LACPDUs)
wait before sending LACP frames to all links with LACP enabled
(long or short)
• passive – LAG interface does not
initiate the LACP exchange, but
replies to received LACPDUs.
tx-speed:
• slow – Three seconds
• fast_– 90 seconds.
• no lacp disables LACP protocol.
It is recommended to set the
tx-activity as follows:
• ETX-5 – active
• Opposite device – passive.
Defining LAG operation mode mode { redundancy | load-balance} redundancy – Link redundancy LAG
load-balance – Load-balancing LAG
Assigning a queue group profile queue-group profile <profile name> See the Quality of Service (QoS)
section in Chapter 8 for description
of queue groups and their elements.
no queue-group removes queue
group association
Associating a policer profile with policer-profile <policer-profile- Policer profiles can be bound,
the LAG name> unbound or replaced with another
no policer-profile profile on-the-fly.
Policer profile with traffic type “all”
cannot be bound to a LAG.
Policer profile with traffic type
“unknown-unicast” cannot be bound
to a LAG consisting of Ethernet ports
on I/O cards.
no policer-profile removes
association with policer profile.
Selecting Ethertype for LAG tag-ethernet-type <value> See the Ethertype section in
Chapter 8 for description of
Ethertype values available for
directly- and indirectly-attached
ports.
no tag-ethernet-type removes
Ethertype association
Lower Layer
-----------------------------------------------------------------------------
Ethernet 6/3
Ethernet 6/4
=============================================================================
Links
Port Admin Oper LACP Protection
main-a/1 up up sync active
main-a/2 up up out-of-sync active
The LAG status screen provides information on the current state of the
aggregation group and individual group members.
Ports
-----------------------------------------------------------------------------
Actor Partner
Port Number : 45 167
Port Priority : 1000 1000
System ID : 00-00-01-02-02-03 00-00-09-08-07-44
System Priority : 7 8000
Operational Key : 1 1
Activity : active passive
Timeout : short long
Synchronized : yes yes
Collecting : yes yes
Distributing : yes yes
The LACP status screen provides information on current state of the local
(actor) and remote (partner) interfaces in an LACP exchange.
Counter Description
Activity Actor or partner's port activity. Passive indicates the port's preference
for not transmitting LAC PDUs unless its partner's control value is Active.
Active indicates the port's preference to participate in the protocol
regardless of the partner's control value.
Synchronized If the value is Yes, the link is considered synchronized. It has been
allocated to the correct link aggregation group, the group has been
associated with a compatible aggregator, and the identity of the link
aggregation group is consistent with the system ID and operational key
information transmitted. If the value is No, the link is not synchronized.
It is currently not in the right aggregation.
Counter Description
Running
-----------------------------------------------------------------------------
Counter Rx Tx
Total Frames 0 0
Total Octets 0 0
Total Frames/Sec 0 0
Total Bits/Sec 0 0
Minimum Bits/Sec 0 0
Maximum Bits/Sec 0 0
Unicast Frames 0 0
Multicast Frames 0 0
Broadcast Frames 0 0
FCS Errors 0 --
Error Frames 0 --
L2CP Discarded 0 --
CFM Discarded 0 --
ACL Discarded 0 --
MAC Overflow 0 --
Unknown Protocol Discarded 0 --
Undersize Frames 0 --
Jabber Errors 0 --
Discard Frames -- 0
Oversize Frames 0 0
64 Octets 0 0
65-127 Octets 0 0
128-255 Octets 0 0
256-511 Octets 0 0
512-1023 Octets 0 0
1024-1518 Octets 0 0
1519-2047 Octets 0 0
1519-Max Octets 0
2048-Max Octets 0 0
Rate of Total
-----------------------------------------------------------------------------
Port Rx Total Frames Tx Total Frames
(%) (%)
-----------------------------------------------------------------------------
Ethernet main-a/1 0 0
Ethernet main-a/2 0 0
Description
Parameter
Rx Tx
Total Frames Total number of received packets, Total number of transmitted packets
including packets with bad CRC,
and excluding short packets and
packets dropped due to Rx MAC
overflow
Total Octets Total number of received octets, Total number of transmitted octets
including FCS and bad packet
octets, and excluding framing bits
Unicast Frames Total number of received good Total number of transmitted good unicast packets
unicast packets, excluding packets
with bad CRC and short packets
Multicast Total number of received multicast Total number of transmitted good multicast
Frames packets, excluding packets with packets
bad CRC and short packets
Description
Parameter
Rx Tx
Oversize Frames Total number of received packets Total number of transmitted packets that exceeded
that exceeded the maximum the maximum allowed packet size
allowed packet size
64 Octets Total number of received packets Total number of transmitted packets (including bad
(including bad packets) that were packets) that were 64 octets in length, excluding
64 octets in length, excluding framing bits and including FCS octets
framing bits and including FCS
octets
65–127 Octets Total number of received packets Total number of transmitted packets (including bad
(including bad packets) that were packets) that were 65–127 octets in length,
65–127 octets in length, excluding excluding framing bits and including FCS octets
framing bits and including FCS
octets
128–255 Octets Total number of received packets Total number of transmitted packets (including bad
(including bad packets) that were packets) that were 128–255 octets in length,
128–255 octets in length, excluding framing bits and including FCS octets
excluding framing bits and
including FCS octets
256–511 Octets Total number of received packets Total number of transmitted packets (including bad
(including bad packets) that were packets) that were 256–511 octets in length,
256–511 octets in length, excluding framing bits and including FCS octets
excluding framing bits and
including FCS octets
512–1023 Total number of received packets Total number of transmitted packets (including bad
Octets (including bad packets) that were packets) that were 512–1023 octets in length,
512–1023 octets in length, excluding framing bits and including FCS octets
excluding framing bits and
including FCS octets
Description
Parameter
Rx Tx
1024–1518 Total number of received packets Total number of transmitted packets (including bad
Octets (including bad packets) that were packets) that were 1024–1518 octets in length,
1024–1518 octets in length, excluding framing bits and including FCS octets
excluding framing bits and
including FCS octets
1519-2047 Total number of received packets Total number of transmitted packets (including bad
Octets (including bad packets) that were packets) that were 1519–2047 octets in length,
1519–2047 octets in length, excluding framing bits and including FCS octets
excluding framing bits and
including FCS octets
2048-Max Total number of received packets Total number of transmitted packets (including bad
Octets (including bad packets) that were packets) that were 2048 to maximum allowed size
2048 to maximum allowed size octets in length, excluding framing bits and
octets in length, excluding framing including FCS octets
bits and including FCS octets
Rate of Total Percentage of frames received by Percentage of frames transmitted by the LAG
the LAG member from total member from total frames transmitted by all
frames received by all bonded bonded members
members
Examples
Examples below illustrate how to configure different types of link aggregation
groups.
Port
A/2
Flow 1 Port
LAG (Data) A/3
Port Flow 2
B/4 (Data)
#***************************Configuring_L2CP_Profile*************************
config port l2cp l2cp1
mac 01-80-c2-00-00-02 peer
exit all
#***************************Assigning_L2CP_Profile_on_LAG_Ports**************
config port ethernet main-a/2 l2cp profile l2cp1
config port ethernet main-b/3 l2cp profile l2cp1
#*****************************Enabling_Ethernet_Ports************************
config port ethernet main-a/2
pm-enable
no shutdown
exit all
#*****************************Configuring_LAG********************************
config port lag 1
admin-key ten-giga-ethernet
bind ethernet main-a/2
bind ethernet main-b/4
queue-group profile q_group_2_level_default
lacp tx-activity active tx-speed slow
no shutdown
exit all
#***************************Assigning_Queue_Group_Profile********************
config port ethernet main-a/3 queue-group profile q_group_2_level_default
#***************************Configuring_Classifier_Profiles******************
#***************************Configuring_Flows********************************
Note The I/O card ports combined in LAG must belong to the same 10-port group. See
Inter-Card LAG above.
To peer LACP frames, configure a dedicated flow with untagged classifier from
the LAG. This flow must have an L2CP profile attached to it. The L2CP profile must
have a peer action for the LACP address. As the only purpose of this flow is to
peer LACP traffic, you can discard its traffic by using a drop action on the flow.
Follow the LAG/SAP Connection guidelines described above when directing flows
from the LAG to the relevant SAPs. Keep in mind that the mirror SAP 3/1/1 and
SAP 3/1/2 located on I/O card in slot 3 must be left unused (i.e. have no flows
attached to them). These SAPs serve as internal peers for SAP 1/1/1 and SAP
1/1/2, which are used by the LACP and data flows.
Data-carrying flows use the LAG as their ingress or egress ports.
Flow 5
(Data)
SAP
3/1/1
Leave
Unused
SAP
3/1/2
#*****************************Enabling_Ethernet_Ports************************
config port ethernet 1/13
no shutdown
exit all
#*****************************Configuring_LAG********************************
config port lag 1
admin-key giga-ethernet
bind ethernet 1/2
bind ethernet 3/2
queue-group profile q_group_2_level_default
lacp tx-activity active tx-speed slow
no shutdown
exit all
#*********************************End****************************************
#***************************Assigning_Queue_Group_Profiles*******************
config port ethernet 1/2 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
config port ethernet 3/2 queue-group profile q_group_2_level_default
config port sag 3/1 queue-group profile q_group_SAG_2_level_default
config port ethernet main-a/3 queue-group profile q_group_2_level_default
config port ethernet 1/13 queue-group profile q_group_2_level_default
config port sag 1/2 queue-group profile q_group_SAG_2_level_default
#*********************************End****************************************
#***************************Configuring_Classifier_Profiles******************
config flows classifier-profile classutg match-any
match untagged
exit all
#***************************Configuring_L2CP_Profile*************************
config port l2cp l2cp1
mac 01-80-c2-00-00-02 peer
exit all
#*********************************End****************************************
#***************************Configuring_Flows********************************
config flows flow 1
classifier classutg
ingress-port lag 1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
Configuration Errors
Table 7-5 lists messages generated by ETX-5 when a configuration error is
detected.
Bind failed: Ports in LAG You attempted to configure a LAG member for Bind the LAG to ports on
must reside on same card ports on two different card types. the same card type.
type
Bind failed: Services are You attempted to bind an Ethernet port that has Remove the flows that are
configured on port flows assigned to it. assigned to the port before
binding it to the LAG.
Error : Exceeded You have exceeded the maximum number of Lags Remove LAGs so that there
maximum number of that is supported per chassis. are no more than 44 LAGs
LAGs per chassis.
Error : Given port is not a You attempted to remove an Ethernet port that You may only remove
LAG member was not a member of the LAG. Ethernet ports from a LAG
if they are bound to it.
Error : Invalid LAG ID You configured a LAG with an ID that is beyond Configure the LAG ID within
the range of 1–44. the range of1–44.
Error : Invalid port The port you have attempted to bind to the LAG Bind a port with the same
Bandwidth does not have the same bandwidth capacity as bandwidth capacity as the
the LAG. LAG or change the admin-
key of the LAG according to
the required bandwidth
capacity.
Error : Invalid port You attempted to bind a port that has an invalid Bind a port with a valid
number (nonexistent) number to the LAG. (existing) number to the
LAG.
Error : LAG is enabled You attempted to delete or modify an active LAG. Shut down all flows and the
LAG and then change the
required parameters in the
LAG.
Error : LAG members The same Ethernet port has been bound twice to Bind a different Ethernet
duplicated a LAG. port to the LAG.
Error : Membership is not You did not bind any ports to the LAG. Bind a port to the LAG
specified before activating it.
Error : Number Of Ports You attempted to bind more than the supported Bind only two ports to the
Exceeds Maximum number of ports to the LAG. The maximum LAG protection or up to
number that is supported is two for LAG four to the LAG load
protection and four for LAG load balancing. balancing.
Error : Port already used You attempted to select a port that has already Use a port that is not being
in another LAG been used in another LAG. used in another LAG.
LAG removal failed: used You attempted to remove a LAG that is currently Remove this LAG from the
by destination port being used by a destination port mirroring mirroring session before
mirroring port session. removing the LAG.
LAG removal failed: used You attempted to remove a LAG that is currently Remove this LAG from the
by source port mirroring being used by a source port mirroring session. mirroring session before
session removing the LAG.
No shutdown failed: L2CP You did not attach an LACP profile to the Attach LACP profile to the
profile must be aggregation group. aggregation group.
configured when LACP is
enabled
No shutdown failed: L2CP You did not configure an L2CP profile that To enable LACP for the LAG,
profile must define a peer specifies peer action for MAC 0x02. This L2CP configure an L2CP profile
action for LACPDUs. profile must be bound either directly to the LAG that specifies peer action
port members or to an untagged flow whose for MAC 0x02.
ingress port is the LAG..
No shutdown failed: LACP You did not enable the link aggregation protocol Enable LACP before
must be enabled when (LACP). Therefore, inter-card LAG cannot be activating inter-card LAG.
LAG is between 2 cards activated.
No shutdown failed: LAG You attempted to activate more than two LAG Bind only two LAG members
must have exactly 2 members. The maximum number of LAG members to LAG protection.
members that is supported in LAG protection is two.
Port cannot be bound, You attempted to bind a port that is already Only bind ports that are not
since it is already used by being used by a destination mirroring port. being used by a destination
destination mirroring port port mirroring session.
Port cannot be bound, You attempted to bind a port that is already Only bind ports that are not
since it is already used by being used by a source mirroring port. being used by a source port
source mirroring port mirroring session.
Standards
ITU-T G.8032v2, Y.1731.
Benefits
G.8032 revertive rings provide sub-50 ms protection for Ethernet traffic and
prevent loops at the Ethernet layer.
Factory Defaults
No Ethernet protection rings are configured in the system by default.
Functional Description
Ethernet Ring Protection technology provides a scalable solution for low-cost
traffic protection and rapid service restoration, with SDH/SONET-type resilience.
It is built on traditional Ethernet MAC (IEEE 802.3) and bridging (IEEE 802.1)
functions. It is independent of any physical-layer technologies and can be utilized
in any carrier network.
In ERP every ring node uses heartbeat messaging to determine availability of its
neighbor. When a link failure occurs, it is detected via LOS or heartbeat R-APS
messaging. Upon failure, node forwarding information is recalculated to ensure
that data traffic reaches its destination, using an alternative path.
Ring ports can reside on Ethernet ports belonging to the same main or I/O card,
providing port redundancy. In addition, they can reside on ports belonging to
different cards, providing port and card redundancy. In total, ETX-5 supports up
to 63 major rings and sub-rings.
Ring Topology
ETX-5 supports ITU-T G8032 ring topologies, for example:
Single Ring
• R-APS virtual channel enable – The R-APS virtual channel is the R-APS channel
connection between two interconnection nodes of a sub-ring over a network
or other ring.
• Multi-ring/ladder network
• Revertive/ Non-revertive mode, after the condition that caused the switch
has been cleared
• Administrative commands: Forced Switch (FS), Manual Switch (MS) for
blocking a particular ring port
• Flush FDB (Filtering database) Logic, which significantly reduces amount of
flush FDB operations in the ring
• Support of multiple ERP instances on a single ring
In a stable state the rings have one RPL owner that prevent the traffic from
looping in the network. When a non-shared link fails in the network, the RPL
owner that controls the ERPS instance containing that link unblocks the RPL port
while the distant RPL port, which is not a part of this instance, remains blocked.
Follow these guidelines, when configuring major and sub-rings:
• The sub-ring number (index) must be lower than the number of the major
ring it is assigned to.
• R-APS VLAN and all data VLANs used by the sub-ring must be added as “Data
VLANs” to all major rings (including the interconnection nodes).
• .
The following example illustrates the correct VLAN distribution for major and sub-
rings.
Major Ring
A B
Ring 10
Ring 2
G
Sub-Ring
Multiple Ethernet rings, allow the creation of many ring instances over the same
physical infrastructure. Multiple rings provide better bandwidth utilization in the
“Idle” ring states. In addition, they can be used to improve deployment flexibility
by creating multiple sub-rings.
A/3
A/1 B/2
B1
Site 2
A/1 A/1
Site 1 Site 3
Site 5
A/1 B/2
B1 B2
A/3
Site 4 Site 6
A/3 A/3
A/3
A/1 B/2
B1
Site 2
A/1 A/1
Site 1 Site 3
R-APS Messaging
Ethernet ring protection is achieved by means of a dedicated protocol,
Automated Protection Switching (APS). Every ring link is bound by two adjacent
nodes. At any time, traffic flows on all, but one of the ring links. This link is called
the ring protection link (RPL). Under normal conditions this link is blocked. RPL is
controlled by a single node called an RPL owner, which prevents traffic from using
the RPL. When a failure is detected, the RPL owner unblocks the RPL port,
allowing the RPL to be used for traffic.
R-APS messages require a designated transmission channel (R-APS channel),
which is separated from the service traffic channel. An R-APS channel is
configured using a separate dedicated VLAN to enable handling of the R-APS
messages differently from the service traffic. An R-APS channel and service traffic
blocking is performed via VID filtering by the bridge.
Mechanism of Operation
Every failure along the ring triggers an R-APS Signal Fail (SF) message in both
directions from the nodes adjacent to the failed link. Before sending the R-APS,
these nodes block the ports facing the failed link. On receiving these messages,
the RPL owner unblocks the RPL port. An SF message is triggered even if only one
node adjacent to the failed link recognizes the failure. Moreover, to overcome
scenarios in which link failures are not recognized via LOS (Loss of signal), ERPS
can also use the standard Ethernet OAM 802.1ag Continuity Check Messages
(CCMs) to expose the failure to the two adjacent nodes.
During a recovery phase, when a failed link is restored and a node continually
detects a Clear SF, it sends an R-APS No Request (NR) message and keeps the
failed port blocked. When receiving the R-APS (NR), the RPL owner starts its
Wait-To-Restore (WTR) timer. When that timer expires, it blocks the RPL port and
sends RAPS (NR, RB) (R-APS no request, RPL block blocked) messages in both
directions of the ring. Nodes receiving the R-APS (NR, RB) message flush their
learning table, unblock their blocked ports, and return to idle state.
Figure 7-25 illustrates a stable-state Ethernet ring with blocked RPL to prevent a
loop. Each node is monitored, using Ethernet CCM OAM messages, and the ring
protection is triggered by loss of continuity or server layer failure, as defined in
Y.1731.
Timers
The following timers are used to facilitate ERP operation:
• Wait-to-Restore (WTR) – Period of time used by RPL owner to verify that the
ring has stabilized before blocking the RPL after signal recovery (1 to 12
mins.)
• Guard – Period of time during which all received A-RPS messages are ignored
by the ERP mechanism. This prevents the ring nodes from receiving outdated
A-RPS messages circulating the network (0 to 2000 mSec.).
• Hold-off – Period of time during which the underlying Ethernet layer attempts
to filter out intermittent link faults before reporting them to the ERP
mechanism (0 to 1000 mSec.)..
Administrative Commands
If there is a need to intervene into ERP operation for maintenance or any other
reason, the operator can issue a forced or manual switch command.
• Forced switch command forcefully blocks a particular ring port. It can be
issued even if an SF condition exists on the ring, with multiple force switch
commands supported per ring instance.
• Manual switch command manually blocks a particular ring port with only one
manual switch command per ring instance. It can be overridden by SF
condition or a force switch command.
• Clear switch command clears all existing force and manual switch command
on the ERP.
Note The manual and forced switch commands are temporary commands and do not
permanently change the location of the RPL.
ETX-5
HQ
ETX-5
Up to ETX-5
Ring
ETX-5
Configuring ERP
To configure ERP:
1. In the configure>protection# prompt, enter erp followed by ring number (1–
63) and ring type (major or sub).
An ERP instance with is created and the config>protection>erp(1)#
prompt is displayed.
2. Configure the ERP as illustrated and explained below.
Defining bridge port as an East east-port <bridge_port_number> Port type cannot be changed
port of ERP node after ring creation.
Sub-rings have East ports only.
Defining bridge port as a West west-port <bridge_port_number> Port type cannot be changed
port of ERP node after ring creation.
Sub-rings do not have West
ports
Defining node port type in port-type owner {east | west} owner – RPL owner
relation to RPL owner port-type neighbor {east | west} neighbor – port directly
port-type next-neighbor {east | west} connected to RPL owner
Configuring dedicated VLAN for r-aps [vlan <1–4094>] [vlan-priority R-APS settings must be the same
R-APS messages <0–7>] [mel <0–7>] for all ring members
Configuring the revertive mode revertive This mode is relevant to the RPL
no revertive owner node.
In the revertive mode, after
condition, causing the switch, is
cleared, traffic is blocked at the
RPL owner and restored to the
working state.
After the node has entered the
pending state in non-revertive
mode, use the Clear command to
exit the state.
no revertive enables
non-revertive mode.
Enabling propagation of Signal sf-trigger {east | west} mep <md-id> Before enabling SF propagation,
Failure (SF) condition from the <ma-id> <mep-id> verify that relevant CFM
Ethernet OAM service layer no sf-trigger {east | west} parameters have been
configured.
MEPs used for SF propagation
cannot reside on R-APS VLAN;
they must be bound to data
VLANs only.
Connecting previously defined sub-ring <ring_number> This option available for major
sub-ring to a major ring no sub-ring rings only. The sub-ring number
must be lower than the number
of the major ring it is assigned
to. For example, sub-ring 2 can
be connected to major ring 10,
but sub-ring 15 cannot be
connected to major ring 8.
Defining guard and hold-off timers [guard <10–2000>] [holdoff Guard timer is used by the ERP
periods in msec <0–10000] mechanism to prevent ring
nodes from receive outdated R-
APS messages. While the guard
timer is active, all received R-APS
messages are ignored by the
node. The guard timer is
configured in 10-ms steps. Its
recommended value for all ring
nodes is 2 sec.
Hold-off timer is used by
Ethernet layer to filter out
intermittent faults. Faults are
reported to the ERP mechanism
only after the hold-off timer
expires. The guard timer is
configured in 100-ms steps.
Blocking the East or West port of manual-switch {east-port | west-port } The manual switch command can
a ring node be applied to a single ring node
only. When the command is
active, all ring nodes shift to the
manual switch mode.
Blocking the East or West port of forced-switch {east-port | west-port } The forced switch can be applied
a ring node to any number of nodes in the
ring.
The following marking actions can be performed in the sub-ring level, at the
config>protection>erp(erp_number)>sub-ring(sub-ring_number)# prompt.
Port State
-----------------------------------------------------------------------------
East Port Status : Forward Signal Fail : No Error
West Port Status : Block R-APS and Data Signal Fail : No Error
Data Vlan
-----------------------------------------------------------------------------
1000..1255,
Figure 7-27. ERP Status, Idle State
Port State
-----------------------------------------------------------------------------
East Port Status : Forward Signal Fail : No Error
West Port Status : Block R-APS and Data Signal Fail : Server Layer
Data Vlan
-----------------------------------------------------------------------------
1000..1255,
Figure 7-28. ERP Status, Protection State
Port State
-----------------------------------------------------------------------------
East Port Status : Block R-APS and Data Signal Fail : No Error
West Port Status : Forward Signal Fail : No Error
Data Vlan
-----------------------------------------------------------------------------
100
West Port
----------------------------------------------
R-APS Message Rx Frames Tx Frames
SF 0 0
NR 0 0
NR,RB 0 0
Total Valid 0 0
Total Errors 0 0
Counter Description
R-APS SF Message Tx/Rx Total number of R-APS Signal Fail (SF) messages received or transmitted
by East/West port.
Received R-APS Signal Fail message indicates a failed port in the ring.
Transmitted R-APS Signal Fail message indicates a failed port in the
node.
Counter Description
R-APS NR Message Tx/Rx Total number of R-APS No Request (NR) messages received or
transmitted by East/West port.
Received R-APS No Request message indicates absence of failed ports in
the ring.
Transmitted R-APS No Request message indicates that the node fixed its
failed port.
R-APS NR, RB Tx/Rx Total number of R-APS No Request (NR), RPL Blocked (RB) messages
received or transmitted by East/West port.
Received R-APS No Request, RPL Blocked message indicates that RPL
port is blocked and all other not-failed blocked ports are unblocked in
the ring.
Transmitted from the RPL No Request, RPL Blocked message indicates
that RPL port is blocked.
Total Valid Rx/Tx Total number of valid R-APS messages received or transmitted by
East/West port.
R-APS messages, generated by Force switch or Manual switch, increment
the Total Valid Rx/Tx counter, but are not displayed separately.
Total Errors Rx/Tx Total number of errored R-APS messages received or transmitted by
East/West port
Example
Figure 7-30 and script below illustrate configuration a G.8032v2 ring over main
card ports.
Ethernet
Ring
Fl. 34
Flow 1 SAP
VLAN
Flow 2 Fl. 35 1500
Port 1 VLAN Port 1
Flow 15 1500
Flow 16
East VLAN
SVI 1 SVI 3
Main Ethernet Flow 30 1500 I/O Ethernet
Card A BP 1 BP 3 Card 1
Flow 31 Fl. 36
Bridge
BP 2 BP 4
Fl. 10 SAP Fl. 9
West
Fl. 3 Fl. 4 (RPL Owner) VLAN
500 VLAN
SVI 2 SVI 4 900
Fl. 17 Fl. 18
Note VLAN 900 is swapped to VLAN 500 on flow 9. VLAN 500 is swapped to VLAN 900
on flow 11.
#*********************Selecting_Classification_Keys**************************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet main-b/1 classification-key vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
config port ethernet 2/1 classification-key vlan p-bit
exit all
#*********************************End****************************************
#***************************Configuring_SVIs*********************************
config port svi 1 bridge
exit all
#*************************Binding_Bridge_Ports_to_SVIs***********************
config bridge 1 port 1
bind svi 1
no shutdown
exit all
#******************** Configuring_VLAN_Membership****************************
config bridge 1 vlan 500 tagged-egress 4
config bridge 1 vlan 500 maximum-mac-addresses 64
config bridge 1 aging-time 300
exit all
#************************ Configuring_the_Ring*******************************
config protection erp 1 major
bridge 1
east 1
west 2
r-aps vlan 777 vlan-priority 1 mel 1
port-type east node-port
#************************ Configuring_R-APS_Flows****************************
config flows classifier-profile class_R_APS match-any
match vlan 777
exit all
#************************ Configuring_Marking_Profile************************
config qos
marking-profile mark1 classification cos color-aware green-yellow dei-copy
mark 0 green to 0 dei green
exit all
#*********************************End****************************************
#************************ Configuring_Data_Flows****************************
config flows classifier-profile class_900 match-any
match vlan 900
exit all
exit all
#****************************Enabling_Ports**********************************
config port ethernet main-a/1 no shutdown
config port ethernet main-b/1 no shutdown
config port ethernet 1/1 no shutdown
config port ethernet 2/1 no shutdown
exit all
#*********************************End****************************************
Configuration Errors
Table 7-7 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Invalid R-APS VLAN priority Invalid R-APS VLAN priority value is selected
Message Description
Cannot disable the ring with active physical The ring cannot be disabled if it has active physical ports
ports attached to its nodes. First, disable the physical ports.
Invalid SF trigger, OAM service is not defined SF trigger cannot be enabled if no valid OAM service has
been configured
Ring ports are not defined Ring ports are not defined yet
Cannot modify WTR timer for of non-RPL WTR timer can be set only for RPL Owner
Owner
Cannot enable SF propagation for inactive ring Signal failure propagation can be enabled only for an active
ring
Cannot run command on inactive ring Manual or force switch command can be run only on an
active ring
East and West ports must be different Different bridge ports must be defined as East and West
Cannot assign ERP node to bridge instance A ring node must be assigned to a bridge instance before
after configuring East/West ports configuring East/West ports
Cannot modify East/West port before East/West ports can be modified after assigning a ring
assigning ERP node to bridge instance node to a bridge instance
Cannot add data VLAN before assigning ERP Data VLAN must be defined after assigning a ring node to a
node to bridge instance bridge instance
Cannot disable major ring with active sub- A major ring cannot be disabled if it has a sub-ring
rings attached to it
Major ring of the specified sub-ring is not The major ring of the specified sub-ring has not been
active enabled
Major ring of the specified sub-ring does not A sub-ring cannot be configured if a major ring does not
exist exist
Illegal node port type in relation to another Not a valid value for the current node configuration. For
ring member example, if an East port is defined as RPL owner, the West
port can be configured only as a ring node.
Cannot set node port type to ring-node The owner, neighbor or next-neighbor port type of the
node cannot be changed back to the ring-node (default
value). First, delete the ring, then set the port type of the
node.
Cannot modify ring type Ring type (major or minor) cannot be modified
Message Description
Cannot run FS or MS command in backward- Force switch and manual switch commands are not
compatibility mode supported in the backward-compatible mode
FS or MS command is already active Cannot run a force or manual switch command if an active
command instance exist on the ring
Cannot configure R-APS VLAN ID for inactive R-APS VLAN ID can be set only for an active virtual channel
virtual channel
Cannot configure R-APS VLAN priority for R-APS VLAN priority can be set only for an active virtual
inactive virtual channel channel
Cannot modify virtual channel bound to sub- A virtual channel attached to a sub-ring cannot be modified
ring
Cannot modify this parameter, delete and re- This parameter cannot be modified, you must delete and
create the ring re-create the ring
Maximum number of sub-rings per major ring The maximum number of sub-rings (5) per major ring has
exceeded been reached
Sub-ring with specified index does not exist The selected sub-ring does not exist
Major ring node must be configured as One of the major ring nodes must be configured as an
interconnection node interconnection node to accommodate a sub-ring
Sub-ring node must be configured as One of the sub-ring nodes must be configured as an
interconnection node interconnection node
Cannot enable backward-compatibility mode Disable the force switch command to operate the ring in
when FS command is active the backward-compatibility mode
First, remove all sub-rings of the major ring This action requires deleting all sub-rings belonging to the
major ring
This node must be configured as Configure this node as an interconnection node to operate
interconnection node a sub-ring
First, remove all sub-rings bound to the major This action requires deleting all sub-rings belonging to the
ring major ring
This command is available for major ring only This command can be run only on a major ring
Cannot change bridge number for a ring with A ring with configured data VLAN
configured data VLAN
Major ring is assigned to a different bridge The major ring is already assigned to another bridge
instance instance
The sub-ring is already bound to another The sub-ring cannot be attached to the ring, because it is
major ring already bound to another major ring
The port is already in use by another ring The port cannot be attached to the ring because it is in use
by another ring
Cannot activate a ring without configured A ring without a port assigned to the bridge instance
bridge number cannot be activated
Cannot activate a ring without configured A ring without configured East port cannot be activated
East port
Message Description
Cannot activate a ring without configured A ring without configured West port cannot be activated
West port
Cannot activate a ring without configured R- A ring without configured R-APS VLAN cannot be activated
APS VLAN
Cannot activate a ring without configured R- A ring without configured R-APS MEL cannot be activated
APS MEL
Cannot activate a ring without R-APS VLAN A ring without R-APS VLAN ID, configured for the virtual
configured for virtual channel channel, cannot be activated
Cannot activate a ring without R-APS VLAN A ring without R-APS VLAN priority, configured for the
priority configured for virtual channel virtual channel, cannot be activated
Cannot activate a virtual channel without A virtual channel without R-APS VLAN ID and priority,
configured R-APS VLAN ID and priority for configured for the sub-ring, cannot be activated
sub-ring
Standards
IEEE 802.1ag-D8, ITU-T Y.1731
Benefits
Fault propagation ensures that the traffic is sent via links that have not failed. If
a failure occurs, fault propagation can be used to trigger redundancy mechanisms
at user equipment.
Functional Description
The fault propagation mechanism defines whether a fault of a source entity
(Ethernet port, LAG or MEP) triggers a certain action at a destination entity
(Ethernet port, LAG or MEP).
ETX-5 supports up to 128 fault propagation sessions. Table 7-8 lists all possible
combinations of the sources and destinations used during fault propagation.
MEP MEP
Multiple triggers and multiple actions configuration can be supported in one fault
propagation session/command. To prevent a deadlock, an action destination
triggered by a certain action, disables all triggers which use it as a trigger source.
For example, in the configuration shown below, the action MEP 1 AIS (Tx) is not
initiated because port 1 failed as a result of the fault propagation rule (MEP 1 AIS
(Rx)).
• Trigger: MEP 1 AIS (Rx) > Action: Port 1: Fail
• Trigger: Port 1: Fail > Action: MEP 1 AIS (Tx)
Fault propagation Fault propagation
ETH-FAIL to MEP-AIS MEP-AIS to ETH-FAIL
ETH-FAIL
Network
ETX-2
CPE ETX-5 CPE
Network
Trigger Sources
A single GbE/10GbE, LAG or MEP can serve as a fault propagation trigger, with
multiple propagation commands sharing the same source. A trigger source can be
used as an action destination in another fault propagation command/session for
a bidirectional fault propagation functionality.
ETX-5 supports the following triggers:
• Ethernet failure (Ethernet port or LAG).
For LAG, it is declared when a physical layer failure is detected on both LAG
member ports.
• OAM (CFM) LOC detection
• OAM (CFM) RDI detection
• OAM (CFM) AIS detection
• OAM E-LAN failure per MEP, when all RMEPs of the MEP report LOC,.
If a trigger is cleared or deleted, the destination action defined for it is initiated.
In addition, ETX-5 maintains a wait-to-restore timer, which defines a period of
time between clearing a trigger condition and reporting the clearing to the fault
propagation mechanism.
Destination Actions
A single GbE/10GbE, LAG or MEP can serve as a fault propagation destination,
with multiple propagation commands sharing the same action. An action
destination can be used as a trigger source in another fault propagation
command/session for a bidirectional fault propagation functionality.
ETX-5 supports the following destination actions:
• Deactivate interface (Ethernet port or LAG).
For LAG, it causes a physical layer failure for both LAG member ports.
For fiber optic Ethernet port, it shuts down the laser
For copper Ethernet ports, it disables the port PHY
• Sends OAM (CFM) AIS to indicate failure.
Factory Defaults
By default, no fault propagation is configured. When you configure fault
propagation for a particular interface pair, the default configuration is as follows:
• No trigger defined for fault detection
• No action defined to be performed when fault is detected
• Wait-to-restore time = 0.
RMEP Auto-configuration
ETX-5 has the ability to learn RMEP MAC address from CCM sessions. It can show
MEP level configuration parameters and status as follows:
• Show MEP status: MEP status screen indicates all its RMEP CC monitoring
status and MEP info.
RMEP Oper status can be: O.K, Fail or RDI
MEP status includes RMEP MAC address.
• Initiate LBM:
Unicast: By specifying
Remote MAC address and number of LBM packets to send (range 1-
50 and time interval between consecutive LBM’s Tx is 1 second)
RMEP ID and number of LBM packets to send (only if RMEP learnt by
CCM, otherwise shall not be initiated)
• Initiate LTM (Link Trace Massage):
LTM is a Multicast message, the destination (embedded in the packet ) can be
set by specifying:
Remote MAC address
RMEP ID (only if RMEP learnt by CCM, otherwise shall not be initiated)
• PM configuration:
Dest NE configuration
Specifying the trigger(s) trigger { los | oam-cfm-loc | oam-cfm-rdi | Typing no before the command removes the
oam-cfm-ais | oam-cfm-all-rmep-fail} specified trigger.
Note: The los trigger is allowed only if the
from-interface is an Ethernet port or LAG.
The OAM CFM triggers are allowed only if
the from-interface is a MEP.
Specifying the action to take when action-on-group { interface-deactivation | Typing no action-on-group removes the
fault propagation is triggered oam-cfm-ais } action.
Note: The action interface-deactivation is
allowed only if the to-interface is an
Ethernet port or LAG. The action oam-cfm-
ais is allowed only if the to-interface is a
MEP.
Example 1
To enable Ethernet port to MEP fault propagation:
• From Ethernet port 3 on I/O card in slot 1
• To MEP 3 in maintenance association 3 in maintenance domain 2 (this
example assumes the MEP has been created)
• Trigger: LOS
• Action: Send OAM CFM alarm indication signal
• Wait-to-restore time = 120 seconds.
exit all
config fault
fault-propagation port ethernet 1/3 to mep 2 3 3
trigger los
action-on-group oam-cfm-ais
wait-to-restore 120
exit all
Example 2
To enable Ethernet port to Ethernet port fault propagation:
• From Ethernet port 1 on main card A
• To Ethernet port 3 on I/O card in slot 1
• Trigger: LOS
• Action: Shut down Ethernet port on the I/O card
• Wait-to-restore time = 90 seconds.
exit all
config fault fault-propagation port ethernet main-a/1 to port ethernet 1/3
trigger los
action-on-group interface-deactivation
wait-to-restore 90
exit all
action-on-group interface-deactivation
trigger los
no trigger oam-cfm-loc
no trigger oam-cfm-ais
no trigger oam-cfm-rdi
wait-to-restore 90
Configuration Errors
Table 7-10 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Illegal action for destination port Illegal action has been selected for the destination Ethernet port
or LAG
Illegal action for destination MEP Illegal action has been selected for the destination MEP
Illegal trigger for source port Illegal trigger has been selected for the source Ethernet port or
LAG
Illegal trigger for source MEP Illegal trigger has been selected for the source MEP
Max number (128) of fault propagation Maximum number of fault propagation sessions (128) has been
definitions has been reached reached
Illegal wait-to-restore value (0–3600) Illegal value for the wait-to-restore timer has been selected. The
WTR value must be in the 0–3600 sec. range.
Source or destination Ethernet port does Ethernet port selected as a source or destination entity has not
not exist been activated
Source or destination LAG does not exist LAG selected as a source or destination entity has not been
defined or activated
Source MEP does not exist MEP selected as a source entity has not been defined or
activated
Source and destination entities must be The same entity (Ethernet port, LAG or MEP ) cannot be selected
different as source and destination for fault propagation session
Benefits
Main card redundancy with automatic switchover ensures continuous service
provisioning. It provides a hot-standby capability for the ETX-5 management and
timing subsystems.
Functional Description
Only one main card per chassis is necessary; however, the chassis has two slots
dedicated to this type of module. The second slot can be used by a redundant
main card, thereby providing a hot-standby capability for the ETX-5 system
control functions.
When a second main card is installed, the two modules operate as a master/slave
pair; one module is the active (online) module, and the other is off-line and
serves as a hot standby.
Only the online main card communicates with the management station/terminal
and actively manages the ETX-5 system. The off-line main card is automatically
updated by the online card with all the configuration and status data. The off-line
card can take over at any time without disrupting system operation. The switch-
over to the off-line card occurs automatically when one of the following occurs:
• Extraction of the primary main card
• Power failure of the primary main card
• Diagnostics indication primary main card failure
• User-initiated or automatic reset of the primary main card
• A manual switch command
• Administratively disabling of the primary main card.
Configuration Errors
Table 7-11 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Manual switch cannot be performed: Manual switch has failed because the secondary main card is not
Mate card's operational status is down. operational
Manual switch cannot be performed: Manual switch has failed because only one main card is installed
Mate card doesn't exist. in the chassis
Manual switch cannot be performed: SW Manual switch has failed because a new software release is
Install is in progress being installed
Manual switch cannot be performed: Manual switch has failed because a card switchover is being
Switchover is in progress performed
Benefits
APS/MSP switches over traffic with minimal loss of data, thus avoiding time-
consuming reroutes. With APS/MSP, there is no indication beyond the affected
network element that a failure has occurred; other nodes stay intact. SDH/SONET
APS performs switchovers at Layer 1 significantly faster than at Layer 2 or Layer
Factory Defaults
By default, SDH/SONET protection is disabled.
Functional Description
In 1+1 APS/MSP, ETX-5 provides a unidirectional protection facility (backup line)
for each working facility. At the near end of the line, the optical signal is bridged
permanently (split into two signals) and sent over both the working and the
protection facilities simultaneously, producing identical working and protection
signals.
At the far end of the line, both signals are monitored independently for failures.
The receiving equipment selects either working or the protection signal. This
selection is based on switch initiation criteria, which can be a signal fail (hard
failure such as loss of frame), a signal degrade (soft failure caused by the error
rate exceeding some pre-defined value), or a response to user-initiated
commands.
When the TDM ports belong to a slot configured to comply with the TTC standard
requirements (STM-1J), APS/MSP can be set to the 1+1 bidirectional optimized
mode. The 1+1 bidirectional optimized APS functionality is implemented in
accordance with the ITU-T G.841 (Annex B) requirements. It is similar to the 1+1
unidirectional APS/MSP, but the switchover of the failed Rx path is performed
after negotiation with the opposite device. The opposite system must approve
the switchover, even if the failure occurred at one end only.
Working and protection ports can reside on the same or different E5-cTDM-4 or
E5-cTDM-STM4 cards. When the working and the protection ports reside on
different cards, each card is protected against failures.
The working and protection ports can reside on the same E5-cTDM-4 or E5-cTDM-
STM4 card (intra-card APS/MSP), provided that the card is not a member of an I/O
card protection group (standalone card).
The working and protection ports can reside on two different E5-cTDM-4 or E5-
cTDM-STM4 cards (inter-card APS/MSP) that are already assigned to an I/O card
protection group, provided that:
• The working port is on the working card
• The protection port is on the protection card
• The working and protection ports have the same port number (In the case of
E5-cTDM-STM4 card, port 1 is used for inter-card APS/MSP)
• APS/MSP is defined for cards in the following slot pairs:
1 and 2
3 and 4.
This means that working and protection ports cannot reside on cards in slots
1 and 3, 1 and 4, 2 and 3, or 2 and 4.
Note PW services cannot be assigned to SDH/SONET ports which are not APS/MSP
members, when an inter-card APS/MSP has been defined on at least two ports of
different I/O TDM cards. For example, if two ports 1 on I/O TDM cards in slot 1
and slot 2 are inter-card APS/MSP members, no pseudowire services are available
on ports 2, 3 and 4 of both cards.
Each APS/MSP group includes up to two members. ETX-5 can have up to eight
APS/MSP instances per chassis.
APS/MSP Architecture
ETX-5 APS/MSP is a 1+1 unidirectional protection switching. In this mode, all
communication from the near end to the far end is carried out over the APS/MSP
channel, using the K1 and K2 bytes of the SONET/SDH overhead on the
protection line.
The line selection is based only on the local conditions and requests. Therefore,
each end operates independently of the other end, and the K1 and K2 bytes are
not needed to coordinate switch actions. However, the K1 byte is still used to
inform the other end of the local action.
The K2 byte is set to indicate that the K1 byte is being received (by indicating the
same channel number as the received K1) and to inform the other end of the
provisioned architecture and mode of operation.
Working Line
Tx
Rx
Tx
Rx
Protection Line
The K1 byte contains both the switching pre-emption priorities (in bits 1-4) and
the channel number of the channel requesting action (in bits 5-8). The K2 byte
contains the channel number of the channel that is bridged onto the protection
(bits 1-4) and the mode type (bit 5) as well bits 6 to 8 contain various condition
such as AIS-L, RDI-L.
I/O card maintains a protection status for every port in a protection group. The
status values arranged in the following ascending priority order:
• active(1)
• standby(2)
• waitToRestore(3)
• manualSwitched(4)
• sd(5)
• sf(6)
• forcedSwitched(7)
• lockedOut(8) (protection only)
• notPresent(9)
The switch occurs whenever the protection status of the active port changed to a
higher priority than the standby as a result of a user command (shutdown, reset,
switch) or protection event.
Note Using no before io-group (group name), deletes the I/O card protection group.
I/O protection group can be deleted when it is disabled and has no cards
assigned to it.
Defining working (active) and bind {working <slot> | protection Using no before bind removes a
protection (standby) I/O cards <slot>} card from I/O card protection
group
Configuring APS/MSP
Use the following procedure to configure redundancy for the ETX-5 SDH/SONET
links.
Note In the following procedures, the aps command is used to configure both MSP and
APS protection. There is no difference whether the network is SDH or SONET. The
same command executes the same protection for both.
Note Using no before aps (group name), deletes the APS group.
To configure APS/MSP:
• At the config>protection>aps(group name)# prompt, enter all necessary
commands according to the tasks listed below:
Defining protection (standby) bind {protection sdh-sonet Using no before bind removes a
and working (active) links <slot/port> | working sdh-sonet link from protection group
<slot/port>}
Manually switching traffic to the manual-switch-to-working Use this command to revert the
working port communication link back to the
working interface before the wait
to restore (WTR) time has expired
Manually switching traffic to the manual-switch-to-protection Use this command when you need
protection port to perform maintenance on the
working port
Preventing a working link from lockout-of-protection This command prevents the circuit
switching to a protection link from switching to a protection
interface in the event that the
working circuit becomes
unavailable
Ports
Port Admin Status Active
Working sdh-sonet 4/1 up up yes
Protection sdh-sonet 3/1 down sf --
Examples
Intra-Card APS/MSP
Inter-Card APS/MSP
• I/O card protection group name – io-group_1
• Working card – E5-cTDM-4 in slot 1
• Protection card – E5-cTDM-4 in slot 2
• APS/MSP group name – aps_1
• Working interface – STM-1/OC-3 port 1 on E5-cTDM-4 card in slot 1
• Protection interface – STM-1/OC-3 port 1 on E5-cTDM-4 card in slot 2
ETX-5# config protection io-group io-group_1
ETX-5>config>protection>io-group(io-group_1)$ bind working 1
ETX-5>config>protection>io-group(io-group_1)$ bind protection 2
ETX-5>config>protection>io-group(io-group_1)$ no shutdown
ETX-5>config>protection>io-group(io-group_1) exit all
ETX-5# config protection aps aps_1
ETX-5>config>protection>aps(aps_1)$ bind working sdh-sonet 1/1
ETX-5>config>protection>aps(aps_1)$ bind protection sdh-sonet 2/1
ETX-5>config>protection>aps(aps_1)$ no shutdown
Card Protection
ETX-5>config>protection>io-group(1)#
bind working 1
bind protection 2
no shutdown
Port APS
ETX-5300->config>protection>aps(1)#
bind working sdh-sonet 1/1
bind protection sdh-sonet 2/1
no shutdown
ETX-5300->config>protection>aps(2)#
bind working sdh-sonet 1/2
bind protection sdh-sonet 2/2
no shutdown
ETX-5300->config>protection>aps(3)#
bind working sdh-sonet 1/3
bind protection sdh-sonet 2/3
no shutdown
ETX-5300->config>protection>aps(4)#
bind working sdh-sonet 1/4
bind protection sdh-sonet 2/4
no shutdown
Configuration Errors
Table 7-13 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
Bind failed: port is already bound to an SDH/SONET port cannot be bound to more than one APS/MSP
existing APS/MSP group group
Bind failed: Services exist on port SDH/SONET port with PWs defined on it cannot be bound to an
APS/MSP
Bind failed: Ports should reside on same For intra-card APS/MSP, the working and protection port must
card reside on the same card
Bind failed: APS/MSP ports should be of Only SDH/SONET ports can be defined as APS/MSP group
type SONET-SDH members
Un-bind failed: APS/MSP group must be A port can be removed from the APS/MSP group only after the
shutdown before unbinding a port group is shut down
Bind failed: Protection port must reside Protection port must reside on a card defined as protection card
on protection card in group in the I/O protection group (inter-card APS/MSP)
Bind failed: Working port must be Working port must reside on a card defined as working card in
configured on working card in group the I/O protection group (inter-card APS/MSP)
Bind failed: Working and protection ports For inter-card APS/MSP, the working and protection port must
must have the same port number have the same number
Bind failed: Working and protection slots For intra-card APS/MSP, the working and protection port must
must be the same reside on the same card
Sonet/sdh port number is not valid Invalid SDH/SONET port number has been selected
Sonet/sdh card is not defined yet An SDH/SONET port on a TDM card that has not been
provisioned yet, cannot be bound to an APS/MSP group
APS/MSP group remove failed: Ports are APS/MSP group cannot be deleted if it has ports bound to it
bound to the group
APS/MSP group creation failed: Maximum Maximum number of APS/MSP groups per chassis (8) has been
number of APS/MSP groups is already reached
configured
Max length of APS/MSP group name is 32 APS/MSP group name length has exceeded 32 alphanumeric
characters characters
Command failed: Protection line is in Traffic cannot be manually switched to a port with signal failure
signal fail or signal degrade or signal degrade condition
Command failed: Working line is in signal Traffic cannot be manually switched to a port with signal failure
fail or signal degraded or signal degrade condition
Modify failed: Group should be shutdown Active APS/MSP group cannot be modified
in order to perform modification
APS/MSP create failed: Exactly 2 ports Number of APS/MSP members cannot exceed two ports
should be bound to group
8.1 Bridge
The ETX-5 bridge is a VLAN-aware Layer-2 forwarding entity.
Standards
IEEE 802.1D, 802.1Q
Benefits
A bridge is used to deliver EPLAN and EVPLAN (any-to-any) services.
Factory Defaults
By default, no bridge instances exist in the ETX-5 system. The default STP
parameters are as follows:
mode mstp
max-age 20 sec
forward-time 30 sec
hello-time 10 sec
tx-hold-count 3
max-hops 20
revision 0
admin-edge Disable
auto-edge Enable
restricted-role Disable
restricted-tcn Disable
Functional Description
A bridge is a forwarding entity used by ETX-5 for delivering E-LAN services in
multipoint-to-multipoint topology and G.8032 ring protection. With up to 32
bridge instances, ETX-5 provides up to 128 bridge ports.
The bridge operates in VLAN-aware mode (IVL) with ingress filtering. It accepts
tagged frames only. To be admitted to the bridge, a frame’s VID must be
configured as a part of the bridge port VLAN member set. Untagged frames must
receive a relevant VID at port ingress (tag push) or they will be dropped.
The ETX-5 bridge supports up to 4K broadcast domains (bridge/VLAN) and a MAC
table with up to 256K entries. MAC table size is configurable per broadcast
domain with up to 4K entries per broadcast domain. The MAC table flush is
supported per bridge instance and the MAC table list is available in a file. MAC
address aging time is configured per chassis in the range of 300 (default) to
660 seconds.
Bridge Model
A bridge is defined by a bridge number, bridge ports and a VLAN membership
table that specifies which bridge ports are members in a certain broadcast
domain (VLAN).
Traffic in and out of a bridge port is configured using flows. This allows editing
action at ingress and egress bridge ports. Valid and invalid bridge configurations
are described below.
Different flows from one physical port can be mapped to bridge ports on
different bridge instances, as shown in the figure below:
Bridge
Port
Bridge
Figure 8-1. Mapping Flows from the Same Physical Port to Different Bridges
However, different flows from the same physical port cannot be mapped to the
same bridge port and broadcast domain (VLAN):
VID A
VID B Push C
Port Bridge
VID C
Figure 8-2. Mapping Flows with the Same VID to One Bridge Port
Likewise, flows from the same bridge port cannot be mapped to different
physical ports:
Port
Bridge
Port
Figure 8-3. Mapping Flows with the Same Bridge Port to Different Physical Ports
E-Tree Service
Unlike regular E-LAN (multipoint-to-multipoint), E-Tree is a point-to-multipoint
E-LAN service. As defined by MEF, its topology includes root and leaf nodes. The
leaves communicate with the roots, but not with each other. The root-leaf
forwarding functionality is provided at bridge port/VLAN level. Figure 8-21
illustrates the E-Tree forwarding functionality.
Leaf
Root Leaf
Known unicast
Leaf Leaf
BP2
Bridge
BP3
VLAN
Domain Y
BP4 BP1
Root
Leaf
Root
VLAN
Domain X
BP6
Note For bridge-type SVIs, each ingress flow within a certain VLAN domain must have
an accompanying egress flow.
Certain restrictions apply to the type of port of flow origin (directly- or indirectly-
attached) and flow classification method.
• Directly-attached ports:
• Indirectly-attached ports:
Up to 255 different bridge ports with ingress pop action can be defined.
Flows originating at SAP with a double tag classification (Outer VLAN + Inner VLAN)
cannot be bound to a bridge port.
Note
All flows from the same SAP must have the same classification mode.
• All flows on the VLAN must be deleted before a VLAN member can be deleted
from a bridge port.
• All VLAN members of a bridge port must be deleted before the bridge port
can be deleted.
• All bridge ports must be deleted before the bridge can be deleted.
• E-LAN/E-Tree and root/leaf functionalities cannot be changed if active flows
are configured for bridge ports and VLANs.
Link A Link A
Bridge 3 Bridge 3
Link Cost
Every link in the network receives a certain cost. Usually, higher-bandwidth links
that are adjacent to the root bridge are assigned a lower cost. Lower-bandwidth
links that are multiple hops away from the root bridge are assigned a higher cost.
Once link costs are estimated, STP determines the lowest cost connections from
each designated bridge to the root bridge to determine the lowest-cost path. It
also blocks all the other higher cost links to prevent loops in the network.
Bridge 1 Bridge 2
Bridge 3
Physical Topology
Root Root
Root
Configuring Bridge
Bridge configuration includes the following steps:
1. Adding and configuring a bridge instance (1–32)
2. Binding bridge ports to SVIs
3. Adding VLANs and defining bridge ports as egress tagged VLAN members.
4. Configuring RSTP/MSTP (optional).
5. Configuring STP (optional)
To configure a bridge:
1. At the configure prompt, enter bridge followed by bridge number (1–32).
A bridge instance with the specified number is created and the
config>bridge(1)# prompt is displayed.
2. Configure the bridge as illustrated and explained below.
Displaying MAC address table show mac-address-table [vlan-id] Adding VLAN ID after the show
mac-address-table all displays
MAC table only for selected
VLAN
Note In order to change the physical port connected to the bridge port, you must
delete all flows connected to the SVI bound to the bridge port and then configure
the bridge again with the new physical port.
Binding bridge port to a bridge- bind svi <svi_number> no bind svi (svi_number),
type SVI no bind svi <svi_number> unbinds bridge port from SVI
Assigning a name to bridge port name <value> no name deletes bridge port
no name name
Defining a bridge port as a root root < bridge_port_number> no root defines a bridge port
in E-Tree mode no root < bridge_port_number> as a leaf in E-Tree mode
Configuring RSTP/MSTP
RSTP and MSTP are configured at the bridge and bridge-port levels.
Configuring the amount of time forward-time <4–30> sec When configuring forwarding
a port remains in the listening time, follow this rule:
and learning states before 2 × (forwarding time - 1) =>
entering the forwarding state maximum aging time
Specifying spanning tree priority priority <0, 4096, 8192, 12288, This is the value of the first
of the bridge 16384, 20480, 24576, 28672, 32768, two octets of the bridge ID. It
36864, 40960, 45056, 49152, 53248, is used to make the bridge
57344, 61440> more (or less) likely to be
chosen as the root bridge.
The lower the number, the
more likely the bridge will be
chosen as the root bridge.
Defining port path cost cost <0–200000000> If a loop occurs, the path cost
is used to select an interface
to place into the forwarding
state.
A lower path cost represents
higher speed links. It is
recommended to use the
default cost value (0) to let
ETX-5 to compute the best
possible cost according to the
link bandwidth (Table 8-44).
Defining bridge port priority port-priority <0, 16, 32, 48, 64, 80, This is the value of the first
96, 112, 128, 144, 160, 176, 192, octet of the bridge port ID. If a
208, 224, 240> loop occurs, the MSTP uses the
port priority, when selecting an
interface to put into the
forwarding state.
The lower the number, the
higher the port priority (the
lowest numbered port is
selected if a tie breaker is
needed).
Displaying bridge port spanning show status See Displaying Spanning Tree
tree status Status below
1 Gbps 20 000
10 Gbps 2 000
1 Tbps 20
10 Tbps 2
Specifying MSTI port priority port-priority <0, 16, 32, 48, 64, 80,
96, 112, 128, 144, 160, 176, 192,
208, 224, 240>
Configuring STP
When configuring STP, it is necessary to configure an L2CP profile with MAC
address:
01-80-C2-00-00-00 and action set to peer, and attach the L2CP profile to an
untagged flow from each port that is part of the spanning tree.
The examples below show the necessary configuration.
Note ETX-5 displays only first 1000 entries. To view the whole MAC table, download it
to your PC, using SFTP. See File Operations in Chapter 10.
Example
Flow configuration example (see Multipoint Service) includes bridge configuration
procedure.
Configuration Errors
Table 8-45 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
Modify failed: shut down the port before Active bridge ports cannot be modified
modification
Modify failed: bridge port is bound Bound bridge ports cannot be modified
Modify failed: bridge port is bound to ERP-bound bridge ports cannot be modified
ERP
Modify failed: VLAN does not exist VLAN cannot be modified because it does not exist
Message Description
Modify failed: no bridge ports are VLAN with no bridge ports attached to it cannot be modified
configured to be this VLAN members
Modify failed: max number of bridge Maximum number of bridge instances per chassis (32) has been
instances has been reached reached
Modify failed: max number of VLANs has Maximum number of broadcast domains (4K) has been reached
been reached
Modify failed: VLAN is used for RAPS VLAN cannot be modified because it is used as a messaging
messaging in ERP VLAN in ERP
Modify failed: VLAN is used as data VLAN VLAN cannot be modified because it is used as a data VLAN in
in ERP ERP
Modify failed: VLAN index is out of range VLAN numbering index is out of allowed range
Modify failed: only bound bridge ports Bridge ports must be bound to SVIs prior to their activation
can be activated
Modify failed: bridge port must be shut Active bridge ports cannot be modified
down
Modify failed: bridge has active ports or Bridge entity has active ports or VLANs
VLANs
Modify failed: bridge port index is out of Bridge port index is out of allowed range
range
8.2 Cross-Connection
The cross-connect function is used to assign TDM timeslots for pseudowire
connections.
Note DS1 (E1/T1) services can be activated only after defining cross-connections.
Factory Defaults
By default, there are no cross-connections in the ETX-5 system.
Benefits
Cross-connects allow flexible mapping of individual DS0 channels or full DS1
streams into pseudowires.
Functional Description
The ETX-5 cross-connect matrix supports two types of cross-connect, selectable
at the level of the individual E1 and T1 port:
Configuring Cross-Connection
To configure a pw-tdm cross connection:
1. At the config# prompt, enter cross-connect or cr.
The config>cross-connect# prompt appears.
2. Configure the cross connection as illustrated and explained below.
Establishing pw-tdm pw <pw number> ds1 <slot>/<port> Timeslots in a list can be separated
cross-connection [time-slots <ts list>] by a comma or given as a range, for
between this example: 1..3, 5.
pseudowire and Using no before the command
timeslots on the removes the cross-connection
ds1 port
Examples
Cross-Connection
To assign timeslots 1–6, 8, and 10–15:
• PW number 1
• E1 interface 1 in TDM port 1 of E5-cTDM-4 card installed in slot 1
ETX-5>config>cross-connect# pw-tdm pw 1 e1 1/1/1 time-slots
[1..6, 8, 10..15]
To remove PW1:
ETX-5>config>cross-connect# no pw-tdm pw 1
Pseudowire Service
The following script illustrates the configuration of point-to-point L2 pseudowire
service for unframed T1.
#****************************Provisioning_I/O_TDM_Card***********************
configure slot 1
#*********************Activating_Ethernet_Port_1_on_Main_Card_A**************
configure port ethernet main-a/1
no shutdown
exit all
#*********************************End****************************************
#**************Activating_SDH_SONET_Port_1_on_TDM_Card_in_Slot_1 ************
configure port sdh-sonet 1/1
tx-clock-source domain 1
no shutdown
exit all
#*********************************End****************************************
#*******Activating_SDH_SONET_STS-1_1_on_Port_1_on_TDM_Card_in_Slot_1*********
configure port sdh-sonet 1/1 oc3 1 sts1 1
no shutdown
exit all
#*********************************End****************************************
#*****Activating_SDH_SONET_VC/VT_on_STS-1_1_Port_1_on_TDM_Card_in_Slot_1*****
configure port sdh-sonet 1/1 oc3 1 sts1 1 vt1-5 1 1
no shutdown
exit all
#*********************************End****************************************
#************************Configuring_Clock_Domain****************************
configure system clock domain 1
sync-network-type 1
source 1 rx-port sdh-sonet 1/1
quality-level prs
wait-to-restore 0
exit all
#*********************************End****************************************
#*********************Configuring_Pseudowire_Peer****************************
configure peer 1 mac 00-20-d2-31-bf-01 name ETX-205A
exit all
#*********************************End****************************************
#*********************Configuring_Classifier_Profile*************************
config flows classifier-profile classAll match-any
match all
exit all
config flows classifier-profile class1000 match-any
match vlan 1000
exit all
config flows classifier-profile class2000 match-any
match vlan 2000
exit all
config flows classifier-profile class3000 match-any
#********************Assigning_Queue_Group_Profile***************************
#*************************Selecting_Classification_Key***********************
config port ethernet main-a/1 classification-key vlan p-bit
exit all
#*********************************End****************************************
#***********************Configuring_Marking_Profile**************************
config qos marking-profile mark1 classification cos color-aware green-yellow
dei mapping
mark 0 green to 7 dei green
mark 1 green to 6 dei green
mark 2 green to 5 dei green
mark 3 green to 4 dei green
mark 4 green to 3 dei green
mark 5 green to 2 dei green
mark 6 green to 1 dei green
mark 7 green to 0 dei green
exit all
#*********************************End****************************************
#*****************************Configuring_SVI********************************
configure port svi 1 pw
name pw-dataS1
no shutdown
exit all
#*********************************End****************************************
#*****************************Configuring_T1*********************************
configure port t1 1/1/1
line-type unframed
tx-clock-source domain 1
no shutdown
exit all
#*********************************End****************************************
#*****************************Configuring_Pseudowire*************************
configure pwe
pw 1 type t1satop psn ethernet
label in 1 out 1
peer 1
egress-port svi 1
tdm-payload size 96
jitter-buffer 3000
no oam
no shutdown
exit all
#*********************************End****************************************
#**************************Configuring_Cross-Connect*************************
configure cross-connect pw-tdm pw 1 t1 1/1/1
exit all
#*********************************End****************************************
#************************Configuring_T1_to_Ethernet_Flow*********************
configure flows flow 1
classifier classAll
ingress-port svi 1
egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block
0/1
vlan-tag push vlan 1000 p-bit profile mark1
no shutdown
exit all
#*********************************End****************************************
#************************Configuring_Ethernet_to_T1_Flow*********************
configure flows flow 2
classifier class1000
ingress-port ethernet main-a/1
egress-port svi 1
vlan-tag pop vlan
no shutdown
exit all
#*********************************End****************************************
Configuration Errors
Table 8-41 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
PW XC set failed: Only one PW can be Cannot configure a timeslot cross-connection because unframed
configured on an Unframed port ports support only a single PW
PW XC set failed: Timeslots do not match Cannot configure a timeslot cross-connection because there is a
with PW payload size and rate mismatch between the number of assigned timeslots and the
selected PW TDM payload size or rate
PW XC set failed: The timeslot belongs to Cannot configure a timeslot cross-connection because a timeslot
another bundle is already assigned to another PW
Message Description
PW XC set failed: card in specified slot Cannot configure a timeslot cross-connection because an
must be of type TDM Ethernet card has been configured in the chassis slot
PW XC create failed: more than one Cannot configure a timeslot cross-connection because only one
multi-service card cannot use same the TDM card can use a single SVI
SVI
PW XC set failed: Mismatch between port Cannot configure a timeslot cross-connection because a PW
line-type (unframed) and pw type (ces- type (CESoPSN) requires a framed line type
psn-data)
PW XC set failed: Mismatch between port Cannot configure a timeslot cross-connection because a PW
line-type (framed) and pw type (SAToP) type (SAToP) requires an unframed line type
PW XC set failed: Mismatch between port Cannot configure a timeslot cross-connection because there is a
interface type and PW type mismatch between an interface type (E1 or T1) and a PW type
(e1satop or t1satop)
PW XC set failed: only 1 PW can be Cannot configure a timeslot cross-connection because only one
configured per port PW can be configured for this port type
8.3 Ethertype
Ethertype (tag protocol ID, or TPID) configured per chassis and per port is used
for:
• Identifying VLAN-tagged frames at ingress
• Setting Ethertype value used in VLAN editing at egress.
Benefits
Per-port tag Ethertype configuration allows identification of incoming and
outgoing VLAN-tagged frames.
Factory Defaults
By default, Ethertype is set to 8100.
Functional Description
Ethertype configured per port is used for the identification of VLAN-tagged
frames at ingress and VLAN editing at egress. This refers to outer VLAN only. The
outer VLAN of the incoming packet must match the configured Ethertype of the
port in order to be considered as a VLAN-tagged frame (otherwise the frame is
considered untagged or dropped).
ETX-5 supports two Ethertype tag values:
• Default 8100
• Any other type.
The second Ethertype tag value is configured globally, and can thus be used
in per port configuration.
Per-port Ethertype tag configuration allows identification of incoming and
outgoing VLAN-tagged frames. The configured tag protocol ID (TPID) refers to
outer tag. As for the inner TPID, the following assumptions are maintained:
• Indirectly-attached ports – inner VID (if exists) is 8100
• Directly-attached ports – inner VID is either the same as outer VID Ethertype
or 8100.
Note Ethertype tag cannot be changed if a port (Ethernet or LAG) has flows attached
to it.
The following tables describe the admission rules for different port and TPID
types.
Table 8-7. Indirectly-Attached Ports with Port TPID Y (other than 8100)
Y None Admit 1
Y 8100 Admit 2
Y X (other than 8100) Admit 1
Z (other than Y) Don’t care Admit Untagged
Table 8-9. Directly-Attached Ports with Port TPID Y (other than 8100)
Y None Admit 1
Y 8100 or Y Admit 2
Y B (other than 8100 or Y) Admit 1
8100 Don’t care Drop –
B (other than 8100 or Y) Don’t care Admit Untagged
Note
TPID is also used to indicate the Ethertype tag used in VLAN stacking.
Configuring Ethertype
Any Ethertype tag, in addition to the default 8100 value, must first be defined at
the chassis level. Afterwards, the additional tag value is used in the port
configuration. If the second value is not defined for a port, the port uses default
setting (8100).
Example
To configure global Ethertype tag 0x88a8:
ETX-5>config>port>tag-ethertype 0x88a8
Configuration Errors
Table 8-30 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
Modify failed: Ethertype tag value is in The Ethertype tag value cannot be changed because it is
use currently used by a port of a flow
Invalid port Ethertype tag value The Ethertype tag value for a port cannot be configured to the
default value (0x8100), and cannot be different from the one
configured at system level
Cannot delete default Ethertype tag The default Ethertype tag value (0x8100) cannot be deleted
value
Delete failed: Ethertype tag value is in The Ethertype tag value cannot be deleted because it is
use currently being used by a port of a flow
Setting failed: Ethertype tag value is The Ethertype tag value for a port or a flow is different from the
unknown one configured at system level
Ethertype tag cannot be modified for a The Ethertype tag value is in use by the LAG
port attached to LAG
8.4 Flows
Flows are unidirectional entities that connect two physical or logical ports.
Benefits
The user traffic can be classified into different Ethernet flows (EVC, EVC.CoS) to
provide services in a flexible manner.
Factory Defaults
By default, there are no flows in the ETX-5 system.
Functional Description
The ingress traffic is first classified into flows according to classification profiles.
A per-port classification key configuration defines what types of classification
profiles are supported for this type of port. The classification key also defines the
CoS mapping and color mapping methods.
The Classification section below specifies the supported classification keys and
the associated CoS and color mapping methods. It also details the different
classifier profile types supported per classifier key.
Flows connect physical and/or logical ports. They are used for E-Line and E-LAN
services, or to provide L3 connectivity over router interfaces. In total, ETX-5
supports up to 24K of Ethernet flows.
Classification
The ingress traffic is first classified to flows according to classifier profiles. A per
port classification key defines the types of classifier profiles supported for this
type of port. The classification key also defines the CoS mapping and color
mapping methods. Table 8-1 and Table 8-2 specify the supported classification
keys and the associated CoS and color mapping methods. The different types of
classifier profiles supported per classification key are detailed in Table 8-3,
Table 8-4, Table 8-5, Table 8-6, Table 8-7, Table 8-8, Table 8-9, Table 8-10,
Table 8-11.
Classification Key (Port + …) CoS Mapping Method Ingress Color Mapping Method
Classification Key (Port + …) CoS Mapping Method Ingress Color Mapping Method
VLAN+P-bit (see Note below) Flow, P-bit, DSCP Flow, P-bit, DEI, DSCP
Outer VLAN + Inner VLAN + Outer P-bit Flow, P-bit, DSCP Flow, P-bit, DEI, DSCP
Note IA port classification key cannot be changed when the port has flows attached to
it. Flows must be deleted first.
VLAN + Src MAC (see Note 1 below) Single VLAN, single MAC 1
VLAN + Dst MAC (see note 1 below)
Src IP Single IP 1
Dst IP
Note
• Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst MAC,
VLAN + Src/Dst IP) are supported without explicit P-bit indication, but they
actually imply a full P-bit range (0–7).
• ETX-5 recognizes only one level of VLAN tagging on the flows created with this
classifier key. This means that for a double-tag packet, IP level is not detected.
• A packet with an Ethertype tag that does not match the port Ethertype tag is
considered to be untagged.
Priority
Flow priority, as shown in Table 8-3, is a hard-coded attribute of a flow that
cannot be changed. Two flows having the same priority cannot overlap.
For example, if a flow with VID 5 exists (classifier profile type VLAN, priority 2), a
flow with VID 5 and P-bit 0 (classifier profile type VLAN+P-bit, priority 2) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and P-bit 0
and VID 5 and P-bit 1–7.
When flows have different priorities, they can overlap. For example, it is possible
to configure a flow with VLAN 5 (classifier profile type VLAN, priority 2) and VLAN
5 and Src MAC x (classifier profile type VLAN + Src MAC, priority 1).
VLAN + Src MAC (see Note 1 below) Single VLAN, single MAC 1
VLAN + Dst MAC (see Note 1 below)
Src IP Single IP 1
Dst IP
Note
• Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst MAC,
VLAN + Src/Dst IP) are supported without explicit IP precedence indication, but
they actually imply a full IP Precedence range (0–7). Packets with VLANs, but
without IP Precedence (non-IP) will not match these classifier profiles.
• ETX-5 recognizes only one level of VLAN tagging on the flows created with this
classifier key. This means that for a double-tag packet, IP level is not detected.
• A packet with an Ethertype tag that does not match the port Ethertype tag is
considered to be untagged.
Priority
Flow priority, shown in Table 8-4, is a hard-coded attribute of a flow that cannot
be changed. Two flows having the same priority cannot overlap.
For example, if a flow with VID 5 exists (classifier profile type VLAN, priority 2), a
flow with VID 5 and IP-P 0 (classifier profile type VLAN + IP-P, priority 2) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and IP-P 0
and VID 5 and IP-P 1–7.
When flows have different priorities, they can overlap. For example, it is possible
to configure a flow with VLAN 5 (classifier profile type VLAN, priority 2) and VLAN
5 and Src MAC x (classifier profile type VLAN + Src MAC, priority 1).
VLAN + Src MAC (see Note 1 below) Single VLAN, single MAC 1
VLAN + Dst MAC (see Note 1 below)
Src IP Single IP 1
Dst IP
Note
• (1) Some of the VLAN-based classifier profile types (VLAN, VLAN + Src/Dst
MAC, VLAN + Src/Dst IP) are supported without explicit DSCP indication, but
they actually imply a full DSCP range (0–63). Packets with VLANs, but without
DSCP (non-IP) will not match these classifier profiles.
• (2) ETX-5 recognizes only one level of VLAN tagging on the flows created with
this classifier key. This means that for a double-tag packet, IP level is not
detected.
Priority
Flow priority, shown in Table 8-5, is a hard-coded attribute of a flow that cannot
be changed. Two flows having the same priority cannot overlap.
For example, if a flow with VID 5 exists (classification type VLAN, priority 2), a
flow with VID 5 and DSCP 0 (classification type VLAN + DSCP, priority 2) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and DSCP 0
and VID 5 and DSCP 1–63.
When flows have different priorities, they can overlap. For example, it is possible
to configure a flow with VLAN 5 (classification type VLAN, priority 2) and VLAN 5
and Src MAC x (classification type VLAN + Src MAC, priority 1).
Src IP Single IP 1
Dst IP
Note
ETX-5 recognizes only one level of VLAN tagging on the flows created with this
classifier key. This means that for a double-tag packet, IP level is not detected.
Priority
Flow priority, shown in Table 8-6, is a hard-coded attribute of a flow that cannot
be changed. Two flows having the same priority cannot overlap.
For example, if a flow with P-bit 0–7 exists (classification type P-bit, priority 2), a
flow with P-bit 3 (classification type P-bit, priority 2) is not allowed and vice
versa. In this case, three flows must be created: P-bit 0–2, P-bit 3 and P-bit 4–7.
Src IP Single IP 1
Dst IP
Priority
Flow priority, shown in Table 8-7, is a hard-coded attribute of a flow that cannot
be changed. Two flows with the same priority cannot overlap.
For example, if a flow with IP-P 0–7 exists (classification type IP Precedence,
priority 2), a flow with IP-P 3 (classification type IP Precedence, priority 2) is not
allowed and vice versa. In this case, three flows must be created: IP-P 0–2, IP-P 3
and IP-P 4–7.
Priority
Flow priority, shown in Table 8-8, is a hard-coded attribute of a flow that cannot
be changed. Two flows with the same priority cannot overlap.
For example, if a flow with DSCP 0–63 exists (classification type DSCP, priority 2),
a flow with DSCP 3 (classification type DSCP, priority 2) is not allowed and vice
versa. In this case, three flows must be created: DSCP 0–2, DSCP 3 and DSCP 4–
63.
Note • TPID of outer VLAN is expected to match the user-configured port Ethertype
tag.
• TPID of inner VLAN must be 8100, otherwise the inner VLAN and IP level are
not recognized.
Table 8-19. Indirectly-Attached Ports with Outer VLAN + P-bit + Inner VLAN Classifier Key
Outer VLAN + P-bit + Inner VLAN Single outer VLAN, single P-bit 2
Outer VLAN + Inner VLAN range, single inner VLAN range
(see Note 1 below)
VLAN (see notes 1 and 2 below) Single VLAN, single P-bit range 2
VLAN + P-bit (see Notes 1 and 2 below)
VLAN + Src MAC (see note 1 below) Single VLAN, single MAC 1
VLAN + Dst MAC (see Note 1 below)
Src IP Single IP 1
Dst IP
Note
• (1) Some of the VLAN-based classifier profile types (VLAN, Outer VLAN + Inner
VLAN, VLAN + Src/Dst MAC, VLAN + Src/Dst IP) are supported without explicit
P-bit indication, but they actually imply a full P-bit range (0–7).
• (2) VLAN and VLAN + P-bit classifier profile types relate to packets with single
VLAN level only.
Priority
Flow priority, as it appears in Table 8-9, is a hard-coded attribute of a flow that
cannot be changed. Two flows having the same priority cannot overlap.
For example, if a flow with VID 5 exists (classification type VLAN, priority 2), a
flow with VID 5 and P-bit 0 (classification type VLAN+P-bit, priority 2) is not
allowed and vice versa. In this case, two flows must be created: VID 5 and P-bit 0
and VID 5 and P-bit 1–7.
When flows have different priorities, they can overlap. For example, it is possible
to configure a flow with VLAN 5 (classification type VLAN, priority 2) and VLAN 5
and Src MAC x (classification type VLAN + Src MAC, priority 1).
Untagged 2
Note
• (1) VLAN classifier profile type is supported without explicit P-bit indication,
but it actually implies a full P-bit range (0–7).
• (2) When a two-level VLAN frame is received, this classification refers to the
outer VLAN.
Note A packet with an outer Ethertype tag that does not match the port Ethertype tag
is considered untagged.
Table 8-21. Directly-Attached Ports with Outer VLAN + P-bit + Inner VLAN Classifier Key
Outer VLAN + P-bit + Inner VLAN Single outer VLAN, single P-bit 1
Outer VLAN + Inner VLAN range, single inner VLAN range
(see note 1 below)
VLAN (see notes 1 and 2 below) Single VLAN, single P-bit range 1
VLAN + P-bit (see note 2 below)
Untagged 1
Note
• (1) VLAN classifier profile type is supported without explicit P-bit indication,
but it actually implies a full P-bit range (0–7).
• (2) VLAN and VLAN + P-bit classification profile type relate to packets with
single VLAN level only.
Flows
I/O Card
SAP BP BP
Ethernet Port
Main Card
SVI
Bridge BP
SVI
Ethernet Port
I/O Ingress
I/O Card
Ethernet Port
Flows BP
Main Card
SAP
Main Card
Port
Flow Loop
SAP
Egress
Main Card
Port
I/O Card Main Card
CLI : Test command with MAC swap LB and loop location indication.
test [{egress|ingress}] [{mac-swap|lbm-responder}]
no test
Flow Processing
Flow processing includes the following:
• Ingress traffic is mapped in flows using the classification match criteria
defined in the classifier profile.
• L2CP frames are handled per flow according to L2CP profile settings.
• User priority (P-bit, IP Precedence, DSCP) is mapped to an internal Class of
Service (CoS) according to CoS mapping profile or fixed CoS mapping value
• User priority (P-bit, IP Precedence, DSCP) or DEI can be mapped to a packet
color (yellow or green) according to color mapping profile.
• A single policer can be applied to a flow or a policer aggregate can be
assigned to a group of flows, using policer profile or policer aggregate profile
• VLANs can be edited per flow by stacking (pushing), removing (popping), or
swapping (marking) tags on single- or double-tagged packets. P-bit and DEI
values are either copied or set according to CoS marking profile.
CoS marking profile maps CoS value and/or packet color into the egress
priority tags (P-bit, DEI).
• Flow is mapped to a specific queue block within a queue group associated
with the egress port. A specific queue in the queue block is defined 1:1 by
the packet CoS (0–7) according to CoS-mapping profile.
Table 8-12 details processing actions supported by different flow types.
Ingress Classifier Drop L2CP CoS Mapping Color Mapping Policing VLAN
Port Profile Action Profile Profile Profile Profile Editing
Main card –
I/O card –
SAP – – – – –
SVI PW – – – – –
SVI bridge – – – – –
SVI router – – – – –
Note
All flows can be mapped to a queue block, if the flow egress port is on an I/O or
main Ethernet card.
Drop Action
Traffic carried by I/O ingress flows or by flows originating from directly-attached
(main card) ports can be dropped and thereby prevented from reaching its egress
port.
For example, if you plan to accept traffic marked by a certain VLAN, but to drop
this traffic if it comes from a specific MAC address, you can define two flows:
• Flow 1 with VLAN classification
• Flow 2 with VLAN + specific MAC classification and drop action.
This action can also be used to direct LACP traffic to the CPU, and preventing it
from reaching an egress port. This is done by creating an untagged flow with an
L2CP profile defining a drop action for it.
Flow Counters
Statistic counters can be enabled on the following flows:
• Up to 512 of I/O ingress flows per each I/O card
• Up to 2046 main card flows per chassis. These flows include:
Point-to-point (E-Line) flows
Multipoint (E-LAN) flows.
Note Each pair of the multipoint flows (at bridge port ingress and egress) is counted as
a single flow. PM counters must be either enabled or disabled for both multipoint
flows.
Ports
The RFC-2544 testing is supported only on the flows whose ingress port is one of
the following:
• An indirectly-attached port (Ethernet port on I/O cards)
• A LAG with ports bound to indirectly-attached ports.
Functionality
Before running the flow test, you must configure and enable a Down MEP, bound
to an indirectly-attached port (see OAM) with live ingress and egress flows.
When the flow testing is enabled, ETX-5 loops back all LBM packets received on
the flow by swapping the MAC address and changing the LBM code to the LBR
code.
Tx Flow
SAP
Rx Flow
Main or I/O Card Down MEP I/O Card
Port A Bound to Port B Port B
A. Normal Operation
Tx Flow
LBR
SAP Code
Rx Flow
Main or I/O Card Down MEP I/O Card
Port A Bound to Port B LBM Code Port B
Loop
ETX-5 continues to forward all other, non-LBM packets. This includes the OAM
packets, such as CCMs and DMMs. The testing mode has no impact on the user
traffic. This mode can be activated dynamically, without disabling the flow.
The LBM packets that are sent back during the RFC-2544 responder operation are
not registered by the statistical counters of the flow.
Notes All packets carrying the LBM code are looped back without any filtering according
to the destination MAC address, MD level etc.
The RFC-2544 testing functions only if the ingress and egress flows use the same
port and have the same VLAN settings.
VLAN Editing
The VLAN tag editing mechanism allows service providers to carry customer-
tagged traffic on its network using its own VLANs. You can configure tag editing
operations to stack (push), remove (pop), or swap (mark) tags on single-, or
double-tagged packets.
Note When configuring VLAN editing via CLI, swap is referred to as mark.
When a VLAN is pushed or swapped, the inner bits (P-bit, CFI/DFI) are either
copied from the original VLAN or set according to CoS marking profile.
None None –
Push (copy P-bit and DEI) None vlan-tag push vlan <vid> p-bit copy
Push (set P-bit and DEI None vlan-tag push vlan <vid> p-bit profile <profile name>
according to CoS marking
profile)
Swap (copy P-bit and DEI) Push (set P-bit and DEI mark all
according to CoS marking vlan <vid>
profile)
exit
vlan-tag push vlan <vid> p-bit profile <profile name>
Swap (copy P-bit and DEI) Push (copy P-bit and DEI) mark all
vlan <vid>
exit
vlan-tag push vlan <vid> p-bit copy
Push (copy P-bit and DEI) Push (copy P-bit and DEI) vlan-tag push vlan <vid> p-bit copy inner-vlan <vid> p-
bit copy
Push (copy P-bit and DEI) Push (set P-bit and DEI vlan-tag push vlan <vid> p-bit profile <profile name>
according to CoS marking inner-vlan <vid> p-bit copy
profile)
Push (set P-bit and DEI Push (set P-bit and DEI vlan-tag push vlan <vid> p-bit profile <profile name>
according to CoS marking according to CoS marking inner-vlan <vid> p-bit profile <profile name>
profile), see Note below profile), see Note below
Note
Both VLAN editing actions must use the same CoS marking profile.
The TPID (Ethertype) editing policy for specific actions in E-Line topology is
detailed below:
• Push: TPID of the egress port
• Swap: TPID of the egress port
• Swap-push:
Swap: User-configured TPID. Default setting is 8100.
Push: TPID of the egress port
• Push-push:
Push 1: User-configured TPID. Default setting is 8100.
Push 2: TPID of the egress port
• Pop: Not relevant
• Pop-swap:
Pop: Not relevant
Swap: TPID of the egress port
• Pop-pop: Not relevant.
None –
Push (copy P-bit and DEI) vlan-tag push vlan <sp-vlan> p-bit copy
[tag-ether-type <tag-ether-type>]
Swap (copy P-bit and DEI) mark all vlan <vlan-value> p-bit copy [tag-
ether-type <tag-ether-type>]
None –
Push (copy P-bit and DEI) vlan-tag push vlan <sp-vlan> p-bit copy
Push (set P-bit and DEI according to CoS vlan-tag push vlan <sp-vlan> p-bit profile
marking profile) <marking-profile-name>
Swap (copy P-bit and DEI) mark all vlan <vlan-value> p-bit copy
Swap (set P-bit and DEI according to CoS mark all vlan <vlan-value> p-bit profile
marking profile) <marking-profile-name>
Note
• The VLAN editing options allowed at bridge port ingress also depend on the
configured flow classification method. Valid combinations are listed in
Table 8-42 and Table 8-43.
• VLAN tag swap is not available if the associated broadcast domain is
connected to a router interface.
The TPID (Ethertype) editing policy for specific actions in E-LAN topology is
detailed below:
• Bridge port egress push: TPID of the egress port
• Bridge port egress swap: TPID of the egress port
• Bridge port ingress push/swap: user-configured TPID. Default setting is 8100.
Table 8-42 details allowed combinations of flow classification method, ingress
VLAN editing action and flow VID for flows originating at directly-attached ports.
2 Pop (outer) None vlan-tag pop vlan Tagged packets only. This is the only
allowed action, when a router
interface is connected to a bridge
port.
3 Pop (outer) Pop (inner) vlan-tag pop vlan Double-tagged packets only. This
vlan-tag pop inner- action is not available, when a router
vlan interface is connected to a bridge
port.
1 None None –
2 Push (set P-bit None vlan-tag push vlan Tagged packets only. This is the only
and DEI <sp-vlan> p-bit profile allowed action, when a router
according to < marking-profile- interface is connected to a bridge
CoS marking name> port.
profile)
Note All bridge ports with flows originating from indirectly-attached ports and sharing
the same RIF broadcast domain (RIF over bridge/VLAN) must use the same VLAN
editing options.
TPID (Ethertype) editing policy for specific actions for internal router is detailed
below:
• Push:
If a router interface is connected to a physical port, TPID is copied from a
port TPID
If a router interface is connected to a bridge port, TPID is user-
configured. If TPID is not configured, default setting is used (8100).
• Push-push:
Inner tag: TPID is user-configured. If TPID is not configured, default
setting is used (8100).
Outer tag: TPID is copied from a port TPID.
SVI PW Editing
PW-type SVIs are considered to be untagged entities, inheriting their VLAN
properties from attached flows. Table 8-20 and Table 8-21 detail VLAN editing
options available for PW-type SVIs. VLAN editing option type at ingress must be
used with the similar option at egress, as detailed below:
• Ingress type 1 – egress type 1
• Ingress type 2 – egress types 3 and 4
• Ingress type 3 – egress type 3.
3 Pop (outer) Pop (inner) vlan-tag pop vlan vlan- Double-tagged packets only
tag-pop inner-vlan
3 Push (set P-bit Push (set P-bit vlan-tag push vlan PtP flows
and DEI according and DEI according <sp-vlan> p-bit profile
to CoS marking to CoS marking <marking-profile-name>
profile) profile) inner vlan <inner-sp-vlan>
p-bit profile <inner-
marking-profile-name>
Marking Profile
P-bit/DEI translation is further enhanced by using marking profiles that convert
CoS and packet color values into P-bit and DEI. ETX-5 supports up to 16 color-
aware and color-blind marking profiles:
• The color-aware profile translates CoS (0–7) and packet color (all, green,
yellow) into P-bit (0–7) and DEI (yellow, green) values
• The color-blind profile translates CoS (0–7) into P-bit (0–7) and DEI (yellow,
green 1) values.
Classifier Profiles
You can define up to 24K classifier profiles to apply to flows to ensure the
desired flow classification.
4. Using no before match deletes classification criteria, but does not delete the
classifier profile. A classifier profile can be edited only if it is not attached to
a flow.
5. no classifier-profile(<profile-name>) deletes classifier profile. A classifier
profile can be deleted only if it is not attached to a flow.
6. When you have completed specifying the criteria, enter exit to exit the
classifier profile context.
Examples
To create classifier profile with criteria VLAN 20 and inner VLAN 30:
ETX-5# configure flows classifier-profile v20_inner_30 match-any
ETX-5>config>flows>classifier-profile(v20_inner_30)$ match vlan 20 inner-vlan
30
ETX-5>config>flows>classifier-profile(v20_inner_30)$ exit all
Error Messages
Table 8-25 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
Classifier profile is in use and cannot be Classifier profile is being used by a flow. Remove the flow
changed/deleted association before attempting to delete or modify classifier
profile.
Invalid VLAN ID range Invalid VLAN ID range is selected for classifier profile
This profile is not supported Invalid classifier profile for the current classification key or port
type
Message Description
Classifier profile cannot use more than Only one match classification criteria is allowed per classifier
one match criteria for classification profile
Outer and inner VLAN classifier profile When configuring an outer and inner VLAN classifier profile, use
does not support outer VLAN range a single value for outer VLAN ID
Classifier profile: illegal range Invalid range of values for this classifier profile
Classifier profile: use of value range is This classifier profile supports a single value only
not allowed
Classifier profile cannot be added, max The maximum number of profiles (24K) has been reached and
number of profiles has been reached no additional classifier profiles can be added
Profile name must be unique The classifier profile name is not unique
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Configuring Flows
To configure flows:
1. Navigate to config>flows.
2. Enter flow <flow-name>.
If the flow already exists, the config>flows>flow(<flow-name>)# prompt
is displayed; otherwise the flow is created and the
config>flows>flow(<flow-name>)$ prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Associating the flow with a classifier <classifier-profile-name> no classifier removes the flow
classifier profile association with the classifier
profile
Specifying the ingress port ingress-port ethernet <slot/port> no ingress-port removes the flow
ingress-port lag <port-number> association with the ingress port
Specifying the egress port, and egress-port ethernet <slot/port> [queue-map-profile The queue map profile maps CoS to
the egress queue block and the <queue-map-profile-name> block <level_id/queue_id>] a queue. In ETX-5 it is permanently
queue within the block egress-port lag <port-number> [queue-map-profile set to 1:1 mapping (CoS 0 to queue
<queue-map-profile-name> block <level_id/queue_id>] 0 etc.)
egress-port svi <port-number><bridge | router | pw> If you intend to use an I/O card
port as an egress port for the flow,
egress-port mng-ethernet <slot/port>
verify that the port already has a
egress-port sap <slot/port/tributary> [queue-map- queue group profile attached to it.
profile <queue-map-profile-name> block
no egress-port removes the flow
<level_id/queue_id>]
association with the egress port
no egress-port
Associating the flow with a policer policer profile <policer-profile-name> no policer removes the flow
profile or policer aggregate policer aggregate <policer-aggregate-name> association with the policer.
Policer profiles can be
added/removed or replaced on the
fly. This action affects the flow
traffic.
Associating a Layer-2 control l2cp profile <l2cp-profile-name> L2CP profiles can be attached to
protocol profile with the flow certain types of flows, as detailed
in the Layer 2 Control Protocol
(L2CP) section below.
no l2cp profile removes the flow
association with the L2CP profile
Defining swapping actions for the mark Refer to the Table 8-24 for the
flow such as overwriting the VLAN swapping action descriptions
ID or inner VLAN ID or setting the
priority
Administratively enabling the flow no shutdown • You can activate a flow only if it
is associated at least with a
classifier profile, an ingress
port, and an egress port.
• Flows are created as inactive by
default.
• shutdown disables the flow.
Defining service ID name for its service-name <string> The flows that belong to the same
subsequent discovery by the NMS, service must be tagged in both
running RADview Performance directions
Monitoring portal
Notes:
PM collection mode must be the same for the following flows:
• Ingress and egress flows within the same VLAN domain connected to the same bridge-type SVI.
• Flows with VLAN + P-bit classification with ingress port located on a main card. In this case, flows using the same VLAN and
different P-bit values (0–7) are grouped together, having the same PM collection mode.
Use these guidelines, when configuring PM collection mode for such flows:
1. Prior to flow activation, verify that the flows have the same PM collection mode (enabled or disabled).
2. Activate the flows (no shutdown).
3. If you intend to change the PM collection mode, deactivate all relevant flows (shutdown), change PM collection mode for all of
them and reactivate the flows again.
Activating MAC swap loopback on test mac-swap<ingress-port | egress-port> no test disables the loopback.
the I/O port-to-SAP flow no test The active loopback is deactivated
if ETX-5 is reset.
Table 8-23 lists all VLAN pushing and popping actions supported by ETX-5. For
allowed combinations of VLAN editing for E-Line, E-LAN and router and PW SVIs,
see VLAN Editing above.
The following VLAN swapping (marking) actions can be performed at the mark
level in the config>flows>flow(flow-name)>mark# prompt.
Overwriting VLAN ID with a new vlan <vlan-value> no vlan disables the overwriting of
value VLAN ID
Overwriting P-bit with a new value p-bit <p-bit-value> no p-bit disables the overwriting of
P-bit
Overwriting inner P-bit with a new inner-p-bit <inner-p-bit-value > no inner-p-bit disables the
value overwriting of inner P-bit
Overwriting TPID with a new value tag-ether-type <tag-ether-type> no tag-ether-type disables the
overwriting of TPID
Overwriting inner TPID with a new inner-tag-ether-type <inner-tag-ether-type> no inner-tag-ether-type disables the
value overwriting of TPID
Overwriting inner P-bit according inner-marking-profile <inner-marking-profile-name> If a marking profile is used, it must
to marking profile be compatible with the classification
criteria of the flow.
If a color-aware marking profile is
applied for the outer VLAN of a flow,
then if marking is applied to the
inner VLAN, either the same
color-aware marking profile must be
used for the inner VLAN, or a
non-color-aware marking profile
must be used for the inner VLAN.
no marking-profile or
no inner-marking-profile disables the
overwriting of marking profile or
inner marking profile respectively
Displaying Statistics
ETX-5 collects the current performance monitoring data for the following flow
types:
• Point-to-point flows (E-Line) and multipoint (E-LAN) flows at the bridge port
ingress
• Multipoint (E-LAN) flows at the bridge port egress.
Note Interval statistic counters for flows are via RV-EMS Performance Management
portal. See the RV-EMS system manual. Enable statistic data collection, using the
pm-collection command.
Rx
-----------------------------------------------------------------------------
Packets Bytes
Total : 26858717 3384198342
Drop
-----------------------------------------------------------------------------
Packets Bytes
Total : 26657156 3358801656
Green : 26657156 3358801656
Yellow/Red : 0 0
Packets/Sec Bits/Sec
Total : 838377 845084016
Green : 838377 845084016
Yellow/Red : 0 0
Tx
-----------------------------------------------------------------------------
Packets Bytes
Total : 282067 35540442
Green : 282067 35540442
Yellow : 0 0
Packets/Sec Bits/Sec
Total : 6209 6258672
Green : 6209 6258672
Yellow : 0 0
Peak Measurement
-----------------------------------------------------------------------------
Minimum Maximum
Tx Bit Rate [bps] : 6143760 9326016
Drop Bit Rate [bps] : 658197792 859194000
To clear statistics:
• At the prompt config>flow>flow (number)#, enter clear-statistics.
Displaying Status
You can display current status of existing flows.
Operational Status : Up
Service Name : VOD
Status Details
-----------------------------------------------------------------------------
Ingress Port Oper Status : Up
Egress Port Oper Status : Up
Name Ingress Tx
Admin | Oper | Classification Egress Rx
mng_out SVI 1 0
Ena | Up | all MNG ETH main-a/0 0
8_10_1 SVI 8 0
Ena | Up | 10 Ethernet main-a/1 0
8_20_1 SVI 8 0
Ena | Up | 20 Ethernet main-a/1 0
8_30_1 SVI 8 0
Ena | Up | 30 Ethernet main-a/1 0
more..
Name : mng_in
Admin Status : Up
Operational Status : Up
PM : Disable
Service Name :
Test : Off
Classifier : untag
Name : mng_out
Admin Status : Up
Operational Status : Up
PM : Disable
Service Name :
Test : Off
Classifier : all
-----------------------------------------------------------------------------
Name : a1_l2cp
Admin Status : Up
Operational Status : Down
more..
Examples
The following examples show the configuration of point-to-point (E-Line) and
multipoint (E-LAN) flows.
4. Select classification keys for the I/O and main card ports.
5. Enable the I/O and main card ports.
6. Configure the policer profiles to distribute available bandwidth among flows
11–14.
7. Configure the CoS mapping profile to map user priorities to internal CoS
values.
8. Configure the color mapping profile to map user color to internal color values.
9. Configure six classifier profiles:
Four profiles for traffic from I/O card to SAP
One profile for traffic from SAP to main card
One profile for traffic from main to I/O card.
10. Configure six flows:
Four flows from I/O card port to SAP with per-flow policing, CoS and color
mapping
One flow from SAP to main card port, push S-VLAN to this flow with S-VID
P-bit and DEI values set by a marking profile
One returning flow from main card port to I/O card port, pop S-VLAN.
#***************************Defining_Policer_Profiles************************
config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0
config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0
config qos policer-profile "3" bandwidth cir 10000 cbs 10000 eir 100000 ebs
64000
config qos policer-profile "4" bandwidth cir 55000 cbs 10000 eir 100000 ebs
64000
exit all
#*********************************End****************************************
#***************************Assigning_Queue_Groups***************************
config port ethernet main-a/1 queue-group profile 3level_1
config port ethernet 1/1 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
exit all
#*********************************End****************************************
#***************************Selecting_Classification_Key*********************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
exit all
#*********************************End****************************************
#***************************Enabling_Ports***********************************
config port ethernet main-a/1 no shutdown
config port ethernet 1/1 no shutdown
exit all
#*********************************End****************************************
#***************************Configuring_Classifier_Profiles******************
#************************Configuring_CoS_Mapping_Profile*********************
config qos cos-map-profile cosvzb classification p-bit
map 0 to-cos 6
map 1 to-cos 5
map 2 to-cos 5
map 3 to-cos 5
map 4 to-cos 5
map 5 to-cos 4
map 6 to-cos 0
map 7 to-cos 0
exit all
#*********************************End****************************************
#**************************Configuring_Color_Mapping_Profile*****************
config qos color-map-profile color_all_green classification p-bit
map 0 to green
map 1 to green
map 2 to green
map 3 to green
map 4 to green
map 5 to green
map 6 to green
map 7 to green
exit all
#*********************************End****************************************
#*****************Configuring_Marking_Profile *******************************
#*********************************End****************************************
#****************************************************************************
#***************************Configuring_Flows********************************
#****************************************************************************
#********************Configuring_EVC.CoS_Flows_from_I/O_to_SAP***************
configure flows flow 11
classifier class100pbit6
cos-mapping profile cosvzb
ingress-color profile color_all_green
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 1
no shutdown
exit all
no shutdown
exit all
#********************Configuring_EVC_Flow_from_SAP_to_Main_Card**************
configure flows flow 15
classifier match-all
ingress-port sap 1/1/1
egress-port ethernet main-a/1 queue-map-profile QueueMapDefaultProfile block
0/1
vlan-tag push vlan 300 p-bit profile mark1
no shutdown
exit all
#********************Configuring_Flow_from_Main_to_I/O_Card******************
Multipoint Service
This section provides an example of configuring an E-LAN application built on a
four-port bridge with all bridge ports sharing the same VLAN domain (VLAN 10).
Figure 8-6 shows the flows to be configured for this application.
#***********************Assigning_Queue_Group_Profiles***********************
config port ethernet main-a/1 queue-group profile q_group_2_level_default
config port ethernet 1/1 queue-group profile q_group_2_level_default
config port ethernet 1/2 queue-group profile q_group_2_level_default
config port ethernet 1/3 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
exit all
#*********************************End****************************************
#****************************Selecting_Classification_Key********************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
config port ethernet 1/2 classification-key vlan p-bit
config port ethernet 1/3 classification-key vlan p-bit
exit all
#*********************************End****************************************
#****************************Enabling_Ports**********************************
config port ethernet main-a/1 no shutdown
config port ethernet 1/1 no shutdown
config port ethernet 1/2 no shutdown
config port ethernet 1/3 no shutdown
exit all
#*********************************End****************************************
#****************************Configuring_Classifier_Profile******************
config flows classifier-profile class10 match-any
match vlan 10
exit all
#*********************************End****************************************
#***************************Configuring_COS_Mapping_Profile******************
config qos color-map-profile color1 classification p-bit
exit
#*************************Defining_Bridge_SVIs*******************************
#*************************Binding_Bridge_Ports_to_SVIs***********************
config bridge 1 port 1
bind svi 11
exit all
#************************Configuring_Flows_to/from_Bridge_Port_1*************
config flows flow 100
classifier class10
ingress-port ethernet main-a/1
egress-port svi 11
ingress-color profile color_all_green
cos-mapping profile cos1
no shutdown
exit all
#************************Configuring_Flows_to/from_Bridge_Port_2*************
#************************Configuring_Flows_to/from_Bridge_Port_3*************
config flows flow 105
classifier class10
ingress-port ethernet 1/2
egress-port sap 1/1/2 queue-map-profile QueueMapDefaultProfile block 0/1
ingress-color profile color_all_green
cos-mapping profile cos1
no shutdown
exit all
#************************Configuring_Flows_to/from_Bridge_Port_4*************
config flows flow 108
classifier class10
ingress-port ethernet 1/3
egress-port sap 1/1/3 queue-map-profile QueueMapDefaultProfile block 0/1
ingress-color profile color_all_green
Configuration Errors
Table 8-25 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
Ethertype tag is unknown, setting Not a valid value for the Ethertype tag
failed
L2CP profile does not exist The L2CP profile cannot be assigned to the flow because the profile
has not been defined
Flow creation failure: max number of The maximum number of flows (24K) has been reached and no
flows reached flows can be added
Flow is in use The current flow is being used and cannot be deleted or modified
Active MIP is defined on the flow, A flow cannot be shut down if it has a MIP assigned to it
shutdown failed
Active MEP is defined on the flow, A flow cannot be shut down if it has a MEP assigned to it
shutdown failed
SVI is not configured An SVI must be defined before a flow can be bound to it
Illegal flow-SAG combination in policer The policer profile cannot be used because not all of its flows are
aggregate profile bound to the same SAG
Max number of flows per policer The maximum number of flows per policer aggregate (16) has been
aggregate profile has been reached reached and no flows can be added to the profile
Classifier profile is not attached The required classifier profile has not been attached to the flow
Message Description
CoS or color profile is missing The CoS or color profile has not been assigned to a flow
CoS or color profile are unnecessary The CoS or color profile cannot be attached to an ingress flow,
originating from a TDM port
CoS and color profile mismatch A discrepancy between the CoS and color mapping methods
Illegal CoS method Invalid CoS mapping method for the current flow type or ingress
color mapping method
Illegal color method Invalid color mapping method for the current flow type or ingress
CoS mapping method
Port classification key and CoS Invalid combination of port classification key and CoS mapping
method mismatch method
Port classification key and color Invalid combination of port classification key and color mapping
method mismatch method
Max number of CoS or color profiles The maximum number of CoS or color profiles per I/O card (36) has
for I/O card has been reached been reached and no profiles can be added to flows originating
from the I/O card
Max number of color profiles for I/O The maximum number of color profiles per I/O card (36) has been
card has been reached reached and no profiles can be added to flows originating from the
I/O card
Policer is not supported Policer and policer aggregate profiles can be attached to flows
originating from indirectly-attached ports only
Flow is in use, change failed The flow is being used and cannot be modified
Ingress I/O card port does not match Mismatch between ingress port of the flow and SAG number
SAG
Mismatch between flow SVI (B) and Flows originating from the same bridge-type SVI must terminate in
egress port the same port
Mismatch between flow SVI (B) and Flows originating from the same bridge-type SVI must terminate in
egress slot the same slot
Inner editing action error Invalid editing action for inner VLAN
Outer editing action error Invalid editing action for outer VLAN
Inner + outer editing action error Invalid editing action for inner and outer VLANs
Inner + outer editing action error for Invalid editing action for inner and outer VLANs on a flow in
bridge service multipoint service
Inner + outer editing action error for Invalid editing action for inner and outer VLANs on a flow in
P2P service point-to-point service
Inner + outer editing action error for Invalid editing action for inner and outer VLANs on a flow in Layer-3
router service service
Classification + editing error for Invalid classification and VLAN editing action on a flow in multipoint
bridge service service
Bridge port is not a member of The bridge port must be a member of an outer VLAN of the frame
identified VLAN remaining at the entrance to the bridge port
Message Description
VLAN editing error for a P2P flow Invalid VLAN editing action for a point-to-point flow starting from
starting from PW SVI PW-type SVI
Editing of ingress I/O flows is not Cannot perform VLAN editing on ingress I/O flows
allowed
Max number of L2CP profiles bound The maximum number of L2CP profiles per port (4, including
to a port has been reached default) has been reached and no profiles can be added
Max number of L2CP profiles bound The maximum number of L2CP profiles per flow (1) has been
to a flow has been reached reached and no profiles can be added
Ingress port has not been defined yet The ingress port selected for a flow has not yet been defined
Egress port has not been defined yet The egress port selected for a flow has not yet been defined
Ingress LAG port has less than 2 ports If a LAG serves as a flow ingress port, it must have two ports
bound to it assigned to it
Egress LAG port has less than 2 ports If a LAG serves as a flow egress port, it must have two ports
bound to it assigned to it
Number of ingress SAPs has been Cannot define a SAP as an ingress port for a flow if the SAP number
exceeded is higher than 1024
Number of egress SAPs has been Cannot define a SAP as an egress port for a flow if the SAP number
exceeded is higher than 1024
Specified queue group does not exist A queue group assigned to a flow has not yet been defined
Classification type is not valid for the A discrepancy between the classification key of port and the
ingress port classification method of the flow
Classification type cannot include P- The P-bit classification cannot be used for flows originating from
bit bridge-type SVIs
Max number of port-based flows per The maximum number (128) of port-based flows per SAG has been
SAG has been exceeded exceeded
Max number of VLAN-based flows per The maximum number (128) of VLAN-based flows per SAG has been
SAG has been exceeded exceeded
Classification type must be VLAN or Only VLAN or Inner VLAN classification is allowed
Inner VLAN
Classification type must be VLAN, Only VLAN, Inner VLAN or Match All classification is allowed
Inner VLAN or Match All
Classification type must be Match All Only Match All classification is allowed for flows originating from
for ingress port SVI (R) router-type SVI
Classification type must be Match All Only Match All classification is allowed for flows originating from
for ingress port SVI (PW) PW-type SVI
Message Description
Classification type must be Match All Only Match All classification is allowed for point-to-point flows
for P2P SAP flow originating from SAP
VLAN number is out of limit VLAN number exceeded maximum allowed value
Other classification type already Another classification type has already been defined for the VLAN.
defined for the VLAN Source MAC, destination MAC, source IP, destination IP and
Ethertype classifications must be unique per VLAN.
Classification entry already exists for Another type of classification entry already exists for the port. The
the P-bit classification type must be unique for the port.
Only single VLAN is allowed for this VLAN ranges are not allowed for the selected classification type
classification type
Only single VLAN is allowed for SVI VLAN ranges are not allowed for flows terminating in router- or
router/bridge egress port bridge-type SVIs
Only single VLAN is allowed for SVI VLAN ranges are not allowed for flows originating from router- or
router/bridge ingress port bridge-type SVIs
Only single MAC is allowed for this MAC ranges are not allowed for the selected classification type
classification type
Only single IP is allowed for this IP ranges are not allowed for the selected classification type
classification type
Only single P-bit is allowed for this P-bit ranges are not allowed for the selected classification type
classification type
Only one P-bit range is allowed for A single P-bit is not allowed for the selected classification type
this classification type
Standards
IEEE 802.3
Benefits
ETX-5 offers high flexibility in handling L2CP packets. According to application
requirements, these packets can be tunneled, tunneled with MAC swap,
discarded, or trapped to the host CPU.
Factory Defaults
By default, a “tunnel all” profile is attached to every port. However, no default
L2CP profile is attached to a newly created flow, meaning the flow traffic
behaves, by default, according to the port profile.
Functional Description
ETX-5 handles Layer-2 control protocol traffic on a per-port and/or a per-flow
basis. If no per-flow L2CP profile is configured, a per-port-level profile is used. It
affects both tagged and untagged L2CP frames.
L2CP traffic is processed using a two-stage mechanism comprising per-port or
per-flow profiles (set of rules for traffic handling). In total, ETX-5 supports up to
16 L2CP profiles:
• Up to 4 (including default) port-level and a single flow-level profiles can be
defined on directly-attached ports
• Up to 32 different addresses/protocols can be selected per L2CP profile.
If no default action is configured for an unspecified address or protocol, this
traffic is tunneled.
Note If an L2CP profile has been attached to a port or a flow, the profile cannot be
deleted or modified.
Note • PAUSE frames (01-80-C2-00-00-01) are not part of L2CP profiles. They are
either peered or discarded according to the flow control setting of a port.
• Peer action at flow level is supported only for 01-80-C2-00-00-02 frames
(LACP, marker protocol, SSM).
L2CP profiles are configured at the port, and, optionally, at the flow level.
According to per-port or flow L2CP profiles, ETX-5 performs the following:
Specifying the L2CP action for MAC mac <mac-addr-last-byte-value-list> {discard | tunnel | discard – L2CP frames are
addresses (discard, tunnel, or peer) peer} discarded
tunnel – L2CP frames are
forwarded across the network
as ordinary data
peer –ETX-5 peers with the user
equipment to run the protocol.
L2CP frames are forwarded to
the ETX-5 CPU. Unidentified
L2CP frames are forwarded
across the network as ordinary
data. The peer actions are
supported at the flow level
only.
no mac
<mac-addr-last-byte-value-list>
removes the action for the
specified MAC address
Defining a loopback protocol for Typing no protocol loopback
protocol loopback discard
removes the action for the
discarding
Loopback protocol.
Specifying the protocols in which protocol { lacp | stp | vtp | cdp | lldp | pvstp| pagp | udld | protocol – list of L2CP protocols
MAC swap is desired dtp} tunnel mac-change [<mac-address>] in which L2CP MAC swap is
required
mac-address – the MAC address
to be used as an alternative to
the original MAC. The mac-
address configured should be
multicast MAC. This is an
optional parameter, its default
value is 01-00-0C-CD-CD-D0.
The last mac-address
configured is the MAC used.
Typing no protocol { lacp | stp |
vtp | cdp | lldp | pvstp| pvstp |
pagp | udld | dtp } removes the
action for the specified
protocol.
Examples
To add L2CP profile named layer2ctrl1 with peer action:
ETX-5# configure port
ETX-5>config>port# l2cp profile layer2ctrl1
To add L2CP MAC swap configuration for layer2ctrl1 profile on stp packets
ETX-5>config>port>l2cp-profile(layer2ctrl1)# protocol stp tunnel mac-change
01-23-45-67-89-DD
Configuration Errors
Table 8-32 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
Cannot add MAC address: Max number of Cannot specify an L2CP processing action for a MAC address
MAC addresses has been reached because the maximum number of addresses has been reached
Illegal L2CP processing action for this The L2CP processing action selected for the current MAC
MAC address type address type is not valid
Illegal MAC address for peer action The MAC address selected for the peer processing action is not
valid. The address must be 01-80-C2-00-00-02.
Invalid L2PT protocol An invalid protocol was used to configure the L2CP MAC swap.
L2CP MAC swap available only on IO The L2CP MAC swap is not supported for ports that are not IO
ports ports.
L2CP MAC swap not available on flows L2CP MAC swap can only be configured for ports.
L2CP profile creation failure: Max number The L2CP profile cannot be added because the maximum number
of L2CP profiles has been reached of L2CP profiles has been reached
L2CP profile deletion/modification The L2CP profile cannot be deleted or modified because it is
failure: L2CP profile is in use currently attached to a port or a flow
L2CP profile does not exist Cannot bind an L2CP profile that has not yet been created
Only tunnel supported MAC change An invalid action was used to configure the L2CP MAC swap.
Peer action is not allowed for port- An L2CP profile bound to a port cannot perform a peer action
bound L2CP profile
For 1GbE IO ports, only the number of encapsulated packets for each protocol is
displayed.
ETX-5300A>config>port>eth(1/1)# show l2cp-statistics
Protocol Encapsulated Decapsulated
LACP 0 0
STP 0 0
CDP 0 0
VTP 0 0
Standards
IEEE 802.1AB-2009
IEEE 802.3az-2010
Benefits
Automated discovery of devices simplifies management and network
maintenance, and reduces general setup costs of new equipment.
Functional Description
LLDP is a neighbor discovery protocol that enables network devices to advertise
information to peer devices on the same physical LAN and store information
about the network. LLDP is supported for all Ethernet ports, including the
management port. LLDP information is exchanged by means of LLDP packets.
LLDP Packets
LLDP packets are sent periodically between ETX5 and neighboring devices, in
order to obtain neighbor information. The information from the LLDP packets is
stored for a period of time, determined by the time-to-live (TTL) value in the
received packet. When the TTL expires, the LLDP information is discarded.
LLDP packets contain the following information:
• Destination MAC address – Set to 01-80-C2-00-00-0E
• Source MAC address – Set to port MAC address
• Ether Type – Set to 0x88CC
• LLDP Protocol Data Unit (LLDPDU) – contains a variable number of
information units called TLVs: mandatory TLVs, optional TLVs, and an
EndOfLLDPDU TLV. LLDPDUs are always sent untagged. TLVs consist of basic
management TLVs and organizationally specific TLVs. The organizationally
specific TLVs are differentiated by IEEE 802.1 ,IEEE 802.3, etc.
Factory Defaults
By default, no LLDP parameters are configured for ports. The system LLDP
parameters have the default values shown in the following table.
bridge-type nearest-bridge
Configuring LLDP
This section explains how to define LLDP and enable LLDP Packet Data Unit
(LLDPDU). ETX-5 supports up to 90 LLDP connections.
LLDP parameters are configured at the following levels:
• Global LLDP parameters that apply to the entire device are configured at the
system level
• Port LLDP parameters are configured at the Ethernet port, to specify which
TLVs to send for the port.
LLDP Traffic
To ensure correct distribution of LLDP traffic, you must configure a L2CP profile
with peer action at the port or flow level. The peer must be directed to the LLDP
address (01-80-C2-00-00-0E).
When configuring the L2CP profile at the flow level, the flow must have the
following attributes:
• Untagged classification
• Ingress port – LLDP required port
• Egress port – according to application requirements.
If you use the flow only to peer the LLDP frames and do not need to forward the
untagged traffic, discard it, using the drop command on the flow.
Port/SAP Connection
When configuring LLDP between ports on the E5-GBE-20 or E5-10GBE-2 cards,
follow these guidelines for establishing flows between the LLDP port and the
SAP:
• Connect LLDP Port to a SAP, belonging to the first 10-port group
(SAP slot/1/x) and then use second flow to Connect to the
The figure below illustrates LLDP flows in IO cards.
Note If the L2CP is configured on the relevant LLDP port, the flows for LLDP should not
be created.
System Parameters
This section explains how to configure global parameters such as bridge type, as
well as enable or disable LLDP for the device.
Enabling or disabling LLDP for device shutdown Enter no shutdown to enable LLDP
Port Parameters
This section explains how to configure which TLVs to transmit for the port for the
different LLDP bridge types (seeTable 8-33 to Table 8-35 for details on TLVs).
Specifying transmission mode in nearest-bridge-mode {tx | rx | tx-rx} • tx: Transmit LLDP packets
nearest bridge mode • rx: Receive LLDP packets
• tx-rx: Transmit and receive
LLDP packets
Example
Examples below illustrate how to configure different types of LLDP.
To configure LLDP on Main Card Ports (with L2CP profile over port).
#*********************************Configuring_LLDP in system*****************
#***************************Configuring_L2CP_Profile*************************
configure port l2cp lldp
mac 01-80-c2-00-00-0e peer
exit all
#*****************************Configuring_LLDP in port***********************
exit all
#***************************** Assigning l2cp profile************************
configure port ethernet main-a/1 l2cp profile lldp
#***************************Assigning_Queue_Group_Profile********************
configure port ethernet main-a/1 queue-group profile q_group_2_level_default
#*****************************Enabling_Ethernet_Ports************************
#*********************************End****************************************
To configure LLDP on Main Card Ports (with L2CP profile over flow):
#*********************************Configuring_LLDP in system*****************
#*****************************Configuring_LLDP in port***********************
nearest-bridge-basic-management sys-capabilities
nearest-bridge-basic-management port-description
nearest-bridge-basic-management management-address
nearest-bridge-802.3 max-frame-size
nearest-bridge-802.3 mac-phy-configuration
802.1-protocol-identity lldp
802.1-protocol-identity efm
802.1-protocol-identity cfm
802.1-protocol-identity lag-lacp
802.1-protocol-identity rstp-mstp
802.1-protocol-identity erp-v2
exit all
#***************************Assigning_Queue_Group_Profile********************
configure port ethernet main-a/3 queue-group profile q_group_2_level_default
configure port ethernet main-a/1 queue-group profile q_group_2_level_default
#*****************************Enabling_Ethernet_Ports************************
#************************Configuring_Classifier_Profiles*********************
#***************************Configuring_L2CP_Profile*************************
configure port l2cp lldp
mac 01-80-c2-00-00-0e peer
exit all
#***************************Configuring_Flows********************************
configure flows flow 1
classifier classunt
ingress-port ethernet main-a/1
egress-port ethernet main-a/3 queue-map-profile QueueMapDefaultProfile block
0/1
l2cp profile lldp
no shutdown
exit all
#*********************************End****************************************
bridge-type nearest-bridge
no shutdown
exit all
#***************************Configuring_L2CP_Profile*************************
configure port l2cp lldp_io
mac 01-80-c2-00-00-0e peer
exit all
#*****************************Configuring_LLDP in port***********************
exit all
#***************************** Assigning L2CP profile************************
configure port ethernet 1/10 l2cp profile lldp_io
#***************************Assigning_Queue_Group_Profile********************
configure port ethernet 1/10 queue-group profile q_group_2_level_default
#*****************************Enabling_Ethernet_Ports************************
#*********************************End****************************************
#*********************************Configuring_LLDP in system*****************
#*****************************Configuring_LLDP in port***********************
nearest-bridge-mode tx-rx
nearest-bridge-basic-management sys-description
nearest-bridge-basic-management sys-name
nearest-bridge-basic-management sys-capabilities
nearest-bridge-basic-management port-description
nearest-bridge-basic-management management-address
nearest-bridge-802.3 max-frame-size
nearest-bridge-802.3 mac-phy-configuration
802.1-protocol-identity lldp
802.1-protocol-identity efm
802.1-protocol-identity cfm
802.1-protocol-identity lag-lacp
802.1-protocol-identity rstp-mstp
802.1-protocol-identity erp-v2
exit all
#***************************Assigning_Queue_Group_Profile********************
#*****************************Enabling_Ethernet_Ports************************
#***************************Configuring_Classifier_Profiles******************
#***************************Configuring_L2CP_Profile*************************
configure port l2cp lldp_io
mac 01-80-c2-00-00-0e peer
exit all
#***************************Configuring_Flows********************************
exit all
#*********************************End****************************************
8.7 Peers
Remote devices that are destinations for pseudowire traffic or serve as a
grandmaster for 1588v2 slave clock entities are referred to as peers.
Factory Defaults
By default, there are no peers in the ETX-5 system.
Benefits
Peers serve as destinations for pseudowire connections for transporting a TDM
payload over packet-switched networks. In addition, they are configured to be
sources for the master clock used by 1588v2 slave entities.
Functional Description
Peers are remote devices operating opposite router interfaces. You can define up
to 1334 peers for pseudowire or 1588v2 traffic, with each assigned a unique
index number. The index number is used to specify the pseudowire destination,
instead of directly providing the necessary destination information. To configure
a UDP/IP peer, you must provide its IP address. For MEF-8 peers, you must specify
the MAC address of the destination device.
Example
To configure remote peer 1 for UDP/IP PSN:
• IP address: 9.9.9.9
• Name: peer1.
ETX-5>configure peer 1 ip 9.9.9.9 name peer1
Configuration Errors
Table 8-36 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
Peer is in use: Peer cannot be updated if Cannot modify a peer that is being used by a pseudowire
used
Peer is in use: Peer cannot be removed if Cannot delete a peer that is being used by a pseudowire
in use
Peer set failed: Maximum number of Cannot create a peer because the maximum number of
targeted peers already configured pseudowire peers (1334) has been reached
Peer set failed: Peer IP must not be a IP address of pseudowire peer on UDP/IP network cannot be
multicast IP multicast
Peer set failed: Maximum number of Cannot create a peer because the maximum number of
peers already configured pseudowire peers (1334) has been reached
Peer set failed: Peer name too long Peer name has exceeded the maximum allowed number of
characters (32)
8.8 Router
The ETX-5 static router is a Layer-3 interworking device that forwards traffic
between its interfaces. The router is also used as a forwarding plane for UDP/IP
TDM pseudowires and 1580v2 entities, as well as acting as a forwarding plane for
IPv4 and IPv6 packets. Any flow related to IP forwarding, management traffic, or
timing must be via an SVI or PPP that is bound to a router interface.
Standards
RFC 4292
Benefits
The router is used for segmenting a LAN, increasing network performance, and
making packet forwarding more efficient.
Factory Defaults
By default, there is one router instance in the ETX-5 system.
Functional Description
The ETX-5 static router is an internal interworking device that forwards traffic
between its interfaces. ETX-5 supports a single router instance with up to 128
router interfaces (RIFs), up to 1K of routing table and up to 1000 ARP table
entries.
Each router interface can be assigned up to 10 IP addresses (IPv4 and IPv6) and
can be bound to one of the following:
• Physical port on Ethernet I/O or main card
• Bridge port
• Virtual loopback address on a router interface on a TDM pseudowire card for
UDP/IP forwarding or IEEE 1588v2 master or slave entity.
A router interface can be activated only if it has active ingress and egress flows
connected to it. Likewise, to delete or deactivate flows connected to a router SVI,
the RIF must be deactivated first.
ETX-5 supports IPv6 for device management.
Note 1588 UDP/IP and UDP/IP TDM PW are not supported for IPv6
Each RI supports dual stack forwarding, i.e concurrent IPv4 and IPv6 forwarding.
Each router interface can simultaneously support both IPv4 and IPv6 packets.
Each packet is forwarded per the Routing table according to packet type (IPv4 or
IPv6). Multiple IP addresses (IPv4, IPv6) are supported per Router interface.
Note The section of RFC-4213 related to “Configured tunneling of IPv6 over IPv4” is
not supported.
Router Scaling
ETX-5 supports:
• Up to 128 Router interfaces per shelf
• Up to 10 IP addresses per RI (IPV4 & IPv6)
• Up to 1k ARP table entries for IPv4
• Up to 1k IPv4 routing table entries
• Total of 512 entries are supported for:
IPv6 router interfaces
IPv6 routing
IPv6 neighbors (IPv6 “ARP”)
• A single RIF on the same broadcast domain ( one RIF per SVI)
When adding Layer-3 services to Layer-2 topology, such as G.8032 Ethernet ring,
a router interface must be connected to a bridge port. Such connections are also
made via SVIs. Figure 8-29 illustrates a RIF-to-BP connection.
ETX-5
SVI LB IP
User RIF Router
NET
RIF
SVI
SVI
SVI
SVI BP SVI
User BP BP OOB
Bridge
User BP BP NET
SVI SVI
Management
ETX-5 can be managed via any router interface, if it is configured to accept
management traffic. RIF management modes are as follows:
• Disabled
• Enable
• Allow only ping
Port Loopback
See section 8.1
Notes To enable connection of UDP/IP PW and/or 1588v2 PTP traffic, the TDM
pseudowire cards and 1588v2 agents on the main cards must be allocated the
same IP addresses as the corresponding loopback RIFs. Loopback router
interfaces must be configured prior to using them for TDM PW or 1588v2 traffic.
Configuring the static route and static-route The next hop must be a subnet
the next gateway (next hop) <IP-address/IP-mask-of-static-route> of one of the router interfaces
using the next hop’s IP address address <IP-address-of-next-hop>
[metric <metric>]
The following marking actions can be performed at the interface level, at the
config>router(1)>interface(interface_number)# prompt.
Binding router interface to an bind svi <port-number> no bind removes RIF link to SVI
SVI or out-of-band management bind mng-ethernet <slot/port> or management Ethernet port
Ethernet port
no bind
IP Address : 15.15.15.124/24
Default Router : --
Example
Figure 8-30 and script below illustrate configuration of router with one router
interface connected to a bridge port.
SVI
6
Port 1 Fl. 9 Port 1
SVI Fl. 11
BP 2
Fl. 10 7
BP 3 Fl. 12
SVI Bridge
5
Port 2 Port 2
BP 1
Fl. 1
Fl. 7
#*********************Assigning_Queue_Group_Profiles*************************
config port ethernet main-a/1 queue-group profile q_group_2_level_default
config port ethernet main-a/2 queue-group profile q_group_2_level_default
config port ethernet main-a/3 queue-group profile q_group_2_level_default
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet main-b/2 queue-group profile q_group_2_level_default
exit all
#*********************************End****************************************
#***************************Configuring_SVIs*********************************
config port svi 1 router
exit all
#************************Configuring_Bridge_Ports****************************
config bridge 1 port 1
bind svi 5
no shutdown
exit all
config bridge 1
vlan 20
tagged-egress 1..3
exit all
#*********************************End****************************************
#***********************Configuring_Classifier_Profiles**********************
config flows classifier-profile classall match-any
match all
exit all
#***********************Configuring_Marking_Profile**************************
config qos
marking-profile mark1 classification cos color-aware green-yellow dei mapping
mark 0 green to 0 dei green
exit all
#*********************************End****************************************
#*******************Configuring_Router_Interfaces****************************
configure router 1 interface 1
address 10.10.52.1/24
bind svi 1
no shutdown
exit all
configure router 1
static-route 10.10.30.0/24 address 10.10.52.2
exit all
#*********************************End****************************************
Configuration Errors
Table 8-46 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
The interface table is not empty Router cannot be deleted if at least one RIF exists in the system
The ARP table is not empty Router cannot be deleted if its ARP table is not empty
Cannot add router, maximum number of The maximum number of routers (1) has been reached
routers is reached
Wrong value for set Invalid parameter value (e.g., invalid IP address, invalid IP
address type)
Wrong length for string The maximum number of characters in router name has been
exceeded
The static route table is not empty Cannot shut down or delete a RIF if it is still in use by a static
route
Cannot set value when interface is active Cannot change a RIF parameter (IP address/mask, DHCP,
management access, VLAN etc) when a RIF is active
Cannot add interface, maximum number Cannot add a new RIF if the maximum number of RIFs has been
has been reached reached or the RIF IP address/mask overlaps the subnet of an
existing RIF
The interface must have an IP mask RIF IP mask has not been configured
assigned to it
Wrong IP address for interface, in the Invalid RIF IP address is for the current subnet (first/last address
current subnet of the subnet or 0.0.0.0)
This address already exists in a static A static route with the same destination IP address and the
route entry same cost (metric) has already been added
This interface already created with Cannot change RIF type when RIF is active
different loopback argument
The interface must have an IP address Cannot activate a RIF with no IP address assigned to it
assigned to it
The interface must be bound first Cannot activate a RIF which has not yet been bound to a port
The values for the IP address and the Destination IP address and IP mask of a static route do not
mask must be consistent match
Wrong value for priority The metric value (cost) of a static route is out of range (1–255)
The address must be an IP address in the The next hop of a static route is not in the subnet of any
local network existing RIF
The interface number is not a router Destination RIF defined for a static route does not exist
interface of this router
The interface must be bound to a P2P Destination RIF defined for a static route must be bound to a
port P2P port
Cannot add static route, maximum The maximum number of static routes has been reached
number has been reached
Message Description
The address must be different from a The next hop IP address of a static route must be different from
router interface IP address a RIF IP address
Standards
• Structure-Aware Time Division Multiplexed (TDM) Circuit Emulation Service
over Packet Switched Network (CESoPSN), RFC 5086
• Structure-Agnostic Time Division Multiplexing (TDM) over Packet (SAToP), RFC
4553
• MEF 8, Implementation Agreement for the Emulation of PDH Circuits over
Metro Ethernet Networks, October 2004
• ITU-T Recommendation Y.1453 (03/2006), TDM-IP interworking – User plane
interworking
• Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit
Connectivity Verification (VCCV), draft-ietf-pwe3-vccv-bfd-05
• Pseudo Wire (PW) OAM Message Mapping, draft-ietf-pwe3-oam-msg-map-10
• Definitions of Textual Conventions for Pseudowire (PW) Management, RFC
5542
• Pseudowire (PW) Management Information Base (MIB), draft-ietf-pwe3-pw-
mib-14
• Managed Objects for TDM over Packet Switched Network (PSN), draft ietf
pwe3 tdm mib 11
• ITU-T Recommendation G.823 (03/2000), The control of jitter and wander
within digital networks which are based on the 2048 kbps hierarchy
• ITU-T Recommendation G.824 (03/2000), The control of jitter and wander
within digital networks which are based on the 1544 kbps hierarchy.
Factory Defaults
By default, there are no pseudowire connections in the ETX-5 system.
Benefits
Pseudowire circuit emulation technology enables packet-based infrastructure to
provide TDM services with the service quality of an SDH/SONET network.
Functional Description
The pseudowire services convert TDM payload to packets and transfer these
packets through Layer-2 (E-Line, E-LAN) or Layer-3 (router) services.
The pseudowire subsystem is located on the E5-cTDM-4 card (four channelized
STM-1/OC-3 ports with 63 E1 or 84 T1 channels per port) or the E5-cTDM-1 card
(one channelized STM-4/OC-12 port with 252 E1 or 336 T1 channels). The traffic
to the internal E1/T1 ports is directed by means of a pseudowire cross-connect
matrix (a timeslot cross-connect matrix similar to the TDM cross-connect matrix),
which routes traffic from the internal ports to the pseudowire packet processors
with total capacity of up to 336 pseudowires per card and 1344 per chassis.
Note For additional information on the ETX-5 pseudowire system, see also Link Layer
Discovery Protocol (LLDP) and Cross-Connection.
Ethernet Header
Control Word
Ethernet Header
The Ethernet header contains the DA, SA and Ethernet type information. It may
also contain an optional VLAN tag.
UDP over IP
For UDP/IP-type PSN, the Ethernet header is as follows:
• SA MAC – MAC address of the router interface used for packet forwarding
• DA MAC – MAC address of the resolved next hop, default gateway or host
• VLAN –VLAN assigned to the router interface used for packet forwarding
• P-bit – CoS of PW is set to 1. P-bit is a RIF attribute (CoS > P-bit).
MEF-8
For the MEF-type PSN, the Ethernet header is as follows:
• SA MAC – MAC address of the E5-cTDM-4 card
• DA MAC – MAC address of the peer
• VLAN – Flow (E-Line/E-LAN) VLAN
• P-bit – CoS of PW is set to 1. P-bit is a flow attribute (marking profile, CoS >
P-bit)
• Packet color – green.
UDP over IP
For UDP/IP-type PSN, the TDM-PW packet structure is as follows:
6 6 2 2 2 20 8 4
Type VLAN Type UDP
DA SA IP Header CW TDM Payload
8100 Tag 800 Header
Where:
• DA – MAC address of the next hop (taken from the forwarding table)
• SA – MAC address of the applicable router interface
• VLAN type 0x8100 + VLAN tag, optional
• Type – 0x800 (IP packet)
• IPv4 Header – the protocol field of the IP header is set to 17 (UDP)
• UDP Header – the PW label/s, manually configured (see below)
For UDP/IP-type PSN IP, the TOS byte in the IP header can be configured per PW.
The UDP header is used to multiplex between the different PWs. UDP port values
are as follows:
• UDP Source Port – source PW label (1 to 8191) + 49152
Note The constant value of 49152 is added to the PW labels configured by the
operator. It is inserted in the outgoing packet at the UDP ports fields. For
example, a PW label ‘1’ is transmitted as port ‘49153’.
MEF-8 (CESoETH)
For MEF-8-type PSN, the TDM-PW packet structure is as follows:
6 6 2 2 2 4 4
Type VLAN Type
DA SA ECID CW TDM Payload
8100 Tag 88D8
Where:
• DA – MAC address of the peer device
• SA – MAC address of the associated SVI (per E5-cTDM-4 card)
• VLAN type 0x8100 + VLAN tag, optional
• Type – 0x88D8 (CESoETH packet)
• ECID – Emulated Circuit Identifier, a manually configured unique label which
identifies the PW.
Control Word
The control word structure for different encapsulation methods is illustrated
below.
CESoPSN:
0 1 2 3 4 5 6 7 8 9 10 15 16 31
0 0 0 0 L R M FRG LEN (6) Sequence Number (16)
SAToP:
0 1 2 3 4 5 6 7 8 9 10 15 16 31
0 0 0 0 L R RSV FRG LEN (6) Sequence Number (16)
L & M can be treated as a 3-bit code point that is described in the table below.
0 01 Reserved
1 01 Reserved
1 10 Reserved
1 11 Reserved
TDM Payload
This section details the two payload encapsulation methods supported by ETX-5.
CESoPSN
CESoPSN transports raw TDM data; that is, packets are formed by inserting a
user-specified number of complete TDM frames (4 to 360 frames) in the packet
payload area. Therefore, CESoPSN pseudowires can only be configured on framed
ports.
The TDM frames are considered serial data, even if they carry voice and CAS.
Since a CESoPSN pseudowire transports raw TDM frames, a CESoPSN pseudowire
can only be directed to another framed port.
The amount of TDM data in the CESoPSN packet is an integer multiple of the
basic structure size (the basic structure consists of N octets filled with the data
of the corresponding N×DS0 channels belonging to same PW):
0 1 2 3 4 5 6 7
Timeslot 1
Timeslot 2
Frame 1
…
Timeslot N
Timeslot 1
Timeslot 2
Frame 2
…
Timeslot N
Timeslot 1
Timeslot 2
Frame 3
…
Timeslot N
…
Timeslot 1
Timeslot 2
Frame m
…
Timeslot N
The first structure in the packet starts immediately at the beginning of the packet
payload.
The timeslots to be placed into the payload do not need to be contiguous, and
the payload can contain any combination of timeslots from the TDM circuit. The
timeslots are placed into the payload in the same order that they occur in the
TDM circuit.
Maximum payload size for a CESopSN PW is up to 512 bytes. It is calculated as
N × number of timeslots in the PW,
Where N = 8, 16, 24, 32, 40, 48, 56, 64.
SAToP
SAToP is used to transfer a bit stream transparently at the nominal port rate
(2.048 Mbps or 1.544 Mbps). Therefore, SAToP can be used only when the port
uses the unframed mode, and thus only one pseudowire can be configured per
port.
The SAToP packet payload consists of a user-specified number of raw TDM bytes
(4 to 1440 bytes), and is treated as data payload.
Note The SAToPSN packet overhead is large, and therefore, for efficient bandwidth
utilization, the number of raw TDM bytes per packet should be as large as
possible.
The receiving end restores the original bit stream. Therefore, a SAToP pseudowire
can only be directed to another unframed TDM port.
Maximum payload size for a SAToP PW is as follows:
• E1 – N × 32
Where N = 1–8, 16, 24, 32 (payload size is an multiple integer of 32 bytes)
• T1 – N × 24
Where N = 1–8, 16, 24, 32 (payload size is an multiple integer of 24 bytes)
All SAToP implementations support the following payload sizes (other sizes are
optional):
• E1 - 256 bytes
• T1 - 192 bytes.
Jitter Buffer
The packets of each pseudowire are transmitted by E5-cTDM-4 at essentially
fixed intervals towards the PSN. The packets are transported by the PSN and
arrive to the far end after some delay. Ideally, the PSN transport delay should be
constant, meaning the packets arrive at regular intervals (equivalent to the
intervals at which they were transmitted). However, in reality packets arrive at
irregular intervals, because of variations in the network transmission delay. The
term Packet Delay Variation (PDV) is used to designate the maximum expected
deviation from the nominal arrival time of the packets at the far end device.
Note
The deviations from the nominal transmission delay experienced by packets are
referred to as jitter, and the PDV is equal to the expected peak value of the jitter.
However, nothing prevents the actual delay from exceeding the selected PDV
value.
To compensate for deviations from the expected packet arrival time, E5-cTDM-4
uses jitter buffers that temporarily store the packets arriving from the PSN (that
is, from the far end equipment) before being transmitted to the local TDM
equipment, to ensure that the TDM traffic is sent to the TDM side at a constant
rate.
For each pseudowire, the jitter buffer must be configured to compensate for the
jitter level expected to be introduced by the PSN; that is, the jitter buffer size
determines the Packet Delay Variation Tolerance (PDVT).
Two conflicting requirements apply:
• Since packets arriving from the PSN are first stored in the jitter buffer before
being transmitted to the TDM side, TDM traffic suffers an additional delay.
The added delay time is equal to the jitter buffer size configured by the user.
• The jitter buffer is filled by the incoming packets and emptied to fill the TDM
stream. If the PSN jitter exceeds the configured jitter buffer size,
underflow/overflow conditions occur, resulting in errors at the TDM side:
A jitter buffer overrun occurs when it receives a burst of packets that
exceeds the configured jitter buffer size + packetization delay. When an
overrun is detected, E5-cTDM-4 clears the jitter buffer, causing an
underrun.
A jitter buffer underrun occurs when no packets are received for more
than the configured jitter buffer size, or immediately after an overrun.
When the first packet is received, or immediately after an underrun, the buffer is
automatically filled with a conditioning pattern up to the PDVT level in order to
compensate for the underrun. Then, E5-cTDM-4 starts processing the packets
and emptying the jitter buffer toward the TDM side.
To minimize the possibility of buffer overflow/underflow events, two conditions
must be fulfilled:
• The buffer must have sufficient capacity. For this purpose, the buffer size can
be selected by the user in accordance with the expected jitter characteristics,
separately for each pseudowire, in the range of 1 to 16 ms.
• The read-out rate must be equal to the average rate at which frames are
received from the network. For this purpose, the read-out rate must be
Packet Loss
In order to handle packet loss and misordering, E5-cTDM-4 has a packet
sequence integrity mechanism. It uses a sequence number in the control word (or
in the RTP header, if used) to detect lost and misordered packets. This
mechanism tracks the serial numbers of arriving packets and takes appropriate
action when anomalies are detected. When lost packets are detected, the
mechanism outputs filler data in order to retain TDM timing.
Packets arriving in incorrect order are reordered. Misordered packets that cannot
be reordered are discarded and treated as lost.
ToS
The ToS specifies the Layer 3 priority assigned to the traffic generated by this
pseudowire.
For IP networks, this priority is indicated by the IP type-of-service parameter for
this pseudowire. The specified value is inserted in the IP TOS field of the
pseudowire IP packets.
When supported by an IP network, the type-of-service parameter is interpreted,
in accordance with RFC 791 or RFC 2474, as a set of qualitative parameters for
the precedence, delay, throughput and delivery reliability to be provided to the IP
traffic generated by this pseudowire.
Each network that transfers the pseudowire IP traffic can use these qualitative
parameters to select specific values for the actual service parameters of the
network, to achieve the desired quality of service.
OAM Protocol
The OAM protocol, supported only by packet payload version V2, is used by
pseudowire emulation modules to check for a valid bundle connection: this
includes checks for compatible configuration parameters at the packet processors
at the two endpoints of a bundle, and detection of inactive bundle status.
The bundle state information is collected by the continuous, periodic handshake
between the two endpoints of a bundle, which generates little traffic, but ensures
that each endpoint recognizes the connection, and that it is enabled. If no response
is received by OAM packets within a predefined interval (a few tens of seconds), the
bundle is declared inactive.
When the use of the OAM protocol is enabled, little traffic flows until the connection
between the two bundle endpoints is established: only after the connection is
confirmed by the OAM exchange is transmission at the normal (full) rate started,
and the bundle starts carrying traffic. In case the connection is lost, the transmitted
traffic is again significantly decreased (several packets per second per connection).
The OAM connectivity check also prevents network flooding if the connection is
lost.
OAM packets are identified, using the following methods:
• UDP/IP – In accordance with source port: in this case the OAM packets run
over a UDP port number that is assigned only for OAM traffic, but use the
same VLAN ID and ToS of the originating connection.
• MEF-8 – In accordance with the contents of the control word, which is
included in version V2 packets (Virtual Circuit Connection Verification – VCCV).
The first four bits of an OAM control word are always set to 0001.
Structure-Agnostic Mode
In the structure-agnostic mode TDM defect indications are carried within the
TDM frame and passed transparently via the pseudowire connection. PSN defects
are mapped to TDM defects (TDM AIS).
Figure 8-9 illustrates fault propagation in structure-agnostic mode when LOS or
AIS is detected on the TDM link. In this case, remote ETX-5 ignores or propagates
the AIS condition, according to the user configuration. If the AIS is generated, the
ETX-5 sets the CW bits as follows: L-bit – 1, M-bit – 00. When ETX-5 detects the
CW bit settings, it generates the AIS towards the local TDM device.
L-bit = 1
M-bit = 00
LOS, AIS
AIS PSN AIS
TDM TDM
Device ETX-5 ETX-5 Device
TDM TDM
ETX-5 ETX-5
Device Device
PSN
RDI
TDM TDM
Device ETX-5 ETX-5 Device
TDM TDM
Device ETX-5 ETX-5 Device
R-bit = 1
Packet
Loss
PSN OOS Code
TDM TDM
Device ETX-5 ETX-5 Device
PSN
RDI
TDM TDM
ETX-5 ETX-5
Device Device
TDM TDM
Device ETX-5 ETX-5 Device
R-bit = 1
Packet
Loss
AIS
PSN
RDI
PSN
RDI RDI
TDM TDM
Device ETX-5 ETX-5 Device
Adaptive Timing
For each pseudowire, the E5-cTDM-4 cards have independent adaptive clock
recovery mechanisms, which recover the original timing (clock rate) of the far-
end source of each pseudowire. The clock recovery mechanisms can provide
recovered clock signals to serve as timing references for the ETX-5 nodal timing
subsystem.
The receive path of each pseudowire must use a clock recovery mechanism to
recover a clock signal at the original payload transmit rate used at the far end.
This mechanism is referred to as adaptive clock recovery mechanism.
Each pseudowire has its own adaptive timing recovery mechanism, in accordance
with the options listed in RFC 4197. The recovered pseudowire clocks can be
used as timing reference signals for the nodal ETX-5 timing subsystem; therefore,
E5-cTDM-4 allows flexible timing distribution.
The adaptive clock recovery mechanism estimates the average rate of the
payload data received in the frames arriving from the packet-switched network.
Assuming that the packet-switched network does not lose data, the average rate
at which payload arrives will be equal to the rate at which payload is transmitted
by the source.
Note
Generally, lost packets, as well as packets that did not arrive in the correct order,
are replaced by special dummy packets. However, for CESoPSN and SAToPSN,
packets can be reordered.
possible to the half-full mark. This condition can be maintained only when the
rate at which frames are loaded into the buffer is equal to the rate at which
frames are removed. Therefore, the adaptive clock recovery mechanism actually
recovers the original payload transmit clock.
The performance of the clock recovery mechanism can be optimized for the
operating environment, by specifying the following parameters:
• The accuracy of the original timing source, in accordance with the standard
SDH/SONET terminology.
• The type of PSN that transports the traffic: router-based network (for
example, UDP/IP) versus switch-based network (for example, Ethernet).
• Handling of transient conditions: even after the adaptive clock recovery
mechanism reaches a stable state, temporary changes in the network delay
may still occur, and be on a timescale that does not allow for the mechanism
to fully readjust. To provide the best possible user experience, delay
sensitivity is disabled to optimize performance for accurate clock recovery.
Configuring Pseudowires
A new pseudowire bundle is added by defining its number (1–1344), its type
(connection mode) and a type of the PSN.
Note An internal E1 or T1 port becomes active only if at least one enabled pseudowire
with a valid cross-connection is assigned to the port.
Note In order to change the SVI number of an active TDM PW, you must first remove
the cross connect and only then change the SVI number.
Assigning a name to the name <up to 32 Using no before name deletes the pseudowire name
pseudowire characters>
Defining the jitter buffer jitter-buffer <value in Use the shortest feasible buffer, to minimize
size µsec> connection latency.
The allowed range is 1000–16000 µsec, in 1-µsec
steps.
Enabling/disabling the OAM oam The selection must be compatible with the
connectivity protocol for this equipment at the far end of the connection
PW The pseudowire OAM messaging system is also used
for transferring inband loopback activation codes for
T1 interfaces.
no oam disables the OAM protocol.
Configuring TDM payload tdm-payload <value in A larger value increases the bandwidth utilization
size bytes> efficiency, but also increases the connection intrinsic
latency, in particular when the bundle is configured
to carry a small number of timeslots.
The values are:
• E1 SAToP – n×32, n = 1–8, 16, 24, 32 (32, 64,
96, 128, 160, 192, 256, 512, 768, 1024)
• T1 SAToP – n×24, n = 1–8, 16, 24, 32 (24, 48,
72, 96, 120, 144, 168, 192, 384, 576, 768)
• CESoPSN – Number of timeslots × 8, 16, 24, 32,
40, 48, 56, 64 (up to 512 bytes)
Specifying the value for the tos <tos number> Range: from 1 to 255.
TOS byte used on outbound In accordance with RFC 2474, it is recommended to
traffic use only values which are multiples of 4.
This parameter is relevant only when psn is
udp-over-ip.
Selecting the response to psn-oos {1-bit | stop- 1-bit – Packets filled with all ones (AIS) are sent over
out-of-service conditions tx} PSN. In this case L-bit is also set in PW packet
detected at the local TDM control word.
port stop-tx – no packets are sent over PSN
Assigning egress port for L2 egress-port svi This parameter is relevant only when psn is ethernet
forwarding <svi_number>
Displaying PW Statistics
ETX-5 PWs feature the collection of statistical diagnostics, thereby allowing the
carrier to monitor the transmission performance of the links.
The pseudowire transmission statistics enable analysis of pseudowire traffic
volume, and evaluation of the end-to-end transmission quality (as indicated by
sequence errors) and jitter buffer performance. By resetting the status data at
the desired instant, it is possible to ensure that only current, valid data is taken
into consideration.
Displaying show statistics { current | interval | all- • current – Displays the current statistic
statistics intervals | all } counters
• interval – Displays statistics for selected
interval
• all-intervals – Displays statistics for all
intervals since the PW statistics
collection has been enabled
• all – Displays current statistics and
statistics for all intervals
Current
---------------------------------------------------------------
Rx Packets : 354994
Tx Packets : 354995
Missing Packets : 0
Misordered Dropped Packets : 0
Reordered Packets : 0
Malformed Packets : 0
Jitter Buffer Underrun : 0
Jitter Buffer Overrun : 0
Parameter Description
Missing Packets Number of missing packets as detected via CW sequence number gaps. This
count does not include misordered dropped packets.
Misordered Dropped Number of packets detected via CW sequence number to be out of sequence,
Packets and could not be re-ordered, or could not fit in the jitter buffer. This count
includes duplicated packets.
Parameter Description
Reordered Packets Number of packets detected via CW sequence number to be out of sequence,
but successfully reordered
Malformed Packets Number of packets with mismatch between the expected packet and the actual
packet sizes
Jitter Buffer Underrun Number of times jitter buffer was in underrun state
Jitter Buffer Overrun Number of times jitter buffer was overrun state
Clearing Statistics
To clear the PW statistics:
• At the prompt config>pwe>pw<pw_number>)#, enter clear-statistics.
The statistics for the specified PW are cleared.
PW Type : SAToP
PSN Type : Ethernet
Operational Status : Up
OAM Status : Disabled
Out Label : 1
In Label : 101
SVI : 101
Attachment Circuit : E1/T1 3/1/1
Table 8-39 explains the OAM status values of the selected pseudowire.
Parameter Description
Displayed
Parameter Description
Displayed
Up The pseudowire carries traffic, and both the remote and the local
pseudowire endpoints receive Ethernet frames. However, there
may be problems such as sequence errors, underflows, overflows,
etc., which can be displayed using the Statistics function.
Unavailable The pseudowire reports loss of connectivity (it did not receive
either OAM or data packets for 10 seconds or more; OAM link then
reports loss of synchronization). This is often caused by network
problems or configuration errors.
Local Fail A failure has been detected at the local pseudowire endpoint
Validation Fail The remote pseudowire endpoint replied to OAM packets, but
there is a configuration mismatch (the configuration parameters
used at two endpoints of the pseudowire are different).
PW : 1 PW Type : SAToP
PSN Type : UDP Over IP Status : Not present
Out Label : 1 In Label : 1
Peer : 1
name: pwe-1
peer 1
label in 22 out 33
no oam
tdm-payload size 248 rate 31
jitter buffer 10000
psn-oos 1-bit
egress-port svi 1
no pm-enable
no shutdown
Example
To configure a pseudowire:
• PW number 1
• PW type – T1 SAToP
• PSN type – Ethernet
• Out (destination) label – 1
• In (source) label – 1
• Jitter buffer – 3000
• OAM –disabled
• Peer – 1
• Egress port – SVI 1
• TDM payload size – 96
ETX-5>config>pwe# pw 1 type t1satop psn ethernet
ETX-5>config>pwe>pw(1) label out 1 in 1
ETX-5>config>pwe>pw(1) jitter-buffer 3000
ETX-5>config>pwe>pw(1) no oam
ETX-5>config>pwe>pw(1) peer 1
ETX-5>config>pwe>pw(1) egress-port svi 1
ETX-5>config>pwe>pw(1) tdm-payload 96
Note
See Pseudowire Service section for detailed example of a pseudowire
configuration.
Configuration Errors
Table 8-40 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
PW peer number has not been Cannot configure a pseudowire because PW peer number is
configured missing
PW inbound label hasn't been configured Cannot configure a pseudowire because inbound label is missing
PW outbound label hasn't been Cannot configure a pseudowire because outbound label is
configured missing
PW egress-port hasn't been configured Cannot configure a pseudowire because egress port is missing
PW TDM mandatory fields: tdm payload Cannot configure a pseudowire because TDM payload size, or
size/rate/jitter buffer, must be rate, or jitter buffer values are missing
configured
Peer must have a MAC assigned to it Cannot configure a pseudowire because a destination peer does
not have a MAC address assigned to it
Message Description
PW removal failed: PW is connected to a Cannot delete a pseudowire because it has timeslots assigned
cross-connection to it
PW egress-port SVI must be of type PW The SVI used by the pseudowire must be PW type
PW set failed: Payload size is below the Cannot configure a pseudowire because the TDM payload size is
minimum value below the minimum value
PW set failed: Payload size exceeds the Cannot configure a pseudowire because the TDM payload size is
maximum value above the minimum value
PW set failed: Maximum number of PWs Cannot configure a pseudowire because the maximum number
already configured of allowed PWs per chassis has been reached
PW set failed: PW number exceeds Cannot configure a pseudowire because its number is above the
maximum maximum allowed value (1344)
PW set failed: PW number fails to meet Cannot configure a pseudowire because its number is below the
minimum minimum allowed value (1)
PW PSN type must be of type IP in order Only PWs with UDP/IP network encapsulation support ToS
to set TOS field configuration
Egress port can only be set if PSN type is Only PWs with Ethernet or MPLS network encapsulation require
Ethernet egress port configuration
Egress port has not been configured Cannot configure a pseudowire because its egress port has not
been configured
Peer must have an IP assigned to it Cannot configure a pseudowire because its peer does not have
an IP address assigned to it
UDP mux method can only be updated if Only PWs with UDP/IP network encapsulation support UDP
PSN type is UDPoIP multiplexing method configuration
PW set failed: combination of peer and Cannot configure a pseudowire because its peer/outbound label
outbound label should be unique combination is not unique
PW set failed: TDM payload size or rate Cannot configure a pseudowire because selected TDM payload
invalid type or rate value is not valid
PW set failed: A peer must be configured Cannot configure a pseudowire because no PW peer has been
first configured yet
PW set failed: PW label value must be Cannot configure a pseudowire because the PW In label value is
unique already in use
PW set failed: Changing this parameter is Cannot modify pseudowire parameters when a PW is not shut
not allowed down
Benefits
Flexible timing mechanism utilizes standard technologies to ensure highly
accurate clock recovery and distribution over both the physical and packet layers
with powerful frequency, phase and ToD alignment capabilities.
Factory Defaults
Parameter defaults are listed in the tables below.
sync-network-type 2
mode auto
force-t4-as-t0 Enabled
priority 4
wait-to-restore 300
hold-off 300
interface-type t1
rx-sensitivity short-haul
tx-clock-source domain 1
ssm-channel sa4
tx-ssm no tx-ssm
Functional Description
The figure below is a diagram of the ETX-5 timing mechanism.
Main Card
System 10GbE
Clock Ports
I/O
Clock 1
I/O
Clock 2
1588v2 T0 1588v2
(master) SEC Mux (slave) Station Clock
Station Clock Output (T4)
(BITS/GPS)
Station Clock
Output (T4)
I/O Card 2
I/O Card 3
I/O Card 4
Clock Domain
The timing system in ETX-5 provides a single clock domain. The clock domain
distributes a system clock derived from up to four configured sources after
selection process implemented via Synchronous Equipment Clock (SEC). Clock
sources (SEC inputs) are as follows:
• Clock derived from a physical port on a main or I/O card
• Station clock (BITS/GPS–10 MHz)
• IEEE 1588v2 clock.
The synchronization network type identifies the type of synchronization network
and its levels. Each synchronization network connection is provided by one or
more synchronization link connections, each supported by a synchronized PDH
trail, SDH multiplex section trail, or 802.3 physical media trail.
The synchronization network types are:
• Option I (Europe)
• Option II (USA), default.
DNU Do Not Use – This signal should not be used for synchronization Lowest
ST4 Timing source is Stratum 4 free-running clock (applicable only to 1.5 Mbit/s |
signals)
DUS Don't Use for Sync – This signal should not be used for synchronization Lowest
SSM/ESSM Support
ETX-5 supports automatic learning/distributing clock QL using Sync Status
Message (SSMs) or Ethernet Synchronization Message Channel (ESMC) systems.
In the receive direction, an ESMC-FAILED state is declared if no ESMC messages
are received for a period of 5 seconds or more (with issuing SSF).
In the transmit direction, an ESMC message is transmitted every 1 second or
immediately if a change in QL is detected.
For synchronization source signals/interfaces that do not support SSM, it is
possible to force the quality level to a fixed value. This allows use of these
signals/interfaces as synchronization sources in the automatic reference clock
selection process in QL-enabled mode. You must configure a specific QL for all
the ingress synchronization interfaces that do not support SSM.
Clock Mode
The domain clock mode can be one of the following:
• Auto mode – domain timing is determined by the clock selection algorithm
(default)
• Free-run mode – the domain clock is based on the main card local oscillator
(TCXO)
• Force T0 holdover – the domain clock uses data stored by the T0 timing
generator during normal operation for timing output.
By default, ETX-5 uses free-run mode, until a valid clock source is selected.
Note By default, the ETX-5 system clock is in free-run state, until a valid clock source is
selected.
Note By default, ETX-5 station clock output is in free-run state, until a valid clock
source is selected.
SEC Module
The clock domain provides the system clock according to one of the four timing
inputs, as selected by the SEC unit. The SEC module performs physical clock
selection, hitless switching, clock filtering and holdover. It consists of two timing
generators:
• T0 for system clock output
• T4 for station clock output.
Internal
Oscillator
(TXCO)
Station
Clock
Output
Quality Level
The SEC unit supports input prioritization and source quality level configuration,
according to network type:
Option II PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, SSM-based
Clock Selection
The clock selection algorithm is based on ITU-T Recommendation G.781. During
the selection process, the best synchronization source from the SEC inputs is
selected as the system clock. The selection process operates in two modes:
• QL-enabled, in which the following parameters are considered:
Quality level
Signal failure
Priority
External switch commands
If no overriding external commands are active, the algorithm selects the
reference clock that has the highest quality level without signaling a fail
condition. If both inputs have the same quality level, the input with the
highest priority is selected. If all inputs have the same highest priority, an
arbitrary reference clock is chosen. If no input clock is available, the SEC uses
internal oscillator timing.
• QL-disabled, in which the following parameters are considered:
Signal failure
Priority
External switch commands
If no overriding external commands are active, the algorithm selects the reference
clock that has the highest priority without signal fail condition. If all inputs have
the same highest priority, an arbitrary reference clock is chosen. If no input clock
is available, the SEC uses internal oscillator timing.
Timers
For additional flexibility in clock restoration, the SEC module has two timers:
• Wait-To-Restore. The timer defines the time (in seconds) that a previously failed
synchronization source must be fault-free in order to be considered available.
• Hold-Off. The timer defines the time (in milliseconds) that a signal failure
must be active before it is relayed to the clock selection unit.
Switchover
Clock switchover (changing current reference clock) occurs if:
• An external clock switch command is received
• A locked source clock becomes invalid
• A higher priority/quality clock becomes available.
A source clock is considered invalid if any of the following is detected:
• Physical failure – Clock failure has been detected at the physical layer
• Monitoring failure – Clock failure has been detected by the clock monitoring
entity of the domain
• ESMC failure – Ethernet port only with SSM-based clock has not received valid
ESMC-packet stream for 5 seconds.
Note Switch over is always revertive. For non-revertive mode, you can configure several
sources with the same priority.
SEC Output
The SEC unit outputs a clock with Stratum-3 accuracy, jitter and holdover, in
compliance with the following requirements:
• GR-253-CORE for SONET Stratum 3 and SONET minimum clock (ST3)
• GR-1244-CORE Stratum 3
• ITU-G813 Option 1 and Option 2 for SDH Equipment Clock (SEC).
The T0 timing generator of the SEC unit delivers a system (domain) clock to I/O
cards and to the second main card. In addition, the T4 timing generator outputs
an external clock for distribution to other network devices.
Note By default, the T4 generator is forced to use the same clock source as the T0
generator.
Input Sources
The four clock sources (SEC inputs) are based on:
• Clock derived from a physical port on a main or I/O card
• Station clock (BITS or GPS-10 MHz)
• IEEE 1588v2 clock.
Ethernet Ports
Ethernet ports located on E5-MC-4, E5-MC-SFP-P-4, E5-10GbE-2 or E5-GbE-20
support Synchronous Ethernet (Sync-E) master and slave modes according to ITU-
T G.8261–G.8266 requirements. This allows each port to:
• Extract the port clock. The derived clock will be used by the clock selection
mechanism as a source clock
• Set the port Tx clock according the domain clock available from the main card
• Act as a source of ESMC messages for SSM-based clock modes.
Sync-E mode can be used when phase synchronization or Time of Day (ToD) is
not required. The main advantages of Sync-E over 1588v2 clock are:
• It is propagated over physical layer
SDH/SONET Ports
The Rx clock of any SDH/SONET port on the E5-cTDM-4 or E5-cTDM-STM4cards
can be extracted and supplied to the main card clock selection mechanism (via
backplane clock bus).
Note When APS is enabled, clock is used from a selected interface and not from an APS
group.
E/T1 Ports
The internal E1/T1 ports cannot be used as clock sources for the system clock.
The Tx clock of internal E1/T1 ports can be locked to:
• System clock
• Rx clock of the port
• Adaptive clock recovered from pseudowire stream connected to this E1/T1
port.
Station Clock
The station clock interface has two functions:
• Input for station clock signal (BITS and GPS clocks)
• Output for the ETX-5 nodal clock. This output provides a convenient means
for distributing the ETX-5 nodal clock signal to other equipment (BITS clock
only).
BITS Clock
ETX-5 recovers Building-Integrated Timing Supply (BITS) clock via the station clock
interface ports on E5-MC-4 and E5-MC-SFP-P-4 cards. See Appendix A for the
external clock connector pinout.
The following clock signals are supported:
• 2.048 Mbps, ITU-T G.703, 120Ω balanced, 75Ω unbalanced
• 1.544 Mbps, ANSI T1-403, 100Ω balanced
• 2.048 MHz squarewave, RS-485
• 64 kHz, ITU-T G.703, composite clock interface, 110Ω balanced.
When only one external clock source is available, you can improve hardware
protection by connecting the external clock inputs in parallel, by means of a
Y-cable.
GPS Clock
ETX-5 receives/transmits (1588v2 master/slave) GPS-based frequency and phase
reference signal from GPS units, using the following interfaces on the E5-MC-4 or
E5-MC-SFP-P-4 card:
• Input or output of 10 MHz sinewave synchronization signal via mini-BNC (DIN
1.0/2.3) connector
• Input and output of ToD timestamp signal via Rj-45 connector with RS-422
interface
• Input or output of 1PPS TTL synchronization signal via mini-BNC connector.
When only one GPS clock source is available, you can improve hardware
protection by connecting the GPS clock inputs in parallel, by means of a Y-cable.
Redundancy
When ETX-5 is equipped with two main cards, clock selection and distribution
mechanisms are mirrored in the active and backup cards. This ensures full timing
system redundancy.
SEC Redundancy
When a clock source is configured for the active main card, the action is
duplicated in the backup card. This results in the same clock source feeding both
SECs. The SECs are connected internally to improve switchover time and reduce
phase difference when a flip occurs.
The two SEC outputs (active and backup) are master to the I/O cards, which use
only the active one.
Station Clock
Any station clock can be used as a clock input on an active or backup main card.
Each SEC can use input from both station clock sources.
System Primary
Clock Station Clock
SEC Mux
Secondary
System Secondary
Clock Station Clock
SEC Mux
Primary
From active card
Setting minimum quality of quality min-level-station { prc | ssu-a | Minimum clock quality definition is needed to
outgoing station clock ssu-b | sec | dnu } prevent outputting low-quality clock via external
quality min-level-station { prs | stu | clock interface.
st2 | tnc | st3e | st3 | smc | st4 | dus | no quality removes the quality parameter. If no
prov } quality is defined for the domain you cannot
configure quality level for the sources.
The quality values are according to the
synchronization network type defined for the
domain (refer to Table 9-1)
Verify that the force-t4-as-t0 option is disabled.
Setting the clock mode mode { auto | free-run | force-t0- auto –Clock selection mechanism functions
holdover } normally; that is, the best available clock source is
selected for synchronization.
free-run – Internal oscillator is used for
synchronization
force-t0-holdover – Forces the T0 timing generator
to holdover mode (no force-t0-holdover clears T0
from holdover mode)
Note You can choose an invalid clock source. However, this input will be rejected by
the domain during the clock selection process.
2. Verify that the card whose port will be used as a source clock is provisioned.
3. Verify that the port to be used as a source clock is enabled (no shutdown).
Note If you choose an invalid clock source, this input will be rejected by the domain
during the clock selection process.
Note To ensure correct distribution of SSM traffic, you must configure flow with an
L2CP profile with peer action on the 01-80-c2-00-00-02 address. The flow must
have the following attributes:
• Untagged classification
• Ingress port – Ethernet port/LAG, serving as the SSM source (Sync-E port
• Egress port – according to application requirements.
If you use the flow only to peer the SSM frames and do not need to forward the
untagged traffic, discard it, using the drop command on the flow
To configure a clock source for which the port has been defined:
1. Navigate to configure system clock domain 1.
Setting quality level of the quality-level { prc | ssu-a | ssu-b | sec | Clock source quality, as well as source priority are
clock source dnu | ssm-based } taken into account during clock selection process.
quality-level { prs | stu | st2 | tnc | st3e | If no quality is defined for the domain, this
st3 | smc | st4 | dus | ssm-based | prov } command is not available.
The quality level values are according to the
synchronization network type defined for the
domain.
The quality level ssm-based indicates the quality
level is learned automatically via SSM messages
or S1 byte of SDH/SONET frames.
When using SSM-based clock source, add a flow
supplying ESMC messages to the port.
Canceling the wait-to-restore clear-wait-to-restore This is useful if a timing source fault is cleared
timer of a clock source and you want the source to be available
immediately
ETX-5>config>system>clock>domain(1)>source(1)#
ETX-5>config>system>clock>domain(1)>source(1)# show status
Status : OK
Tx Quality : DNU
Rx Quality : PRC
ESMC State : Unlocked
WTR State : Inactive
Clock status provides information about:
Clock source status:
OK – The clock source is valid and can be considered as clock input
candidate for the system clock
Physical Fail – Clock failure has been detected at the physical level
Monitoring Fail – Clock failure has been detected by the clock
monitoring entity of the domain. One reason for declaring a
monitoring failure state is that the maximum frequency deviation of
the clock source has been exceeded.
ESMC Fail – Ethernet port with SSM-based clock has not received a
SSM-packet stream for 5 seconds. Make sure the Ethernet port has
been configured to supply SSMs and a dedicated flow has been
directed to the port.
Tx quality – Transmit clock quality
Rx quality – Receive clock quality
ESMC State – State of the Ethernet Synchronization Messaging Channel
(ESMC)
WTR State – Wait-to-restore counter status
Example
#***************************Configuring_Clock_Domain*************************
configure system clock domain 1
sync-network-type 1
source 1 station main-a/1
priority 1
wait-to-restore 0
exit
#***************************Configuring_Ethernet_Ports***********************
configure port ethernet main-a/1
queue-group profile q_group_2_level_default
tx-ssm
no shutdown
exit all
#*******************Configuring_Classifiier_Profile_for_SSM_Flow*************
configure flows classifier-profile class1 match-any match untagged
#*********************************End****************************************
#*******************Configuring_L2CP_Profile_for_SSM_Flow********************
configure port l2cp-profile l1
mac 01-80-c2-00-00-02 peer
exit all
#********************************Adding_SSM_Flow*****************************
configure flows flow 1
classifier class1
egress-port ethernet main-a/2 queue-map-profile QueueMapDefaultProfile block
0/1
ingress-port ethernet main-a/1
l2cp profile l1
no shutdown
exit all
#*********************************End****************************************
oNote • The station clock input can be looped back directly via station clock output.
• The station clock interface does not provide Tx clock, if it uses a GPS 10 MHz
signal.
The station clock ports are located on the main cards and provide the following
timing interfaces:
• E1 via RJ-45 balanced and BNC unbalanced ports
• T1 via RJ-45 balanced port
• 2 MHz square-wave synchronization via RJ-45 balanced and BNC unbalanced
ports
• 64 kHz composite via RJ-45 balanced port
• GPS 10 MHz via mini BNC port (input only).
Setting the interface type interface-type {e1 | t1 | 2mhz | 64khz | gps} You can configure the interface
type only if the station clock is
administratively disabled
(shutdown).
If you specify e1 or 2mhz and do
not specify balanced or
unbalanced, by default the
interface is set as balanced.
Changing the interface type resets
all other related parameters to
their default values.
Setting receiver sensitivity rx-sensitivity {short-haul | long-haul} Used to adjust the signal’s
for E1 and 2-MHz capability to reach destinations
interfaces. close by or farther away
Defining transmit (output) tx-clock-source {station-rclk | domain <domain-number>} The output station clock can be
clock type locked to station Rx clock
(loopback) or to domain (T4) clock
Defining E1 G.732N–CRC ssm-channel {sa4 | sa5 | sa6 | sa7 | sa8} For T1 ESF interface, SSM
bits to carry SSM information is carried over FD.
information
Example
Main Card A
Input 1
Station Clock SEC
Input 2
Y-Cable
Note Although not shown in Figure 9-5, inputs 1 and 2 are doubled in main card B for
redundancy.
Example
This example shows the configuration procedure for defining two clock sources:
• Source 1 – E1 station clock
• Source 2 – SDH/SONET port 1 on TDM card in slot 1.
#*************************Activating_SDH_SONET_Port**************************
ETX-5# configure port sdh-sonet 1/1
ETX-5>config>port>sdh-sonet(1/1)# no shutdown
ETX-5>config>port>sdh-sonet(1/1)# exit all
#*********************************END****************************************
#*************************Configuring_Station_Clock**************************
ETX-5# configure system clock station main-a/1
ETX-5>config>system>clock>station(main-a/1)# shutdown
ETX-5>config>system>clock>station(main-a/1)# interface-type e1
ETX-5>config>system>clock>station(main-a/1)# no shutdown
#*************************Configuring_Clock_Domain***************************
ETX-5# configure system clock domain 1
ETX-5>config>system>clock>domain(1)# sync-network-type 1
#*********************************END****************************************
#**********************Configuring_Station_Clock_as_Source_1*****************
ETX-5>config>system>clock>domain(1)# source 1 station main-a/1
ETX-5>config>system>clock>domain(1)>source(1)$ wait-to-restore 10
ETX-5>config>system>clock>domain(1)>source(1)$ clear-wait-to-restore
ETX-5>config>system>clock>domain(1)>source(1)$ show status
Status : OK
Tx Quality : DNU
Rx Quality : PRC
ESMC State : Unlocked
WTR State : Inactive
ETX-5>config>system>clock>domain(1)>source(1)$ exit
#**********************Configuring_SDH_SONET_Port_as_Source_2****************
ETX-5>config>system>clock>domain(1)# source 2 rx-port sdh-sonet 1/1
ETX-5>config>system>clock>domain(1)>source(2)$ quality-level ssu-a
ETX-5>config>system>clock>domain(1)>source(2)$ wait-to-restore 10
ETX-5>config>system>clock>domain(1)>source(2)$ show status
Status : OK
Tx Quality : PRC
Rx Quality : SSU-A
ESMC State : Unlocked
WTR State : Inactive
Configuration Errors
Table 9-4 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
Existing sources should be removed first Domain parameters cannot be modified before removing the
clock sources connected to it
Invalid Holdoff Timer Selected holdoff timer value is out of allowed range (300–1800)
Invalid Source Number Clock source number is not within range (1–4)
Invalid WTR Timer Selected holdoff timer value is not within range (0–720)
Source is not Configured Selected clock source has not yet been configured
Interface is in conflict with domain Interface and domain do not have the same network type
network type
Benefits
The Precision Time Protocol (PTP), defined in the IEEE 1588 standard, is a
high-precision time protocol for synchronization of clocks over a PSN. The use of
PTP is beneficial for applications that cannot bear the cost of a GPS receiver at
each node, or for which GPS signals are inaccessible.
Factory Defaults
By default, each 1588v2 entity is disabled and configured as neither master nor
slave. When enabled, it has the following default settings:
ip-address –
ptp-domain 4
maximum-slaves 256
mode time-frequency
sync-rate 64pps
tx-clock domain 1
ip-address –
ptp-domain 4
BMCA revertive
wait-to-restore 300
recovery-mode time-frequency
priority 1
network-type Automatic
peer 0
quality-level type2SsmBased
Functional Description
When implementing the 1588v2 PTP, ETX-5 operates in the following roles:
• 1588v2 master, eliminating the need for an external timing device installed in
the core of the network to support 1588v2 timing distribution. The ETX-5
system is located near the core of the network and supplies clock reference
to remote Ethernet CPEs operating in 1588v2 mode.
• 1588v2 slave, regenerating frequency and time from 1588v2 packets received
from grandmaster
• 1588v2 transparent. In the transparent mode, ETX-5 timestamps the
correction field of traversing 1588v2 (UDP/IP) packets to reflect time in
ingress to egress direction. The device updates the correction field directly
and does not use follow-up messages for the time-correction functionality.
ETX-5 1588v2 master entities comply with the G.8265.1 (PTP telecom profile)
requirements. They operate in one-way and two-way modes, providing frequency
and frequency/time information to the slaves. With one-step synchronization,
ETX-5 does not use follow-up messaging.
Figure 9-6 illustrates the basic schematics of the 1588v2 master functionality.
Both 1588v2 master entities reside on loopback addresses of the router. The
1588v2 entities generate PTP packets, which are encapsulated with UDP/IP and
forwarded to 1588v2 slaves via PSN.
Main Card A
Loopback RIF
1588v2
1588v2 ETH
Slave
Master
I/O Card
RIF
1588v2
Router RIF ETH Slave
1588v2
RIF ETH Slave
Loopback RIF
1588v2
Master
Main Card B
Two independent master clock systems reside on active and backup main cards.
They have the same clock input and distribute timing signals to all slaves in their
domains. Up to 512 1588v2 slaves are supported. 1588v2 packets are
transmitted via GbE and 10GbE ports on the Ethernet main and I/O cards.
Sources
Each 1588v2 master entity has three inputs (frequency and time):
• Frequency from the SEC
• Time of Day (ToD) from the RS-422 interface (NMEA 0183)
• Phase (1 PPS, or Pulse Per Second) from the RS-422 or mini BNC interface.
Time of Day
RS-422
Phase Mini
BNC
ToD
and
1PPS
1588v2 Frequency Clock 1PPS
Master SEC Inputs
10 MHz GPS
Backup Main Card Source
ToD
1588v2 Frequency Clock and
Master SEC Inputs 1PPS
1PPS
Phase Mini
BNC
ToD, 1 PPS and 10 MHz GPS (via SEC) inputs to the active and backup main cards
can be connected to the same GPS source via a Y-cable for clock system
redundancy.
Redundancy
When ETX-5 is equipped with two main cards, the chassis provides two
independent 1588v2 master entities. 1588v2 slaves use the Best Master Clock
(BMC) algorithm for selecting the clock source with the best quality.
ETX-5 supports two 1588v2 protection topologies, illustrated in Figure 9-8 and
Figure 9-9:
• Redundant main cards –1588v2 slave operates opposite a single ETX-5 with
two main cards. One of the 1588v2 masters is defined as active (primary),
and the other one – as backup (secondary).
• Redundant chassis – 1588v2 slave operates opposite two ETX-5s with a
single 1588v2 master entity each.
ETX-5
Main Card A
1588v2
Master
1588v2
Slave Main Card B
1588v2
Master
Legend:
Active
Backup
ETX-5
Main Card A
1588v2
Master
1588v2
Slave ETX-5
Main Card A
1588v2
Master
Legend:
Active
Backup
The 1588v2 slave entity receives TOD information from the master clock source
and outputs NMEA messages via TOD RJ-45 connector.
Recovery Modes
The 1588v2 slave entities operate in two-way mode to recover synchronization
information, using sync, delay request and delay response messages. The
message exchange modes are as follows:
• Frequency. In this mode, the 1588v2 slave entity reconstructs remote clock,
using sync and delay request/response messages, while ignoring TOD
information (time indication and time-related status/alarm messages).
• Frequency and time. In this mode, the 1588v2 slave entity reconstructs
remote clock, using sync and delay request/response messages, while
providing TOD information via TOD interface.
Forwarding
The 1588v2 slave entity uses a dedicated router loopback interface for message
forwarding, similar to 1588v2 master (Figure 9-6). This LB RIF cannot be shared
with either a 1588v2 master entity or a PW.
Redundancy
The ETX-5 1588v2 slaves support non-revertive clock redundancy, using the Best
Master Clock (BMC) algorithm for selecting the clock source with the best quality.
If a failure is detected (no sync massages within 10 seconds), the 1588v2 slave
entity switches to the secondary master clock source.
Note • no master disables PTP master mode, setting the 1588v2 entity to be neither
master nor slave (recovered) mode.
• Slave mode cannot be activated, while the 1588v2 entity is in the master
mode. Use no master command prior to switching between slave and master
modes.
Activating the 1588v2 no shutdown shutdown deactivates the 1588v2 master entity
master entity
Defining IP address of ip-address <value> The IP address of 1588v2 master entity must be
1588v2 master entity the same as the IP address of the router loopback
interface
Creating a PTP domain ptp-domain <4–23> A domain consists of one or more PTP devices
(masters or slaves) communicating with each other
according to PTP requirements. For correct
distribution of timing signals, a 1588v2 master and
slaves operating with it must belong to the same
PTP domain.
Defining a maximum maximum-slaves <1–512 > The total number of slaves supported by 1588v2
number of slaves master entities residing on both main cards is 512
Defining the 1588v2 mode {frequency | time-frequency} In frequency mode the master transmits sync and
message exchange mode announce messages to slaves
In time-frequency mode the master transmits sync,
announce and delay response messages to slaves
Defining the sync-rate { 16pps | 32pps | 64pps | All slaves within the domain must use the same
synchronization message 128pps } message rate
rate
Displaying 1588v2 slave slave <value > show status The slave is identified by its IP address
status
Displaying Status
You can display the current status of the 1588v2 master and the slaves in its
domain.
Administrative Status: Up
Operational Status : Up
Detailed Status : OK
Slave IP Address Oper Clock Identity Announce Delay Rs
Mode Rate Rate
(pps) (pps)
1 1.1.1.1 Frq xx:xx:xx:xx:xx:xx:xx:xx:xx:xx 16 --
2 2.2.2.2 Frq+T xx:xx:xx:xx:xx:xx:xx:xx:xx:xx 16 16
The 1588v2 master status provides information about:
Administrative status:
Up –1588v2 master is administratively enabled
Down – 1588v2 master is administratively disabled
Operational status:
Up –1588v2 master is operating properly
Down – 1588v2 master has failed
LLD – Lower Link Down
Detailed status:
OK –1588v2 master is operating properly
TOD Failure – ToD source failure
1PPS Failure – 1PPS source failure
Slave status, including its number, IP address, message exchange mode,
identifier (MAC address), announce and delay response message rates.
Displaying Statistics
If the collection of performance monitoring data is enabled, you can display the
current statistics for 1588v2 master or slave.
To display statistics:
• At the config>system>clock>master(main-a/1 or main-b/1)#prompt, enter
show statistics running to display master statistics.
or
• At In the config>system>clock>master(main-a/1 or main-b/1)#prompt, enter
slave < IP address> show statistics running to display slave statistics.
The 1588v2 master or slave statistics are displayed.
ETX-5>config>system>clock>master(main-a/1)# show statistics running
Running
-----------------------------------------------------------------------------
Tx Packets : 1
Tx Sync Packets : 1
TX Follow Up Packets : 1
TX Delay Response Packets : 1
TX Announce Packets : 1
TX Signaling Packets : 1
Rx Packets : 1
RX Signaling Packets : 1
RX Delay Request : 1
Discarded Signaling Packets : 1
Running
------------------------------------------------------------------------------
Tx Sync Packets : 1
TX Follow Up Packets : 1
TX Delay Response Packets : 1
TX Announce Packets : 1
TX Signaling Packets : 1
RX Signaling Packets : 1
RX Delay Request : 1
Discarded Signaling Packets : 1
Counter Description
Counter Description
TX Delay Response Packets Number of Delay Response packets transmitted by 1588v2 master or
slave
RX Delay Request Number of Delay Request packets received by 1588v2 master or slave
Discarded Signaling Packets Number of Signaling packets discarded by 1588v2 master or slave
Configuration Errors
Table 9-6 lists the messages generated by ETX-5 when a configuration error is
detected.
Message Description
Distributed must be defined as none The 1588v2 clock cannot be changed from master to recovered,
or vice versa, skipping the None state
Distributed PTP must be in shutdown The 1588v2 master cannot be modified while it is active
IP must be configured as a router LB The defined IP address must be the router loopback interface
address address
Maximum number of slaves per shelf The maximum number of allowed 1588v2 slaves per chassis has
must be less than 512 been exceeded
Maximum slave is out of range The number of 1588v2 slaves is not within range (1–512 per
chassis)
Missing IP address configuration The IP address must be defined before attempting to enable the
1588v2 masters
PTP domain is out of range The PTP domain number is not within range (4–23)
Sync rate is out of range The synchronization message rate value is not within range
Note • no recovered disables the PTP slave mode, setting the 1588v2 entity as
neither slave (recovered mode) nor master.
• Slave mode cannot be activated, while the 1588v2 entity is in the master
mode. Use no recovered prior to switching between slave and master modes.
Defining IP address of ip-address <value> The IP address of the 1588v2 slave entity must be
1588v2 slave entity the same as the IP address of the router loopback
interface
Creating a PTP domain ptp-domain <4–23> A domain consists of one or more PTP devices
(masters or slaves) communicating with each other
according to PTP requirements. For the correct
distribution of timing signals, a 1588v2 master and
the slaves operating with it must belong to the
same PTP domain.
Defining the 1588v2 mode recovery-mode {frequency | time- frequency – the 1588v2 slave entity reconstructs
frequency} remote clock, using sync, delay request/response
messages, and ignoring TOD information (time
indication and time-related status/alarm messages)
time-frequency –the 1588v2 slave entity
reconstructs remote clock, using sync, delay
request/response messages, providing also TOD
information via TOD interface
Defining peer master master-identity {clock-id<value> port Default clock ID value (0xFFFFFFFFFFFFFFFFFFFF)
source port ID <value>} indicates that the slave retrieves the master source
port ID from the Announce messages.
Any other value indicates that the slave ignores the
value delivered in the Announce messages and
uses the one that has been configured by the user.
Defining peer master priority { 1 | 2} When a 1588v2 slave operates opposite two
priority 1588v2 masters with the same quality level, it
selects a clock source with the highest priority
(priority 1)
Defining synchronization sync {rate [16pps |32pps | 64pps | All slaves within a domain must use the same sync
message rate requested by 128pps] [grant-period <60–1000>} message rate parameters
the slave and duration of
sync message transmission
Defining Announce announce {rate [16sec |8sec |4sec All slaves within a domain must use the same
message rate requested by |2sec |1sec | 500msec | 250msec | Announce message rate parameters
the slave and duration of 125msec] [grant-period <60–1000>}
Announce message
transmission
Defining Delay Response delay-respond {rate [16pps |32pps | All slaves within a domain must use the same Delay
message rate requested by 64pps | 128pps] [grant-period <60– Response message rate parameters
the slave and duration of 1000>}
Delay Response message
transmission
Setting quality level quality-level { prc | ssu-a | ssu-b | The quality level values are according to the
type1-sec | type1-dnu | network type
type1-ssm-based }
quality-level { prs | stu | st2 | tnc | st3e
| st3 | smc | st4 | dus |
type2-ssm-based | prov }
quality-level { unk | type3-sec |
type3-dnu | type3-ssm-based }
Displaying Status
You can display current status of the 1588v2 slave entity.
Master Num : 1
IP : 30.30.30.30
PTSF : ACT
Clock Identity :
Received QL : Type-1 DNU
Granted Sync Rate (pps) : 64
Granted Sync Period (sec) : 0
Granted Announce Rate (pps) : 2
Granted Announce Period (sec) : 0
Granted Delay Respond Rate (pps) : 64
Granted Delay Respond Period (sec) : 0
The 1588v2 slave status provides the following information
• Current state of the slave clock (free run, locked, acquisition, holdover)
• Indicated and received quality level
• Master clock identity, IP address and number
• PTSF (Packet Timing Signal Fail) indication. Its Active state indicates that the
1588v2 slave has not received a sync, delay respond or announce message
for 10 seconds.
• Granted sync, delay respond and announce rates and periods
Displaying Statistics
You can display current statistics for 1588v2 slave entity.
To display statistics:
• At the config>system>clock>recovered(main-a/1 or main-b/1)#prompt, enter
show statistics running or measured to display running or measured slave
statistics.
The 1588v2 slave running or measured statistics are displayed.
ETX-5>config>system>clock>recovered(main-a/1)# show statistics running
Running
-----------------------------------------------------------------------------
Unicast Announce Request : 2
Unicast Announce Accept : 1
Unicast Announce Reject : 0
Unicast Announce Timeout : 0
Unicast Sync Request : 2
Unicast Sync Accept : 4
Unicast Sync Reject : 0
Unicast Sync Timeout : 0
Unicast Delay Respond Request : 3
Unicast Delay Respond Accept : 1
Unicast Delay Respond Reject : 0
Unicast Delay Respond Timeout : 1
Rx Unicast Sync Miss Ordered : 0
No Sync Total Elapsed Time : 10
No Sync Elapsed Time : 0
No Announce Total Elapsed Time : 6
No Announce Elapsed Time : 0
No Delay Respond Total Elapsed Time : 11
Rx Sync Lost : 0
Rx Delay Respond Packets : 9467
Figure 9-10. 1588v2 Slave Running Statistics
Measured
-----------------------------------------------------------------------------
Sync Rate Delay Respond Rate
Current : 128 128
Maximum : 128 128
Minimum : 128 128
Figure 9-11. 1588v2 Slave Measured Statistics
Counter Description
Unicast Announce Request Number of unicast announce messages sent by the slave
Unicast Announce Accept Number of unicast announce messages accepted by the slave
Unicast Announce Reject Number of unicast announce messages rejected by the slave
Unicast Announce Timeout Number of unicast announce messages that timed out
Unicast Sync Request Number of unicast sync messages sent by the slave
Unicast Sync Accept Number of unicast sync messages accepted by the slave
Unicast Sync Reject Number of unicast sync messages rejected by the slave
Unicast Sync Timeout Number of unicast sync messages that timed out
Unicast Delay Respond Request Number of unicast delay respond messages sent by the slave
Unicast Delay Respond Accept Number of unicast delay respond messages accepted by the slave
Unicast Delay Respond Reject Number of unicast delay respond messages rejected by the slave
Unicast Delay Respond Timeout Number of unicast delay respond messages that timed out
Rx Unicast Sync Miss Ordered Number of received unicast sync messaged that are misordered
No Sync Total Elapsed Time Total time in seconds during which sync messages were not received
No Sync Elapsed Time Time in seconds elapsed after the last received sync message
No Announce Total Elapsed Time Total time in seconds during which announce messages were not
received
No Announce Elapsed Time Time in seconds elapsed after the last received announce message
No Delay Respond Total Elapsed Total time in seconds during which delay respond messages were not
Time received
No Delay Respond Elapsed Time Time in seconds elapsed after the last received delay respond message
Counter Description
Note
Delay respond rate counters are not available in time-frequency recovery mode.
Configuration Errors
Table 9-9 lists messages generated by ETX-5 when a configuration error is
detected.
Message Description
All Masters within slave module must be A 1588v2 slave cannot be disabled while it still has peer 1588v2
deleted masters attached to it
Configuration fail. Grant-period out of The grant period value is not within range (60–1000 sec)
range
Configuration fail. The minimum- The selected minimum expected value for Synchronization,
expected value cannot be higher than Announce or Delay Response messages is higher than the
the rate value configured message rate
IP must be configured as a router LB The defined IP address is different from the router loopback
address interface address
Master still active A peer 1588v2 master cannot be disabled while it is active
Missing IP address configuration The maximum number of allowed 1588v2 slaves per chassis has
been exceeded
PTP domain is out of range The IP address must be defined before the 1588v2 slave can be
enable
PTP wait-to-restore is out of range The PTP domain number is not within range (4–23)
Recovered must be defined as none The PTP WTR value is not within range (0–720)
Recovered PTP must be in shutdown The 1588v2 clock cannot be changed from recovered to master
or vice versa, skipping the None state
Recovered PTP: The delay-respond rate A 1588v2 slave cannot be modified while it is active
must be equal or lower that the sync
rate
Assigning name to ToD name <tod_name > no name removes the ToD clock name
clock
Defining input interface for interface-type {rj-45 | mini-bnc} rj-45 – 1PPS is supplied via RJ-45 TOD connector
1PPS phase stream mini-bnc – 1PPS is supplied via mini BNC 1PPS
connector
Message Description
TOD Y-cable must be disabled before ToD clock cannot be modified, when Y-cable redundancy is
changing TOD enabled
TOD must be in shutdown ToD clock cannot be modified if it is active (no shutdown)
Both TODs must be in no shutdown and To enable ToD Y-cable redundancy, configure both ToD clock to
have the same parameters the same parameters
Message Description
Both PTP 1588 must be the same: slave To use ToD Y-cable redundancy,1588v2 entities residing on two
or master main cards must be the same type: both master or both slave
Example
This example illustrates configuration of 1588v2 slave and master entities.
• Slave clock
Router interface (RIF) – 1
RIF IP address – 15.15.15.15/32
Physical port – Ethernet port 3 on main card A
Peer IP address – 30.30.30.30
Slave entity IP address – 15.15.15.15
Quality level – PRC
ETX-5
Port 1
Port 2
1588v2
Slave LB
Peer Master RIF 1
Clock Source
Entity
PSN 15.15.15.15/32
15.15.15.15 Router
Port 3
RIF 2
30.30.30.30
SVI
Port 4
Main Ethernet
Card A
• Master clock
Router interface (RIF) – 2
RIF IP address – 16.16.16.16/32
Physical port – Ethernet port 1 on main card B
Master entity IP address – 16.16.16.16
#***************************Adding_Loopback_RIF******************************
configure router 1 interface 1 loopback
address 15.15.15.15/32
no shutdown
exit all
#*********************************END****************************************
#***************************Configuring_Peer_Master**************************
configure peer 1 ip 30.30.30.30
exit all
#*********************************END****************************************
#**************************Configuring_1588v2_Slave**************************
configure system clock recovered main-a/3 ptp
ip-address 15.15.15.15
master 1
peer 1
quality-level prc
no shutdown
#*********************************End****************************************
Master Num : 1
IP : 30.30.30.30
PTSF : NACT
Clock Identity :
Received QL : Type-1 DNU
Granted Sync Rate (pps) : 128
Granted Sync Period (sec) : 60
Granted Announce Rate (pps) : 2
Granted Announce Period (sec) : 300
Granted Delay Respond Rate (pps) : 128
Granted Delay Respond Period (sec) : 300
#*********************************End****************************************
#*********************************END****************************************
#**************************Configuring_1588v2_Master*************************
configure system clock master main-b/1 ptp
ip-address 16.16.16.16
sync-rate 128pps
no shutdown
#*********************************End****************************************
Assigning device name name <device-name> The device name has unlimited length, but if you
enter a name with more than 20 characters, the
prompt displays only the first 20 characters
followed by 0. For example, this command that
defines a 25-character device name:
ETX-5# config sys name
ETXETXETXETXETXETX-512345
results in this prompt that shows the first
20 characters, followed by 0:
ETXETXETXETXETXETX-50#
Description : ETH NTU: Boot; 1.10, Hw: 0.0, Main Sw: 3.0, Back-up Sw: 3.0
Name : ETX-5-HQ
Location : floor-8
Contact : Engineer-1
MAC Address : 00-20-D2-30-CC-9D
Engine Time : 000:00:04:10
Caution Always wait until all main cards installed in the chassis are up and running before
executing any file operation commands.
• startup-config – Contains saved user configuration. You must save the file
startup-config; it is not automatically created. Refer to Saving the
Configuration for details on how to save the user configuration.
• user-default-config – Contains default user configuration. Refer to Saving the
Configuration for details on how to save the default user configuration.
• rollback-config –Contains configuration settings to be used if user
confirmation of loading startup-config file is not received.
• restore-point-config – Contains configuration saved during software
installation. System configuration can be restored from this file, if the
installation process fails.
• sw-pack-1, sw-pack-2, sw-pack-3, sw-pack-4 – Contain up to four software
images
• log –Alarm and event log
• mac-table – MAC address table
• ltm – Activity trace file for debug purpose.
You can copy files via the copy command, or via the commands shown in
Table 10-1.
To display the list of configuration and application files and their contents:
• At the file# prompt, enter the show command according to the table below.
running-config has been modified since last time it was equal to startup-
config
system
# Clock Configuration
clock
# Station Clock Configuration
station main-a/1
shutdown
name "Station Clk-5-1"
exit
station main-b/1
shutdown
more..
Deleting Files
You can delete files. Before deleting the file, make sure the file is not in use. For
additional information on configuration files and the consequences of deleting,
refer to Configuration Files and Loading Sequence in Chapter 3.
To delete a file:
1. At the file# prompt, enter: delete <file-name>.
You are prompted to confirm the deletion.
For example:
ETX-5# file
ETX-5>file# delete sw-pack-1
File will be erased. Are you sure?? [yes/no] _yes
2. Confirm the deletion.
or
• At the file# prompt, enter copy running-config startup-config.
Benefits
Simple Network Time Protocol (SNTP) synchronizes the internal clocks of network
devices to a single time reference source. SNTP provides comprehensive
mechanisms to access national time dissemination services, organize the NTP
subnet of servers and clients, and adjust the system clock in each participant. It
improves the timekeeping quality of the network by using redundant reference
sources and diverse paths for time distribution.
Factory Defaults
The default configuration of the SNTP parameters is:
• No SNTP servers defined
• Polling interval set to 15 minutes.
When an SNTP server is defined, its default configuration is:
• IP address set to 0.0.0.0
• Not preferred.
Functional Description
SNTP is a time-maintenance protocol that helps synchronize networked
hardware. It is based on a server-client topology. A client (ETX-5) sets its system
date and time by retrieving this information from an SNTP server. The information
is used for time-stamping log file messages, SNMP traps, Syslog entries and so
on. SNTP uses Coordinated Universal Time (UTC) as a reference.
Requ
est Reference
Time Source
Resp PSN
ETX-5 onse
Request
est
Requ Response
SNTP
onse Server
Resp
ETX-5
Transport Protocol
SNTP uses User Datagram Protocol (UDP) for its transport. The UDP port that has
been assigned to SNTP is 123, but devices and servers can be defined to use any
port for communication.
Defining the date date <date> Date is according to the configured date
format
Defining the time zone relative to zone utc [<[{+|-}]hh[:mm]>] Allowed range of values:
Coordinated Universal Time (UTC) -12:00 to +12:00, in 30-minute increments
Example
To set the date and time:
• Format = mm-dd-yyyy
• Date = May 17, 2011
• Time = 5:40pm
• Zone = UTC–4 hours and 30 minutes.
ETX-5#configure system date-and-time
ETX-5>config>system>date-time# date-format mm-dd-yyyy
ETX-5>config>system>date-time# date 05-17-2011
ETX-5>config>system>date-time# time 17:40
ETX-5>config>system>date-time# zone utc -04:30
ETX-5>config>system>date-time#
SNTP Configuration
To configure SNTP parameters:
1. Navigate to config system date-and-time sntp.
The config>system>date-time>sntp# prompt is displayed.
2. Enter all necessary commands according to the tasks listed below.
Setting the polling interval (in poll-interval interval <minutes> Allowed range is 1–1440
minutes) for SNTP requests
Setting UDP port for NTP udp port <udp-port> Allowed range is 1–65535
requests, to a specific UDP port udp default
or to default UDP port (123)
Example
NTP Server Type UDP Port Tstap Date Time Strat Received
CPU Utilization
-----------------------------------------------------------------------------
-----------------------------------------------------------------------------
main-a 0 14 100 12
main-b 0 0 0 0
Note If you are accessing ETX-5 via SSH, the banner is printed between the user name
prompt and the password prompt.
Notes • The banner must contain only printable ASCII characters (0x20–0x7E), <Enter>
(0x0D), <Line Feed> (0x0A), and <Tab> (0x09)
• The banner can contain up to 2,000 characters.
Slot : main-a
Kernel Total(KB) : 307493968 Free : 200861328
RTP : rInfrastructure
Total (KB) : 2666672 Free : 16512
RTP : rCardManager
Total (KB) : 65280 Free : 60704
more..
Caution Always wait until all main cards installed in the chassis are up and running before
executing any file operation commands.
The SFTP protocol is used to provide secure file transfers via the device’s
Ethernet interface. SFTP is a version of FTP that encrypts commands and data
transfers, keeping your data secure and your session private. For SFTP file
transfers, an SFTP server application must be installed on the local or remote
computer. SFTP file transfers use Port 22. You must check that the firewall you
are using on the server computer allows communication through this port.
A variety of third-party applications offer SFTP server software. For more
information, refer to the documentation of these applications.
Application file is
transferred to
ETX-5
Ethernet
Note Although the CLI allows sw-pack-1 through sw-pack-4, you can define only two
software packs simultaneously.
Note
Destination file name can be only sw-pack-1, sw-pack-2, sw-pack-3 or sw-pack-4.
Note
Source file name can be one of the following: startup-config, user-default-config
or rollback-config.
10.8 Inventory
The ETX-5 inventory table displays the unit’s components, hardware, software
and firmware revisions. You can display an inventory table that shows all installed
components, and you can display more detailed information for each component.
In addition, you can display manufacture information on items installed in specific
chassis slots, their serial numbers, software and hardware revisions and number
of defined MAC addresses.
FRU Indicates whether this component is a field replaceable unit that can be
replaced on site
Assigning user-specific asset identifier asset-id <id> no asset-id removes the asset
to the component (usually for ID
removable physical components)
Example
To display the following inventory information:
• Inventory table
• Inventory information for the ETX-5 chassis.
ETX-5# configure chassis
ETX-5# config>chassis# show summary-inventory
Index Physical Class Name HW Ver SW Ver FW Ver
-----------------------------------------------------------------------------
1001 Chassis AC-chassi N/A N/A N/A
Description : ETX-5300A.AC-chassis
Contained In : 0
Physical Class : Chassis
Relative Position : 0
Name : AC-chassi
HW Ver : N/A
SW Ver : N/A
FW Ver : N/A
Serial Number :
MFG Name : RAD
Module Name : ETX-5300A-AC
Alias :
Asset ID :
FRU : True
Note Resetting a module will temporarily disrupt services supported by that module.
To reset a module:
1. Navigate to configure slot <slot>.
The config>slot<slot># prompt is displayed.
2. Enter reset.
A confirmation message is displayed:
Card will reset. Are you sure?? [yes/no]
3. Enter yes to confirm the reset.
The module restarts.
10.10 Scheduling
You can schedule the execution of CLI commands at a future date and time. In
addition, you can schedule adjusting the device system time for the start and end
of summer time.
Benefits
You can ensure the execution of CLI commands, and adjusting device time to
reflect the start and end of summer time, at a specific date and time.
Factory Defaults
By default, no scheduling is configured.
The default value for summer time offset is 60 minutes.
Functional Description
Scheduling Commands
The global schedule command is used to configure the scheduling of a command.
You can specify any command to be scheduled except the logout command.
When you schedule a command, before saving it ETX-5 prefixes the command
with the path from which the schedule command was executed. To specify a CLI
command with a full CLI level path, you should schedule it in the CLI root level.
ETX-5 tests the command specified to be scheduled in the same way that it
would be tested when executed; if the tests fail, you are notified of this, but the
command is still scheduled, since it may be valid when the schedule time arrives.
The following types of schedules can be configured:
• In <minutes>– Executed once, after the specified number of minutes. This
type of schedule is not saved in permanent ETX-5 memory; it is deleted at
device reboot whether or not it was executed.
• At <date-and-time> – Executed once at the specified date and time. This type
of schedule can be optionally saved in permanent memory, in order to be
available after device reboot.
Note Schedules for date and time are saved in system local time. If the local time
changes, <Product> does not modify the schedules to compensate for the
change, therefore changing the time could cause schedules to be executed twice
or not executed at all.
Note ETX-5 logs the start and end of summer time with the events
summer_time_started and summer_time_ended, respectively. Each event is also
sent as an SNMP notification to management stations.
Note Schedules can be added or deleted, but not changed. If you wish to change the
details of a schedule, you have to delete it and then recreate it with the changes.
To configure schedules:
• In any level, enter the schedule command according to the type of schedule:
In <minutes> – Enter:
schedule <name> in <minutes> “<command>”
The schedule is saved with its name set to <name>, and the specified
<command> is executed after the specified amount of <minutes> has
elapsed, regardless of changes to the local system time.
Range for <minutes>: 1–14400 [10 days]
At <date-and-time> – Enter:
schedule <name> at {january | february | march | april | may | june | july |
august | september | october | november | december} <dd> <yyyy>
<hh>:<mm> <command> [permanent]
The schedule is saved with its name set to <name> (in permanent
memory if permanent was specified), and the specified <command> is
executed at the specified date and time. If the local system time is
changed after the schedule is configured, the scheduled command might
not be executed, or might be executed twice.
Note An invalid date and time is not allowed, however a date and time in the past is
allowed; a schedule with its date and time in the past will never be executed
unless the device date/time is changed such that the schedule date and time is
no longer in the past.
To delete schedules:
• To delete a specific schedule, in any level enter:
no schedule <name>
• To delete all finished schedules, navigate to the admin scheduler level and
enter:
clear-finished-schedules
Summer Time
Start (Recurring): Last Sunday of May, 02:00
End (Recurring): Last Thursday of October, 02:00
Offset : 60 minutes
Start : 31 May 2015 12:21
End : 25 October 2015 12:21
Summer Time
Start (Recurring): Last Sunday of May, 02:00
End (Recurring): Last Thursday of October, 02:00
Offset : 60 minutes
Start : 31 May 2015 12:21
End : 29 October 2015 12:21
Parameter Description
Current Time Current date and time, and current offset from UTC
Activation In output of show scheduler, indicates the amount of time before the scheduled
command will be executed, according to the type of schedule:
• Once (In) – Amount of time before the scheduled command will be executed, in the
form <hh:mm:ss>, <1 day hh:mm:ss> or <ddd days, hh:mm:ss>
• Once (At) – Date and time at which the scheduled command will be executed
• For either type, -- is displayed if the schedule is marked as finished
Activation (Local In output of show scheduler-details for schedule type Once (At), displays the date and
Time) time at which the scheduled command will be executed
Activation In In output of show scheduler-details for schedule types Once (In) and Once (At), displays
(Seconds) the amount of time before the scheduled command will be executed
Start (Date) For one-shot summer time scheduling, displays summer time start date and time
End (Date) For one-shot summer time scheduling, displays summer time end date and time
Start (Recurring) For recurring summer time scheduling, displays the configured week of the month,
weekday, month, and time for summer time start
End (Recurring) For recurring summer time scheduling, displays the configured week of the month,
weekday, month, and time for summer time end
End For recurring summer time scheduling, displays the next scheduled date and time for
summer time end
Examples
To schedule copying log file in two hours:
schedule sched-copy-2hrs in 120 “copy log tftp://1.1.1.1”
To schedule copying log file on April 2 at 6:00, with the schedule saved in
permanent memory:
schedule sched-copy-Apr2 at april 2 2015 06:00 “copy log tftp://1.1.1.1” permanent
save
To schedule summer time starting March 27 2015 at 1:00 and ending October 27
2015 at 2:00:
exit all
configure system date-and-time
summer-time date march 27 2015 01:00 october 27 02:00
save
To schedule summer time starting on the first Friday in March at 2:00 and ending
on the last Sunday in October at 3:00:
exit all
configure system date-and-time
summer-time recurring 1 friday march 02:00 last sunday october 03:00
save
Configuration Errors
The following table lists the messages generated by the device when a
configuration error is detected.
Schedule with this name You tried to create a new schedule with Specify a name that is not being used
already configured a name that is used by an existing by an existing schedule
schedule
Warning: Scheduled The command that you specified to Check the command; if changes are
command failed sanity schedule may fail when executed needed, delete the schedule and
re-enter it with the changed
command
The logout command You specified the logout command as None; ETX-5 does not allow the
may not be scheduled the command to schedule logout command to be scheduled
Summer-time already You entered the summer-time command Delete the existing summer-time
configured to configure summer time, but the configuration; and then re-enter the
scheduling of summer-time has already summer-time command
been configured
Recurring summer-time You tried to configure summer-time start Enter the summer-time command
start and end must be and end in the same month with summer-time start and end in
on different months different months
Summer-time cannot You entered the summer-time command Enter the summer-time command
end before it starts (with one-shot schedule type) with with summer-time start time earlier
summer-time end time earlier than than the end time
summer-time start
Benefits
The show tech-support command provides a easy way to gather device
information for troubleshooting and assisting technical support.
Functional Description
To execute a user-script:
• At the CLI prompt, enter exec user-script [file|terminal].
• By default, the output (the executed commands and their output) is sent to
the terminal screen.
• If file is chosen, the output is saved in the script-result file.
Examples
Below is an example of the show tech-support command output directed to the
terminal. When the output is directed at a file, the output is the same.
bridge_1_2>config>system# show tech-support
# Execute tech-support-script
17:22:09
mac-table LO -- 2015-10-22 Read Only
17:22:09
pm-0 LO 18 2015-10-22 File In Use
17:23:43
schedule-log LO 5000 2015-10-22 Read Only
17:22:09 File In Use
sw-pack-3 S 126336553 2015-10-22 File In Use
13:54:28
startup-config C 19835 2015-10-22
18:04:45
factory-default-config C 694 2015-10-22 Read Only
17:22:10
running-config C -- 2015-10-22 File In Use
18:07:41
log LO 2640 2015-07-26 Read Only
06:13:41
Not Prsnt 0
Ethernet main-a/3 Enabled 10G 0 0
Not Prsnt 0
Ethernet main-a/4 Enabled 10G 0 0
Not Prsnt 0
Ethernet main-b/0 Enabled 1G 0 1840254
Up 0
Ethernet main-b/1 Enabled 10G 24744904 28719740
Up 0
Ethernet main-b/2 Enabled 10G 0 0
Not Prsnt 0
Ethernet main-b/3 Enabled 10G 0 0
Not Prsnt 0
Ethernet main-b/4 Enabled 10G 51482465 36232145
Up 0
Ethernet 2/1 Enabled 10G 40094527 51314951
Up 0
Ethernet 2/2 Enabled 10G 51228654 41173771
Up 0
Station Clk main-a/1 Disabled -- N/A N/A
Down N/A
Station Clk main-b/1 Disabled -- N/A N/A
Down N/A
SAG 2/1 Enabled -- N/A N/A
Up N/A
SAG 2/2 Enabled -- N/A N/A
Up N/A
TOD main-a/1 Disabled -- N/A N/A
Up N/A
TOD main-b/1 Disabled -- N/A N/A
Up N/A
SVI 1 Enabled -- N/A N/A
Up N/A
SVI 2 Enabled -- N/A N/A
Up N/A
SVI 3 Enabled -- N/A N/A
Up N/A
SVI 4 Enabled -- N/A N/A
Up N/A
SVI 5 Enabled -- N/A N/A
Up N/A
SVI 4000 Enabled -- N/A N/A
Up N/A
SAP 2/1/1 Enabled -- N/A N/A
Up N/A
SAP 2/1/2 Enabled -- N/A N/A
Up N/A
SAP 2/1/3 Enabled -- N/A N/A
Up N/A
SAP 2/1/4 Enabled -- N/A N/A
Up N/A
SAP 2/1/5 Enabled -- N/A N/A
Up N/A
MIP
-----------------------------------------------------------------------------
Index MD Name Level Port Admin
bridge_1_2>config>system#
Indicators
ETX-5 cards and the ETX-5 chassis itself have various status indicators that can
be used to identify problems.
Refer to Chapter 3 of this manual for details regarding the functions and
indications of each system indicator.
ETX-5 maintains a cyclic event log file that stores up to 5000 time-stamped
events. In addition, an internal system log agent can send all reported events to a
centralized repository or remote server.
Statistic Counters
ETX-5 collects statistics per physical and logical ports (see the list below) and per
connection in 15-minute intervals. This enables the network operator to monitor
the transmission performance, and thus the quality of service provided to users,
as well as identify transmission problems. Performance parameters for all the
active entities are continuously collected during equipment operation.
Statistics for the last 24 hours are stored in the device and can be retrieved at
the network management station.
Statistic counters provide information on possible abnormal behavior and failures.
Masking
Alarms and events can be masked per source type, source ID, or minimum
severity. When masking by source type (such as Ethernet) or source ID (such as
Ethernet port 1 on card in slot 1), choose a specific alarm or event, or apply the
change to all the alarms and events of the selected source type or ID.
When masking an alarm/event, you can:
• Prevent the alarm/event from being written to the history log, sent to Syslog
servers, and displayed in the default view of the active alarms table
• Prevent any corresponding traps from being sent to management stations,
regardless of masking in the SNMP manager configuration
• Deactivate alarm reporting via LED and alarm relay.
When an alarm/event is not masked, any corresponding traps are sent only to
management station for which the traps are not masked in the SNMP manager
configuration. In addition, you can:
• Change alarm severity
• Mask a specific reporting method
• Mask alarms per their severity.
You can also acknowledge alarm logs. The last acknowledgement time is recorded
by ETX-5. When displaying the log, only entries entered after the last
acknowledgment time are displayed (or calculated, as for the brief log). This
action does not delete any data from the log, and you can also display
acknowledged data by using a designated keyword.
Alarm Buffer
ETX-5 continuously monitors critical signals and signal processing functions. In
addition, it can monitor an external alarm line, connected to the ALARM
connector.
If a problem is detected, ETX-5 generates time-stamped alarm messages. These
messages are explained below.
Internally, the ETX-5 stores alarms in an alarm buffer. The alarm buffer can store
up to 5000 alarm messages, together with their time-stamps. The alarm history
buffer is organized as a FIFO queue; after 5000 alarms have been written into the
buffer, new alarms overwrite the oldest alarms.
Alarm messages can also be sent automatically as traps to the user-specified
network management stations.
The alarms can be read on-line by the network administrator using the network
management station, a Telnet host, or a supervision terminal. The network
administrator can then use the various diagnostic tests to determine the causes of
the alarm messages and to restore the system to normal operation.
When ETX-5 is powered down, the alarm messages are not erased. When using
the terminal, a Web browser or a Telnet host, you can also clear (delete) the
alarms stored in this buffer after reading them.
Alarm Relays
In addition to the alarm reporting facility, ETX-5 has alarm relays with floating
change-over contacts for indicating the presence of critical, major and minor
alarms. Each relay changes state whenever the first alarm is detected, and
returns to its normal state when all the alarms of the corresponding severity
disappear.
The relay contacts can be used to report internal system alarms to outside
indicators, e.g., lights, buzzers, bells, located on an alarm bay or remote
monitoring panel.
Configuring alarm input alarm-input <port-number> [active {high | low | high – Active alarm input is
off}] [description <description>] indicated by high voltage
low – Active alarm input is
indicated by low voltage
off – Alarm input is disabled
Masking and controlling mask-minimum-severity [log {critical | major | Masking a minimum severity
popup behavior per alarm minor}] [snmp-trap {critical | major | minor}] means that lower severities are
per severity [led-relay {critical | major | minor}] [popup also masked
{critical | major | minor | event}] [vty-popup
{critical | major | minor | event}]
no mask-minimum-severity [log] [snmp-trap
[led-relay] [popup] [vtypopup]
Rebuilding active alarm table active-alarm-rebuild [send-traps] To ensure that no active alarms
from scratch, and, optionally are lost due to a system failure,
resending traps for all open the user can rebuild the active
alarms alarm table.
The optional traps sent by the
system have an indication that
are sent because of the
configuration change.
Defining method of log-file-timestamp-type {utc | local} utc – Alarms and events are
timestamping alarms and timestamped according to UTC
events in the uploaded log local – Alarms and events are
file timestamped according to local
time
Log file time type log-file-timestamp-type {utc|local} Time in log display in local time
or in UTC time
Note
If alarm/event is masked using one of the masking commands
(alarm-source-attribute, alarm-source-type-attribute, mask-minimum-severity),
there is no need to repeat the procedure using the other commands.
Examples
alarm-list List of all ETX-5 alarms for a specific source ID and severity 6
[<source ID> [severity value, or for all the alarms in the system
{critical|major|minor}]]
brief-log Brief log of active alarms, cleared alarms and events. The 7
brief log is cleared at reboot.
event-list List of all ETX-5 events for a specific source IDs or of all
the events available in the system
2 Provisioning failure
3 Fan failure
SNMP Trap : No
SNMP trap OID : 1.3.6.1.4.1.164.3.1.6.2.0.22
02:16:58.00 main-a/0
Source
Name ID Severity Logged
System
SYSTEM_TEMPERATURE_ORA 20002 Major Yes (Default)
----------------------------------------------------------------------------
System
hardware_failure_fe 20012 Yes (Default)
-----------------------------------------------------------------------------
System
Clearing Alarms
To clear a log:
• At the config>reporting# prompt, enter clear followed by log, brief-log or all-
logs to clear the full log, brief log or all alarm/event logs in ETX-5.
The log is cleared.
To ping an IP host:
1. At any level, start pinging the desired host specifying its IP address and,
optionally, the number of packets to send, and payload size:
ping <1.1.1.1–255.255.255.255> [number-of-packets <1–10000>] [payload-
size <32–1450 bytes>]
2. To stop the ping test, enter <Ctrl> + <c>.
To trace a route:
• At any level, start the trace route and specify the IP address of the host to
which you intend to trace route:
trace-route <1.1.1.1–255.255.255.255>
Testing Flows
Ingress Egress
SAG
I/O ETH
Port
Flow 3
Tester I/O ETH
Port
SAP
IO Main Card IO
SAP
SAP
IO Main Card
SAP
IO Main Card
Policer SAP
Port Loopback
ETH Port level loopback is supported, and applies for the following ports:
• 1GbE IO card
• Main Card
This is a PHY-level loopback.
• Local loopback is supported (ETH Tx looped back into the PSN).
• Remote loopback is supported (ETH Rx looped back toward ETH line)
The loopback is timed per a configurable value. When initiated it affects the
‘TEST’ LED. Events Loopback on/off is supported
CLI: loopback {local|remote} [duration <seconds>]
• The duration is in seconds, with range 0–86400. Entering 0 or not specifying
the duration disables the timer, e.g. the loopback runs forever until disabled
• Loopback is released after device reset
Standards
ITU-T Y.1564
LLDP
Benefits
The Y.1564 testing methodology provides a standard way of measuring the
performance of Ethernet-based services. The tests are performed per multiple
traffic streams simultaneously, confirming policing per EVC or EVC.CoS.
Factory Defaults
By default, Ethernet service activation testing functionality is disabled.
When a Y.1564 test profile is added, it has the following default settings:
ethernet-type 0x22e8
frame-size 512
direction bidirectional
color-aware color-aware
traffic-policing traffic-policing
cir-steps s1-percent – 25
s2-percent – 50
s3-percent – 75
s4-percent – 100
configuration-duration 60
performance-duration 120
rate-convention data-rate
Functional Description
To assure quality of service (QoS), providers must properly configure their
networks to define how the traffic is prioritized in the network. This is
accomplished by assigning different levels of priority to each type of service and
accurately configuring network prioritization algorithms. QoS enforcement refers
to the method used to differentiate the traffic of various services via specific
fields in the frames, thus providing better service to some frames over other
ones.
SLAs
The service-level agreement (SLA) is a binding contract between a service
provider and a customer, which guarantees the minimum performance that is
assured for the services provided.
Customer traffic is classified into three traffic classes, and each is assigned a
specific color: green for committed traffic, yellow for excess traffic and red for
discarded traffic.
Policing
ETX-5 has the ability to set different traffic policing parameters. When a policer is
activated it will monitor the incoming frames and determine their color mode
(CM). If CM is set to Color-Aware it then monitors incoming frames and assigns
them the relative color (green or yellow) based on the frame header matching
the policer setting and current information rate.
Y.1564 Standard
The ITU-T Y.1564 testing methodology ensures that the quality is maintained
across networks with multiple streams and different policing parameters. Service
providers use the SAC (Service Acceptance Criteria) information which is normally
based on a subset of the users SLA to set pass/fail parameters.
There are two main objectives:
• To validate that each Ethernet-based service is correctly configured
• To validate the quality of the services as delivered to the end user.
See the figure below for the test flowchart.
Enter test
parameters
Start test
Pass
Service
performance
test
Pass
Test completed
Configuration Test
The configuration test validates that the services are configured as intended
before proceeding to the service performance test. Each service is tested
individually and the information rate (IR), Frame Transfer Delay (FTD), Frame
Delay Variation (FDV) and Frame Loss Ratio (FLR) are measured simultaneously.
The test is declared successful if the information rate and frame counters are
Service Acceptance Criteria (SAC).
The configuration tests are as follows:
• CIR (simple or stepped)
• EIR (color-aware or color-blind)
• CBS (color-aware or color-blind)
• EBS (color-aware or color-blind)
• Traffic policing (color-aware or color-blind).
Note When CBS or EBS for an EVC.CoS are set to 0, the corresponding configuration
test is skipped.
Test procedures and success criteria are described in the Test Procedures below.
Performance Test
The performance test validates the quality of the services over user-defined
period of time (1–7200 minutes). Traffic is generated for all services at
configured CIR levels; all Ethernet performance parameters are measured
simultaneously. The bandwidth test as performed according to the bandwidth
profile of a policer assigned to a flow or created for the test. This means that the
Y.1564 test requires a policer to be configured prior to the test.
Test procedures and success criteria are described in the Test Procedures below.
Note If there are two bandwidth profiles (flow and test), the test bandwidth profile is
used.
Test Elements
The Y.1564 test is an intrusive procedure and includes the two main elements:
• Generator – an entity that initiates test, sends out the test and OAM frames,
and receives responses from the responder in a single-ended session
• Responder – an entity that receives the test and OAM frames from the
generator, and transmits a response to the generator in a single-ended
session.
The test operation is bidirectional. This means that the service performance is
measured on the frames that make a round trip (generator > receiver >
generator), see the figure below.
PSN
Forward
Backward
Generator Responder
Capacity
ETX-5 supports up to 64 simultaneous Y.1564 tests, with up to 64 generators
and up to 40 responders. The generators and responders can be activated over
EVC or EVC.CoS.
The rate of the Y.1564 traffic for a single generator/responder or several
generators/responders, running in parallel, cannot exceed 1 Gbps.
Operation
The generators and responders are supported over Down MEPs (E-Line service) or
Up MEPs (E-Line service over bridge/ring). Test traffic flow is illustrated and
explained below. The Y.1564 testing is disruptive; the user traffic is blocked on
the tested EVC during diagnostic procedure.
DMMs are used during Y.1564 test to measure frame delay and frame delay
variations. The DMM size is the same as the one that is configured for the Y.1564
operation during test profile creation.
Generator Responder
Test
Frames Test Frames,
DMMs, LMMs
Policer
PSN
Policer
Ethernet Down Ethernet Ethernet Down Ethernet
Looped Test Frames,
Port MEP Port Port MEP Port
DMRs, LMRs
Figure 11-4. Full Y.1564 Traffic Path for EVC with Single CoS (Down MEP)
Note The responder can be configured to inject the test frames into the policer or
bypass it.
Down MEP
Depending on the specific implementation, a single MEP per EVC or a separate
MEP per EVC.CoS is required to provision the test. In a case of multiple MEPs, all
of the MEPs must belong to the same MA.
The three figures below illustrate down MEP configurations for the Y.1564
testing.
Generator
Test
Frames
Policer
SAP
Generator
Test
Frames
EVC.CoS 1
Policer
Policer EVC.CoS 2
EVC.CoS 3
Policer
SAP
Generator
MA 1
Test
Frames
VLAN A
P-bit X
Policer
SAP
VLAN A
P-bit Y
Policer
SAP
Up MEP
For multipoint-to-multipoint (E-LAN) services, the Y.1564 testing is performed
over an Up MEP. The testing frames are transmitted into the bridge, and the
VLAN tag value of the test traffic is defined by the Rx flow classification.
Generator
Test
Frames
BP
Tx Flow
Policer
BP Bridge BP
Rx Flow
Ethernet
Up MEP SVI
Port
Generator
Test
Frames
EVC.CoS 1
Policer BP
Policer EVC.CoS 2
BP Bridge BP
EVC.CoS 3
Policer
SAP
Ethernet
Up MEP SVI
Port
Policer
PSN
Policer
Ethernet Down Ethernet Ethernet Ethernet
Port MEP Port Port Port
Test Procedures
This section describes Y.1564 test procedures and success criteria.
rate
1.1EBS
PHY
CIR
rate
1.1(CBS+EBS)
PHY
CIR+EIR
rate
1.1CBS
PHY
CIR
Performance Test
Transmission rate is equal to CIR.
Success criteria –FLR, FTD, FDV and Availability are within SAC limits.
Y.1564 test configuration procedure includes the following steps, detailed in this
section:
1. Add and configure a Y.1564 test profile
2. Add, configure and activate a Y.1564 test responder
3. Add, configure and activate a Y.1564 test generator.
Setting the round-trip service round-trip-thresholds <flr <ppm> | ftd flr – bidirectional Frame Loss
acceptance criteria <μs> | fdv <μs> | availability Ratio, measured in 1E-6 units
<percent/100> ftd – bidirectional Frame
Transfer Delay, measured in
microseconds
fdv – bidirectional Frame Delay
Variation, measured in
microseconds
availability – bidirectional
availability, measured in
hundredths of percent units
Specifying whether to include or burst-tests [cbs] [ebs] You can enter the command
exclude the CBS and EBS sub- no burst-tests with one or both parameters.
tests (burst tests) in the To specify not to include any
configuration phase burst tests in the configuration
phase, enter: no burst-tests.
Setting the number of steps and cir-steps<s1-percent | s1-percent s2- s1-percent –transmission rate,
their transmission rate in the CIR percent | s1-percent s2-percent s3- as percentage of CIR, at the
sub-test percent |s1-percent s2-percent s3- first step of the CIR sub-test
percent s4-percent> (1–100)
s2-percent – transmission rate,
as percentage of CIR, at the
second step of the CIR sub-test
(1–100)
s3-percent – transmission rate,
as percentage of CIR, at the
third step of the CIR sub-test
(1–100)
s4-percent – transmission rate,
as percentage of CIR, at the
fourth step of the CIR sub-test
(1–100)
Defining the duration of the performance-duration <15m | 2h | 24h Custom performance test
performance test | custom [1–7200]> duration is measured in
minutes (1–7200)
The following P-bit test profile parameters can be configured at the p-bit level in
the config>test>y1564>profile(profile-name)>p-bit<value># prompt.
Setting the round-trip service round-trip-thresholds <flr <ppm> | ftd flr – bidirectional Frame Loss
acceptance criteria <μs> | fdv <μs> | availability Ratio, measured in 1E-6 units
<percent/100> ftd – bidirectional Frame
Transfer Delay, measured in
microseconds
fdv – bidirectional Frame Delay
Variation, measured in
microseconds
availability – bidirectional
availability, measured in
hundredths of percent units
Defining the service to be tested bind <md <id> ma <id> [p-bit <0–7>] md –The maintenance domain
no bind to which the service belongs
(1–65535)
ma – The maintenance
association to which the
service belongs (1–65535)
p-bit – The specific P-bits to be
tested or all pre-configured
P-bits, if none are specified
no bind removes generator
association with the service
Defining a bandwidth profile for policer p-bit <value> bandwidth [cir p-bit – The CoS to which the
the test <kbps>] [cbs <bytes>] [eir <kbps>] configuration applies (0–7)
[ebs <bytes>] bandwidth – The committed
policer p-bit <value> profile <policer- information rate, committed
profile-name> burst size, excessive
no policer p-bit <value> information rate and excessive
burst size for the EVC.CoS
(0–4294967295)
For example:
policer p-bit 3 bandwidth cir 50000 profile – An optional
cbs 5000 pre-defined policer profile to
be used in the test
policer p-bit 3 profile test
no policer p-bit 3
Displaying the Y.1564 test show status See Displaying Test Status
status (Generator Side)
Displaying the test results and show report <summary | detailed> See Displaying Test Results.
measurements
Associated EVC
---------------------------------------------------------------
--------------Inner-Tag 500 Outer-Tag 200
Parameter Description
Displayed
Idle Test is not ready for activation; some of the mandatory attributes
are not configured yet
Failed Test has failed; the results are not within the SAC limits
User Aborted Test has been stopped by the operator (future option)
System Aborted Test has been autonomously stopped by the system (future option)
Parameter Description
Displayed
Time Remaining The time remaining till the end of the test
MEP The identifier of the MEP that is associated with the specific P-bit
Service The identifier of the service that is associated with the specific P-bit
BWP in use The origin of the associated bandwidth profile for the EVc.CoS (test
or flow)
Summary
-----------------------------------------------------------------------------
Scope : Configuration+Performance
Profile Name : y1564_profile_1
Start Date & Time : 2013–02–17 21:30:00
End Date & Time : 2013–02–17 22:00:00
Total Duration : 30:00
Overall Result : Passed
-----------------------------------------------------------------------------
P-bit : 1
Duration [sec] : 1800
Configuration Result : Passed
EIR Test
-----------------------------------------------------------------------------
Green Pass 15.0 39.6 2.4E-4 0.032 0.01
Total 40.0 39.6 2.4E-2 -- --
CBS Test
Pass
EBS Test
Pass
Traffic Policing
-----------------------------------------------------------------------------
Green Pass 15.0 39.1 1.8E-3 0.032 0.01
Total 46.25 39.1 1.8E-1 -- --
IR [Mbps]
-----------------------------------------------------------------------------
P-bit IR FLR FTD FDV Avail
[Mbps] [ms] [ms] [%]
-----------------------------------------------------------------------------
1 14.2 4.9E-4 0.032 0.01 94.0
Counter Description
Tx Rate (Mbps) The transmission rate to which the generator is configured in the
sub-test
Summary
-----------------------------------------------------------------------------
Scope : Configuration+Performance
Profile Name : y1564_profile_1
Start Date & Time : 2013–02–17 21:30:00
End Date & Time : 2013–02–17 21:45:18
Total Duration : 15:18
Overall Result : Passed
CIR Test
-----------------------------------------------------------------------------
Parameter Step #1 Step #2 Step #3 Step #4 Thr
----------------- -------- -------- -------- -------- -------
Tx Rate [Mbps] 3.25 7.50 11.25 15.0
IR – min [Mbps] 3.73 7.50 11.22 15.0
IR – mean [Mbps] 3.75 7.50 11.25 15.0
IR – max [Mbps] 3.76 7.50 11.26 15.0
FL – count 41 0 0 83
FLR 4.9E-4 0.0E-3 0.0E-4 2.4E-4 5.0E-4
FTD – min [ms] 0.022 0.022 0.022 0.022
Burst Tests
IR [Mbps]
-----------------------------------------------------------------------------
P-bit Min Mean Max
-----------------------------------------------------------------------------
1 14.2 14.2 14.2
FL
-----------------------------------------------------------------------------
P-bit Count FLR Thr
-----------------------------------------------------------------------------
1 19 4.9E-4 5.0E-4
FTD [ms]
-----------------------------------------------------------------------------
P-bit Min Max Std Mean Thr
-----------------------------------------------------------------------------
1 0.022 0.042 0.091 0.032 0.04
FDV [ms]
-----------------------------------------------------------------------------
P-bit Max Mean Thr
-----------------------------------------------------------------------------
1 0.02 0.01 0.09
Availability
-----------------------------------------------------------------------------
P-bit UAS % Thr [%]
-----------------------------------------------------------------------------
1 54 94.0 93.99
Counter Description
Tx Rate (Mbps) The transmission rate to which the generator is configured in the
sub-test
FLR Thr The FLR service acceptance criteria for the reported P-bit
FTD – std (ms) The calculated standard deviation of the Frame Transfer Delay
FTD Thr The FTD service acceptance criteria for the reported P-bit
FDV Thr The FDV service acceptance criteria for the reported P-bit
Availability Thr The Availability service acceptance criteria for the reported P-bit
Defining the service to be tested bind <md <id> ma <id> md –The maintenance domain
no bind to which the service belongs
(1–65535)
ma – The maintenance
association to which the
service belongs (1–65535)
no bind removes responder
association with the service
Displaying the Y.1564 test show status See Displaying Test Status
status (Responder Side)
Parameter Description
Example
This example shows how to create a Y.1564 test generator over a Down MEP
located between two main card ports and bound to one of them. The test is to
be run over OAM (CFM) service defined on P-bit 1.
Test
Frames
Flow 1 P-bit 1
Policer
Flow 2
************************Enabling_Main_Card_Ports*********************************
config port ethernet main-a/1
no shutdown
exit all
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-a/1 queue-group profile q_group_2_level_default
config port ethernet main-a/4 queue-group profile q_group_2_level_default
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet main-a/4 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Defining_Classifier_Profile******************************
config flows classifier-profile vlan100 match-any
match vlan 100
exit all
#*********************************End********************************************
************************Defining_Policer_Profile*********************************
config qos policer-profile 1 bandwidth cir 100000 cbs 10000 eir 10000 ebs 20000
exit all
#*********************************End********************************************
************************Defining_CoS_Mapping_Profile*****************************
config qos cos-map-profile cos_OAM classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
******************************Adding_Flows***************************************
configure flows flow 1
shutdown
classifier vlan100
ingress-port ethernet main-a/1
egress-port ethernet main-a/4 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 1
pm-enable
no shutdown
exit all
#**************************Defining_MEP_and_MEP_Service**************************
config oam cfm
maintenance-domain 1
maintenance-association 1
ccm-interval 1s
name uint 260
mep 4
bind ethernet main-a/4
direction down
flow uni-direction rx 2 tx 1
queue queue-mapping "QueueMapDefaultProfile" block 0/1
cos-mapping profile cos_OAM
ccm-initiate
ccm-priority 7
remote-mep 3
no shutdown
service 7
classification priority-bit 1
delay-threshold 100
delay-var-threshold 10
lmm-interval 100ms
dmm-interval 100ms
dest-ne 1
remote mac-address 00-20-D2-F8-1D-AB
exit
no shutdown
dest-ne 1
clear-statistics
exit all
#*********************************End********************************************
#*******************Configring_Y.1564_Test_Profile_and_Generator*****************
config test y1564
profile 1
ethernet-type 0x8550
frame-size 128
no color-aware
direction bidirectional
configuration-duration 60
performance-duration customer 10
rate-convention data-rate
scope configuration performance
exit
generator 1
bind md 1 ma 1 p-bit 1
test-profile 1
activate
exit all
#*********************************End********************************************
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Illegal frame size value Invalid test frame size for Y.1564 profile
Illegal threshold value Invalid round-trip service acceptance criteria for Y.1564 profile
Illegal traffic policing value Invalid traffic policer for Y.1564 profile
Illegal CIR step value Invalid CIR step for Y.1564 profile
Illegal configuration duration value Invalid duration of the configuration test for Y.1564 profile
Illegal performance duration value Invalid duration of the performance test for Y.1564 profile
Illegal rate convention value Invalid rate measurement convention for Y.1564 profile
Illegal P-bit value Invalid P-bit value for Y.1564 profile or generator
Max number of active generators has The maximum number of Y.1564 generators (eight) has been
been exceeded reached and no additional generators can be added
Max number of active responders has The maximum number of Y.1564 responders (20) has been
been exceeded reached and no additional responders can be added
Y.1564 profile has not been attached No Y.1564 profile has been attached to generator or responder
MEP or service have not been found MEP or OAM service within selected MD/MA does not exist
MEPs have different classification types MEPs within selected MD/MA have different classification types
Message Description
MEPs have different VLANs MEPs within selected MD/MA have different VLANs
MEPs have different inner VLANs MEPs within selected MD/MA have different inner VLANs
MEP or service are not active MEP or OAM service within selected MD/MA has not been
activated yet
I/O flow with matching CoS has not been The Y.1564 test mechanism failed to identify a MEP Tx flow with
found a P-bit, matching testing criteria. This is relevant for the Tx flows
originating from the I/O card port (via SAP).
Impossible to define more than 16 The maximum number of profiles have been defined.
profiles
Impossible to activate a generator that is A generator can’t be activated without p-bit definition while the
bounded to an OAM, but without p-bit OAM contains services with p-bit definition.
definition and starting from main-card
while the OAM contains some services
with more than one p-bit.
Standards
IEEE 802.1ag-D8, ITU-T Y.1731
LLDP
MEF 36
Factory Defaults
By default, OAM functionality is disabled.
Functional Description
OAM (Operation, Administration, and Maintenance) describes the monitoring of
network operation by network operators. OAM is a set of functions used by the
user that enables detection of network faults and measurement of network
performance, as well as distribution of fault-related information. OAM may trigger
control plane or management plane mechanisms, by activating rerouting or by
raising alarms, for example, but such functions are not part of the OAM itself.
OAM functionality ensures that network operators comply with QoS guarantees,
detect anomalies before they escalate, and isolate and bypass network defects.
As a result, the operators can offer binding service-level agreements.
OAM Elements
The Ethernet OAM mechanism monitors connectivity in Maintenance Association
(MA) groups, identified by a Maintenance Association Identifier (MAID). Each
maintenance association consists of two or more maintenance end points (MEP).
Every MA belongs to a maintenance domain (MD), and inherits its level from the
MD to which it belongs. The MD levels are used to specify the scope of the MA
(provider, operator, customer, etc).
• Maintenance Domain (MD) – The network or the part of the network for
which faults in connectivity can be managed. Each maintenance domain has
an MD level attribute which designates the scope of its monitoring.
• Maintenance Association (MA) – A set of MEPs, each configured with the
same MAID and MD level, established to verify the integrity of a single service
instance.
• Maintenance End Point (MEP) – An actively managed CFM entity. A MEP is
both an endpoint of a single MA, and an endpoint of a separate Maintenance
Entity for each of the other MEPs in the same MA. A MEP generates and
receives CFM PDUs and tracks responses.
OAM Functions
RAD’s carrier Ethernet aggregation and demarcation devices feature a
comprehensive hardware-based Ethernet OAM and performance monitoring for
SLA assurance:
• End-to-end Connectivity Fault Management (CFM) per IEEE 802.1ag:
Continuity check (CC)
Non-intrusive loopback
Link trace for fault localization
• End-to-end service and performance monitoring per ITU-T Y.1731
Loss measurement (single-ended)
Delay measurement (two-way).
Note Loss measurement is supported only if the MEP-connected flows have their
statistic counters enabled (PM-enabled).
OAM Connectivity
The figure below shows how the various levels of OAM sessions supported by
RAD equipment allow each entity to monitor the layers under its responsibility
and easily isolate problems. The Maintenance Entities (MEs) are created at
different levels:
• Lowest-level OAM session (subscriber ME) between two subscriber devices
(devices 1 and 8). ETX-2xxA devices serve as a MIPs
• End-to-end OAM session (EVC ME) between two ETX-2xxAs, which serve as
MEPs. ETX-5 devices act as MIPs.
• Segment OAM session (operator service ME) between ETX-2xxA and the
network side of ETX-5.
• Transport OAM session (tunnel ME) between network ports of two ETX-5
devices.
Subscriber Subscriber
Equipment Operator A NEs Service Provider Operator B NEs Equipment
1 2 3 4 5 6 7 8
Subscriber ME
EVC ME
Ethernet
Operator A Service ME
Operator B Service ME
UNI ME UNI ME
Transport Tunnel ME
ETX-2 ETX-2
ETX-5 Router Router ETX-5
Legend:
Triangle – MEP (Maintenance End Point)
Circle – MIP (Maintenance Intermediary Point)
10 GbE BP 10 GbE
MEP Bridge BP MEP
A MEP is transparent to OAM frames whose MD level is higher than the MEP level,
and drops OAM packets whose MD level is lower than the MEP level. It fully
supports connectivity check (CC), loopback, link trace and PM counters,
Down MEP
Down MEPs reside at port egress and are bound to physical ports. These MEPs
receive and send CFM PDU from and to the network. Down MEPs are supported
for either point-to-point (E-Line) or multipoint (E-LAN) services. Different MEP
locations are illustrated below.
The figure below illustrates a point-to-point service between two main card ports
with the MEP bound to port B. Tx flow in the service is directed to a queue block.
Tx Flow
MEP
Rx Flow
Main Card Main Card
Port A Port B
Figure 11-17. P
The figure below illustrates a point-to-point service between main and I/O card
ports with the MEP bound to port B. Tx flow in the service is directed to a queue
block.
Tx Flow
MEP
SAP
Rx Flow
Main Card I/O Card
Port A Port B
Figure 11-18. PtP Service with Down MEP Bound to I/O Card Port B
The figure below illustrates a point-to-point service between main and I/O card
ports with MEP bound to port A. Tx flow in the service is directed to a queue
block.
Rx Flow
MEP
SAP
Tx Flow
Main Card I/O Card
Port A Port B
Figure 11-19. PtP Service with Down MEP Bound to Main Card Port A
The figure below illustrates a point-to-point service between two I/O card ports
with the MEP bound to port B. Tx flow in the service is directed to a queue block.
Tx Flow
SAP
MEP
SAP
Rx Flow
I/O Card I/O Card
Port A Port B
Figure 11-20. PtP Service between Two I/O Card Ports with Down MEP Bound to Port B
The figure below illustrates a multipoint service between main card and bridge
ports with the MEP bound to port A. Tx flow in the service is directed to a queue
block.
Tx Flow
BP Bridge BP SVI MEP
Rx Flow
Main Card
Port A
Figure 11-21. Multipoint Service with Down MEP Bound to Main Card Port A
The Down MEP is defined over the physical port, inheriting its MAC address. The
Down MEP EVC/location is characterized by:
• Rx flow, whose classification profile can be one of the following:
Untagged
Single VLAN
Single VLAN+P-bit
Single outer + single inner VLAN
Up MEP
Up MEPs are supported for either point-to-point (E-Line) or multipoint (E-LAN)
services.
E-Line Up MEP
Up MEPs can be used on point-to-point (port-to-port) services. The Up MEP is
bound to an adjacent Ethernet port, inheriting its MAC address; it also faces the
egress port of the service.
The E-Line Up MEP is characterized by:
• Rx flow
• Tx flow.
Different E-Line MEP locations are illustrated below.
The figure below illustrates a point-to-point service between two main card ports
with the Up MEP bound to port A.
Tx Flow
MEP
Rx Flow
Main Card Main Card
Port A Port B
Figure 11-22. PtP Service with Up MEP Bound to Main Card Port A
The figure below illustrates a point-to-point service between two I/O card ports
with the Up MEP bound to port A.
Tx Flow
SAP
MEP
SAP
Rx Flow
I/O Card I/O Card
Port A Port B
Figure 11-23. PtP Service between Two I/O Card Ports with Up MEP Bound to Port A
E-LAN Up MEP
Up MEPs may reside at bridge ingress and are bound to bridge ports. These MEPs
receive and send CFM PDU from and to the bridge entity. The Up MEPs inherit
their MAC addresses from the corresponding physical ports (egress ports of Tx
flows). Different E-LAN Up MEP locations are illustrated below.
The figure below illustrates a multipoint service between I/O card and bridge
ports with the Up MEP bound to the bridge port. Tx flow in this service is directed
to the BP SVI.
Rx Flow
BP Bridge BP SVI MEP SAP
Tx Flow
I/O Card
Port A
The figure below illustrates a multipoint service between main card and bridge
ports with the Up MEP bound to the bridge port. Tx flow in this service is directed
to the BP SVI.
Rx Flow
BP Bridge BP SVI MEP
Tx Flow
Main Card
Port A
Multipoint Up MEP is defined over the bridge port. The Up MEP is characterized
by:
• Rx flow with a single VLAN classification profile
• Tx flow.
MIPs
Unlike MEP, which is a directional entity acting as a service termination point, MIP
is defined as a bidirectional intermediate entity, consisting of half functions
(MHFs). There are two types of intermediate entities: service-level and MD-level
MIPs. These MIP modes differ in functionality, scale, configuration, and cannot be
activated simultaneously.
Service-Level MIPs
Service-level MIP responds to link trace messages (LTMs) and loopback messages
(LBMs), whose MD level is equal to the MIP MD level. ETX-5 supports up to 256
service-level MIPs.
MIP
LBM/LTM LBM/LTM
Flow X Flow X
LBR/LTR LBR/LTR
MHF MHF
Like MEPs, the MIPs are bound to physical ports (directly- or indirectly-attached),
inheriting the MAC address of the port for LTM purposes. The MIPs have two
MHFs (up and down), each directed towards a physical port or bridge port. They
also have Rx and Tx flows attached to them:
• MHF 1 facing the physical port to which the MIP is bound
• MHF 2 facing the physical or bridge port.
MIP locations are similar to those of MEP.
The MIPs are defined under MD level and are characterized by the following:
• The physical port to which they are bound, inheriting the port’s MAC source
address
• Rx flow, originating from the MIP-bound port, which faces MHF 1, and whose
classification profile can be one of the following:
Untagged
Single VLAN
Single VLAN+P-bit
Single outer + single inner VLAN
Single outer VLAN + P-bit + single inner VLAN
• Rx classification, when Rx flow originates from SA with the Match All
classification profile
• Tx flow, originating from the physical port facing MHF 2
• CoS mapping profile
• Optional egress queue for the Tx flow.
The two figures below illustrate service-level MIPs in point-to-point and
multipoint services.
MIP
(bound to port B)
Rx Flow
Tx Flow
Main Card MHF 2 MHF 1 Main Card
Port A Port B
MIP
(bound to port B)
Rx Flow
SAP
Tx Flow
Main Card MHF 2 MHF 1 I/O Card
Port A Port B
MIP
(bound to port A)
Tx Flow
SAP
Rx Flow
Main Card MHF 1 MHF 2 I/O Card
Port A Port B
MIP
(bound to port B)
Rx Flow
BP Bridge BP SVI
Tx Flow
MHF 2 MHF 1 Main Card
Port B
MD-Level MIPs
MD-level MIPs are activated per device per MD level (or several MD levels).
Flows
When MD-level MIP mode is activated, ETX-5 creates a MIP for each flow at each
Ethernet port and bridge port. This includes the flows that already existed in the
system, and the new ones, which are added after device-level MIP creation. The
MIP inherits source MAC address from the adjacent Ethernet port.
MD-level MIPs can be defined over flows with one of the following classification
profiles:
• Single VLAN
• Single outer + single inner VLAN
MD-level MIPs cannot be provisioned over flows connected to router- and
pseudowire-type SVIs.
The two figures below illustrate device-level MIPs over point-to-point and
multipoint services.
MIP MIP
(bound to port A) (bound to port B)
MIP MIP
(bound to port A) (bound to port B)
SAP
MIP
(bound to port A)
SAP BP
MIP
Port A MHF 2 MHF 1 (bound to port C)
MIP
Bridge BP SVI
(bound to port B)
Port C
MHF 2 MHF 1
SAP BP
Measurements
MD-level MIPs respond to link trace messages (LTMs), whose MD level is equal to
the MIP MD level. MD-level MIPs do not interfere with active MAC swap loopbacks
on specific flows.
When a valid LTM is received:
• LTR is sent back:
E-Line: always
E-LAN: If a target MAC address in LTM is learned by the bridge
LTM is relayed:
E-Line: always
E-LAN: if a target MAC learned by the bridge, LTM is relayed to the port,
from which the MAC address is learned.
LTR includes:
• Ingress TLV replied with ingress MIP MAC address
• Egress TLV replied with egress MIP MAC address.
MIP
LTM LTM
Flow X Flow X
LTR LTR
MHF MHF
Messaging System
The Ethernet service OAM mechanism uses cyclic messages for availability
verification, fault detection, and performance data collection. The main message
types are detailed below.
Note OAM cyclic messages (CCMs, LBMs and LTMs) packet priority (P-bit value) is
user-configurable at MEP level.
CC Messages
Continuity Check Messages (CCMs) are sent from the service source to the
destination node at regular periodic intervals. They are used to detect loss of
continuity or incorrect network connections. A CCM is multicast to each MEP in a
MA at each administrative level. CCM status information is available at the MEP
and RMEP levels.
AIS
When a MEP detects a connectivity failure at a physical port, it propagates an
Alarm Indication Signal (AIS) in the direction away from the detected failure to
the next higher level. The AIS is sent over the MEP Rx flow with the level as
configured by the client MD level (default is the MEP level + 1) for the following
trigger events:
• LOC
• LCK
• Rx AIS.
The signal is carried in dedicated AIS frames. The transmit interval is configured
per MEP, and can be set to one frame per second (default) or one frame per
minute. The AIS message priority is set per MEP via P-bit (0–7) configuration.
AIS, LCK, LOC
Rx Flow
MEP
Tx Flow
RDI
When a downstream MEP detects a defect condition, such as a receive signal
failure or AIS, it sends a Remote Defect Indication (RDI) upstream in the opposite
direction of its peer MEP or MEPs. This informs the upstream MEPs that there has
been a downstream failure. The Tx RDI is also initiated when a LOC is detected on
at least one of the associated RMEPs.
CCM Interval
CCM interval is user-configurable at the MA level to 3.33 ms, 10 ms, 100 ms, 1s,
1m, 10m.
CCM Multcast DA
CCM multicast destination MAC addresses per 802.1ag definition are presented in
the table below.
01-80-C2-00-00-3y
7 7
6 6
5 5
4 4
3 3
2 2
1 1
0 0
Loopback Messages
MEPs send loopback messages (LBMs) to verify connectivity with another MEP or
MIP for a specific MA. Loopback is a ping-like request/reply function. A MEP sends
a loopback request message to another MEP or MIP, which generates a
subsequent LBR (loopback response). LBMs/LBRs are used to verify bidirectional
connectivity.
The LBMs are always marked green. LBM priority uses the CCM priority that is
configurable as a P-bit value at the MEP level. LBM CoS is set according to a P-bit-
to-CoS profile, with up to four such profiles per chassis.
LBMs are generated on demand and sent up to 500 times at a rate of 10 pps.
LTM Priority
The LBMs are always marked green. CCM priority is configurable as a P-bit value at
the MEP level, according to a P-bit-to-CoS profile with up to four such profiles per
chassis.
MEP
LTR
Main Card Main Card
Port A Port B
Figure 11-33. MEP with LTM Sent from the Card Port in Point-to-Point Service
In the figure below, the MEP responds with LTR if the target MAC address of the
received LTM is the same as the MEP MAC address (inherited from the port to
which the MEP is bound). LTM is not relayed.
LTM
Figure 11-34. MEP with LTM Sent from the Bridge Port in Multipoint Service
In the figure below, the MIP always responds with LTR and relays the LTM.
LTM LTM
LTR
MIP
Main Card Main Card
Port A Port B
Figure 11-35. MIP with LTM Sent from the Card Port in Point-to-Point Service
In the figure below, the MIP responds with LTR if the target MAC address of the
received LTM has been learned on the bridge port. The MIP relays the LTM if the
target MAC address of the received LTM has been learned on the bridge port or
has not been learnt at all. If the target MAC address has been learned on another
bridge port, the LTM is discarded.
LTM LTM
BP Bridge BP SVI
LTR
MIP
Main Card
Port A
Figure 11-36. MIP with LTM Sent from the Bridge Port in Multipoint Service
In the figure below, the MIP responds with LTR if the target MAC address of the
received LTM has been learned on another bridge port. The MIP relays the LTM to
the bridge port with the target MAC address. If the target MAC is unknown, the
MIP floods the LTM.
LTM LTM
BP Bridge BP SVI
LTR
MIP
Main Card
Port A
Figure 11-37. MIP with LTM Sent from the Card Port in Multipoint Service
Performance Monitoring
ETX-5 Ethernet service OAM PM functionality complies with the Y.1731
requirements. ETX-5 provides per-service loss and delay measurement and event
reporting.
Note Loss measurement is supported only if the MEP-connected flows have their
statistic counters enabled (pm-enable).
LMM
TxFcf: Tx DMM+DMR Counter
MEP MEP
Configuring OAM
Ethernet OAM configuration procedure includes the following steps, detailed in
this section:
Note Before deleting any of the OAM CFM components, verify that it is not used by
other ETX-5 elements, such as ERP.
Note A maintenance domain can be deleted only if it has all its MEPs/MIPs deleted or
disabled.
Specifying the maintenance md-level <md-level> The allowed range for md-level is 0–7
domain level Note: If the pre-standard OAM protocol
is used, the only value allowed for the
maintenance domain level is 3.
Specifying the name of the name string <md-name-string> • Maximum length of MD name string is
maintenance domain no name 43 characters
• Maximum combined length of MD
name and MA name strings is
44 characters
• ETX-5 supports up to 2048 MEPs with
MDs and/or MAs, using name strings
Note A maintenance association can be deleted only if it has all its MEPs/MIPs deleted
or disabled.
Specifying MA name in UINT, name uint <0–65535> • Maximum length of MD name string is
string, or icc format name string <ma-name-string> 43 characters
Configuring MEP for the MA mep <mepid> Refer to Configuring Maintenance Endpoints
Enabling AIS sending and ais [ interval { 1s | 1min }] To disable AIS sending, enter no ais
defining interval [priority <priority>]
Binding the MEP to an bind ethernet <slot/port> To remove the MEP from an Ethernet port,
Ethernet port, LAG or SVI bind lag <port_number> LAG or SVI, enter no bind
Specifying the priority of ccm-priority <priority> The allowed range for <priority> is 0–7
CCMs, LBMs and LTMs
transmitted by the MEP
Associating the MEP with a classification profile <profile_name> Classifier profile is needed when the MEP
classifier profile no classification profile Rx flow has the SAP ingress port (in this
case the flow classifier profile is Match
All).
To delete classifier profile assignment,
enter no classification profile.
Defining client MD level client-md-level <md_level> Client MD level is a level for sending
upstream AIS
Associating the MEP with a cos-mapping profile <profile_name> The CoS mapping profile must be
CoS profile no cos-mapping profile P-bit-to-CoS to assign the class of service
to the packets transmitted by the MEP
(CCMs, LBTs etc).
To delete CoS mapping profile assignment,
enter no cos-mapping profile.
Assigning unidirectional Rx flow uni-direction rx <rx_flow_name> [tx To delete flow assignment, enter no flow
and Tx flows to the MEP <tx-name>] uni-direction
no flow uni-direction
Activating OAM link trace linktrace See Performing OAM Link Trace
Defining the queue for the queue queue-mapping To delete queue assignment, enter no
MEP <queue_mapping_profile_name> queue queue-mapping
[block <level_id>/<queue_id>]
no queue queue-mapping
Defining remote MEP with remote-mep <remote_mep_id> Allowed range for remote MEP is 1–8191
which the MEP no remote-mep <remote_mep_id> The MEP ID and the remote MEP ID must
communicates be different. You can define up to 512
remote MEPs for the local MEP if standard
OAM protocol is being used for the MD
and the destination address type is
multicast; otherwise you can define only
one remote MEP.
To delete remote MEP, enter no
remote-mep <remote_mep_id>
MD-Level MIP
When MD-level MIP mode is activated, ETX-5 creates a MIP for each flow at each
Ethernet port and bridge port. The MIPs are added for each specified MD level, or
MD level range.
Service-Level MIP
MIPs are bidirectional intermediate entities, consisting half functions (MHFs). MIPs
respond to link trace messages (LTMs) and loopback messages LBMs, whose MD
level is equal to the MIP MD level. ETX-5 supports up to 256 MIPs.
To add a maintenance intermediate point (MIP):
• At the config>oam>cfm>md(<mdid>)# prompt enter: mip <mipid>
The maintenance intermediary point is created and the
config>oam>cfm>md(<mdid>)>mip(<mipid>)$ prompt is displayed.
Binding the MIP to an bind ethernet <slot/port> To remove the MIP from an Ethernet port,
Ethernet port, LAG or SVI bind lag <port_number> LAG or SVI, enter no bind
Assigning unidirectional Rx flow uni-direction rx <rx_flow_name> [tx To delete flow assignment, enter no flow
and Tx flows to the MIP <tx-name>] uni-direction
no flow uni-direction
The following marking actions can be performed at the mhf level, at the
config>oam>cfm> md(<mdid>)>mip(<mipid>)>mhf(1 or 2)# prompt.
Associating the MHF with a classification profile <profile_name> Classifier profile is needed when the MHF
classifier profile no classification profile Rx flow has the SAP ingress port (in this
case the flow classifier profile is Match
All).
To delete classifier profile assignment,
enter no classification profile.
Associating the MHF with a cos-mapping profile <profile_name> The CoS mapping profile must be
CoS profile no cos-mapping profile P-bit-to-CoS to assign the class of service
to the packets transmitted by the MHF
(CCMs, LBTs etc).
To delete CoS mapping profile assignment,
enter no cos-mapping profile.
Defining the queue for the queue queue-mapping To delete queue assignment, enter no
MHF <queue_mapping_profile_name> queue queue-mapping
[block <level_id>/<queue_id>]
no queue queue-mapping
Associating this service with a classification priority-bit <p-bit> The allowed range is 0–7
priority for LMMs and DMMs
Specifying delay threshold in delay-threshold <delay-thresh> The allowed range for delay
microseconds threshold is: 1–5,000,000. If the
threshold is exceeded, the
service is declared as degraded.
Specifying delay variation delay-var-threshold <delay-var-thresh> The allowed range for delay
threshold in microseconds variation threshold is:
1–5,000,000. If the threshold is
exceeded, the service is
declared as degraded.
Selecting loss measurement loss { single-ended} [{synthetic | user- no loss disables loss
method data}] measurement
no loss
Activating the MEP service no shutdown You can activate a service only if
the corresponding MEP is active
and you have defined at least
one destination NE.
Viewing running statistics show statistics running The statistics are displayed
as listed in the table below.
Viewing statistics for the current show statistics current The statistics for the current
interval interval are displayed as
listed in the table below.
Viewing the statistics for a show statistics interval <interval-num> Allowed values for
selected interval interval-num: 1–96
The statistics for the
selected interval are
displayed as listed in the
table below.
If you specified an interval
that has not yet ended, a
message indicates that the
interval does not exist.
Viewing statistics for current day show statistics current-day The statistics for the current
day, as listed in the table
below.
Viewing statistics for previous show statistics previous-day The statistics for the
day previous day, as listed in the
table below.
Viewing statistics for all intervals show statistics all-intervals Performance measurement
counters for all available
Intervals, as listed in the
table below.
Parameter Description
Far End Tx Frames Total number of OAM frames transmitted from the local MEP to the
remote MEP since the service was activated
Far End Rx Frames Total number of OAM frames received by the remote MEP since the
service was activated
Far End Lost Frames Total number of OAM frames lost from the local MEP to the remote MEP
since the service was activated
Far End Frame Loss Ratio (%) Total number of OAM frames lost from the local MEP to the remote MEP,
divided by the total number of OAM frames transmitted since the service
was activated
Far End Unavailable Seconds Total number of unavailable seconds in the remote MEP since the service
(sec) was activated
Near End Tx Frames Total number of OAM frames transmitted from the remote MEP to the
local MEP since the service was activated
Near End Rx Frames Total number of OAM frames received by the local MEP since the service
was activated
Near End Lost Frames Total number of OAM frames lost from the remote MEP to the local MEP
since the service was activated
Near End Frame Loss Ratio (%) Total number of near end lost OAM frames divided by the total number
of near end transmitted OAM frames
Near End Unavailable Seconds Total number of unavailable seconds in the local MEP since the service
(sec) was activated
Average Two Way Delay (msec) Average delay
Frames Above Delay Threshold Number of frames that exceeded the delay threshold
Frames Above Delay Variation Number of frames that exceeded the delay variation threshold
Threshold
Min Two-Way Frame Delay The minimum two-way frame dealy measurement in microseconds
(interval statistics only)
Max Two-Way Frame Delay The maximum two-way frame dealy measurement in microseconds
(interval statistics only)
Average Two Way Delay Var The average (arithmetic mean) two-way FDV measurement in
(mSec) microseconds (interval statistics only)
Min Two-Way Frame Delay The minimum two-way frame dealy variation measurement in
Variation microseconds (interval statistics only)
Max Two-Way Frame Delay The maximum two-way frame dealy variation measurement in
Variation microseconds (interval statistics only)
Elapsed Time (sec) Time (in seconds) elapsed since the service was activated
ETX-5>config>oam>cfm>md(1)>ma(1)>mep(205)>service(1)>dest-ne(1)# show
statistics running
Running Counters
-----------------------------------------------------------------------------
Forward Backward
Tx Frames : 0 0
Rx Frames : 0 0
Frames Loss : 0 0
Unavailable Seconds : 119 119
ETX-5>config>oam>cfm>md(1)>ma(1)>mep(205)>service(1)>dest-ne(1)# show
statistics current
Current
-----------------------------------------------------------------------------
Forward Backward
Tx Frames : 0 0
Rx Frames : 0 0
Frames Loss : 0 0
Frame Loss Ratio (%) : 0.0000% 0.0000%
Unavailable Seconds : 0 0
ETX-5>config>oam>cfm>md(1)>ma(1)>mep(205)>service(1)>dest-ne(1)# show
statistics interval 1
Interval
-----------------------------------------------------------------------------
Interval : 1
Valid Data : Valid
Time Stamp : 2014-07-06 08:45:00.0
Duration (Sec) : 900
Forward Backward
Tx Frames : 0 0
Rx Frames : 0 0
Frames Loss : 0 0
Frame Loss Ratio (%) : 0.0000% 0.0000%
Unavailable Seconds : 0 0
Specifying remote the MEP by linktrace address <mac-address> The TTL parameter specifies
MAC or mep-id address [ttl <1–64>] the number of hops. Each unit
linktrace remote-mep <mep-id> in the link trace decrements
[1..8191] the TTL until it reaches 0,
which terminates the link trace.
Destnation MAC address LTM
cannot be multicast.
Examples
This section illustrates OAM configuration for three MEP instances (two Down
MEPs and one Up MEP).
LMMs
MEP PSN MEP
EVC1_eg LMRs DMMs
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet main-b/2 queue-group profile q_group_2_level_default
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-b/1 classification-key vlan p-bit
config port ethernet main-b/2 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Enabling_Main_Card_Ports*********************************
************************Defining_Classifier_Profile******************************
config flows classifier-profile class20 match-any
match vlan 20
exit all
#*********************************End****************************************
************************Defining_Policer_Profiles********************************
config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0
config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0
exit all
#*********************************End********************************************
************************Defining_CoS_Mapping_Profile*****************************
cos-map-profile cos1 classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
******************************Adding_Flows***************************************
configure flows flow EVC1_eg
classifier class20
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block 0/1
ingress-color profile color1
cos-mapping profile cos1
no shutdown
exit all
*********************Defining_Measurement_Bin_Profiles***************************
config oam cfm measurement-bin-profile bin_profile_delay1 thresholds
20,100,300,1000
config oam cfm measurement-bin-profile bin_profile_delay_var1 thresholds
40,200,600,1000
exit all
#*********************************End********************************************
#**************************Defining_MEP_and_MEP_Service**************************
config oam cfm
maintenance-domain 1
md-level 4
maintenance-association 1
name uint 265
mep 1
bind ethernet main-b/1
cos-mapping profile cos1
direction down
flow uni-direction rx EVC1_eg tx EVC1_ing
queue queue-mapping QueueMapDefaultProfile block 0/1
ccm-initiate
ccm-priority 0
remote-mep 101
no shutdown
service 1
classification priority-bit 1
dest-ne 1
remote mac 00-20-d2-50-1d-28
delay-measurement-bin bin_profile_delay1
delay-var-measurement-bin bin_profile_delay_var1
exit
no shutdown
exit all
#*********************************End********************************************
#*******************Configring_OAM_Reporting_Thresholds**************************
config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60
config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60
SAG
SAP
CCMs
ECV2COS1
EVC2_eg LMMs
Port 1 SAP 1 Port 1 PSN MEP
ECV2COS2 MEP LMRs DMMs
EVC2_ing
DMRs
Remote NE
SAP
Figure 11-43. Down MEP between Main and I/O Card Ports
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-b/1 queue-group profile q_group_2_level_default
config port ethernet 1/1 queue-group profile q_group_2_level_default
config port sag 1/1 queue-group profile q_group_SAG_2_level_default
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-b/1 classification-key vlan inner-vlan p-bit
config port ethernet 1/1 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Enabling_Main_and_I/O_Card_Ports*************************
config port ethernet main-b/1 no shutdown
config port ethernet 1/1 no shutdown
exit all
#*********************************End********************************************
************************Defining_Classifier_Profiles*****************************
config flows classifier-profile class100pbit6 match-any
match vlan 100 p-bit 6
exit all
************************Defining_Policer_Profiles********************************
config qos policer-profile "1" bandwidth cir 5000 cbs 10000 eir 0 ebs 0
config qos policer-profile "2" bandwidth cir 30000 cbs 10000 eir 0 ebs 0
exit all
#*********************************End********************************************
************************Defining_CoS_Mapping_Profile*****************************
cos-map-profile cos1 classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
******************************Adding_Flows***************************************
configure flows flow ECV2COS1
classifier class100pbit6
cos-mapping fixed 0
ingress-color green
ingress-port ethernet 1/1
egress-port sap 1/1/1 queue-map-profile QueueMapDefaultProfile block 0/1
policer profile 1
no shutdown
exit all
*********************Defining_Measurement_Bin_Profiles***************************
config oam cfm measurement-bin-profile bin_profile_delay1 thresholds
20,100,300,1000
config oam cfm measurement-bin-profile bin_profile_delay_var1 thresholds
40,200,600,1000
exit all
#*********************************End********************************************
#**************************Defining_MEP_and_MEP_Service**************************
config oam cfm
maintenance-domain 1
maintenance-association 2
name uint 22
mep 2
bind ethernet main-b/1
cos-mapping profile cos1
direction down
flow uni-direction rx EVC2_ing tx EVC2_eg
queue queue-mapping QueueMapDefaultProfile block 0/1
ccm-initiate
ccm-priority 0
remote-mep 110
no shutdown
service 1
classification priority-bit 1
dest-ne 1
remote mac 00-20-d2-50-2e-55
delay-measurement-bin bin_profile_delay1
delay-var-measurement-bin bin_profile_delay_var1
exit
no shutdown
exit all
#*********************************End********************************************
#*******************Configring_OAM_Reporting_Thresholds**************************
config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60
config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60
SVI
Flow 1 1
Port 1 MEP BP 1
Flow 2
SVI
Flow 3 2
Port 2 BP 2
Flow 4
SVI
Flow 5 3
Port 3 BP 3
Flow 6
Bridge
**********************Assigning_Default_Queue_Group_Profiles*********************
config port ethernet main-a/1 queue-group profile q_group_2_level_default
config port ethernet main-a/2 queue-group profile q_group_2_level_default
config port ethernet main-a/3 queue-group profile q_group_2_level_default
exit all
#*********************************End********************************************
**********************Assigning_Classification_Keys******************************
config port ethernet main-a/1 classification-key vlan p-bit
config port ethernet main-a/2 classification-key vlan p-bit
config port ethernet main-a/3 classification-key vlan p-bit
exit all
#*********************************End********************************************
************************Enabling_Main_and_I/O_Card_Ports*************************
config port ethernet main-a/1 no shutdown
config port ethernet main-a/2 no shutdown
config port ethernet main-a/3 no shutdown
exit all
#*********************************End********************************************
************************Defining_Classifier_Profiles*****************************
config flows classifier-profile class20 match-any
exit all
#*********************************End****************************************
************************Defining_CoS_Mapping_Profile*****************************
cos-map-profile cos1 classification p-bit
map 0 to-cos 0
map 1 to-cos 1
map 2 to-cos 2
map 3 to-cos 3
map 4 to-cos 4
map 5 to-cos 5
map 6 to-cos 6
map 7 to-cos 7
exit all
#*********************************End********************************************
***********************Configuring_Bridge_and_Bridge_Ports***********************
config port svi 1 bridge
exit all
******************************Adding_Flows***************************************
config flows flow 1
classifier class20
ingress-port ethernet main-a/1
egress-port svi 1
ingress-color profile color1
cos-mapping profile cos1
no shutdown
exit all
*********************Defining_Measurement_Bin_Profiles***************************
config oam cfm measurement-bin-profile bin_profile_delay1 thresholds
20,100,300,1000
config oam cfm measurement-bin-profile bin_profile_delay_var1 thresholds
40,200,600,1000
exit all
#*********************************End********************************************
#**************************Defining_MEP_and_MEP_Service**************************
config oam cfm
maintenance-domain 2
md-level 3
maintenance-association 3
name uint 37
mep 3
bind svi 1
cos-mapping profile cos1
direction up
flow uni-direction rx 2 tx 1
ccm-initiate
ccm-priority 0
remote-mep 101
no shutdown
service 1
classification priority-bit 1
dest-ne 1
remote mac 00-20-d2-50-1d-28
delay-measurement-bin bin_profile_delay1
delay-var-measurement-bin bin_profile_delay_var1
exit
no shutdown
exit all
#*********************************End********************************************
#*******************Configring_OAM_Reporting_Thresholds**************************
config fault cfm service 1 1 1 1 above-delay frames-report 20 10 60
config fault cfm service 1 1 1 1 above-delay-var frames-report 20 10 60
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Mismatch between flow and MIP The classification profile bound to the MIP and the classification
classification profiles profiles of its Rx/Tx flows do not match
Flow must be enabled The flow must be administratively enabled before it is bound to
the MEP/MIP
Maximum number of MEPs (8) associated A single flow can be bound to up to eight MEPs
with the flow has been reached
Different MEPs/MIPs, using the same When the same flow is bound to different MEPs/MIPs, the flow
flow, must have different MD levels must have different MD levels
MIP bound to Ethernet port or LAG must When a MIP is bound to an Ethernet port or LAG, the MIP must
have classification profile have a classification profile assigned to it
MIP-bound bridge port is not a member The bridge port of the SVI to which the MIP is bound is not a
of the MHF’s classification profile VLAN member of the VLAN defined in the VLAN-based classification
profile used by the MIP’s MHF
MEP is not bound to a port A MEP must be bound to an Ethernet port, LAG or bridge-type
SVI
Cannot bind CoS mapping profile to a The CoS profile cannot be bound to a MEP bound to an Ethernet
MEP bound to an Ethernet port or LAG port or LAG
Cannot bind queue mapping profile to a The queue mapping profile cannot be bound to a MEP bound to
MEP bound to an Ethernet port or LAG an Ethernet port or LAG
Up MEPs are bound to SVI (B), Down The Up MEP must be bound to a bridge-type SVI. The Down MEP
MEPs are bound to Ethernet port or LAG must be bound to an Ethernet port or LAG
Cannot delete MA with MEPs The MA cannot be deleted if it has MEPs defined under it
Cannot change MA with MEPs The MA parameters cannot be changed if the MA has MEPs
defined under it
Cannot change MA with MIPs The MA parameters cannot be changed if the MA has MIPs
defined under it
The value is out of range The value entered not within the allowed range
MA name is out of range The MA name value is not within the allowed range (0–6535)
Max number of MEs has been reached The maximum number of MEs (4096) has been reached
Max value has been reached The maximum value for the current parameters has been
reached. This may refer to the number of MEPs/MIPs, remote
MEPs, destination NEs, etc.
Max number of Down MEPs per MA has Only one Down MEP is allowed per MA
been reached
Message Description
Entity must be in shutdown The entity (MEP, MIP, port, etc.) must be administratively
disabled in order to delete or change its parameters
Port does not exist The port to which you are trying to bind a MEP/MIP does not
exist
MEP/MIP port is not Ethernet, LAG or SVI The port to which you are trying to bind a MEP/MIP is not
Ethernet, LAG or SVI
SVI must be of bridge type The SVI to which you are trying to bind a MEP/MIP is not a bridge
type
VLAN ID is out of range The selected VLAN ID is not within the allowed range (0–4094)
VLAN ID can be changed in MEP/MIP The VLAN ID can be changed only when the MEP/MIP is
shutdown administratively disabled
Classification profile can be changed in Assigned classification profile can be changed only when the
MEP/MIP shutdown MEP/MIP is administratively disabled
Invalid classification profile The classification profile bound to the MEP/MIP is not valid.
Profile does not exist A non-existing classification or CoS mapping profile has been
bound to MEP/MIP
CoS mapping profile must be P-bit-to- Only a P-bit-to-CoS CoS mapping profile can be bound to
CoS MEP/MIP
Only default queue mapping profile is Only a default queue mapping profile (QueueMapDefaultProfile)
allowed can be bound to MEP/MIP
Port can be changed, when MEP/MIP is in The port to which a MEP/MIP is bound can be changed only
shutdown when the MEP/MIP is administratively disabled
LTM destination MAC cannot be multicast The destination MAC address for OAM link trace messages
cannot be a multicast type
Cannot enable OAM service if no The OAM service can be administratively enabled only if a
destination NE exists destination NE has been defined for it
Cannot enable OAM service if no The OAM service can be administratively enabled only if a
destination NE MAC exists destination NE MAC address has been defined
Destination NE MAC can be unicast only The MAC address of the destination NE can be a unicast type
only
MEP Rx flow must be configured The Rx flow for the MEP has not yet been configured
MEP Tx flow must be configured The Tx flow for the MEP has not yet been configured
I/O port-to-SAP flow must be configured For Rx flow with ingress port defined as SAP, there must be a
for Rx flow with SAP as ingress port matching flow between I/O port and SAP
Illegal ingress port for Rx or Tx flow The ingress port for Rx and Tx flows must be an Ethernet port,
LAG, bridge-type SVI or SAP
Classification profile must be bound to If Rx flow uses the Match All classification mode, a separate
MEP/MIP, if Rx flow uses Match All classification profile must be bound to the MEP/MIP
classification
Message Description
Classification profile must be bound to If Tx flow uses the Match All classification mode, a separate
MEP/MIP, if Tx flow uses Match All classification profile must be bound to the MEP/MIP
classification
Classification profile cannot be bound to If Rx flow does not use the Match All classification mode, a
MEP/MIP, if Rx flow uses other than separate classification profile cannot be bound to the MEP/MIP
Match All classification
OAM service must be in shutdown The OAM service must be administratively disabled for this
action
MEP must be in no shutdown The MEP to be administratively enabled for this action
Cannot delete MD with MA or MIP under An MD with existing MAs or MIPs cannot be deleted
it
Cannot change MD level The MD level cannot be changed if the MD has MEPs/MIPs under
it
Max number of MDs has been reached The maximum number of MDs (4096) has been reached
Bin profile is in use and cannot be The measurement bit profile is in use and cannot be deleted or
changed modified
Standards
IEEE 802.3ah
Benefits
Ethernet OAM (EFM) provides remote management and fault indication for the
Ethernet links. Remote link failure can be detected via OAM (EFM).
Factory Defaults
By default, OAM EFM is not enabled for Ethernet ports.
Functional Description
OAM EFM is specified by IEEE 802.3ah and can be implemented on any full-duplex
point-to-point or emulated point-to-point Ethernet link.
OAM EFM messages are sent in untagged slow protocol frames called OAM
Protocol Data Units, or OAMPDUs. They cannot propagate beyond a single hop
within an Ethernet network and have modest bandwidth requirements (frame
transmission rate is limited to a maximum of 10 frames per second).
802.3ah 802.3ah
Ethernet Ethernet
OAMPDUs MPLS OAMPDUs
Access Access
Core Network
Network Network
Layer-2 Operation
OAM EFM operates purely at the Ethernet layer, and so (unlike SNMP or ping)
does not require an IP address. This means that Ethernet service providers do not
need to run IP protocols or manage IP addresses. Furthermore, special Ethernet
features may be directly supported, such as Ethernet multicast and slow protocol
frames. When an OAM frame is received by an OAM-enabled Ethernet MAC, it is
passed to the OAM client for processing; such a frame is simply discarded if
received by a MAC that does not support link-layer OAM. In any case, link-layer
OAM frames are never forwarded.
Since the IEEE link-layer OAM is generally used over a link between a service
provider and a customer, it defines two modes for OAM entities: active or
passive. The elements of the provider network (e.g. DSLAMs or provider Ethernet
switches) operate in active mode, and can exert control over the passive-mode
devices (e.g. DSL modems or customer premises switches). Thus, the active-mode
entity can send an LB command forcing the passive-mode device into loopback
mode, and query the configuration parameters of the passive-mode device.
However, the reverse is not possible.
OAMPDUs
The OAMPDUs perform the following functions:
• Discovery is the procedure whereby OAM-enabled entities discover each
other and exchange information regarding their OAM capabilities and
configuration. The OAM capabilities may be used to determine whether it is
worthwhile to run the OAM protocol.
Disovery is initiated by an active ETX-5 Ethernet port. It advertises the
following capabilities:
Mode
RAD OUI
OAMPDUs use RAD OUI (Organizationally Unique Identifier) – 00-20-D2.
MAC Address
OAMPDUs use the relevant port MAC as the MAC SA. To support OAM EFM, the
user must configure trap the 01-80-C2-00-02, using L2CP mechanism.
To ensure correct distribution of EFM traffic, you must configure flow with an
L2CP profile with peer action for the OAM EFM address (01-80-c2-00-00-02). The
flow must have the following attributes:
• Untagged classification
• Ingress port – Ethernet port
• Egress port – according to application requirements.
If you use the flow only to peer the EFM frames and do not need to forward the
untagged traffic, discard it, using the drop command on the flow.
Enabling OAM EFM, and defining efm-descriptor <1–2> {active | The EFM descriptor must exist
its operation mode passive} before you can assign it to a
port.
Note: In order for OAM EFM to
function properly, the relevant
Ethernet port must be
associated with an L2CP profile
that specifies peer action for
MAC 01-80-C2-00-02.
Example
To enable OAM EFM on Ethernet port B/4:
#******************Assigning_Default_Queue_Group_Profiles********************
config port ethernet main-a/3 queue-group profile q_group_2_level_default
config port ethernet main-b/4 queue-group profile q_group_2_level_default
#*********************************End****************************************
************************Defining_Classifier_Profiles*************************
config flows classifier-profile untagged match-any
match untagged
exit all
#***************************Adding_L2CP_Profile******************************
configure port l2cp-profile l2cp1 mac 01-80-c2-00-00-02 peer
#*********************************End****************************************
#**************************Adding_Flow_for_Peering_EFM_Traffic***************
config flows flow 121
classifier classutg
ingress-port ethernet main-b/4
egress-port ethernet main-a/3 queue-map-profile QueueMapDefaultProfile block
0/1
l2cp profile l2cp1
drop
pm-enable
no shutdown
exit all
#*********************************End****************************************
#***************************Adding_OAM_EFM_Descriptor************************
configure oam efm-descriptor 2 passive
exit all
#*********************************End****************************************
#**************************Configuring_Ethernet_Port*************************
configure port ethernet main-b/4 efm descriptor 2
exit all
Standards
N/A
Benefits
Port/VLAN mirroring allows traffic flows to be inspected without disrupting the
flow.
Functional Description
Inbound Mirroring
Inbound mirroring can be configured on a main card port or main card as per-port
mirroring or per-port + VLAN, with a list of up to six VLANs. The destination mirror
port must be a main card port.
Outbound Mirroring
Outbound mirroring can be configured on a main card port or main card LAG as
per-port mirroring only.
The destination mirror port can be configured as follows:
• Main card ports
• Up to two different mirror ports
• TDM card redundancy consumes outbound mirroring resources. For example,
if TDM card redundancy is configured, only one mirror port is available. If two
TDM card redundancy pairs are configured, outbound mirroring is not
available.
Factory Defaults
N/A
In the following example, all the traffic coming into (inbound) main a/1 and going out of (outbound)
main a/1 is mirrored to port b/1.
ETX-5>config# mirroring-session 1
ETX-5>config>mirroring-session(1)# source port ethernet main-a/1 tx-rx
ETX-5>config>mirroring-session(1)# destination ethernet main-b/1
In the following example, all the traffic going out of LAG 1 (LAG between main card ports) is
mirrored to port b/3.
ETX-5>config# port lag 1
ETX-5>config>port>lag(1)admin-key ten-giga-ethernet
ETX-5>config>port>lag(1)bind ethernet main-a/2
ETX-5>config>port>lag(1)bind ethernet main-b/2
ETX-5>config>port>lag(1)queue-group profile q_group_2_level_default
ETX-5>config>port>lag(1)lacp tx-activity active tx-speed slow
ETX-5>config>port>lag(1)no shutdown
ETX-5>config# mirroring-session 2
ETX-5>config>mirroring-session(2)# source port ethernet lag 1 tx
ETX-5>config>mirroring-session(2)# destination ethernet main-b/3
In the following example, all the traffic coming into main a/3 with VLANs 100-103,110,120,130 and
all the traffic coming into main a/4 with VLANs 100,200-205 is mirrored to port b/4.
ETX-5>config# mirroring-session 3
ETX-5>config>mirroring-session(3)# source port ethernet main-a/3 vlan-list
100..103,110,120,130 rx
ETX-5>config>mirroring-session(3)# source port ethernet main-a/4 vlan-list
100,200..204 rx
ETX-5>config>mirroring-session(3)# destination ethernet main-b/4
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
A destination port can only You used the wrong kind of Use either a main card or a
be a main card or a LAG port. The destination port LAG port that is bound to a
port. must either be a main card main card as a destination
or a LAG port that is bound port.
to a main card port.
A source port can only be a You used the wrong kind of Use either a main card or a
main card or a LAG port. port. The source port must LAG port as a source port.
either be a main card or a
LAG port that is bound to a
main card.
LAG members should only The LAG members of this Use one of the following as
be ports on main cards. LAG are not ports on a a source or destination of
main card. Therefore, this the mirroring session:
LAG cannot serve as a • One of the ports on the
source or destination port main card
for a mirroring session.
• A LAG whose the
members are ports on a
main card
Outbound mirroring is not The outbound source port Select an outbound source
supported for port+VLAN. had a VLAN configuration port without a VLAN
defined for it. Outbound configuration.
source ports may not have
a VLAN configuration
defined for them.
The maximum number of You attempted to configure Remove one of the source
source ports has already more than seven source ports in order to add a new
been configured: Up to ports in the same mirroring source port.
seven source ports are session.
supported in each session.
The maximum number of You attempted to configure Remove some of the VLANs
VLANs per source port has more than six VLANs on the so that there are no more
already been configured: Up same source port. than six VLANs per port.
to six VLANs per source
port are supported.
The port/LAG should be in You did not activate the Activate the port/LAG.
no-shutdown in order to port/LAG.
perform this action.
The specified destination The destination port that Bind the port to a queue
port is not bound to a you specified is not bound group.
queue group. to a queue group.
This port is a LAG member You attempted to define Select the LAG itself or
and cannot be defined as a this port as a destination another main card port that
destination port. port. Since this port is a is not part of the LAG as
LAG member, it may not be the destination port.
defined as a destination
port.
This port is a LAG member You attempted to define Select the LAG itself or
and cannot be defined as a this port as a source port. another main card port that
source port. Since this port is a LAG is not part of the LAG as a
member, it may not be source port.
defined as a source port.
This port is already being You attempted to define Select another main card
used as a destination port this port as a source port. port as a source port.
and cannot be defined as a Since this port is already
source port. being used as a destination
port, it may not be defined
as a source port.
This port is already being You cannot define this port Select another main card
used as a source port and as a source port because it port and define it as your
cannot be defined as a is already being used as a destination port.
destination port. destination port.
This source port is already This source port is already Do not use a source port
being used as a source port being used in another that is being used in
in another session. session. another session.
Benefits
In-service ping provides a simple connectivity test across L2 service paths.
Functional Description
In-Service Ping enables a single CLI command to perform a simple connectivity
check across L2 service paths without the need for complicated configuration
such as required in TWAMP.
In addition, In-Service Ping includes a mechanism to enable a connectivity test
across the flow inside the device, by configuring the entry point of ICMP packets
to the flow (either at flow ingress or egress).
E
t
E
p
t
p
L
L2 (VPLS)
2 Network
P s
i e
n r
g v
i
c
e
Perform standard in- service-ping local-ip <src-ip- local-ip – The temporary IP address
service ping for egress address/mask> dst-ip <dst-ip- provisioned on the sender/responder for the
ports address> next-hop <next-hop-ip- duration of the test, combined with subnet-
address> {egress- mask.
port {ethernet <[slot/]port> | lag dst-ip – The IP address to which in-service
<number>} [vlan <vlan-id ping request packets are destined.
0..4095> ] [inner-vlan <inner-vlan-
next-hop – Next hop to use when
id 0..4095> ] [ p-bit <p-bit-id
destination IP is out of the source subnet.
0..7> ] [inner-p-bit <inner-p-bit-id
0..7>] [number-of- egress-port – This is either physical or
packets <1..10000>] [payload- logical interface to which the ping request is
size <32.. 1450 bytes>] sent . The supported egress ports are
ethernet and lag.
Perform standard in- service-ping local-ip <src-ip- local-ip – The temporary IP address
service ping for bridge address/mask> dst-ip <dst-ip- provisioned on the sender/responder for the
ports address> next-hop <next-hop-ip- duration of the test, combined with subnet-
address> bridge <number> mask.
vlan <vlan-id 0..4095> [inner- dst-ip – The IP address to which in-service
vlan <inner-vlan-id ping request packets are destined.
0..4095> ] [number-of-packets
next-hop – Next hop to use when
<1..10000>] payload-size <32..
destination IP is out of the source subnet.
1450 bytes>]
bridge – Number of the bridge to which the
ping request is sent.
vlan (mandatory) – the VLAN ID defining the
flow the service runs in
inner-vlan (optional) –inner VLAN ID defining
the flow the service runs in
number-of-packets – Number of in-service
ping request packets for the test
payload-size – Payload size of the in-service
ping request packets
The dst-ip IP address must be the same as
the IP address in local-ip in the service-ping-
response command configured on the
opposite device.
Standards
IEEE 802.1p, IEEE 802.1Q.
Benefits
Flexible Ethernet QoS and extensive TM capabilities allow ETX-5 to offer, monitor
and enforce different levels of Service Level Agreements (SLAs) for various
service types.
Factory Defaults
Refer to the following sections for the specific default for each type of QoS.
Functional Description
ETX-5 traffic management entities are called queue groups. They are configured
over SAGs or physical ports. The queue groups consist of 2- or 3-level scheduling
elements (queue blocks) per port type (see the description of Type-1, Type-2,
Type-3, Type-4, and Type 5 queue groups below). The queue blocks consist of
separate internal strict-priority or WFQ queues.
Scheduling Elements
Each scheduling element consists of strict or weight fair queues. In addition,
single- and dual-rate shapers operate at per-queue and per-scheduling-element
level to shape traffic into a required traffic profile (CIR, CBS or CIR/EIR, CBS/EBS).
The TM entities allow hierarchical scheduling and shaping at several levels. For
example, a 3-level TM entity schedules and shapes traffic at EVC, tunnel and port
levels. This means that several shaped EVCs can be bundled into one shaped
tunnel. A dual shaper at the EVC level ensures committed EVC CIR on the
aggregated tunnel while sharing the remaining traffic between the EIR part of the
other EVCs (see Dual Shaper and EIR Sharing below).
Similar bandwidth allocation can be made among the different tunnels at the port
level by committing on tunnel’s CIR and sharing the remaining port bandwidth
between tunnel’s EIR.
bandwidth with the EVCs EIR. The same procedure can be performed for tunnels
at the port level.
The figure below illustrates the hierarchical TM concept and the dual shaper
functionality. The magnified portion of the diagram details functionality of a
level-1 SE.
WFQ 1
CIR/EIR WFQ 2
Shaper
WFQ 383
SP 1
WFQ 384
WFQ 1
WFQ 2 SP 2
CIR/EIR
Shaper
WFQ 383
WFQ 384
Level-0 SEs
CIR
Shapers Level-1 SEs
SP 1 WFQ 1
CIR/EIR
SP 2 Shaper WFQ 2
CIR/EIR
SP 3 Shaper
SP4
WFQ 1
Level-2 SE
WFQ 2
WFQ 1
WFQ 3 WFQ 383
WFQ 2
CIR
WFQ 4 WFQ 384
Shaper
CIR
Shapers
SP 1 WFQ 1
CIR/EIR WFQ 2
SP 2 Shaper CIR/EIR WFQ 63
SP 3 Shaper
WFQ 64
SP4
WFQ 1
WFQ 2
WFQ 3 WFQ 383
WFQ 384
WFQ 4
CIR
Shapers
SP 1
SP 2 CIR/EIR
Shaper
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
Queuing
Each flow is assigned to a queue block as its destination. Each queue block
includes scheduling queues in accordance with CoS delivery priorities. A flow
packet is mapped to a specific queue according to the packet’s CoS (set by CoS
mapping profile at the ingress), whereby CoS 7 is mapped to the lower priority
queue, and CoS 0 to the highest.
Level-0 SEs
CIR
Shapers Level-1 SEs
Packets mapped to queue SP 1 WFQ 1
according to their CoS
SP 2 CIR/EIR WFQ 2 CIR/EIR
Shapers Shapers
Flow mapped to SE (queue block) SP 3
SP4
WFQ 1
Level-2 SE
WFQ 2
WFQ 1
WFQ 3 WFQ 383
WFQ 2
CIR
WFQ 4 WFQ 384
Shaper
Up to 384 Up to 384 Up to 64 Up to 64
CIR WFQ 1
Shapers
WFQ 2
SP 1 WFQ 63
WFQ 64
SP 2
SP 3
SP4
WFQ 1 WFQ 383
WFQ 2 WFQ 384
WFQ 3
WFQ 4
Congestion Avoidance
As the queues fill up, new packets face a growing risk of being discarded due to
lack of buffer space. The packets can be dropped as the queue becomes totally
full (tail-drop) or dropped selectively before all buffers are filled, using a
statistical probability. Selective dropping of packets when the queues are filling
up is referred to as congestion avoidance. Congestion avoidance mechanisms are
complementary to queuing algorithms; queuing algorithms manage the front of a
queue, congestion avoidance mechanisms manage the end of the queue.
The ETX-5 traffic management engine solves such issues by employing a weighted
random early discard (WRED) mechanism for intelligent queue management and
congestion avoidance. The WRED algorithm monitors the fill level of each queue
and determines whether an incoming packet should be queued or dropped, based
on statistical probabilities.
Near-empty queues accept all incoming packets, but as the queues begin to fill,
the drop probability for new packets increases. The different queues are
allocated different occupancy thresholds, above which incoming packets are
discarded at random at a growing rate as the queue fills, until the queue has
reached a maximum threshold and all incoming packets are dropped.
WRED Profile
A congestion control policy is defined by a WRED profile attached to an internal
queue (level-0 SE only). Each WRED profile includes two curves – one for green
and one for yellow packets. A packet is mapped into a curve according to its
color, with green packets having priority over the yellow ones. ETX-5 supports up
to eight WRED profiles.
Each WRED profile includes the following parameters:
• Minimum threshold: a percentage of maximum queue depth of 200 kBytes.
• Maximum threshold: a percentage of maximum queue depth of 200 kBytes
• Maximum drop probability: a drop probability of the maximum threshold
queue size, measured in percentages.
Enqueueing Process
When a packet is about to be enqueued, the queue status is checked and
enqueuing decision is taken according to the queue fill level:
• When the queue size is below the minimum threshold, the packet is admitted.
• When the queue size is in the range between minimum and maximum
threshold, the packet is dropped at the drop probability of the particular
queue size (per the WRED graph curve).
Drop
Probability
100%
Max Drop
Probability
When configuring and using queue groups, you may not exceed maximum allowed
number of its elements. For example, you can activate less than 384 level-0 SEs,
supported by 3-level queue groups (see Type 2 Queue Group).
To facilitate the configuration process, ETX-5 provides default queue groups for
every available type. These default entities can be used as a basis for creating
customized queue groups according to user requirements.
The post- and pre-forwarding traffic management entities are described below.
Level-0 SEs
CIR
Shapers
SP 1
SP 2 CIR/EIR
SP 3 Shapers
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2 CIR
WFQ 4
Shaper
WFQ 3
Up to 8 Up to 8
WFQ 4
CIR WFQ 5
Shapers
WFQ 6
SP 1
WFQ 7
SP 2
WFQ 8
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
CIR
Shapers Level-1 SEs
SP 1 WFQ 1
CIR/EIR
SP 2 Shapers WFQ 2
CIR/EIR
SP 3
Shapers
SP4
WFQ 1
Level-2 SE
WFQ 2
WFQ 1
WFQ 3 WFQ 383
WFQ 2
CIR
WFQ 4 WFQ 384
Shaper
Up to 384 Up to 384 Up to 64 Up to 64
CIR WFQ 1
Shapers
WFQ 2
SP 1 WFQ 63
WFQ 64
SP 2
SP 3
SP4
WFQ 1 WFQ 383
WFQ 2 WFQ 384
WFQ 3
WFQ 4
• Shaping elements:
Single token bucket shaper per internal queue in level-0 SE
Dual token bucket shaper per level-0 SE queue block (see Egress Shaping
below)
Dual token bucket shaper per level-1 SE queue block(see Egress Shaping
below)
Single token bucket shaper at level-2 SE egress.
WFQ 1
Level-0 SEs WFQ 2
CIR/EIR CIR/EIR
SP 1 Shapers Shapers
SP 2
Level-2 SE
SP 3
SP4 WFQ 1
Up to 768 Up to 768 Up to 64 Up to 64
WFQ 1
WFQ 2 WFQ 63
SP 1 WFQ 64
SP 2
SP 3
SP4
WFQ 383
WFQ 384
• Shaping elements:
Dual token bucket shaper per level-0 SE queue block (see Egress Shaping
below)
Dual token bucket shaper per level-1 SE queue block(see Egress Shaping
below)
Single token bucket shaper at level-2 SE egress.
• Editing connections between level-0 and level-2 queue blocks. You can
connect up to 384 level-0 SE to a single level-2 SE.
A queue group that is bound to a port cannot be replaced, you must verify that
no flows are attached to it, delete it, and then bind a new one.
CIR
Shapers
SP 1
SP 2 CIR/EIR
SP 3 Shapers
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2 CIR
WFQ 4
Shaper
Up to 40 Up to 40
CIR
Shapers
SP 1
SP 2
WFQ 40
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
CIR
Shapers
SP 1
SP 2 CIR/EIR
SP 3 Shapers
SP4
WFQ 1
Level-1 SE
WFQ 2
WFQ 1
WFQ 3
WFQ 2 CIR
WFQ 4
Shaper
WFQ 3
Up to 50 Up to 50
WFQ 4
CIR WFQ 5
Shapers
WFQ 6
SP 1
WFQ 7
SP 2
WFQ 8
SP 3
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
The default queue group profile can be viewed and bound to a port as is, or used
as the basis for a new queue group (copy default queue group, rename and edit),
and then bound to a port.
When a queue group is bound to a port, the following configuration actions are
allowed:
• Replacing queue block profiles
• Replacing or deleting shaper profiles (a shaper profile cannot be edited while
it is in use in a queue group).
A queue group that is bound to a port cannot be replaced; you must verify that
no flows are attached to it, delete it, and then bind a new one.
Egress Shaping
As described above, ETX-5 provides the following post-forwarding shaping
elements:
• Single token bucket shaper (CIR/CBS) per each level-0 SE queue
• Dual token bucket shaper per each level-0 SE queue block
• Dual token bucket shaper per each level-1 SE queue block
• Single token bucket shaper per level-2 SE queue block.
In total, ETX-5 supports up to 256 shaper profiles with the following
configuration ranges:
• CIR/EIR: 0, 256 kbps–10 Gbps (configured in kbps)
• CBS/EBS: 0, 10–512 kBytes (configured in bytes).
SP 1
SP 2
CIR
SP 3
Shapers
SP4
WFQ 1 Level-1 SE
WFQ 2
WFQ 1
WFQ 3 WFQ 2
WFQ 4
Up to 50 Up to 50
SP 1
SP 2 WFQ 49
SP 3 WFQ 50
SP4
WFQ 1
WFQ 2
WFQ 3
WFQ 4
The default queue group profile can be viewed and bound to a port as is, or used
as the basis for a new queue group (copy default queue group, rename and edit),
and then bound to a port.
When a queue group is bound to a port, the following configuration actions are
allowed:
• Replacing queue block profiles
• Replacing or deleting shaper profiles (a shaper profile cannot be edited while
it is in use in a queue group).
A queue group that is bound to a port cannot be replaced, you must verify that
no flows are attached to it, delete it and bind a new one.
Shaper
Traffic coming from level-0 internal queues and from level-0, -1 and -2 queue
blocks, is shaped to smooth out bursts and avoid buffer overruns in subsequent
network elements. At this stage, output packets from each buffer block undergo
a shaping function so that the overall traffic volume from each block does not
exceed a preset bandwidth value. Shaping is performed according to a single or
dual token bucket algorithm.
Traffic shaping is performed by creating shaper profiles with the following
bandwidth parameters:
• Committed Information Rate (CIR): The bandwidth that the service provider
guarantees the enterprise, regardless of network conditions.
• Excess Information Rate (EIR): The bandwidth allowance for “best effort”
delivery, for which service performance is not guaranteed and traffic may be
dropped if the network is congested.
• Committed Burst Size (CBS): The maximum size, expressed in bytes, of a burst
of back-to-back Ethernet frames for guaranteed delivery.
• Excess Burst Size (EBS): The maximum size of a burst of back-to-back
Ethernet frames permitted into the network without performance
guarantees. EBS frames may be queued or discarded if bandwidth is not
available.
Defined shaper profiles (up to 256 per chassis) are assigned to relevant
scheduling elements (SE). Functional Description above details the ETX-5 SEs and
shapers supported by them. Single-rate shapers are defined with CIR/CBS values
only; dual-rate shapers have both CIR/CBS and EIR/EBS values.
Shaper bandwidth values are different for pre-forwarding (ingress) and post-
forwarding (egress) traffic management.
Factory Defaults
By default, there are no shaper profiles in the system.
Configuring Shaper
Note Using no before shaper-profile (profile _name) deletes the shaper profile.
Defining CIR, EIR data rate and bandwidth [cir <cir-kbit-sec>] [cbs For single-rate shapers, use
CBS, EBS burst rate <cbs-bytes>] [eir <eir-kbit-sec>] [ebs only CIR/CBS values.
<ebs-bytes>] EBS = 0 is valid when EIR = 0.
CBS=0 is valid when CIR= 0.
Example
See the Example at the end of the QoS section.
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Illegal value The value entered for the parameter is not valid
Shaper/policer profile is in use and The shaper profile is being used by a queue or queue block; or
cannot be changed/deleted policer profile is being used by a flow. Remove the association
to delete or modify a shaper/policer profile.
Shaper/policer profile cannot be added, The maximum number of profiles (128) has been reached and
max number of profiles has been no additional shaper/policer profiles can be added
reached
Profile name must be unique The shaper/policer mapping profile name is not unique
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Illegal indices for bandwidth profile The values entered for the bandwidth profile are not valid
Factory Defaults
By default, ETX-5 provides one WRED profile (DefaultWREDProfile) with the
following settings:
• Green packets
Minimum threshold – 100%
Maximum threshold – 100%
Maximum probability – 100%
• Yellow packets:
Minimum threshold – 70%
Maximum threshold – 85%
Maximum probability – 100%.
Configuring WRED
Note Using no before wred-profile (profile _name) deletes the WRED profile.
Defining minimum and maximum color green [min <0–100> max <0– A WRED profile must include
thresholds and maximum 100> [probability <0–100>] both green and yellow packet
probability color yellow [min <0–100> max <0– types
100> [probability <0–100>]
Example
See Example at the end of the QoS section.
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Illegal value The value entered for the parameter is not valid
WRED profile is in use and cannot be The WRED profile is being used by an internal queue. Remove
changed/deleted the queue association to delete or modify WRED profile.
WRED profile cannot be added, max The maximum number of profiles (8) has been reached and no
number of profiles has been reached additional WRED profiles can be added
Profile name must be unique The WRED profile name is already in use
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Default WRED profile cannot be It is not possible to modify or delete a default WRED profile
changed/deleted
Internal Queue
Internal queues are tier-1 scheduling elements of ETX-5, that use strict or WFQ
scheduling techniques. They have shaper and WRED profiles assigned to them,
and, at a later stage, they are combined into queue blocks. ETX-5 supports up to
16K of internal queue profiles per chassis.
Factory Defaults
By default, ETX-5 provides the following internal queue profiles:
• DefaultStrictInternalQ
Strict scheduling
WRED profile –DefaultWREDProfile
• DefaultWfqInternalQWithWred
WFQ scheduling, weight 10
WRED profile –DefaultWREDProfile
• DefaultWfqInternalQWithoutWred
WFQ scheduling, weight 10
No WRED profile
Note Using no before queue-internal-profile (profile _name) deletes the internal queue
profile.
Assigning a WRED profile to the congestion-avoidance wred profile You can assign a user-defined
internal queue <wred-profile-name> or default (DefaultWREDProfile)
no congestion-avoidance wred to the internal queue.
no congestion-avoidance wred
removes a WRED profile
association.
Setting scheduling method scheduling { strict | wfq <weight>} The weight range is 0–4095
Example
See Example at the end of the QoS section.
Queue Block
The queue block is a tier-2 scheduling element in the ETX-5 traffic management
system. It consists of internal queues, and, in turn, serves as part of a tier-3
element – a queue group.
Factory Defaults
ETX-5 provides several queue block profiles, depending on the queue group types
that use them. The default queue block profiles are as follows:
• q_block_4_WFQ_4_SP_default
• q_block_8_queue_WFQ_default
• q_block_64_queue_WFQ_default
• q_block_16_queue_WFQ_default
• q_block_50_queue_WFQ_default
• q block 40 queue WFQ default
• q_block_4_SP_default.
Note The number of internal queues per queue block is different for different types of
queue block.
The config>qos>queue-block-profile(profile_name)>queue(queue_number)$
prompt is displayed.
3. Assign an internal queue profile to each internal queue within the queue
block (see internal-profile in table below).
4. Assign the queue block to a queue group and bind it to a queue within a
higher queue block (see Queue Group below).
Note • Using no before queue-block-profile (profile _name) deletes the queue block
profile.
• Using no before queue (queue_number) deletes the queue from the queue
block.
Example
See Example at the end of the QoS section.
Queue Group
Queue group is a tier-3 scheduling element in the ETX-5 traffic management
system. Queue groups perform pre- and post-forwarding (ingress and egress)
traffic management and are subdivided into the different types.
Factory Defaults
ETX-5 provides several queue group profiles, depending group type. The default
queue group profiles are as follows:
• q_group_2_level_default
• q_group_3_level_default
• q_group_3_level_768_default
• q_group_2_level_40_default
• q_group_2_level_80_default
• q_group_SAG_2_level_default.
• q_group_2_level_40_default
• q_group_2_level_50_default
Note • The queue block number depends on the queue group type that the queue
block belongs to. Functional Description above details the exact numbers of
queue blocks supported by different queue group types.
• The queue blocks must be added sequentially (queue-block 0/1, queue-block
0/2 etc).
The config>qos>queue-group-profile(profile_name)>queue-block(level/ID)#
prompt is displayed.
4. Enter all necessary commands according to the tasks listed below.
5. If you wish to configure another queue block, type exit to return to the queue
group profile context, and start again.
Note Using no before queue-block (queue_block_name) deletes the queue block from
the queue group.
6. Alternatively, you can create a new queue group by copying parameters from
an existing one. Use the inherited-from command in the
queue-group-profile(profile_name) prompt, followed the name of the queue
group from which you want to copy parameters.
Binding a queue block to a queue in bind queue <queue_number> block Level-2 (highest)
the next-level queue block <level/number> queue block cannot
be bound to anything
Example
See Example at the end of the QoS section.
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Illegal value The value entered for the parameter is not valid
Internal queue profile is in use and The internal queue profile is being used by a queue block.
cannot be changed/deleted Remove the queue block association to delete or modify an
internal queue profile.
Queue block profile is in use and cannot The queue block profile is being used by a queue group. Remove
be changed/deleted the queue group association to delete or modify a queue block
profile.
Only first 4 internal queues in the queue The first four internal queues in a queue block must use a strict
block can be strict priority mechanism
Profile does not exist The selected profile does not exist
Profile cannot be added, max number of The maximum number of internal queue profiles has been
profiles has been reached reached and no additional profiles can be added
Profile name must be unique The queue profile name is not unique
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Default profile cannot be It is not possible to modify or delete a default queue profile
changed/deleted
Illegal indices for profile The values entered for a profile are not valid
Illegal CIR value in shaper The CIR value entered is not valid for a shaper assigned to a
specific scheduling element
Illegal CBS value in shaper The CBS value entered is not valid for a shaper assigned to a
specific scheduling element
Illegal EIR value in shaper The EIR value entered is not valid for a shaper assigned to a
specific scheduling element
Message Description
Illegal EBS value in shaper The EBS value entered is not valid for a shaper assigned to a
specific scheduling element
Illegal shaper compensation value The compensation value entered is not valid for a shaper
assigned to a specific scheduling element
Queue block name is already in use at A queue block with the same name already exist in the same
the same level level
Source group queue group profile for Indicates an attempt to use a non-existing queue group profile
inherit action does not exist as a source for a new queue group profile
Specified queue group profile does not Indicates an attempt to use a non-existing queue group profile
exist
Next level queue block does not exist Indicates an attempt to bind a queue block profile to a queue in
a next-level queue block that does not exist
Assigned internal queue does not exist Indicates an attempt to bind a non-existing internal queue a
queue block
Internal queue is already in use by Indicates an attempt to bind an internal queue already in use to
another queue bock a queue block
Assigned queue block cannot be deleted A queue block cannot be deleted while it is assigned to a queue
group.
Queue group profile cannot be added, The maximum number of queue group profiles has been reached
max number of profiles has been and no additional profiles can be added
reached
Internal queue mismatch in level-0 queue Invalid queue combination in a level-0 queue block
block
Strict internal queues cannot be Level-1 and level-2 queue blocks can have only WFQ queues
assigned to level-1 and level-2 queue
blocks
WRED profiles cannot be assigned to Internal queues in level-1 and level-2 queue blocks cannot have
internal queues in level-1 and level-2 WRED profiles assigned to them
queue blocks
Green or yellow color settings are No color values are defined in a WRED profile assigned to an
missing from WRED profile internal queue
Strict internal queues are missing from Mandatory internal queues with strict priority have not been
level 0 queue block assigned to a level-0 queue block.
WFQs are missing from level 0 queue Mandatory internal queues with WFQ priority have not been
block assigned to a level-0 queue block
Illegal weight value for internal queues in The weight values entered are not valid for internal queues with
level 0 queue block WFQ priority in a level-0 queue block
Illegal weight value for internal queues in The weight values entered are not valid for internal queues with
level 1 queue block WFQ priority in a level-1 queue block
Illegal number of internal queues The number of internal queues defined in a queue block is not
valid
Message Description
Dual shaper cannot be bound to level 0 Dual shaper profiles cannot be assigned to a level 0 queue block
queue block in an ingress (pre-forwarding) queue group
Dual shaper cannot be bound to level 1 Dual shaper profiles cannot be assigned to a level 1 queue block
queue block in an ingress (pre-forwarding) queue group
Cannot be bound to internal queues in Shaper profiles cannot be assigned to internal queues in level-1
level-1 and level-2 queue blocks and level-2 queue blocks
CoS Mapping
User priorities must be mapped to internal Class of Service (CoS) values, as
detailed below.
Functional Description
User priorities are mapped to internal Class of Service (CoS) values, according to
P-bit, DSCP, IP Precedence or per-flow criteria. The newly defined CoS can then
be used for:
• P-bit handling during VLAN editing process
• Queue mapping.
In other words, each packet is first “normalized” to a CoS value (0–7), then this
CoS is used for VLAN editing (P-bit) or priority queue mapping.
Capacity
ETX-5 supports up to 36 user-defined CoS mapping profiles per I/O card. There
are three default profiles for P-bit to CoS, IP Precedence to CoS, DSCP to CoS
mapping. These profiles are considered part of the 36 CoS mapping profiles
supported per system.
P-bit CoS
0 7
P-bit CoS
1 6
2 5
3 4
4 3
5 2
6 1
7 0
IP-P CoS
0 7
1 6
2 5
3 4
4 3
5 2
6 1
7 0
DSCP CoS
0 7
1 6
2 5
3 4
4 3
5 2
6 1
7–63 0
• The P-bit to CoS mapping method is supported only with either DEI or P-bit to
ingress color mapping methods
• The DSCP to CoS mapping method is supported only with DSCP to ingress
color mapping method.
Up to 15 different combinations of X to CoS + X to color are supported for
directly-attached ports.
CoS mapping method for directly-attached ports depends on the selected
classification key (see Table 11-16).
Table 11-18. Possible Combinations of CoS and Ingress Color Mapping Methods
for Directly-Attached Ports
Note
See Color Mapping for details on the color mapping methods.
CoS Queue
0 1
1 2
2 3
3 4
4 5
5 6
6 7
7 8
Factory Defaults
ETX-5 has three default profiles for P-bit to CoS, IP Precedence to CoS, and DSCP
to CoS mapping. These profiles are part of 36 CoS mapping profiles supported per
system.
Note Using no before cos-map-profile (profile_name) deletes the CoS mapping profile.
8. Map the user priority to a CoS value (user priority values 0–7 for P-bit and IP
Precedence, 0–63 for DSCP; CoS values 0–7):
map <0–7> to-cos <0–7>
map <0–63> to-cos <0–7>.
Example
See Example at the end of the Traffic Management section.
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Illegal value The value entered for the parameter is not valid
CoS mapping profile is in use and cannot The CoS mapping profile is being used by a flow. Remove the
be changed/deleted flow association to delete or modify the CoS mapping profile.
Default CoS mapping profile cannot be It is not possible to modify or delete a default CoS profile
changed/deleted
Profile name must be unique The CoS mapping profile name is not unique
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Max number of profiles using one CoS The maximum number of profiles (12 or 16) using the same CoS
mapping method has been reached mapping method (P-bit to CoS, DSCP to CoS, etc.) has been
reached
Color Mapping
ETX-5 supports an ingress color mapping mechanism as a part of its traffic
policing features.
Functional Description
The mechanism inspects incoming packets and assigns a color (green or yellow)
value according to configured color mapping profiles. The following mapping
profiles are supported:
• P-bit to color
• DSCP to color
• IP Precedence to color
• DEI to color (fixed mapping, 0 to green and 1 to yellow)
• Flow to color
• Mark all green (default).
In total, ETX-5 supports up to 36 ingress color mapping profiles (12 of each
type).
Packet color is used afterwards by WRED mechanism for congestion prevention
and during VLAN editing process (setting DEI value).
Note Ingress color mapping method for both directly- and indirectly-attached ports
depends on a classification key used for the port. See Table 11-15 and
Table 11-16 for details.
Note The ingress color mapping method for directly-attached ports depends on
selected CoS mapping for a flow. See Table 11-18 for possible combinations of
CoS mapping and color mapping profiles.
Factory Defaults
By default, ETX-5 marks all incoming packets as green.
10. Map the user priority to a color value (user priority values 0–7 for P-bit and IP
Precedence, 0–63 for DSCP, or DEI 0–1; color values: green and yellow):
map <0–7> to green or yellow
map <0–63> to green or yellow
Example
See Example at the end of the Traffic Management section.
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Illegal value The value entered for the parameter is not valid
Color mapping profile is in use and The color mapping profile is being used by a flow. Remove the
cannot be changed/deleted flow association to delete or modify the color mapping profile.
Color mapping profile cannot be added, The maximum number of profiles (36) has been reached and no
max number of profiles has been additional color mapping profiles can be added
reached
Profile name must be unique The color mapping profile name is not unique
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Max number of profiles using one color The maximum number of profiles (12) using the same color
mapping method has been reached mapping method (P-bit to color, DSCP to color, etc.) has been
reached
Policing
When the flows are established, a metering and policing function can be applied
for each ingress flow on directly – and indirectly-attached ports to regulate traffic
according to the contracted CIR, EIR, CBS and EBS bandwidth profiles. In addition,
policing can be applied to Ethernet ports on the main and I/O cards, and LAG.
Functional Description
Rate limitation is performed according to the Dual Token Bucket mechanism (two
rates, three colors) in color-aware or color-blind modes.
The final color of a packet is determined by a policer (color-aware or color-blind).
If a policer is not applied on a specific flow, the ingress color mapping determines
packet color.
Policer Parameters
Policer uses the following for bandwidth control:
• Committed Information Rate (CIR) for the current profile. The CIR specifies a
bandwidth with committed service guarantee (“green bucket” rate).
• Committed Burst Size (CBS) for the current profile. The CBS specifies the
maximum guaranteed burst size (“green bucket” size).
• Excess Information Rate (EIR). The EIR specifies an extra bandwidth with no
service guarantee (“yellow bucket” rate).
• Excess Burst Size (EBS). The EBS specifies the extra burst with no service
guarantee (“yellow bucket” size).
• Coupling Flag. This parameter is relevant for color-aware mode only. See
Color-Aware Policer section below.
Overhead Compensation
For ingress flows on indirectly attached ports, you can also specify the amount of
bytes that the shaper or policer can use to compensate for the overhead of
Layer-1 (preamble and IFG) and the overhead for the added VLAN header in case
of stacking.
Color-Aware Policer
When determining whether or not a packet conforms to a bandwidth profile, the
color-aware policer takes into account any preexisting color markings that may
have been set for a packet by another traffic policer.
The packet ingress color is resolved by a color mapping profile.
No
Note When the Coupling Flag is enabled, a sum of CIR and EIR volumes is taken into
account. Coupling flags are described below.
The coupling flag allows a choice between two modes of operations for the rate
enforcement algorithm. The chosen value for CF has the effect of controlling the
volume of the yellow packets.
• When CF is disabled, the long term average bit rate of yellow packets is set
by EIR.
• When CF is enabled, the long term average bit rate of yellow packets is set by
CIR + EIR, depending on volume of the green packets.
In both cases the burst size of the yellow packets is limited by EBS.
In other words, when the CF is enabled, a yellow packet arrives with an empty EIR
bucket, and the policer forwards the packet, using tokens from the CIR bucket.
This allows the EIR to be extended to the value of “configured CIR” + “extended
EIR”.
Color-Blind Policer
In the color-blind mode, the policer ignores the packet color (if any) when
determining whether or not a packet conforms to a bandwidth profile.
Note This type of policer profile is not an aggregate rate police for broadcast +
multicast packets.
Note Flows from different I/O port groups (1–10, 11–20) of the E5-GBE-20 card and
flows from different ports of the E5-10GBE-2 card cannot share the same
aggregate policer.
Factory Defaults
By default, ETX-5 does not have policer profiles.
Defining bandwidth profile, using bandwidth [cir <cir-kbit-sec>] [cbs <cbs- For flows with ingress port
CIR/CBS and EIR/EBS rates bytes>] [eir <eir-kbit-sec>] [ebs <ebs- located on E5-MC-4 or E5-
bytes>] MC-SFP-P-4 cards, the
minimum EIR and CIR values
are 64 kbps.
The minimum CIR/CBS rate
for policers to be assigned to
E5-MC-4/ E5-MC-SFP-P-4
ports is 38.4 Mbps.
Configurable CIR/CBS rate for
the policers has granularity
n
of 38.4 Mbps × 2 , where n
is 0–8.
Defining traffic type traffic-type { all | broadcast | multicast | broadcast – port or LAG
unknown-unicast | broadcast-and- multicast – port or LAG
multicast }
broadcast-and-multicast –
I/O card port or LAG
unknown-unicast – main card
ports or LAG consisting of
main card ports
all – flow
Example
See the Multiple CoS Point-to-Point Service example in the section Flows above.
This example shows how to create four policer profiles to allocate bandwidth to
four flows (11–14).
Configuration Errors
Table 11-22 lists the messages generated by ETX-5 when a policer configuration
error is detected. Table 11-23 lists the messages generated by ETX-5 when a
policer aggregate configuration error is detected.
Message Description
Illegal value The value entered for the parameter is not valid
Shaper/policer profile is in use and The shaper profile is being used by a queue or queue block; or
cannot be changed/deleted the policer profile is being used by a port/flow. Remove the
association to delete or modify a shaper/policer profile.
Shaper/policer profile cannot be added, The maximum number of profiles (128) has been reached and
max number of profiles has been no additional shaper/policer profiles can be added
reached
Profile name must be unique The shaper/policer mapping profile name is not unique
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Illegal indices for bandwidth profile The values entered for the bandwidth profile are not valid
Message Description
Illegal value The value entered for the parameter is not valid
Policer aggregate profile is in use and The policer aggregate profile is being used by a flow. Remove
cannot be changed/deleted the association to delete or modify a policer aggregate profile.
Policer aggregate profile cannot be The maximum number of profiles (128) has been reached and
added, max number of profiles has been no additional policer aggregate profiles can be added
reached
Profile name must be unique The policer aggregate mapping profile name is not unique
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Policer profile does not exist A policer profile, whose setting are to be used for the policer
aggregate profile, has not been defined
Marking
Marking profiles map CoS and packet color values into egress priority tags. The
marking is done per color (green and/or yellow) to support color re-marking, and
optionally the Drop Eligible Indicator (DEI) bit is specified in the frame header.
ETX-5 supports up to 16 color-aware and color-blind marking profiles.
• A color-aware profile translates CoS (0–7) and packet color (all, green,
yellow) into P-bit (0–7) and DEI (yellow, green) values
• A color-blind profile translates CoS (0–7) into P-bit (0–7) and DEI (yellow,
green) values.
Marking profiles are used during VLAN editing procedures applied to flows.
Factory Defaults
By default, ETX-5 does not have any marking profiles.
Example
See Multiple CoS Point-to-Point Service example in the Flows section above. This
example shows how to create color-aware marking profile.
Configuration Errors
The table below lists the messages generated by ETX-5 when a configuration
error is detected.
Message Description
Illegal value The value entered for the parameter is not valid
Color mapping profile is in use and The color mapping profile is being used by a flow. Remove the
cannot be changed/deleted flow association to delete or modify color mapping profile.
Message Description
Marking profile cannot be added, max The maximum number of profiles (16) has been reached and no
number of profiles has been reached additional marking profiles can be added
Profile name must be unique The marking profile name is not unique
Profile name cannot be changed The profile name cannot be changed because the profile is in
use
Illegal marking profile method The selected marking method is not supported
Mark value in marking profile is out of The selected mark valuemust be within the range 0–7
range
CoS Queue
0 1
1 2
2 3
3 4
4 5
5 6
6 7
7 8
Example
This example shows how to create multiple CoS point-to-point service with traffic
management. Traffic management is performed using a 3-level queue group,
illustrated in the figure below.
Note Congestion control (WRED profiles) is not applicable to queues in level-1 and
level-2 SEs.
1. Define internal queue profiles, specifying their scheduling types, shaping and
WRED profiles (where applicable).
2. Configure level-0, level-1 and level -2 queue block profiles with queues, using
internal queue profiles.
3. Define the queue group profile, adding queue blocks to the group, binding
the queue blocks to the next level queues and assigning the relevant shaper
profiles. Queue blocks are added to queue groups in the reverse order:
level-2 > level-1 > level 0.
4. Assign the queue group to the main card ports.
5. Select classification keys for the main card ports.
6. Enable the main card ports.
7. Configure 12 VLAN-type classifier profiles.
8. Configure the CoS mapping profile to map user priorities to internal CoS
values.
9. Configure the color mapping profile to map user color to internal color values.
10. Configure 12 flows from port 1 to port 2 on the main card and direct them to
the relevant level-0 queue blocks.
Level-0 SEs
q_block_4_WFQ_4_SP_10_40
CIR 0/1
Shapers
Flow 1
WR.1 SP 1 Sh. 7
Flow 2
CIR/EIR
WR.1 SP 2 Sh. 7
Flow 3 Shapers
WR.1 SP 3 Sh. 7
Flow 4
WR.1 SP4 Sh. 7
Flow 5
Def. WR. WFQ 10 Sh. 7
Flow 6 Sh. 1
Def. WR. WFQ 20
Flow 7
Def. WR. WFQ 30
q_block_4_WFQ_4_SP_10_40
Level-1 SEs
CIR 0/2
Shapers q_block_11_queue_WFQ_10_20_30
WR.1 SP 1 Sh. 7 CIR/EIR 1/1
q_block_4_WFQ_4_SP_40_10
CIR 0/3
Shapers
WR.1 SP 1 Sh. 7
WR.1 SP 2 Sh. 7
CIR/EIR Level-2 SE
WR.1 SP 3 Sh. 7 Shapers q_block_21_queue_WFQ_10_20
CIR
Flow 20 WR.1 SP4 Sh. 7 2/1 Shaper
Def. WR. WFQ 40 WFQ 10
q_block_4_WFQ_4_SP_10_40
CIR 0/4
Shapers
WR.1 SP 1 Sh. 7
CIR/EIR
WR.1 SP 2 Sh. 7 Shapers
WR.1 SP 3 Sh. 7
Flow 30 WR.1 SP4 Sh. 7
Def. WR. WFQ 10 Sh. 7
Sh. 3
Def. WR. WFQ 20
Def. WR. WFQ 30 q_block_11_queue_WFQ_10_20
1/2
Def. WR. WFQ 40 CIR/EIR
Shapers
q_block_4_WFQ_4_SP_10_40 WFQ 10
************************Configuring_Shaper_Profiles**************************
config qos shaper-profile sh1 bandwidth cir 10000 cbs 100000 eir 50000 ebs
200000
config qos shaper-profile sh2 bandwidth cir 20000 cbs 100000 eir 50000 ebs
200000
config qos shaper-profile sh3 bandwidth cir 30000 cbs 100000 eir 50000 ebs
200000
config qos shaper-profile sh4 bandwidth cir 60000 cbs 100000 eir 20000 ebs
200000
config qos shaper-profile sh5 bandwidth cir 40000 cbs 100000 eir 30000 ebs
200000
config qos shaper-profile sh7 bandwidth cir 1000 cbs 100000 eir 5000 ebs
200000
exit all
#*********************************End****************************************
**************************Configuring_WRED_Profiles**************************
config qos wred-profile 1 color green min 30 max 30 probability 100
config qos wred-profile 1 color yellow min 20 max 30 probability 100
#*********************************End****************************************
**********************Configuring_Internal_Queue_Profiles********************
config qos queue-internal-profile qstrict
congestion-avoidance wred profile 1
scheduling strict
shaper profile sh7
exit all
config qos queue-internal-profile q10
congestion-avoidance wred profile DefaultWREDProfile
scheduling wfq 10
shaper profile sh7
exit all
config qos queue-internal-profile q20
congestion-avoidance wred profile DefaultWREDProfile
scheduling wfq 20
exit all
config qos queue-internal-profile q30
congestion-avoidance wred profile DefaultWREDProfile
scheduling wfq 30
exit all
config qos queue-internal-profile q40
congestion-avoidance wred profile DefaultWREDProfile
scheduling wfq 40
exit all
config qos queue-internal-profile q10_no_wred
scheduling wfq 10
exit all
config qos queue-internal-profile q20_no_wred
scheduling wfq 20
exit all
config qos queue-internal-profile q30_no_wred
scheduling wfq 30
exit all
config qos queue-internal-profile q40_no_wred
scheduling wfq 40
exit all
#*********************************End****************************************
#****************************************************************************
*********************Configuring_Queue_Block_Profiles************************
#****************************************************************************
#*******************Configuring_Queue_Block_Profile_L2-1*********************
config qos queue-block-profile "q_block_21_queue_WFQ_10_20"
queue 1 internal-profile profile q10_no_wred
queue 2 internal-profile profile q20_no_wred
exit all
#*********************************End****************************************
#********************Configuring_Queue_Block_Profile_L1-1********************
config qos queue-block-profile "q_block_11_queue_WFQ_10_20_30"
queue 1 internal-profile profile q10_no_wred
queue 2 internal-profile profile q20_no_wred
queue 3 internal-profile profile q30_no_wred
exit all
#*********************************End****************************************
#*********************Configuring_Queue_Block_Profile_L1-2*******************
config qos queue-block-profile "q_block_12_queue_WFQ_10_20"
queue 1 internal-profile profile q10_no_wred
queue 2 internal-profile profile q20_no_wred
exit all
#*********************************End****************************************
#**********************Configuring_Queue_Block_Profile_L0-1******************
config qos queue-block-profile "q_block_4_WFQ_4_SP_10_40"
queue 1 internal-profile profile qstrict
queue 2 internal-profile profile qstrict
queue 3 internal-profile profile qstrict
queue 4 internal-profile profile qstrict
queue 5 internal-profile profile q10
queue 6 internal-profile profile q20
queue 7 internal-profile profile q30
queue 8 internal-profile profile q40
exit all
#*********************************End****************************************
#**********************Configuring_Queue_Block_Profile_L0-2******************
config qos queue-block-profile "q_block_4_WFQ_4_SP_40_10"
queue 1 internal-profile profile qstrict
queue 2 internal-profile profile qstrict
queue 3 internal-profile profile qstrict
queue 4 internal-profile profile qstrict
queue 5 internal-profile profile q40
#**********************Configuring_Queue_Group_Profile***********************
configure qos queue-group-profile 3level_1
queue-block 2/1
name "3Level_2_1"
profile "q_block_21_queue_WFQ_10_20"
shaper profile sh6
exit
queue-block 1/1
name "3Level_1_1"
profile "q_block_11_queue_WFQ_10_20_30"
bind queue 1 queue-block 2/1
shaper profile sh4
exit
queue-block 1/2
name "3Level_1_2"
profile "q_block_12_queue_WFQ_10_20"
bind queue 2 queue-block 2/1
shaper profile sh5
exit
queue-block 0/1
name "3Level_0_1"
profile "q_block_4_WFQ_4_SP_10_40"
bind queue 1 queue-block 1/1
shaper profile sh1
exit
queue-block 0/2
name "3Level_0_2"
profile "q_block_4_WFQ_4_SP_10_40"
bind queue 2 queue-block 1/1
shaper profile sh2
exit
queue-block 0/3
name "3Level_0_3"
profile "q_block_4_WFQ_4_SP_40_10"
bind queue 3 queue-block 1/1
shaper profile sh3
exit
queue-block 0/4
name "3Level_0_4"
profile "q_block_4_WFQ_4_SP_10_40"
bind queue 1 queue-block 1/2
shaper profile sh3
exit
queue-block 0/5
name "3Level_0_5"
profile "q_block_4_WFQ_4_SP_10_40"
bind queue 2 queue-block 1/2
shaper profile sh1
exit all
#*********************************End****************************************
#**********************Assigning_Queue_Group_to_Main_Card_Ports**************
config port ethernet main-b/1 queue-group profile 3level_1
config port ethernet main-b/2 queue-group profile 3level_1
exit all
#*********************************End****************************************
#***********************Defining_Classification_Keys*************************
config port ethernet main-b/1 classification-key vlan p-bit
config port ethernet main-b/2 classification-key vlan p-bit
exit all
#*********************************End****************************************
#*************************Enabling_Main_Card_Ports***************************
config port ethernet main-b/1 no shutdown
config port ethernet main-b/2 no shutdown
exit all
#*********************************End****************************************
#***********************Defining_Classifier_Profiles*************************
config flows classifier-profile class100 match-any
match vlan 100
exit all
config flows classifier-profile class101 match-any
match vlan 101
exit all
config flows classifier-profile class102 match-any
match vlan 102
exit all
config flows classifier-profile class103 match-any
match vlan 103
exit all
config flows classifier-profile class104 match-any
match vlan 104
exit all
config flows classifier-profile class105 match-any
match vlan 105
exit all
config flows classifier-profile class106 match-any
match vlan 106
exit all
config flows classifier-profile class107 match-any
match vlan 107
exit all
config flows classifier-profile class200 match-any
match vlan 200
exit all
#************************Configuring_CoS_Mapping_Profile*********************
config qos cos-map-profile cos7_0 classification p-bit
map 0 to-cos 7
map 1 to-cos 6
map 2 to-cos 5
map 3 to-cos 4
map 4 to-cos 3
map 5 to-cos 2
map 6 to-cos 1
map 7 to-cos 0
exit all
#*********************************End****************************************
#*********************** Configuring_Color_Mapping_Profile*******************
config qos color-map-profile color_all_green classification p-bit
map 0 to green
map 1 to green
map 2 to green
map 3 to green
map 4 to green
map 5 to green
map 6 to green
map 7 to green
exit all
#*********************************End****************************************
#***************************Configuring_Flows********************************
configure flows flow 1
classifier class100
cos-mapping profile cos7_0
ingress-color profile color_all_green
ingress-port ethernet main-b/1
egress-port ethernet main-b/2 queue-map-profile QueueMapDefaultProfile block
0/1
no shutdown
exit all
no shutdown
exit all
RAD Data Communications would like your help in improving its product
documentation. Please send us an e-mail with your comments.
Thank you for your assistance!
12.2 Impact
The software upgrade process is designed to minimize service disruption, as long
as following criteria are met:
• Two main cards are installed in the chassis
Note If your system has two main cards, you must upgrade only the active card. The
active card transfers new application software to the standby card to ensure
seamless redundancy after the upgrade. Verify that both main cards are
administratively enabled (no shutdown).
12.3 Prerequisites
This section details the software file names and outlines system requirements
needed for the upgrade procedure.
Software Files
New version releases are distributed as software files named *.bin, for example
sw-pack.bin. The files can be obtained from the local RAD business partner from
whom the device was purchased.
The software upgrade utility includes four partitions called sw-pack-1, sw-pack-2,
sw-pack-3, sw-pack-4 for downloading and storing the software versions. To
activate the specified software version, one of these partitions is set to active.
Each software pack consists of a set of image files for each module with
appropriate headers. The software pack can be ordered for the entire chassis
only.
The software pack consists of five internal image files for the E5-MC-4, E5-MC-
SFP-P-4, E5-GBE-20/E5-1-GBE-2 E5-cTDM-4 and E5-cTDM-STM4 cards. The
software pack is installed as a whole entity; internal software files cannot be
changed or installed separately.
The software package version, as well as version of internal image files can be
viewed using the show sw-pack command entered at the file# prompt.
System Requirements
Before starting the upgrade using SFTP or FTP, verify that you have the following:
• ETX-5 unit with valid network connection to a PC with the SFTP/FTP server
application, and a valid IP address.
• Software file stored on the PC.
Using SFTP
Network administrators use the SFTP protocol to securely distribute new
software releases to all the managed ETX-5 units in the network from a central
location. A central SFTP server application is installed on a PC on the network.
Application file is
transferred to
ETX-5
Ethernet
Pinging the PC
Check the integrity of the communication link between ETX-5 and the PC by
pinging the ETX-5 from the PC.
Note Issuing the dir command (file# prompt) while installing a new software release
causes the CLI to stop responding during the installation process. The CLI
connection is restored after the SW installation is complete.
Installing the New Software Release File from the Flash Disk
Once a file is saved on the ETX-5 flash disk, it must be copied to the main card to
replace the current software. The sw-pack file includes the new software version
for all the main and I/O cards, according to your purchase order.
Simultaneously download the new software release file to all the main and I/O
cards installed in the chassis.
During the installation process, ETX-5 stores active software and startup-config in
the restore-point-config file. As long as the restore point remains valid, you can
return the device to the restore point (the application software and startup-
config the device ran before the last software installation).
When ETX-5 includes redundant main cards, the chassis performs in-service
software upgrade (ISSU) and uses card protection to achieve a sub-100 ms
service disruption.
Note If you intend to skip creation of a restore point, enter the no-restore-point
parameter in the following form: install <filename> [no-restore-point].
Note For ETX-5 with redundant main cards, you can confirm the software application
files only after the main card flip.
Caution The Boot menu procedures are recommended for use only by authorized
personnel, because this menu provides many additional options that are intended
for use only by technical support personnel.
You can upgrade via the Boot menu using the FTP. This is usually performed by
downloading from a remote location that provides an IP communication path to
an Ethernet port of ETX-5.
Note All the screens shown in this section are for illustration purposes only. Your ETX-5
may display different software versions and port profiles.
The preparations for using the FTP protocol via the Boot menu are similar to the
preparations for downloading software using the SFTP protocol via the CLI. The
main difference is that you need to define the IP communication parameters
associated with the corresponding Ethernet port -- IP addresses and the
associated subnet mask, and a default gateway IP address.
12. Press <C> to change the boot parameters and type valid values in each field.
Type 'c' to modify all parameters
Type 'c [parameter]' to modify the specific parameter (for example, to
change the filename to sw-pack.bin, type: c fn vxworks sw-pack.bin).
'.' = clear field; '-' = go to previous field; ^D = quit
To download software file(s) from the Boot menu to ETX-5 via FTP:
14. Verify that the *.bin file is stored on the PC with the FTP server application.
15. Activate the FTP server application.
Note When working with FTP server, the user name and password in Boot parameters
must be the same as defined in FTP server.
16. Turn on ETX-5 and enter the Boot menu. Set FTP protocol.
17. From the Boot menu, type download <index 1..4> [<FileName>] command to
start downloading the software pack file from the PC to the corresponding
partition of the ETX-5 flash disk.
Note [<FileName>] is used if you did not specify the filename in the Boot menu
earlier.
Please wait, old file is being erased and written with new one.
File writing to flash: - 7580KB
File downloaded successfully to :2
[boot]:
18. Using dir command, check which partition is currently active. In this example it
is sw-pack-1.
[boot]: dir
SIZE FILE-NAME
796 factory-default-config
6296759 sw-pack-1
6305902 sw-pack-2
6278526 sw-pack-3
6289552 sw-pack-4
Active SW-pack is: 2
Total Bytes : 101367808 Free Bytes : 69701632
19. Use set-active command to activate the partition to which the file has been
downloaded (in this example: sw-pack-2).
[boot]: set-active 2
set-active may take few minutes...
deleting file /tffs0/Sw-Pack/Active/main.bin
deleting file /tffs0/Sw-Pack/Active/mainHdr.bin
SW set active 2 completed successfully.
The new software release is now stored in partition 2 and will be
activated after reset.
20. Perform one of the following:
Type “@” or “run”.
The following message is displayed and the new software release is
activated:
[boot]: run
External file header passed validation!
Loading/un-compressing main.bin...
Starting the APPLICATION off address 0x10000...
Press <Ctrl + X> to perform a cold (hard) reboot with turning power off
and then on.
Type “reset” to perform a warm (soft) reboot without turning off power.
The following message is displayed:
Are you sure (y/n)?
Press <Y>.
When the downloading process is successfully completed, you will see a
sequence of messages similar to the following:
External file header passed validation!
Loading/un-compressing main.bin...
Note The new parameters take effect only after the reset is completed.
-----------------------------------------------------------------------------
1001 Chassis AC-chassi N/A 1.0.0(1.39) N/A
ETX-203AX (1)
(172.17.191.11)
GbE
GbE ERP
NMS
ETX-1
(172.17.191.14)
GbE
GbE GbE
MiNID Traffic Generator
(172.17.191.13)
GbE GbE
ETX-204A
(172.17.191.19)
ETX-5 GbE
(172.17.191.10)
LAG ETX-203AX (2)
STM-1 GbE
(172.17.191.16)
GbE
E1
ETX-205A
(172.17.191.12) E1 Tester
Device Quantity
1. Connect the PC to the MNG ETH port on E5-MC-4 card, using a cross Ethernet
cable.
10GbE EXT CLK GPS MNG
1 2 3 4 MNG ETH PRI
EXT CLK IN OUT TOD 1PPS CONTROL
FLT
CLK
LINK ACT LINK ACT LINK ACT LINK ACT 10MHz LINK ACT DCE
RMV
E5-MC-4 10/100/1000BASE-T
E5-MC-4
LAN
PC
E5-GBE-20
CONTROL
NET NET/USER USER
1 2 3 4 5 6
MNG-ETH ETH
ETX-203AX (1)
11 20
LINK FLT
ACT
RMV
1
E5-GBE-20 100/1000BASE-X
E5-GBE-20
CONTROL
NET NET/USER USER
1 2 3 4 5 6
MNG-ETH ETH
ETX-203AX (1)
E5-GBE-20
USER - 10/100/1000BT
10/100BaseT 100BASE-FX/1000BASE-X
CONTROL MNG-ETH
NET/USER NET
DCE
2 1
E5-GBE-20
CONTROL
NET NET/USER USER
1 2 3 4 5 6
MNG-ETH ETH
ETX-203AX (2)
11 20
LINK FLT
ACT
RMV
1
E5-GBE-20 100/1000BASE-X
E5-GBE-20
CONTROL
NET NET/USER USER
1 2 3 4 5 6
MNG-ETH ETH
ETX-203AX (2)
E5-GBE-20
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
NET NET-USER USER
ETX-205A
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT 10/100/ PS1 PS2
1000BT
ETX-205A
MNG-ETH ETH
ETX-203AX (1)
1PPS
CONTROL GbE/100Fx
1 2 3 4 5 6
DCE
MNG-ETH RAD
10/100/1000BT
ETX-204A
USER - 10/100/1000BT
10/100BaseT 100BASE-FX/1000BASE-X
CONTROL MNG-ETH
NET/USER NET
DCE 5 3 6 4 2 1
1PPS
CONTROL GbE/100Fx
1 2 3 4 5 6
DCE
MNG-ETH RAD
10/100/1000BT
ETX-204A
11. Connect port 3 on ETX-203AX (2) to SFP port 5 on ETX-204A, using a fiber
optic Ethernet cable.
CONTROL
NET NET/USER USER
1 2 3 4 5 6
MNG-ETH ETH
ETX-203AX (2)
1PPS
CONTROL GbE/100Fx
1 2 3 4 6
DCE
MNG-ETH RAD
10/100/1000BT
ETX-204A
12. Connect SFP port 3 on ETX-205A to SFP port 6 on ETX-204A, using a fiber
optic Ethernet cable.
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
NET NET-USER USER
ETX-205A
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT 10/100/ PS1 PS2
1000BT
ETX-205A
1PPS
CONTROL GbE/100Fx
1 2 3 4 6
DCE
MNG-ETH RAD
10/100/1000BT
ETX-204A
GbE/100Fx E1/T1
EXT CLK TOD/1PPS EXT CLK 1 2 3 4
NET NET-USER USER
ETX-205A
1PPS
RAD TST/
ALM CONTROL
SD
MNG-ETH
1 LINK/ACT 2 3 4 5 6 LOC REM POWER POWER
PWR
DCE LINK ACT 10/100/ PS1 PS2
1000BT
ETX-205A
Straight E1 Cable
E1 Tester
14. Install the SFP loopback plug in SDH port 1 of E5-cTDM-4 card to loop the
TDM traffic back to the network tester.
20
OC-3/STM-1 FLT
FLT LINK 1 FLT LINK 2 FLT LINK 3 FLT LINK 4
RMV
LOS LOS LOS LOS
E5-cTDM-4
Note The actual queue group parameters depend on network design and service
requirements. The traffic management parameters appearing in these examples
are used for illustration only.
5. Configure the QG_ring_node queue group profile, binding the queue block
profiles. Queue blocks are added to queue group in the reverse order: level 1
> level 0.
Queue block 1/1 – modified weighted priority queues, no shaper
Queue block 0/1 – default strict and weighted priority queues, 1 Mbps
shaper
Queue block 0/2 – default strict and weighted priority queues, 10 Mbps
shaper
Queue block 0/3 – default strict and weighted priority queues, no shaper.
This queue block uses default values and does not need to be modified.
Queue block 0/4 – modified strict and weighted priority queues, no
shaper
Queue block 0/5 – modified strict and weighted priority queues, no
shaper.
Figure 13-15 illustrates traffic scheduling and shaping within ETX-5. Detailed
configuration instructions are provided in the script below.
QG_ring_node
0/1
sp
sp
sp
R-APS Traffic sp 1 Mbps
wfq Shaper
wfq
wfq
wfq
0/2 Weight = 1
sp
sp
sp 10 Mbps
Management Traffic sp Shaper
wfq
wfq
wfq
wfq Weight = 1
0/3 1/1
sp wfq, 1
sp wfq, 1
sp wfq, 33
Service 1 Traffic sp Weight = 33 wfq, 60
wfq wfq, 60
wfq wfq, 1
wfq wfq, 1
Weight = 60
wfq wfq, 1
0/4
sp
sp
sp
Service 2 Traffic sp Weight = 60
wfq, 3
wfq, 2
wfq, 1
wfq, 1
0/5
sp
sp
sp
Service 3 Traffic sp
wfq, 3
wfq, 2
wfq, 1
wfq, 1
#*************************Adding_Queue_Group_Profile*************************
configure qos queue-group-profile QG_ring_node
inherited-from q_group_2_level_default
exit all
#*********************************End****************************************
#***********************Configuring_1/1_Queue_Block_Profile******************
config qos queue-internal-profile q_raps
scheduling wfq1
exit all
#*************************Configuring_Shaper_Profiles************************
config qos shaper-profile sh1_1M bandwidth cir 1000 cbs256000
exit all
#******************Configuring_0/4_and_0/5_Queue_Block_Profile***************
config qos queue-internal-profile qstrict
congestion-avoidance wred profile DefaultWREDProfile
scheduling strict
exit all
#***********************Configuring_Queue_Group_Profile**********************
configure qos queue-group-profile QG_ring_node
queue-block 1/1
profile q_block_ring_port
exit
queue-block 0/1
shaper profile sh1_1M
exit
queue-block 0/2
shaper profile sh1_10M
exit
queue-block 0/4
profile q_block_service_cos
exit
queue-block 0/5
profile q_block_service_cos
exit all
#*********************************End****************************************
3. Configure queue block profile (profile013) for level-0 scheduling element 0/3.
Queues 0–3 are configured as strict priority queues.
Queues 4–7 are configured as weighted queues with 3, 2, 1 and 1
weights.
4. Configure a single-rate shaper for 1 Mbps to be applied to traffic coming via
level-0 scheduling elements 0/1 and 0/2.
5. Configure the q_group_test queue group profile, binding the queue block
profiles. Queue blocks are added to queue group in the reverse order: level 1
> level 0.
Queue block 1/1 – modified weighted priority queues, no shaper
Queue block 0/1 – modified strict priority and default weighted priority
queues, 1 Mbps shaper
Queue block 0/2 – modified strict priority and default weighted priority
queues, 1 Mbps shaper
Queue block 0/3 – modified strict and weighted priority queues, no
shaper.
Figure 13-16 illustrates traffic scheduling and shaping within ETX-5. Detailed
configuration instructions are provided in the script below.
q_group_test
0/1
sp
sp
sp 1 Mbps
sp Shaper
wfq
wfq
wfq
wfq Weight = 10
0/2 1/1
sp wfq, 10
sp 1 Mbps wfq, 10
sp Shaper wfq, 33
sp Weight = 10 wfq, 1
wfq wfq, 1
wfq wfq, 1
wfq wfq, 1
Weight = 33
wfq wfq, 1
0/3
sp
sp
sp
sp
wfq, 3
wfq, 2
wfq, 1
wfq, 1
#***********************Configuring_1/1_Queue_Block_Profile******************
config qos queue-block-profile profile11
queue 0
scheduling wfq10
exit
queue 1
scheduling wfq10
exit
queue 2
scheduling wfq33
exit all
#*********************************End****************************************
#******************Configuring_0/1_and_0/2_Queue_Block_Profile***************
config qos queue-block-profile profile012
queue 0
scheduling strict
exit
queue 1
scheduling strict
exit
queue 2
scheduling strict
exit
queue 3
scheduling strict
exit
exit all
#*********************************End****************************************
#**********************Configuring_0/3_Queue_Block_Profile*******************
config qos queue-block-profile profile03
queue 0
scheduling strict
exit
queue 1
scheduling strict
exit
queue 2
scheduling strict
exit
queue 3
scheduling strict
exit
queue 4
scheduling wfq3
exit
queue 5
scheduling wfq2
exit
queue 6
scheduling wfq1
exit
queue 7
scheduling wfq1
exit
exit all
#*********************************End****************************************
#*************************Configuring_Shaper_Profile*************************
config qos shaper-profile shape1 bandwidth cir 1000 cbs256000
exit all
#*********************************End****************************************
#***********************Configuring_Queue_Group_Profile**********************
configure qos queue-group-profile q_group_test
queue-block 1/1
profile profile11
exit
queue-block 0/1
profile profile012
exit
queue-block 0/2
profile profile012
exit
queue-block 0/3
profile profile03
exit
queue-block 0/1
shaper profile shape1
exit
queue-block 0/2
shaper profile shape1
exit
#*********************************End****************************************
Telnet
IP Network
ETX-203AX (1)
ETX-1
Management Router
Management
ETX-205A
ETX-5
Management Router
ETX-203AX (2)
MNG-ETH
E5-GBE-20 E5-MC-4
SAP
SVI 40 SVI 50
SAP 40 50
Bridge
SAP
45 51
SAG 1
SVI 45 SVI 51
ETX-5
Notes • Flows for MiNID inband management via BP 45 and SVI 45 are similar to the
flows used for ETX-205A management via BP 40 and SVI 40.
• Flows for tunneling VLAN 3000 traffic are created directly between port 1/14
and LAG without going via bridge ports.
#**************Assigning_Queue_Group_Profiles_to_SAGs_and_Ports**************
config port sag 1/1
queue-group profile workshop_SAG_level_2_profile
exit all
#*********************************End****************************************
#***************************Configuring_SVIs*********************************
config port svi 101 router
exit all
#***********************Configuring_Router_Interface*************************
configure router 1 interface 1
address 172.17.191.10/24
bind svi 101
no shutdown
exit all
#*********************************End****************************************
#*************************Configuring_Bridge_Ports***************************
#*************************Configuring_Management_VLAN************************
configure bridge 1 vlan 4094 tagged-egress 40,45,50,51
exit all
#*********************************End****************************************
#************************Defining_Classifier_Profiles************************
config flows classifier-profile v4094 match-any
match vlan 4094
exit all
#*********************Configuring_Marking_Profile****************************
configure qos marking-profile mark1 classification cos color-aware green-
yellow dei mapping
mark 0 green to 7 dei green
mark 1 green to 6 dei green
mark 2 green to 5 dei green
mark 3 green to 4 dei green
mark 4 green to 3 dei green
mark 5 green to 2 dei green
mark 6 green to 1 dei green
mark 7 green to 0 dei green
mark 0 yellow to 7 dei green
mark 1 yellow to 6 dei green
mark 2 yellow to 5 dei green
mark 3 yellow to 4 dei green
mark 4 yellow to 3 dei green
#*************************Activating_Physical_Ports**************************
config port ethernet 1/13
pm-enable
no shutdown
exit all
#*********************Configuring_ETX-5_Management_Flows*********************
config flows flow MNG_MA0toSVI50
classifier untagged
ingress-port mng-ethernet main-a/0
egress-port svi 50
vlan-tag push vlan 4094 p-bit fixed 0
pm-enable
no shutdown
exit all
#********************Configuring_ETX-205A_Management_Flows*******************
configure flows flow 1_13toSAP1_2_40_v4094
classifier v4094
ingress-port ethernet 1/13
egress-port sap 1/2/40 queue-map-profile QueueMapDefaultProfile" block 0/1
pm-enable
no shutdown
exit all
#*********************Configuring_MiNID_Management_Flows*********************
configure flows flow 1_14toSAP1_2_45_v4094
classifier v4094
ingress-port ethernet 1/14
egress-port sap 1/2/45 queue-map-profile QueueMapDefaultProfile" block 0/1
pm-enable
no shutdown
exit all
#*******************Configuring_Tunneling_Flows_for_VLAN_3000****************
configure flows flow 1_14to1_SAP1_2_400_v3000
classifier v3000
#***************************Adding_Default_Gateway***************************
configure router 1 interface 1
static-route 0.0.0.0/0
address 172.17.191.1
exit all
#*********************************End****************************************
#***************************Displaying_Flow_Summary**************************
show configure flows summary
Name : MNG_MA0toSVI50
Admin Status : Up
Operational Status : Up
PM : Disable
Service Name :
Test : Off
Classifier : untagged
---------------------------------------
Type MD MA Entity
---------------------------------------
more..
#*********************************End****************************************
2
ETH 2
Bridge
3 1
SVI 1
1
Router
ETH 1
Management
ETX-203AX (1)
#*****************************Configuring_SVI********************************
configure port svi 1
no shutdown
exit all
#*********************************End****************************************
#***********************Configuring_Router_Interface*************************
configure router 1 interface 1
address 172.17.191.11/24
bind svi 1
no shutdown
exit all
#*********************************End****************************************
#*************************Configuring_Management_VLAN************************
configure bridge 1 vlan 4094
exit all
#*********************************End****************************************
#*************************Configuring_Bridge_Ports***************************
configure bridge 1
port 3
no shutdown
exit all
configure bridge 1
port 1
no shutdown
exit all
configure bridge 1
port 2
no shutdown
exit all
#*********************************End****************************************
#************************Defining_Classifier_Profiles************************
config flows classifier-profile v4094 match-any
match vlan 4094
exit all
#***************************Configuring_Flows********************************
config flows flow BP3toSVI1
classifier v4094
no policer
ingress-port bridge-port 1 3
egress-port svi 1
vlan-tag pop vlan
no shutdown
exit all
#***********************Configuring_Queue_Group_Profile**********************
configure qos queue-group-profile workshop_level_2_profile
exit all
#*********************************End****************************************
#*****************Binding_Queue_Group_Profile_to_Ethernet_Ports**************
configure port ethernet 1
queue-group profile workshop_level_2_profile
exit all
SVI 1
1
Router
2
Management
ETX-205A
#*****************************Configuring_SVI********************************
configure port svi 1
no shutdown
exit all
#*********************************End****************************************
#***********************Configuring_Router_Interface*************************
configure router 1 interface 1
address 172.17.191.11/24
bind svi 1
exit all
#*********************************End****************************************
#************************Defining_Classifier_Profiles************************
config flows classifier-profile v4094 match-any
match vlan 4094
exit all
#***********************Configuring_Queue_Group_Profile**********************
configure qos queue-group-profile workshop_level_2_profile
exit all
#*********************************End****************************************
#*****************Binding_Queue_Group_Profile_to_Ethernet_Ports**************
configure port ethernet 1
queue-group profile workshop_level_2_profile
exit all
#*********************************End****************************************
#***************************Configuring_Flows********************************
configure flows flow MNG_OUT_v4094
classifier all
vlan-tag push vlan 4094 p-bit fixed 0
ingress-port svi 1
egress-port ethernet 1 queue 0 block 0/1
no shutdown
exit all
#************************Activating_Router_Interface*************************
configure router 1 interface 1
no shutdown
exit all
#*********************************End****************************************
#***************************Adding_Default_Gateway***************************
configure router 1 interface 1
static-route 0.0.0.0/0
address 172.17.191.1
exit all
#*********************************End****************************************
MiNID
Configuration > System > Management > Host IP
The ring runs between the bridge instances in the devices. The bridge port (BP)
roles are as follows:
• ETX-5 BP 1 – East port, RPL owner
• ETX-5 BP 2 –West port, node
• ETX-203AX (1) BP 1 – West port, neighbor
• ETX-203AX (1) BP 2 – East port, node.
Figure 13-22 illustrates the general ERP layout. See sections below for detailed
description of how to configure ERP instances for ETX-203AX (1) and ETX-5.
MNG-ETH
2 SVI 1 SVI 50
ETH 2 1/1
Bridge RPL 1 50
3 1 Bridge
2 51
SVI 2 SVI 51
SVI 1
1 SVI 101
Router 1
ETH 1 1/11
Router
Management
Management
ETX-203AX (1)
ETX-5
3 1 MEP 12
East port,
node
SVI 1 MEP 22
1
Router
ETH 1
Management
5. Define OAM (CFM) session to create MEPs 12 and 22, and bind them to port
ETH 2 and ETH 1, respectively.
6. Add SF triggers to ERP 1.
7. Add a static route to default gateway (NMS at 172.17.191.1).
Detailed configuration instructions are provided in the script below.
#****************************Adding_ERP_Instance*****************************
config protection erp 1 major
timers guard 2000 holdoff 0
bridge 1
east-port 1 ethernet 1
west-port 2 ethernet 2
r-aps vlan 777 vlan-priority 1
mel 1
port-type east node-port
port-type west neighbor
exit all
#*********************************End****************************************
#************************Defining_VLAN_4094_for_ERP_1************************
config protection erp 1 major
vlan 4094
queue-block east 0/2 west 0/2
no shutdown
exit all
#*******************Defining_Classifier_Profile_for_VLAN_1503****************
configure flows classifier-profile class1503 match-any
match vlan 1503
exit all
#*********************************End****************************************
#************************Defining_VLAN_1503_for_ERP_1************************
config protection erp 1 major
vlan 1503
queue-block east 0/2 west 0/2
no shutdown
exit all
#*********************************End****************************************
#*****************************Configuring_OAM_CFM****************************
configure oam cfm
maintenance-domain 1
no name
md-level 4
maintenance-association 1
ccm-interval 3.33ms
name uint 11
classification vlan 1503
mep 12
ccm-initiate
ccm-priority 0
remote-mep 11
classification vlan 1503
bind ethernet 2
queue fixed 0 block 0/1
no shutdown
exit all
#***************************Configuring_SF_Triggers**************************
configure protection erp 1
sf-trigger west mep 1 1 12
sf-trigger east mep 1 2 22
exit all
#*********************************End****************************************
#***************************Adding_Default_Gateway***************************
configure router 1 interface 1
static-route 0.0.0.0/0
address 172.17.191.1
exit all
#*********************************End****************************************
MNG-ETH
SVI 1 SVI 50
1/1
MEP 11 1 50
Bridge
SAG 1
2 51
SVI 2 SVI 51
SAP 1
MEP 21 SVI 101
1
1/11
Router
SAG 2
Management
ERP Path
Flow Path
Management Traffic
#***************************Configuring_SVIs*********************************
config port svi 1 bridge
exit all
#************************Binding_SVIs_to_Bridge_Ports************************
config bridge 1 port 1
bind svi 1
no shutdown
exit all
#****************************Adding_ERP_Instance*****************************
config protection erp 1 major
bridge 1
east-port 1
west-port 2
r-aps vlan 777 vlan-priority 1 mel 1
exit all
#*********************************End****************************************
#****************************Defining_ERP_Members****************************
config protection erp 1 major
port-type east rpl
port-type west node-port
wait 300
timers guard 2000
exit all
#*********************************End****************************************
#************************Defining_VLAN_4094_for_ERP_1************************
config protection erp 1 major
data-vlan 4094
exit all
#*******************Defining_Classifier_Profile_for_VLAN_777*****************
config flows classifier-profile 777 match-any
match vlan 777
exit all
#*********************************End****************************************
#***********************Configuring_Flows_for_VLAN_777***********************
configure flows flow Ring_1_1toSAP1_1_1
classifier 777
ingress-port ethernet 1/1
egress-port sap 1/1/1
queue-map-profile QueueMapDefaultProfile block 0/1
pm-enable
no shutdown
exit all
#***********************Activating_Ports_1/1_and_1/11************************
config slot 1
no shutdown
exit all
#***********************Configuring_Flows_for_VLAN_4094**********************
configure flows flow 1_1toSAP1_1_1
classifier v4094
ingress-port ethernet 1/1
egress-port sap 1/1/1
queue-map-profile QueueMapDefaultProfile block 0/1
pm-enable
no shutdown
exit all
#***********************Configuring_VLAN_1503_for_CCMs***********************
config bridge 1
vlan 1503
exit all
#***********************Configuring_Flows_for_VLAN_1503**********************
configure flows flow RING_OAM_1/1_to_SAP1/1/1
classifier "v1503"
ingress-port ethernet 1/1
egress-port sap 1/1/1
queue-map-profile QueueMapDefaultProfile block 0/1
pm-enable
no shutdown
exit all
#**************************Configuring_CoS_Mapping***************************
config qos cos-map-profile cos_map
classification p-bit
map 0 to-cos 7
map 1 to-cos 6
map 2 to-cos 5
map 3 to-cos 4
map 4 to-cos 3
map 5 to-cos 2
map 6 to-cos 1
map 7 to-cos 0
exit all
#*********************************End****************************************
#*****************************Configuring_OAM_CFM****************************
configure oam cfm
maintenance-domain 1
md-level 4
maintenance-association 1
ccm-interval 3.33ms
name uint 11
mep 11
bind ethernet 1/1
cos-mapping profile cos_map
flow uni-direction rx RING_OAM_SAP1/1/1_to_SVI1 tx RING_OAM_SVI1_to_1/1
queue queue-mapping QueueMapDefaultProfile block 0/1
ccm-initiate
ccm-priority 0
remote-mep 12
no shutdown
exit all
#***************************Configuring_SF_Triggers**************************
config protection erp 1 major
sf-trigger east mep 1 1 11
sf-trigger west mep 1 2 21
exit all
#*********************************End****************************************
MNG-ETH
E5-GBE-20 E5-MC-4
30
Bridge
51
LAG SVI 51
SVI 1
1 SVI 101
Router 1
ETH 2 1/12
Router
Management
Management
ETX-203AX (2)
ETX-5
#****************************Adding_L2CP_Profile*****************************
configure port l2cp-profile LACP
mac 0x02 peer
exit all
#*********************************End****************************************
#****************************Assigning_LACP_Profile**************************
configure port ethernet 1
l2cp profile LACP
exit all
#*********************************End****************************************
#*****************************Configuring_SVI********************************
configure port svi 1
no shutdown
exit all
#*********************************End****************************************
#***********************Configuring_Router_Interface*************************
configure router 1 interface 1
address 172.17.191.16/24
bind svi 1
no shutdown
exit all
#*********************************End****************************************
#************************Defining_Classifier_Profiles************************
config flows classifier-profile v4094 match-any
match vlan 4094
exit all
#***********************Configuring_Queue_Group_Profile**********************
configure qos queue-group-profile profile-LAG
exit all
#*********************************End****************************************
#*****************Binding_Queue_Group_Profile_to_Ethernet_Ports**************
configure port ethernet 1
queue-group profile profile-LAG
exit all
#***************************Configuring_Flows********************************
configure flows flow MNG_OUT_v4094
classifier all
vlan-tag push vlan 4094 p-bit fixed 0
ingress-port svi 1
egress-port ethernet 1 queue 0 block 0/1
no shutdown
exit all
classifier v4094
vlan-tag pop vlan
ingress-port ethernet 1
egress-port svi 1 queue 0
no shutdown
exit all
#*********************************End****************************************
#************************Activating_Router_Interface*************************
configure router 1 interface 1
no shutdown
exit all
#*********************************End****************************************
#***************************Adding_Default_Gateway***************************
configure router 1 interface 1
static-route 0.0.0.0/0
address 172.17.191.1
exit all
#*********************************End****************************************
MNG-ETH
E5-GBE-20 E5-MC-4
CPU
SAP 31
1/2 SVI 30
30
Bridge
SAP 30
51
SAG 1
LAG SVI 51
Cre
auto ated SAP 31 SVI 101
matic
au Crea ally
tom te 1
ati d
1/12 ca
lly Router
SAP 30
SAG 2
Management
ETX-5
LACP Traffic
Management Traffic
It is recommended to create new queue group profiles and not to use the
default ones. The section ETX-5 Queue Group Configuration above details
how to create queue group profiles for ETX-5.
4. Add bridge-type SVI 30.
5. Add bridge 1, bridge port 30 (BP 30) and bind it to SVI 30.
6. Define management VLAN 4094 and tagged egress ports (1, 2, 30, 50, 51).
Note Any bridge ports that have already been associated with this VLAN must be
repeated in the command.
7. Add an L2CP profile to peer (interpret) LACP packets. This profile will be
applied to both physical ports. LACP traffic uses MAC DA 01-80-C2-00-00-02.
8. Define two flows for LACP traffic:
From LAG 1 to SAP 1/1/31 (LACP_LAG1toSAP1_1_31).
Drop action applied to the flow ensures that non-LACP packets are
dropped and prevented from being delivered to the CPU.
Enable port A/3 to serve as an egress port for LACP traffic.
You can indicate any main card port as an egress port of the flow. This is
required for technical reasons and does not influence the port in any
way, as LACP packets are forwarded to the CPU.
From SAP 1/1/31 to port A/3 (LACP_SAP1_1_31toMA3).
Verify that the SAP serving the second port member in the LAG is not in
use (has flows attached to it). This SAP (in this example SAP 1/2/31) is
used by the LAG-to-SAP-1/2/31 flow which is created automatically.
9. Define three flows for management traffic:
From LAG 1 to SAP 1/1/30 (LAG1 to SAP1_1_30_v4094)
From SAP 1/1/30 to SVI 30 (SAP1_1_30 to SVI30_v4094)
From SVI 30 to LAG 1 (SVI30 to LAG1)
Verify that SAP serving the second port member in the LAG is not in use
(has flows attached to it). This SAP (in this example SAP 1/2/30) is used
by the LAG-to-SAP-1/2/30 flow, which is created automatically.
Detailed configuration instructions are provided in the script below.
#*************************Activating_Ethernet_Ports**************************
config port ethernet 1/2
pm-enable
no shutdown
exit all
#******************************Adding_LAG_Port*****************************
configure port lag 1
bind ethernet 1/2
#**********Assigning_Queue_Group_Profiles_to_SAGs_Ports_and_LAG**************
config port sag 1/1
queue-group profile workshop_SAG_level_2_profile
exit all
#*****************************Configuring_SVI********************************
configure port svi 30 bridge
no shutdown
exit all
#*********************************End****************************************
#*************************Configuring_Bridge_Ports***************************
config bridge 1 port 30
bind svi 30
no shutdown
exit all
#*********************************End****************************************
#*************************Configuring_Management_VLAN************************
configure bridge 1 vlan 4094 tagged-egress 1,2,30,50,51
exit all
#*********************************End****************************************
#****************************Adding_L2CP_Profile*****************************
configure port l2cp-profile LACP
mac 01-80-c2-00-00-02 peer
exit all
#*********************************End****************************************
#**********************Configuring_Flows_for_LACP_Traffic********************
configure flows flow LACP_LAG1toSAP1_1_31
classifier untagged
ingress-port lag 1
egress-port sap 1/1/31 queue-map-profile QueueMapDefaultProfile block 0/1
l2cp profile LACP
drop
pm-enable
no shutdown
exit all
#******************Configuring_Flows_for_Management_Traffic******************
configure flows flow LAG1toSAP1_1_30_v4094
classifier v4094
ingress-port lag 1
egress-port sap 1/1/30 queue-map-profile QueueMapDefaultProfile block 0/1
pm-enable
no shutdown
exit all
no shutdown
exit all
E5-GBE-20 E5-MC-4
SAP 1
4 2 ETH 2 1/1 SVI 1
ETH 3
Untagged
user traffic Bridge SAP 1
3 1 Bridge
SAP
2 41
SAG 1
SVI 2 SVI 41
SVI 1
ETH 1 1/11
1 SAP 1
Router
SAP
1/13
SAP 41
Management
SAG 2
ETX-203AX (1)
ETX-5
3 1
Untagged
user traffic
SVI 1
1
Router
2
Management
ETX-205A
#***********************Configuring_Queue_Group_Profile**********************
configure qos queue-group-profile workshop_level_2_profile
exit all
#*********************************End****************************************
#****************Binding_Queue_Group_Profile_to_Ethernet_Port_3**************
configure port ethernet 3
queue-group profile workshop_level_2_profile
exit all
#*********************************End****************************************
#******************Defining_Classifier_Profile_for_VLAN_600******************
configure flows classifier-profile v600_DATA match-any
match vlan 600
exit all
#*********************************End****************************************
#***********************Configuring_Bidirectional_Flow***********************
config flows flow ETH3toBP4
classifier untagged
vlan-tag push vlan 600 p-bit fixed 0
ingress-port ethernet 3
egress-port bridge-port 1 4
reverse-direction block 0/1
no shutdown
exit all
#*********************************End****************************************
#************************Defining_VLAN_600_for_ERP_1************************
config protection erp 1 major
vlan 600
queue-block east 0/2 west 0/2
no shutdown
exit
no shutdown
exit all
#*********************************End****************************************
E5-GBE-20 E5-MC-4
SAP 1
1/1 SVI 1
SAP 1
Bridge
SAP
2 41
SAG 1
SVI 2 SVI 41
1/11
SAP 1
SAP
1/13
SAP 41
SAG 2
ETX-5
exit all
no shutdown
exit all
#*********************************End****************************************
#***********************Configuring_Queue_Group_Profile**********************
configure qos queue-group-profile workshop_level_2_profile
exit all
#*********************************End****************************************
#****************Binding_Queue_Group_Profile_to_Ethernet_Port_3**************
configure port ethernet 3
queue-group profile workshop_level_2_profile
exit all
#*********************************End****************************************
#*******************************Configuring_Flows****************************
configure flows flow ETH3_to_ETH1_v600
classifier untagged
vlan-tag push vlan 600
p-bit fixed 0
ingress-port ethernet 3
egress-port ethernet 1
queue 0 block 0/2
no shutdown
exit all
MNG-ETH
E5-cTDM-4 E5-MC-4
3/1
STM-1 E1
DS1 XC PW 1
SVI 70
E1-1 1
ETH 1 50
E1 ETH
PW 1 SVI 2
Bridge
2 51
E5-GBE-20
SVI 1
1
SAP 70
Router 1
SAP Router
1/13
Management SAP
Management
SAG 2
ETX-205A
ETX-5
2. Configure PW peer (MAC address of the ETX-5 PW host). Use the show
configure port sdh-sonet 3/1 status command on ETX-5 to identify the MAC
address.
3. Define SVI 2.
4. Configure a pseudowire connection (pw 1).
5. Configure TDM cross-connect (assign E1 1 to pw 1).
6. Define a classifier profile v555 for traffic tagged with VLAN 555.
7. Configure two flows:
From SVI 2 to port 1 (E1_SVI2toETH1)
From port 1 to SVI 2 (E1_ETH1toSVI2)
Detailed configuration instructions are provided in the script below.
#*****************************Configuring_E1_Port_1**************************
config port e1 1
no shutdown
line-type unframed
tx-clock-source pw 1
pm-enable
exit all
#*********************************End****************************************
#*****************************Configuring_PW_Peer****************************
config peer 1 mac 00-20-D2-F5-8F-30
exit all
#*********************************End****************************************
#********************************Adding_SVI_2********************************
config port svi 2
no shutdown
exit all
#*********************************End****************************************
#**********************Configuring_Pseudowire_Connection_1*******************
config pw pw 1 type e1satop psn ethernet
peer 1
label in 11 out 22
tdm-payload size 192
pm-enable
egress-port svi 2
no shutdown
exit all
#*********************************End****************************************
#************************Configuring_TDM_Cross_Connect***********************
config cross-connect pw-tdm pw 1 e1 1
exit all
#*********************************End****************************************
#*************************Defining_Classifier_Profile************************
configure flows classifier-profile v555 match-any
match vlan 555
exit all
#*********************************End****************************************
#*******************************Configuring_Flows****************************
configure flows flow E1_SVI2toETH1
classifier all
ingress-port svi 2
egress-port ethernet 1 queue 0 block 0/1
vlan-tag push vlan 555 p-bit fixed 0
no shutdown
exit all
tx-clock-source domain 1
exit all
#*********************************End****************************************
#**************************Activating_E1_in_STM-1****************************
configure port sdh-sonet 3/1 aug 1 tug 3 2 vc 12 6 1
no shutdown
exit all
#*********************************End****************************************
#**************************Cinfiguring_Internal_E1***************************
config port e1 3/1/49
tx-clock-source domain 1
line-type unframed
pm-enable
no shutdown
exit all
#*********************************End****************************************
#*****************************Configuring_PW_Peer****************************
config peer 1 mac 00-20-D2-51-15-9A
exit all
#*********************************End****************************************
#********************************Adding_SVI_70*******************************
config port svi 70 pw
no shutdown
exit all
#*********************************End****************************************
#**********************Configuring_Pseudowire_Connection_1*******************
config pwe pw 1 type e1satop psn ethernet
label in 22 out 11
peer 1
egress-port svi 70
tdm-payload size 192
pm-enable
jitter buffer 8000
no shutdown
exit all
#*********************************End****************************************
#************************Configuring_TDM_Cross_Connect***********************
config cross-connect pw-tdm pw 1 e1 3/1/49
exit all
#*********************************End****************************************
#*************Binding_Queue_Group_Profile_to_Ethernet_Port_1/13**************
config port ethernet 1/13
queue-group profile workshop_level_2_profile
exit all
#*********************************End****************************************
#*************************Defining_Classifier_Profile************************
config flows classifier-profile v555 match-any
#*******************************Configuring_Flows****************************
config flows flow SVI_70_to_ETH_1/13
classifier all
ingress-port svi 70
egress-port ethernet 1/13 queue-map-profile QueueMapDefaultProfile block 0/1
pm-enable
vlan-tag push vlan555 p-bit profile mark1
no shutdown
exit all
#****************************Activating_Port_3/1*****************************
config port sdh-sonet 3/1
no shutdown
exit all
#*********************************End****************************************
#****************************Activating_Slot_3*******************************
config slot 3
no shutdown
exit all
#*********************************End****************************************
MiNID
ETH 3
ETX-1
E5-GBE-20 E5-MC-4
1/14
ETH 1 1/2
VLAN 300
LAG
ETH 3
ETH 2 1/12
ETX-203AX (2)
ETX-5
#***********************Defining_Classifier_Profiles*************************
configure flows classifier-profile v200 match-any
match vlan 200
#*******************************Configuring_Flows****************************
configure flows flow ETH3toLAG1_v200
classifier v200
vlan-tag push vlan3000 p-bit fixed 4
ingress-port ethernet 3
egress-port ethernet 1 queue 0 block 0/1
#**************************Configuring_OAM_CFM*******************************
configure oam cfm
maintenance-domain 1
no name
md-level 6
maintenance-association 1
name string Workshop_MA
classification vlan 3000
ccm-interval 100
mep 2
bind ethernet1
classification vlan 3000
ccm-priority 4
queue fixed 0 block 0/1
remote-mep1
client-md-level 7
no shutdown
service 1
classification priority-bit 1
lmm-interval 100ms
dmm-interval 100ms
dest-ne 1
remote mep-id 1
loss single-ended
lmm-synthetic
exit
no shutdown
exit
exit
#*********************************End****************************************
MiNID
Configuration > OAM > CFM
MiNID
Configuration > OAM > CFM
5. In the CFM menu, select Workshop_MA and click Config MA to configure the
new maintenance association.
The Config MA menu is displayed.
6. In the Config MA menu, click Create MEP to add a new maintenance endpoint.
The New MEP menu is displayed.
7. In the New MEP menu, configure the following parameters:
MEP Enable – Disable
MEP ID – 1
Remote MEP ID – 2
Ingress Port – SFP
CCM Enable –Disable
CCM Transmission Mode – Multicast
Client MD Level – 7
AIS Enable – Disable
8. Save the changes.
The Config MA menu is displayed.
1, 4, 6, 7, 8, 9 – Not connected
2 Tx + Transmit
3 Rx – Receive
4, 5 – Not connected
7, 8 – Not connected
3, 6 – Not connected
7, 8 – Not connected
4, 5 GND GND
Caution To prevent damage to alarm relay contacts, the maximum current that can flow
through the contacts must be limited by external means. (The maximum current
through closed contacts is 1A; load switching capacity is 60W). The maximum
voltage across the open contacts is 60 VDC/30 VAC.
Pin Function
3 GND
6 8–15V output
Pin Function
Note All tests should pass if the following procedures are performed precisely.
E5-MC-4
A/1 Down MEP, East, Neighbor, MD1, MA2, MEP2, UINT2
A/2 Down MEP, West, Node, MD1, MA4, MEP2, UINT4
ETX-5 (1) A/3 STC traffic input, VLAN 600
172.18.219.179 A/4 STC traffic input, VLAN 800
RIF 30.30.30.10
1588 Master 1, 10.10.10.10
1588 Master 2, 20.20.20.10 ETX-5 (3)
Major Ring (2) 172.18.219.129
E5-MC-4
G.8032v2
EXT CLK System Clock (E1 2.048 MHz) R-APS on VLAN 777 RIF 30.30.30.30
A/1 Down MEP, East, RPL Owner, MD1, MA2, MEP1, UINT2 1588 Slave, 50.50.50.30
Ext. Clk. ST1
A/2 untagged STC traffic input, push VLAN 1600
Dual
Homing A/3 STC traffic input, VLAN 1111 E5-MC-4
A/1 Down MEP, East, Node, MD1, MA4, MEP1, UINT4
E5-MC-4
A/2 Down MEP, West, Node, MD1, MA3, MEP2, UINT3
B/1 Down MEP, West, Node, MD1, MA3, MEP1, UINT3
A/3 STC traffic input VLAN 50, Up MEP, MD2, MA1, MEP2, UINT1
B/3 Down MEP, East, RPL Owner, MD1, MA6, MEP1, UINT4
B/4 STC traffic input, VLAN 1111 A/4 Down MEP, East, Node, MD1, MA5, MEP1, UINT5
E5-GBE-20 E5-10GBE-2
1/1 STC traffic input VLAN 500, Up MEP, MD2, MA1, MEP1, UINT1 1/1 STC traffic input, VLAN 800
1/2 Source-IP classification, STC traffic input, VLAN 600 1/2 E-line service traffic input, VLAN 700
Sub-Ring (1)
1/3 STC traffic input, VLAN 1200 G.8032v2 E5-cTDM-4
1/4 untagged STC traffic input R-APS on VLAN 888
ETX-205A (1) Net 2 3/1 TDM loopback, adaptive clock
1/7 management traffic input, RADview 3/2 TDM loopback, adaptive clock
1/8 Ethertype 88A8, E-line service traffic input, VLAN 900
User 3
Net 1 1/9 STC traffic input, VLAN 4000, P-bit 0-7
LAG,
VLAN 1600 1/14 untagged STC traffic input
1/15 STC traffic input, VLAN 1500, 2500
ETX-205A (2) 1/18 Ethertype 88A8, E-line service traffic input, VLAN 900
ETX-5 (4)
1/19 Y.1564 test, STC traffic input, VLAN 4000, P-bit 0-7 172.18.219.239
Net 2
1/20 E-line service traffic input, VLAN 900 E5-MC-4
A/2 STC traffic input, VLAN 1200
E5-cTDM-4
OC-3/84 x T1 A/3 Down MEP, East, Neighbor, MD1, MA6, MEP2, UINT4
3/1 TDM traffic input (BERT)
A/4 Down MEP, West, Node, MD1, MA5, MEP2, UINT6
3/2 TDM traffic input (BERT)
2 x Egate-100
APS
Configuring Devices
This section explains how to configure test equipment and RAD devices.
Configuring FireBerd
FireBerd is used for supplying timing signal to ETX-5 (1). Configure it to T1
unframed mode, with Gen CLK = Synth.
Configuring Egate-100s
Egate-100 units are used for supplying framed TDM T1 traffic to E5-cTDM-4 c
card. Configure both Egate-100 units to SONET frame type, internal transmit
clock, T1 ESF mode, and allocate timeslots 1–24.
Test Duration
1 hour
Test Procedure
Table B-6 details procedure of the basic functionality test.
1 Verify major and sub-ring status Both Ethernet rings are in idle state
7 Run Ethernet traffic from the STC Ethernet traffic is running properly without
packet loss
8 Run BERT on the ports 3/1 and 3/2, No errors are detected in pseudowire traffic
using Egate-100s
9 Initiate SNMP management session Devices reply to ping and appear on RADview
from RADview NMS and verify map
management connectivity to all
devices
12 Clear alarm logs in all devices Logs are empty with no active alarms. Ethernet
and pseudowire data is running error-free.
Test Duration
1 hour
Test Procedure
Table B-7 details the TDM APS test procedure.
Test Duration
1 hour
Test Procedure
Table B-8 details the LAG test procedure.
Test Duration
1 hour
Test Procedure
Table B-9 details the ERP test procedure.
1 Verify that the main and sub-rings Main and sub-rings are in Idle state.
are in Idle state and traffic is Ethernet and pseudowire traffic is running
running through all relevant ports error-free, no packet loss is detected.
Test Duration
1 hour
Test Procedure
Table B-10 details the ERP OAM test procedure.
1 Verify that all MEPs in the All Up and Down MEPs in the application are up
application are up
2 With traffic running on the ERPs, Correlation between frame counts for the far-
check OAM PM services on Up MEPs and near-end counters on both devices
defined on ETX-5 (1) and ETX-5 (3)
3 Run OAM link trace between the Link trace has been successful
MEPs
Test Duration
1 hour
Test Procedure
Table B-11 details the Ethernet group protection test procedure.
1 Verify the following on E5-MC-4 Both 10GbE ports are administratively enabled
cards installed in slot A and slot B and operational
of ETX-5 (1):
• 10GbE ports A/3 and B/4 are
combined into protection group
• A/3 is a working port, B/4 is a
protection port
• Recovery mode is non-revertive
2 Run Ethernet traffic based on The traffic is running error-free via port A/3
VLAN 1111 from port 1/6 towards (working)
port he Ethernet protection group
3 Disconnect port A/3 to initialize the Port B/4 (protection) changes to Active and
switchover traffic is running error-free via port B/4.
Protection group status is correct.
4 Reconnect port A/3 The traffic is running error-free via port B/4.
Port flip did not occur, because recovery mode
is non-revertive.
Test Duration
0.5 hour
Test Procedure
Table B-12 details the Y.1564 test procedure.
1 Verify that Y.1564 responder on Traffic over VLAN 400 has stopped on both
has been activated on ETX-205A (2) devices.
followed by activation of Y.1564 The Y.1564 tests are running properly.
generator on ETX-5 (1).
The Y.1564 test results are correct and match
Run Y.1564 configuration and the policer configuration (CIR 60 Mbps and EIR
performance test. 10 Mbps).
2 Reverse the Y.1564 actors by Traffic over VLAN 400 has stopped on both
activating the responder on ETX-5 devices.
(1) and generator on ETX-205A (2). The Y.1564 tests are running properly.
Run Y.1564 configuration and The Y.1564 test results are correct and match
performance test. the policer configuration.
Test Duration
1 hour
Test Procedure
Table B-13 details the Y.1564 test procedure.
1 Save configuration in all ETX-5 Configuration has been saved successfully in all
devices ETX-5 devices under test
2 Verify that traffic is running through Ethernet and pseudowire traffic is running
all relevant ports error-free, no packet loss is detected
3 Reboot ETX-5 (2) and wait until the Management connection to all devices
system is restored. Verify the functions properly.
following: ERP status is Idle.
• The devices respond to ping Ethernet and pseudowire traffic is running
requests properly.
• Management access has been LAG is synchronized.
restored (Telnet/SSH, RADview)
Connection to TACACS+, SNTP and Syslog
• Major and sub-ring status is Idle servers operates properly.
• Ethernet and pseudowire traffic Domain clocks in all ETX-5 devices are locked.
is running error-free
Relevant alarms are stored in the log file and
• LAG is synchronized on Syslog server.
• Connectivity to TACACS+, SNTP
and Syslog servers has been
restored
• Domain clocks in all ETX-5
devices are locked.
4 Clear alarm logs in all devices Logs are empty with no active alarms. Ethernet
and pseudowire data is running error-free.
6 Clear alarm logs in all devices Logs are empty with no active alarms. Ethernet
and pseudowire data is running error-free.
Test Duration
3 hours
Test Procedure
Table B-14 details the software upgrade test procedure.
1 Upgrade all ETX-5 devices from sw- Software upgrade has been successful.
pack 1.0.0 (0.67) R1.0 to sw-pack Ethernet and pseudowire traffic is running
1.5.0 (0.xx) R1.5 properly
2 Upgrade all ETX-5 devices from sw- Software upgrade has been successful.
pack 1.5.0 (0.xx) R1.5 to sw-pack Ethernet and pseudowire traffic is running
1.5.0 (0.yy) R1.5 properly
International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail market@rad.com
www.rad.com