Professional Documents
Culture Documents
NN46220-701 - 01.01 - TRBL - CFM Y1731
NN46220-701 - 01.01 - TRBL - CFM Y1731
Troubleshooting
This document is protected by copyright laws and international treaties. All information, copyrights and any other
intellectual property rights contained in this document are the property of Nortel Networks. Except as expressly
authorized in writing by Nortel Networks, the holder is granted no rights to use the information contained herein and
this document shall not be published, copied, produced or reproduced, modified, translated, compiled, distributed,
displayed or transmitted, in whole or part, in any form or media.
The information in this document is subject to change without notice. The statements, configurations, technical
data, and recommendations in this document are believed to be accurate and reliable, but are presented without
express or implied warranty. Users must take full responsibility for their applications of any products specified in this
document. The information in this document is proprietary to Nortel Networks Inc.
The software described in this document is furnished under a license agreement and may be used only in accordance
with the terms of that license. The software license agreement is included in this document.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer
software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth
in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
Contents
New in this release 9
Features 9
Other changes 9
Introduction 11
Acronyms 11
Troubleshooting fundamentals 15
Transparent Domain Continuity 16
Connectivity Fault Management 16
Y.1731 Performance Monitoring 17
Digital Diagnostic Monitoring 17
Port mirroring 17
Remote mirroring 18
Ping snoop 19
Packet capture tool 19
System log (syslog) 20
General diagnostic tools 20
Troubleshooting planning 21
Proper installation and routine maintenance 21
Network configuration 21
Site network map 22
Logical connections 22
Device configuration information 22
Other important data about your network 22
Normal behavior on your network 22
Initial troubleshooting 25
Using the Knowledge and Solution Engine 25
Gathering information 26
Displaying configuration information using the show config command 27
Displaying system status using the show tech command 28
Using log files 28
Viewing the software version 28
Providing a network topology diagram 29
Hardware troubleshooting 31
Troubleshooting the Metro Ethernet Routing Switch 8600 hardware 31
LED indications of problems 31
Apparent module failure 33
Failure to get a login prompt from the console port 34
Cable connection problems 34
Using Digital Diagnostic Monitoring 35
Viewing DDI information using Device Manager 36
Viewing DDI information using the CLI 40
Troubleshooting a nonworking link 45
Software troubleshooting 47
Using Transparent Domain Continuity 47
Using Transparent Domain Continuity with Device Manager 48
Using Transparent Domain Continuity with the CLI 57
Using Connectivity Fault Management 75
Configuring CFM using Device Manager 75
Configuring CFM using the CLI 93
Using Y.1731 Performance Monitoring 113
Configuring PM using Device Manager 114
Configuring PM using the CLI 123
Using port mirroring 134
Configuring port mirroring using Device Manager 135
Configuring port mirroring using the CLI 143
Using remote port mirroring 152
Configuring ports for remote mirroring using Device Manager 153
Configuring ports for remote mirroring using the CLI 155
Troubleshooting IS-IS 159
CLI debug commands 159
Other troubleshooting issues 162
Getting help over the phone from a Nortel Solutions Center 250
Getting help from a specialist by using an Express Routing Code 251
Getting help through a Nortel distributor or reseller 251
Features
The following features are new for Release 4.2:
• Y.1731 Performance Monitoring functionality is added for PBT and
client-level service instances. See "Using Y.1731 Performance
Monitoring" (page 113).
• Port mirroring functionality at the endpoint level (service level) has
been extended to R modules on Local TLS and ESU Ring/SA ports.
The packets are mirrored before encapsulation at ingress and after
decapsulation at egress. See "Configuring port mirroring using Device
Manager" (page 135) and "Configuring port mirroring using the CLI"
(page 143).
• You can now get a count of the total MAC addresses and IP addresses
learnt against Customer IP VLANs on an ESM port or R-module lane.
See "Displaying the MAC and IP count " (page 140) and "Displaying the
MAC and IP count" (page 151).
• The ESU responds to ESU or customer-generated rapid ping requests
(in the data path), received through an ESU or other customer device
on the Metro ERS 8600. Additionally, the ESU can initiate rapid pings
outside the IP subnet. For more information, see "Using rapid ping"
(page 226).
Other changes
Nortel Metro Ethernet Routing Switch 8600 Troubleshooting (NN46220-701)
is a new document for Metro Ethernet Routing Switch 8600 Release 4.2.
Some of the content in this document originally appeared in the following
sources:
• Nortel Metro Ethernet Routing Switch 8600 Diagnostics (NN46220-700);
this document is now obsolete
• Nortel Metro Ethernet Routing Switch 8600 Configuration — UNI and
Endpoints for non-PBT VPN (NN46220-506)
Introduction
The Nortel Metro Ethernet Routing Switch 8600 (MERS 8600) is a flexible
and multifunctional switch that supports a diverse range of network
architectures and protocols. This guide provides procedural information to
help you troubleshoot and isolate problems in your MERS 8600 network
Navigation
• "Troubleshooting fundamentals" (page 15)
• "Troubleshooting planning" (page 21)
• "Initial troubleshooting" (page 25)
• "Hardware troubleshooting" (page 31)
• "Software troubleshooting" (page 47)
• "Troubleshooting using a network manager" (page 163)
• "Downloading software" (page 165)
• "Troubleshooting tools" (page 167)
• "Understanding alarms, logs, traps, and system messages" (page 245)
• "Supported RFCs" (page 247)
• "Contacting technical support" (page 249)
• "Troubleshooting configuration examples" (page 253)
• "Diagnostics reference" (page 269)
Acronyms
This guide uses the following acronyms:
Troubleshooting fundamentals
This section provides conceptual information about the methods and
tools that you can use to troubleshoot and isolate problems in your Metro
Ethernet Routing Switch 8600 (MERS 8600) network.
The types of problems that typically occur with networks involve connectivity
and performance. The MERS 8600 supports a diverse range of network
architectures and protocols, some of which are used to maintain and
monitor connectivity and isolate connectivity faults.
Certain protocols and tools are tailored for troubleshooting specific MERS
8600 network topologies. For instance, the Connectivity Fault Management
(CFM), the IEEE standard 802.1ag, is used to maintain connectivity for
Provider Backbone Transport (PBT) trunks and service instances. Other
tools are more general in their application and can be used to diagnose and
monitor ingress and egress traffic on the MERS 8600.
Navigation
• "Transparent Domain Continuity" (page 16)
• "Connectivity Fault Management" (page 16)
• "Digital Diagnostic Monitoring" (page 17)
You can use TDC to test the data flow from the Metro Ethernet Routing
Switch 8600 through the SP network to another Metro Ethernet Routing
Switch 8600, to a UNI on an OM1000 ESM, or to a UNI or NNI interface
on the Optical Metro 3500 multiservices platform with the Optical Packet
Edge System.
For conceptual information about TDC, see Nortel Metro Ethernet Routing
Switch 8600 Fundamentals (NN46220-100).
CFM supports both Provider Backbone Bridging (PBB), which complies with
the 802.1ah standard, and Provider Backbone Transport (PBT).
For conceptual information about CFM, see Nortel Metro Ethernet Routing
Switch 8600 Fundamentals (NN46220-100).
Use DDM for monitoring your Small Form-factor Pluggable (SFP) tranceivers
and 10 Gigabit SFPs (XFP).
For information about DDM, SFPs and XFPs, see Nortel Metro Ethernet
Routing Switch 8600 Installation — SFP and XFP Transceivers and GBICs
(NN46225-301).
Port mirroring
The MERS 8600 has a port mirroring feature that you can use to monitor
and analyze network traffic flowing on a port. The MERS 8600 supports
both ingress (incoming traffic) and egress (outgoing traffic) port mirroring.
When using port mirroring, you specify a destination port to see mirrored
traffic and specify the source ports from which traffic is mirrored. Any
In addition, you can use the Virtual Local Area Network (VLAN) forwarding
database feature to monitor traffic for Media Access Control (MAC)
addresses where traffic with a given source or destination MAC address
is copied to the mirror port.
Remote mirroring
The remote mirroring feature steers mirrored traffic through a switch cloud
to a network analysis probe located on a remote switch. With this feature,
you can monitor many ports from different switches using one network
probe device. This is achieved by encapsulating mirrored packets in a
remote mirroring encapsulation wrapper. The encapsulated frame is bridged
though the network by a separate port-based VLAN to the remote mirroring
termination (RMT) port. At the termination port, the encapsulation header is
removed before sending the packet out of the port.
Port mirroring and remote port mirroring are features that can negatively
impact normal traffic. Mirrored traffic is always handled with lower priority
(ingress, egress, or in the switch fabric). Use these features only for
troubleshooting, debugging, or for some security purposes like packet
sniffing, intrusion detection system (IDS), or intrusion prevention system
(IPS).
Remote mirroring
Ping snoop
You can use the ping snoop feature to troubleshoot MultiLink Trunking (MLT)
and Split MultiLink Trunking (SMLT) networks. Ping snoop displays the
route that IP traffic takes over an MLT or SMLT path. Ping snoop enables a
filter that copies Internet Control Message Protocol (ICMP) messages to the
CPU. The CPU then monitors the ICMP stream. The console displays the
port that is used for each IP traffic flow, from source to destination station.
ATTENTION
There is no mechanism to prevent line rate ICMP traffic from going to the CPU as
a result of enabling ping snoop.
All captured packets are stored in the secondary CPU, used as the PCAP
engine. The primary CPU maintains its protocol handling and is not affected
by any PCAP capture activity.
ATTENTION
PCAP is not supported on R modules.
For more information about PCAP, see Using the Packet Capture (PCAP)
Tool (315023-E).
Troubleshooting planning
You can better troubleshoot the problems on your network by planning for
these events in advance. To do this, you must know the following:
• that your system is properly installed and routinely maintained
• your network’s configuration
• your network’s normal behavior
Navigation
• "Proper installation and routine maintenance" (page 21)
• "Network configuration" (page 21)
• "Normal behavior on your network" (page 22)
Network configuration
To keep track of your network’s configuration, gather the information
described in the following sections. This information, when kept up-to-date,
is extremely helpful for locating information when you experience network
or device problems.
Navigation
• "Site network map" (page 22)
• "Logical connections" (page 22)
• "Device configuration information" (page 22)
• "Other important data about your network" (page 22)
Logical connections
With virtual LANs (VLANs), you must know how your devices are connected
logically as well as physically.
Initial troubleshooting
As part of your initial troubleshooting, Nortel recommends that you check
the Knowledge and Solution Engine on the Nortel Web site for known issues
and solutions related to the problem you are experiencing.
If you have to call Technical Support with your issue, the Technical Support
personnel will ask for information about you system. It is a good practice to
gather critical information prior to contacting Technical Support.
Navigation
• "Using the Knowledge and Solution Engine" (page 25)
• "Gathering information" (page 26)
Procedure steps
Step Action
6 From the ALL TYPES drop-down list, select the document type you
would like to search against.
The default is ALL TYPES, which searches on all available
documents (bulletins, documentation, services requests, software,
and solutions).
7 Click > (the arrow adjacent to the text box) or press Enter to start
your search.
The page reloads and provides the option to narrow your search by
product family.
—End—
Gathering information
Before contacting Nortel Technical Support, you must gather information
that can help the Technical Support personnel when troubleshooting. This
includes the following information:
• output from the show config command
Navigation
• "Displaying configuration information using the show config command"
(page 27)
• "Displaying system status using the show tech command" (page 28)
• "Using log files" (page 28)
• "Viewing the software version" (page 28)
• "Providing a network topology diagram" (page 29)
• "Changes to your system or network" (page 29)
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
For more information about configuring and displaying log files, see "Log
files using the CLI" (page 168).
Procedure steps
Step Action
—End—
Hardware troubleshooting
Use the tasks in this section to troubleshoot problems related to the Metro
Ethernet Routing Switch 8600 (MERS 8600) hardware components.
Navigation
• "Troubleshooting the Metro Ethernet Routing Switch 8600 hardware"
(page 31)
• "Using Digital Diagnostic Monitoring" (page 35)
Navigation
• "LED indications of problems" (page 31)
• "Apparent module failure" (page 33)
• "Failure to get a login prompt from the Console port" (page 34)
• "Cable connection problems" (page 34)
The Fault LED is blinking A chassis failure has been From the console management
amber. detected. station, use the show log command
to check the system log for information
about hardware failures.
To work around this issue, follow the steps in either work around 1 or 2.
Step Action
2 Insert a module type that is different from the module type removed
in Step 1 and wait for this replacement module to initialize.
3 Remove the module inserted in Step 2.
4 Insert a new module model in the same slot as the faulty module
resided. This new module model must be identical to the module
model removed in Step 1.
—End—
Step Action
—End—
If the module still fails to operate, contact the Nortel Technical Solutions
Center for assistance.
DCE/DTE switch
10BASE-T cables
Cabling for 10BASE-T networks can consist of two-pair Category 3, 4, or
5 unshielded twisted pair (UTP) wiring. However, to prepare for future
upgrades to Fast Ethernet, Nortel strongly recommends that you use all
Category 5 cable in your network.
GBIC cables
Cables for the GBICs vary depending on the specific GBIC type. For
information about the cable requirements for GBICs, see Nortel Metro
Ethernet Routing Switch 8600 Installation — SFP and XFP Transceivers
and GBICs (NN46225-301).
You can use DDM at any time during active laser operation without affecting
data traffic. The DDM software provides warnings or alarms when the
temperature, voltage, laser bias current, transmitter power or receiver
power fall outside of vendor-specified thresholds during initialization. For
logging purposes, DDM warning and alarm messages are mapped into the
WARNING and FATAL message categories.
Navigation
• "Viewing DDI information using Device Manager" (page 36)
• "Viewing DDI information using the CLI" (page 40)
• "Troubleshooting a nonworking link" (page 45)
Procedure steps
Step Action
1 In the Device view, double left-click a port, or select a port and select
Edit > Port.
The Interface tab appears.
Port dialog box, Interface tab
For information about the DDI fields, see the following table.
3 Click Refresh to update the statistics.
—End—
Variable definitions
Variable Value
DdmStatus Indicates if DDM is enabled.
Calibration Indicates if the calibration is internal or external.
PowerMeasure Indicates Rx power measurement as average or OMA.
ConnectorType Indicates the type of SFP or XFP connector.
VendorName Indicates the name of the SFP or XFP manufacturer.
VendorPartNumber Indicates the Nortel PEC for the SFP or XFP
VendorRevNumber Indicates the manufacturer revision level for the SFP or XFP.
VendorSN Indicates the manufacturer serial number for the SFP or XFP.
VendorDateCode Indicates the manufacturer date code for the SFP or XFP.
CLEI Indicates the Telcordia register assignment Nortel CLEI code.
SupportsDDM Indicates if the SFP or XFP supports DDM.
Aux1Monitoring Indicates if auxiliary monitoring is implemented for the XFP.
Aux2Monitoring Indicates if auxiliary monitoring is implemented for the XFP.
Wavelength Indicates the wavelength in nm of the SFP or XFP.
Temperature Indicates the current temperature in degrees Celsius of the SFP
or XFP.
TemperatureHighAlarmThresh Indicates the high alarm threshold in degrees Celsius.
old
TemperatureLowAlarmThresh Indicates the low alarm threshold in degrees Celsius.
old
TemperatureHighWarningThr Indicates the high warning threshold in degrees Celsius.
eshold
TemperatureLowWarningThre Indicates the high warning threshold in degrees Celsius.
shold
TemperatureStatus Indicates if any temperature thresholds were exceeded.
Voltage Indicates the current voltage in volts.
VoltageHighAlarmThreshold Indicates the high alarm threshold in volts.
VoltageLowAlarmThreshold Indicates the low alarm threshold in volts.
VoltageHighWarningThreshold Indicates the high warning threshold in volts.
VoltageLowWarningThreshold Indicates the high warning threshold in volts.
VoltageStatus Indicates if any voltage thresholds were exceeded.
Variable Value
Bias Indicates the laser bias current in mA.
BiasHighAlarmThreshold Indicates the bias current high alarm threshold in mA.
BiasLowAlarmThreshold Indicates the bias current low alarm threshold in mA.
BiasHighWarningThreshold Indicates the bias current high warning threshold in mA.
BiasLowWarningThreshold Indicates the bias current high warning threshold in mA.
BiasStatus Indicates if any bias thresholds were exceeded.
TxPower Indicates the current Tx power in mW.
TxPowerHighAlarmThreshold Indicates the high alarm threshold in mW for the Tx power.
TxPowerLowAlarmThreshold Indicates the low alarm threshold in mW for the Tx power.
TxPowerHighWarningThresh Indicates the high warning threshold in mW for the Tx power.
old
TxPowerLowWarningThresho Indicates the high warning threshold in mW for the Tx power.
ld
TxPowerStatus Indicates if any Tx power thresholds were exceeded.
RxPower Indicates the current Rx power in mW.
RxPowerHighAlarmThreshold Indicates the high alarm threshold in mW for the Rx power.
RxPowerLowAlarmThreshold Indicates the low alarm threshold in mW for the Rx power.
RxPowerHighWarningThresh Indicates the high warning threshold in mW for the Rx power.
old
RxPowerLowWarningThresho Indicates the high warning threshold in mW for the Rx power.
ld
RxPowerStatus Indicates if any Rx power thresholds were exceeded.
Aux1 Indicates the current auxiliary 1 reading.
Aux1HighAlarmThreshold Indicates the high alarm threshold auxiliary 1 reading.
Aux1LowAlarmThreshold Indicates the low alarm threshold auxiliary 1 reading.
Aux1HighWarningThreshold Indicates the high warning threshold auxiliary 1 reading.
Aux1LowWarningThreshold Indicates the high warning threshold auxiliary 1 reading.
Aux1Status Indicates if any auxiliary 1 thresholds were exceeded.
Aux2 Indicates the current auxiliary 2 reading.
Aux2rHighAlarmThreshold Indicates the high alarm threshold auxiliary 2 reading.
Aux2LowAlarmThreshold Indicates the low alarm threshold auxiliary 2 reading.
Aux2HighWarningThreshold Indicates the high warning threshold auxiliary 2 reading.
Aux2LowWarningThreshold Indicates the high warning threshold auxiliary 2 reading.
Aux2rStatus Indicates if any auxiliary 2 thresholds were exceeded.
Navigation
• "Viewing DDI module information" (page 40)
• "Viewing DDI temperature information" (page 42)
• "Viewing DDI voltage information" (page 43)
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
[detail] Specify to display all details.
<ports> A port or a range of ports in the format
of slot/port. If you do not specify any
port, the complete detailed output is
displayed for each port.
DDM Status : Ok
Calibration : External
RX Power Measurement : Average
Auxiliary 1 Monitoring : +5V Supply Voltage (V)
Auxiliary 2 Monitoring : +1.8V Supply Current (V)
------------------------------------------------------------------------
LOW_ALARM LOW_WARN ACTUAL HIGH_WARN HIGH_ALARM THRESHOLD
THRESHOLD THRESHOLD VALUE THRESHOLD THRESHOLD STATUS
------------------------------------------------------------------------
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<ports> Specify a port or a range of ports
in the format of slot/port. If you do
not specify any ports, the complete
detailed output is displayed for each
port.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<ports> Specify a port or a range of ports
in the format of slot/port. If you do
not specify any ports, the complete
detailed output is displayed for each
port.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Software troubleshooting
Use the tasks in this section to troubleshoot connectivity, packet loss, and
performance issues that occur with specific features and functional layers of
the Metro Ethernet Routing Switch 8600 (MERS 8600).
Navigation
• "Using Transparent Domain Continuity" (page 47)
• "Using Connectivity Fault Management" (page 75)
• "Using Y.1731 Performance Monitoring" (page 113)
• "Using port mirroring" (page 134)
• "Using remote port mirroring" (page 152)
• "Troubleshooting IS-IS" (page 159)
When you run a TDC test, consider the number of history entries and how
often you run the test or you will run out of memory. Nortel recommends
that you multiply the number of test case entries (history) times how often
you want to run the test (period). The total should not exceed 250 000.
For example, if you have 500 entries. You can run the test 500 times for a
total of 250 000.
The Metro Ethernet Routing Switch 8600 TDC test configuration parameters
include:
• Test name
• Test duration (one-time or periodic)
• SNMP-based configuration and traps
• Round-trip time
• Storage of test configurations in nonvolatile memory
• Test history
You can use Device Manager or the Command Line Interpreter (CLI) to
configure and run a TDC test.
Navigation
• "Using Transparent Domain Continuity with Device Manager" (page 48)
• "Using Transparent Domain Continuity with the CLI" (page 57)
Navigation
• "Configuring a new TDC test" (page 48)
• "Running a currently configured TDC test" (page 52)
• "Displaying test history" (page 52)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose VPN > TD Continuity.
The TDC dialog box appears with the TD Continuity tab displayed.
2 In the TDC dialog box, TD Continuity tab, click Insert.
The TDC, Insert TD Continuity dialog box appears. See "TDC, Insert
TD Continuity dialog box" (page 49).
3 Click any field to edit the data and then click Insert.
TDC, Insert TD Continuity dialog box
—End—
Variable definitions
Variable Value
TestId Sets the number of the TDC test you want to create.
• Enter an integer value in the range 1 and 9999.
Name Sets a unique name for the TDC test.
• Enter an alphanumeric string (in the range 1 and 63
alphanumeric characters).
TDI Specifies the unique number that identifies a specific TD.
• Enter an integer value in the range 1 and 16 777 215.
SrcUni Sets the source UNI ID (in IP address notation) for the TDC
test.
DstUni Sets the destination UNI ID for the TDC test.
DstPortNum Sets the destination port for the TDC test. Use this
destination port parameter only if the destination terminates
on an OM3500 or OME6500 NNI. This destination port
parameter is not valid for remote ESM or R module UNI
ports.
• Enter integer values in the form of slot/port. The valid
port range is 1-1 to 14-8. If a user enters an invalid
range, the system brings it back to the closest valid port
number.
MulticastCnt Specifies the number of multicast packets to send for this
test.
• Enter an integer value in the range 0 and 100 packets.
UnicastCnt Specifies the number of unicast packets to send for this test.
• Enter an integer value in the range 0 and 100 packets.
Set the value to 0 if the test is going to optical equipment.
HistoryCnt Sets the number of history entries you want to allocate for
this test.
• Enter an integer value in the range 1 and 9 999 entries.
Variable Value
the test (period). The total should not exceed 250 000. For
example, if you have 500 entries. You can run the test 500
times for a total of 250 000.
PeriodicRate Specifies the time-interval, in minutes, when you want the
periodic TDC test to run.
• Enter an integer value in the range 1 and 1 440 minutes.
Variable Value
Procedure steps
Step Action
1 From the Device Manager menu bar, choose VPN > TD Continuity.
The TDC dialog box appears with the TD Continuity tab displayed.
See "TDC dialog box, TD Continuity tab" (page 52).
TDC dialog box, TD Continuity tab
2 Select the currently configured test you want to run and then click
start in the Action field. See "TDC dialog box, TD Continuity tab"
(page 52).
Use the pull-down menu to choose other menu options.
For information about the TD Continuity History field descriptions,
see "Variable definitions" (page 50).
3 Click Apply to change the configuration.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose VPN > TD Continuity.
The TDC dialog box appears with the TD Continuity tab displayed.
See "TDC dialog box, TD Continuity tab" (page 52).
2 In the TDC dialog, TD Continuity tab, select the test id for which
you want to display test history.
3 Click History.
The TD Continuity History dialog box appears with the History tab
displayed. See "TD Continuity History dialog box, History tab" (page
53).
TD Continuity History dialog box, History tab
ATTENTION
The fields in this screen display register bitmask codes that indicate test
history results.
5 Click Error Codes to view the bitmask code description online (or
refer to "Error bitmask code descriptions" (page 55)).
—End—
Variable definitions
Variable Value
TestId Indicates the unique test id for this entry.
Name Indicates the name of the TDC test configured.
Id Indicates the number of times the test was run.
PktsSent Indicates the number of test packets transmitted.
PktsReceived Indicates the number of test packets received.
RttBroadcastMin Indicates minimum round-trip-time (RTT), in
microseconds, required by a broadcast test packet for
all executions of this test.
RttBroadcastMax Indicates maximum round-trip-time (RTT), in
microseconds, required by a broadcast test packet for
all executions of this test.
RttBroadcastAvg Indicates average round-trip-time (RTT), in
microseconds, required by a broadcast test packet for
all executions of this test.
RttUnicastMin Indicates minimum round-trip-time (RTT), in
microseconds, required by a unicast test packet for
all executions of this test.
RttUnicastMax Indicates maximum round-trip-time (RTT), in
microseconds, required by a unicast test packet for
all executions of this test.
RttUnicastAvg Indicates average round-trip-time (RTT), in
microseconds, required by a unicast test packet for
all executions of this test.
RttAvg Indicates average round-trip-time (RTT), in
microseconds, required by a unicast and broadcast
test packet for all executions of this test.
HopCountMin Indicates the minimum number of hops a test packet
took.
HopCountMax Indicates the maximum number of hops a test packet
took.
HopCountAvg Indicates the average number of hops a test packet
took.
TestDateandTime Indicates the date and time of the test.
Variable Value
TimeStamp Indicates the timestamp.
Result Indicates the number of results saved for a given TDC
test.
ErrorMask Indicates the error mask associated with the TDC
test. Each bit in the mask represents a specific error.
The errors from the least significant bit to the highest
significant bit are summarized and represented in this
mask. See "Error bitmask code descriptions" (page 55)
for the descriptions.
In Release 4.1 and later, the TDC history results warning or error messages
now display. Bitmask error codes no longer display in DM.
Navigation
• "Running a currently configured TDC test" (page 57)
• "Displaying test history" (page 58)
• "Configuring a new TDC test" (page 62)
• "Example: TD continuity test" (page 73)
Procedure steps
Step Action
1 To run a currently configured TDC test using the CLI, enter the
following command:
config tdcont test <tdc id> run [ periodic ]
—End—
Variable definitions
Variable Value
periodic An optional parameter that allows you
to run the test in periodic mode. If
you specify periodic, then you must
have configured the TDC test with the
period parameter value.
tdc id Specifies the test id number, in the
range of 1 and 9 999.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
detail Displays additional results in a
two-level display. This command will
indicate the reasons for failure.
The following table describes the output of the show tdcont test
results command.
Parameter Description
ERROR MASK Indicates the error mask associated with the TDC test. Each bit in the
mask represents a specific error. The errors from the least significant
bit to the highest significant bit are summarized and represented in
this mask.
This field returns the error status in Hexadecimal format (see
"Hexadecimal Result Mask:" (page 60)).
Status Indicates the current status of the specified TDC test.
Procedure steps
Step Action
—End—
The second 32-bit mask shows informational errors returned from the
destination device.
Procedure steps
Step Action
1 To configure your system for TDC testing over an OEL2 port, enter
the following command:
config tdcont test <tdc id> create
This command allows you to enter the number of the TDC you want
to create for continuity testing.
—End—
Variable definitions
Variable Value
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
1 To set a unique name for a TDC test, enter the following command.
config tdcont test <tdc id> name <name>
—End—
Variable definitions
Variable Value
<name> An alphanumeric string (between 1
and 63 alphanumeric characters) that
uniquely identifies the TDC
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Procedure steps
Step Action
1 To set a unique number that defines the TDI for which this TDC will
run, enter the following command.
config tdcont test <tdc id> tdi <1..16777215>
—End—
Variable definitions
Variable Value
<1..16777215> The TDI on which the TDC test runs.
An integer value between 1 and 16
777 214.
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Procedure steps
Step Action
1 To delete a TDC test, enter the following command. The <tdc id>
specifies the test id number in the range of 1 and 9 999.
config tdcont test <tdc id> delete
This command allows you to enter the number or name of the TD
you want to delete from the continuity testing.
—End—
Procedure steps
Step Action
1 To stop the TDC testing you are currently running, enter the following
command:
config tdcont test <tdc id> abort [periodic]
—End—
Variable definitions
Variable Value
[periodic] An optional value that you can enter,
which aborts only the TDC testing you
are periodically running.
<tdc id> Specifies the test id number in the
range of 1 and 9 999
Prerequisites
• Use the destination port parameter only if the destination terminates on
an OM3500 or OME6500 product.
• The destination port parameter is not valid for remote ESM or R module
UNI ports.
Procedure steps
Step Action
1 To set the destination port for the TDC test, enter the following
command:
config tdcont test <tdc id> des-port <port>
—End—
Variable definitions
Variable Value
<port> Indicates the slot/port number (1/1 to
1/4). The valid port range for OM is
1-1 to 14-8.
If you enter an invalid range, the
system brings it back to the closest
valid port number.
<tdc id> Specifies the test id number in the
range of 1 and 9 999
Procedure steps
Step Action
1 To set the source UNI ID for the TDC test, enter the following
command:
config tdcont test <tdc id> src-uni <ipaddr>
—End—
Variable definitions
Variable Value
<ipaddr> The IP address of the source UNI.
<tdc id> Specifies the test id number in the
range of 1 and 9 999
Procedure steps
Step Action
1 To set the destination UNI ID for the TDC test, enter the following
command:
config tdcont test <tdc id> des-uni <ipaddr>
—End—
Variable definitions
Variable Value
<ipaddr> The IP address of the destination UNI.
<tdc id> Specifies the test id number in the
range of 1 and 9 999
The total number of all history entries across all tests on a single switch is
900.
Prerequisites
• When you run a TDC test, consider the number of history entries
and how often you run the test or you will run out of memory. Nortel
recommends that you multiply the number of test case entries (history)
times how often you want to run the test (period). The total should not
exceed 250 000. For example, if you have 500 entries. You can run the
test 500 times for a total of 250 000.
Procedure steps
Step Action
1 To set the number of history entries you want to allocate for TDC
test, enter the following command:
config tdcont test <tdc id> history <1..9999>
—End—
Variable definitions
Variable Value
<1..9999> 1..9999 indicates that you must enter
an integer value between 1 and 9 999
entries. The default is 1.
<tdc id> Specifies the test id number in the
range of 1 and 9 999
Procedure steps
Step Action
1 To set SNMP trap control for the TDC test, enter the following
command:
config tdcont test <tdc id> trap <TRUE|FALSE>
—End—
Variable definitions
Variable Value
tdcont <tdc id> Specifies the test id number in the
range of 1 and 9 999
trap <TRUE|FALSE> Enter TRUE to set SNMP trap control.
Enter FALSE to turn off SNMP trap
control. The default if FALSE.
Procedure steps
Step Action
1 To set the number of multicast packets to send for the TDC test,
enter the following command:
config tdcont test <tdc id> multicast <0..100>
—End—
Variable definitions
Variable Value
<0..100> Specifies the number of multicast
packets to send for this test. 0..100
indicates that you must enter an
integer value between 0 and 100
entries. The default is 1.
<tdc id> Specifies the test id number in the
range of 1 and 9 999
Procedure steps
Step Action
1 To set the number of unicast packets to send for the TDC test, enter
the following command:
config tdcont test <tdc id> unicast <0..100>
—End—
Variable definitions
Variable Value
<0..100> Specifies the number of unicast
packets to send for this test. 0..100
indicates that you must enter an
integer value between 0 and 100
entries. The default is 1.
If the destination port is set for 1/1 to
1/4, the unicast is set to 0.
<tdc id> Specifies the test id number in the
range of 1 and 9 999
Procedure steps
Step Action
1 To set the time interval (in minutes) when you want the periodic TDC
test to run, enter the following command:
config tdcont test <tdc id> period <1..1440>
—End—
Variable definitions
Variable Value
<0..1440> 1..1440 indicates that you must enter
an integer value between 1 and 1 440
minutes (equals 24 hours or one day).
The default is 1 minute.
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Procedure steps
Step Action
1 To set the number of times you want the periodic TDC test to run,
enter the following command:
config tdcont test <tdc id> period-count <1..1440>
—End—
Variable definitions
Variable Value
<0..1440> 1..1440 indicates the number of times
the TDC test will run. The default is
0 (indefinitely). If you enter 0, the
periodic TDC test runs constantly.
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Procedure steps
Step Action
1 To set a priority value to use, instead of the priority of the source port
for the TDC test, enter the following command:
config tdcont test <tdc id> priority <0..7>
—End—
Variable definitions
Variable Value
<0..7> An integer value between 0 and 7.
The default is the priority of the source
port.
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Prerequisites
• Do not use this option for one-to-one endpoints.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<0..4096> An integer value between 0 and 4
096. The default is 0. Do not use this
option for one-to-one endpoints.
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Procedure steps
Step Action
1 To set the TDC test time and trace mode, enter the following
command:
config tdcont test <tdc id> rtt-mode <none|time>
—End—
Variable definitions
Variable Value
<none|time> none indicates that the test does not
calculate the round trip time (RTT)
and the number of hops. The default
is none.
time is the TD test time.
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Procedure steps
Step Action
1 To set the round trip time threshold parameter, enter the following
command:
config tdcont test <tdc id> rtt-threshold
<0..10000>
—End—
Variable definitions
Variable Value
<0..10000> 0..10000 indicates the rtt threshold
value between 0 and 10 000
milliseconds.
Setting this value to 0 (zero) disables
the rtt threshold parameter.
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
Procedure steps
Step Action
1 To set the timeout period for the TDC test, enter the following
command:
config tdcont test <tdc id> timeout <1..120>
—End—
Variable definitions
Variable Value
<1..120> Enter an integer value between 1 and
120 seconds.
The default is 10 seconds.
<tdc id> Specifies the test id number in the
range of 1 and 9 999.
You must create the UNI, TDI and endpoint first and then use TDC to test
them before adding traffic. The following example tests the existing OEL2
service.
Step Action
timeout: 10(sec)
rtt-mode: none
rtt-threshold: 0
qtag: 0
action: null
result: Pass
—End—
Navigation
• "Configuring CFM using Device Manager" (page 75)
• "Configuring CFM using the CLI" (page 93)
Navigation
• "Creating a maintenance domain" (page 76)
• "Creating a maintenance association" (page 77)
• "Creating a maintenance endpoint" (page 78)
• "Displaying MEP statistics" (page 80)
• "Creating a remote maintenance endpoint" (page 82)
• "Displaying RMEP statistics" (page 83)
• "Creating a maintenance intermediate point" (page 85)
• "Displaying MIP statistics" (page 87)
• "Displaying CFM port statistics" (page 88)
• "Monitoring CFM loopback messages" (page 89)
• "Monitoring CFM linktrace messages" (page 91)
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens and shows the existing
domains. See the following figure.
Maintenance Domain dialog box
2 Click Insert.
The Maintenance Domain, Insert dialog box opens (see the following
figure).
Maintenance Domain, Insert dialog box
5 Click Insert.
—End—
Variable definitions
Variable Value
Index Assigns a unique index number to this
maintenance domain. Device Manager assigns
this automatically, which you can overwrite.
Name Assigns a name to this maintenance domain.
Level Separates MDs from each other so you can
provide different functions to different areas in
the network. The 802.1ag draft recommends the
following assignments:
• level 5–7 to customer equipment
• level 3–4 to service provider equipment
• level 0–2 to operator equipment
EventTrapEnable Enables or disables the sending of 802.1ag and
Y.1731 event traps for this maintenance domain.
PmEnable Enables or disables performance monitoring for
this maintenance domain.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD.
This activates its Maintenance Association button.
3 Click Maintenance Association.
4 Click Insert.
The Maintenance Association, Insert dialog box opens (see the
following figure).
Maintenance Association, Insert dialog box
7 Click Insert.
—End—
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD to activate its Maintenance Association button.
6 Click Insert.
The Maintenance Endpoint, Insert dialog box opens (see the
following figure).
Maintenance Endpoint, Insert dialog box
—End—
Variable definitions
Variable Value
Id Assigns a unique ID number to this
maintenance endpoint. Device Manager
assigns this automatically, which you can
overwrite.
AdminState Administratively enables or disables the
maintenance association. The default is
disable.
CcmPriority Sets the priority level for transmitting continuity
check messages. The range is from 0 to 7,
and the default is 7.
CcmTxEnable Enables or disables sending continuity check
messages from this MA. It is enabled by
default.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD to activate its Maintenance Association button.
6 Select a MEP.
—End—
Heading Description
TxCnt Shows the total number of CFM messages
transmitted from the trunk or ESM port.
RxCnt Shows the total number of CFM messages
received by the trunk or ESM port.
Defect The highest priority defect present since the
last MEP fault reset:
• none—no faults
• DefRDICCM—RDI bit set in received CCM
packet
• DefMACstatus—the MAC associated with
the transmitting MEP is reporting an error
status
• DefRemoteCCM—not receiving CCMs
from a MEP in the configured list
• DefErrorCCM—received an invalid CCM
• DefXconCCM—received a CCM that could
be from some other MA
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
ATTENTION
If you see all zeros for the MAC addresses, disable the AutoDetect
feature. For more information, see "Creating a maintenance association"
(page 77).
6 Click Insert.
The Remote Maintenance Endpoint, Insert dialog box opens (see
the following figure).
7 Click Insert.
For more information, see the following table.
—End—
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
—End—
Heading Description
LearnType
Shows how the remote MEP was learned.
• Config indicates the RMEP was
manually created.
• Auto indicates the RMEP was
automatically detected.
ATTENTION
You cannot automatically detect RMEPs.
You have to manually add and remove
MAC addresses for the trunk VLAN.
Heading Description
SeqErrCnt Shows the total number of CFM messages
received by the RMEP that are out of
sequence.
OperState Shows the current state of the remote RMEP.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
4 Click Insert.
9 Click Insert.
The VLAN, Insert CFM MIP dialog box appears.
11 Click Insert.
—End—
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD to activate its Maintenance Intermediate Point button.
For a description of the column names, see "Procedure job aid: MIP
statistics description" (page 87).
—End—
Heading Description
LoopbackReceived Shows the total number of CFM loopback
messages received.
LoopbackReplied Shows the total number of CFM loopback reply
messages sent.
Heading Description
LinktraceReceived Shows the total number of CFM linktrace
messages received.
LinktraceReplied Shows the total number of CFM linktrace reply
messages sent.
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM > Port Stats.
The CfmPortStats dialog box opens showing the Tx and Rx count for
all ports using CFM (see the following figure).
CfmPortStats dialog box
2 To clear the statistics, close the CfmPortStats dialog box and then
choose VPN > CFM > Port Stats and click the ClearStats button.
—End—
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD to activate its Maintenance Association button.
—End—
Variable definitions
Variable Value
Specifies the MAC address of the
DestMacAddress
destination MEP.
Specifies the ID of the destination
DestMepId
MEP.
Indicates whether the destination is
DestIsMepId
the MEP ID: true or false.
Messages Specifies the burst count number,
which determines how many LBM
messages to send to the remote MEP.
The default burst count is 1, and the
maximum count is 10000.
DataTlv Sets the size of the LBM. The
maximum size is 512 (in bytes). The
default size is the size of the LBM
PDU.
Vlan Priority Sets the priority level for transmitting
continuity check messages. The
range is from 0 to 7, and the default
is 7.
Status Shows the status of the loopback
command:
• ready indicates that the MEPs are
ready for you to initiate a loopback
message.
• not ready indicates that the MEPs
are not configured so you cannot
initiate a loopback messaged.
Variable Value
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD to activate its Maintenance Association button.
—End—
Variable definitions
Variable Value
Sets the priority level for transmitting
continuity check messages. The
Vlan Priority
range is from 0 to 7, and the default
is 7.
Specifies the MAC address of the
DestMacAddress
destination MEP.
Specifies the ID of the destination
DestMepId
MEP.
Indicates whether the destination is
DestIsMepId
the MEP ID: true or false.
Ttl Specifies the time-to-live (TTL) value
for the linktrace message. Each MP
on the way to the destination does the
following:
• decrements the TTL field in the
linktrace frame
• sends a linktrace reply message
to the originating MEP
• forwards the original linktrace
message to the destination
Variable Value
Navigation
• "Configuring CFM ethernet type" (page 93)
• "Creating a maintenance domain" (page 94)
• "Creating a maintenance association" (page 95)
• "Creating a maintenance endpoint" (page 98)
• "Displaying MEP statistics" (page 102)
• "Creating a remote maintenance endpoint" (page 104)
• "Displaying RMEP statistics" (page 105)
• "Configuring loopback messages" (page 107)
• "Configuring linktrace messages" (page 110)
• "Creating a maintenance intermediate point" (page 111)
• "Displaying MIP statistics" (page 112)
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
ethertype <value> Specify the ethernet type as something
other than the default (0x88e6). The
range is 0x1..0xffff.
Prerequisites
• You must set the bootconfig flag to discard unknown MAC
destinations with the command config bootconfig flags
unknown-destmac-discard true; and then reboot the MERS 8600.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
event-trap <enable|disable> Enables or disables the sending of
802.1ag and Y.1731 event traps for
this MD.
maint-level <level> Specify the maintenance level for this
MD.
pm <enable|disable> Enables or disables performance
monitoring for this MD. For information
about performance monitoring,
see "Using Y.1731 Performance
Monitoring" (page 113).
Prerequisites
• Create a maintenance domain.
Procedure steps
Step Action
You can override the CLI and specify an index number for the
maintenance association.
—End—
Variable definitions
Variable Value
auto-detect <enable|disable>
Enables or disables the MA from
automatically detecting remote
MEPs. The default is disable.
ATTENTION
You cannot automatically detect
remote MEPs. You have to
manually add and remove MAC
addresses for the trunk VLAN.
When you configure a trunk, PBT
no longer automatically adds or
removes the MAC address for
the trunk VLAN to the forwarding
database entry. This eliminates
the possibility of the MAC
address getting inadvertently
removed when the last trunk to
this VLAN is removed.
Variable Value
ccm-rdi <enable|disable> Enables or disables the Remote
Defect Indication (RDI) on the
underlying MEP CCMs associated
with this MA.
RDI is a CCM mechanism that
is used to detect one way failure
scenarios. RDI ensures that the
CCMs transmitted by the MEP are
being received by the remote MEPs.
When an RDI is received by the
local MEP, PBT receives a link down
message, which triggers a PBT
failover.
RDI is enabled by default.
Step Action
—End—
Prerequisites
• Create a maintenance domain.
• Create a maintenance association.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
ccm-priority <integer> Sets the priority level for transmitting
continuity check messages. The
range is from 0 to 7, and the default
is 7.
ccm-tx <enable|disable> Enables or disables sending continuity
check messages from this MEP. The
default is enable.
lbm <1..8191|00.00.00.00 Configures the loopback messages
.00.00> [-c <value>] [-d sent from this MEP.
<value>][-f <value>] [-i
• -c <value> specifies the burst
<value>] [-m <value>] [-p
count number, which determines
<value>] [-t <value>]
how many LBM messages to send
to the remote MEP. The default
burst count is 1, and the maximum
count is 10000.
• -d <value> sets the size of the
LBM. The maximum size is 400
(in bytes). The default size is the
size of the LBM PDU.
• -f < value> sets the fill test pattern
in the LBM PDU to one of the
following options (0–3). The
default value is 3.
Variable Value
Variable Value
ltm <1..8191|00.00.00.00 Configures the linktrace messages
.00.00> [-t <value>] [-p sent from this MEP.
<value>]
• 1..8191 is the remote MEP ID to
which LTM is sent.
• 00.00.00.00.00.00 is the remote
MEP or MIP MAC to which the
LTM is sent.
• -t <value> specifies the time-to-live
(TTL) value for the linktrace
message. Each MP on the way
to the destination decrements
the TTL field in the linktrace
frame. The linktrace message
is forwarded until it reaches its
destination or the TTL value is
decremented to 0. The default
TTL is 64.
• -p <value> sets the priority level
for transmitting continuity check
messages. The range is from 0 to
7, and the default is 7.
remove-auto-discovered-rmep Removes the specified remote MEP.
<rmep-id>
state <enable|disable> Administratively enables or disables
the maintenance endpoint. The
default is disable.
Step Action
—End—
Prerequisites
• Create a maintenance domain.
• Create a maintenance association.
• Create a maintenance endpoint.
Procedure steps
Step Action
2 Refer to the following figure for sample output for the show cfm
mep stats command. For a description of the column names, see
the job aid following this procedure.
—End—
Heading Description
DOMAIN_NAME Shows the name of the maintenance domain
that these statistics are derived from.
Heading Description
ASSOCIATION_NAME Shows the name of the maintenance
association that these statistics are derived
from.
MEP_ID Shows the number of the maintenance
endpoint that these statistics are derived from.
TX_COUNT The total number of CCM messages
transmitted from the trunk or ESM port.
RX_COUNT The total number of CCM messages received
by the trunk or ESM port.
DEFECT The highest priority defect present since the
last MEP fault reset:
• none—no faults
• DefRDICCM—RDI bit set in received CCM
packet
• DefMACstatus—the MAC associated with
the transmitting MEP is reporting an error
status
• DefRemoteCCM—not receiving CCMs
from aMEP in the configured list
• DefErrorCCM—received an invalid CCM
• DefXconCCM—received a CCM that could
be from some other MA
Prerequisites
• Create a maintenance domain.
• Create a maintenance association.
• Create a maintenance endpoint.
Procedure steps
Step Action
ATTENTION
If you see all zeros for the MAC addresses, disable the auto-detect feature.
For more information, see "Creating a maintenance association" (page
95). To see all MAC addresses detected, enter show cfm rmep all.
—End—
Variable definitions
Variable Value
<md-name> Specify a string of 1 to 22 characters that
identifies the MD.
<ma-name> Specify a string of 1 to 22 characters that
identifies the MA.
<rmep-id> Specify a string of 1 to 8191 characters
that uniquely identifies the RMEP.
remote-mac <mac-address> Specifies the MAC address of the remote
endpoint on another MERS 8600.
Prerequisites
• Create a maintenance domain.
• Create a maintenance association.
Procedure steps
Step Action
—End—
Heading Description
DOMAIN_NAME Shows the name of the maintenance domain
that these statistics are derived from.
ASSOCIATION_NAME Shows the name of the maintenance
association that these statistics are derived
from.
MEP_ID Shows the number of the maintenance
endpoint (MEP) that these statistics are
derived from.
RMEP_ID Show the number of the remote maintenance
endpoint that the state and RDI comes from.
STATE Shows the current state of the RMEP.
RX_COUNT The total number of CFM messages received
by the MEP.
SEQ_ERR The total number of CFM messages missing
on the MEP.
RDI Set to true when RMEP is sending Remote
Defect Indication (RDI), otherwise false.
The CFM solution uses both linktrace and loopback messages to isolate
the exact point of failure. When a port fails, the MAC addresses are flushed
from the forwarding database (FDB) of the VLANs associated with that port.
When this happens, the linktrace message (LTM) sent to the remote MEP
isolates the area of failure because the destination MERS 8600 does not
respond to the LTM. When you send LBMs to the ports on the unresponsive
MERS 8600, you can discover exactly which port failed.
Loopback messages are unicast messages that you can address to either
a MEP or a MIP, but only a MEP can initiate a loopback message. The
receiving Maintenance Point (MP) responds with a loopback reply. This
mechanism provides fault verification for the MD.
Prerequisites
• Create a maintenance domain.
• Create a maintenance association.
• Create a maintenance endpoint.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
-c <value> Sets the burst count number, which
determines how many LBM messages to
send to the remote MEP. The default burst
count is 1, and the maximum count is 200.
Variable Value
-d <value> Sets the size of the LBM. The maximum
size is 400 (in bytes). The default size is
the size of the LBM PDU.
-f <value> Sets the fill test pattern in the LBM PDU to
one of the following options (0–3):
• 0 — Null signal (all zeros) without
cyclical redundancy checking -32
(CRC-32)
• 1 — Null signal with CRC-32
• 2 — Pseudo-random bit sequence
(PRBS) without CRC-32
• 3 — PRBS with CRC-32
The default is 1.
-p <value> Sets the priority level for transmitting
continuity check messages. The range is
from 0 to 7, and the default is 7.
-t <value> Sets the interval to wait for an LBM
timeout. The range is 1..10, (in seconds),
the default value is 3.
The CFM solution uses both linktrace and loopback messages to isolate
the exact point of failure. When a port fails, the MAC addresses are flushed
from the forwarding database (FDB) of the VLANs associated with that port.
When this happens, the linktrace message (LTM) sent to the remote MEP
isolates the area of failure because the destination MERS 8600 does not
respond to the LTM. When you send LBMs to the ports on the unresponsive
MERS 8600, you can discover exactly which port failed.
Prerequisites
• Create a maintenance domain.
• Create a maintenance association.
• Create a maintenance endpoint.
• Create an remote maintenance endpoint.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
-p <value> Sets the priority level for transmitting
continuity check messages. The range is
from 0 to 7, and the default is 7.
-t <value> Specifies the time-to-live (TTL) value
(1..64) for the linktrace message. Each
MP on the way to the destination does the
following:
• decrements the TTL field in the
linktrace frame
• sends a linktrace reply message to the
originating MEP
• forwards the original linktrace
message to the destination
MIPs are always associated with MEPs. Configuring a MEP with a MIP
is optional.
Prerequisites
• Create a maintenance domain.
• Create a maintenance association.
• Create a maintenance endpoint.
Procedure steps
Step Action
1 Create a MIP.
config cfm md <md-name> mip <mip-id> create
Specify the names of the MD for <md-name> and the MIP ID for
<mip-id>.
—End—
Prerequisites
• Create a maintenance intermediate point.
Procedure steps
Step Action
2 Refer to the following figure for sample output for the show cfm
mip stats command. For a description of the column names, see
the job aid following this procedure.
—End—
Heading Description
Domain Name Shows the name of the maintenance domain
that these statistics are derived from.
Domain Index Shows the index number of the domain.
Mip Id Shows the MIP ID number.
Loopback Received Shows the total number of CFM loopback
messages received.
Loopback Replied Shows the total number of CFM loopback reply
messages sent.
Linktrace Received Shows the total number of CFM linktrace
messages received.
Linktrace Replied Shows the total number of CFM linktrace reply
messages sent.
Navigation
• "Configuring PM using Device Manager" (page 114)
• "Configuring PM using the CLI" (page 123)
Navigation
• "Creating a performance monitoring pair" (page 115)
• "Creating a frame delay profile" (page 117)
• "Displaying frame delay statistics" (page 119)
• "Removing a frame delay profile" (page 120)
• "Creating a frame loss ratio profile" (page 120)
• "Displaying frame loss ratio statistics" (page 122)
• "Removing a frame loss ratio profile" (page 123)
Procedure steps
Step Action
1 From the Device Manager menu, choose VPN > CFM >
Maintenance Domain.
The Maintenance Domain dialog box opens.
2 Select an MD to activate its Maintenance Association button.
5 Click MaintenanceEndpoint.
The Maintenance Endpoint dialog box opens.
6 Select a Maintenance Endpoint that you want to monitor.
The PM button is activated.
7 Click PM.
The PM dialog box opens showing the PM pairs that are currently
configured. (see the following figure).
PM dialog box
8 Click Insert.
The PM Insert dialog box opens (see the following figure).
—End—
Variable definitions
Variable Value
MdIndex The MD that you selected for this PM pair.
MaIndex The MA that you selected for this PM pair.
MepId The MEP that you selected for this PM pair.
RmepId Specify the remote MEP identifier that you
want to monitor with this MEP.
HistoryInterval The history summary interval in minutes.
The default setting is 15 minutes.
SampleRate The frame loss and frame delay sample rate
in seconds. Specify a value between 1 to
3600. Default setting is 10.
A consistency check is done to ensure that
the sample rate is at least four times faster
than the PM history period.
Be aware that for each PM pair that is
defined, a CFM packet will be sent for
each profile that has been added to it. For
example, if 50 PM pairs are configured and
enabled for PBT trunks and each PM pair
has four frame loss and four frame delay
Procedure steps
Step Action
1 From the Device Manager, choose VPN > CFM > FD > Profile.
The Frame Delay Profile dialog box opens.
2 Click Insert.
The Frame Delay Profile, Insert dialog box appears (see the following
figure).
Frame Delay Profile, Insert dialog box
—End—
Variable definitions
Variable Value
Index Assigns a unique ID number to this frame
delay profile. Device Manager assigns this
automatically, which you can overwrite.
ProfileName The name for the frame delay profile. Specify a
string from 1 to 22 characters.
Priority The CoS priority for messaging. Specify a value
from 0 to 7. The default is 7.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
1 From the Device Manager, choose VPN > CFM > FD > Profile.
The Frame Delay Profile dialog box opens.
3 Click Delete.
The frame delay profile is removed.
4 Click Close.
—End—
The frame loss ratio is calculated for both the far end and near end. Frame
loss LMM packets are sent at the sample rate; the percentage frame loss
ratio is calculated for each frame loss response (LMR) packet that is
received and for the PM interval period.
The frame loss statistics collected for each PM period include the following
information:
• Tx frame count
• Far end Rx frame count
• Far end Tx frame count
• Rx frame count
• Frames lost
• Frame loss ratio
The frame loss percentage is compared against the set and clear alarm
percentages to determine if a trap is sent to raise or clear a frame loss alarm.
Procedure steps
Step Action
1 From the Device Manager, choose VPN > CFM > FLR > Profile.
The Frame Loss Ratio Profile dialog box opens.
2 Click Insert.
The Frame Loss Ratio Profile, Insert dialog box appears (see the
following figure).
Frame Loss Ratio Profile, Insert dialog box
5 Click Insert.
—End—
Variable definitions
Variable Value
Index Assigns a unique ID number to this frame
loss ratio profile. Device Manager assigns
this automatically, which you can overwrite.
ProfileName The name for the frame loss ratio profile.
Specify a string from 1 to 22 characters.
Priority The CoS priority for messaging. Specify a
value from 0 to 7.
AlarmThresholdPercent The frame loss ratio set alarm threshold
(percent). Specify a value from 0 to 99 in 1
percent increments.
AlarmThresholdSubPercent The frame loss ratio set alarm threshold
(sub-percent). Specify a value from 0 to 99
in 1/100 percent increments.
ClearThresholdPercent The frame loss ratio clear alarm threshold
(percent). Specify a value from 0 to 99 in 1
percent increments.
ClearThresholdSubPercent The frame loss ratio clear alarm threshold
(sub-percent). Specify a value from 0 to 99
in 1/100 percent increments.
ThresholdState Enable or disable the threshold state.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
1 From the Device Manager, choose VPN > CFM > FLR > Profile.
The Frame Delay Profile dialog box opens.
2 Select the frame loss ratio profile that you want to remove.
3 Click Delete.
The frame loss ratio profile is removed.
4 Click Close.
—End—
Navigation
• "Creating a performance monitoring pair" (page 124)
• "Removing a performance monitoring pair" (page 126)
Prerequisites
• Create a maintenance domain.
• Create a maintenance association.
• Create a maintenance endpoint.
• Create an remote maintenance endpoint.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
add-fd-profile <fd-profile- Add a frame delay profile.
name> You can modify a profile after it has
been added to a PM pair, but the
changes do not take affect until one of
the following conditions occurs:
• The PM state is disabled and then
enabled.
• The profile is removed and then
added to the PM pair.
• The system is rebooted.
add-flr-profile <flr-profile Add a frame loss ratio profile.
-name> You can modify a profile after it has
been added to a PM pair, but the
changes do not take affect until one of
the following conditions occurs:
• The PM state is disabled and then
enabled.
• The profile is removed and then
added to the PM pair.
• The system is rebooted.
history-interval <value> The performance monitoring summary
interval in minutes. Specify a value
from 5 to 1440.
state <enable|disable> Enable or disable the performance
monitoring state.
sample-rate <value> The frame loss and frame delay
sample rate in seconds. Specify a
value between 1 to 3600. Default
setting is 30.
A consistency check is done to ensure
that the sample rate is at least four
times faster than the PM history
period.
Be aware that for each PM pair that
is defined, a CFM packet will be sent
for each profile that has been added
to it. For example, if 50 PM pairs are
configured and enabled for PBT trunks
and each PM pair has four frame loss
and four frame delay profiles with
Variable Value
a sample rate of one second, the
number of CFM packets sent will be
400 hundred packets per second.
Prerequisites
• You must have created a performance monitoring pair.
Procedure steps
Step Action
—End—
Frame delay DMM packets are sent at the sample rate; a frame delay is
calculated for each frame delay response (DMR) packet that is received.
The minimum sample, maximum sample, and average for the PM period will
be maintained for both frame delay and frame delay variation.
The frame delay ratio and frame delay variation ratio are compared against
the set and clear alarm percentages to determine if a trap is sent to raise or
clear a frame delay alarm.
Procedure Steps
Step Action
—End—
Variable definitions
Variable Value
alarm-threshold-percent The frame delay set alarm threshold
<value> (percent). Specify a value from 0 to
99 in 1 percent increments.
alarm-threshold-sub-percent The frame delay set alarm threshold
<value> (sub-percent). Specify a value from 0
to 99 in 1/100 percent increments.
clear-threshold-percent The frame delay clear alarm threshold
<value> (percent). Specify a value from 0 to
99 in 1 percent increments.
clear-threshold-sub-percent The frame delay clear alarm threshold
<value> (sub-percent). Specify a value from 0
to 99 in 1/100 percent increments.
fdv-alarm-threshold-percent The frame delay variation set alarm
<value> threshold (percent). Specify a value
from 0 to 99 in 1 percent increments.
fdv-alarm-threshold-sub-perc The frame delay variation set alarm
ent <value> threshold (sub-percent). Specify a
value from 0 to 99 in 1/100 percent
increments.
fdv-clear-threshold-percent The frame delay variation clear alarm
<value> threshold (percent). Specify a value
from 0 to 99 in 1 percent increments.
fdv-clear-threshold-sub-perc The frame delay variation clear alarm
ent <value> threshold (sub-percent). Specify a
value from 0 to 99 in 1/100 percent
increments.
Variable Value
fdv-performance-target The frame delay variation
<value> performance objective in milliseconds.
Specify a value from 1 to 10 000.
priority <value> The CoS priority for messaging.
Specify a value from 0 to 7.
threshold-state <enable|dis Enable or disable the threshold state.
able>
Prerequisites
• You must have a performance monitoring pair with PM enabled and a
frame delay profile.
Procedure steps
Step Action
—End—
Prerequisites
• You must have created the frame delay profile.
Procedure steps
Step Action
—End—
The frame loss percentage is compared against the set and clear alarm
percentages to determine if a trap is sent to raise or clear a frame loss alarm.
Procedure Steps
Step Action
—End—
Variable definitions
Variable Value
alarm-threshold-percent The frame loss set alarm threshold
<value> (percent). Specify a value from 0 to
99 in 1 percent increments.
alarm-threshold-sub-percent The frame loss set alarm threshold
<value> (sub-percent). Specify a value from 0
to 99 in 1/100 percent increments.
clear-threshold-percent The frame loss clear alarm threshold
<value> (percent). Specify a value from 0 to
99 in 1 percent increments.
clear-threshold-sub-percent The frame loss clear alarm threshold
<value> (sub-percent). Specify a value from 0
to 99 in 1/100 percent increments.
priority <value> The CoS priority for frame loss
messaging. Specify a value from 0 to
7.
threshold-state <enable|dis Enable or disable the threshold state.
able>
Prerequisites
Procedure steps
Step Action
—End—
Prerequisites
• You must have created the frame loss profile.
Procedure steps
Step Action
—End—
You can use port mirroring to specify a destination port on which you want
to see mirrored traffic and specify the source ports from which traffic is
mirrored. Any packet entering or leaving a specified port is forwarded
normally, and a copy of the packet is sent out to the mirroring or destination
port. When enabled, the mirroring operation is non-intrusive; mirrored traffic
is always treated in the lowest priority queue.
You can observe and analyze packet traffic at the mirroring port using a
network analyzer. Unlike other methods that are used to analyze packet
traffic, the packet traffic is uninterrupted and packets flow normally through
the mirrored port.
You can also use the port mirroring feature to monitor traffic from Media
Access Control (MAC) addresses where traffic with a given MAC source
address (SA) or MAC destination address (DA) is copied to the mirror port.
You can enable this feature by setting the Device Manager Monitor field to
true for a MAC address in the Forwarding dialog box. Monitoring of MAC
address traffic must be within the context of a VLAN.
The port mirroring feature can be used to monitor the MAC table to show the
total count of MAC addresses and IP addresses that have been learned on
an ESM port or R module lane. You can view the number of MAC addresses
learned on each ESM port (ingress) or R module lane (ingress and egress).
Monitoring the MAC table helps you to understand how resources are
being used and how close you are to approaching the C-MAC limit per
R module lane.
Nortel recommends that you enable port mirroring only for diagnostic
purposes because this feature degrades switch performance.
You can use Device Manager or the Command Line Interface (CLI) to
configure port mirroring.
Navigation
• "Configuring port mirroring using Device Manager" (page 135)
• "Configuring port mirroring using the CLI" (page 143)
Navigation
• "Configuring ports for mirroring at the port level" (page 135)
• "Configuring ports for mirroring at the endpoint level" (page 138)
• "Displaying the MAC and IP count " (page 140)
• "Editing existing port mirroring values" (page 141)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
> General.
The Diagnostics dialog box appears.
2 Click the Port Mirrors tab.
The Port Mirrors tab appears.
Diagnostics dialog box, Port Mirrors tab
3 Click Insert.
The Diagnostics, Insert Port Mirrors dialog box opens.
6 Click Ok.
7 Select a destination port. In the MirroringPort box, click the ellipsis
button.
The DiagMirrorByPortMirroringPort dialog box appears.
8 Select a destination port.
9 Click Ok.
10 From the Mode options, select the appropriate mode value to specify
the traffic direction of the mirrored packet.
12 Click Insert.
For information about the port mirroring fields, see the following table.
—End—
Variable definitions
Variable Value
Id Specifies an assigned identifier for the configured port
mirroring instance.
MirroredPort Specifies a port to be mirrored (source port).
MirroringPort Specifies a destination port (the port to which the
mirrored packets are forwarded).
Mode Specifies the traffic direction of the packet being
mirrored—rx, tx, both, rxFilter, txFilter, or bothFilter.
The default configuration is rx.
Note that if you use the rxFilter option with an
R module, you must use an ACL filter option. For
more information about the ACL filter, see Nortel Metro
Ethernet Routing Switch 8600 Configuration — QoS
and Traffic Management (NN46220-508).
If you have legacy modules installed in the MERS 8600
and set the mirroring mode to rxFilter, you must use
the IP traffic filter option of port mirroring.
Enable Enables or disables this port mirroring instance. The
default value is Enable.
MirrorVlanId Specify a VLAN to mirror.
Procedure steps
Step Action
4 Move the scroll bar to the right until you can view the
IngressMirrorState and EgressMirrorState columns.
5 To enable ingress port mirroring, double-click the entry under
IngressMirrorState for the endpoint that you want to enable ingress
port mirroring on and select enable in the drop-down list.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Chassis.
The Chassis dialog box appears.
—End—
Heading Description
Port Identifies the port.
Ingress The number of ingress MAC
addresses learned on an ESM port or
R module lane.
Egress The number of egress MAC addresses
learned on an ESM port or R module
lane.
Sorting entries
You can click the column heading of any entry listed in the Port Mirrors tab
to sort the entries in ascending or descending numerical order, or you can
sort to group entry values.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
> General.
The Diagnostics dialog box appears.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
> General.
The Diagnostics dialog box appears.
2 In the Port Mirrors dialog box, double-click a port entry you want to
modify in the MirroredPort or MirroringPort column heading.
4 Click Ok.
5 Click Apply.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
> General.
The Diagnostics dialog box appears.
2 Click the entry.
The Mode list displays the following options: Rx, Tx, Both, Rx Filter,
Tx Filter, or Both Filter.
4 Click Apply.
—End—
Procedure steps
Step Action
3 Click Apply.
—End—
Navigation
• "Creating a mirroring port at the port level" (page 143)
• "Creating a mirroring port at the endpoint level" (page 147)
• "Displaying mirror port information at the port level" (page 149)
• "Displaying mirror port information at the endpoint level" (page 150)
• "Displaying the MAC and IP count" (page 151)
Prerequisites
• Ingress mirroring is supported on all modules; however, egress mirroring
is supported only on E, M, and R modules. Refer to the Release Notes
for a list of supported E, M, and R modules.
• ESM ports support port mirroring at the endpoint level and legacy ports.
• R module-based local TLS and ESU ring/SA ports support port mirroring
at the endpoint level, providing ingress and egress mirroring. At ingress,
port mirroring takes place before the OEL2 and PBB packets are
encapsulated. At egress, port mirroring takes place after decapsulation.
• A maximum of 383 port mirroring entries can be enabled except on R
modules. On R modules, you can create one enabled entry for each
lane on a module. Therefore, you can create up to 3 entries on a 3
lane module, and up to 24 entries on an 8 module chassis. For more
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
enable {true|false} Enables or disables a mirroring port already
created in the mirror-by-port table.
<id> The mirror-by-port entry ID (1 to 383). You
can configure 1 mirroring port and up to 10
mirrored ports.
Variable Value
in-port <value> The mirrored port. The mirrored port can
be an ESM, R module, or legacy port.
mirrored-port <port> Specifies the mirrored port. An option on
config diag mirror-by-port
<id>.
mirroring-port <port> Specifies the mirroring port. An option on
config diag mirror-by-port <id>
For information about mirroring ports, see
"Procedure job aid: About mirroring ports"
(page 146).
mode {tx|rx|both| Sets the mirroring mode. The default is rx.
rxFilter|txFilter|
bothFilter}
• tx mirrors transmit packets.
• rx mirrors receive packets.
• both mirrors both transmit and receive
packets.
• txFilter mirrors and filters transmit
packets.
• rxFilter mirrors and filters receive
packets.
• bothFilter mirrors and filters both
transmit and receive packets.
Variable Value
sp-encap [true|false] Set mirroring to be done with or without
service provider encapsulation.
When you configure mirroring at the port
level for an R module, set sp-encap to false
(default), since mirroring of encapsulated
packets is not supported.
granularity Set the level, physical port or service,
{physical-port-level| that mirroring is to be done. Specify
service-level} physical-port-level or service-level. Valid
for both ESM and R module ports.
If service-level is specified, mode must be
set to both.
remote-mirror-vlan-id Sets the remote mirror VLAN ID. This is the
<value> VLAN on which remote mirrored traffic will
be sent to RMT. The ID of the VLAN in the
range of 0 to 4094.
The number of mirroring ports (also called destination ports) that you can
configure depends on the type and quantity of modules you have in your
system configuration.
Source ports that are members of the same OctaPID ID can be mirrored
only to the same destination port. If you try to assign source ports that are
members of the same OctaPID ID to different destination ports, the CLI
prompts you with an error message. For more information about how the
OctaPID ID is used for assigning destination ports, see "Tap and OctaPID
assignment reference" (page 298).
Prerequisites
• Ingress mirroring is supported on all modules; however, egress mirroring
is supported only on E, M, and R modules. Refer to the Release Notes
for a list of supported E, M, and R modules.
• ESM ports support port mirroring at the endpoint level and legacy ports.
• R module-based local TLS and ESU ring/SA ports support port mirroring
at the endpoint level, providing ingress and egress mirroring. At ingress,
port mirroring takes place before the OEL2 and PBB packets are
encapsulated. At egress, port mirroring takes place after decapsulation.
• A maximum of 383 port mirroring entries can be enabled except on R
modules. On R modules, you can create one enabled entry for each
lane on a module. Therefore, you can create up to 3 entries on a 3
lane module, and up to 24 entries on an 8 module chassis. For more
information about R modules, see Nortel Metro Ethernet Routing Switch
8600 Installation — Modules (NN46220-306).
• When mirroring ingress traffic, only packets with valid cyclic redundancy
checks (CRC) are mirrored.
• The mirroring configuration in the ACL (rxFilter) takes precedence
over the mode of the diag mirror-by-port. Suppose that port 4/1 is
configured with a ACL rxFilter and mirroring is enabled in ACE. Also,
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
egress-mirror {enable|disa Enable or disable the egress mirroring
ble} port feature for this endpoint.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
all Displays the MAC and IP addresses
learned for all ESM and R modules in
the chassis.
<port> The port or list of port numbers in the
format slot/port.
You can use Device Manager or the Command Line Interface (CLI) to
configure remote port mirroring.
Navigation
• "Configuring ports for remote mirroring using Device Manager" (page
153)
• "Configuring ports for remote mirroring using the CLI" (page 155)
Procedure steps
Step Action
2 From the Device Manager menu bar, choose Edit > Port.
3 Click the Remote Mirroring tab.
The Remote Mirroring tab appears (Port dialog box, Remote
Mirroring tab).
Port dialog box, Remote Mirroring tab
4 Click Insert.
The Port, Insert Remote Mirroring dialog box appears (Port, Insert
Remote Mirroring dialog box).
Port, Insert Remote Mirroring dialog box
10 Click Insert.
For information about the fields, see "Variable definitions" (page
154).
—End—
Variable definitions
Variable Value
Enable Enables or disables the feature on the port. When you
enable or disable remote mirroring, a trap is sent to the
trap receiver, and an SNMP log message is generated
stating that remote mirroring is enabled or disabled.
When remote mirroring termination (RMT) is enabled,
the switch does the following:
• A forwarding database FDB static entry for the
dstmac is added. This sends all the packets that
are coming with remote mirroring dstmac to the
RMT port.
Variable Value
Note that when you remove an I/O card from a slot, the
RMS and the RMT on all ports in the slot are disabled.
This action generates an SNMP log message and a
trap. When you reinsert the card, the RMS and RMT
are reenabled, but you must reenable remote mirroring.
Mode Specifies whether the port is a RMT (termination mode)
or remote mirroring source (RMS) (source mode).
SrcMac Used to set the source MAC address for the remote
mirroring encapsulation. The packet is sent out of the
RMS with the source MAC address derived from this.
The source MAC address of the encapsulated frame
contains the first 45 bits of this MAC address. The
three least significant bits are derived from the port
number of the RMS port. The MAC address of the port
is used as the default value.
DstMac Used to set the destination MAC address for the remote
mirroring encapsulation. The remote mirrored packet
is sent to this MAC address. The user-configured
dstmac is used only for the RMS. For the RMT, one of
the unused MAC addresses from the switch Port MAC
address range is used. To get the same dstmac for
the RMT across reboot, this MAC address is saved
in the configuration file and the dstmac of RMT is
accepted from the user only when the configuration
file is restored.
VlanIdList Used only for RMT. The user must specify to which
VLAN the remote mirror destination MAC address
belongs. This VLAN must be a port-based VLAN.
When the RMT port is removed from the last VLAN in
the list, RMT is disabled from the port.
Navigation
• "Creating a remote mirroring port" (page 156)
• "Displaying remote mirrored port information" (page 158)
Prerequisites
• You must be a RWA user to configure remote mirroring.
• The remote mirroring source port must be a port mirroring destination
port because only mirrored packets are remote mirrored. The switch
does not check if the port is a port mirroring destination port and sends
no error messages if the port is not.
• A remote mirroring destination port must be part of at least one
port-based VLAN.
• A maximum of 16 remote mirroring termination ports can be configured
in a switch.
• Only one port of an OctaPIDA can have a remote mirroring (termination
or source) port enabled.
• On R modules, only one port per egress lane can be mirrored.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
enable {true|false} Enables or disables remote mirroring on
the port. When you enable or disable
remote mirroring, a trap is sent to the trap
receiver, and an SNMP log message is
generated stating that remote mirroring is
enabled or disabled.
When Remote Mirroring Termination
(RMT) is enabled, the switch does the
following:
• A Forwarding Database (FDB) static
entry for the dstmac is added. This
sends all the packets that are coming
with remote mirroring dstmac to the
RMT port.
• Periodically (once every 10 seconds)
transmits broadcast layer 2 packets in
the added VLAN so that all nodes in
the network can learn the dstmac.
Variable Value
dstmac <mac> Sets the destination MAC address for
the remote mirroring encapsulation in the
format 0x00:0x00:0x00:0x00:0x00:0x00.
The remote mirrored packet is sent to this
MAC address. User configured dstmac is
used only for RMS.
For RMT, one of the unused MAC
addresses from the switch port MAC
address range is used. To get the same
dstmac for RMT across reboot, this MAC
address is saved in the configuration file
and, only when the configuration file is
restored, the dstmac of RMT is accepted
from the user.
ether-type <ether-type> The ether-type of the remote mirrored
packet. The default value is 0x8103.
add-vlan-id <vlan-id> Used only for RMT. The user must
remove-vlan-id <vlan-id> specify to which VLAN the remote mirror
destination MAC address belongs. This
must be a port-based VLAN. When the
RMT port is removed from the last VLAN
in the list, RMT is disabled from the port.
"show port info remote mirroring command" (page 158) shows sample
output for the show port info remote mirroring command.
Troubleshooting IS-IS
As an administrator of a network, you must have a basic knowledge and
understanding of networking best practices. You need to create a complete
diagram of your network before you begin to troubleshoot IS-IS. This
network map will give you a better understanding of the network topology
and traffic flow, and will help you understand how routing hardware is used.
This is important because for an IS-IS network you must define each Metro
Ethernet Routing Switch 8600 router as either Level 1/2 or Level 1. You
must also define the interfaces of each of these routers as Level 1 or Level
2-only. If authentication is in use, you must understand that there are three
levels of authentication:
• Area (Level 1)
• Domain (Level 2)
• interface Hello authentication
Command Description
show ip isis These two commands display the configured
manual-area or config manual area for the router. Be sure that
ip isis manual-area adjacent routers are configured to be in the
info same area.
show ip interface Displays all configured interfaces.
show ip isis interface Displays which interfaces are configured with
IS-IS and the state of those interfaces.
show ip isis Displays any adjacencies that have formed
adjacencies with the local router, what interface the
adjacency is coming through, and the system
ID of the adjacent router.
Command Description
show ip isis info These two commands show the same information.
or config ip isis These commands display the authentication
info settings for the global level.
config ethernet This command displays the authentication settings
<slot/port> ip for the interface level.
isis info
Command Description
config vlan <vlan This command displays the authentication settings
id> ip isis info for the interface level.
show ip isis int-a This command displays all interface level (Ethernet
uth <portlist> or VLAN) authentication configured on the Metro
Ethernet Routing Switch 8600 for IS-IS.
ATTENTION
If overload is set to true, the Metro Ethernet Routing Switch 6000 ignores the
setting in the SPF calculation when it is received.
When the device initially boots, all the ports are in default VLAN (1) if not
already assigned to a particular VLAN.
When a port is assigned to a specific VLAN, that port is taken out of the
default VLAN (1). If the configured port is removed from the assigned VLAN,
(for example, VLAN [3]), then the port is automatically put into VLAN (0).
The port does not go back to the default VLAN (1).
VLAN (0) is not a functioning VLAN; it is a pool holding ports that are not in
any VLAN. The ports in VLAN (0) do not forward any customer traffic.
To enable IS-IS, the administrator must specifically put a port into the
desired VLAN. If a router Ethernet port needs to be reconfigured for IS-IS,
the administrator must put the port, which is in VLAN (0), back into the
default VLAN (1) manually.
Use the CLI command show vlan info ports to see which VLAN the
port belongs to.
ATTENTION
For Solaris and HP-UX, certain Operating System (OS) patches are required for
Java Device Manager (JDM) and Java Runtime Environment (JRE) to function
properly. Consult Sun Microsystems or Hewlett-Packard to install the appropriate
OS patches before launching JDM.
Downloading software
To download software from the Nortel Web site, see the following site for
download content:
http://www.nortel.com/downloadingcontent
Navigation
• "Downloading MERS 8600 software" (page 165)
• "Downloading ESU 1800 software" (page 165)
• "Downloading ESU 1850 software" (page 166)
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Troubleshooting tools
This section describes the tools that are part of the Metro Ethernet Routing
Switch 8600 that you can use to troubleshoot operational and configuration
issues.
Navigation
• "Trapping errors" (page 167)
• "Log files" (page 168)
• "Using syslog" (page 174)
• "Monitoring ports" (page 188)
• "Running a trace test" (page 199)
• "Using ping snoop" (page 208)
• "Running a ping test" (page 211)
• "Performing a loopback test" (page 216)
• "Testing the switch fabric and address resolution table" (page 217)
• "Checking the MIB status" (page 223)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
> General.
The Diagnostics dialog box appears.
2 Click the Error tab.
The Error tab appears (see "Diagnostics dialog box, Error tab" (page
168)).
Diagnostics dialog box, Error tab
For information about the Error tab fields, see the following table.
—End—
Variable definitions
Variable Value
AuthenticationTrap When enabled, sends a trap upon receiving an error
in the system.
LastErrorCode The last error reported in the system. This value is
intended to help customer support personnel isolate
system problems.
LastErrorSeverity The last error reported in the system. The meanings of
this value are:
0= Informative Information
1= Warning Condition
2= Error Condition
3= Manufacturing Information
4= Fatal Condition
Navigation
• "Configuring log files" (page 169)
• Displaying log information
• "Displaying level information" (page 173)
Procedure steps
Step Action
1 To configure for the logging for the switch, enter the following
command:
config log
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
[<level>] The logging level is one of the following
values:
• 0 = Information; all messages are
recorded.
• 1 = Warning; only warning and more
serious messages are recorded.
• 2 = Error; only error and more serious
messages are recorded.
• 3 = Manufacturing; this parameter is not
available for customer use.
• 4 = Fatal; only fatal messages are
recorded.
Procedure steps
Step Action
2 To turn off the log display on the screen, enter the following
command:
config log screen off
—End—
Procedure steps
Step Action
1 To write the log file with a designation string, enter the following
command:
config log write <str>
—End—
Variable definitions
Variable Value
<str> The string or command that you
append to the log file.
If the string contains spaces, you must
enclose the string in quotation marks.
Logging to a PCMCIA
Use the following procedure to enable or disable logging to a PCMCIA
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
[tail] Displays the log file in reverse order,
with the most recent information first.
If the MERS 8600 has a real-time clock, the log file shows real time.
"Show log file tail command" (page 173) shows a summary of the results
of this command.
Procedure steps
Step Action
—End—
Using syslog
Use the system log (syslog) messaging feature to manage event messages.
Navigation
• Using the system log with Device Manager
• Using the system log with the CLI
Navigation
• "Enabling the system log globally" (page 174)
• "Receiving system log messages" (page 175)
• "Changing the severity level mapping" (page 176)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
System Log and click the System Log tab.
The System Log tab appears.
Diagnostics, System Log tab
3 Click Apply.
For information about the System Log tab fields, see the following
variable definitions table.
—End—
Variable definitions
Variable Value
Enable Used to enable or disable the syslog feature. When
enabled, this feature sends a message to a server
on a network that is configured to receive and store
diagnostic messages from this device. The type of
messages sent is user configurable.
MaxHost The maximum number of remote hosts considered
active and able to receive messages from the syslog
service.
OperState The operational state of the syslog service.
— designated printer
— one or more remote hosts
Internally, the MERS 8600 has four severity levels for log messages:
• Info
• Warning
• Error
• Fatal
For information about mapping severity levels, see "Default severity levels
and system log severity levels" (page 176).
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
System Log and click the System Log Table tab.
The System Log Table tab appears.
Diagnostics, System Log Table tab
3 Click Ok.
—End—
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
System Log.
5 Click Insert.
For information about the Insert System Log Table fields, see the
following variable definitions table.
—End—
Variable definitions
Variable Value
Id ID for the syslog host being created.
IpAddr IP address of the syslog host.
Variable Value
UdpPort The UDP port to use to send messages to the syslog
host (514 to 530).
Enable Enables or disables sending messages to the syslog
host.
HostFacility The syslog host facility used to identify messages
(LOCAL0 to LOCAL7)
Severity The MERS 8600 message severity for which syslog
messages will be sent.
MapInfoSeverity The fields that map MERS 8600 severity levels to
syslog severity.
MapWarningSeverity The fields that map MERS 8600 warning severity levels
to syslog severity.
MapErrorSeverity The fields that map MERS 8600 error severity levels to
syslog severity.
MapFatalSeverity The fields that map MERS 8600 fatal severity levels to
syslog severity.
Navigation
• "Configuring the syslog facility" (page 180)
• "Displaying the current syslog settings" (page 180)
• "Configuring a host location for the syslog host" (page 180)
• "Creating or deleting a syslog host" (page 181)
• "Enabling or disabling a syslog host" (page 181)
• "Specifying the UNIX facility for the syslog host" (page 182)
• "Specifying the message severity levels" (page 182)
• "Enabling or disabling the sending of system messages" (page 184)
• "Enabling or disabling the sending of system messages" (page 184)
• "Specifying the maximum number of syslog hosts" (page 185)
• "Configuration example 1: Configuring the syslog facility" (page 185)
• "Configuration example 2: Configuring the syslog facility" (page 186)
• "Displaying information about syslog features" (page 187)
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<id> A value from 1 to 10.
Procedure steps
Step Action
1 To display the current syslog settings for the specified host, enter
the following command:
config sys syslog host <id> info
The system log information for the specified host appears. This
command results in the same output as the show sys syslog
host <id> info command.
—End—
Variable definitions
Variable Value
<id> A value from 1 to 10.
Procedure steps
Step Action
1 To configure a host location for the syslog host, enter the following
command:
config sys syslog host <id> address <ipaddr>
—End—
Variable definitions
Variable Value
address <ipaddr> ipaddr is the IP address of the UNIX
system syslog host.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<id> A value from 1 to 10.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<id> A value from 1 to 10.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
facility <facility> facility is the UNIX system syslog
host facility (LOCAL0 to LOCAL7).
<id> A value from 1 to 10.
• Error messages
• Fatal messages
Procedure steps
Step Action
1 To specify the severity levels for which syslog messages are sent for
the specified modules, enter the following command:
config sys syslog host <id> severity <info|warning|e
rror|fatal>
4 To specify the syslog severity level to use for error messages, enter
the following command:
config sys syslog host <id> maperror <level>
5 To specify the syslog severity level to use for fatal messages, enter
the following command:
config sys syslog host <id> mapfatal <level>
—End—
Variable definitions
Variable Value
maperror <level> level is emergency, alert, critical,
error, warning, notice, info, or debug.
mapfatal <level> level is emergency, alert, critical,
error, warning, notice, info, or debug.
mapinfo <level> level is emergency, alert, critical,
error, warning, notice, info, or debug.
mapwarning <level> level is emergency, alert, critical,
error, warning, notice, info, or debug.
<id> A value from 1 to 10.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<id> A value from 1 to 10.
state <enable|disable> Enables or disables sending syslog
messages on the switch.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<id> A value from 1 to 10.
udp-port <port> port is the UNIX system syslog host
port number. The range is 514 to 530.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<id> A value from 1 to 10.
max-hosts <maxhost> maxhost is the maximum number of
enabled hosts allowed. The range is
1 to 10.
Procedure steps
Step Action
—End—
Monitoring ports
Monitor the links on a port and view port statistics.
Navigation
• "Monitoring how often a port goes down" (page 188)
• "Showing port statistics" (page 189)
• "Monitoring port statistics" (page 191)
• "Clearing statistics" (page 194)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
> General.
The Diagnostics dialog box appears.
2 Click the Link Flap tab.
The Link Flap tab appears.
Diagnostics, Link Flap tab
For information about the Link Flap fields, see the following variable
definitions table.
3 Select SendTrap.
4 Click Apply.
—End—
Variable definitions
Variable Value
AutoPortDownEnable Enables or disables the Link Flap Detect feature.
SendTrap Specifies whether or not a trap should be sent if the
port is forced out of service.
Frequency Specifies the number of times the port can go down.
The default is 10.
Interval Specifies the interval (in minutes). The default is 60.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
duration <integer> <integer> is an integer value with a
range of 1 to 1800 seconds.
interval <integer> <integer> is an integer value with a
range of 1 to 600 seconds.
"Monitor commands" (page 192) lists the monitor commands for ports
and MultiLink Trunking (MLT).
Monitor commands
monitor commands
monitor mlt error collision [<mid>]
monitor mlt error main [<mid>]
monitor mlt stats interface main [<mid>]
monitor mlt stats interface utilization [<mid>]
monitor ports error collision [<ports>] [from <value>]
monitor ports error extended [<ports>] [from <value>]
monitor ports error main [<ports>] [from <value>]
monitor ports stats bridging [<ports>] [from <value>]
monitor ports stats rmon [<ports>] [from <value>]
monitor ports stats stp [<ports>] [from <value>]
monitor commands
monitor ports stats interface extended [<ports>] [from
<value>]
monitor ports stats interface main [<ports>] [from <value>]
monitor ports stats interface utilization [<ports>] [from
<value>]
"Config cli monitor ports error collision command sample output" (page 194)
shows the results of this command.
Clearing statistics
To clear statistics from counters, flush entries from a table, or end a Telnet
session use the clear command.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
ports Specifies the ports for which you are
entering the command in the form
portlist {slot/port[-slot/port][, ..]}.
vlan id The vlan id is a value from 1 to
4095.
Procedure steps
Step Action
1 To clear ARP port entries from the ARP table, enter the following
command:
clear ip arp ports <port>
2 To clear ARP VLAN entries from the ARP table, enter the following
command:
clear ip arp vlan <vid>
—End—
Variable definitions
Variable Value
ports Specifies the ports for which you are
entering the command in the form
portlist {slot/port[-slot/port][, ..]}.
vlan <vid> The vlan <vid> is the VLAN ID.
Procedure steps
Step Action
1 To clear traffic statistics for all the access control entries or for the
specified entry, enter the following command:
clear filter acl statistics default [<acl-id>]
2 To clear port statistics for all the access control entries or for the
specified entry, enter the following command:
clear filter acl statistics port [<acl-id>]
—End—
Variable definitions
Variable Value
<acl-id> <acl-id> is a value from 1 to 4096.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
ports Specifies the ports for which you are
entering the command in the form
portlist {slot/port[-slot/port][, ..]}.
<vid> The <vid> is the VLAN ID. The valid
values are 0 to 255.
Procedure steps
Step Action
1 To clear IP VRRP statistics for the specified ports and virtual router,
enter the following command:
clear ip vrrp ports <ports> vrid <value>
2 To clear IP VRRP statistics for the specified VLAN and virtual router,
enter the following command:
—End—
Variable definitions
Variable Value
ports Specifies the ports for which you are
entering the command in the form
portlist {slot/port[-slot/port][, ..]}.
<value> The <value> specifies the virtual
router. The valid values are 0 to 255.
<vid> The <vid> is the VLAN ID. The valid
values are 1 to 4095.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
1 To clear port statistics from the switch counters, enter the following
command:
clear ports stats [<ports>]
—End—
Variable definitions
Variable Value
ports Specifies the ports for which you are
entering the command in the form
portlist {slot/port[-slot/port][, ..]}.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<session id> <session id> is a number between
0 and 7.
Navigation
• "Running a trace route test using Device Manager" (page 199)
• "Viewing trace route results using Device Manager" (page 201)
• "Viewing the trace route probe history using Device Manager" (page 203)
• "Tracing the route to a remote host using the CLI" (page 204)
• "Configuring an automatic trace using the CLI" (page 205)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
Ping/Trace Route.
2 Click the Trace Route Control tab.
The Trace Route Control tab appears.
Trace Route Control tab
3 In the Trace Route Control tab, click Insert and create an entry.
5 Click Start.
—End—
Variable definitions
Variable Value
OwnerIndex Provides access control by a security administrator
using the View-Based Access Control Model (VACM)
for tables in which multiple users may need to
independently create or modify entries.
TestName Specifies the name of the Trace Route test.
TargetAddressType Specifies the type of host address to be used on the
Trace Route request at the remote host.
TargetAddress Specifies the host address used on the Trace Route
request at the remote host.
ByPassRouteTable Using this field you can optionally enable bypassing of
the route table.
DataSize Specifies the size of the data portion of a Trace Route
request in octets.
TimeOut Specifies the timeout value, in seconds, for a Trace
Route request.
ProbesPerHop Specifies the number of times to reissue a Trace Route
request with the same time-to-live (TTL) value.
Port Specifies the UDP port to which you need to send the
Trace Route request.
MaxTtl Specifies the maximum time-to-live value.
DSField Specifies the value to store in the Differentiated
Services (DS) field in the IP packet used to encapsulate
the Trace Route probe.
SourceAddressType Specifies the type of the source address,
TraceRouteCtlSourceAddress, to be used at a remote
host when you perform a trace route operation.
SourceAddress Uses the specified IP address (which must be given as
an IP number, not a hostname) as the source address
in outgoing probe packets.
IfIndex Directs the Trace Route probes to be transmitted over
the specified interface
MiscOptions Enables an application to specify implementation-depe
ndent options.
MaxFailures Indicates the maximum number of consecutive
timeouts allowed before terminating a remote Trace
Route request.
Variable Value
DontFragment Enables setting of the don’t fragment flag (DF) in the IP
header for a probe.
InitialTtl Specifies the initial TTL value to use.
Frequency Specifies the number of seconds to wait before
repeating a trace route test as defined by the value of
the various objects in the corresponding row.
StorageType Specifies the storage type for this conceptual row.
AdminStatus Specifies the desired state that a TraceRouteCtlEntry
should be in. The options are:
• PathChange—Generate a TraceRoutePathChange
notification when the current path varies from a
previously determined path.
• TestFailure—Generate a TraceRouteTestFailed
notification when the full path to a target can’t be
determined.
• TestCompletion—Generate a TraceRouteTestCo
mpleted notification when the path to a target has
been determined.
Descr Describes the remote trace route test.
CreateHopsEntries Keeps the current path for a trace route test in the
TraceRouteHopsTable on a per hop basis when the
value of this object is true.
Type Reports or selects the implementation method to be
used for performing a trace route operation.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
Ping/Trace Route.
2 Click the Trace Route Control tab.
3 Click a field.
The Trace Route Result button is enabled
For information about the Trace Route Result fields, see the following
variable definitions table.
—End—
Variable definition
Variable Value
Ownerindex Specifies the index of the owner.
Testname Specifies the name of the test.
Operstatus Specifies the operational status of
the test. The default is disabled.
CurHopCount Specifies the current count of
hops.
CurProbeCount Specifies the current count of
probes.
IpTgtAddressType Specifies the IP target address
type
IpTgtAddr Specifies the IP target address.
TestAttempts Specifies the number of test
attempts.
Variable Value
TestSuccesses Specifies the number of
successful test attempts.
LastGoodPath Specifies the date and time when
the last response is received for
a probe.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
Ping/Trace Route.
For information about the Trace Route Probe History fields, see the
variable definitions table that follows this procedure.
—End—
Variable definitions
Variable Value
Ownerindex Identifies the Trace Route entry to
which a probe result belongs.
TestName The test name.
Index The Index.
HopIndex Indicates for which hop in a traceroute
path the probe results are intended.
ProbeIndex The index of a probe for a particular
hop in a traceroute path.
HAddrType The IP address type of the hop to
which this probe belongs.
Haddr The IP address of the hop to which
this probe belongs.
Response The cumulative results at any time.
Status The status of the probe.
LastRC When a new entry is added in the
ProbeHistoryTable, the old entry is
purged if the total number of entries
exceeds the specified maximum
number of entries in the Control Table
Entry
Time The response time of the probe.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
ipaddr Specifies the IP address of the remote
host.
datasize The size of the probe packet (1 to 1464).
-m <value> Specifies the maximum time-to-live (TTL)
value (1 to 255).
-p <value> Specifies the base UDP port number (0
to 65 535).
-q <value> Specifies the number of probes per TTL
(1 to 255).
-w <value> Specifies the wait time per probe (1 to
255).
-v Specifies the verbose mode (showing all).
Prerequisites
• The enabling or disabling of auto-trace is not saved to the configuration
file. When the MERS 8600 reboots, the auto-trace functionality is
disabled.
Procedure steps
Step Action
trace auto-enable
—End—
Enabling auto-trace
Use the following procedure to enable auto-trace. When you enable
auto-trace, central processing unit (CPU) utilization increase by up to 30
percent.
Procedure steps
Step Action
—End—
Adding a module
Use the following procedure to add a module to be traced or removed a
module from automatic tracing.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
level level identifies the level of detail
you want in the trace. For example,
0 = Disabled, 1 = Very Terse. For
a complete list of module IDs, enter
trace auto-enable add-module
?.
modid modid identifies the module that
you want to add or remove. For
example, 3 = Port Manager, 20 =
Topology Discovery. For a complete
list of module IDs, enter trace
auto-enable add-module ?.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
high-percentage <percent> percent is a value from 60 to 100.
The default is 90.
low-percentage <percent> percent is a value from 50 to 90.
The default is 75
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
seconds seconds is a value from 3 to 10. The
default is 5.
Ping snoop displays the route that IP traffic takes over an MLT or SMLT path.
Ping snoop works by using a filter that copies Internet Control Message
Protocol (ICMP) messages to the CPU. You create a ping snoop filter by
specifying a source and destination IP address. Then, you specify the ports
on which you want to enable ping snoop. Only one ping snoop filter is
Ping snoop uses one of the available global filters (0-7). If eight global filters
are configured on a port prior to enabling ping snoop, ping snoop cannot
be enabled for a port. You must remove at least one of the global filters
to enable ping snoop.
Ping snoop configurations are not saved to the configuration file and are
deleted when resetting the switch. In addition, your ping snoop configuration
is erased if you log off and then log on under a different security level
Navigation
• "Configuring ping snoop" (page 209)
Procedure steps
Step Action
2 To create a ping snoop filter you must enter two arguments, the
source IP address and the destination IP address. To create the
filter, enter the following command:
config diag ping-snoop create src-ip <value> dst-ip
<value>
3 To enable ping snoop to trace the route that IP traffic takes over an
MLT or SMLT path, enter the following command:
config diag ping-snoop enable true
4 To add ports to the ping snoop filter (after the filter is created), enter
the following command:
5 To display information about the ping snoop filter and the ports on
which it is applied, enter the following command:
config diag ping-snoop info
7 To remove the ping snoop filter from any ports that were added and
also delete the filter, enter the following command:
config diag ping-snoop delete
—End—
Variable definitions
Variable Value
add-ports <ports> ports specifies the port or range
of ports in the format slot/port
[-slot/port][,...] when you apply the
ping snoop filter
dst-ip <value> dst-ip value is the destination IP
address. This address can have one
of the following formats: a.b.c.d/x,
a.b.c.d/x.x.x.x, or default.
enable <true|false> Enables or disables the ping snoop
filter.
remove-ports <ports> portsis the port or range of ports to
remove from a ping snoop filter.
src-ip <value> src-ip value is the source IP
address. This address can have one
of the following formats: a.b.c.d/x,
a.b.c.d/x.x.x.x, or default.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
Ping/Trace Route and click the Ping Control tab.
The Ping Control dialog box appears.
Ping Control tab
7 In the remainder of the option boxes, type the desired values and
click Insert.
8 Select an entry in the Ping Control table.
The Ping Result, Ping Probe History, and Start buttons are activated.
9 To run a Ping test, click Start. Click Stop to stop the Ping test.
—End—
Variable definitions
Variable Value
OwnerIndex Provides access control by a security administrator
using the View-Based Access Control Model
(VACM) for tables in which multiple users may
need to independently create or modify entries.
This is a string of up to 32 characters.
TestName Specifies the name of the Ping test.
TargetAddressType Specifies the type of host address to be used at a
remote host to perform a ping operation.
TargetAddress Specifies the host address to be used at a remote
host to perform a ping operation.
DataSize Specifies the size of the data portion to be
transmitted in a ping operation in octets.
TimeOut Specifies the timeout value, in seconds, for a
remote ping operation.
ProbeCount Specifies the number of times to perform a ping
operation at a remote host.
AdminStatus Specifies the state of the ping control entry should
be in. Options are:
Variable Value
TrapGeneration Specifies the value of this object determines when
to generate a notification for this entry. The options
are:
• ProbeFailure—Generates a PingProbeFailed
notification subject to the value of
pingCtlTrapProbeFailureFilter. The object
pingCtlTrapProbeFailureFilter can be used to
specify the number of successive probe failures
that are required before a pingProbeFailed
notification can be generated.
• TestFailure—Generates a PingTestFailed
notification. In this instance the object
pingCtlTrapTestFailureFilter can be used to
determine the number of probe failures that
signal when a test fails.
• TestCompletion—Generates a
PingTestCompleted notification.
TrapProbeFailureFilter Specifies the number of successive probe failures
that are required before a pingProbeFailed
notification can be generated.
TrapTestFailureFilter Determines the number of probe failures that
signal when a test fails.
Descr Describes the remote ping test.
SourceAddress Specifies the IP address (which must be given in
numeric form, not as a hostname) as the source
address in outgoing probe packets.
ByPassRouteTable Enables optionally the bypassing of the route table.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
Ping/Trace Route and click the Ping Control tab.
The Ping Control dialog box appears.
—End—
Variable definitions
Variable Value
Ownerindex The owner index
Testname The name given to the test.
Index The index number.
Response The number of responses.
Status At what status the response stands.
LastRC The last time recorded.
Time The time taken to respond.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
and click the Ping tab.
The Ping dialog box appears.
Ping Result
For information about the Ping Result fields, see the following
variable definitions table.
—End—
Variable definitions
Variable Value
OwnerIndex The index of the owner.
TestName The test name.
OperStatus The operational status of the test. The default is
disabled.
IpTargetAddressType The IP address type of the target.
IpTargetAddress The IP address of the target.
MinRtt The minimum ping round-trip-time (RTT) received.
A value of 0 for this object means that no RTT is
received.
MaxRtt The maximum ping RTT received. A value of 0 for
this object means that no RTT is received.
AverageRtt The current average ping RTT.
ProbeResponses The number of responses for probes.
SentProbes The number of probes that are sent.
RttSumofSquares The sum of squares of all probes received.
LastGoodProbe The date and time when the last response is
received for a probe.
Prerequisites
• Test mode must be enabled to perform a loopback test; otherwise you
receive an error message.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
int|ext int|ext is a string length between 1
and 1536.
ports ports specifies the ports for which
you are entering the command in the
form port list {slot/port[-slot/port][, ...]}.
The following warning message appears when you perform a loopback test
using the test loopback command.
Navigation
• "Testing the switch fabric" (page 217)
• "Viewing address resolution statistics" (page 219)
• "Displaying address resolution table using the CLI" (page 222)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
> General.
The Diagnostics dialog box opens with the Test tab displayed
("Diagnostics dialog box, Test tab" (page 218)).
Diagnostics dialog box, Test tab
—End—
Variable definitions
Variable Value
Result The result of the most recently run (or current) test:
• none
• success
• inProgress
• notSupported
Variable Value
• unAbleToRun
• aborted
• failed
Code More specific information about the test result (for example, an
error code after a failed test):
• none
• NoReceive (timeout on a send)
• BadSeq (packets received out of sequence)
• BadLen (packet length mismatch)
• BadData (packet data mismatch)
PassCount The number of iterations of the test case that completed
successfully.
FailCount The number of iterations of the test case that failed.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
> General.
The Diagnostics dialog box appears.
2 Click the AR Stats tab.
The AR Stats tab appears.
—End—
Variable definitions
Variable Value
TblSize The size of the AR translation table.
Free The number of free entries that are available in
the AR translation table.
NoSpace The number of entries that were not added to the
AR translation table because of lack of space.
Added The number of entries added to the AR translation
table.
Deleted The number of entries deleted from the AR
translation table.
MacAdded The number of MAC entries added to the AR
translation table.
MacDeleted The number of MAC entries deleted from the AR
translation table.
MacMoved The number of MAC entries moved in the AR
translation table.
IpAdded The number of IP entries added to the AR
translation table.
IpDeleted The number of IP entries deleted from the AR
translation table.
McastTblSize The size of the Multicast AR translation table.
FreeMcastGroups The number of free multicast groups available in
the AR table.
IpMcastAdded The number of IP multicast entries added to the
AR table.
IpMcastDeleted The number of IP multicast entries deleted from
the AR table.
VlanByPortAdded The number of VLAN by Port entries added to
the AR table.
VlanByPortDeleted The number of VLAN by Port entries deleted from
the AR table.
VlanByProtocolAdded The number of VLAN by Protocol Type entries
added to the AR table.
VlanByProtocolDeleted The number of VLAN by Protocol Type entries
deleted from the AR table.
Variable Value
VlanByIpSubnetAdded The number of VLAN by IP Subnet entries added
to the AR table.
VlanByIpSubnetDeleted The number of VLAN by IP Subnet entries deleted
from the AR table.
IpSubnetsAdded The number of IP Subnet entries added to the AR
table.
IpSubnetsDeleted The number of IP Subnet entries deleted from
the AR table.
RsvpsAdded The number of Resource Reservation Setup
Protocol (RSVP) entries added to the AR table.
RsvpsDeleted The number of RSVP entries deleted from the AR
table.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
opid Specifies the octaPID assignment,
from 1 to 64.
For more information, see Configuring
Network Management (314723-E).
vlan|ip_subnet|mac_vlan|mac Specifies a record type in the address
|arp|ip|ipx|ipmc|ip_filter| resolution (AR) table.
protocol|sys_rec|all
verbosity Specifies the verbosity level, from 0
to 3. Higher numbers specify more
verbosity.
Navigation
• "Viewing topology status information" (page 224)
• "Viewing the MIB topology table" (page 225)
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics >
Topology and click the Topology tab.
The Topology dialog box appears (see "Topology tab" (page 224)).
Topology tab
For information about the Topology tab fields, see the following
variable definitions table.
2 Click Refresh.
—End—
Variable definitions
Variable Value
IpAddr The IP address of the device.
Status Indicates if Nortel topology is on or off for the device.
NmmLstChg The value of sysUpTime the last time an entry in
the network management MIB (NMM) topology table
was added, deleted, or modified, if the table has not
changed since the last cold or warm start of the agent.
NmmMaxNum The maximum number of entries in the NMM topology
table.
NmmCurNum The current number of entries in the NMM topology
table.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Edit > Diagnostics
and click the Topology Table tab.
The Topology Table tab appears (see "Topology Table tab" (page
225)).
Topology Table tab
For information about the Topology Table tab fields, see the following
variable definitions table.
—End—
Variable definitions
Variable Value
Slot The slot number in the chassis in which the topology
message was received.
Port The port on which the topology message was received.
IpAddr The IP address of the sender of the topology message.
SegId The segment identifier of the segment from which the
remote agent sent the topology message. This value is
extracted from the message.
MacAddr The MAC address of the sender of the topology
message.
ChassisType The chassis type of the device that sent the topology
message.
Variable Value
BkplType The backplane type of the device that sent the topology
message.
LocalSeg Indicates if the sender of the topology message is on
the same Ethernet segment as the reporting agent.
CurState The current state of the sender of the topology
message. The choices are:
Navigation
• "Configuring rapid ping using Device Manager" (page 227)
• "Enabling responses to pings in the data path using Device Manager"
(page 229)
Procedure steps
Step Action
1 From the Device Manager menu bar, select Rapid Ping > Ping.
The RapidPing dialog box appears.
RapidPing dialog box
—End—
Variable definitions
Variable Value
SrcIpAddr The configured source (or sending) IP address of the
test.
DestIpAddr The IP address of the destination (receiving) customer
router.
Variable Value
Mode The ESU mode: RTT or throughput
• RTT indicates that only one IP rapid ping packet is
sent, at a time, during the test session.
• throughput indicates that IP rapid ping packets
are sent out in the specified transmission interval
during the test session.
Variable Value
Action The action of the test. Options include:
• ready
• run—conducts the test
• delete—deletes the test
• stop—stops the test
Status The status of the test. Options include:
• running—the test is running
• finished—the test is complete
MinRTT The minimum round trip time (RTT), in milliseconds,
for the test packet.
For rapid ping results, the displayed RTT values
are round down to the nearest ten millisecond. For
example, if the minimum RTT is less than 10ms, then
the value t is displayed as 0ms.
MaxRTT The maximum round trip time (RTT), in milliseconds,
for the test packet.
For rapid ping results, the displayed RTT values
are round down to the nearest ten millisecond. For
example, if the maximum RTT is less than 10ms, then
the value t is displayed as 0ms.
AverageRTT The average round trip time (RTT), in milliseconds,
for the test packet.
LossPercent The packet loss percentage.
PktTx The number of test packets transmitted.
PktRx The number of test packets received.
PercentComplete The percentage of complete packets received.
DefaultGatewayIpAd The rapid ping session uses the DefaultGatewayIPAddr
dr as the destination IP or dest-ip-addr. This is the IP
address of the customer device within the subnet.
DefaultGatewayIpNe The destination network mask for the rapid ping
tMask session.
DefaultGatewayState Enables or disables the rapid ping gateway feature
on this ESU device.
Procedure steps
Step Action
1 From the Device Manager menu bar, select Rapid Ping > Response
to open the Rapid Ping Response dialog box.
2 Click the entry in the State column you want to modify to open the
list.
3 Select Enabled.
4 Click Apply.
—End—
Variable definitions
Field Description
State Enable or disable responses to rapid
ping on this ESU device.
SrcIpAddr The IP address that the ESU device
responding to the ping assumes.
SrcIpAddrNetMask The net mask for the device
responding to the ping.
CustVid The ID for the customer VLAN where
pings are received.
CustPort The customer port associated with
pings.
The following table provides possible combinations for the ESU , local or
remote rapid ping test types, and sequence of events between the ESU
and device ports.
Prerequisites
• The config rapid-ping and config rapid-ping-response
command sets are two different functions. You cannot use both
command sets at the same time.
Procedure steps
Step Action
1 To set the source IP address for the rapid ping test, enter the
following command:
config rapid-ping src-ip-addr <ipaddr>
—End—
Variable definitions
Variable Value
src-ip-addr <ipaddr> The IP address of the source (sending)
device, designated in a.b.c.d. format.
If the src-ip-addr of the source
device is outside the IP subnet, you
must add the default gateway.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
dest-ip-addr <ipaddr> The IP address of the destination
(receiving) device in the test;
designated in a.b.c.d format.
If the <ipaddr> of the destination
device is outside the IP subnet, you
must add the default-gateway.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
mode <rtt|throughput> The rapid ping mode.
<rtt|throughput> indicates two
mode choices; is the current rapid
ping mode; one of two choices. The
default value is rtt (round trip time).
rtt (Round Trip Time) means only
one IP rapid ping packet is sent at a
time during the test session. If, after a
specified timeout interval is reached
and no response is received, the
packet is considered lost and another
ping packet is sent.
throughput means IP rapid ping
packets are sent in a specified
transmission packet interval during
the test session.
The only difference in test results
is that RTT information (minimum,
maximum, and average) does not
display in throughput mode.
Variable Value
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
cust-port <port> The Ethernet Services Unit port
connected to the customer router that
forwards and receives test packets in
a rapid ping test.
The Ethernet Services Unit identifies
the network (customer) router port
that is pinged through the Ethernet
Services Unit. The Ethernet Services
Unit ring or stand-alone port is not
configured as the customer port.
Procedure steps
Step Action
1 To configure the customer VLAN ID for the rapid ping test, enter
the following command:
config rapid-ping cust-vid <vid>
—End—
Variable definitions
Variable Value
<cvid> The customer’s VLAN identification
information.
The customer VLAN ID is an integer
set in the range from 1 to 4094 or
4096; vid 4096 in Layer 2 mode is an
untagged test packet. (For Q-in-Q
mode, if cust-vid is 4096, the test
packet is not considered.)
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
cust-vid <vid> cust-vid is the customer’s VLAN
identification information.
The VLAN ID <vid> is an integer set
in the range from 1 to 4094 or 4096;
cust-vid 4096 in Layer 2 mode is an
untagged test packet.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
cust-port cust-port is the ESU port connected
to the customer router that forwards
and receives test packets. The ESU
identifies the network (customer)
router port that is being pinged. You
cannot configure the ESU ring or
stand-alone port as the customer
port. All test packets are forwarded
and received over the customer port
connection.
<port> <port> is an integer that identifies
the ESU port.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
cust-port The ESU port used to connect to the
customer device. All test packets
are forwarded and received over this
connection.
<port> <port> is an integer that identifies
the ESU port.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
pbit <value 0-7> The configured pbit value for the
tagged test packet.
Tagged test packet values are vid !=
4094 in ring and stand-alone and vid
!= 4096 in Layer 2 mode.
Variable Value
Procedure steps
Step Action
1 To configure the Ethernet packet size for the test, enter the following
command:
config rapid-ping pkt-size <value 64 - 1522>
—End—
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
pkt-cnt The configurable number of test
packets.
<value 1-10000> <value 1-10000> is the range of
values; the default value is 1.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
pkt-interval The time interval between test packets
sent.
<value 10-1000> 10-1000 is the range of values
measured in milliseconds (ms); the
default is 1000.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
<10-1000> 10-1000 is the range of values
measured in milliseconds (ms); the
default is 1000.
pkt-interval The time interval between test packets
sent.
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
timeout-interval <value The time interval, measured in
1-10> seconds, before rapid ping times out.
1-10 is the range of values; the
default is 3 seconds.
Procedure steps
Step Action
1 To run the configured rapid ping test, enter the following command:
config rapid-ping run
—End—
Procedure steps
Step Action
—End—
Examples
Example of setting up a local type rapid ping test
The following commands provide an example of setting up values for a
rapid ping test in a local environment:
config rapid-ping src-ip-addr 10.1.1.1
config rapid-ping dest-ip-addr 10.1.1.10
config rapid-ping type local
config rapid-ping mode default
config rapid-ping cust-vid 1
config rapid-ping pbit 5
config rapid-ping cust-port 5
config rapid-ping pkt-size 1522
config rapid-ping pkt-cnt 10000
config rapid-ping timeout-interval 3
Procedure steps
Step Action
—End—
Variable definitions
Variable Value
cust-port The ESU port used to connect to the
customer device. All test packets
are forwarded and received over this
connection.
<port> An integer that identifies the ESU port.
<vid> The customer’s VLAN identification
information.
Supported RFCs
The list of supported Request for Comments (RFCs) are outlined in the
following documents:
• For the Nortel Metro Ethernet Routing Switch 8600, see Release Notes
— Software Release 4.2 (NN46220-403).
• For the Nortel Metro Ethernet Services Unit 1850, see Release Notes
— Software Release 3.4.0.0 (NN46211-400).
• For the Nortel Metro Ethernet Services Unit 1800, see Release Notes
— Software Release 3.4.0.0 (NN46210-400).
Navigation
• "Gathering critical information" (page 249)
• "Getting Help from the Nortel Web site" (page 250)
• "Getting help over the phone from a Nortel Solutions Center" (page 250)
• "Getting help from a specialist by using an Express Routing Code"
(page 251)
• "Getting help through a Nortel distributor or reseller" (page 251)
Outside North America, go to the following Web site to obtain the phone
number for your region:
www.nortel.com/callus
www.nortel.com/erc
Troubleshooting configuration
examples
This section provides examples of port mirroring and ping snoop
configuration tasks, including the CLI commands and Device Manager
procedures you use to create the configuration.
This section describes the following topics:
• Configuring port mirroring on an R module using the CLI
• Configuring port mirroring on an R module using Device Manager
• Configuring remote port mirroring on a legacy module using the CLI
• Configuring ping snoop on R modules
Creating an ACT
Create a new access control table to filter on ICMP frames and TCP dst-port
Procedure steps
Step Action
4 Enable ACT 2
MERS-8610:5# config filter act 2 apply
—End—
Creating ACL 1
Use the following procedure to create ACL 1.
Procedure steps
Step Action
—End—
Procedure steps
Step Action
—End—
Creating an ACT
Use the following procedure to create a new access control table to filter
on ICMP frames and TCP dst-port.
Procedure steps
Step Action
1 From the Device Manager menu bar, choose Security > Data Path
> Advanced Filters (ACE/ACLs).
The following message appears: "Note: Filter configuration of R
modules only."
2 Click Ok.
The ACL dialog box appears with the ACT tab visible.
3 Click Insert.
See the following figure.
ACL, Insert ACT
9 In the ACT tab of the ACL dialog box, double-click the Apply column
entry for ACT-2, and select True.
—End—
Creating an ACL
Use the following procedure to create an ACL.
Procedure steps
Step Action
2 Click Insert.
The ACL, Insert ACL dialog box appears (ACL, Insert ACL dialog
box).
ACL, Insert ACL dialog box
6 In the Name box, if the name ACL-1 does not appear, type it.
7 Click Insert.
—End—
Procedure steps
Step Action
Configure ACE 1
2 Click ACE.
The ACE, ACL1 dialog box appears with the ACE Common tab
visible.
3 Click Insert.
The ACE, ACL1, Insert ACE Common dialog box opens (Insert ACE
Common).
8 Click Insert.
10 Click IP.
11 Click Insert.
The Insert Protocol dialog box appears.
14 Click Insert.
—End—
Procedure steps
Step Action
Configure ACE 2
8 Click AceId 2.
The IP button is activated.
9 Click IP.
10 Click Insert.
The Insert Protocol dialog box appears.
11 From the Oper options, select eq.
13 Click Insert.
—End—
Procedure steps
Step Action
Add TCP port range
6 Click Insert.
—End—
Procedure steps
Step Action
Enable ACEs and port mirroring
5 From the Device Manager menu bar, choose Edit > Diagnostics.
The Diagnostics dialog box appears with the Test tab visible.
13 Click Insert.
—End—
Configuring S3
Use the following procedure to configure port mirroring on switch S3.
Procedure steps
Step Action
2 Add the RMT ports and the port through which remote mirrored
packets enter the switch for VLAN 10:
MERS-8610_3:5# config vlan 10 ports add 1/15,2/8
3 Add the VLAN to the RMT Ethernet port, in this example port 1/15:
MERS-8610:5# config ethernet 1/15 remote-mirroring
create
MERS-8610_3:5# config ethernet 1/15 remote-
mirroring add-vlan-id 10
MERS-8610_3:5# config ethernet 1/15 remote-
mirroring mode termination
4 Get the destination MAC address of the RMT port. This is required
to configure RMS in the other switches:
MERS-8610_3:5# config ethernet 1/15 remote-
mirroring info
—End—
Configuring S1
Use the following procedure to configure port mirroring on switch S1.
Procedure steps
Step Action
3 Create port mirroring with RMS as the destination port and add
VLAN 10. The source port is the port from which packets must be
remotely mirrored:
MERS-8610_1:5# config diag mirror-by-port 1 create
in-port 1/15 out-port 1/1 mode rx enable true
remote-mirror-vlan-id 10
4 Add the destination MAC for remote mirroring to the RMS port.
This is the destination MAC address of the RMT port from switch
MERS8600-3:
MERS-8610_1:5# config ethernet 1/1 remote-mirroring
create
MERS-8610_1:5# config ethernet 1/1 remote-mirroring
dstmac 00:e0:7b:82:9d:9c
5 Enable RMS:
MERS-8610:5# config ethernet 1/1 remote-mirroring
enable true
—End—
Configuring S2
Use the following procedure to configure port mirroring on switch S2.
Procedure steps
Step Action
1 Create VLAN 10
MERS-8610_2:5# config vlan 10 create byport 1
—End—
You can use your own ACT, ACL, and ACE instead, but you are duplicating
the ACT, ACL, and ACE that the system predefines.
You can set the source IP address or the destination IP address, or both.
Enable the ACE. You can use the info and port info commands to
verify your configuration.
Procedure steps
Step Action
Configure the ACL and ACE
1 From the Device Manager menu bar, choose Security > Data Path
> Advanced Filters (ACE/ACLs).
The following message appears: Note: Filter configuration of R
modules only.
2 Click Ok.
8 Click Insert.
The ACE, ACL 4096, Insert ACE Common dialog box appears.
9 In the AceId box, type 1.
13 Click Insert.
—End—
Procedure steps
Step Action
Configure IP addresses and enable ACE
1 Click ACE 1.
The IP button is activated.
2 Click IP.
The ACE, ACL 4096, ACE1 dialog box appears with the Source
Address tab visible.
3 Click Insert.
The IP, ACL 4096, Insert Source Address dialog box appears.
6 Click Insert.
7 In the ACE, ACL 4096, ACE1 dialog box, click the Destination
Address tab.
8 Click Insert.
The IP, ACL 4096, ACE1—Insert Destination Address dialog box
appears.
11 Click Insert.
13 In the ACL dialog box, double-click the State box for the IP
Ping-Snoop ACL, and select enable.
14 Click Apply.
—End—
Diagnostics reference
This section contains reference material you can use when you perform
diagnostics on the Metro Ethernet Routing Switch 8600.
Navigation
• Special terminal characters reference
• Edit mode commands reference
• Port numbering and MAC address assignment reference
• Trap error messages reference
• Tap and OctaPID assignment reference
Port numbering
A port number includes the slot location of the module in the chassis, as
well as the port’s position in the I/O module. In the 8600 switches, slots are
numbered from top to bottom. 8010 chassis slots shows slot numbering
for an 8010 chassis.
Ports are numbered generally from left to right beginning with 1 for the far
left port. On high-density modules with two rows of ports, such as the
8648TX module, ports in the top row are assigned sequential odd numbers,
and ports in the bottom row are assigned sequential even numbers (Port
numbers on high-density modules).
Interface indexes
Interface indexes are used in Simple Network Management Protocol (SNMP)
to identify ports, Virtual Local Area Networks (VLAN), and Multi-Link Trunks.
The interface index of a port is computed using the following formula:
inIndex = (64 x slot number) + (port number – 1)
where
For example, the interface index of port 1/1 is 64, and the interface index
of port 10/48 is 687.
where
Because the default VLAN always has an MGID value of 1, its interface
index is always 2049.
The interface index for tunnels was introduced in Release 4.1. The range is
4352-4451.
The interface index for a tunnel is computed using the following formula:
BPDUs are sent using the physical MAC address as the source because
identifying which physical port sent the BPDU is critical to how the Spanning
Tree Protocol works.
The ports on the switch fabric or the CPU module have the following last
bytes:
• management port in slot 5: 0xf4
• CPU port (an internal port) in slot 5: 0xf5
• management port in slot 6: 0xf6
• CPU port in slot 6: 0xf7
• virtual management IP address: 0xf8
OID 1.3.6.1.4.1.2272.1.21.0.1
Notification type rcnCardDown
OID 1.3.6.1.4.1.2272.1.21.0.2
Notification type rcnCardUp
Objects rcCardIndex, rcCardAdminStatus, rcCardOperStatus
current
Status current
Description A rcCardUp trap signifies that the SNMPv2 entity,
acting in an agent role, has detected that the
rcCardOperStatus object for one of its cards is about to
transition into the up state.
OID 1.3.6.1.4.1.2272.1.21.0.3
Notification type rcnErrorNotification
Objects rcErrorLevel, rcErrorCode, rcErrorText
Status current
Description A rcErrorNotification trap signifies that the SNMPv2
entity, acting in an agent role, has detected that an
error condition has occurred.
OID 1.3.6.1.4.1.2272.1.21.0.4
Notification type rcnStpNewRoot
Objects rcStgId
Status current
Description A rcStpNewRoot trap signifies that the SNMPv2 entity,
acting in an agent role, has detected the Spanning
Tree Protocol (STP), and has declared the device to
be the new root of the spanning tree.
OID 1.3.6.1.4.1.2272.1.21.0.5
Notification type rcnStpTopologyChange
Objects rcStgId, rcPortIndex
Status current
Description A rcStpTopologyChange trap signifies that the
SNMPv2 entity, acting in an agent role, has detected
that the Spanning Tree Protocol has gone due to a
topology change event.
OID 1.3.6.1.4.1.2272.1.21.0.6
Notification type rcnChasPowerSupplyDown
Objects rcChasPowerSupplyId, rcChasPowerSupplyOperSta
tus
Status current
Description A rcChasPowerSupplyDown trap signifies that the
rcChasPowerSupplyOperStatus object for one of its
power supply units is about to transition into the down
state.
OID 1.3.6.1.4.1.2272.1.21.0.7
Notification type rcnChasFanDown
Objects rcChasFanId, rcChasFanOperStatus
Status current
Description A rcChasFanDown trap signifies that the SNMPv2
entity, acting in an agent role, has detected that the
rcChasFanOperStatus object for one of its power
supply units is about to transition into the down state.
OID 1.3.6.1.4.1.2272.1.21.0.8
Notification type rcnLinkOscillation
Objects rcPortIndex
Status current
Description A rcLinkOscillation trap signifies that the SNMPv2
entity, acting in an agent role, has transitions on the
specified port.
OID 1.3.6.1.4.1.2272.1.21.0.9
Notification type rcnMacViolation
Objects rcErrorText, rcPortIndex
Status current
Description A rcMacViolation trap signifies that the SNMPv2 entity,
acting in an agent role, has received a Protocol Data
Unit (PDU) with an invalid source Medium Access
Control (MAC) address.
OID 1.3.6.1.4.1.2272.1.21.0.10
Notification type rcnSonetTrap
Objects rcPortIndex, rcPosSonetTrapType, rcPosSonetTrapI
ndication
Status current
Description A rcSonetTrap trap signifies that the SNMPv2 entity,
acting in an agent role, has detected a change of status
on a Sonet port.
OID 1.3.6.1.4.1.2272.1.21.0.11
Notification type rcn2kCardDown
Objects rc2kCardIndex, rc2kCardFrontAdminStatus,
rc2kCardFrontOperStatus
Status current
Description A rc2kCardDown trap signifies that the SNMPv2
entity, acting in an agent role, has detected that the
rcCardOperStatus object for one of its cards is about to
transition into the down state.
OID 1.3.6.1.4.1.2272.1.21.0.12
Notification type rcn2kCardUp
Objects rc2kCardIndex, rc2kCardFrontAdminStatus,
rc2kCardFrontOperStatus
Status current
Description A rc2kCardUp trap signifies that the SNMPv2
entity,acting in an agent role, has detected that the
rcCardOperStatus object for one of its cards is about to
transition into the up state.
OID 1.3.6.1.4.1.2272.1.21.0.13
Notification type rcn2kTemperature
Objects rc2kChassisTemperature
Status current
Description A rc2kTemperature trap signifies that the
SNMPv2entity, acting in an agent role, has detected
the chassis is overheating.
OID 1.3.6.1.4.1.2272.1.21.0.14
Notification type rcnChasPowerSupplyUp
Objects rcChasPowerSupplyId, rcChasPowerSupplyOperSta
tus
Status current
Description A rcChasPowerSupplyUp trap signifies that the
SNMPv2 entity, acting in an agent role, has detected
that the rcChasPowerSupplyOperStatus object for one
of its power supply units is about to transition into the
up state.
OID 1.3.6.1.4.1.2272.1.21.0.15
Notification type rcn2kAtmPvcLinkStateChange
Objects rc2kAtmPvcIfIndex, rc2kAtmPvcVpi, rc2kAtmPvcVci,
rc2kAtmPvcOamVcStatus
Status current
Description A rc2kAtmPvcLinkStateChange trap signifies that the
SNMPv2 entity, acting in an agent role, has detected
that the rc2kAtmPvcOamVcStatus object for one of the
PVCs is about to transition into a different state, either
from up to down, or from down to up.
OID 1.3.6.1.4.1.2272.1.21.0.16
Notification type rcnStpTCN
Objects rcStgId, rcPortIndex, rcStgBridgeAddress
Status current
Description A rcStpTCN trap signifies that the SNMPv2 entity,
acting in an agent role, has detected the Spanning Tree
Protocol has gone due to a topology change event.
OID 1.3.6.1.4.1.2272.1.21.0.17
Notification type rcnSmltIstLinkUp
Objects
Status current
Description A rcSmltIstLinkUp trap signifies that the Split Multi-Link
Trunk (SMLT) link is from down to up.
OID 1.3.6.1.4.1.2272.1.21.0.18
Notification type rcnSmltIstLinkDown
Objects
Status current
Description A rcSmltIstLinkDown trap signifies that the SMLT link
is from up to down.
OID 1.3.6.1.4.1.2272.1.21.0.19
Notification type rcnSmltLinkUp
Objects rcMltSmltId
Status current
Description A rcnSmltLinkUp trap signifies that the SMLT link is up.
OID 1.3.6.1.4.1.2272.1.21.0.20
Notification type rcnSmltLinkDown
Objects rcMltSmltId
Status current
Description A rcnSmltLinkDown trap signifies that the SMLT link
is down.
OID 1.3.6.1.4.1.2272.1.21.0.21
Notification type rcnChasFanUp
Objects rcnChasFanUp
Status current
Description A rcChasFanUp trap signifies that the SNMPv2
entity, acting in an agent role, has detected that the
rcChasFanOperStatus object for one of its power
supply units is about to transition into the up state.
OID 1.3.6.1.4.1.2272.1.21.0.22
Notification type rcnPasswordChange
Objects rc2kCardIndex, rcChasEmModeError
Status current
Description A rcPasswordChange trap signifies that the SNMPv2
entity, acting in an agent role, has detected that one of
the cli passwords has changed.
OID 1.3.6.1.4.1.2272.1.21.0.23
Notification type rcnEmError
Objects rc2kCardIndex, rcChasEmModeError
Status current
Description A rcEmError trap signifies that the SNMPv2 entity,
acting in an agent role, has detected an Em error.
OID 1.3.6.1.4.1.2272.1.21.0.25
Notification type rcnPcmciaCardRemoved
Objects
Status current
Description A rcPcmciaRemoved trap signifies that the SNMPv2
entity, acting in an agent role, has detected that
the Personal Computer Memory Card International
Association (PCMCIA) or (PC) card is being removed.
OID 1.3.6.1.4.1.2272.1.21.0.26
Notification type rcnSmartCpldTimerFired
Objects rc2kCardIndex
Status current
Description A rcSmartCpldTimerFired trap signifies that the CPLD
timer fired.
OID 1.3.6.1.4.1.2272.1.21.0.27
Object type rcnCardCpldNotUpDate
Objects rc2kCardIndex
Status current
Description A rcCardCpldNotUpDate trap signifies that the cpld is
not up to date.
OID 1.3.6.1.4.1.2272.1.21.0.28
Notification type rcnIgapLogFileFull
Objects
Status current
Description A rcIgapLogFileFull trap signifies that the Igap
accounting time-out log file has reached the maximum
size.
OID 1.3.6.1.4.1.2272.1.21.0.29
Notification type rcnCpLimitShutDown
Objects rcPortIndex, ifAdminStatus, ifOperStatus,
rcPortCpLimitShutDown
Status current
Description A rcCpLimitShutDown trap signifies that the CP limit for
the port is shutting down.
OID 1.3.6.1.4.1.2272.1.21.0.30
Notification type rcnSshServerEnabled
Objects
Status current
Description A rcSshServerEnabled trap signifies that the Secure
Shell (SSH) server is enabled.
OID 1.3.6.1.4.1.2272.1.21.0.31
Notification type rcnSshServerDisabled
Objects rcSshGlobalPort
Status current
Description A rcSshServerDisabled trap signifies that the SSH
server is disabled.
OID 1.3.6.1.4.1.2272.1.21.0.32
Notification type rcnSshSessionLogin
Objects rcSshGlobalHostIpAddr
Status current
Description A rcSshSessionLogin trap signifies that there is an
SSH session login.
OID 1.3.6.1.4.1.2272.1.21.0.33
Notification type rcnSshSessionLogout
Objects rcSshGlobalHostIpAddr
Status current
Description A rcSshSessionLogout trap signifies that there is an
SSH session logout
OID 1.3.6.1.4.1.2272.1.21.0.34
Notification type rcnSshUnauthorizedAccess
Objects rcnSshUnauthorizedAccess
Status current
Description A rcSshUnauthorizedAccess trap signifies that an
unauthorized access has occurred.
OID 1.3.6.1.4.1.2272.1.21.0.35
Notification type rcnHaCpuState
Objects rc2kCardIndex, rcL2RedundancyHaCpuState
Status current
Description A rcHaCpuState trap signifies the state of the High
Availability (HA)-CPU.
OID 1.3.6.1.4.1.2272.1.21.0.36
Notification type rcnInsufficientMemory
Objects rc2kCardIndex
Status current
Description A rcInsufficientMemory trap indicates insufficient
memory on the CPU blade for proper operation. The
recommended memory is 256 MB, available through
the Nortel upgrade kit.
OID 1.3.6.1.4.1.2272.1.21.0.37
Notification type rcnSaveConfigAction
Objects rcSysActionL1
Status current
Description A rcSaveConfigAction trap indicates that the switch
run-time or boot configuration is being saved.
OID 1.3.6.1.4.1.2272.1.21.0.38
Notification type rcnLoopDetectOnPort
Objects rcVlanId, rcPortIndex
Status current
Description A rcLoopDetectOnPort trap indicates that a loop has
been detected on a port. The VLAN on that port will
be disabled.
OID 1.3.6.1.4.1.2272.1.21.0.39
Notification type rcnbgpEstablished
Objects rcIpBgpPeerIpAddress, rcIpBgpPeerLastError,
rcIpBgpPeerState
Status current
Description The rcnbgpEstablished event is generated when the
Border Gateway Protocol (BGP) Full Screen Mode
(FSM) enters the ESTABLISHED state.
OID 1.3.6.1.4.1.2272.1.21.0.40
Notification type rcnbgpBackwardTransition
Objects rcIpBgpPeerIpAddress, rcIpBgpPeerLastError,
rcIpBgpPeerState
Status current
Description The rcnbgpBackwardTransition Event is generated
when the BGP FSM moves from a higher numbered
state to a lower numbered state.
OID 1.3.6.1.4.1.2272.1.21.0.41
Notification type rcnAggLinkUp
Objects rcMltId
Status current
Description A rcAggLinkUp trap is generated when the operational
state of the aggregator changes from down to up.
OID 1.3.6.1.4.1.2272.1.21.0.42
Notification type rcnAggLinkDown
OID rcMltId
Status current
Description A rcAggLinkDown trap is generated when the
operational state of the aggregator changes from up
to down.
OID 1.3.6.1.4.1.2272.1.21.0.43
Notification type rcnIgmpNewGroupMember
Objects rcIgmpGroupIfIndex, rcIgmpGroupIpAddress,
rcIgmpGroupInPort, rcIgmpGroupMembers
Status current
Description An IgmpNewGroupMember trap signifies that a new
member has come on an interface.
OID 1.3.6.1.4.1.2272.1.21.0.44
Notification type rcnIgmpLossGroupMember
Objects rcIgmpGroupMembers,rcIgmpGroupIpAddress,
rcIgmpGroupInPort,rcIgmpGroupIfIndex
Status current
Description An IgmpLossGroupMember trap signifies that a group
member has been lost on an interface.
OID 1.3.6.1.4.1.2272.1.21.0.45
Notification type rcnIgmpNewQuerier
OID igmpInterfaceIfIndex,igmpInterfaceQuerier
Status current
Description An igmpNewQuerier trap signifies that a new querier
has come up on an interface.
OID 1.3.6.1.4.1.2272.1.21.0.46
Notification type rcnIgmpQuerierChange
Objects igmpInterfaceIfIndex, rcIgmpInterfaceExtnNewQuer
ier,igmpInterfaceQuerier
Status current
Description An rcIgmpQuerierChange trap signifies that the querier
has changed.
OID 1.3.6.1.4.1.2272.1.21.0.47
Notification type rcnDvmrpIfStateChange
Objects dvmrpInterfaceIfIndex, dvmrpInterfaceOperState
Status current
Description A rcDvmrpIfStateChange trap signifies that there
has been a change in the state of a Distance Vector
Multicast Routing Protocol (DVMRP) interface.
OID 1.3.6.1.4.1.2272.1.21.0.48
Notification type rcnDvmrpNewNbrChange
Objects dvmrpNeighborIfIndex, dvmrpNeighborAddress
Status current
Description A rcDvmrpNewNbrChange trap signifies that a new
neighbor has come up on a DVMRP interface.
OID 1.3.6.1.4.1.2272.1.21.0.49
Notification type rcnDvmrpNbrLossChange
Objects dvmrpNeighborIfIndex, dvmrpNeighborAddress
Status current
Description A rcDvmrpNbrLossChange trap signifies that a new
neighbor has gone down on a DVMRP interface.
OID 1.3.6.1.4.1.2272.1.21.0.59
Notification type rcnFdbProtectViolation
Objects rcPortIndex, rcVlanId
Status current
Description The rcFdbProtectViolation trap signifies that the has
violated the user-configured limit for total number of
Forwarding Database (FDB) entries learned on that
port.
OID 1.3.6.1.4.1.2272.1.21.0.60
Notification type rcnLogMsgControl
Objects rcSysMsgLogFrequency, rcSysMsgLogText
Status current
Description A rcMsgControl trap signifies whether the number of
repetitions of the particular log message has exceeded
the particular frequency/count.
OID 1.3.6.1.4.1.2272.1.21.0.61
Notification type rcnSaveConfigFile
Objects rcSysActionL1, rcSysConfigFileName
Status current
Description A rcSaveConfig trap signifies that either the runtime
configuration or the boot configuration has been saved
on the switch.
OID 1.3.6.1.4.1.2272.1.21.0.62
Notification type rcnDNSRequestResponse
Objects rcSysDnsServerListIpAddr, rcSysDnsRequestType
Status current
Description A rcDnsRequestResponse trap signifies that the
switch sent a query to the DNS server or it received a
successful response from the DNS server.
OID 1.3.6.1.4.1.2272.1.21.0.63
Notification type rcnDNSRequestResponse
Objects ipNetToMediaNetAddress,ipNetToMediaPhysAddress
Status current
Description A rcDuplicateIpAddress trap signifies that a duplicate
IP address is detected on the subnet.
OID 1.3.6.1.4.1.2272.1.21.0.64
Notification type rcnLoopDetectPortDown
Objects rcPortIndex,ifAdminStatus,ifOperStatus
Status current
Description A rcLoopDetectPortDown trap signifies that a loop has
been detected on a port, and the port is going to shut
down.
OID 1.3.6.1.4.1.2272.1.21.0.67
Notification type rcnLoopDetectMacDiscard
Objects rcPortIndex, rcSysMacFlapLimitTime, rcSysMacFlapLi
mitCount
Status current
Description A rcLoopDetectMacDiscard trap signifies that a loop
has been detected on a port, and the MAC address will
be discarded on all ports in that VLAN.
OID 1.3.6.1.4.1.2272.1.21.0.68
Notification type rcnAutoRecoverPort
Objects rcPortIndex
Status current
Description A rcnAutoRecoverPort trap signifies that autorecover
has reenabled a port disabled by link flap or cp limit.
OID 1.3.6.1.4.1.2272.1.21.0.69
Notification type rcnAutoRecoverLoopDetectedPort
Objects rcVlanNewLoopDetectedAction
Status current
Description A rcnAutoRecoverPort trap signifies that autorecover
has cleared the action taken on a port by loop detect.
OID 1.3.6.1.4.1.2272.1.21.0.70
Notification type rcnExtCpLimitShutDown
OID 1.3.6.1.4.1.2272.1.21.0.71
Notification type rcnExtCpLimitSopCongestion
Objects rcSysExtCplimitSysOctapidCongested, rcSysExtCpl
imitPortsMonitored
Status current
Description A rcnExtCpLimitSopCongestion signifies whether the
system OctaPID polling finds that the system OctaPID
is congested. rcSysExtCplimitSysOctapidCongested
signifies whether the system OctaPID is congested.
rcSysExtCplimitPortsMonitored signifies whether ports
are selected for monitoring the ingress traffic utilization.
OID 1.3.6.1.4.1.2272.1.21.0.80
Notification type rcnVlacpPortDown
Objects rcPortIndex
Objects current
Description A rcnVlacpPortDown trap signifies that the Virtual Link
Aggregate Control Protocol (VLACP) is down on the
port specified.
OID 1.3.6.1.4.1.2272.1.21.0.81
Notification type rcnVlacpPortUp
Objects rcPortIndex
Status current
Description A rcnVlacpPortUp trap signifies that the VLACP is up
on the port specified.
OID 1.3.6.1.4.1.2272.1.21.0.82
Notification type rcnExtCpLimitShutDownNormal
Objects
Status current
Description An rcnExtCpLimitShutDownNormal trap signifies that
ports are shut down due to extended CP-Limit in
Normal mode.
OID 1.3.6.1.4.1.2272.1.21.0.83
Notification type rcnEapMacIntrusion
Objects rcSysIpAddr, rcRadiusPaePortNumber,
rcRadiusEapLastAuthMac, rcRadiusEapLastRejMac
Status current
Description A rcnEapMacIntrusion trap signifies that an Extensible
Authentication Protocol (EAP) MAC intrusion has
occurred on this port.
OID 1.3.6.1.4.1.2272.1.21.0.84
Notification type rcnInterCpuCommStatus
Objects rc2kCardIndex, rcCardOperStatus
Status Current
Description A rcnInterCpuCommStatus trap signifies the current
communication status between primary and secondary
CPU.
OID 1.3.6.1.4.1.2272.1.50.2.1
Object type rcWisSonetTrapType
Syntax Integer
sectionAlarm 1
lineAlarm 2
pathAlarm 3
Max-access read-only
Status current
Description Used to indicate a particular type of 10GE Sonet trap.
OID 1.3.6.1.4.1.2272.1.50.2.2
Object type rcWisSonetTrapIndication
Syntax Integer
noDefect 1
sectionLossOfSignal 2
sectionLossOfFrame 3
lineAlarmIndication 4
lineRemoteDefectIndication 5
pathLossOfPointer 6
pathAlarmIndication 7
pathRemoteDefectIndication 8
pathUnequipped 9
pathSignalLabelMismatch 10
pathTraceMismatch 11
Max-access read-only
Status current
Description Used to indicate an indication for a 10GE Sonet trap.
OID 1.3.6.1.4.1.2272.1.64.1.0.1
Notification type rcnSlppPortDownEvent
Objects rcSlppPortSlppEnable, rcSlppVlanSlppEnable,
rcSlppIncomingVlanId, rcSlppSrcMacAddress
Status current
Description A port down event that has occurred due to Simple
Loop Protection Protocol (SLPP). The user is notified
of the expected Vlan ID along with the Vlan ID and
source MAC address of the packet coming in on the
port identified. The first two objects can be used to look
up instance information for port ID and VLAN ID.
Standard traps
OID 1.3.6.1.6.3.1.1.5.1
Notification type coldStart
Objects
Status current
Description A coldStart trap signifies that the SNMPv2 entity,
acting in an agent role, is reinitializing itself and that its
configuration may have been altered.
OID 1.3.6.1.6.3.1.1.5.2
Notification type warmStart
Objects
Status current
Description A warmStart trap signifies that the SNMPv2 entity,
acting in an agent role, is reinitializing itself such that
its configuration is unaltered.
OID 1.3.6.1.6.3.1.1.5.3
Trap type linkUp
Enterprise snmp
Variables ifIndex
Description A linkUp trap signifies that the sending protocol entity
recognizes a failure in one of the communication links
represented in the agent’s configuration.
OID 1.3.6.1.6.3.1.1.5.4
Trap type linkUp
Enterprise snmp
Variables ifIndex
Description A linkUp trap signifies that the sending protocol
entity recognizes that one of the communication links
represented in the agent’s configuration has come up.
OID 1.3.6.1.6.3.1.1.5.5
Notification type authenticationFailure
Objects
Status current
Description An authenticationFailure trap signifies that the SNMPv2
entity, acting in an agent role, has received a protocol
message that is not properly authenticated. While all
implementations of the SNMPv2 must be capable of
generating this trap, the snmpV2EnableAuthenTraps
object indicates whether this trap is generated.
OID 1.3.6.1.2.1.14.16.2.1
Notification type ospfVirtIfStateChange
Objects ospfRouterId (the originator of the trap),
ospfVirtIfAreaId, ospfVirtIfAreaId, ospfVirtIfNeighbor,
ospfVirtIfState (the new state)
Status current
Description An ospfIfStateChange trap signifies that there is a
change in the state of an Open Shortest Path First
(OSPF) virtual interface.This trap is generated when
the interface state regresses (for example, goes from
Point-to-Point to Down) or progresses to a terminal
state (that is, Point-to-Point).
OID 1.3.6.1.2.1.14.16.2.2
Notification type ospfNbrStateChange
Objects ospfRouterId (the originator of the trap), ospfNbrIpAddr,
ospfNbrAddressLessIndex, ospfNbrRtrId, ospfNbrState
(the new state)
Status current
Description An ospfNbrStateChange trap signifies that there is a
change in the state of a nonvirtual OSPF neighbor.
This trap is generated when the neighbor state
regresses (for example, goes from Attempt or Full to
1-Way or Down) or progresses to a terminal state (for
example, 2-Way or Full). When a neighbor transitions
from or to Full on non-broadcast, multi-access, and
broadcast networks, the trap is generated by the
designated router. A designated router transitioning to
Down is noted by ospfIfStateChange.
OID 1.3.6.1.2.1.14.16.2.3
Notification type ospfVirtNbrStateChange
Objects ospfRouterId (the originator of the trap),
ospfVirtNbrArea, ospfVirtNbrRtrId, ospfVirtNbrState
(the new state)
Status current
Description An ospfIfStateChange trap signifies that there has been
a change in the state of an OSPF virtual neighbor. This
trap is generated when the neighbor state regresses
(for example, goes from Attempt or Full to 1-Way or
Down) or progresses to a terminal state (for example,
Full).
OID 1.3.6.1.2.1.14.16.2.4
Notification type ospfIfConfigError
Objects ospfRouterId (the originator of the trap),
ospfIfIpAddress, ospfAddressLessIf,ospfPacketSrc
(the source IP address), ospfConfigErrorType (type
of error, ospfPacketType)
Status current
Description An ospfIfConfigError trap signifies that a packet has
been received on a nonvirtual interface from a router
whose configuration parameters conflict with this
router configuration parameters. Note that the event
optionMismatch causes a trap only if it prevents an
adjacency from forming.
OID 1.3.6.1.2.1.14.16.2.5
Notification type ospfVirtIfConfigError
Objects ospfRouterId (the originator of the trap), ospfVirtIfAre
aId, ospfVirtIfNeighbor, ospfConfigErrorType (type of
error), ospfPacketType
Status current
Description An ospfConfigError trap signifies that a packet has
been received on a virtual interface from a router
whose configuration parameters conflict with this
router configuration parameters. Note that the event
optionMismatch causes a trap only if it prevents an
adjacency from forming.
OID 1.3.6.1.2.1.14.16.2.6
Notification type ospfIfAuthFailure
Objects ospfRouterId (the originator of the trap),
ospfIfIpAddress, ospfAddressLessIf, ospfPacketSrc
(the source IP address), ospfConfigErrorType
(authTypeMismatch or authFailure, ospfPacketType)
Status current
Description An ospfIfAuthFailure trap signifies that a packet
has been received on a nonvirtual interface from a
router whose authentication key or authentication
type conflicts with this router authentication key or
authentication type.
OID 1.3.6.1.2.1.14.16.2.7
Notification type ospfVirtIfAuthFailure
Objects ospfRouterIdt (the originator of the trap),
ospfVirtIfAreaId, ospfVirtIfAreaId, ospfVirtIfNeighbor,
ospfConfigErrorType (authTypeMismatch or
authFailure, ospfPacketType)
Status current
Description An ospfVirtIfAuthFailure trap signifies that a packet has
been received on a virtual interface from a router whose
authentication key or authentication type conflicts with
this router authentication key or authentication type.
OID 1.3.6.1.2.1.14.16.2.16
Notification type ospfIfStateChange
Objects ospfRouterId (the originator of the trap),
ospfIfIpAddress, ospfAddressLessIf, ospfIfState (the
new state)
Status current
Description An ospfIfStateChange trap signifies that there has
been a change in the state of a nonvirtual OSPF
interface. This trap is generated when the interface
state regresses (for example, goes from DR to Down)
or progresses to a terminal state (that is, Point-to-Point,
DR Other, DR, or Backup).
OID 1.3.6.1.2.1.80.0.1
Notification type pingProbeFailed
Objects pingCtlTargetAddressType, pingCtlTargetAddress,
pingResultsOperStatus, pingResultsIpTargetAddressT
ype, pingResultsIpTargetAddress, pingResultsMinRtt,
pingResultsMaxRtt, pingResultsAverageRtt,
pingResultsProbeResponses, pingResultsSentProbes,
pingResultsRttSumOfSquares, pingResultsLastGood
Probe
Status current
Description A rcnAggLinkUp trap is generated when a probe
failure is detected when the corresponding
pingCtlTrapGeneration object is set to probeFailure(0)
subject to the value of pingCtlTrapProbeFailureFilter.
The object pingCtlTrapProbeFailureFilter can be used
to specify the number of successive probe failures that
are required before this notification is generated.
OID 1.3.6.1.2.1.80.0.2
Notification type pingTestFailed
Objects pingCtlTargetAddressType, pingCtlTargetAddress,
pingResultsOperStatus, pingResultsIpTargetAddressT
ype, pingResultsIpTargetAddress, pingResultsMinRtt,
pingResultsMaxRtt, pingResultsAverageRtt,
pingResultsProbeResponses, pingResultsSentProbes,
pingResultsRttSumOfSquares, pingResultsLastGood
Probe
Status current
Description A pingTestFailed trap is generated when a ping test
is determined to have failed when the corresponding
pingCtlTrapGeneration object is set to testFailure(1).
In this instance, pingCtlTrapTestFailureFilter specifies
the number of probes that must fail in a test to consider
the test as failed.
OID 1.3.6.1.2.1.80.0.3
Notification type pingTestCompleted
Objects pingCtlTargetAddressType, pingCtlTargetAddress,
pingResultsOperStatus, pingResultsIpTargetAddressT
ype, pingResultsIpTargetAddress, pingResultsMinRtt,
pingResultsMaxRtt, pingResultsAverageRtt,
pingResultsProbeResponses, pingResultsSentProbes,
pingResultsRttSumOfSquares, pingResultsLastGood
Probe
Status current
Description A pingTestCompleted is generated at the
completion of a ping test when the corresponding
pingCtlTrapGeneration object is set to
testCompletion(4).
OID 1.3.6.1.2.1.81.0.1
Notification type traceRoutePathChange
OID 1.3.6.1.2.1.81.0.2
Notification type traceRouteTestFailed
Objects traceRouteCtlTargetAddressType, traceRouteCtl
TargetAddress, traceRouteResultsIpTgtAddrType,
traceRouteResultsIpTgtAddr
Status current
Description Could not determine the path to a target.
OID 1.3.6.1.2.1.81.0.3
Notification type traceRouteTestCompleted
Objects traceRouteCtlTargetAddressType, traceRouteCtl
TargetAddress, traceRouteResultsIpTgtAddrType,
traceRouteResultsIpTgtAddr
Status current
Description The path to a target has been determined.
OID 1.3.6.1.2.1.16.0.1
Trap type risingAlarm
Enterprise rmon
Variables alarmIndex, alarmVariable, alarmSampleType,alarmV
alue, alarmRisingThreshold
Description The SNMP trap that is generated when an alarm entry
crosses its falling threshold and generates an event
that is configured for sending SNMP traps.
OID 1.3.6.1.2.1.16.0.2
Trap type fallingAlarm
Enterprise rmon
Variables alarmIndex, alarmVariable, alarmSampleType,alarmV
alue, alarmFallingThreshold
Description The SNMP trap that is generated when an alarm entry
crosses its falling threshold and generates an event
that is configured for sending SNMP traps.
In the MERS 8600, a physical port number is 10 bits long and has the
following format:
The tap number bits and the OctaPID number bits combined (bits 9–3) are
usually referred to as the OctaPID ID.
OctaPID ID
Module type Port type
assignment
8608SXE module 1000BASE-SX 8608GBE,
8608GBM, 8608G
TE/8608GTM, and
8608SXE modules
8616SXE module 1000BASE-SX 8616SXE module
8624FXE module 100BASE-FX 8624FXE module
8632TXE and 8632TXM 10BASE-T/100BASE-TX 8632TXE and
modules 8632TXM modules
1000BASE-SX (GBIC)
1000BASE-LX (GBIC)
1000BASE-ZX (GBIC)
1000BASE-XD (GBIC)
1000BASE- TX (GBIC)
8648TXE and 8648TXM 10/100 Mb/s 8648TXE and
modules 8648TXM modules
8672ATME and OC-3c MDA 8672ATME and
8672ATMM modules 8672ATMM
modules
OC-12c MDA
DS3
8681XLR module 10GBASE-LR 8681XLR module
8681XLW module 10GBASE-LW 8681XLW module
8683POSM module OC-3c MDA 8683POSM module
OC-12c MDA
8616SXE module describes the OctaPID ID and port assignments for the
8616SXE module.
8616SXE module
OctaPID ID assignment Port assignment
OctaPID ID: 0 Ports 1 and 2
OctaPID ID: 1 Ports 3 and 4
OctaPID ID: 2 Ports 5 and 6
OctaPID ID: 3 Ports 7 and 8
OctaPID ID: 4 Ports 9 and 10
OctaPID ID: 5 Ports 11 and 12
OctaPID ID: 6 Ports 13 and 14
OctaPID ID: 7 Ports 15 and 16
8624FXE module describes the OctaPID ID and port assignments for the
8624FXE module.
8624FXE module
OctaPID ID assignment Port assignment
OctaPID ID: 0 Ports 1 through 8
OctaPID ID: 1 Ports 9 through 16
OctaPID ID: 2 Ports 17 through 24
8681XLR module describes the OctaPID ID and port assignments for the
8681XLR module.
8681XLR module
OctaPID ID assignment Port assignment
OctaPID ID: 0 Port 1
OctaPID ID: 1
OctaPID ID: 2
OctaPID ID: 3
OctaPID ID: 4
OctaPID ID: 5
OctaPID ID: 6
OctaPID ID: 7
8681XLW module describes the OctaPID ID and port assignments for the
8681XLW module.
8681XLW module
OctaPID ID assignment Port assignment
OctaPID ID: 0 Port 1
OctaPID ID: 1
OctaPID ID: 2
OctaPID ID: 3
OctaPID ID: 4
OctaPID ID: 5
OctaPID ID: 6
OctaPID ID: 7
8683POSM module describes the OctaPID ID and port assignments for the
8683POSM module.
8683POSM module
OctaPID ID assignment Port assignment
OctaPID ID: 0 • Ports 1 and 2 (with OC-3c MDA)
• Port 1 (with OC-12c MDA)
Index
A port mirroring 143
acronyms 11 Continuity Check Message
address resolution table, displaying 222 CFM message type 16
Address Resolution, see AR 219 crossover cable 34
AR
statistics table 219 D
testing 217 DDI 40, 42, 43
viewing statistics 219 debugging 159
AR Stats tab 219 DHCP 190
ARP table, clearing specified entries 195 diagnostics
automatic trace, configuring using the address resolution table test 218
CLI 205 error trapping 167
port mirroring 135
C DTE/DCE switch
cable changing setting of 34
Category 5 35 dump ar command 222
crossover 34
straight-through 34 E
troubleshooting 34 edit mode commands 270
CCM enabling PBT 80
MA parameters in CLI 96 encapsulation method 80
MEP parameters in CLI 99 error trapping 167
MEP parameters in Device Error Traps tab 167
Manager 80
CFM
configuring using Device
H
Hexidecimal Results Mask
Manager 75
Displaying in CLI 60
configuring using the CLI 93
definition 16
CFM port statistics 88 I
clear commands 194 interface index 273
CLI IP, entries in AR table 221
displaying address resolution
records 222
L mirroring
MAC address 134
LEDs
port 17
power supplies 32
mirroring mode, setting 145
problem indications 31
mirroring-port command 145
Linktrace Message
monitor commands 191, 192
CFM message type 16
Multi-Link Trunk interface index 274
linktrace messages 110
multicast AR table 221
log files 169
mux mode 80
login prompt, failure to display 34
Loopback Message
CFM message type 16
N
loopback messages 107 network management
port mirroring 17
M NMM (network management MIB) 224
MAC
entries in AR table 221
P
mirroring addresses 134 PBT, enabling 80
monitoring MAC table 134 physical MAC address 275
MAC address assignment 274 ping probe history
maintenance association viewing of 211
configuring with CLI 95 ping result 215
configuring with Device Manager 76 ping snoop
maintenance domain configuring on R modules
configuring with CLI 94 using Device Manager 266
maintenance endpoint using the CLI 265
configuring with CLI 98 overview of 209
configuring with Device Manager 77 ping test
creating 78 running of
statistics 80, 102, 105 using Device Manager 211
maintenance intermediate endpoint port mirroring 135
creating 85 assigning destination ports 147
statistics 87 configuration on R modules
maintenance intermediate point using the CLI 253
configuring with CLI 111 configuration on R-module
maintenance intermediate point using Device Manager 255
statistics 112 description 17
Manufacturing information displaying entries 141
viewing Metro Ethernet Routing editing existing values 141
Switch 8600 using the CLI 40 editing ports 141
viewing Metro Ethernet Routing egress 17
Switch using DM 36 ingress 17
messages MAC addresses 18
loopback test warning 217 OctaPID ID and port
MIBs assignments 298
checking status 224 OctaPID ID assignment 146
mirrored-port command 145 sorting entries 141
cables 34 U
Connectivity Fault Management 75
UNIX Syslog facility 180
error trapping 167
UNIX, managing messages 174
failure to get login prompt 34
IS-IS 159
LED indications 31 V
MAC address counting 134 virtual MAC address 275
MAC address mirroring 134 VLAN
module failure 33 entries in AR table 221
performance monitoring 113 VLAN (0) 162
port connections problems 34 VLAN interface index 274
port mirroring 135 Voltages
Transparent Domain Continuity 47 viewing Metro Ethernet Routing
Troubleshooting tools Switch 8600 using the CLI 43
TD Continuity viewing Metro Ethernet Routing
overview 16 Switch using DM 36
Troubleshooting
Copyright © 2007 , Nortel Networks
All Rights Reserved.
Publication: NN46220-701
Document status: Standard
Document version: 01.01
Document date: 3 August 2007
This document is protected by copyright laws and international treaties. All information, copyrights and any other intellectual
property rights contained in this document are the property of Nortel Networks. Except as expressly authorized in writing by Nortel
Networks, the holder is granted no rights to use the information contained herein and this document shall not be published, copied,
produced or reproduced, modified, translated, compiled, distributed, displayed or transmitted, in whole or part, in any form or media.
The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied warranty.
Users must take full responsibility for their applications of any products specified in this document. The information in this document
is proprietary to Nortel Networks Inc.
The software described in this document is furnished under a license agreement and may be used only in accordance with the
terms of that license. The software license agreement is included in this document.
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.