Professional Documents
Culture Documents
SJ-20140402111402-005-ZXMW NR8250 (V2 03 03) Configuration Guide
SJ-20140402111402-005-ZXMW NR8250 (V2 03 03) Configuration Guide
Version: V2.03.03
ZTE CORPORATION
No. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://support.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright © 2014 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit the ZTE technical support website http://support.zte.com.cn to inquire for related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
II
Glossary .......................................................................................................... I
III
IV
Intended Audience
This manual is intended for:
l Commissioning engineers
l Maintenance engineers
Chapter 2, Basic NE Data Describes the configuration flow and configuration example of
Configuration NR8250 NE basic data.
Chapter 3, Radio Link Data Describes the configuration flow and configuration example of
Configuration NR8250 radio link data.
Chapter 4, TDM Service Describes the configuration flow and configuration example of
Data Configuration NR8250 TDM service data.
Chapter 5, Ethernet Service Describes the configuration flow and configuration example of
Data Configuration NR8250 Ethernet service data.
Chapter 6, Clock Data Describes the configuration flow and configuration example of
Configuration NR8250 clock data.
Conventions
This manual uses the following conventions.
Italics Variables in commands. It may also refer to other related manuals and documents.
Bold Menus, menu options, function names, input fields, option button names, check boxes,
drop-down lists, dialog box names, window names, parameters, and commands.
II
Context
The second method of logging in to Web LMT helps log in to the entire network
management system, which is NetNumen M31 (MW). Before using the second method
to log in to Web LMT, users must use the first method to log in to Web LMT once. The
following describes the detailed procedures:
1. Log in to Web LMT through the RCUB board's LMT interface.
2. In the left pane, select Setup > System > Parameter. The system parameter
configuration page is displayed.
3. Modify the IP address, which should be unique in the entire network.
4. Log in to Web LMT through the RCUB board's NMS/GbE interface.
The following describes how to log in to Web LMT by using the first method.
1-1
Steps
1. Right-click the My Network Places icon on the desktop, and click Properties from the
shortcut menu. Right-click the local connection icon, and click Properties, see Figure
1-1.
1-2
3. Click OK.
4. Use an Ethernet cable to connect the LMT interface of IDU's RCUB with the PC.
Note:
This is the method of logging in through the RCUB board's LMT interface. For the
method of logging in through the RCUB board's NMS/GbE interface, connect the
NMS/GbE interface to the PC.
Enable this port before logging in through NMS/GbE interface. By default, this port is
disabled.
1-3
6. Enter the user name in User Name and the password in Password. Then, click
LOGIN. After the login succeeds, the Web LMT home page is displayed, see Figure
1-4.
– End of Steps –
Steps
1. In the left pane, select Maintenance > Version > IDU Version.
2. Check the IDU version in the Version Management area, see Figure 1-5.
1-4
Note:
Package status description:
5. Ensure that the IDU and ODU versions are correct. If not, update the versions.
1-5
Note:
It is unnecessary to update the ODU version manually. The system will update the
ODU version to the latest automatically.
– End of Steps –
1-6
2-1
l NE 1 serves as the root node. NEs 1–6 form a microwave ring. The Ethernet service
and microwave NMS packets are sent out from NE 1 to the switch and then to the
EMS and RNC respectively. The TDM service is sent out from NE 1 to the MUX and
then to the upstream DDF.
l ZXMW NR8250 (V2.03.03) supports L2 and L3 DCN. Normally, L2 DCN, which
means all NEs are in the same network segment, is used. Microwave EMS uses
10.169.221.0/26. Mircrowave NMS VLAN ID is 2000 and the default gateway address
is 10.169.221.1. The IP address planning of each IDU is shown in Figure 2-1.
l RCUB uses 1+0 non-protection configuration. PM uses 1+1 protection configuration.
l The ring uses 2+0 XPIC configuration and RMUC or RMUH boards. The NE6–NE7
link uses 1+1 HSB configuration and RMUD boards. The NE7 downlink link uses 1+0
non-protection configuration and the RMUD board.
l On NE1, the RTUB board is configured to interconnect MUX. On NE1, NE2, NE3,
NE6, and NE7, RTUHE boards are configured to access local services.
l NE2 Configuration
2-2
l NE3 Configuration
l NE4 Configuration
l NE5 Configuration
l NE6 Configuration
l NE7 Configuration
Note:
The NE names are user defined. The “local site name-remote site name” format is
generally used.
3. Boards
l NE1 Configuration
2-3
1 RCUB -
2 - -
3 RTUHE -
4 RTUB -
5 RMUC/RMUH -
6 RMUC/RMUH -
7 RMUC/RMUH -
8 RMUC/RMUH -
13 RPU -
14 PM -
15 PM -
16 FAN -
l NE2–NE5 Configuration
1 RCUB -
2 - -
3 RTUHE
4 -
5 RMUC/RMUH -
6 RMUC/RMUH -
7 RMUC/RMUH -
8 RMUC/RMUH -
13 RPU -
14 PM -
15 PM -
16 FAN -
l NE6 Configuration
1 RCUB -
2 RTUHE -
2-4
3 RMUD Enabled
4 RMUD
5 RMUC/RMUH -
6 RMUC/RMUH -
7 RMUC/RMUH -
8 RMUC/RMUH -
13 RPU -
14 PM -
15 PM -
16 FAN -
l NE7 Configuration
1 RCUB -
2 - -
3 RTUHE -
4 -
5 RMUD -
6 -
7 RMUD Enabled
8 RMUD
13 RPU -
14 PM -
15 PM -
16 FAN -
2000 2M 2M 2M 2M
l NE6 Configuration
2-5
2000 2M 2M 2M 2M 2M 2M
l NE7 Configuration
2000 2M 2M 2M
2-6
3 Configure the ATPC Mandatory if the interference of the NR8250 to the adjacent
function system, DC power consumption, and influence of level fading at
the transmit end to the receive end need to be reduced.
For the configuration procedure, refer to 8.8 Configuring ATPC
Function.
5 Configure the PLA Mandatory if the capacity of the air interface needs to be
function improved and load balancing and link redundancy are required.
For the configuration procedure, refer to 8.10 Configuring the
PLA Function.
6 Configure the XPIC Mandatory if horizontally and vertically polarized signals need to
function be transmitted at one frequency to improve spectrum utilization
and increase system transmission capacity.
For the configuration procedure, refer to 8.11 Configuring the
XPIC Function.
3-1
8 Configure the Mandatory if the radio link is compressed and encrypted. For
encryption of an air the configuration procedure, refer to 8.13 Configuring the Air
interface Interface Encryption.
1. Suppose that the transmission frequency bands are 8 GHz and 13 GHz. For the
detailed frequency resources, refer to Table 3-1 and Table 3-2.
3-2
7926 8192
7954 8220
7982 8248
266 105
8010 8276
8038 8304
8066 8332
12765 13031
12793 13059
12821 13087
266 84
12849 13115
12877 13143
12905 13171
Backbone ring link 300 NE1–NE6 are the backbone ring sites.
3. The radio link protection modes are described in 2.2.2 Configuration Data.
3-3
Note:
The XPIC function is implemented through the RMUC or RMUH board.
l Bandwidth
RMUC can be configured with 28 M, 40 M, or 56 M bandwidth. RMUH can be
configured with 7 M, 14 M, 28 M, 40 M, or 56 M bandwidth.
l Modulation mode
RMUC supports 256QAM and RMUH supports 1024QAM.
This chapter takes RMUC as an example to describe the networking and data planning.
Parameter Value
l NE4 Configuration
Parameter Value
l NE6 Configuration
3-4
Parameter Value
l NE7 Configuration
Parameter Value
2. Protection Parameters
In 2+0 and 1+0 non-protection modes, the protection parameters are unconfigurable.
l NE6 Transmit Unit 3 Configuration
Parameter Value
Link ID 3
Parameter Value
Link ID 7
3. ATPC Function
Disable the ATPC function normally. You can enable it if the following conditions are
met:
l The area has a large rainfall amount. Service transmission may be affected due
to rainstorms.
3-5
l The transmission power is not set to the maximum value. If the maximum value
is used, other links will be interfered.
The ATPC configuration is as follows:
4. ACM Function
Disable the ACM function normally. You can enable it if the following conditions are
met:
l The area has a large rainfall amount. Service transmission may be affected due
to rainstorms.
l It is allowed to improve the link quality at the cost of throughput reduction.
The ACM configuration is as follows:
5. ODU Parameters
l NE1 Configuration
3-6
l NE2 Configuration
l NE3 Configuration
l NE4 Configuration
3-7
l NE5 Configuration
l NE6 Configuration
l NE7 Configuration
3-8
6. XPIC Function
NE1~NE6 Configuration
3-9
3-10
3 Configure the SNCP+ Mandatory if TDM services are configured with 1:1 ring network
route protection.
For the configuration procedure, refer to 8.16 Configuring an
SNCP+ Protection Route.
5 Configure the TDM Mandatory if the cascading of the TDM service is configured.
cascading function For the configuration procedure, refer to 8.18 Configuring the
TDM Cascade Function.
6 Configure the air Mandatory if the air interface N+1 protection function of the SDH
interface N+1 protection service is configured.
function of the SDH For the configuration procedure, refer to 8.19 Configuring N+1
service Protection at the Air Interface.
4-1
4-2
Station NE7 E1 Plan NE6 E1 Plan NE5 E1 Plan NE4 E1 Plan NE3 E1 Plan NE2 E1 Plan NE1 E1 Plan
NE7 TN5, TN7, TN3, Active: TN5, TN7, TN7, TN5, TN5, TN7, TN5, TN7, Active: TN3,
down- 1-2 1-2 1-2 TN7, 1-2 1-2 1-2 1-2 1-2 1-2 1-2 1-2 TN5, 1-2
link sta- 1-2 1-2
tion A Stan- Stan-
dby: dby:
TN5, TN7,
1-2 1-2
NE7 TN5, TN7, TN3, Active: TN5, TN7, TN7, TN5, TN5, TN7, TN5, TN7, Active: TN3,
down- 3-4 3-4 3-4 TN7, 3-4 3-4 3-4 3-4 3-4 3-4 3-4 3-4 TN5, 3-4
link sta- 3-4 3-4
tion B Stan- Stan-
dby: dby:
TN5, TN7,
4-3
3-4 3-4
NE7 TN5, TN7, TN3, Active: TN5, TN7, TN7, TN5, TN5, TN7, TN5, TN7, Active: TN3,
dby: dby:
TN5, TN7,
5-6 5-6
ZXMW NR8250 Configuration Guide
SJ-20140402111402-005|2014-06-30(R1.0)
Station NE7 E1 Plan NE6 E1 Plan NE5 E1 Plan NE4 E1 Plan NE3 E1 Plan NE2 E1 Plan NE1 E1 Plan
NE7 TN3, TN7, TN3, Active: TN5, TN7, TN7, TN5, TN5, TN7, TN5, TN7, Active: TN3,
1-2 7-8 7-8 TN7, 7-8 7-8 7-8 7-8 7-8 7-8 7-8 7-8 TN5, 7-8
7-8 7-8
Stan- Stan-
dby: dby:
TN5, TN7,
7-8 7-8
NE6 - - TN2, Active: TN5, TN7, TN7, TN5, TN5, TN7, TN5, TN7, Active: TN3,
1-2 TN7, 9-10 9-10 9-10 9-10 9-10 9-10 9-10 9-10 TN5, 9-10
9-10 9-10
Stan- Stan-
dby: dby:
TN5, TN7,
4-4
9-10 9-10
NE5 - - TN5, TN7, TN3, Active: TN7, TN5, TN5, TN7, TN5, TN7, Active: TN3,
11-12 11-12 1-2 TN7, 11-12 11-12 11-12 11-12 11-12 11-12 TN7, 11-12
11-12 11-12
Stan- Stan-
ZTE Proprietary and Confidential
dby: dby:
TN5, TN5,
11-12 11-12
SJ-20140402111402-005|2014-06-30(R1.0)
Station NE7 E1 Plan NE6 E1 Plan NE5 E1 Plan NE4 E1 Plan NE3 E1 Plan NE2 E1 Plan NE1 E1 Plan
NE4 - - TN5, TN7, TN5, TN7, TN3, Active: TN5, TN7, TN5, TN7, Active: TN3,
13-14 13-14 13-14 13-14 1-2 TN5, 13-14 13-14 13-14 13-14 TN5, 13-14
13-14 13-14
Stan- Stan-
dby: dby:
TN7, TN7,
13-14 13-14
NE3 - - TN5, TN7, TN5, TN7, TN7, TN5, TN3, Active: TN5, TN7, Active: TN3,
15-16 15-16 15-16 15-16 15-16 15-16 1-2 TN7, 15-16 15-16 TN7, 15-16
15-16 15-16
Stan- Stan-
dby: dby:
TN5, TN5,
4-5
15-16 15-16
NE2 - - TN5, TN7, TN5, TN7, TN7, TN5, TN5, TN7, TN3, Active: Active: TN3,
dby: dby:
TN5, TN7,
17-18 17-18
NE1 - - - - - - - - - - - - - -
Note:
To enable the ADM mode, double-click the RTUB board on the NE1 shelf configuration
page.
In the ADM mode, STM-1 signals can be multiplexed or demultiplexed into/from E1
signals.
2. TDM Service
l NE1 SNCP Configuration (PDH)
Parameter Value
Priority 1
Protection 7 1-10 -
Protection 5 11-12 -
Protection 7 13-14 -
Protection 5 15-16 -
4-6
Parameter Value
Protection 7 17-18 -
Parameter Value
Priority 1
Protection 5 17-18 -
Parameter Value
Priority 1
Parameter Value
Priority 1
Protection 5 15-16 -
4-7
Parameter Value
Working 3 1 1-2
Parameter Value
Priority 1
Parameter Value
Priority 1
Protection 7 13-14 -
Parameter Value
Priority 1
4-8
Parameter Value
Priority 1
Protection 5 11-12 -
Parameter Value
Priority 1
Parameter Value
Priority 1
Protection 5 1-8 -
Protection 5 9-10 -
4-9
Parameter Value
Priority 1
Parameter Value
Priority 1
Note:
In the version 2.03.01, the E1 SNCP ring is formed through air interfaces and E1/STM-1
line interfaces cannot be used for connection, and the ring . The STM-1 SNCP ring can
use air interfaces and STM-1 line interfaces for connection.
4-10
2 Configure the MAC address Mandatory if the NR8250 MAC address needs to be managed.
For the configuration procedure, refer to 8.22 Configuring the
Ethernet MAC Address.
3.2 Configure Mandatory for the Customer and User Defined port types.
the VLAN For the configuration procedures, refer to 8.23.2 Configuring
mapping Protocol-based VLAN Parameters and 8.23.3 Configuring
mode MAC-based VLAN Parameters.
5-1
5 Configure LLDP The Link Layer Discovery Protocol (LLDP) enables devices
of different vendors to recognize each other and exchange
system and configuration information. This helps the network
management system to query and acquire link status
information.
For the configuration procedure, refer to 8.25 Configuring the
LLDP Function.
7 Configure EFM Ethernet in the First Mile (EFM) is used to manage layer-2
link operating status. It detects the links, acquires information
about the link transmission quality and operating status, and
notifies the information to the local end and remote end.
For the configuration procedure, refer to 8.27 Configuring
EFM.
5-2
9 Configure CFM-CSF The CSF function allows an MEP to notify the opposite MEP
that the input client signal failure. If the CSF function of an
MEP is enabled, it sends the CSF packets to the opposite
MEP when it detects that the client signal failure. The MEP
can detect and handle the CSF packets. This function is used
in scenarios where ETH-CC and ETH-AIS is not supported.
For the configuration procedure, refer to 8.29 Configuring
CFM-CSF.
13 Configure XSTP The Multiple Spanning Tree Protocol (MSTP) / Rapid Spanning
Tree Protocol (RSTP) / Spanning Tree Protocol (STP) can
avoid broadcast storms due to network loops in a LAN and
eliminate loop connections due to mishandling or other
accidents.
For the configuration procedure, refer to 8.33 Configuring the
XSTP Function.
14 Configure OSPF The Open Shortest Path First (OSPF) protocol is an internal
gateway protocol. It provides routing for the NR8250 network
at Layer 3 networking construction and determines the
forwarding paths. It is applicable for large-scale networks and
has the advantages such as fast convergence and routing
aggregation.
For the configuration procedure, refer to 8.34 Configuring
OSPF.
5-3
NE1 101
NE2 102
NE3 103
5-4
NE4 104
NE5 105
NE6 106
NE7 107
• NE1 BBU is directly connected to the switch. The microwave device does not configure VLAN
101.
RCUB 1 No
RCUB 2 No
RTUHE 1 Yes
RTUHE 2 No
RTUHE 3 No
RCUB 1 No
RCUB 2 No
5-5
RTUHE 1 No
RTUHE 2 Yes
RTUHE 3 No
2. Ethernet Ports
l NE1 Port Configuration
Parameter Value
Parameter Value
Parameter Value
3. Port Description
Describe the port according to the port usage to facilitate maintenance.
4. VLAN Configuration
l NE1 Configuration
l NE2 Configuration
5-6
l NE3 Configuration
l NE4 Configuration
l NE5 Configuration
l NE6 Configuration
5-7
l NE7 Configuration
5. XSTP Function
l NE1–NE6 XSTP Global Configuration
Parameter Value
Parameter Value
Force Version -
Work Mode -
5-8
5-9
6. PLA Function
NE1–NE6 PLA Function Configuration
5-10
4 Configure the PTP Mandatory if the PTP clock source needs to be configured.
port For the configuration procedure, refer to 8.39 Configuring the PTP
Clock.
5 Configure radio port Mandatory if the radio port TC function is required for a
TC transmission unit.
For the configuration procedure, refer to 8.40 Configuring Radio
Port TC.
6-1
6 Query the selected Mandatory if the current clock source needs to be checked.
clock source For the configuration procedure, refer to 8.41 Querying the
Selected Clock Source.
In Figure 6-1, the Ethernet service requires time synchronization and the E1 service
requires frequency synchronization. The clock synchronization is implemented as follows:
l NE1 obtains 1588 clock from the GbE interface. NE1–NE7 are set to TC mode to
transparently transmit 1588 clock.
l NE1 obtains the physical clock signal from the first STM-1 of RTUB. Assume that the
switch can obtain the synchronous Ethernet clock signal, RTUHE’s second Ethernet
interface can obtain the synchronous Ethernet clock signal, and NE2–NE7 obtain the
physical clock synchronization signal through air interfaces. Note that to obtain the
synchronous Ethernet clock signal from the switch, the entire network must support
synchronous Ethernet clock.
l Clock ring protection is implemented within the ring network. NE1–NE6 enable the
extended SSM protocol. NE1 is configured as the node station.
6-2
Parameter Value
l NE2~NE6 Configuration
Parameter Value
For the downstream IDU of the XPIC link, the air interface must be set to the Time and Freque
ncy Sync mode.
l NE7 Configuration
Parameter Value
6-3
After SSM is enabled, the clock should be set to bi-directional. For the ports in the clock source
direction, the clock priorities are arranged in ascending order from 1. For the ports in other
directions, the clock priories are arranged in descending order from 11. The SDH clock is more
reliable then the SyncE clock and has a higher priority.
l NE4 Configuration
The NE4 configuration is different from those of NEs 2, 3, and 5 due to different uplink and
downlink slot numbers.
l NE6 Configuration
6-4
l NE7 Configuration
Parameter Value
Station ID 7
l NE2~NE6 Configuration
Parameter Value
Node Station No
l NE7 does not use the SSM algorithm and no SSM configuration is required.
4. PTP Clock
NE1–NE7 Configuration
6-5
Parameter Value
Status Enable
Domain No. 0
Clock Accuracy 33
6-6
Steps
1. In the left pane, select Setup > System > Parameter. The NE information page is
displayed, see Figure 7-1.
7-1
Red Critical
Orange Major
Yellow Minor
Green Warning
Steps
1. Log in to Web CIT.
2. Select Alarm > Current in the left pane.
3. In the Current Alarm area in the right pane, select the slot No. and alarm level, and
then click Query. The query result is displayed in the lower part, see Figure 7-2.
7-2
Steps
1. In the left pane, select Alarm > History.
2. Check the history alarms in the right pane, see Figure 7-3.
7-3
7-4
8-1
Steps
1. In the left pane, select Setup > System > Parameter. The system parameter
configuration page is displayed, see Figure 8-1.
2. Set the NE information. For a description of the parameters, refer to Table 8-1.
8-2
NE Type NR8250 NR8250 Sets the equipment type. It is set to the default
value NR8250 and cannot be modified.
8-3
Default IP addresses 193.254.1.1 Sets the default gateway for an NE. It is the IP
Gateway except those address of an IP router that can be reached
start with directly.
127 or 192, When the NE sends a data packet, if there is no
broadcast available gateway, the data packet is sent to the
addresses, default gateway for processing.
and multicast
addresses
LMT Port IP - 192.168.x.16 x indicates the slot number of the RCU board.
Address Its value is 1 or 2.
The numbers 192 and 168 can be changed.
3. Click Apply.
After this task is completed, users can log in to Web LMT through the RCUB's
NMS/GbE interface (the NMA/GbE interface is On and enabled). The PC's IP address
and the NE's IP address must be configured in the same network segment.
– End of Steps –
Steps
Configuring the NE Time Zone
1. In the left pane, select Setup > System > Time. The NE system time configuration
page is displayed, see Figure 8-2.
8-4
2. From the drop-down list in the Time Zone Management area, select the time zone as
required, see Figure 8-3.
3. Click Apply.
Configuring the NE Time
4. Click the System Time text box in System Time Management area. The calendar is
displayed, see Figure 8-4.
5. Select a date.
6. In the System Time text box, move the cursor to the time part, delete the incorrect
time, and enter the accurate time in the form of HH:MM:SS.
7. Click Apply.
8-5
9. Click Apply.
8-6
10. In the Summer Time Management area, configure the DST parameters. For a
description of the parameters, refer to Table 8-3.
Start Time MM: 1–12 01-01 00:00 Sets the start time of the DST
(MM-dd HH:mm) dd: 1–30 (31) system.
hh: 0–23
mm: 0–59
End Time MM: 1–12 01-01 00:00 Sets the end time of the DST
(MM-dd HH:mm) dd: 1–30 (31) system.
hh: 0–23
mm: 0–59
– End of Steps –
8-7
Context
3–8 RTU or Radio Modulation Unit (RMU) boards. For Radio Traffic Unit N (RTUN) and
Radio Traffic Unit H (RTUH) boards, if they are inserted in slots 5 to 8, the GbE2
and GbE3 interfaces are unavailable.
Steps
1. In the left pane, select Setup > Shelf. The shelf and board configuration page is
displayed, see Figure 8-5.
2. Based on the physical boards actually inserted in Indoor Unit (IDU)'s slots, set the
following information for each Slot NO.: Board Type.
3. Click Apply.
– End of Steps –
8-8
Steps
1. In the left pane, select Setup > NMS. The NMS configuration page is displayed, see
Figure 8-6.
2. Enter the network management VLAN ID, and then click Apply.
3. Select the required bandwidth, and then click Apply.
4. In the left pane, select Security > SNMP. The SNMP configuration page is displayed,
see Figure 8-7.
6. Click Add. The SNMP IP Address Configuration dialog box is displayed, see Figure
8-8.
8-9
7. Enter the NMS name in the Name text box, enter the NMS IP address in the IP
Address text box, select Enable as the status, and then click Apply. Then, the NMS
IP address is added to the IP address list.
– End of Steps –
Steps
Configuring the Hosted Port Mode
1. In the left pane, select Setup > Port Mode. The Port Mode page is displayed, see
Figure 8-9.
2. From the Mode drop-down list of the corresponding port, select Hosted, see Figure
8-10.
8-10
3. Click Apply.
Configuring an AOU Protection Group
4. In the left pane, select Setup > AOU Protection Group. The AOU Protection Group
page is displayed, see Figure 8-11.
Note:
To configure an AOU protection group, you should configure at least two ports to the
Hosted mode.
5. In the Select Port area, select a master port and a protection port from the drop-down
lists.
6. Click Add. The AOU protection group is added, see Figure 8-12.
7. (Optional) To delete an AOU protection group, click Disable in the Operation column.
– End of Steps –
8-11
Caution!
The configuration of work mode results in instantaneous service disconnection.
You need to configure the work mode at the remote end first, then, at the near end. Or, you
can select the remote synchronization mode (select Synchronize bandwidth to remote
NE.
Steps
1. In the left pane, select Radio Link > Basic Configuration. The radio link configuration
page is displayed, see Figure 8-13.
Note:
Current Capacity indicates the capacity of PDU.
8-12
2. Click the tab of the transmit unit to be configured. In the Transmit Unit Info area,
the information of the current transmission unit, such as slot number, capacity, and
whether ACM is supported, is displayed.
3. Configure Bandwidth and Modulation Mode, see Figure 8-14.
4. Click Apply.
– End of Steps –
Context
Note:
l The configured ODU transmit power must guarantee that the upper and lower
thresholds of the ATPC function and the MSE value of the ACM function are within
the allowed range.
l For SRU ODUs, set the transmit power by referring to the frequency range and duplex
spacing. Avoid using edge frequencies.
Steps
1. In the left pane, select Radio Link > Basic Configuration. The radio link configuration
page is displayed. In the RF Parameter Configuration area, configure Frequency
Parameter (kHz) and Power Parameter (dBm), see Figure 8-15.
8-13
2. Select ODU Type. In accordance with the microwave link plan, enter the frequencies
of the master ODU and slave ODU in TX Frequency Configuration text box. The
transmit frequency must be within the range of TX Frequency Range and the transmit
frequency at the local end must be equal to the receive frequency at the remote end.
3. When ODU Type is SRU, select the duplex spacing of the master/slave ODU from the
T/R Spacing drop-down list.
When ODU Type is Others, configure RX Frequency Configuration. The value must
be within the TX Frequency Range.
4. In the TX Power Configuration text box, enter the transmit power of the master ODU
and the slave ODU. The configured transmit power must be within the range which
is set by TX Power Range. If the configured transmit power is out of the range, the
RMUC/RMUD will be disconnected from the remote end.
5. (Optional) Select Synchronize TX frequency configuration to remote NE..
l If you modify the transmit frequency or receive frequency for the local end and
clear Synchronize TX frequency configuration to remote NE., the link in use
will be disconnected after you click Apply.
l If you modify the transmit frequency or receive frequency for the local end and
select Synchronize TX frequency configuration to remote NE., both the
transmit frequency and receive frequency for the remote end are modified after
you click Apply and the link in use will not be disconnected.
6. Click Apply.
– End of Steps –
8-14
Context
l During the process of exchanging microwave link's antennas, ATPC Switch should be
set to OFF, and the transmission power of ODU should be set to an appropriate value.
l The ATPC function can be accomplished only when it is enabled on both ends.
l After the ATPC function is disabled, the transmission power of ODU return to the value
before ATPC is enabled. That may lead to instantaneous link disconnection.
Steps
1. In the left pane, select Radio Link > Radio Link Configuration. The radio link
configuration page displayed, see Figure 8-16.
2. Configure the ATPC Parameters. For a description of the parameters, refer to Table
8-4.
ATPC Enable l OFF OFF Enables or disables the ATPC function. With
l ON this function, the system transmission power
can be adjusted within a certain range according
to the remote end receiving level.
8-15
High -70 to -30 -40 The ATPC function automatically adjusts the
Threshold transmission power at the local end according
(dBm) to the receive level at the remote end.
If the receive level at the remote end is not within
the ATPC adjustment range, it is necessary
to adjust the transmission power to make the
receive level at the remote end be within the
adjustment range.
If the ODU transmission power is adjusted
to the power threshold but the receive level
at the remote end is not within the ATPC
adjustment range, there is no need to adjust the
transmission power.
Low -70 to -30 -65 Sets the lowest ATPC transmission power. This
Threshold parameter is the minimum receive level of the
(dBm) remote end.
Min Tx Power –20 to 40 -4 Sets the lowest transmission power at the local
(dBm) end. It ensures that the receiving condition
at the remote end is not affected by signal
degradation due to low transmission power at
the local end during ATPC adjustment.
The priority of this parameter is higher than
ATPC low threshold.
3. Click Apply.
– End of Steps –
8-16
Context
l During the process of exchanging microwave link's antennas, ACM Switch should be
set to OFF.
l The ACM function can be implemented only after it is enabled at both ends of the link.
l The change of ACM Switch status results in instantaneous link disconnection.
Steps
1. In the left pane, select Radio Link > Basic Configuration. The radio link configuration
page is displayed, see Figure 8-17.
2. Configure the ACM Parameters. For a description of the parameters, refer to Table
8-5.
8-17
3. Click Apply.
– End of Steps –
Prerequisite
l Before configuring the PLA function, you need to configure aggregation direction to
two through four.
8-18
l To configure the PLA type to PLA2, you need to disable the GbE port of the RCU
board first.
Steps
1. In the left pane, select Radio Link > PLA. The PLA configuration page is displayed.
2. Click Add. The PLA Configuration dialog box is displayed, see Figure 8-18.
3. From the PLA Type drop-down list, select the PLA type to be configured, see Figure
8-19.
6. Click Apply .
– End of Steps –
8-19
Context
Before configuring the XPIC function, ensure that the RMUC/RMUH boards are inserted
in the same XPIC group. The XPIC groups are as follows:
l XPIC group 1: RMUC/RMUH boards in slot 3 and slot 4
l XPIC group 2: RMUC/RMUH boards in slot 5 and slot 6
l XPIC group 3: RMUC/RMUH boards in slot 7 and slot 8
When configuring the XPIC function, ensure that the following requirements are met during
initial configuration:
l Board configuration
à 2+0 configuration: Two RMUC boards are required. They must be inserted into
the same XPIC group. The RMUC boards in the same XPIC group must be
configured as different transmit units.
à 2+2 configuration: Four RMUC boards are required. They are inserted in slots 5
to 8. The RMUC boards in the same XPIC group must be configured as the same
transmit unit. The two RMUC boards in the same XPIC group are configured as
the master slot and slave slot respectively.
l Configuration of wireless link work bandwidth:
à 2+0 configuration: For the RMUC/RMUH boards in the same XPIC group, the
bandwidth selected in the work mode configuration must be the same. For RMUC
boards, the value can be 28 M, 40 M, 50 M, or 56 M. For RMUH boards, the value
can be 7 M, 14 M, 28 M, 40 M, or 56 M.
à 2+2 configuration: For the four RMUC/RMUH boards in the same XPIC group,
the bandwidth selected in the work mode configuration must be the same. For
RMUC boards, the value can be 28 M, 40 M, 50 M, or 56 M. For RMUH boards,
the value can be 7 M, 14 M, 28 M, 40 M, or 56 M.
l Protection mode configuration:
Protection mode needs to be configured for 2+2 configuration. Three protection
modes are available: HSB, SD, and FD. When faults occur, the transmit unit performs
protection by using the 1+1 protection mode.
8-20
For either 2+0 or 2+2 configuration, all XPIC transmit units need to be configured with
the same aggregation group.
Prerequisite
The LACP or PLA function has been configured.
Steps
1. 2+0 configuration steps (slots 5 and 6 for example):
a. Select Setup > Shelf. In the board configuration pane, configure slot 5 and 6 with
RMUC/RMUH boards, and set 1+1 Protection Mode to Disable, see Figure 8-20
and Figure 8-21.
b. Select Radio Link > Basic Configuration. In the right pane, configure the
work mode for transmit units 5 and 6 in the radio link configuration page. The
Bandwidth in work mode must be the same.
l For RMUC, the bandwidth can be 28 M, 40 M, or 56 M, see Figure 8-22.
8-21
c. Configure the RF parameters for transmit units 5 and 6, see Figure 8-24.
Ensure that the Current Tx frequency and Set Tx Frequency are the same, and
Current TX Power and Set Tx Power are the same.
d. Select ETH > LACP > LAG Configuration. Configure aggregation group for the
transmit units. Ensure that the ports of the transmit units are configured in the
same aggregation group, see Figure 8-25.
8-22
e. Select Radio Link > XPIC. In the right pane, click Add. The XPIC Configuration
dialog box is displayed, see Figure 8-26.
f. Set XPIC Status to Enable or Disable. Set the polarization direction of the
RMUC/RMUH transmit unit. For the RMUC/RMUH transmit units in the same
XPIC group, the polarization directions should be H and V respectively. Select
the XPIC Mode, and click Apply.
2. 2+2 configuration steps:
a. Select Setup > Shelf. In the board configuration pane, configure the
RMUC/RMUH boards in slots 5 and 6 to 1+1 protection mode, and the
RMUC/RMUH boards in slots 7 and 8 to 1+1 protection mode, see Figure 8-27.
b. Select Radio Link > Basic Configuration. In the right pane, configure the work
mode for transmit units 5 and 7 (the slot numbers are the transmit unit numbers by
8-23
default) in the radio link configuration page. The Bandwidth in work mode must
be the same.
l For RMUC, the bandwidth can be 28 M , 40 M, or 56 M, see Figure 8-28.
c. Set the protection type to HSB or SD, and set the protection mode based on the
actual requirement, see Figure 8-30.
d. Set the RF parameters of active and standby ODUs for transmit units 5 and 7.
Ensure that the TX powers and TX frequencies for the four ODUs are the same,
see Figure 8-31.
8-24
e. Select ETH > LACP > LAG Configuration. Configure aggregation group. Ensure
that the ports of the transmit units are configured in the same aggregation group,
see Figure 8-32.
f. Select Radio Link > XPIC. In the right pane, click Add. The XPIC Configuration
dialog box is displayed, see Figure 8-33
8-25
g. Set XPIC Status to Enable or Disable. Set the polarization direction of the
RMUC/RMUH transmit unit. For the RMUC/RMUH transmit units in the same
XPIC group, the polarization directions should be H and V respectively. Select
the XPIC Mode, and click Apply.
– End of Steps –
Prerequisite
l You have already added the MU board.
l This function does not support the PLA interface.
Steps
Configuring the PIS Parameters
1. In the left pane, select Radio Link > PIS. The PIS configuration page is displayed.
2. Select the port to be configured, and click Modify. The PIS dialog box is displayed,
see Figure 8-34.
8-26
4. Click Apply.
Configuring Frame Header Compress
5. In the left pane, select Radio Link > Frame Header Compress Configuration. The
Frame Header Compress Configuration page is displayed.
6. Select the port to be configured, and click Modify. The Frame Header Compress
Configuration dialog box is displayed, see Figure 8-35.
8-27
Steps
1. In the left pane, select Radio Link > RadioEncript. The Radio Link Encrypt page is
displayed, see Figure 8-36.
3. Click Apply.
– End of Steps –
8-28
Steps
1. In the left pane, select TDM > P2P. The TDM P2P route configuration page is
displayed. Figure 8-37 shows the SDH VC4 cross connection configuration page.
2. Click Add. The P2P Route Configuration dialog box is displayed, see Figure 8-38.
8-29
Note:
The channel NO. can be configured only on the SDH VC4 page.
7. In the Timeslot drop-down list corresponding to the source end, enter the timeslot
number in accordance with the service board and the function ID.
l If the service board is RTUA, RTUC, RTUHO, or RTUHE, Timeslot is 0 and
disabled, indicating that the timeslot is not involved.
l Timeslot can be configured only the SDH VC12 and ADM pages.
Configuring Destination End Parameters
8. Select the Shelf No., TN, and Port No. of the Destination. For the port number, refer
to that of Port NO. corresponding to the source end.
9. Normally, Channel NO. corresponding to the destination end is disabled and the value
is 0, indicating that the current board is not involved.
10. In the Timeslot drop-down list corresponding to the destination end, enter the timeslot
number. For value information, refer to that of Timeslot corresponding to the source
end.
8-30
Steps
1. In the left pane, select TDM > SNCP, The SNCP Route Configuration page is
displayed, see Figure 8-39.
2. Click Add. The SNCP Route Configuration dialog box is displayed, see Figure 8-40.
8-31
6. In the Route Type drop-down list, select the route type, which can be SDH VC4, SDH
VC12, or PDH.
7. In the Destination Port Type drop-down list, select the destination port type, which
can be E1 or STM-1 Timeslot.
8. In the Priority drop-down list, select an appropriate priority level.
Configuring Source End Parameters
9. Select the Shelf No., TN, and Port Number of the Working Source and Protection
Source.
TN is the transmit unit number, which is normally the slot number where the service
board is located. In special cases, for example, the two RMU boards have protection
configuration, they belong to the same transmit unit. For STM-1/VC12 and STM-1/VC4
SNCP, the current system supports the following board types: RTUB, RMUC, and
RMUD, RMUE, and RMUH. For E1 SNCP, the current system supports RMCU, RMUD,
RMUE, and RMUH.
10. Normally, Channel NO. corresponding to the source end is disabled and the value is
0, indicating that the current board is not involved.
The channel No. can be configured only when the route type is SDH VC4.
11. In the Timeslot drop-down list corresponding to the source end, select the timeslot
number in accordance with the service board and the function ID.
l If the service board is RTUA, RTUC, RTUHO, or RTUHE, the timeslot is 0 and
disabled, indicating that the timeslot is not involved.
l VC4 level services do not support time slot configuration.
Configuring Destination End Parameters
8-32
12. Select the Shelf No., TN, and Port Number of the Destination.
l For STM-1/VC12 and STM-1/VC4 SNCP, the current system supports the follow-
ing board types: RTUB, RMUC, RMUD, RMUE, and RMUH.
l For E1 SNCP, the current system supports RTUA, RTUB, RTUC, RTUHO,
RTUHE, RMUC, RMUD, RMUE, and RMUH.
For the setting of the port No., refer to that of the source end.
13. Normally, Channel NO. corresponding to the destination end is disabled and the value
is 0, indicating that the current board is not involved.
14. In the Timeslot drop-down list corresponding to the destination end, select the timeslot
number. For value information, refer to that of Timeslot corresponding to the source
end.
Adding and Activating SNCP Configuration
15. Click Apply, and the SNCP configuration is added to the SNCP route table.
16. Select the SNCP route and click Activate.
Configuring SNCP Switchover
17. In the SNCP route list, select an SNCP record and click Switch. The SNCP Switch
dialog box is displayed, see Figure 8-41.
18. Select the SNCP switchover mode from the Switch Command drop-down list:
l Auto: The service is automatically switched to the available channel according to
the protection mode and the channel condition.
l Protection Lockout: The protection channel is closed and no protection is
provided.
l Force to Slave: The system forcibly switches the service to the protection channel
irrespective of whether the channel is normal or not.
l Force to Master: The system forcibly switches the service to the working channel
irrespective of whether the channel is normal or not.
l Manual to Slave: Users need to manually switch the service to the protection
channel when the protection channel is normal. If the protection channel is
improper, the system automatically switches the service back to the working
channel.
8-33
l Manual to Master: Users need to manually switch the service to the working
channel when the working channel is normal. If the protection channel is improper,
the system automatically switches the service back to the protection channel.
l SNCP Clear Command: The system clears the previous switchover operations,
that is, clear the Hold On timer. After that, the SNCP clear command becomes
an automatic command.
19. Click Apply.
– End of Steps –
Steps
Configuring P2P Routes
1. In the left pane, select TDM > SNCP+ > P2P. The P2P Route Configuration page is
displayed, see Figure 8-42.
2. Click Add. The P2P Route Configuration dialog box is displayed, see Figure 8-43.
8-34
Note:
The channel No. can be configured only when the route type is SDH VC4.
5. In the Destination area, select the shelf number from the Shelf No. drop-down
list, select the transmit unit number from the TN drop-down list, and enter the port
number in the Port No. text box. For the destination port number value, refer to the
corresponding source port number.
6. Add a cross connection and activate the configuration by performing the following
steps:
a. Click Apply to add a TDM route. In the P2P route list, the configured cross
connections are displayed in the inactive status.
b. Select the cross connection to be activated, and click Activate.
8-35
8. Click Add. The SNCP Route Configuration dialog box is displayed, see Figure 8-45.
The hold-off time refers to a time interval that waits for the faulty channel to be
restored. At its expiry, the faulty channel is switched to the other channel. The
hold-off time helps to avoid frequent switchover.
8-36
e. From the Route Type drop-down list, select a route type (SDH VC4, PDH).
10. In the Source area (including work and protection), select the shelf number from the
Shelf No. drop-down list, select the transmit unit number from the TN drop-down list,
and enter the port number in the Port No. text box.
TN refers to the configured transmit unit number on the rack (Generally, TN is the slot
number where the board is located. If two RMU boards are configured in protection
mode, they belong to a same transmit unit). When the SNCP is configured for
STM-1/VC4, the working board supports RTUB, RMUC and RMUD. When the SNCP
is configured for E1, the working board supports RMCU and RMUD.
11. In the Destination area, select the shelf number from the Shelf No. drop-down list,
select the transmit unit number from the TN drop-down list, and enter the port number
in the Port No. text box.
l When the SNCP is configured for STM-1/VC4, the working board supports RTUB,
RMUC and RMUD.
l When the SNCP is configured for E1, the working board supports RTUA, RTUB,
RTUC, RTUHO, and RTUHE.
For the destination port number value, refer to the corresponding source port number.
12. Add a cross connection and activate the configuration by performing the following
steps:
a. Click Apply to add an SNCP protection in the SNCP route list.
b. Select the SNCP to be activated, and click the Activate .
13. Configuring SNCP Switchover
a. In the SNCP route list, select the SNCP route to be switched over. Click Switch.
The SNCP Switch dialog box is displayed, see Figure 8-46.
b. Select the SNCP switchover mode from the Switch Command drop-down list:
l Auto: The service is automatically switched to the available channel
according to the protection mode (revertive and non-revertive) and the
channel condition.
l Protection Lockout: The protection channel is closed and no protection is
provided.
l Force to Slave: The system forcibly switches the service to the protection
channel irrespective of whether the channel is normal or not.
8-37
l Force to Master: The system forcibly switches the service to the working
channel irrespective of whether the channel is normal or not.
l Manual to Slave: Users need to manually switch the service to the protection
channel when the protection channel is normal. If the protection channel is
abnormal, the system automatically switches the service back to the working
channel.
l Manual to Master: Users need to manually switch the service to the working
channel when the working channel is normal. If the protection channel is
improper, the system automatically switches the service back to the protection
channel.
l NCP Clear Command: The system clears the previous switchover operations,
that is, clear the Hold On timer. After that, the SNCP clear command becomes
an automatic command.
c. Click Apply .
– End of Steps –
Steps
1. Configure an LMSP protection group.
a. In the left pane, select TDM > LMSP. The LMSP protection group configuration
page is displayed.
b. Click Add. The LMSP Protection Group Configuration dialog box is displayed,
see Figure 8-47.
8-38
Working Port No. 1–2 - Optical port number of the working source
of the protection group
8-39
d. Click Apply.
2. Configuring the LMSP Route
a. In the left pane, select TDM > P2P. The P2P Route Configuration page is
displayed.
b. Click Add. The P2P Route Configuration dialog box is displayed.
c. From the Route Type drop-down list, select SDH VC4. For a description of other
parameters, refer to Table 8-8.
8-40
d. Click Apply.
e. Select the routing and click Activate.
3. Configure LMSP external switchover.
a. In the left pane, select TDM > LMSP. The LMSP Protection Group Switch page
is displayed.
b. Select the configured LMSP group, and click Swtich. The LMSP Switch dialog
box is displayed, see Figure 8-48.
c. Select a switch command. For a description of the parameters, refer to Table 8-9.
Table 8-9 LMSP Protection Group Switch Parameters
8-41
d. Click Apply.
– End of Steps –
Steps
1. Configure the virtual shelf.
a. In the left pane, select Setup > Virtual Shelf. The Virtual Shelf configuration
page is displayed, see Figure 8-49.
8-42
c. Configure the parameters. For a description of the parameters, refer to Table 8-10.
d. Click Apply.
2. Configure the cascading route.
Note:
TDM cascading supports the cascading of P2P and SNCP routes. The following takes
P2P cascading route as an example.
a. In the left pane, select TDM > P2P. The P2P Route Configuration page is
displayed.
8-43
c. Set Route Type to SDH VC4. For a description of other parameters, refer to Table
8-11.
d. Click Apply.
3. Enable the cascading port.
a. In the left pane, select Setup > Shelf. The shelf page is displayed.
b. Double-click the cascade port to enable it.
l : indicates that a port is disabled.
l : indicates that a port is enabled.
8-44
Note:
l The configuration of the virtual shelf must be consistent with that of the
physical shelf at the remote end.
l The TDM cascade route needs to be validated respectively at both ends.
l TDM cascade supports only two shelves. The reference shelf numbers must
be different at the local and remote ends.
l On the TDM cascade route configuration page, the shelf number of the local
end is 1 and that of the remote end is 2. The configuration is irrelative to the
reference shelf numbers.
l The system supports only one TDM cascade port. The maximum service
capacity is five channels of STM-1 or 200 channels of E1.
l Before activating the TDM cascade route, ensure that the TDM cascade
interface is configured.
– End of Steps –
8-45
Steps
1. Configure a N+1 protection group.
a. In the left pane, select TDM > N+1. The N+1 Protection Group Configuration
page is displayed.
b. Click Add. The N+1 Protection Group Configuration dialog box is displayed,
see Figure 8-51.
c. Configure the protection group. For a description of the parameters, refer to Table
8-12.
8-46
Note:
l To avoid Ethernet service loops at the air interface, the N+1 MUs in the
protection group should be contained in the same PLA or LACP protection
group.
l The N+1 protection group is exclusive with the MU 1+1 protection. The MUs
configured with 1+1 protection cannot be added to the N+1 protection group.
l The N+1 protection is exclusive with the SNCP protection:
à The MUs in the N+1 protection group do not support SNCP route
configuration.
à The MUs that have been configured as the working source or protection
source of the SNCP route cannot be added to the N+1 protection group.
l The channel numbers of the same air interface link must be the same in the
N+1 protection groups at the two ends of the air interface. For example, if
the MU with transmit unit 5 at the local end is connected with the MU with
transmit unit 6 at the remote end, the two MUs must be configured with the
same channel number in the two protection groups.
8-47
The CES function enables the microwave Native TDM service to transverse a wired packet
network. The NR8250 devices that enter and exit the wired packet network are configured
with emulation boards. The TDM service transverses the wired network after CES over
ETH processing. The NR8250 in the downstream restores the CES service to a Native
TDM service.
Steps
1. In the left pane, select TDM > CES > Configuration. The CESoETH Configuration
page is displayed, see Figure 8-53.
8-48
2. Click Add. The CESoETH Configuration dialog box is displayed, see Figure 8-54.
3. Configure the required parameters and click Apply. For a description of the
parameters, refer to Table 8-13.
8-49
VLAN ID 1–2047 - Sets the ID of the inner VLAN tag of the CES
packet when double tags are used. The outer
VLAN tag is configured on the Ethernet VLAN
configuration page.
8-50
a. In the left pane, select TDM > CES > Alarm Threshold. The CESoETH Alarm
Threshold Configuration page is displayed, see Figure 8-55.
8-51
b. Select the Slot No., Port No., Time Slot, and Date. Then, click Query. The
15–minute or 24–hour performance data of each CES service is displayed.
The query result includes the information of CESoETH Frames Transmitted,
Payload Octets Transmitted, CESoETH Frames Received, Paylod Octets
Received, Lost Frames, Re-Ordered Frames, Malformed Frames, and Jitter
Buffer Overruns.
– End of Steps –
Steps
Configuring Physical Ethernet Interfaces
1. In the left pane, select Setup > Shelf. Configure the required boards.
2. In the left pane, select Setup > Shelf. Double-click an Ethernet port to enable it.
3. Click Apply.
Configuring Logical Ethernet Ports
4. Perform basic configurations of the Ethernet ports.
a. In the left pane, select ETH > Port Related > Port Configuration. The basic port
configuration page is displayed.
b. Select the port to be configured and click Modify. The Ethernet Port
Configuration dialog box is displayed, see Figure 8-57.
8-52
Note:
Only the enabled Ethernet ports are displayed.
The GBE port on the RCUB board supports only the auto-negotiation, full-duplex,
and 1000 Mbps mode.
a. In the left pane, select ETH > Port Related > Port Mirror. The port mirroring
configuration page is displayed. Click Add. The port mirroring dialog box is
displayed, see Figure 8-58.
8-53
c. Click Apply.
d. Use the same method to configure other required mirrored ports.
6. L2 packet control strategy:
a. In the left pane, select ETH > Port Related > L2 Packet Control Strategy. The
L2 packet control strategy configuration page is displayed, see Figure 8-59.
b. From the Port drop-down list, select the port to be configured. Select the MAC
address. When a record is selected, the specified MAC address frame uses L2
packet control policy (that is, transparent transmission) when passing through the
port if the corresponding protocol is disabled.
c. Click Apply.
7. BPDU Configuration
BPDU tunneling is a Layer 2 tunneling technology. It enables layer 2 protocol packets
from geographically dispersed customer networks to be transparently transmitted over
specific QinQ channel across a service provider network. Currently, the following L2
protocols support tunnel transparent transmission: STP, GVRP, GMRP, E_LMI, Port
Authentication, LLDP, PTP Peer Delay, EFM ,LACP, SSM, MMRP, and MVRP
The principle is as follows:
l After receiving a L2 protocol packet from the customer network, PE A at one end
of the service provider network encapsulates the packet, replaces the destination
MAC address with a specific multicast MAC address, and forwards the packets to
the service provider network.
8-54
b. Select the MAC addresses to be replaced for each L2 protocol, and click Apply.
Only STP, GVRP, and GMRP supports destination address selection. Other
protocols use a remaining MAC address.
c. In the left pane, select ETH > Port Related > BPDU Port Configuration. The
BPDU port configuration page is displayed, see Figure 8-61.
8-55
b. For each port, the frame length can be limited through the configuration of the
Jumbo frame value. The value range is 1522 to 9600. The default value is 9600.
After the configuration, click Apply.
9. Configure the isolated ports group:
8-56
a. In the left pane, select ETH > Port Related > Isolated Ports Group. The ETH
isolated ports group configuration page is displayed, see Figure 8-63.
a. In the left pane, select ETH > Port Related > POE Configuration. The POE
Configuration page is displayed, see Figure 8-64.
b. Select the port to be modified. Click Modify. The POE Configuration dialog box
is displayed, see Figure 8-65.
8-57
Steps
Configuring a Dynamic Ethernet MAC Address
1. In the left pane, select ETH > MAC > Dynamic. The dynamic MAC management
configuration page is displayed, see Figure 8-66.
8-58
MAC Address 0~1048575 300 Defines the aging time for the MAC
Aging Time (s) address. An MAC address will be
learned again after the aging time.
0 means no aging.
MAC Address l IVL IVL Defines the learning style of the MAC
Learn Style l SVL address.
IVL indicates that each VLAN has a
table of mapping relations between
MAC addresses and ports. The same
MAC address can be present in multiple
tables.
SVL indicates that a switch has a table
which records the mapping relations
between MAC addresses, VLANs, and
ports. In the table, an MAC address can
be present only once and belong to only
one VLAN.
3. Click Apply.
4. Click Dynamic MAC Port Manage. The port configuration parameters are displayed.
5. Select the resource port to be modified and click Modify. The Dynamic MAC Port
Manage dialog box is displayed, see Figure 8-67.
6. Enter the Learn Upper Limit and select MAC Self-Learning Enable. Then, click
Apply.
Configuring a Static Ethernet MAC Address
8-59
7. In the left pane, select ETH > MAC > Static. The Static MAC Manage configuration
page is displayed, see Figure 8-68.
8. Click Add. The Static MAC Configuration dialog box is displayed, see Figure 8-69.
9. Select the Port. Enter the Static MAC Address and VLAN ID.
Access An Access port is used to connect the VLAN switch with a device that cannot
identify VLAN tags. This port type transmits only frames without VLAN tags
and can be associated with only one VLAN.
Trunk A Trunk port is used to connect two devices that can identify VLAN tags and
transmit services of multiple VLANs. This port type transmits only frames with
VLAN tags and can bear multiple VLANs.
Hybrid A Hybrid port can transmit frames with or without tags. However, for a specific
VLAN, the frames transmitted by this port type must be all with tags or all
without tags.
8-60
Customer A Customer port is used to identify an inner VLAN tag or untagged packet, and
add a specified outer VLAN tag. The frames whose TPID of the inner VLAN
tag is consistent with the setting will be discarded.
Provider A Provided port is used to identify the outer VLAN tags that are consistent with
the configured TPID and transmit them. At the same time, the inconsistent
frames are discarded.
UserDefine A UserDefine port is used for VLAN Tag in VLAN Tag (QinQ). It can be
configured flexibly based on the actual requirement.
QinQ allows adding a VLAN tag to the original 802.1Q tag packet. The original
tag becomes the inner tag and the VLAN is marked as CVLAN. The added tag
becomes the outer tag and the VLAN is marked as SVLAN.
Steps
1. In the left pane, select ETH > VLAN > Port Info Configuration. The port information
configuration page is displayed. See Figure 8-70.
2. Select the port to be configured and click Modify. The Port Type Configuration dialog
box is displayed, see Figure 8-71.
8-61
3. In the Port Configuration dialog box, configure Port Type, Port Default Priority,
PVID, and VLAN ID.
The VLAN IDs to be added or deleted can be continuous or discrete. To add continuous
VLAN IDs, use the symbol -, for example, 1-10.
4. Click Apply.
– End of Steps –
Steps
1. In the left pane, select ETH > VLAN > Protocol Based Configuration. The
protocol-based VLAN configuration page is displayed.
2. Click Add. The VLAN Configuration Based on Protocol dialog box is displayed,
see Figure 8-72.
3. Configure the protocol VLAN parameters. For a description of the parameters, refer
to Table 8-16.
Caution!
l Protocol Type + Encapsulation Type is the unique index for protocol mapping.
l Before deleting the protocol-VLAN mapping, delete the protocol-VLAN mapping
of the associated ports first.
8-62
4. Click Apply.
– End of Steps –
Steps
1. In the left pane, select ETH > VLAN > MAC Based Configuration.
2. Click Add. The VLAN Configuration Based on MAC dialog box is displayed, see
Figure 8-73.
3. Configure the VLAN parameters based on MAC address. For a description of the
parameters, refer to Table 8-17.
8-63
Caution!
For the MAC-based VLAN configuration, MAC address is the unique index.
4. Click Add.
– End of Steps –
Steps
1. In the left pane, select ETH > VLAN > Translation Rule Configuration. The
Translation Rule Configuration page is displayed.
2. Click Add. The Translation Rule Configuration dialog box is displayed, see Figure
8-74.
8-64
Type l Ingress Ingress Inner Specifies the matching method of the inner and
Outer outer actions of the translation rule.
l Ingress
Inner
l Egress
Outer
l Egress
Inner
Double Tags l Unmodi- Unmodified Describes the outer action of double tags.
Outer Action fied
l Add
l Replace
8-65
Double Tags l Unmodi- Unmodified Describes the inner action of double tags.
Inner Action fied
l Delete
l Replace
Single Outer l Unmodi- Unmodified Describes the outer action of the single outer tag.
Tag Outer fied
Action l Add
l Delete
Single Outer l Unmodi- Unmodified Describes the inner action of the single outer tag.
Tag Inner fied
Action l Add
Single Inner Add Add Describes the outer action of the single inner tag.
Tag Outer
Action
Single Inner l Unmodi- Unmodified Describes the inner action of the single inner tag.
Tag Inner fied
Action l Delete
l Replace
– End of Steps –
Ingress Traffic classification Traffic classification is to classify packets into different priorities
or services.
For the configuration procedures, refer to 8.24.1 Configuring
Queue Priority and 8.24.3 Configuring the Access Control Policy
(ACL).
Traffic policing Traffic policing is to limit the traffic entering a network to the
allowed range. If the packet traffic of some connection is too
large, traffic policing will discard the packet or reset its priority to
protect network resources and the operator’s investment.
For the configuration procedure, refer to 8.24.2 Configuring
Access Rate Control (CAR).
8-66
Traffic shaping Traffic shaping is to limit the traffic of a packet type from a port so
that packets can be sent at an even speed;
Buffer and token bucket are normally used to implement traffic
shaping. The token bucket controls the rate for sending packets.
The packets exceeding the rate limit are cached in the buffer and
waits to be sent as scheduled.
For the configuration procedure, refer to 8.24.5 Configuring the
Flow Rate Limit Policy.
Steps
1. In the left panel, select ETH > QoS > Priority Mapping. The Priority Mapping page
is displayed, see Figure 8-75.
2. Select the port to be configured, and click Modify. The Priority Mapping dialog box
is displayed, see Figure 8-76.
8-67
Figure 8-76 Port Queue Priority Configuration Dialog Box (802.1p Page)
Steps
1. In the left pane, select ETH > QoS > CAR. The CAR configuration page is displayed,
see Figure 8-77.
2. Click Add. The CAR dialog box is displayed, see Figure 8-78.
8-68
3. Configure the access rate control parameters. For a description of the parameters,
refer to Table 8-19.
Color Mode l Color- Color-Blind Sets the mode of coloring the access rate
Blind control.
l Color- l Color-Blind: The system ignores the
Aware previous color modes but re-colors the
messages according to the CIR and
PIR configuration on the current CAR
configuration window. The messages
lower than CIR are colored green. The
messages lower than PIR and higher than
CIR are colored yellow. The messages
higher than PIR are colored red.
l Color-Aware: The system colors the
messages by following the color mode of
previous messages.
8-69
Packet Process l For- Forward Sets the methods for processing frames in the
Method ward CAR policy. Messages with different colors
l Remark use the same method. The following takes red
l Discard frames as an example:
l Forward: The system directly forwards red
frames.
l Remark: The system re-colors the red
frames according to the re-marked COS
queue and re-marked color and map them
to the new CoS queue.
l Discard: The system directly discards red
messages without any processing.
Remark CoS l Green Green Defines the COS color for a remarked frame.
Color l Yellow
l Red
4. Click Apply.
– End of Steps –
Prerequisite
The CAR policy is configured.
8-70
Steps
1. In the left pane, select ETH > QoS > ACL. The ACL configuration page is displayed,
see Figure 8-79.
2. Click Add. The ACL dialog box is displayed, see Figure 8-80.
3. Configure the ACL policy parameters. For a description of the parameters, refer to
Table 8-20.
8-71
Map Queue BE, AF1, BE Specifies the mapping queue when the ACL
AF2, AF3, rule is used. The queues using the ACL rule
AF4, EF, will be mapped to the selected Cos queue.
CS6, CS7
CAR Policy ID - - Specifies the CAR rule that is used by the ACL
policy.
Time Mode l Unlim- Unlimited Describes the scenarios for using the ACL rule:
ited l Unlimited: all scenarios are allowed.
l Relative l Absolute Time: GPS time, for example,
time 09:20 January 30, 2012. The ACL rule is
l Abso- used during the period between the end
lute time time and the start time.
l Relative Time: the time relative to the
current time, for example, 30 minutes later.
The ACL rule is used during the period
between the end time and the start time.
Start Time l Abso- l Abso- Indicates the time from when the ACL rule takes
lute lute effect if the time mode is set to Relative Time or
Time: Time: Absolute Time. The format is year-month-day
2011- 2011- HH:MM week.
01-01 01-01
00:00– 00:00
2099- Monday
12-31 l Relative
23:59 Time:
Monda- 00:00
y–Sun- Monday
day
l Relative
Time:
00:00
–23:59
Monda-
y–Sun-
day
8-72
End Time l Abso- l Abso- Indicates the time after when the ACL rule is
lute lute invalid if the time mode is set to Relative Time or
time: time: Absolute Time. The format is year-month-day
2011- 2011- HH:MM week.
01-01 01-30
00:00– 23:59
2099- Monday
12-31 l Relative
23:59 time:
Monda- 23:59
y–Sun- Monday
day
l Relative
time:
00:00
–23:59
Monda-
y–Sun-
day
Rule area
DSCP Match Value: Match Value: Specifies the DSCP rule in the ACL policy. It is
0–63 0 used to set the DSCP priority for IP packets. If
Wildcards: Wildcards: 0 the actual value in the packet is different from
0–63 Enable: No the configured value, the packet cannot use
Enable: Yes, the rule.
No Match Value: DSCP priority of the IP packet,
used to identify the data level.
Wildcards: mask
Enable: determines whether to enable the rule.
Outer VLAN Match Value: Match Value: Specifies the priority of the outer VLAN when
Priority 0–7 0 the ACL rule is used. If the actual value in the
Wildcards: Wildcards: 0 packet is different from the configured value,
0–7 Enable: No the packet cannot use the rule.
Enable: Yes, Match Value: priority of the outer VLAN
No Wildcards: mask
Enable: determines whether to enable the rule.
8-73
Inner VLAN Match Value: Match Value: Specifies the priority of the inner VLAN when
Priority 0–7 0 the ACL rule is used. If the actual value in the
Wildcards: Wildcards: 0 packet is different from the configured value,
0–7 Enable: No the packet cannot use the rule.
Enable: Yes, Match Value: priority of the inner VLAN
No Wildcards: mask
Enable: determines whether to enable the rule.
TCP/UDP Match Value: Match Value: Specifies the source port of layer 4 (TCP/UDP)
Source Port 1–65535 1 when the ACL rule is used. If the actual value
Wildcards: Wildcards: 1 in the packet is different from the configured
1–65535 Enable: No value, the packet cannot use the rule.
Enable: Yes, Match Value: layer4 source port
No Wildcards: mask
Enable: determines whether to enable the rule.
TCP/UDP Match Value: Match Value: Specifies the destination port of layer 4
Destination 1–65535 1 (TCP/UDP) when the ACL rule is used. If the
Port Wildcards: Wildcards: 1 actual value in the packet is different from the
1–65535 Enable: No configured value, the packet cannot use the
Enable: Yes, rule.
No Match Value: layer4 destination port
Wildcards: mask
Enable: determines whether to enable the rule.
Source IP Match Value: Match Value: Specifies the source IP address when the ACL
00.00.00.00 10.10.10.10 rule is used. If the actual value in the packet is
–255.255.25 Wildcards: different from the configured value, the packet
5.255 255.0.0.0 cannot use the rule.
Wildcards: Enable: No Match Value: source IP address
00.00.00.00 Wildcards: mask
–255.255.25 Enable: determines whether to enable the rule.
5.255
Enable: Yes,
No
Destination IP Match Value: Match Value: Specifies the destination IP address when the
00.00.00.00 10.10.10.10 ACL rule is used. If the actual value in the
–255.255.25 Wildcards: packet is different from the configured value,
5.255 255.0.0.0 the packet cannot use the rule.
Wildcards: Enable: No Match Value: destination IP address
00.00.00.00 Wildcards: mask
–255.255.25 Enable: determines whether to enable the rule.
5.255
Enable: Yes,
No
8-74
Source MAC Match Value: Match Value: Specifies the source MAC address/destination
00-00- 22-22-22-22- MAC address when the ACL rule is used. If the
00-00-00- 22-22 actual value in the packet is different from the
00–255-255- Wildcards: configured value, the packet cannot use the
255-255- FF-FF-FF- rule.
255-255 FF-FF-FF Match Value: source MAC address/destination
Wildcards: Enable: No MAC address
00-00- Wildcards: mask
00-00-00- Enable: determines whether to enable the rule.
00–255-255-
255-255-
255-255
Enable: Yes,
No
Destination Match Value: Match Value: Specifies the destination MAC address MAC
MAC 00-00- 22-22-22-22- address when the ACL rule is used. If the
00-00-00- 22-22 actual value in the packet is different from the
00–255-255- Wildcards: configured value, the packet cannot use the
255-255- FF-FF-FF- rule.
255-255 FF-FF-FF Match Value: destination MAC address MAC
Wildcards: Enable: No address
00-00- Wildcards: mask
00-00-00- Enable: determines whether to enable the rule.
00–255-255-
255-255-
255-255
Enable: Yes,
No
IPV6 Traffic Match Value: Match Value: Specifies the Ip6 TrafficClass value when the
Class 0–255 1 ACL rule is used. If the actual value in the
Wildcards: Wildcards: 1 packet is different from the configured value,
0–255 Enable: No the packet cannot use the rule.
Enable: Yes, Match Value: Ip6 TrafficClass value
No Wildcards: mask
Enable: determines whether to enable the rule.
Outer VLAN ID Match Value: Match Value: Specifies the outer VLAN ID when the ACL
1–4094 1 rule is used. If the actual value in the packet is
Wildcards: Wildcards: 1 different from the configured value, the packet
1–4095 Enable: No cannot use the rule.
Enable: Yes, Match Value: outer VLAN ID/outer VLAN ID
No Wildcards: mask
Enable: determines whether to enable the rule.
8-75
Inner VLAN ID Match Value: Match Value: Specifies the inner VLAN ID when the ACL
1–4094 1 rule is used. If the actual value in the packet is
Wildcards: Wildcards: 1 different from the configured value, the packet
1–4095 Enable: No cannot use the rule.
Enable: Yes, Match Value: inner VLAN ID
No Wildcards: mask
Enable: determines whether to enable the rule.
Ethernet Type Match Value: Match Value: Specifies the Ethernet type when the ACL rule
1–65535 1 is used. If the actual value in the packet is
Wildcards: Wildcards: 1 different from the configured value, the packet
1–65535 Enable: No cannot use the rule.
Enable: Yes, Match Value: Ethernet type
No Wildcards: mask
Enable: determines whether to enable the rule.
MPLS EXP Match Value: Match Value: Determines whether to use multi-protocol label
0–7 0 switching.
Wildcards: Wildcards: 0
0–7 Enable: No
Enable: Yes,
No
4. Click Apply.
– End of Steps –
Steps
1. In the left pane, select ETH > QoS > Queue Management. The queue management
policy configuration page is displayed, see Figure 8-81.
8-76
2. Select the port to be configured and click Modify. The Queue Management Policy
dialog box is displayed, see Figure 8-82.
8-77
SP Start Queue BE, AF1, BE Specifies the start queue of the SP. This
AF2, AF3, parameter can be configured when the
AF4, EF, scheduling policy is SP+DRR, SP+WRR, or
CS6, CS7 SP+WFQ..
SP End Queue BE, AF1, BE Specifies the end queue of the SP. This
AF2, AF3, parameter can be configured when the
AF4, EF, scheduling policy is SP+DRR, SP+WRR, or
CS6, CS7 SP+WFQ.
4. Click Apply.
– End of Steps –
Steps
1. In the left pane, select ETH > QoS > Flow Rate Limit. The QoS flow rate limit
configuration page is displayed, see Figure 8-83.
8-78
2. Select a port and click Modify. The Flow Rate Limit dialog box is displayed, see
Figure 8-84.
3. Configure the flow rate limit parameters. For a description of the parameters, refer to
Table 8-22.
8-79
4. Click Apply.
– End of Steps –
8-80
l Random Early Detection: This policy supports flexible configuration. You can set
the threshold and probability of dropping packets for each queue color. Among the
three colors, (yellow, red, and green), yellow queues have the same threshold and
probability as red queues.
l Weighted Random Early Detection: The queue length percentage and packet drop
rate of the packets marked in yellow or green should be configured respectively for a
port.
Steps
1. In the left pane, select ETH > QoS > Congestion Management. The CM policy
configuration page is displayed, see Figure 8-85.
2. Select the Tail Drop, Simple Random Early Detection or Weighted Random Early
Detection policy from the Congestion Management Policy Select drop-down list,
and then click Apply.
3. Select a record and click Modify. The congestion management dialog box is
displayed, see Figure 8-86.
8-81
4. Configure the required parameters. For a description of the parameters, refer to Table
8-23.
CM Policy Select l Tail Drop Tail Drop Specifies the package discarding policy
l Random in congestion mode.
Early
Detection
l Weighted
Random
Early
Detection
8-82
5. Click Apply.
– End of Steps –
Steps
1. In the left pane, select ETH > QoS > Packet Aging. The packet aging configuration
page is displayed, see Figure 8-87.
2. Configure the packet aging parameters. For a description of the parameters, refer to
Table 8-24.
Queue Aging 125~7162 125 Specifies the aging time of BE, AF1, AF2,
Time (ms) AF3, AF4, EF, CS6, and CS7 packets.
8-83
3. Click Apply.
– End of Steps –
Prerequisite
The queue priority is configured. Otherwise, the default priority is mapped and takes effect.
Steps
1. In the left pane, select ETH > QoS > DEI& Priority Egress. The DEI & Priority
Egress Modification page is displayed, see Figure 8-88.
2. Select a port and click Modify. The DEI & Priority Egress Modification dialog box
is displayed, see Figure 8-89.
8-84
Steps
1. LLDP global configurations:
a. In the left pane, select ETH > LLDP > Global Configuration. The LLDP global
configuration page is displayed, see Figure 8-90.
8-85
Hello Time (s) 5–32768 30 Specifies the period for sending the Hello
packet for all ports.
Restart Delay 1–10 2 Specifies the time for waiting for the local
(s) LLDP port to change from being prohibited
to re-initialized. It can avoid frequent port
initialization due to frequent switching of
operating modes.
8-86
c. Click Apply.
2. LLDP port configurations:
a. In the left pane, select ETH > LLDP > Port Configuration. The LLDP port
configuration page is displayed, see Figure 8-91.
b. Click Add. The LLDP Port Configuration dialog box is displayed, see Figure
8-92.
8-87
c. Configure the LLDP port parameters. For a description of the parameters, refer to
Table 8-26.
Port LLDP l Enable Disable Enables or disables LLDP for the port.
Status l Disable When it is set to Disable, the port does
not send or receive LLDP packets.
d. Click Apply.
– End of Steps –
8-88
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
Steps
1. In the left pane, select ETH > Port Related > Port Configuration. The port
configuration page is displayed. Ensure that the ports for configuring aggregation are
all enabled. If not, enable the disabled ports.
2. Configure the LACP port:
a. In the left pane, select ETH > LACP > Port Configuration. The LACP port
configuration page is displayed.
b. Click Add. The Port Configuration dialog box displayed, see Figure 8-93.
c. From the Port drop-down list, select the port to be aggregated. Configure the
LACP port parameters. For a description of the parameters, refer to Table 8-27.
8-89
Port Ports in the - Specifies the port and its slot for
drop-down list configuring the LACP protocol.
Port Work Mode l Active Active Indicates whether the port actively
l Passive sends LACP packets.
l ON l The Active mode indicates
that the port actively sends
packets.
l The Passive mode indicates
that the port does not actively
send packets.
l ON indicates the port does not
send packets.
d. Click Apply.
e. Use the same method to add other ports to be aggregated.
3. Configure the LACP aggregation group:
a. In the left pane, select ETH > LACP > LAG Configuration. The LACP
aggregation group configuration page is displayed. Click Add. The LAG
Configuration dialog box displayed, see Figure 8-94.
8-90
8-91
Load Strategy l Source MAC Source Specifies the load sharing policy
l Destination MAC MAC used by an aggregation group.
l Source and
Destination MAC
l Source IP
l Destination IP
l Source and
Destination IP
c. Click Apply.
4. Log in to the LMT at the opposite end. Perform steps 1 through 4.
5. Connect the interfaces of the two devices for configuring aggregation by network
cables, fibers or radio link. Verify that the status indicators of the interfaces are green.
6. Open the LMT interfaces at both ends. Select ETH > LACP > LAG Info and view the
LAG information, see Figure 8-95.
If the Port Number is equal to the Active Port Number, the LAG is operating normally.
8-92
– End of Steps –
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
Context
EFM detection has the following features:
l Sensitive to link faults.
l Checks only the link status of one hop rather than the point-to-point link connectivity
between devices of multiple hops.
l Ignores VLAN faults of the protocol packets. For example, if a link has faults in a
service VLAN, EFM does not report alarms until the link is totally disconnected.
Steps
1. In the left pane, select ETH > OAM_EFM > Global Configuration. The EFM global
configuration page is displayed, see Figure 8-96.
8-93
2. Configure the EFM global parameter, and click Apply. For a description of the
parameters, refer to Table 8-29.
8-94
3. In the left pane, select ETH > OAM_EFM > Port Configuration. The EFM port
configuration page is displayed, see Figure 8-97.
4. Click Add. The EFM Interface Modification dialog box is displayed, see Figure 8-98.
5. Modify the parameters. For a description of the parameters, refer to Table 8-30.
8-95
Port Port names in the - Specifies the port and its slot for
drop-down list configuring the EFM protocol.
Air interfaces are not supported.
Interface EFM l Active Mode Active Mode Specifies whether the interface uses the
Mode l Passive active or passive EFM mode.
In active mode, the system can initiate
discovering process and loopback tests.
In passive mode, the system cannot
initiate discovering process or loopback
tests.
8-96
Errored Frame 100–60000 1000 Specifies the size of the window for
Period Window determining whether the period of
(ms) errored frame exceeds the threshold.
6. Click Apply
– End of Steps –
Steps
1. In the left pane, select ETH > OAM_CFM > Global&MD Configuration. The CFM
global and MD configuration page is displayed, see Figure 8-99.
8-97
2. Configure CFM global parameters. For a description of the parameters, refer to Table
8-31.
Status l Enable Enable Enables or disables the CFM function for the
l Disable device.
l Enable: The system performs
protocol-related operations and
calculations according to the port
configuration.
l Disable: The CFM protocol function is
disabled.
4. Configure the MD parameters. For a description of the parameters, refer to Table 8-32.
8-98
5. Click Apply
8-99
6. In the left pane, select ETH > OAM_CFM > MA Configuration. The MA configuration
page is displayed, see Figure 8-101.
7. Click Add. The MA Configuration dialog box is displayed, see Figure 8-102.
8. Configure the required parameters. For a description of the parameters, refer to Table
8-33.
8-100
MA Name l Primary VID Primary VID Specifies the format of the MA name,
Format l Character options:
String l Primary VID
l 2–octet l Character String
Inerger l 2–octet Inerger
The Primary VID must be the same as
the MA PVID.
9. Click Apply.
10. In the left pane, select ETH > OAM_CFM > MP Configuration. The MP configuration
page is displayed, see Figure 8-103.
8-101
11. Click Add. The MP Configuration dialog box is displayed, see Figure 8-104.
12. Configure the required parameters. For a description of the parameters, refer to Table
8-34.
8-102
8-103
MP CCM Send l Enable Enable Enables or disables the continuity check (CC)
l Disable function for the MP.
If the CC function is enabled for an LMEP MP,
the MP periodically sends CCM packets.
If the CC function is enabled for an RMEP MP,
the corresponding LEMP checks whether the
RMEP sends CCM packets as requested.
This parameter needs to be configured for
LMEP and RMEP. For MIP, it does not need
configuration.
MP AIS l Enable Disable Enables or disables the AIS function for the
l Disable MP. AIS packets can be sent only after AIS
is enabled.
8-104
8-105
Locate Port Port - This parameter specifies the port and its slot
resource for configuring MP.
IDs in the The ports that allows MP configuration are
drop-down Ethernet physical ports and Ethernet air
list interface.
If the Ethernet physical port or air interface
involves in LACP or PLA aggregation, MP
can be configured only on an aggregated
port. Members of an aggregation cannot be
configured with MP.
On the RCUB board, only the second Ethernet
electrical port, that is, the GbE port, allows
MP configuration.
This parameter needs to be set for LMEP
and MIP configurations rather than RMEP
configuration.
MP ERPS l Enable Disable Enables or disables ERPS for the MP. After
l Disable it is set to Enable, the system can transmit,
receive, and process APS packets.
This parameter is available for LMEP
configuration. For RMEP and MIP, the
parameter does not need to be configured.
Client Level 0–7 7 Specifies the level of the MD at the client layer.
If LMEP detects faults, the system sends an
AIS or LCK packet to the MD at Client Level
for suppressing alarms from upper layers.
This parameter is available for LMEP
configuration. For RMEP and MIP, the
parameter does not need to be configured.
The configuration is allowed only if the Client
Level is larger than the MD level.
8-106
Based on the MEP disable/enable, the CSF function can only supports point-to-point
Ethernet links, such as IEEE 802.1Q, IEEE802.1ad or point-to-point networks strictly
restricted through STP. Besides, only UP MEP can support this function, and the Down
MEP cannot. There are two related messages as follows:
l Client Loss of Signal (C-LOS)
l Client Defect Clear Indication (C-DCI)
When the receiving and sending faults of the physical port are detected, a C-LOS message
is sent to the opposite end. Upon receiving C-LOS, the opposite device generates the
corresponding alarm that is not cleared until the above messages are not received within
3.5 periods, or a C-DCI message is received.
Prerequisite
l The OAM CSF detection for the client is enabled.
l MD and MA are configured.
Steps
1. In the left pane, select ETH > OAM_CFM > MP Configuration. The MP
Configuration page is displayed.
2. Click Add. The MP Configuration dialog box is displayed.
8-107
8-108
– End of Steps –
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
l The XSTP, which conflicts with the ERPS, is disabled.
l The CFM protocol parameters are configured and ERPS is enabled during MP
configuration.
Steps
1. In the left pane, select ETH > ERPS > Global Configuration. The ERPS global
configuration page is displayed, see Figure 8-106.
8-109
2. Configure the ERPS parameters. For a description of the parameters, refer to Table
8-36.
Eastward Ports in the - This parameter specifies the port and its slot for
Port drop-down configuring the eastward port of ERPS protocol.
list
Westward Resource - This parameter specifies the port and its slot for
Port IDs in the configuring the westward port of ERPS protocol.
drop-down Only the port configured with LMEP allows
list the configuration of ERPS westward port. In
addition, the ERPS function must be enabled
for the LMEP.
The westward port and eastward port must be
different.
If an ERPS westward/eastward port is deleted
or added to the aggregation group, the LMEP
8-110
RPL Port l NULL Eastward Determines whether to specify the eastward port
l East- Port or westward port as the RPL port.
ward The RPL port needs to be configured for the
Port NE that is configured as RPL Owner. For other
l West- NEs, this parameter is grayed and is not allowed
ward to be configured.
Port
WTR Timer 5–12, 1 5 Specifies the duration for waiting for restoration.
(min) min/step After a link is interrupted, the duration specified
by the Wait To Restore (WRT) Timer parameter
is required for services to restore from the
standby link to the original link. The link on the
RPL port of the RPL OWNER is blocked.
Hold Off 0–10000 ms, 0 Specifies the time period after which the system
Timer (ms) 100 ms/step reports link interruption and initiates ring network
protection.
The Hold Off timer is designed under the
expectation that the fault link can be restored
in a certain period.
Guard Timer 10–2000, 500 Specifies the time period after which the devices
(ms) 10ms/step at both ends of a link that is restored from faults
start receiving packets. This timer is designed to
prevent packet expiration.
3. Click Apply.
– End of Steps –
8-111
ring. All ERPS Instances are independent of one another. They run the ERPS protocol
separately. By blocking different standby links, the ERPS 2.0 protocol implements load
balancing and link protection for different VLANs on the link.
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
l XSTP, ERPSV1, and ELPS, which conflict with ERPS2.0, are disabled.
l The CFM protocol parameters are configured (Enable ERPS parameters when the
MP is configured).
Steps
1. In the left pane, select ETH > ERPS2.0 > Global Configuration. The ERPS2.0 global
configuration page is displayed, see Figure 8-107.
2. Configure the ERPS2.0 parameters. Click Apply. For a description of the parameters,
refer to Table 8-37.
8-112
3. Click Add. The ERPS2.0 Configuration dialog box is displayed, see Figure 8-108.
4. Configure the VLAN group parameters. Click Apply. For a description of the
parameters, refer to Table 8-38.
5. In the left pane, select ETH > ERPS2.0 > Ring Configuration. The Ring
Configuration page is displayed.
6. Click Add. The RPS2.0 Configuration dialog box is displayed, see Figure 8-109.
7. Configure the ERPS2.0 ring parameters. Click Apply. For a description of the
parameters, refer to Table 8-39.
8-113
Rpl Role l RPL Other One ERPS ring only has one RPL owner and
Owner one RPL neighbor at most.
l RPL
Neigh-
bor
l Other
Revertive l Non-Re- Revertive This parameter is valid only when Rpl Role is
Mode vertive set to RPL Owner.
l Re-
vertive
RPL Port l West - This parameter is valid only when Rpl Role is
Port set to RPL Owner
l East
Port
8-114
RAPS Virtual l Disable Enable Determines whether the virtual channel of the
Channel l Enable minor ring is enabled. The control packets of the
minor ring can be propagated in the major ring
after RAPS Virtual Channel is set to Enable.
This parameter is configured only when Ring
Role is set to Minor Ring.
HoldOff- 0–10000 0 Specifies the time period after which the system
Timer(ms) 100 ms/step reports link interruption and initiates ring network
protection.
The Hold Off timer is designed under the
expectation that the faulty link can be restored
in a certain period.
Guard- 10–2000 500 Specifies the time period after which the devices
Timer(ms) 10 ms/step at both ends of a link that is restored from faults
start receiving packets. This timer is designed to
prevent packet expiration.
8-115
8. In the left pane, select ETH > ERPS2.0 > Management CMD. The Management CMD
page is displayed, see Figure 8-110.
8-116
– End of Steps –
Prerequisite
l The ports where the working channel and protection channel are located are
configured with Ethernet OAM.
l For MA configuration, the CCM interval is set to 3.3 ms or 10 ms. The sending intervals
of the working channel and protection channel are consistent, and the VLAN is a
single-layer VLAN.
l For MP configuration, the MP type is set to Down MP, and ELPS is enabled.
Context
ITU G.8031 is a line protection switching specification defined by ITU-T for VLAN-based
Ethernet. In this protection mechanism, all working resources are assigned with the
corresponding protection resources, such as channels and bandwidth. Compared with
the spanning tree protection defined by IEEE, this protection, defined by ITU G.8031,
supports network resource switching rapidly and easily in a predictable way, and is easier
for the operator to effectively plan the network, query the network state, and achieve
carrier-class operations.
This specification describes 1+1 unidirectional switching, 1+1 bidirectional switching, 1:1
bidirectional switching, and the APS protocol on which bidirectional switching depends.
Currently, only 1:1 bidirectional switching is supported.
Steps
Adding a Protection Group
1. In the left pane, select ETH > ELPS > Protection Group Configuration. The ELPS
Protection Group Configuration page is displayed, see Figure 8-111.
8-117
2. Click Add. The ELPS Protection Group Configuration dialog box is displayed, see
Figure 8-112.
Switching Hold 0–100 0 Specifies the time (100ms) for waiting for the
Off Timer (100ms) ELPS to perform switching upon receiving a
fault report.
8-118
4. In the left pane, select ETH > ELPS > Protection Group Control. The Protection
Group Control page is displayed, see Figure 8-113.
5. From the Group ID drop-down list, select the group ID to be executed the external
switching. And select a switch command from the Switch Command drop-down list.
Click Apply. For a description of the switch parameters, refer to Table 8-42.
8-119
– End of Steps –
Prerequisite
l The required boards and ports are added.
l The corresponding ports are enabled in the Ethernet port configuration.
8-120
Steps
1. Global configuration:
a. In the left pane, select ETH > XSTP > Global Configuration. The XSTP Global
Configuration page is displayed, see Figure 8-114.
8-121
8-122
8-123
8-124
2. Instance configuration:
a. In the left pane, select ETH > XSTP > Instance Configuration. The XSTP
Instance Configuration page is displayed, see Figure 8-115.
b. To modify an instance, select the instance in the list and click Modify. To add an
instance, click Add. The XSTP Instance Configuration dialog box is displayed,
see Figure 8-116.
8-125
8-126
3. Port configuration:
a. In the left pane, select ETH > XSTP > Port Configuration. The XSTP Port
Configuration page is displayed, see Figure 8-117.
b. Select the port to be configured, and click Modify. The XSTP Port Configuration
dialog box is displayed, see Figure 8-118.
8-127
8-128
a. In the left pane, select ETH > XSTP > Port Instance Configuration. The XSTP
Port Instance Configuration page is displayed.
b. To modify an item, select the item in the list and click Modify. To add an item, click
Add. The XSTP Port Instance Configuration dialog box is displayed, seeFigure
8-119.
8-129
8-130
Note:
l If the role of the root port configured with Loop Guard is changed, the root
port changes to Discarding state and remains in the Discarding state without
forwarding packets. In this way, loops cannot be formed in the network.
l For the port configured as Root Guard, the port role can only be the specified
port. Once the port receives a configuration message with higher priority, the
status changes to Discarding and the ports do not forward packets, which also
means the port link is disconnected. If no configuration messages with higher
priority are received in a long period, the port restores to the original state.
– End of Steps –
Context
The OSPF configuration principle is as follows:
8-131
l If the Ethernet air interface is used to implement OSPF, only the area ID of the
interface needs to be configured. Other parameters use the defaults. Because OSPF
configurations can be propagated through the air interface, the OSPF configuration
on one device can take effect on other devices at neighbor hops. In this case, in
initial state, you only need to configure OSPF on one device.
l If a panel interface is used to implement OSPF, the IP address and mask of the
interface must be configured. Also, the interface must be configured in the same
network segment of the device to be directly connected.
Steps
1. Configure the OSPF instance.
a. In the left pane, select Routing > OSPF > Instance Configuration. The OSPF
default instance configuration page is displayed, see Figure 8-121.
b. Configure the default OSPF instance. For a description of the parameters, refer
to Table 8-48.
Table 8-48 OSPF Default Instance Parameters
8-132
c. Click Apply.
2. Configure the OSPF interface.
a. In the left pane, select Routing > OSPF > Interface Configuration. Click
Add in the OSPF interface configuration page in the right pane. The Interface
Configuration dialog box is displayed, see Figure 8-122.
8-133
b. Configure the OSPF interface parameters, and then click Apply. For a description
of the parameters, refer to Table 8-49.
Interface Interface - Sets the port and slot on which the OSPF
resource ID resource interface is configured.
IDs in the
drop-down
list
Enable flag l En- Enabled If this parameter is set to Disabled, the port is
abled not involved in OSPF calculation.
l Dis- If this parameter is set to Enabled, the port is
abled involved in OSPF calculation.
OSPF Instance IDs 1 This parameter sets the OSPF instance that
instance ID configured an interface belongs to.
in global
configura-
tion
8-134
Area ID 0.0.0.0–255. 0.0.0.0 Sets the OSPF area to which the network the
255.255.255 OSPF interface is connected to belongs. One
port can only belong to one OSPF area.
8-135
b. Click Add. Configure the STUB area parameters, and then click Apply. For a
description of the parameters, refer to Table 8-50.
Do not Send l En- Disable Determines whether the ABR in the STUB
Type-3 LSA abled area is allowed to send Type-3 LSA
Information l Dis- information to the internal of the STUB area.
abled
b. Click Add. Configure the NSSA area parameters, and then click Apply. For a
description of the parameters, refer to Table 8-51.
8-136
Type-7 LSA 1–16777215 1 Sets Type-7 LSA default metric value that
Default must be larger than 0.
Metric
Metric Type l Ex- External The OSPF supports two external metric types.
ternal Type 2 External Type 1 uses the same measure unit
Type 1 as that of the OSPF interface value (that is the
l Ex- metric value in the connection status).
ternal The metric of External Type 2 is larger than
Type 2 the internal path metric of any AS. When
External Type 2 is used and a packet is
routed, the metric is the path between ASs. It
is unnecessary to convert the external metric
to the connection state value.
Do not Send l En- Disable Determines whether the ABR in the NSSA
Type-3 LSA abled area is allowed to send Type-3 LSA
Information l Dis- information to the internal of the NSSA area.
abled
b. Click Add. Configure the virtual connection parameters, and then click Apply. For
a description of the parameters, refer to Table 8-52.
8-137
– End of Steps –
Steps
1. In the left pane, select Routing > Static Routing. The Static Routing Configuration
page is displayed.
2. Click the Add button. The Static Routing Configuration dialog box is displayed, see
Figure 8-126. For a description of parameters, refer to Table 8-53.
8-138
3. Click Apply.
– End of Steps –
Steps
1. In the left pane, select Clock > Management > Global Configuration. The global
configuration page is displayed, see Figure 8-127.
8-139
Steps
1. In the left pane, select Clock > Management > Port Configuration. The clock port
configuration page is displayed, see Figure 8-128.
8-140
The configurable clock types vary depending on the board type. For a detailed
description of the matching relations, refer to Table 8-54.
2. The information of all configurable clock resources is displayed in the page. Select the
clock source to be added, and click Add. The Clock Port Configuration dialog box
is displayed, see Figure 8-129.
8-141
Steps
1. In the left pane, select Clock > SSM > Global Configuration. The SSM global
configuration page is displayed, see Figure 8-130.
8-142
2. Configure the SSM global parameters. For a description of the parameters, refer to
Table 8-55.
SSM Protocol l Standard Standard Sets the SSM algorithm mode, which can
l Extend be the standard algorithm or the extended
algorithm.
The standard algorithm only considers
the clock source quality information. The
extended algorithm not only considers
the clock source quality information but
also considers the NE information to
prevent clock tracing loop. In addition, the
extended algorithm compares the number
of nodes that the clock passes through.
The compare result is considered as a
factor for selecting the clock source.
8-143
3. Click Apply.
– End of Steps –
Prerequisite
l The board where the PTP port resides is configured.
l The Ethernet port application is configured for the board.
Steps
Configuring the 1588 Clock Port
8-144
1. In the left pane, select Clock > Management > Port Configuration.
2. Click Add in the right pane. The Port Configuration dialog box is displayed, see
Figure 8-131.
3. Set Clock Type to PTP (PTP+AIR or PTP+SyncE) and configure other parameters.
4. Click Apply.
Configuring Global PTP Parameters
5. In the left pane, select Clock > PTP > Global Configuration. The global configuration
page is displayed, see Figure 8-132.
8-145
8. Click Apply.
Manually Configuring 1588 Asymmetry Compensation Value
9. In the left pane, select Clock > PTP > Asymmetry Compensation. The Asymmetry
Compensation Value Configuration page is displayed, see Figure 8-134.
8-146
10. Select the required port and click Modify. The Asymmetry Compensation Value
Configuration dialog box is displayed, see Figure 8-135.
11. Set the Asymmetry Compensation Value. The allowed range is -100000 ns to
100000 ns.
12. Click Apply.
Manually configure the cable delay compensation value.
13. In the left pane, select Clock > PTP > Cable Delay Compensation Value
Configuration. The Cable Delay Compensation Value Configuration page is
displayed, see Figure 8-136.
14. Select the required port and click Modify. The Cable Delay Compensation Value
Configuration dialog box is displayed, see Figure 8-137.
8-147
15. Set the cable delay compensation value in both directions. The allowed range is -0 ns
to 100000 ns.
16. Click Apply.
– End of Steps –
Steps
1. In the left pane, select Clock > Radio Port TC > Port Configuration. The Port
Configuration page is displayed, see Figure 8-138.
2. From the Status drop-down list, select Enable or Disable. Click Apply .
– End of Steps –
Steps
1. In the left pane, select Clock > Info > Clock Source. The clock source information
page is displayed, see Figure 8-139.
8-148
2. View the clock information, such as rack, shelf, slot, PortId, clock type, configuration
mode, SSM payload, and SSM priority.
– End of Steps –
Steps
1. In the left pane, select Maintenance > Auxiliary Service > EOW. The EOW
configuration page is displayed, see Figure 8-140.
3. Insert the headset into the EOW interface of the RSUA board, and then press Call.
After hearing the buzzer sound, the opposite party insert a headset and start the
conversation.
The devices at the ends of a point-to-point calling can communicate with each other.
8-149
The devices at the ends of a cross-site calling can communicate with each other.
The relay devices only serve for back-to-back transmission of voice data on the air
interface.
– End of Steps –
Prerequisite
For EDI input alarm configuration, all ports are connected to the alarm generation devices.
For EDI output alarm configuration, all output ports are connected to the alarm detection
devices.
2. Select an input record, and click Modify. The EDI IN dialog box is displayed, see
Figure 8-142.
8-150
2. Select an output record, and click Modify. The EDI OUT dialog box is displayed, see
Figure 8-144.
8-151
2. Select the record, and click Modify. The V.11 Configuration dialog box is displayed,
see Figure 8-146.
2. Select the record, and click Modify. The SC Port V.28 dialog box is displayed, see
Figure 8-148.
8-152
Prerequisite
You have already logged in to the LMT as the administrator.
Steps
Configuring the Lockout Information
1. In the left pane, select Security Management > User. The User Security page is
displayed, see Figure 8-149.
8-153
2. In the User Security Management area, configure the Lockout Threshold and the
Lockout Time. For a description of the lockout parameters, refer to the following table.
Lockout 1–10 Integer 5 Number of times that a user is allowed to enter wrong
Thresh- passwords. The user will be locked if this threshold
old is exceeded.
Lockout 10, 20, 30, 40, 10 Time (minute) for locking a user. The user will be
Time 50, 60 automatically unlocked when the time is exceeded.
3. Click Apply.
Configuring User Disable/Enable
4. In the User Management area, select the user name to be modified. Click Modify.
The User Info Configuration dialog box is displayed, see Figure 8-150.
8-154
CAR
- Committed Access Rate
CES
- Circuit Emulation Service
CFM
- Connectivity Fault Management
CSF
- Client Signal Failure
DR
- Designated Router
DRR
- Deficit Round Robin
EDI
- External Device Interface
EFM
- Ethernet in the First Mile
EMS
- Element Management System
EOW
- Engineering Order-Wire
ERPS
- Ethernet Ring Protection Switching
GbE
- Gigabit Ethernet
HSB
- Hot Standby
ID
- Identification
IDU
- Indoor Unit
IP
- Internet Protocol
LACP
- Link Aggregation Control Protocol
LLDP
- Link Layer Discovery Protocol
LMEP
- Local Maintenance association End Point
LMSP
- Linear Multiplex Section Protection
LMT
- Local Maintenance Terminal
MA
- Maintenance Association
MAC
- Message Authentication Code
MD
- Maintenance Domain
MEP
- Maintenance End Point
MIB
- Management Information Base
MIP
- Maintenance domain Intermediate Point
MP
- Maintenance Point
II
MSE
- Mean Square Error
MSTP
- Multiple Spanning Tree Protocol
MUX
- Multiplexer
NBMA
- Non-Broadcast Multiple Access
NE
- Network Element
NMS
- Network Management System
NMS
- Network element Management System
ODU
- Outdoor Unit
OSPF
- Open Shortest Path First
OUI
- Organizationally Unique Identifier
PM
- Power Module
PTP
- Precision Time Protocol
QPSK
- Quadrature Phase Shift Keying
QoS
- Quality of Service
RCU
- Radio Core Cross-connect Unit
RCUB
- Radio Core Cross Unit B
RED
- Random Early Detection
RMEP
- Remote Maintenance association End Point
RMU
- Radio Modulation Unit
III
RMUC
- Radio Modem Unit C
RMUD
- Radio Modem Unit D
RNC
- Radio Network Controller
RSTP
- Rapid Spanning Tree Protocol
RSUA
- Radio Service Unit A
RTU
- Radio Traffic Unit
RTUB
- Radio Traffic Unit B
RTUC
- Radio Traffic Unit C
RTUH
- Radio Traffic Unit H
RTUN
- Radio Traffic Unit N
SDH
- Synchronous Digital Hierarchy
SNCP
- Sub-Network Connection Protection
SNMP
- Simple Network Management Protocol
SP
- Strict Priority
SSM
- Synchronization Status Message
STM
- Synchronous Transfer Mode
STP
- Spanning Tree Protocol
SVLAN
- Service Virtual Local Area Network
TCP
- Transmission Control Protocol
IV
TDM
- Time Division Multiplexing
TOD
- Time of Day
VLAN
- Virtual Local Area Network
WFQ
- Weighted Fair Queuing
WRED
- Weighted Random Early Detection
WRR
- Weighted Round Robin
XPIC
- Cross Polarization Interference Canceller