Академический Документы
Профессиональный Документы
Культура Документы
OPERATION MANUAL
RICi-16
Advanced Ethernet Services over Multiple
PDH Links NTU
Version 2.5
RICi-16
Advanced Ethernet Services over Multiple PDH Links NTU
Version 2.5
International Headquarters
RAD Data Communications Ltd.
Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the RICi-16 to be delivered hereunder shall
be free of defects in material and workmanship under normal use and service for a period of
twelve (12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by
reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect,
RAD shall have the option to choose the appropriate corrective action: a) supply a replacement
part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at
the equipment's location. In the event that RAD requests the return of equipment, each party
shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or
modifications were made by persons other than RAD's own authorized service personnel, unless
such repairs by others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no
warranties which extend beyond the face hereof, including, but not limited to, warranties of
merchantability and fitness for a particular purpose, and in no event shall RAD be liable for
consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not
limited to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the RICi-16, and in no event shall
RAD's liability exceed the purchase price of the RICi-16.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to RICi-16 and for ensuring that replacements and other adjustments required in
connection with the said warranties are satisfactory.
Software components in the RICi-16 are provided "as is" and without warranty of any kind. RAD
disclaims all warranties including the implied warranties of merchantability and fitness for a
particular purpose. RAD shall not be liable for any loss of use, interruption of business or
indirect, special, incidental or consequential damages of any kind. In spite of the above RAD
shall do its best to provide error-free software products and shall offer free Software updates
during the warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the RICi-16 shall not
exceed the sum paid to RAD for the purchase of the RICi-16. In no event shall RAD be liable for
any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD
has been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of
Israel.
Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal
waste at the end of its life cycle. Upon termination of the units use,
customers should provide for its collection for reuse, recycling or other form
of environmentally conscientious disposal.
Safety Symbols
Warning
This symbol may appear on the equipment or in the text. It indicates potential
safety hazards regarding product operation or maintenance to operator or service
personnel.
Danger of electric shock! Avoid any contact with the marked surface while the
product is energized or connected to outdoor telecommunication lines.
Protective ground: the marked lug or terminal should be connected to the building
protective ground bus.
Warning
Some products may be equipped with a laser diode. In such cases, a label with the
laser class and other warnings as applicable will be attached near the optical
transmitter. The laser warning symbol may be also attached.
Please observe the following precautions:
Before turning on the equipment, make sure that the fiber optic cable is intact
and is connected to the transmitter.
The use of optical devices with the equipment will increase eye hazard.
Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A. The circuit breaker in the building installation should have high breaking
capacity and must operate at short-circuit current exceeding 35A.
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.
Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
DC units should be installed in a restricted access area, i.e. an area where access is authorized
only to qualified service and maintenance personnel.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A. The circuit breaker in the building installation should have high breaking
capacity and must operate at short-circuit current exceeding 35A.
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF
position. When connecting the DC supply wires, first connect the ground wire to the
corresponding terminal, then the positive pole and last the negative pole. Switch the circuit
breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.
Ports
Safety Status
SELV
Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.
When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.
Caution
To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line
cords.
Attention
Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.
Avertissement
Achtung
This is a class A product. In a domestic environment, this product may cause radio
interference, in which case the user will be required to take adequate measures.
Cet appareil est un appareil de Classe A. Dans un environnement rsidentiel, cet
appareil peut provoquer des brouillages radiolectriques. Dans ces cas, il peut tre
demand lutilisateur de prendre les mesures appropries.
Das vorliegende Gert fllt unter die Funkstrgrenzwertklasse A. In Wohngebieten
knnen beim Betrieb dieses Gertes Rundfunkstrrungen auftreten, fr deren
Behebung der Benutzer verantwortlich ist.
Franais
Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques
potentiels de scurit pour l'oprateur ou le personnel de service, quant
l'opration du produit ou sa maintenance.
Avertissement
Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le
produit est sous tension ou connect des lignes externes de tlcommunications.
Franais
Certains produits peuvent tre quips d'une diode laser. Dans de tels cas, une
tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant,
sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut
aussi tre joint.
Avertissement
Veuillez observer les prcautions suivantes :
Franais
Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par
rapport la mise la terre. Tout ple doit tre mis la terre en externe.
A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient
tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques
d'incendie.
Les units CC devraient tre installes dans une zone accs restreint, une zone o l'accs n'est
autoris qu'au personnel qualifi de service et de maintenance.
Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que
l'installation est conforme la rglementation locale.
La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A. Le coupe-circuit dans l'installation du btiment devrait avoir une capacit
leve de rupture et devrait fonctionner sur courant de court-circuit dpassant 35A.
Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le
en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le
conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le
ple ngatif. Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du
btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC
est flottante.
Declaration of Conformity
Manufacturer's Name:
Manufacturer's Address:
Product Names:
Safety:
EN 55022:1998 +
A1:2000, A2: 2003
EN 55024: 1998 +
A1:2001, A2:2003
EN 61000-3-2:2000
+ A2:2005
EN 61000-3-3:1995
+ A1:2001
EN 60950-1:2001 +
A11:2004
Supplementary Information:
The products herewith comply with the requirements of the EMC Directive 89/336/EC, the Low
Voltage Directive 2006/95/EC and the R&TTE Directive 99/5/EC for wired equipment. The product
was tested in a typical configuration.
Tel Aviv, 9 December 2007
Haim Karshen
VP Quality
European Contact: RAD Data
Ottobrunn-Riemerling, Germany
Communications
GmbH,
Otto-Hahn-Str.
28-30,
85521
Glossary
Address
Agent
Analog
ANSI
Attenuation
AWG
Balanced
Bandwidth
Baud
Bipolar
Bit
Bridge
Bus
Byte
Carrier
Cell
Clock
Congestion
Data
Diagnostics
Differential Delay
Digital
E1 Line
E3
Encapsulation
Ethernet
Flow Control
Frame
At the physical and data link layers of the OSI model, bits are fit
into units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame,
plus information about the integrity of the frame. All other
information, such as network protocols and the actual payload of
data, is encapsulated in a packet, which is encapsulated in the
frame.
Full Duplex
G.703
Gateway
Half Duplex
Impedance
Interface
IP Address
Laser
Latency
The time between initiating a request for data and the beginning
of the actual data transfer. Network latency is the delay
introduced when a packet is momentarily stored, analyzed and
then forwarded.
Loopback
Manager
Master Clock
The source of timing signals (or the signals themselves) that all
network stations use for synchronization.
Multiplexer
Network
Node
Packet
Payload
The 48-byte segment of the ATM cell containing user data. Any
adaptation of user data via the AAL will take place within the
payload.
Physical Layer
Polling
See Multidrop.
Port
Protocol
Scalable
Serial Transmission
Single Mode
in diameter).
Space
Sync
Synchronous
Transmission
Transmission in which data bits are sent at a fixed rate, with the
transmitter and receiver synchronized.
T1
T3
Telnet
Throughput
Timeslot
VLAN-Aware
VLAN Stacking
1.
Installing RICi-16
Connect the power cable to the power socket on the RICi-16 front panel and
the other end to the power outlet.
The unit has no power switch. Operation starts when the power is
applied to the power connector(s).
2.
Configuring RICi-16
Configure RICi-16 to the desired operation mode via an ASCII terminal connected
to the front panel CONTROL port. After configuring, you can manage the unit
over Telnet, a PC that runs a Web browser, or SNMP via either Ethernet or an
E1/T1 port.
Note
Configuring RICi-16
Data bits: 8
Stop bits: 1
Parity: None
If you are using HyperTerminal, set the terminal mode to the 132-column
mode.
3. Enter your user name and password and proceed with the management
session.
Note
The RICi-16 default user name is su (lower case). The default password is 1234.
From the Host menu (Main > Configuration > System > Management > Host),
configure the following parameters:
Host IP address
Host IP mask
Default gateway
From the Encapsulation menu (Main > Configuration > System > Management
> Host > Encapsulation), configure Host tagging (untagged/tagged). If you
select Tagged, additional parameters that need to be defined appear:
Host VLAN ID
Configuring RICi-16
Factory-Set Configuration
Bridge Port
Configured to
Ethernet port 1
Ethernet port 2
Ethernet port 3
Ethernet port 4
If you reconfigure the unit for a minimum working configuration, define at least
two bridge ports (BP) and bind them to either a physical or logical port.
Configuring RICi-16
Configuring RICi-16
Contents
Chapter 1. Introduction
1.1 Overview.................................................................................................................... 1-1
Product Options...................................................................................................... 1-2
Applications ............................................................................................................ 1-2
Features ................................................................................................................. 1-2
1.2 Physical Description ................................................................................................... 1-8
1.3 Functional Description................................................................................................ 1-8
Interfacing with User Traffic .................................................................................... 1-8
WAN Interfaces ....................................................................................................... 1-8
Ethernet Access (Bridge Mode) ............................................................................... 1-9
GFP, VCAT, and LCAS ............................................................................................. 1-14
Operating in Flow Mode ........................................................................................ 1-17
Prioritizing Traffic Using QoS ................................................................................. 1-19
Timing .................................................................................................................. 1-20
Management ........................................................................................................ 1-21
1.4 Technical Specifications............................................................................................ 1-23
Chapter 2. Installation and Setup
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
Chapter 3. Operation
3.1
3.2
3.3
3.4
Table of Contents
Chapter 4. Configuration
4.1 Configuring RICi-16 for Management .......................................................................... 4-1
Entering Device Information .................................................................................... 4-1
Configuring Host IP Parameters ............................................................................... 4-2
Configuring SNMPv3 ................................................................................................ 4-4
Configuring Management Access ........................................................................... 4-11
4.2 Configuring RICi-16 for Operation............................................................................. 4-16
Setting System-Level Parameters .......................................................................... 4-17
Configuring Physical-Layer Parameters .................................................................. 4-26
Configuring the Logical Layer ................................................................................ 4-38
Configuring the Application Layer Parameters........................................................ 4-42
Configuring the OAM............................................................................................. 4-61
4.3 Performing Additional Tasks ..................................................................................... 4-63
Viewing Inventory ................................................................................................. 4-63
Viewing the License Information ........................................................................... 4-64
Configuring Control Port Parameters ..................................................................... 4-65
Changing User Access Parameters ......................................................................... 4-65
Transferring Software and Configuration Files ....................................................... 4-66
Resetting RICi-16 .................................................................................................. 4-68
Chapter 5. Configuring Typical Applications
5.1 Application with Ethernet Cellular Backhauling over PDH/SONET/SDH .......................... 5-1
Configuring System Parameters............................................................................... 5-2
Configuring the Physical Layer ................................................................................. 5-4
Configuring the Logical Layer .................................................................................. 5-7
5.2 Ethernet Services over PDH/SONET/SDH ..................................................................... 5-8
Configuring System Parameters............................................................................... 5-8
Configuring the Physical Layer ............................................................................... 5-10
Configuring the Logical Layer ................................................................................ 5-11
5.3 Multiple Customer Premises Supported by Channelized DS-3 .................................... 5-15
Configuring System Parameters............................................................................. 5-17
Chapter 6. Diagnostics and Troubleshooting
6.1 Monitoring Performance ............................................................................................. 6-1
Viewing Device Status ............................................................................................. 6-1
Displaying Interface Statistics ............................................................................... 6-13
6.2 Handling Alarms and Traps ....................................................................................... 6-19
Displaying Events .................................................................................................. 6-19
Displaying Syslog Statistics ................................................................................... 6-20
6.3 Testing the RICi-16 Unit ........................................................................................... 6-21
Running a Ping Test .............................................................................................. 6-21
Tracing the Route ................................................................................................. 6-22
Running a Cable Test ............................................................................................ 6-22
Running Loopback Tests ....................................................................................... 6-23
Performing Bit Error Rate Test (BERT).................................................................... 6-24
Running OAM Tests............................................................................................... 6-27
6.4 Troubleshooting ....................................................................................................... 6-28
6.5 Technical Support .................................................................................................... 6-29
ii
Table of Contents
iii
Table of Contents
iv
Chapter 1
Introduction
1.1
Overview
RICi-16 is a Network Termination Unit (NTU) that connects Fast Ethernet LANs
over 16 bonded E1 or T1 circuits, or over up to two bonded clear T3 circuits, or
over a channelized T3 interface. The bonded circuits create a scalable, virtual pipe
for transferring Ethernet traffic.
The unit enables service providers to supply high capacity Ethernet services to
remote locations. The units can also transparently connect corporate LANs
utilizing existing E1 or T1 lines.
RICi-16 uses the Ethernet over NG PDH standards and applies the Generic
Framing Procedure (GFP) to encapsulate the packet data for bandwidth utilization
and improving the latency for delay-sensitive applications. Virtual Concatenations
(VCAT) bond the required PDH connections for transmitting data, providing
flexible bandwidth for different applications. Link Capacity Adjustment Scheme
(LCAS) ensures seamless PDH capacity changes without affecting traffic and error
handling on individual E1/T1 links.
RICi-16 supports up to 16 GFP VCAT groups (VCG), for connecting of up to 16
different customers per site.
The following standard bonding and encapsulation protocols make RICi-16
interoperable with third-party devices:
End-to-end OAM, based on IEEE 802.1ag and ITU-T Y.1731 enables Ethernet
service providers to monitor their services proactively, measure end-to-end
performance and guarantee that the customers receive the contracted SLA. Fault
monitoring and performance measurement include Frame Delay, Frame Delay
Variation, Frame Loss and Availability. RICi-16 features single segment (link) OAM
according to IEEE 802.3ah fault indication, including remote loopback.
In both Bridge-based and Flow-based operation modes, incoming customer traffic
is classified (in Flow mode only) and mapped according to port-based (all-in-one)
bundling or by user port and CE VLAN-ID, VLAN priority, DSCP and IP precedence.
Operators can differentiate services using classification methods, police the
traffic and enforce SLA per service.
Overview
1-1
Chapter 1 Introduction
Product Options
Uplink Options
RICi-16 is available with E1/T1/T3 interfaces as follows:
E1/T1:
T3:
Temperature-hardened Version
A temperature hardened version is available, significantly extending the permitted
operating temperature range.
Applications
Typical applications include Ethernet VPN services over E1 or T1 lines; aggregation
of enterprise LANs over E1 or T1 circuits; and IP DSLAM, cellular IP, and WiMAX
base station backhauling.
Figure 1-1 illustrates a typical application in which RICi-16 connects remote LANs
to the packet-switched network over 16 E1/T1 circuits using an SDH/SONET
connection.
Figure 1-1. RICi-16 Extends Ethernet Services over Multiple E1/T1 Circuits
Features
GFP VCAT LCAS
Ethernet over GFP VCAT encapsulation is supported as defined in ITU-T G.8040.
The links are grouped using VCAT as defined in ITU T G.7043. The LCAS protocol is
supported as defined in ITU T G.7042.
1-2
Overview
Chapter 1 Introduction
Note
LCAS mechanisms:
Ensure that traffic flow recovers quickly from E1/T1 link failures
GFP VCAT LCAS maps Ethernet over framed E1/T1/T3 links. For E1/T1 the LCAS
information is aligned to the E1/T1 multiframe. Therefore E1/T1 carrying Ethernet
over GFP VCAT LCAS must be transported transparently over the PDH/SDH
network, to avoid damaging the multiframe alignment.
Encapsulation
RICi-16 supports 16 GFP VCAT LCAS groups with up to 16 E1/T1s per group (VCG).
Bridge Mode
RICi-16 provides a bridging function between its bridge ports:
Internal host.
VLAN-Unaware
In the VLAN-unaware mode all ports share the same broadcast domain (broadcast
frames are forwarded to all ports). When filtering is enabled, each port learns
MAC addresses of the connected devices and forwards traffic according to them.
When filtering is disabled (transparent mode), the switch operates as a simple
hub; it does not build a MAC table, and sends each frame to all its ports.
VLAN-Aware
In the VLAN-aware mode connections between the switch ports are determined
by their VLAN membership. This means that the traffic can be forwarded from
one port to another only if they are members of the same VLAN. For example, in
the figure below (see Figure 1-2) bridge ports 2 and 3 are members of VLAN 3,
serving the user traffic and completely separating it from the other traffic flows.
The management traffic running on VLAN 4 has to arrive to all ports, including the
device host. To achieve this, all bridge ports must be configured as VLAN 4
members.
Overview
1-3
Chapter 1 Introduction
VLAN 3
VLAN 3
User
Equipment
BP4
Bridge
BP2
BP5
VLAN 4
NMS
BP3
VLAN 4
BP6
BP1
Host
VLAN Membership
Bridge ports can be configured as egress tagged or egress untagged VLAN
members:
Egress tagged ports add the tag of its VLAN to all untagged frames at the
bridge egress. Frames arriving with the tag of the VLAN the port belongs
remain intact.
Egress untagged ports remove the tag of its VLAN from all arriving frames at
the bridge egress.
Stacking Adding PVID (port VID or default VLAN tag) to all arriving (ingress)
or outgoing (egress) frames, both untagged and tagged. In case of the
tagged frames, the PVID is stacked over the existing VLAN tag. When stacking
is disabled (set to None), PVID is added to the untagged frames only.
Stripping Removing the outer VLAN tags at the egress or ingress of the
bridge ports.
Flow Mode
RICi-16 provides traffic flow classification between the traffic source and its final
destination. RICi-16 supports up to 64 unidirectional flows. Each flow is defined
by a classification profile.
In Flow-based operation mode, incoming customer traffic is classified and
mapped according to port-based (all-in-one) bundling or by user port and CE
VLAN-ID, VLAN priority, DSCP and IP precedence. Operators can differentiate
services using classification methods, police the traffic and enforce SLA per
service
1-4
Overview
Chapter 1 Introduction
Classification
The RICi-16 classifier uses the following classification fields/ rules per port. The
following classification combinations are possible:
Unclassified
802.1p
VLAN
DSCP
IP Precedence
VLAN + 802.1p
VLAN + DSCP
VLAN + IP Precedence
Untagged
No IP
No IP + VLAN
Traffic Shaping
RICi-16 performs shaping at the network egress and port level.
Overview
1-5
Chapter 1 Introduction
L2CP Handling
RICi-16 can be configured to pass through the Layer-2 control frames across the
network to peer supported protocols (OAM.ah), or to discard the L2CP frames.
Management
Setup, control, and monitoring of status and diagnostics information can be
performed using the following methods:
Local and remote inband management via the Ethernet network or GFP logical
port using Telnet SSH.
Out-of-band management via one of the user data ports that can be
configured as a management port
Local management via an ASCII terminal connected to the V.24 (RS-232) DCE
control port.
Monitoring performance
Upgrading software.
Security
The following security protocols are provided by RICi-16 to ensure client-server
communication privacy and correct user authentication:
Ethernet OAM
RICi-16 provides two types of Ethernet OAM:
1-6
CFM (End-to-end OAM) based on IEEE 802.1ag and ITU T Y.1731 enable
Ethernet service providers to monitor their services proactively, measure endto-end performance and guarantee that the customers receive the
contracted SLA. Fault monitoring and performance measurement include
Frame Delay, Frame Delay Variation, Frame Loss and Availability
Overview
Chapter 1 Introduction
EFM OAM (link OAM) according to IEEE 802.3ah for fault indication, including
remote loopback and MIB parameters.
Timing
RICi-16 has a two-clock domain with master and fallback sources for timing, one
clock for T3 timing and one for T1s mapped to VCGs. The clock source can be an
internal oscillator or a recovered clock signal from one of the links.
Diagnostics
RICi-16 offers several types of diagnostic and troubleshooting procedures:
Ping tests
Trace Route
OAM test
Statistics
RICi-16 provides statistics and counter capabilities for the physical Ethernet,
E1/T1 levels, and logical GFP statistics.
Fault Propagation
The unit features a user-configurable bidirectional fault propagation mechanism
that notifies local and remote equipment of faulty conditions. This enables
routers and switches on both ends of the link to reroute traffic.
Overview
1-7
Chapter 1 Introduction
1.2
Physical Description
1.3
Functional Description
WAN Interfaces
The unit supports the following WAN interfaces:
1-8
Framed E1 circuits (G732N with CRC), up to 16. The E1 interfaces are G.704,
G.703 compliant.
Functional Description
Chapter 1 Introduction
to 16 VCGs. Multi VCG enables supporting multiple service providers per site.
Two clear T3 circuits facilitate up to 100 Mbps uplink.
Note
T3 Port Protection
RICi-16 supports 1+1 link protection on the T3 links, if the unit is operating with a
channelized T3 network interface.
VLAN-Aware
VLAN-Unaware.
Learning:
Learns new MAC table entries (MAC only or MAC VID pairs)
Term
Forwarding:
Transmission
(VLAN-Aware mode only):
Bridge features and these five processes are described below for each mode.
VLAN-Aware Mode
This mode enables creating sub-groups of bridge ports within the bridge. Each
sub-group is defined per VLAN and is associated with a unique VLAN ID (VID).
Frames containing a VID can be forwarded only between bridge ports that are
members of this specific VLAN, enabling a total separation between different
VLAN users within the same bridge.
Bridge
Learning of up to 2,018 MAC table entries (MAC + VID pairs) and 30 static
addresses
Functional Description
1-9
Chapter 1 Introduction
Ingress Process
The ingress process is composed of the following three steps:
Frame Admission: Has two modes of operation (configured per bridge port):
Admit All Frames: All frames arriving from the port are admitted and
proceed to the ingress filtering process. PVID is assigned to untagged or
priority-only tagged frames.
Admit Only VLAN Tagged Frames: Only VLAN tagged frames are admitted
and allowed to proceed to the ingress filtering process. Untagged or
priority-only tagged frames are discarded.
Ingress Filtering: Available for one of the following modes (configured per
bridge port):
Ingress
Filtering
Mode
Bridge Behavior
Enable
Disable
Enable
Admit VLAN
tagged frames
Disable
1-10
Functional Description
Chapter 1 Introduction
Frames that pass this stage are submitted to the forwarding and learning
processes.
Learning Process
The learning process observes the source MAC address (SA) and the VID of the
received frame, and updates the database with the MAC VID pair and with the
bridge port that the frame was received from. The Forwarding Data Base (FDB) is
also referred to as a MAC table.
Entries in the MAC table can be dynamic (inserted by the learning process) or
static (inserted by configuration). A dynamic entry has an aging time associated
with it.
The RICi-16 VLANAware bridge is an Independent VLAN Learning (IVL) bridge.
The learning process inserts a new dynamic entry into the MAC table. This entry
consists of a MAC-VID pair and bridge port.
If the MAC-VID pair already exists for the same port, the aging time is updated.
If the MAC-VID pair already exists but for a different bridge port (dynamic entry),
the new entry overrides the existing one.
If the MAC-VID pair already exists for a different bridge port (static entry), the
static entry prevails.
Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic
entry-aging period that has exceeded the configured Aging Time Limit is deleted.
The aging period represents the time passed since the last frame for this entry
entered the bridge. The periodic check of the MAC table (aging time intervals)
results in the actual aging time that can reach up to twice the value that was
configured by the user.
Forwarding Process
The forwarding process is performed based on the frame destination MAC VID
pair. The frame is forwarded to the bridge port specified in the MAC table for this
MAC VID pair.
Untagged frames are forwarded according to the PVID attached to them during
the ingress process.
Frames are forwarded, dropped, or flooded according to the following guidelines:
Forwarded: If the bridge port of the pair entry (DA, VID) in the MAC table is
both an active bridge port and a member of the VLAN, the frame is forwarded
to that bridge port only.
Dropped:
If the bridge port for the pair entry (DA, VID) in the MAC table is the port
on which the frame was received, the frame is dropped.
If there are no active ports associated with the frames VID, or if the VID
is not defined at all, the frame is dropped.
Flooded:
Functional Description
1-11
Chapter 1 Introduction
If the pair (DA, VID) is not learned and does not exist in the MAC table,
the frame is transmitted to all bridge ports that are associated with the
frames VLAN ID.
Multicasts and broadcasts are flooded only through the bridge ports
whose VLAN ID is identical to the frames VLAN ID.
Frames that pass this stage are submitted to the forwarding and learning
processes.
Transmission Process
After the forwarding process identifies the destination bridge port/ports to which
the frames must be transmitted, the frames are transmitted in the appropriate
format.
The frame format can be configured for each VLAN and port:
Untagged frames are transmitted tagged with VID=PVID of the entry port.
VLAN-Unaware Mode
In this mode the bridge forwarding ignores the VLAN ID of VLAN-tagged frames.
Each Ethernet frame received from each bridge port (Ethernet or E1s) is
forwarded according to its destination MAC address.
Bridge Features
Bridge features include:
Ingress Process
All frames are accepted in this mode: untagged, priority-tagged, or VLAN tagged.
Learning and forwarding is based on the MAC addresses, with no regard to the
VLAN.
Learning Process
The learning process observes the source MAC address (SA) of the received frame
and updates the forwarding database (FDB) with the MAC address and the bridge
port that the frame was received from. (FDB is also referred to as MAC table).
1-12
Functional Description
Chapter 1 Introduction
The learning process inserts a new entry into the MAC table. This entry consists
of the MAC and bridge port.
If the MAC already exists for the same bridge port, the aging time will be
updated.
If the MAC already exists, but for a different bridge port, (dynamic entry) the
new entry will override the existing one.
Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic
entry aging time period that has exceeded the configured Aging Time Limit is
deleted. The aging time period is the period of time since the last frame for this
entry entered the bridge. The periodic check of the MAC table (aging time
intervals), results in an actual aging time that can reach up to twice the userconfigured value.
Forwarding Process
The forwarding process is performed based on the frame MAC Destination
Address (MDA). The frame is forwarded to the bridge/port specified in the MAC
table for this MAC.
Frames are forwarded, dropped, or flooded at this stage:
Forwarded: The frame is forwarded according to DA, to the bridge port where
the DA was learned.
Dropped: If the port for the DA entry in the MAC table is the port for which
the frame was received, the frame is dropped.
Flooded:
Transmission Process
In this bridge mode (VLAN-Unaware), the frames are transmitted unchanged, that
is no tags are added or removed.
VLAN Stacking
VLAN Stacking mode for a bridge port refers to the addition of a tag to a frame
either at ingress or egress (regardless of whether it already has an existing VLAN
tag), and removal of a tag at ingress or egress when the frame leaves through
this port.
This setting is independent of the bridge activity.
VLAN Stripping
VLAN Stripping mode for a bridge port refers to the removal of a tag at ingress or
egress when the frame leaves from this port.
This setting is independent of the bridge activity.
Functional Description
1-13
Chapter 1 Introduction
Functional Description
Chapter 1 Introduction
payload information filed. For encapsulation of Ethernet frames, this CRC appears
to be unnecessary. The PFCS addition is user configurable.
All octets in the GFP Payload Area are scrambled using a 1 + x^43 scrambler; this
scrambler is always activated.
The Payload Area contains between 4 and 64 bytes, according to the following:
Functional Description
1-15
Chapter 1 Introduction
RX Traffic Path
RICi-16 assumes that the traffic received from TDM ports is traffic arriving from a
non-LCAS GFP transmitter. RICi-16 treats this data according to the following:
RICi-16 extracts the VCAT header from the first timeslot of each multiframe.
The GFP receiver has the ability to correct a single-bit error in tHEC or cHEC or
tHEC. This function is always active. The single-bit error correction on Chec is
not active when the GFP signal is in Presync or hunt state.
The data is also descrambled (during sync state) before the packets are
transferred to the bridge.
Payload FCS / CRC 32 of Ethernet packet check: The GFP receiver checks that the
payload FCS (if enabled) or the CRC32 of Ethernet is correct. If incorrect, it
discards the packet.
GFP over PDH actual bandwidth: GFP mapping over a PDH signal involves the
following overhead:
The PDH signal works in multiframe mode. For E1, TS0 is used for frame
synchronization, and for T1, the F bit is used.
From this it can be determined that the actual PDH rate for GFP frames is as
follows:
E1 links:
T1 links:
The maximum PPS (packets per second) that can be generated on the PDH is thus
determined as follows (where P_SIZE is the packet size, and other parameters are
as described above):
In RICi-16:
1-16
Ehec_O is 0
Functional Description
Chapter 1 Introduction
P_FCS is user-configurable.
Functional Description
1-17
Chapter 1 Introduction
Classification
The ingress user traffic is mapped to the Ethernet flows using classification types.
RICi-16 allows two of the following combinations per port (port + )
VLAN (Range)
P-bit (Range)
IP Precedence (Range)
DSCP (Range)
Untagged
Non-IP
Unclassified
CIR
CBS
EIR
EBS
Tag Editing
RICi-16 supports several options for VLAN tagging and p-bit tagging/mapping
actions including adding/removing VLAN tags and setting P-bit for the VLAN tag
(as per a mapping function). The following options are available.
1-18
Functional Description
Chapter 1 Introduction
Mark according to a defined mapping profile according to the user priority (Pbit, IP Precedence or DSCP)
Queue Management
The following sections explain how queues are managed.
Priority Queues
RICi-16 supports five queues at the egress network port. The first queue (#0) is
dedicated to host (management, OAM) traffic and user traffic cannot be assigned
to this queue.
The scheduling method can be configured by the user, per queue, to be strict or
WFQ, according to the scheduling method.
Strict. The data flow set to the highest priority is transmitted first. If this data
flow stops, all tasks at lower priorities move up by one priority level. For example,
the data flow set to the second-highest priority is then transmitted at the
highest priority.
WFQ. Allows different scheduling priorities to statistically multiplex data flows
with different shares on the service. Each data flow has a separate FIFO queue. A
link transmitting at a data rate R, N non-empty data flows are served
simultaneously according to the assigned share w, each at an average rate of
R/(w1 + w2 + w3 + +wN). If one data flow stops, the remaining data flows each
receive a larger share w.
Congestion Control
Each queue employs an early discard mechanism to ensure CIR traffic (green
packets). Early discard of yellow packets (EIR), upon crossing a predefined fill
level threshold ensures CIR traffic over EIR traffic.
IP Precedence
0
0
1
1
2
1
3
1
IP
HEADER
VERSION
IHL
TOTAL LENGTH
TOS
IDENTIFICATION
FLAGS
FRAGMENT OFFSET
TIME TO LIVE
PROTOCOL
HEADER CHECKSUM
SOURCE ADDRESS
DESTINATION ADDRESS
OPTIONS
PADDING
Functional Description
1-19
Chapter 1 Introduction
Bit 0
Bit 1
DS5
Bit 2
DS4
DS3
Bit 3
DS2
Bit 4
DS1
Bit 5
DS0
Bit 6
Bit 7
XX
XX
Timing
E1/T1 Uplink
The Tx clock for the E1/T1 links is determined by the system clock, which can be
derived from the internal oscillator or the recovered clock signal from one of the
Rx links. You can configure the master and fallback source for the system clock.
The following figures show typical clock configurations for the E1/T1 links.
Figure 1-10. E1/T1 Clock Configuration for RICi-16 Working Opposite RICi-16
Figure 1-11. E1/T1 Clock Configuration for RICi-16 Working Opposite Egate-100
T3 Uplink
In T3 mode, RICi-16 supports two system clocks:
1-20
E1/T1 clock, for E1/T1s mapped to VCGs, in the case of channelized T3. The
E1/T1 clock source options are:
Internal oscillator
Internal oscillator
Functional Description
Note
Chapter 1 Introduction
Clock timing is not required for TDM T1s mapped over DS-3 (M13), as they are
transparently mapped over DS-3.
The following figures show typical clock configurations for the T3 links.
Management
RICi-16s performance can be locally monitored from an ASCII terminal, or from a
remote site using Telnet or the ConfiguRAD Web-based application. RADs SNMP
network management application RADview is supported as well.
Inband Management
RICi-16 supports inband management via Telnet, SNMP, and Web (ConfiguRAD).
Configuration, monitoring, and statistics are available.
Out-of-Band Management
RICi-16 allows full configuration and diagnostics via an ASCII terminal. The ASCII
terminal is connected to the control port on the front panel.
Chapter 3 explains how to activate the ASCII terminal and provides general
instructions for navigating through the system menus and windows to view and
modify data.
Security
ASCII terminal, Telnet SSH, and Web access are password protected. After 15
minutes of inactivity, the system exits and you will have to log in again.
Functional Description
1-21
Chapter 1 Introduction
Management Access
The units architecture allows access from every bridge port to the host devices.
In certain configuration modes, a total separation of management traffic from
user traffic can be achieved.
In VLAN-aware mode, RICi-16 forwards the management traffic to the
management station in the Ethernet network. Because a different VLAN is used,
total separation between user traffic and management traffic is maintained.
In the scenario illustrated by Figure 1-15, traffic coming from the remote CPE
uses separate VLANs for user and management traffic. Each remote unit uses two
VLANs, one for user traffic and one for management.
1-22
Technical Specifications
1.4
E1 Interface
T1 Interface
T3 Interface
Chapter 1 Introduction
Technical Specifications
Number of Ports
4, 8, or 16
Compliance
G.703, G.704
Framing
Data Rate
2.048 Mbps
Impedance
120, balanced
75, unbalanced (via adapter cable)
Line Coding
HDB3, AMI
Connector
Electrical, RJ-45
Number of Ports
4, 8, or 16
Compliance
ANSI T1.403
Framing
ESF
Data Rate
1.544 Mbps
Impedance
100, balanced
Line Coding
B8ZS, AMI
Connector
Electrical, RJ-45
Number of Ports
1 (channelized)
2 (clear channel)
Compliance
GR-499-CORE
ANSI T1.107
ANSI T1.102
Fast Ethernet
RICi-16 Ver. 2.5
Framing
Data Rate
44.736 Mbps
Impedance
75, unbalanced
Line Coding
B3ZS
Connector
Coaxial BNC
Number of Ports
3 or 4
Technical Specifications
1-23
Chapter 1 Introduction
10/100BaseT
Interfaces
Encapsulation
Interface
4 10/100BaseTx interfaces or
2 10/100BaseTx interfaces and 1 SFP interface
Standards
Maximum Frame
Size
1,700
Data Rate
100 Mbps
Interface type,
connector
Electrical, RJ-45
Range
Autonegotiation
Supported
Flow control
PAUSE
Duplex modes
Full/half duplex
ETH over
GFP VCAT LCAS
SFP
Internal Bridge
Ports
Control Port
Monitoring
1-24
LAN Table
Operation Mode
VLANAware, VLAN-Unaware
Filtering and
forwarding
Transparent or filter
Interface
Data Rate
Connector
DB-9, female
Statistics
Technical Specifications
Chapter 1 Introduction
Indicators
PWR (green)
On RICi-16 is powered on
Off RICi-16 is off
TST (yellow)
ALM (red)
ACT (blinking
green) for each
Ethernet port
Physical
Off No loss
Off No loss
Off No loss
On Remote sync loss
Off No loss
AC or DC Voltage
Power
Consumption
13W
Height
Width
Depth
Weight
Technical Specifications
1-25
Chapter 1 Introduction
Environment
Temperature
Regular option:
0 to 50C (32 to 122F)
Temperature-hardened option:
-22 to 65C (-7.6 to 149F)
Humidity
1-26
Technical Specifications
Up to 90%, non-condensing
Chapter 2
Installation and Setup
This chapter includes the following topics:
Package Contents
Equipment Needed
The RICi-16 unit ships completely assembled with factory defaults set for basic
operation. It is designed for installation as a desktop unit or mounting in a
19-inch rack. For rack installation instructions, refer to the Rack Mounting Kit for
19-inch Racks guide that comes with the RM kit.
After installing the unit, use an ASCII terminal connected to the CONTROL port to
perform any configuration necessary. The configuration procedures are described
in Chapter 3 and Chapter 4.
If problems are encountered, refer to Chapter 6.
Warning
2.1
2-1
2.2
Package Contents
AC power cord
DC connector kit
2.3
Required Equipment
RICi-16 needs no special tools for installation. You need a screwdriver for
mounting the unit in a 19-inch rack.
RICi-16 ships with the appropriate country- or region-specific power cord equipped
with a DC adapter to allow connecting DC power. The power cord connects
RICi-16 to the mains using the power socket on the rear panel.
Refer to the following table to determine which cables are required for
installation. Appendix A specifies all connector pin-outs.
Cable
Control port
RJ-45 cable
SFP
E1/T1 interface
RJ-45 cable
For an unbalanced E1 interface, use the adapter cable
provided
T3 Interface
2-2
Required Equipment
2.4
For rack installation instructions, refer to the Rack Mounting Kit for 19-inch Racks
guide that comes with the RM kit. A wall-mounting (WM) kit is available upon
request. For wall installations, refer to the Wall Mounting Kit for Installation of
8.5-inch Units.
2.5
Note
When connecting Ethernet and/or Gigabit Ethernet cables longer than 30m, it is
recommended to use shielded cables.
To connect RICi-16 to Ethernet equipment:
Connect the LAN line (RJ-45, 8-pin connector or SFP) to the RJ-45 connector
labeled 10/100BaseT.
2.6
To connect E1 or T1 equipment:
2-3
2.7
Connecting to T3 Equipment
To connect T3 equipment:
1. Connect the Rx cable (BNC coax connector) to the BNC labeled Rx.
2. Connect the Tx cable (BNC coax connector) to the associated BNC labeled Tx.
2.8
Caution Terminal cables must have a frame ground connection. Use ungrounded cables
when connecting a supervisory terminal to a DC-powered unit with floating
ground. Using improper terminal cable may result in damage to supervisory
terminal port.
2.9
Connecting to Power
Warning
2-4
Connecting to Power
Connecting to AC Power
AC power is supplied via a standard 3-prong inlet with an integral fuse holder.
AC power should be supplied through the 1.5m (5 ft) standard power cable
terminated by a 3-prong socket. The cable is provided with the unit.
To connect AC power:
1. Connect the power cable socket to the power connector on the RICi-16 rear
panel.
2. Connect the power cable plug to mains outlet.
The unit turns on automatically upon connection to the mains.
Connecting to DC Power
A special IEC 60320 adapter for 48/60 VDC power connection is supplied with the
unit.
To connect to DC power:
For instructions on wiring the DC adapter, refer to the DC power supply
connection supplement located at the end of this manual.
For safety instructions, refer to the Handling Energized Products section at the
beginning of this manual.
Connecting to Power
2-5
Warning
1. Using a flathead screwdriver, unscrew the two tightening screws that secure
the unit to the chassis.
2. Carefully pull and remove the power supply unit from the chassis.
Warning
Caution Do not install the RICi-16 power supply units in other products. The power supply
units are intended solely for RICi-16.
3. Carefully slide the new power supply into its slot until the unit's rear
connector engages the mating connector on the backplane, and the power
supply unit fits into place.
4. Using a flathead screwdriver, secure the power supply unit with the two
tightening screws.
2-6
Connecting to Power
Chapter 3
Operation
This chapter:
Provides a detailed description of the front panel controls and indicators and
their functions.
3.1
3-1
Chapter 3 Operation
3.2
Indicators
The unit's LEDs are located on the front panel. Table 3-1 lists the functions of
the LED indicators.
Color
Green
Function
On Unit is powered
Off Unit is off
TST
Yellow
ALM
Red
Red
Red
Red
Yellow
Green
Yellow
On Ethernet link is up
3-2
Indicators
3.3
Chapter 3 Operation
Default Settings
Not set/configured defaults These defaults are not visible when entering
the screen and are presented by a blank field. They show up after a Save
operation is done in the particular screen. For example, the ingress filtering
parameter shows the default value after changes in the bridge configuration
screen are saved.
Configuration parameters that do not have default values must have values
entered in their respective fields, or the Save operation will fail.
Table 3-2 lists the default settings of the RICi-16 configuration parameters.
Table 3-2. Default System Settings
Type
Parameter
Default Value
Default gateway
0.0.0.0
Default IP
0.0.0.0
DHCP
Disable
IP address
0.0.0.0
IP mask
255.255.255.0
Read community
Public
Trap community
Public
Write community
Private
Contact Person
Description
Location
Name
RICi-16
SNMP access
Enable
Enable
Web access
Enable
su (full control)
user (read-only)
System
Host
Device Info
Management Access
User Access
Default Settings
3-3
Chapter 3 Operation
Type
Encapsulation
Control Port
Network Interface
Default Value
Host Tagging
Untagged
Host VLAN ID
Alarm ID
Trap Status
Active
Baud Rate
9600 bps
Security Timeout
10
T3
Ethernet User
E1
T1
T3
3-4
Default Settings
Administrative Status
Up
Autonegotiation
Enable
Flow Control
Enable
Enable
Administrative Status
Up
Interface Type
Balanced
Line Code
HDB3
Line Type
G732N-CRC
Receiver Sensitivity
Long haul
Restoration Time
Immediate
System
Administrative Status
Up
Line Type
ESF
Line Interface
CSU
Line BuildOut
0 dB
Line Code
B8ZS
Receiver Sensitivity
Long haul
Restoration Time
1 Sec
System
Administrative Status
Up
Clock
System
Chapter 3 Operation
Parameter
Default Value
Line type
M23
Line length
Up to 225ft
Structure
Channelized
Aging Time
300
Bridge Ports
Application Layer
Bridge
2 = Ethernet 1
3 = Ethernet 2
4 = Ethernet 3
5 = Ethernet 4
6 = GFP1
Bridge Port
Forwarding Mode
Filter
VLAN Mode
Unaware
Activation
Enable
All
Disable
--
None
Ingress Filtering
Disable
Bridge Port
3.4
Disable
Default Priority
Disable
3-5
Chapter 3 Operation
9600 bps
Data Bits:
Parity:
None
Stop Bits:
Flow Control:
None
If you are using HyperTerminal, set the terminal mode to the 132-column
mode.
5. After the initialization and the self-test passed successfully, a menu appears
displaying initialization and self-test results.
Logging In
To log in:
1. Use su as user name with read/write permission.
2. Use 1234 as the (default) password for the first login.
Note
Choosing Options
This section explains how to select options and save changes.
To select an option:
1. Type the number corresponding to the option and press <Enter>.
2. If you performed a change, Save appears as the last option in the menu.
3. Type the number corresponding to the Save option in the current menu, and
press <Enter> to save your change.
RICi-16 updates its database with the new value or displays a new menu
for the selected option.
4. To exit the menu, press <ESC>.
The following message appears:
Do you want to save changes (Y/N/C)?
3-6
Chapter 3 Operation
Note
When a menu option has only two values, typing the option number and pressing
<Enter> will toggle between the available values.
Screen Example
Figure 3-2 illustrates a typical screen, displaying the main items.
Product Title (RICi-16)
Menu Path
1. Sub Menu>
2. Sub Menu>
3. Parameter X [Range] (value)
4. Parameter Y>
(Select value from the list)
5. Table Z []
prompt>
Help line message
Help line of keyboard shortcuts, such as Esc-prev for
returning to the previous menu
-----------Division screen line -----------------Scroll messages
Navigating Tables
Some of the management screens, such as the Inventory table and Manager
table, exceed the size of regular menu screens and require scrolling to navigate
between parameters. These screens are best viewed when your terminal screen is
set to 132 character width.
Use the following keys (case-sensitive) for table navigation:
Note
<Ctrl+L>:
<Ctrl+R>:
<Ctrl+U>:
<Ctrl+D>:
<Tab>:
G<row number>,
<col number>:
You can display these navigation keys by typing <?> from a table.
The following figure illustrates an empty VLAN table. VIDs and Names are the
columns of the parameters to be defined.
3-7
Chapter 3 Operation
RICi-16
VLAN Table
1. VID
| NAME
>
ESC-prev. menu; !-main menu; &-exit; ?-Help
1 user (s)
Note
In order to work with Internet Explorer 8 and Internet Explorer 9, you must enable
the work in compatibility mode.
Before you start using a Web browser for remote management or monitoring:
Enable scripts.
Disable pop-up blocking software, such as Google Popup Blocker. You may
also have to configure spyware and adware protecting software to accept
traffic from/to the destination IP address.
To prevent configuration errors, you must clear out the files stored in your
browser cache whenever you return to the same screen.
Logging In
3-8
Chapter 3 Operation
7. Enter your user name and the password. The default user name for
read/write permission is su and the default password is 1234.
The Web browsers Main menu appears.
Notes
network sessions (Telnet, Web, RADview-Lite) and one ASCII terminal session.
If no user input is detected for 5 minutes during a Web session,
Status:
Trace:
Refresh All:
To choose an option:
1. Click a link in the Web screen to display the next menu.
2. Once the target screen is displayed, select a value from the drop-down box or
enter it in a text box.
3-9
Chapter 3 Operation
3.5
Menu Maps
Once you have logged into RICi-16 via an ASCII terminal or Web Terminal, navigate
the hierarchical menus to set and view the units configuration parameters, and
perform other essential operations.
Figure 3-4 shows the actual main menu in an ASCII terminal screen. All system
configuration and control functions are access via this menu.
RICi-16 RAD Data Communications
Main Menu
1.
2.
3.
4.
5.
Inventory
Configuration
Monitoring
Diagnostics
Utilities
>
>
>
>
>
>
Please select item <1 to 5>
ESC-Previous menu; !-Main menu; &-Exit
Configuration (type 2)
Monitoring (type 3)
Diagnostics (type 4)
Perform diagnostics
Utilities (type 5)
The figures on the following pages summarize the menus available in the menu
map.
Note
3-10
Not all menus illustrated in the menu map are actually available. Available menus
depend on the configuration you purchased.
Menu Maps
Chapter 3 Operation
Configuration Menu
The following figures summarize the paths available for the configuration options:
Menu Maps
3-11
Chapter 3 Operation
3-12
Menu Maps
Chapter 3 Operation
Menu Maps
3-13
Chapter 3 Operation
3-14
Menu Maps
Chapter 3 Operation
Menu Maps
3-15
Chapter 3 Operation
Monitoring Menu
The following figures summarize the paths available for the monitoring options:
3-16
Menu Maps
Chapter 3 Operation
Menu Maps
3-17
Chapter 3 Operation
Diagnostics Menu
The following figure summarizes the paths available for the diagnostics options:
3-18
Menu Maps
Utilities Menu
The following figure summarizes the paths available for the additional tasks
options:
3.6
3-19
Chapter 3 Operation
3-20
Chapter 4
Configuration
This chapter describes how to configure RICi-16 for management and operation.
Configuration screens are illustrated and configuration parameters explained.
Note
The configuration screens illustrated in this chapter are taken from a terminal
screen, but most of the menus are similar to those viewed in Telnet and the
Web-based management application.
This chapter includes the following sections:
For instructions on accessing and navigating the screens, and a complete list of
all menu items, see Chapter 3.
4.1
Note
4-1
Chapter 4 Configuration
RICi-16
Configuration > System > Management > Device Information
Description
1. Name
2. Location
3. Contact
... (RICi-16)
... (The Location of the Device)
... (Name of Contact Person)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;
IP Address
Mask
Default gateway
Read community
Write community
Trap community
Encapsulation
...
...
...
...
...
...
>
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;
(0.0.0.0)
(255.255.255.0)
(0.0.0.0)
(public)
(private)
(public)
1 user(s)
4-2
Chapter 4 Configuration
(Tagged)
... (2)
... (0)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit
Note
Untagged The host sends and receives frames with no VLAN tag
to/from the bridge.
Tagged The host receives frames only if they are tagged with the hosts
VLAN ID, and it sends frames to the bridge with this tag.
When Host Tagging is set to Tagged, two parameters are added to the menu:
Host VLAN ID and Host Priority Tag.
10. Select Host VLAN ID to specify the host VLAN ID (14094).
11. Select Host Priority Tag to specify the priority level for the host VLAN (07).
12. Select Save.
13. Return to the Host menu and select Save again.
4-3
Chapter 4 Configuration
Configuring SNMPv3
RICi-16 supports SNMP version 3 entity, providing secure SNMP access to the
device by authenticating and encrypting packets transmitted over the network.
Follow these steps to configure the SNMPv3 entity:
1. Configuring the SNMP Engine ID
2. Enable SNMPv3.
3. Define SNMP engine ID
4. Add a new user.
5. Add a new notification entry.
6. Assign traps to notification entries.
7. Configure target (NMS) parameters.
8. Specify target address, define its parameter set and assign notification tags.
9. Map SNMPv3 setting to SNMPv1 settings (if necessary).
4-4
Chapter 4 Configuration
Enabling SNMPv3
To enable SNMPv3:
1. From the Management menu (Configuration > System > Management), select
SNMPv3 and then select Save.
A warning message is displayed advising that the current configuration of
SNMP agent will be deleted.
2. Select Y to continue or N to cancel.
Once enabled, the SNMPv3 Settings line is added to the Management
menu as illustrated in Figure 4-5.
RICi-16
Configuration > System > Management
1.
2.
3.
4.
5.
6.
7.
(Enabled)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit
1.
2.
3.
4.
5.
6.
Engine Boots
Engine Time
SNMP Message Size
Users
Targets & Notify
SNMPv1/v3 Mapping
SNMPv3 Factory Defaults
Summary User Table
Summary Target Table
(2)
(276)
... (1500)
>
>
>
[]
[]
>
ESC-Previous menu; !-Main menu; &-Exit
4-5
Chapter 4 Configuration
Note
Security Name
Authentication Protocol
Privacy Protocol
Authentication Password
Privacy Password
...
>
>
...
...
(1)
(usmHMACM5AuthProtocol)
(usmDESPrivProtocol)
[]
[]
>
FForward; BBack; RRemove; S-Save
ESC-Previous menu; !-Main menu; &-Exit
4. Select Privacy Protocol and define the type of privacy protocol to be used for
encryption:
Note
4-6
Chapter 4 Configuration
7. Select Save.
From the SNMPv3 Settings menu (Configuration > System > Management >
SNMPv3 Settings), select Summary User Table.
From the Users menu (Configuration > System > Management > SNMPv3
Settings > Users), perform the following:
RICi-16
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Notify
Type
>
1. Name
2. Tag
(Trap)
...()
...()
>
F-Forward B-Backwards R- Remove
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Notify.
Configuring RICi-16 for Management
4-7
Chapter 4 Configuration
Assigning Traps
One or more traps must be assigned to each notification entry.
Tag Name (A tag from the list of previously defined notification tags)
RICi-16
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Trap
1. Tag Name
2. Trap
>
>
(Power Failure)
(1)
>
F-Forward B-Backwards R-Remove
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
To delete a trap:
From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Trap.
4-8
Chapter 4 Configuration
SNMPv1
SNMPv2c
SNMPv2u
SNMPv3
Any
SNMPv1
SNMPv2c
Not defined
1.
2.
3.
4.
5.
Name
Message Processing Model
Security Model
Security Name
Security Level
...
>
>
...
>
(11)
(SNMPv1)
(Any)
()
(noAuthNoPriv)
>
F-Forward B-Backwards R-Remove
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Parameters.
4-9
Chapter 4 Configuration
1. From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Address.
The Target Address menu is displayed as illustrated in Figure 4-11.
2. From the Target Address menu, configure the following:
3. Select Save.
From the SNMPv3 Settings menu (Configuration > System > Management >
SNMPv3 Settings), select Summary Target Table.
RICi-16
1.
2.
3.
4.
Name
IP Address
Params Name
Tag List
...
...
...
...
(11)
(0.0.0.0)
(param1)
(traps)
>
F-Forward B-Backwards R-Remove>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Address.
4-10
Chapter 4 Configuration
Transport Tag (Specifies a set of the transport endpoints that are used,
in either of the following methods:
1.
2.
3.
4.
Community Index
Community Name
Security Name
Transport Tag
...
...
...
...
()
()
()
()
>
F-Forward B-Backwards R-Remove
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-11
Chapter 4 Configuration
Note
User Access
RADIUS Parameters
Telnet
SSH Access
SNMP Access
WEB Access
Access Policy
>
>
>
>
>
>
>
(Enable)
(Enable)
(Enable)
(Enable)
>
S Save
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 1 C
Description
Possible Value
Telnet
SSH Access
SNMP Access
4-12
Chapter 4 Configuration
Parameter
Description
Possible Value
WEB Access
Note
Available access permission settings depend on the access level selected in the
Management Access menu
3. Select Save.
RICi-16
Configuration> System> Management> Management Access> Radius parameters
1.
2.
3.
4.
5.
6.
>
...
...
...
...
...
(1)
(Not Connected)
(Disable)
(100.150.200.50)
(****)
(2)
(2)
(1812)
>
F-Forward
B-Backwards
ESCprevious menu; !main menu; &-exit
4-13
Chapter 4 Configuration
Description
Possible Value
Server Access
Enable
Disable
Server IP Address
0.0.0.0
Key String
Number of Retries
0-10
Timeout (secs)
Period in seconds during which RICi16 waits for a response from the
Radius server
1-5
Authentication Port
1-65535
3. Select Save
4. To switch to additional Radius servers, select <F> Forward or <B> Backward
respectively.
> (Radius)
> (Local)
>
S-Save
ESCprevious menu; !main menu; &-exit
4-14
Chapter 4 Configuration
2nd Level (Second level of authentication. Available only when the 1st
level authentication is set to RADIUS):
3. Select Save.
Note
Manager IP
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
1. Change cell
>
ESC-prev.menu; !-main menu; &-exit
1 user(s)
4-15
Chapter 4 Configuration
Description
IP Address
Possible Value
Default: 0.0.0.0
Trap Mask
Masked
Unmasked
Default: Unmasked
2. The list contains 10 entries. Use the Tab key to select the next changeable
cell.
3. To change the IP value of a cell, select the field (it will appear highlighted),
then choose Change Cell and enter the new IP value.
4. To change the Trap Mask value of a cell, select the field (it will appear
highlighted), then choose Change Cell for Masked, or choose Change Cell again
for Unmasked.
4.2
Clock source
Interface groups
Syslog
Fault propagation
4-16
Bridge
QoS
Flows
OAM.
Chapter 4 Configuration
Fallback Source:
It is recommended to assign different clock types for the master and fallback
clock sources, for example: Rx Clock (external) for the master source and Internal
for the fallback source.
If the fallback source fails, the internal source takes over.
Rx Clock:
Note
T3 Port 12:
4-17
Chapter 4 Configuration
Rx Clock:
T3 Port 12:
(T1)
(Internal)
>
f - Forward
ESC-Previous menu; !-Main menu; &-Exit
Figure 4-17. Master Clock Menu, T3 Network Mode and Channelized T3 Structure
RICi-16
Configuration > System > Source Clock > Master Clock
1. Source
(Internal)
>
ESC-Previous menu; !-Main menu; &-Exit
4-18
Chapter 4 Configuration
RICi-16
Configuration > System > Source Clock > Fallback Clock
System Clock
1. Source
(T1)
(Internal)
>
f - Forward
ESC-Previous menu; !-Main menu; &-Exit
(Internal)
>
ESC-Previous menu; !-Main menu; &-Exit
From the Date and Time menu (Configuration > System > Date and Time) set
the SNTP client parameters according to Figure 4-21 and Table 4-4.
RICi-16
Date
Time
SNTP
GMT
SNTP
SNTP
Send
[YYYY-MM-DD]
[HH-MM-SS]
mode
server IP address
update interval (sec)
initiated SNTP request
...
...
>
>
...
...
(2008-31-01)
(02:34:45)
(Unicast client)
(0)
(255.255.255.1)
(5)
>
ESC-Previous menu; !-Main menu; &-Exit
4-19
Chapter 4 Configuration
Description
Possible Values
Date
2000-01-01 to
2099-12-31
Time
00:00:00 to 23:59:59
SNTP mode
Disable
GMT
Unicast client
SNTP server
IP address
0.0.0.0
255.255.255.255
SNTP update
interval (min)
11440
Default: 0
Default: 60
You can manually initiate an SNTP request by selecting the Send initiated
SNTP request option. An SNTP request is immediately sent to the specified SNTP
server address upon selecting this option. Valid only when the SNTP mode is
'Unicast client'.
(0)
> (-)
> (-)
>
a-Add; f-Forward; b-Backward
ESC-Previous menu; !-Main menu; &-Exit
4-20
Chapter 4 Configuration
Note
Note
You can add a single port (1) as well as a range of ports (1-4 for Ethernet and 116 For GFP) to an interface group.
4. Select Save.
5. Repeat this procedure for all interface groups in use.
4-21
Chapter 4 Configuration
Note
>
>
>
>
>
>
>
(Bridge Mode)
(T3)
>
>
>
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
4-22
Chapter 4 Configuration
RICi-16
Configuration> System> Syslog
1.
2.
3.
4.
5.
>
...
>
>
>
(Enabled)
(514)
(Local 1)
(Minor)
>
S-Save
ESC-Previous menu; !-Main menu; &-Exit
Description
Possible Values
Device logging
status
Enabled
Disabled
Default: Disabled
Device UDP
port
165535
Default: 514
Local 1 Local 7
Default: Local 1
Severity level
4-23
Chapter 4 Configuration
Parameter
Description
Possible Values
Syslog
Debug corresponds to the
Debug (7) severity level of Syslog
Sequence
Access
IP Address
UDP Port
...
>
...
...
(1)
(Disable)
(190.72.140.100)
(514)
>
S-Save
ESC-Previous menu; !-Main menu; &-Exit
Description
Possible Values
Server
Sequence
15
Server Access
Enabled
Disabled
Default: Disabled
Server IP
Address
0.0.0.0
255.255.255.255
165535
Default: 514
4-24
Chapter 4 Configuration
> ()
> ()
()
()
()
>
a - Add
ESC-Previous menu; !-Main menu; &-Exit
Description
Possible Values
Faulty Interface
Group 1-10
Affected Interface
Group 1-10
Fault
Interface Down
OAM Signaling
4-25
Chapter 4 Configuration
Parameter
Description
Possible Values
Action
Interface Down
OAM Signaling
0-3600
(0 disables the WTR)
Default: 0
5. Select Save.
6. Repeat this procedure for all fault propagation definitions in use.
Administration status
Auto negotiation
Flow control
Data rate and duplex mode (only when Auto Negotiation is disabled)
OAM (EFM)
Policer Profile
MAC Access Control You can specify that the port accepts traffic only from
the first MAC address(es) from which it receives traffic.
4-26
Chapter 4 Configuration
RICi-16
Configuration > Physical Layer > Ethernet
Port
Interface
OAM EFM Mode
1. Administrative Status
2. Auto-Negotiation
3. Flow Control
4. Max Capability Advertised
5. MDIX Cross Over
6. OAM EFM
7. Policer Profile
8. VLAN Tag Ether Type (hex)
9. MAC Access Control
10.L2CP Filtering Profile
(1)
(RJ45)
(Passive)
(Up)
(Enable)
(Enable)
> (100base TX Full Duplex)
(Enable)
(Enable)
> (None)
...(8100)
>
> (default 2cpProfile)
>
S Save; F forward; B backward
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Decription
Possible Values
Port
14
Default: 1
Interface
Passive
Active
Administrative
Status
Up
Down
Auto-Negotiation
Default: Up
Enable
Disable
Default: Enable
Flow Control
Enable
Disable
4-27
Chapter 4 Configuration
Parameter
Decription
Possible Values
Max Capability
Advertised
Enable
Disable
OAM EFM
Enable
Disable
Default: Disable
Policer Profile
MAC Access
Control
0-FFFF
Default: 8100
Enable
Disable
Default: Disable
L2CP Filtering
Profile
4-28
Chapter 4 Configuration
RICi-16
Configuration>Physical Layer>Ethernet>MAC Access Control
Port
...(1)
Current Number of Permitted MAC Addresses
...(1)
1. MAC Access Control Administrative Status
> (Enable)
2. Maximum Number of Permitted MAC Addresses [0-10]...(0)
3. Permitted Static MAC Addresses
[]>
>
s-Save; f-Forward; b-Backward
ESC-Previous menu; !-Main menu; &-Exit
Description
Possible Values
Port
14
Default: 1
Current Number of
Permitted MAC Addresses
0-10
Default: 0
MAC Access Control
Administrative Status
Enable
Disable
Default: Disable
Maximum Number of
Permitted MAC Addresses
0-10
Default: 0
Once you have defined the maximum number of permitted MAC addresses
parameter (see Table 4-9) you can start to define static MAC addresses.
4-29
Chapter 4 Configuration
... (000000000000)
>
S-Save
ESC-Previous menu; !-Main menu; &-Exit
Profile Name
Profile Addresses.
(1)
... (Default Profile 1)
>
>
aAdd; fForward; bBackward; d-Delete
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
4-30
Chapter 4 Configuration
>
(Default Profile 1)
(1)
(000000000000)
(Tunnel)
>
aadd; fforward; bbackward; d-Delete
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Description
Possible Values
Profile Name
DefaultProfile1
1-32
Default: 1
Address
L2CP address
000000000000
Action
Discard
Tunnel
Default: Tunnel
5. Select Save.
6. Repeat this procedure for all address profiles in use.
4-31
Chapter 4 Configuration
RICi-16
Configuration > Physical Layer > E1
Port [1 16]
TX Clock Source
Line type
Restoration Time
1.
2.
3.
4.
(1)
> (System)
> (G.732N-CRC)
(Immediate)
Administrative Status
Interface Type
Line Code
Rx Sensitivity
(Up)
(Balanced)
> (HDB3)
(Long Haul)
>
SSave;
fforward;
bbackward;
1 M/ 2 C
Description
Possible Values
Port number
1-16
TX Clock Source
System
Line Type
G.732N-CRC
Restoration Time
Immediate
Administrative
Status
Up
Down
Interface Type
E1 interface type
Default: Up
Default: Balanced
Line Code
4-32
Balanced
Unbalanced
HDB3
AMI
Chapter 4 Configuration
Parameter
Description
Possible Values
Rx Sensitivity
Long Haul
Short Haul
3. Select Save.
4. Repeat this procedure for all E1 ports in use.
Note
If two CPEs such as RICi-16 communicate via VCG (VCAT) interfaces using a
16-frame multi-frame protocol (G.732N), network devices along the path must be
set to forward E1 frames transparently.
This section is relevant only for RICi-16 with T1 network ports, or channelized T3
network interface.
To configure T1 ports:
1. From the Physical Layer menu (Configuration >Physical Layer), select T1.
The T1 menu appears as illustrated in Figure 4-33.
RICi-16
Configuration > Physical Layer > T1
Port [1 16]
TX clock Source
Line Type
Restoration Time
1.
2.
3.
4.
5.
6.
>
>
Administrative Status
Line Code
Line Interface
Line Length
Line Build Out (db)
Rx Sensitivity
>
>
(1)
(System)
(ESF)
(1 sec)
(Up)
(B8ZS)
(DSU)
(0133 ft)
(0)
(Long Haul)
>
s-Save;
fForward;
bBackward;
1 M/ 2 C
4-33
Chapter 4 Configuration
Description
Possible Values
Port
1 - 16
Line Type
ESF
TX clock source
System
Restoration Time
1 sec.
Default: 1 sec.
Administrative Status
Line Code
Line Interface
Line Length
Rx Sensitivity
Up
Down
B8ZS
AMI
DSU
CSU
0-133 ft
133-266
266-399
399-533
533-655
ft
ft
ft
ft
0 dB
-7.5 dB
-15 dB
Short Haul
Long Haul
3. Select Save.
4. Repeat this procedure for all T1 ports in use.
Note
4-34
If two CPEs such as RICi-16 communicate via VCG (VCAT) interfaces using a
24-frame multi-frame protocol (ESF), network devices along the path must be set
to forward T1 frames transparently.
Chapter 4 Configuration
>
Administrative Status
Structure
Line Type
Line Length
Mapping
(1)
(System)
(Up)
(Channelized)
(M23)
(Up to 225ft)
[]>
>
sSave;
fForward;
bBackward
1 M/ 2 C
Description
Possible Values
Port
12
TX Clock Source
System
Administrative Status
Up
Down
Default: Up
Structure
Channelized
Unchannelized
Default: Channelized
4-35
Chapter 4 Configuration
Parameter
Description
Possible Values
Line Type
M23
C-bit Parity
Default: M23
Up to 225ft
Over 225ft
3. Select Save.
4. Repeat this procedure for both T3 ports if T3 structure is unchannelized. Only
the first T3 ports are available to be configured if T3 structure is channelized.
Note
If two CPEs such as RICi-16 communicate via VCG (VCAT) interfaces using a
24-frame multi-frame protocol (ESF), network devices along the path must be set
to forward T1 frames transparently.
Note
From the System menu (Configuration > System > Protection), select
Protection and perform the following:
Load sharing, with both ports in the pair active, sharing the overall
traffic load. When one of the ports fails, the other port takes over.
None:
4-36
This section is relevant only for RICi-16/T3. Mapping capabilities for RICi-16/T3
depend on the user license (1-4, 1-8, 1-12, 1-16) that you currently hold
Chapter 4 Configuration
The T3 channel map offers a bird's eye view of which channel is mapped to which
port. You can map up to 28 T3 channels to up to 16 physical T1 ports and up to
16 VCGs. A physical T1 port can be mapped only once to a T3 channel. A VCG
logical port can be mapped to up to 16 T3 channels. The default T3 channel
mapping configuration is:
Note
If you want to map a T3 channel to a VCG other than VCG 1, you must first create
the VCG logical port. Refer to Configuring the Logical Layer for details.
From the T3 menu (Configuration > Physical Layer > T3), select Mapping.
The T3 Mapping menu appears as illustrated in Figure 4-35. The default
mapping configuration is shown. When the mapping menu appears, the
cursor is positioned at the connection for channel 1.
RICi-16
Configuration > Physical Layer > T3 > Mapping
Channel
1
2
3
4
5
6
7
8
9
10
Connection
T1-1
T1-2
T1-3
T1-4
T1-5
T1-6
T1-7
T1-8
T1-9
T1-10
1. T1-1
2. T1-2
3. T1-3
4. T1-4
5. T1-5
6. T1-6
Channel
11
12
13
14
15
16
17
18
19
20
7. T1-7
8. T1-8
9. T1-9
Connection
T1-11
T1-12
T1-13
T1-14
T1-15
T1-16
LP1
LP1
LP1
LP1
10. T1-10
11. T1-11
12. T1-12
>
ESC-Previous menu; !-Main menu; &-Exit
Channel
21
22
23
24
25
26
27
28
13. T1-13
14. T1-14
15. T1-15
Connection
LP1
LP1
LP1
LP1
LP1
LP1
LP1
LP1
16. T1-16
17. LP1
18. N/C
1 M/ 2 C
4-37
Chapter 4 Configuration
2. Type the value corresponding to the connection that you want to map to the
channel, and click <Enter>. For example, type 1 to map to T1 port 1, or 16 to
map to logical port 1. If the list of potential connections is too large to fit on
the screen, type <n> to display the next part of the list, and <p> to display the
previous part of the list.
Note
Interface
Type
Port Name
Bound to
VCG
VCG 1
GFP
GFP 1
4-38
Logical
Port
Interface
Type
Port Name
Bound to
VCG
VCG 1
GFP
GFP 1
Chapter 4 Configuration
Table 4-16. Default Logical Port Settings for E1/T1 Network Interface
Logical
Port
Interface
Type
Port Name
Bound to
VCG
VCG 1
GFP
GFP 1
1.
2.
3.
4.
Port
(1)
Interface Type
>
Bind To Internal Ports
>
Max differential delay (msec)[0 - 256]
Administrative Status
Port Name
...
Loop Detection
Signal Degrade
>
(VCG)
(13-28)
(256)
(Up)
(VCG 1)
(Enable)
(10-6)
>
aadd; fforward; bbackward
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
1.
2.
3.
4.
5.
Port
(1)
Interface Type
>
Max differential delay (msec)[0 - 256]
Administrative Status
Port Name
...
Bind to Physical Ports
>
Loop Detection
Signal Degrade
(VCG)
(256)
(Up)
(VCG 1)
(1-2)
(Enable)
(10-6)
>
aadd; fforward; bbackward
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Figure 4-37. Logical Layer Menu (VCG) E1/T1 or T3 Interface, Not Channelized
4-39
Chapter 4 Configuration
RICi-16
Configuration > Logical Layer
Port
1.
2.
3.
4.
(2)
Interface Type
Bind To
Administrative Status
Port Name
Payload FCS
Mac Parameters
>
(GFP)
(VCG 1)
(Up)
... (GFP 1)
(Absent)
>
>
aAdd; fForward; b-Backward
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Description
Possible Values
Port
116
Interface Type
VCG
GFP
128
(Single number or range)
E1/T1: 116
T3: 12
(Single number or range)
Bind to
VCG <n>
Administrative Status
Up
down
Default: Up
Port Name
VCG 1
GFP 1
256
Default: 256
4-40
Chapter 4 Configuration
Parameter
Description
Possible Values
Payload FCS
Present
Absent
Default: Absent
Loop Detection
Enable
Disable
Default: Enable
Signal Degrade
10-6
(2)
(Passive)
... (GFP 1)
... (8100)
(Disable)
(QDefaultProfile1)
1 M/ 2 C
1.
2.
3.
4.
>
4-41
Chapter 4 Configuration
Description
Possible Values
Port
12
Passive (default)
Active
Port Name
OAM EFM
0-FFFF
Default: 8100
Enable
Disable
Default: Disable
Queue Profile
Profile name
4. Select Save.
Note
If the application mode is set to Flows, the bridge parameters do not show
To set the application mode to Bridge:
From the System menu (Configuration > System), select Application Mode
and press Enter.
The application mode is set to Bridge. The Bridge menu is available in the
Applications menu (Configuration > Applications).
Table 4-19
4-42
Chapter 4 Configuration
RICi-16
Configuration > Applications > Bridge
1.
2.
3.
4.
5.
6.
VLAN Mode
Forwarding Mode
Aging Time (sec) [300 - 4080]
Static MAC Table
Bridge Port
VLAN Membership
>
>
(Aware)
(Filter)
... (300)
[]>
>
>
>
sSave
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Description
Possible Values
VLAN Mode
Forwarding Mode
Aging Time
300-4080 secs
3. To configure the Static MAC Table, refer to Configuring the MAC Table.
4. To configure the Bridge Port, refer to Configuring the Bridge Ports.
5. To configure the VLAN Membership (in Aware bridge only), refer to Configuring
VLAN Membership.
4-43
Chapter 4 Configuration
The Static MAC Table appears as illustrated in Figure 4-41, with VLAN ID
entries for a VLAN-aware bridge only.
RICi-16
Configuration > Applications > Bridge > Static MAC Table
VLAN ID
1
2
3
4
5
|
v
MAC Address
111111111111
222222222222
333333333333
444444444444
555555555555
Bridge Port
1
2
3
4
5
>
sSave; aAdd; rRemove; c-Clear
ESC-prev menu; !-main menu; &-exit; ?-help
1 M/ 2C
... (0)
... (000000000000)
... (0)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
1 M/ 2 C
Select VLAN ID, and choose a VLAN ID for the MAC address between
1 and 4094.
Select Bridge Port, and choose the interface this MAC address should be
attached to.
In the Static MAC Table (Figure 4-41), select the desired MAC address and
press <R>.
The MAC address is deleted from the table.
4-44
Chapter 4 Configuration
Bridge Port
Bound to
Ethernet port 1
Ethernet port 2
Ethernet port 3
Ethernet port 4
4-45
Chapter 4 Configuration
RICi-16
Configuration > Applications > Bridge > Bridge Ports
Bridge port [1 16]
Bind To
1.
2.
3.
4.
5.
6.
7.
8.
9.
Activation
Ingress Filtering
Accept Frame Type
Port VID\Stacking VID [1 4094]
Copy Origin Priority
Default Priority Tag [0-7]
Egress Tag Handling
Ingress Tag Handling
Queue Mapping Profile
(2)
(Fast Ethernet 1)
(Enable)
(Disable)
(All)
... (3)
(Disable)
... (4)
(Stacking)
(Stripping)
>
(QMDefaultProfile1)
>
f-Forward ; b-Backward; g-Go To ; d-Delete sSave
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
1 M/ 2 C
Possible Values
Possible Values
Bridge Port
Remarks
1120
Bind to
Fast Ethenet
Logical Port
Host
Enable
Disable
Default: Enable
Ingress Filtering
Enable
Disable
All
Tag Only
14094
Default: 2
4-46
Chapter 4 Configuration
Parameter
Possible Values
Possible Values
Enable
Disable (default)
Default: Disable
Default Priority Tag
07
Default: None
Stacking
Stripping
None
Stacking
Stripping
Profile name
...
>
>
(1)
(1-10,12)
(6,9,120)
>
sSave; fForward; bBack; gGo; dDelete;
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
4-47
Chapter 4 Configuration
2. Select VLAN ID, and type the VLAN ID you wish to configure.
3. Select Egress Tagged Ports. Define the set of ports to transmit packets for
this VLAN as tagged.
4. Select Egress UnTagged Ports. Define the set of ports to transmit packets for
this VLAN as untagged.
5. Select Save.
Marking profiles
Policer profiles
Shaper profiles
Queue profiles.
Profiles can be applied to the traffic flows to ensure the desired flow
classification and prioritization.
>
>
>
>
>
>
ESC-prev.menu; !-main menu; &-exit
4-48
Chapter 4 Configuration
RICi-16
Configuration > Application > QoS > Queue Mapping Profiles
Profile [1-32]
(1)
1. Name
... ()
2. Ingress Priority Method > (802.1p)
3. Mapping
[]>
>
a-Add; f-Forward; b-Backward; d-delete
ESC-prev.menu; !-main menu; &-exit
0
1
2
3
4
5
6
7
Queue
1
1
2
2
3
3
4
4
... (1)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-49
Chapter 4 Configuration
Press <A> to add a tag value and then define the tag value (0-63).
Press <B> to delete a tag value and then define the tag value to be deleted.
RICi-16
Configuration>Application>QoS>Queue Mapping Profiles>Mapping
1.
2.
3.
4.
5.
6.
7.
8.
Tag
Tag
Tag
Tag
Tag
Tag
Tag
Tag
Value
Value
Value
Value
Value
Value
Value
Value
0
1
2
3
4
5
6
7
[1-4]
[1-4]
[1-4]
[1-4]
[1-4]
[1-4]
[1-4]
[1-4]
...
...
...
...
...
...
...
...
(1)
(1)
(2)
(2)
(3)
(3)
(4)
(4)
>
a-Add; d-Delete
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-50
Chapter 4 Configuration
RICi-16
Configuration>Application>QoS>Queue Mapping Profiles>Mapping
IP Precedence
Tag Value 0
Tag Value 1
Tag Value 2
Tag Value 3
Tag Value 4
Tag Value 5
Tag Value 6
Tag Value 7
Queue
1
1
2
2
3
3
4
4
... (1)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-51
Chapter 4 Configuration
7. Select Mapping.
The associated Mapping menu appears as illustrated in Figure 4-51.
8. From the Mapping menu, select a priority tag value 07 and map it to a
priority queue (07).
RICi-16
Configuration > Application > QoS > Marking Profiles > Mapping
802.1p
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
0
1
2
3
4
5
6
7
Marking
0
1
2
3
4
5
6
7
... (1)
>
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
4-52
Press <A> to add a tag value and then define the tag value (0-63).
Press <B> to delete a tag value and then define the tag value to be deleted.
Chapter 4 Configuration
RICi-16
Configuration > Application > QoS> Marking Profiles > Mapping
1.
2.
3.
4.
5.
6.
7.
8.
Tag
Tag
Tag
Tag
Tag
Tag
Tag
Tag
Value
Value
Value
Value
Value
Value
Value
Value
0
1
2
3
4
5
6
7
[0-7]
[0-7]
[0-7]
[0-7]
[0-7]
[0-7]
[0-7]
[0-7]
...
...
...
...
...
...
...
...
(0)
(1)
(2)
(3)
(4)
(5)
(6)
(7)
>
a-Add; d-Delete
ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
Marking
0
1
2
3
4
5
6
7
1 Mngr/s
4-53
Chapter 4 Configuration
1.
2.
3.
4.
5.
Policer [1-32]
Name
CIR [0-100000]
CBS [0-12176]
EIR [0-100000]
EBS [0-12176]
...
...
...
...
...
(1)
(DefaultPolicer1)
(0)
(0)
(100000)
(12176)
>
a-Add, f-Forward, b-Backward
ESC-prev.menu; !-main menu; &-exit
Description
Possible Values
CIR
0,64100,000 kbps
0,6412,176 kbps
1 x Byte granularity
Default: 0
4-54
Chapter 4 Configuration
Parameter
Description
Possible Values
EIR
0,64100,000 kbps
0,64-12,176 kbps
1 x Byte granularity
Default: 12,176
... (1)
... (DefaultShaper1)
... (100000)
>
a-Add; f-Forward; b-Backward
ESC-prev.menu; !-main menu; &-exit
4-55
Chapter 4 Configuration
Description
Possible Values
CIR
0,64100,000 kbps
... (QDefaultProfile1)
>
(DefaultShaper1)
>
>
a-Add, f-Forward, b-Backward
ESC-prev.menu; !-main menu; &-exit
4-56
Chapter 4 Configuration
RICi-16
Configuration>Application>QoS>Queue Profiles>Internal Queues
1.
2.
3.
4.
ID [1-5]
Scheduling
Weight [1-100]
Shaper Profile
...
...
...
...
(1)
(WFQ)
(50)
(DefualtShaper1)
>
f-Forward; b-Backward
ESC-prev.menu; !-main menu; &-exit
Description
Possible Values
Scheduling
150
Weight
Shaper Profile
Default: WFQ
Default: 50
Configuring Flows
RICi-16 provides traffic flow classification between the traffic source and its final
destination. RICi-16 supports up to 64 unidirectional flows. Each flow is defined
by a classification profile.
In Flow-based operation mode, incoming customer traffic is classified and
mapped according to port-based (all-in-one) bundling or by user port and CE
VLAN-ID, VLAN priority, DSCP and IP precedence. Operators can differentiate
services using classification methods, police the traffic and enforce SLA per
service
This section explains how to define flows and add packets to the flows according
to specific criteria.
4-57
Chapter 4 Configuration
Note
If RICi-16s application mode is set to Bridge, the Flows parameter does not
show.
The following flow related options are available:
Classification profiles
Flow definitions.
Defining Flows
4-58
To navigate to a different flow ID, press <f> or <b> to browse the Flow
IDs forward or backward respectively.
Chapter 4 Configuration
RICi-16
Configuration > Applications > Flows > Flow Definition
Flow [1-64]
Ingress Port
1. Name
2. Administrative Status
3. Priority [1-256]
4. Classifier Profile
5. Policer Profile
6. Egress Port
7. Queue Mapping Method
8. Queue [1-4]
9. Drop Frames
10.Looopback Action
11.VLAN Actions
(1)
(ETH1)
... (Flow 1)
(Enable)
... (1)
>
(DefaultUnclassified)
>
(DefaultPolicer1)
>
(GFP1)
(Fixed)
>
(1)
(Disable)
(Disable)
>
>
a-Add; f-Forward; b-Backward; d-Delete
ESC-Previous menu; !-Main menu; &-Exit
Description
Possible Values
Flow ID
1 32
Name
Administrative Status
Ingress Port
Enable
Disable
Default: None
Host
ETH1-4
GFP1-16
Priority
1-256
Classifier Profile
ClassificationDefaultProfile1
Default: None
Policer Profile
DefaultPolicer1
Default: None
Egress Port
Default: None
Host
ETH1-4
GFP-1
Fixed
Profile
Default: Fixed
4-59
Chapter 4 Configuration
Parameter
Description
Possible Values
Queue
04
Default: 0
Drop Frames
Enable
Disable
Loopback Action
Enable
Disable
VLAN Actions
1. From the Flow Definition menu (Configuration > Applications > Flows > Flow
Definition), select VLAN Actions.
The VLAN Actions menu appears as illustrated in Figure 4-59.
RICi-16
Configuration > Applications > Flows > Flow Definition > VLAN
Actions
1.
2.
3.
5.
6.
7.
8.
9.
10.
11.
13.
Outer
Outer
Outer
Outer
Outer
Outer
Inner
Inner
Inner
Inner
Inner
VLAN Action
VLAN[0-4094]
Pbit Method
Pbit Profile
Mark
Mark VLAN[0-4094]
VLAN Action
VLAN [0-4094]
Pbit Method
Pbit Value[0-7]
Mark
>
(Push)
... (1)
(Profile)
>
(MarkingDefault1)
(Enable)
... (0)
>
(Push)
... (0)
(Fixed)
... (0)
(Disable)
>
s-Save
ESC-Previous menu; !-Main menu; &-Exit
Description
Possible Values
Push
Pop
None
Default: None
Outer VLAN
0 4094
Default: 0
4-60
Chapter 4 Configuration
Parameter
Description
Possible Values
Profile
Fixed
Default: Fixed
Outer Pbit Profile
Default: DefaultMarkingProfile1
Outer Mark
Default: Disable
Enable
Disable
0 - 4094
Default: 0
Inner VLAN Action
Inner VLAN
Default: None
Push
Pop
None
0 - 4094
Default: 0
Inner Pbit Method
Profile
Copy
Fixed
0-7
Default: 0
Inner Mark
Enable
Disable
4-61
Chapter 4 Configuration
RICi-16
Configuration > Applications > OAM > CFM
1. Maintenance Domains
2. Standard OAM MAC Address
3. Standard OAM EtherType [0-ffff]
>
... (0180C2000030)
... (8902)
>
Please select item <1 to 3>
ESC-Previous menu; !-Main menu; &-Exit
Description
Possible Values
Default: 0180C2000030
Standard OAM
EtherType
0 - ffff
Default: 8902
2. If necessary, modify the OAM MAC Address and/or the Standard OAM Ether
Type as defined in Table 4-27.
3. Click Save.
4-62
Chapter 4 Configuration
RICi-16
Configuration > Applications > OAM > CFM > Maintenance Domains
1.
2.
3.
4.
5.
MD ID
... (000000000102)
Protocol Type
MD Name Format
MD Name
MD Level [0-7]
Maintenance Associations
(Standard)
>
(String)
... ()
... (3)
>
>
a-Add New MD; f-Forward; b-Backward; d-Delete
ESC-Previous menu; !-Main menu; &-Exit
Description
Possible Values
MD ID
Protocol Type
Pre-Standard
Standard
MD Format
None
String
DNS Like
MAC + UINT
Default: String
MD Name
MD Level
0-7
Default: 0
Press <d>.
4.3
Viewing Inventory
The inventory displays a description of the unit including its hardware revision
and power supply type.
Note
The inventory is a wide table with 132 characters. It is best viewed by setting
your terminal to 132 character wide display.
4-63
Chapter 4 Configuration
Inventory
ID
1001
| 7001
v 7002
7003
7004
7005
7006
7007
7008
- >
Description
RICi-16 Device
Fast Eth Port 1
Fast Eth Port 2
Fast Eth Port 3
Fast Eth Port 4
E1 Port 1
E1 Port 2
E1 Port 3
E1 Port 4
>
Entity name
RICi-16
FAST 1
FAST 2
FAST 3
FAST 4
E 1
E 2
E 3
E 4
HWRev
1.00
>
From the Main Menu, navigate to Utilities > License Management > Feature
Status.
The Feature Status information is displayed.
RICi-16
4 E1/T1 Ports
8 E1/T1 Ports
12 E1/T1 Ports
16 E1/T1 Ports
...
...
...
...
(Enabled)
(Disable)
(Disable)
(Disable)
>
ESCprevious menu; !main menu; &-exit
4-64
Chapter 4 Configuration
Note
>
(9600 bps)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit
User
User Name
Password
su
1234
user
1234
4-65
Chapter 4 Configuration
RICi-16
Configuration > System > Management > Management Access > User Access
1.
2.
3.
4.
User Name
Old Password
New Password
Confirm New Password
...
...
...
...
(su)
(********)
(********)
(********)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Note
4-66
Chapter 4 Configuration
Management software allows file transfer via TFTP only. You may also download
the software files to RICi-16 using the Boot Manager, using XMODEM or TFTP, as
explained in Appendix B.
Server IP Address
Remote File Name
File Type
Command
... (0.0.0.0)
... ()
(Configuration)
>
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Select Server IP Address, and enter the IP address of the TFTP server.
Select Remote File Name, and enter a file name as explained below.
Select File Type, and choose whether you intend to transfer software
(IMG) or configuration (Configuration) file.
4-67
Chapter 4 Configuration
Resetting RICi-16
RICi-16 lets you reset the unit while preserving customized parameters or
resetting all customized parameters to the factory defaults.
To reset RICi-16:
1. From the Utilities menu, select Reset Device.
You are asked to confirm your request:
The device will restart. Do you want to proceed? (Y/N)
2. Press <Y> to confirm your request.
RICi-16 resets, preserving the last-saved settings.
4-68
Chapter 5
Configuring Typical
Applications
This chapter provides instructions for configuring RICi-16 for typical applications.
5.1
Figure 5-1 illustrates an application where three RICi-16 units provide Ethernet
cellular backhauling, working opposite a third-party Ethernet device. Each unit has
a different interface option: channelized DS-3, 16 E1 ports, and unchannelized
T3.
Third-party Ethernet device that can work opposite all the RICi-16 interface
options.
5-1
Host IP
IP mask
Default Gateway
RICi-16 (A)
192.188.10.12
255.255.255.0
192.188.10.1
RICi-16 (B)
192.188.10.14
255.255.255.0
192.188.10.1
RICi-16 (C)
192.188.10.16
255.255.255.0
192.188.10.1
...
...
...
...
...
...
>
(192.188.10.12)
(255.255.255.0)
(192.188.10.1)
(public)
(private)
(public)
1 user(s)
5-2
1M/ 1C
1M/ 1C
Note
For this type of configuration the network must provide the internal clock.
5-3
For the RICi-16 (A) unit, you can use the default T1 port configurations. Use
the T1 Physical Layer menu to check that the default configuration is in place
for T1 ports 116.
RICi-16
Administrative Status
Line Code
Line Interface
Line Length
Rx Sensitivity
(1)
> (System)
> (ESF)
(1 Sec)
>
>
(Up)
(B8ZS)
(DSU)
(0133 ft)
(Long Haul)
>
f forward
b backward
1 M/ 2 C
5-4
(1)
> (System)
Administrative Status
Structure
Line Type
Line Length
Mapping
(Up)
(Channelized)
(M23)
(Up to 225ft)
[]>
>
f forward;
b backward
1 M/ 2 C
Channel
21
22
23
24
25
26
27
28
13. T1-13
14. T1-14
15. T1-15
Connection
LP1
LP1
LP1
LP1
LP1
LP1
LP1
LP1
16. T1-16
17. LP1
18. N/C
1 M/ 2 C
5-5
For the RICi-16 (B) unit, you can use the default E1 port configurations. Use
the E1 Physical Layer menu to check that the default configuration is in place
for E1 ports 116.
RICi-16
Configuration > Physical Layer > E1
1.
2.
3.
4.
Port
TX Clock Source
Line type
Restoration Time
(1)
(System)
(G.732N-CRC)
(Immediate)
Administrative Status
Interface Type
Line Code
Rx Sensitivity
(Up)
(Balanced)
(HDB3)
(Long Haul)
>
s Save;
f forward;
b backward
1 M/ 2 C
Use the T3 Physical Layer menu to ensure that the T3 interface is not
channelized.
RICi-16
1.
2.
3.
4.
Port
TX Clock Source
(1)
(System)
Structure
Line Type
Administrative Status
Line Length
(Unchannelized)
(M23)
(Up)
(Up to 225ft)
>
s Save;
f forward
1 M/ 2 C
1.
2.
3.
4.
>
Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-16)
E1/T1 Loop Detection
Enable
1 M/ 2 C
1.
2.
3.
4.
>
Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-2)
E1/T1 Loop Detection
Enable
1 M/ 2 C
5-7
5.2
Figure 5-1 illustrates an application where two RICi-16 units, with eight and four
E1 ports respectively, extend Ethernet services over PDH/SONET/SDH, working
opposite RADs Egate-100.
Host IP
IP mask
Default Gateway
RICi-16 (A)
192.188.10.12
255.255.255.0
192.188.10.1
RICi-16 (B)
192.188.10.14
255.255.255.0
192.188.10.1
5-8
...
...
...
...
...
...
>
(192.188.10.12)
(255.255.255.0)
(192.188.10.1)
(public)
(private)
(public)
1 user(s)
1M/ 1C
5-9
RICi-16
Configuration > System > System Clock
1. Source
> (Rx Clock)
2. Port
> (T1 Port)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;
1M/ 1C
Note
For this type of configuration, either the Egate-100 (located in the Central Office)
should be configured for internal clock, or the network must provide the internal
clock.
For the RICi-16 (A) unit, you can use the default E1 port configurations. Use
the E1 Physical Layer menu to check that the default configuration is in place
for E1 ports 18.
RICi-16
Configuration > Physical Layer > E1
1.
2.
3.
4.
Port [1 16]
TX Clock Source
Line type
Restoration Time
(1)
(System)
(G.732N-CRC)
(Immediate)
Administrative Status
Interface Type
Line Code
Rx Sensitivity
(Up)
(Balanced)
(HDB3)
(Long Haul)
>
s Save;
f forward;
b backward
1 M/ 2 C
5-10
For the RICi-16 (B) unit, you can use the default E1 port configurations. Use
the E1 Physical Layer menu to check that the default configuration is in place
for E1 ports 14.
RICi-16
Configuration > Physical Layer > E1
1.
2.
3.
4.
Port [1 16]
TX Clock Source
Line type
Restoration Time
(1)
(System)
(G.732N-CRC)
(Immediate)
Administrative Status
Interface Type
Line Code
Rx Sensitivity
(Up)
(Balanced)
(HDB3)
(Long Haul)
>
s Save;
f forward;
b backward
1 M/ 2 C
4. Type 916.
5. Type s to save your changes.
6. Click <ESC> to return to the previous menu. The logical port is now bound to
to E1 ports 1-8, as illustrated in Figure 5-20.
5-11
RICi-16
Configuration > Logical Layer
1.
2.
3.
4.
>
Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-16)
E1/T1 Loop Detection
Enable
1 M/ 2 C
Figure 5-18. Logical Layer Menu (VCG) Bound to E1 Ports 116, RICi-16 (A)
RICi-16
Configuration > Logical Layer > Bind To Physical Ports (116)
1. [1-16]...
2. Delete Range...
>
(18)
1 M/ 2 C
1.
2.
3.
4.
Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-8)
E1/T1 Loop Detection
Enable
>
s Save; f forward; b - backward
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Figure 5-20. Logical Layer Menu (VCG) Bound to E1 Ports 18, RICi-16 (A)
5-12
4. Type 516.
5. Type s to save your changes.
6. Click <ESC> to return to the previous menu. The logical port is now bound to
to E1 ports 1-4, as illustrated in Figure 5-23.
RICi-16
Configuration > Logical Layer
1.
2.
3.
4.
>
Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-16)
E1/T1 Loop Detection
Enable
1 M/ 2 C
Figure 5-21. Logical Layer Menu (VCG) Bound to E1 Ports 116, RICi-16 (B)
RICi-16
Configuration > Logical Layer > Bind To Physical Ports (116)
1. [1-16]...
2. Delete Range...
>
(14)
1 M/ 2 C
5-13
RICi-16
Configuration > Logical Layer
1.
2.
3.
4.
>
Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-4)
E1/T1 Loop Detection
Enable
1 M/ 2 C
Figure 5-23. Logical Layer Menu (VCG) Bound to E1 Ports 18, RICi-16 (B)
5-14
5.3
Figure 5-1 illustrates an application where a RICi-16 unit with channelized DS-3
interface supports four customer premises with RICi-16T1 units and one
customer premises with RICi T1 unit.
Figure 5-24. RICi-16 with Channelized DS-3 Supporting Multiple Customer Premises
This application has the following requirements:
5-15
The required channel mapping and logical ports for this application are shown in
the following table.
5-16
T3 channel
Corresponding Unit
VCG 1
RICi-16T1 (A)
VCG 1
RICi-16T1 (A)
VCG 1
RICi-16T1 (A)
VCG 1
RICi-16T1 (A)
VCG 2
RICi-16T1 (B)
VCG 2
RICi-16T1 (B)
VCG 2
RICi-16T1 (B)
VCG 2
RICi-16T1 (B)
VCG 2
RICi-16T1 (B)
10
VCG 2
RICi-16T1 (B)
11
VCG 2
RICi-16T1 (B)
12
VCG 2
RICi-16T1 (B)
13
VCG 3
RICi-16T1 (C)
14
VCG 3
RICi-16T1 (C)
15
VCG 3
RICi-16T1 (C)
16
VCG 3
RICi-16T1 (C)
17
VCG 3
RICi-16T1 (C)
18
VCG 3
RICi-16T1 (C)
19
VCG 3
RICi-16T1 (C)
20
VCG 3
RICi-16T1 (C)
21
VCG 4
RICi-16T1 (D)
22
VCG 4
RICi-16T1 (D)
23
VCG 4
RICi-16T1 (D)
24
VCG 4
RICi-16T1 (D)
25
VCG 5
RICi-T1 (E)
26
VCG 5
RICi-T1 (E)
27
VCG 5
RICi-T1 (E)
28
VCG 5
RICi-T1 (E)
RICi-16
Configuration > System > Management > Host
1. IP Address
2. IP Mask
3. Default gateway
4. Read community
5. Write community
6. Trap community
7. Encapsulation
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;
...
...
...
...
...
...
>
(192.188.10.12)
(255.255.255.0)
(192.188.10.1)
(public)
(private)
(public)
1 user(s)
1M/ 1C
5-17
RICi-16
Configuration > System > System Clock
1. Source
> (Rx Clock)
2. Port
> (T1 Port)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;
1M/ 1C
Note
For this type of configuration, either the RICi-16 (located at the Central Office)
should be configured for internal clock, or the network must provide the internal
clock.
1.
2.
3.
4.
3.
Port
TX Clock Source
(1)
(System)
Structure
Line Type
Administrative Status
Line Length
Mapping
(Channelized)
(M23)
(Up)
(Up to 225ft)
>
>
s Save;
f forward;
b backward
1 M/ 2 C
5-18
1 M/ 2 C
1 M/ 2 C
5-19
RICi-16
Configuration > Logical Layer
Port
(3)
Interface Type
> (VCG 2)
Bind To Internal Ports
(-)
Max differential delay (msec)[0 - 256] (256)
1. Administrative Status
(Up)
2. Port Name
... (VCG 2)
3. E1/T1 Loop Detection
Enable
>
a add; f forward; b backward; d delete
ESC-Previous menu; !-Main menu; &-Exit
1 M/ 2 C
Note
The corresponding GFP logical port is created automatically by RICi-16 for each
new VCG logical port.
5-20
9. T1-9
10. T1-10
Channel
21
22
23
24
25
26
27
28
11. T1-11
12. T1-12
Connection
LP1
LP1
LP1
LP1
LP1
LP1
LP1
LP1
13. T1-13
14. T1-14
1 M/ 2 C
Channel
21
22
23
24
25
26
27
28
Connection
LP1
LP1
LP1
LP1
LP1
LP1
LP1
LP1
1 M/ 2 C
5-21
5-22
Figure 5-34 Illustrates the mapping after the above steps have been performed.
RICi-16
Configuration > Physical Layer > T3 > Mapping
Channel
Connection
Channel
Connection
1
LP1
11
LP3
2
LP1
12
LP3
3
LP1
13
LP5
4
LP1
14
LP5
5
LP3
15
LP5
6
LP3
16
LP5
7
LP3
17
LP5
8
LP3
18
LP5
9
LP3
19
LP5
10
LP3
20
LP5
1. T1-1
3. T1-3
5. T1-5
7. T1-7
2. T1-2
4. T1-4
6. T1-6
8. T1-8
...(N)
>
ESC-Previous menu; !-Main menu; &-Exit
9. T1-9
10. T1-10
Channel
21
22
23
24
25
26
27
28
11. T1-11
12. T1-12
Connection
LP7
LP7
LP7
LP7
LP9
LP9
LP9
LP9
13. T1-13
14. T1-14
1 M/ 2 C
5-23
5-24
Chapter 6
Monitoring and
Diagnostics
This section describes how to:
Display statistics
Detect errors
6.1
Monitoring Performance
Monitoring Performance
6-1
RICi-16
Main Menu > Monitoring > System
MAC address
System Up Time
Date
Time
Security Key
1.
2.
3.
4.
5.
6.
7.
(00-D2-20-10-20-30)
(12:09:12)
(2007-03-01)
(21:06:57)
(SSL + SSH)
Interface Status
Event log
Radius Statistics
Syslog Statistics
Connected Managers
Current Clock Source
Power Supply Status
[]
[]
[]
>
[]
>
[]
>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Navigate to Main Menu > Monitoring > System > Interface Status.
The Interface Status screen appears as illustrated in Figure 6-2.
RICi-16
Main Menu > Monitoring > System > Interface Status
Description
ETH Port 1
I ETH Port 2
I ETH Port 3
V ETH Port 4
T1 Port 1
T1 Port 2
T1 Port 3
Type
Fast
Fast
Fast
Fast
T1
T1
T1
Eth
Eth
Eth
Eth
Activation
Up
Up
Up
Up
Up
Up
Up
Operation
Down
Down
Down
Down
Up
Down
Up
Speed
100000000
100000000
100000000
100000000
1544000
1544000
1544000
>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-2
Monitoring Performance
RICi-16
Main Menu > Monitoring > System > Connected Managers
Index
1
2
3
4
IP Address
172.18.187.60
172.18.187.60
172.18.187.166
172.18.187.166
Connection Type
SSH
SSL
TELNET
TELNET
User Name
su
su
su
su
>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
RICi-16
Main Menu > Monitoring > System > Radius Statistics
Access Requests
Access Retransmits
Access Accepts
Access Rejects
Access Challenges
Malformed Responses
Bad Authenticators
Pending Requests
Timeouts
Unknown Types
Packets Dropped
Server 1
0
0
0
0
0
0
0
0
0
0
0
Server 2
0
0
0
0
0
0
0
0
0
0
0
Server 3
0
0
0
0
0
0
0
0
0
0
0
Server 4
0
0
0
0
0
0
0
0
0
0
0
>
c-Clear Counters
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Monitoring Performance
6-3
6-4
Parameter
Description
Access Requests
Access Retransmits
Access Accepts
Access Rejects
Access Challenges
Malformed Responses
Bad Authenticators
Pending Requests
Timeouts
Unknown Types
Packets Dropped
Monitoring Performance
(1)
Port Type
Administrative Status
Operation Status
Speed & Duplex
Flow Control
>
1. SFP Information
>
>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Parameter
Description
Port
Port Type
Admistrative Status
Operation Status
Flow Control
Monitoring Performance
6-5
(LC)
(FIBERXON INC.)
(FTM-3001C-SL15G)
(15)
(1310)
(SM)
>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
(1)
Connector Type
Administrative Status
Operation Status
(RJ45)
(Up)
(Up)
>
F - Forward; B - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-6
Monitoring Performance
(1)
Connector Type
Administrative Status
Operation Status
(BNC)
(Up)
(Down)
>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Statistics.
(1)
Interface Type
Port Name
GFP Frame Delineation
(GFP)
(GFP 1)
(Not Delineated)
>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Monitoring Performance
6-7
RICi-16
Monitoring > logical Layer > Status
Port
(1)
Interface Type
Port Name
1. L-CAS Member Status
>
(VCG)
(VCG 1)
[]
>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Source Status
OK
OK
OK
OK
OK
Fail
OK
OK
OK
OK
OK
OK
Sink Status
OK
OK
OK
OK
OK
Fail
OK
OK
OK
OK
OK
OK
>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-8
Monitoring Performance
From the Bridge menu (Monitoring > Application > Bridge), select View MAC
Table.
The MAC Table screen appears as illustrated in Figure 6-12 and
Figure 6-13. The parameters are described in Table 6-3.
RICi-16
Main Menu > Monitoring > Application > Bridge > View MAC Table
1
| 2
v 3
4
5
VLAN ID
MAC address
Bridge port
Status
1
2
3
4
5
111111111111
222222222222
333333333333
444444444444
555555555555
1
2
3
3
5
Static
Dynamic
Static
Dynamic
Dynamic
>
x-Clear Table
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
RICi-16
Main Menu > Monitoring > Application > Bridge > View MAC Table
1
| 2
V 3
4
5
MAC address
Bridge port
Status
11-11-11-11-11-11
22-22-22-22-22-22
33-33-33-33-33-33
44-44-44-44-44-44
55-55-55-55-55-55
1
2
3
3
5
Static
Dynamic
Static
Dynamic
Dynamic
>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Monitoring Performance
6-9
Description
VLAN ID
(VLAN aware mode only)
MAC Address
Bridge Port
Status
RICi-16
Main Menu > Monitoring > Application > Flows
Flow [1-64]
Name
Fwd Green Packets
Fwd Green Bytes
Fwd Yellow Packets
Fwd Yellow Bytes
Dscrd Green Packets
Dscrd Green Bytes
Dscrd Yellow Packets
Dscrd Yellow Bytes
Dscrd Red Packets
Dscrd Red Bytes
(2)
(Flow1)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
>
f-Forward
b-Backward
c-Clear Statistics
ESC-Previous menu; !-Main menu; &-Exit
6-10
Monitoring Performance
Parameter
Description
Flow [1-64]
Flow ID
Name
Monitoring Performance
6-11
From the OAM.CFM menu (Monitoring > Application > OAM.CFM), select
Status.
The OAM.CFM Status screen appears as illustrated in Figure 6-15). The
parameters are described in Table 6-5.
RICi-16
Monitoring > Application > OAM.CFM > Status
1.
2.
3.
4.
MD ID
MA ID
MEP ID [1-8191]
Remote MEP ID [1-8191]
...
...
...
...
(0)
(0)
(0)
(0)
>
Please select item <1 to 4>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-12
Parameter
Description
MD ID
MA ID
MEP ID[1-8191]
Monitoring Performance
RICi-16
Monitoring > Physical Ports > Ethernet > Statistics
Port
(1)
Rx
Rx
Rx
Tx
Tx
Tx
Tx
Tx
Tx
Tx
Tx
(709073132)
(533197630)
(0)
(21532)
(2139845)
(0)
(0)
(0)
(0)
(0)
(0)
Correct Frames
Correct Octets
FCS Errors
Correct Frames
Correct Octets
Single Collision
Collision
Multiple Collision)
Deferred Transmissions
Late Collisions
Congestion Dropped Frames
>
f-Forward; b-Backwards; c-Clear statistics
ESC-Previous menu; !-Main menu; &-Exit;
1 M/ 1 C
Monitoring Performance
6-13
To clear statistics:
In the Statistics menu, select Clear Statistics to clear all E1/T1 statistics.
RICi-16
Monitoring > Physical Ports > E1/T1 > Statistics>15 Min
Intervals
1. Port [1 16]
2. Interval [0-96]
... (1)
... (0)
Time Elapsed
ES
SES
UAS
BES
(10)
(0)
(0)
(0)
(0)
>
f-Forward; c-Clear Statistics: F-Frw(Int; B-Bkw(Int)
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Description
Port number
Interval number
Time elapsed
ES
6-14
Monitoring Performance
Parameter
Description
SES
UAS
BES
Displaying T3 Statistics
T3 statistics can be displayed for 15-minute intervals or 1-day periods.
Monitoring Performance
6-15
To clear statistics:
In the Statistics menu, select Clear Statistics to clear all E1/T1 statistics.
RICi-16
Monitoring > Physical Ports > T3> Statistics>15 Min Intervals
1.
Port [1 - 2]
Interval [0 - 96]
(1)
(0)
(10)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
>
f-Forward; c-Clear Statistics; ^F-Frw (Int); ^B-Bkw (Int)
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Description
Port number
Interval number
Time elapsed
For interval 0 displays number of seconds passed from the start time
of the interval
LES
PES
6-16
Monitoring Performance
Parameter
Description
PSES
CES
Note: This count is only for the SYNTRAN and C-bit Parity DS3
applications.
CSES
Note: This count is only for the SYNTRAN and C-bit Parity DS3
applications.
SEFS
UAS
Monitoring Performance
6-17
In the Main menu, navigate to Monitoring > Logical Layer > Statistics.
The Logical Layer Statistics screen appears as illustrated in Figure 6-19.
The statistics are explained in Table 6-8.
RICi-16
Monitoring > Logical Layer > Statistics
Port
Interface Type
Port name
Rx
Rx
Rx
Rx
Rx
TX
TX
Tx
(2)
>
Correct Frames
Correct Octets
cHEC Errors
tHEC Errors
FCS Errors
Frames
Octets
congestion Dropped Frames
(GFP)
(GFP 1)
(0)
(0)
(0)
(0)
(0)
(453160)
(45609507)
(0)
>
f-Forward; b-Backward; c-Clear Statistics
ESC-Previous menu; !-Main menu; &-Exit;
1 M/ 1 C
6-18
Parameter
Description
Port
Interface Type
Interface type
Port Name
RX Correct Frames
RX Correct Octets
RX cHEC Errors
RX tHEC Errors
Monitoring Performance
Parameter
Description
RX FCS Errors
TX Frames
TX Octets
TX Congestion Dropped
Frames
6.2
RICi-16 maintains a log file, which can hold up to 1000 system messages. All
events are time-stamped. In addition, RICi-16 allows logging and sharing of
system events on a server instead of internally. The statistical information of
logging and sharing system events is displayed in the Syslog menu.
Displaying Events
I
I
V
Source
E1 Port 2
E1 Port 6
Eth Port 1
T1 Port 4
T1 Port 3
T1 Port 2
T1 Port 1
->>
Description
LINK_DOWN
LINK_UP
LINK_DOWN
LINK_DOWN
LINK_DOWN
LINK_DOWN
LINK_UP
Severity
Major
Minor
Major
Major
Major
Major
Major
>
x - Clear Table
ESC-Previous menu; !-Main menu; &-Exit;
?-help
6-19
Event
Description
System Events
10
LINK_UP
20
LINK_DOWN
30
HW_FAILURE
32
PS_FAILED_ON
(Dual power supply only) One of the power supplies has failed
33
PS_FAILED_OFF
(Dual power supply only) The power supply has been turned back
on after a failure
40
SNMP_AUTH_FAIL
50
WEB_START
51
WEB_FINISH
70
TFTP_START
71
TFTP_FINISH
72
TFTP_FAILURE
90
TELNET_ACCESS_DENIED
Access via Telnet was denied, either because the current IP address
does not appear in the manager list, or because Telnet access was
disabled via user configuration.
91
WEB_ACCESS_DENIED
Access via Web was denied, either because the current IP address
does not appear in the manager list, or because web access was
disabled via user configuration.
92
SNMP_ACCESS_DENIED
Access via SNMP was denied, either because the current IP address
does not appear in the manager list, or because SNMP access was
disabled via user configuration.
100
E1/T1 Major
101
E1/T1 Minor
102
E1/T1 Event
105
108
T1 FDL LLB
111
SFP Event
112
Signal Degrade On
The number of PDH E1/T1/T3 errors were above the threshold; the
line was disconnected.
113
160
180
Loop Detected
6-20
Code
Event
Description
181
Loop Recovery
182
Cold Start
183
Login
184
Failed Login
OAM Ag Events
0x1001
CC OK
OAM connectivity check (CC) with remote MEP has been confirmed
0x1002
CC Mismerge
A MEP receives a CCM frame with correct MEG Level but incorrect
MEG ID.
0x1003
Unexpected MEP On
A MEP receives a CCM frame with correct MEG Level, correct MEG ID
but with unexpected MEP ID.
0x1004
0x1005
Unexpected Period On
A MEP receives a CCM frame with correct MEG Level, correct MEG ID,
correct MEP ID, but with a Period field value different than its own
CCM transmission period.
0x1006
CC Failure On
0x1007
RDI Detected On
0x1008
Unexpected MD Level On
0x1009
0x100A
0x100C
0x100
D
0x100E
0x1010
Unavailability Ratio
Dropped On
6-21
Event
0x1011
Unavailability Ratio
Dropped Off
The exit criteria of the above, i.e. when the ratio is below threshold.
Description
OID
coldStart
1.3.6.1.6.3.1.1.5.1
authenticationFailure
1.3.6.1.6.3.1.1.5.5
linkDown
1.3.6.1.6.3.1.1.5.3
linkUp
1.3.6.1.6.3.1.1.5.4
risingAlarm
1.3.6.1.2.1.16.0.1
fallingAlarm
1.3.6.1.2.1.16.0.2
dsx1LineStatusChange
1.3.6.1.2.1.10.18.15.0.1
tftpStatusChangeTrap
1.3.6.1.4.1.164.6.1.0.1
agnStatusChangeTrap
1.3.6.1.4.1.164.6.1.0.2
prtStatusChangeTrap
1.3.6.1.4.1.164.6.1.0.3
agnPowerFailureTrap
1.3.6.1.4.1.164.6.1.0.13
ethOamCfmDefectCondition
1.3.6.1.4.1.164.3.1.6.1.3.0.1
dsx3LineStatusChange
1.3.6.1.2.1.10.30.15.0.1
prtLoopDetectTrap
1.3.6.1.4.1.164.6.1.0.32
6-22
RICi-16
Monitoring > System > Syslog Statistics
Total Tx Messages
Unqueued Dropped Messages
(0)
(4)
>
c - Clear
ESC-Previous menu; !-Main menu; &-Exit;
?-help
6.3
Ping
Trace route
Cable test
T1 loopback
T3 loopback
BERT
OAM test
6-23
To ping an IP host:
1. In the Main menu, navigate to Diagnostics > Ping.
The Ping menu appears as illustrated in Figure 6-22.
2. In the Ping menu, configure the following:
Destination IP Address. This is the IP address of the host that you intend
to ping. Use values between 0.0.0.0 and 255. 255. 255. 255.
Destination IP Address
Number of Frames to Send [0-50]
Send Ping
Stop Ping
... (0.0.0.0)
... (10)
>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
To trace a route:
1. In the Main menu, navigate to Diagnostics > Trace Route.
The Trace Route menu appears as illustrated in Figure 6-23.
2. In the Trace Route menu, select Destination IP Address and enter the IP
address of the host to which you intend to trace the route.
3. To start tracing, select Display Trace Route.
RICi-16 starts tracing the route, displaying the IP addresses of all hop
nodes.
4. To stop the tracing, select Stop Trace Route.
6-24
RICi-16
Diagnostics > Trace Route
1. Destination IP Address
2. Display Trace Route
3. Stop Trace Route
... (0.0.0.0)
>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Normal:
Open:
Short:
6-25
RICi-16
Diagnostics > Cable Test
Port
>
(3)
Tx
Tx
Rx
Rx
>
...
>
...
(Normal)
(2m)
(Normal)
(2m)
>
(Start Test)
Test Result
Distance of Reflection
Test Result
Distance of Reflection
1. Command
>
f Forward;
b-Backwards
>ESC-prev.menu; !-main menu; &-exit
1 Mngr/s
(1)
1. Loopback State
(Disable)
2. Duration (sec)[0 3600] ... (60)
>
f-Forwards; b-Backwards
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
1 M/ 1 C
6-26
Testing T3 Links
This diagnostic utility performs remote loopback tests on the T3 links in order to
determine the source of a break in the data flow. These loopbacks are performed
on the device toward the TDM network.
(1)
1. Loopback State
(Disable)
2. Duration (sec)[0 3600] ... (60)
>
f-Forward; b-Backwards
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
1 M/ 1 C
Local Loopback
RICi-16 supports FDL (facility data link)-activated local loopback (LLB) code only.
This means that when RICi-16 receives a loop up/down pattern it is configured on
the receiving port towards the TDM network.
6-27
(1)
1. Pattern
2. Send BERT
>
(215-1)
(OFF)
>
f-Forward b-Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
(1)
> (Not Sync)
(0)
> (215-1)
(ON)
>
f-Forward b-Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
--------------------------------------------------------Inject Error
Inject Error
6-28
Description
Possible Values
Port
Sync State
Not Sync
Sync
Pattern
2^11-1
QRSS
2^15-1
Send BERT
On
Off
Inject Error
(1)
> (Not Sync)
(0)
> (215-1)
(Off)
f-Forward b-Backward
>ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-29
Description
Possible Values
Port
Index of T3 port
Sync State
Not Sync
Sync
Pattern
2^11-1
QRSS
2^15-1
Send BERT
On
Off
To perform a loopback:
1. From the OAM Tests menu (Diagnostics > OAM Tests), select Loopback.
The Loopback menu appears as illustrated in Figure 6-30.
2. Define the test parameters according to Table 6-13.
RICi-16
Main Menu > Diagnostics > OAM Tests > Loopback
1. MD ID
2. MA ID
3. MEP ID [1-8191]
... (1)
... (1)
... (255)
>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
6-30
Description
Possible Values
MD ID
18
MA ID
MEP ID
1-8191
Default: 0
MD ID
MA ID
MEP ID [1-8191]
Results
... (1)
... (1)
... (255)
[]
>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
Decription
Possible Values
MD ID
18
MA ID
MEP ID
1 65535
Default: 0
6-31
6.4
Troubleshooting
Use the chart shown in Table 6-15 to identify and remedy problems in unit
operation.
Probable Cause
Remedial Action
6.5
Technical Support
Technical support for this product can be obtained from the local distributor from
whom it was purchased.
For further information, please contact the RAD distributor nearest you or one of
RAD's offices worldwide. This information can be found at www.rad.com. (Offices
About RAD > Worldwide Offices; Distributors Where to Buy > End Users).
6-32
Technical Support
Appendix B
Boot Sequence and
Downloading Software
RICi-16 allows you to download software. In order to do so, you have to connect
an ASCII terminal to RICi-16s Control port.
Software is stored in the in two separate sectors on the flash memory, in the
boot sector and in the file system. The boot sector includes a boot program that
calls the rest of the program from the file system.
The file system can hold two compressed copies of the RICi-16 code. One copy is
called the operating file, and the other one is called the backup file. The
operating file is the default-executable RICi-16 code. The backup file is used
whenever the operating file is absent or corrupted.
B.1
Booting RICi-16
Booting RICi-16
B-1
Exit boot-manager
Dir
Set active software copy
Delete software Copy
Download boot manager or an application by XMODEM
Format flash
Show basic hardware information
Reset board
System configuration.
Download boot manager or an application by TFTP
Select:
Delete the operating file; the backup file becomes the operating file
Download a new operating file via XMODEM; the previous operating file is
saved as the backup file
Reset RICi-16
Configure the IP address, the IP mask and the default gateway for the
consecutively downloading via TFTP.
If you choose to exchange or delete a file, you are prompted for confirmation.
B.2
New software releases are distributed as separate files, which are downloaded to
RICi-16 using the XMODEM protocol or TFTP from the Boot Manager menu.
Alternatively, you can download a new software release via TFTP, when the
RICi-16 management software is already running (Main menu > Utilities > File
Transfer).
The TFTP protocol can also be used for uploading configuration files that contain
the RICi-16 database to the management station. When RICi-16 is running,
administrators can use this capability to distribute verified configuration files to
all other units that use the similar configuration.
B-2
B-3
B-4
Appendix C
Operation, Administration
and Maintenance (OAM)
This appendix describes the Ethernet OAM functionality of RICi-16.
C.1
Introduction
Continuity check
Table C-1 lists the Ethernet OAM-related terms used in the appendix.
Table C-1. Ethernet OAM Terminology
Term
Description
UNI
UNI_C
UNI_N
Service frame
Flow
Point-to-point Flow
Introduction
C-1
Term
Description
Multipoint-to-Multipoint
Flow
Service Instance
Identifier (CoS ID)
MEP
MIP
C.2
Reference Architecture
C-2
Reference Architecture
C.3
OAM Entities
This section describes the OAM entities hierarchy. Figure C-2 illustrates the
relationship between UNI, flow and Service Instance (COS ID), when one or more
service instances belong to one flow and one or more flow belong to a UNI. From
the OAM perspective, the continuity messages and defects are activated per flow,
and the PM is activated per service instance.
Note
In the one flow per UNI case (Figure C-3), the PM and CC are transmitted
once.
OAM Entities
C-3
In case of multiple flows per UNI (Figure C-4), PM and CC are transmitted
three times.
In case of one flow and multiple CoS (Service Instances) per UNI (Figure C-5),
the PM is transmitted three times and the CC once.
Figure C-5. One Flow and Multiple CoS (Service Instances) per UNI
C.4
OAM Flows
Figure C-6 illustrates a typical OAM traffic flow. The OAM message is transmitted
from the source MEP 1 to the destination MEP 2 and the reply is transmitted back
The source is also a destination for messages from the other direction.
The OAM interval is one second, so each NTU transmits one request and one
reply and receive one request and one reply. Total of four messages are
transmitted per second per service instance.
OAM Message
Request
MEP 1
Source
MEP 2
OAM Message
Reply
Destination
C-4
OAM Flows
Flow Association
When an OAM frame is associated with a flow, the following steps are performed:
Service Association
When an OAM frame is associated with a service, the following steps are
performed:
OAM Flows
C-5
Unicast ETH-LB request message is sent from a MEP to a specific MEP (remote
device). The DA of the request message is a unicast MAC address of destination
device. Upon receipt of the request message, the MEP responds with unicast ETHLB reply message. The DA of the reply message is a unicast MAC address of
requesting device, learned from request message.
Major failures (link failure, device failure, network path failure etc)
The ETH-CC signal is generated by one MEP. Upon receipt of the first ETH-CC
signal from a sending MEP, the receiving MEP detects continuity with sending MEP
and expects to receive further periodic ETH-CC signals. Once the receiving MEP
stops receiving periodic ETH-CC signals from sending MEP, it declares continuity
failure. The MEP that detects the continuity failure notifies the operator by
sending an alarm or a trap.
OAM Procedures
This section discusses the continuity check (CC) and the performance
measurement (PM) procedures.
ETH-LB Method
The ETH-LB method includes the following elements:
C-6
OAM Flows
The Flow and MEP ID are processed as follows: if the Flow/MEP ID do not
exist in the device, it changes them to No Match otherwise they are left
intact.
Continuity declarations
Loss of Continuity and Connectivity Mismatch states are declared by the
ETH-LB mechanism.
OAM Flows
C-7
ETH-CC Method
The ETH-CC method includes the following elements:
ETH-CC transmission
Unicast ETH-CC request message is transmitted by a MEP (RICi-16) every
1 second (depending on the configuration). The transmitted Transaction
Identifier is retained for at least 5 seconds after the unicast ETH-CC signal is
transmitted. The Transaction Identifier must be changed for every Unicast
ETH-CC message, and no Transaction Identifier from the same MEP is allowed
to be repeated within 1 minute.
Continuity declarations
Loss of Continuity and Connectivity Mismatch states are declared by the
ETH-CC mechanism.
C-8
OAM Flows
Performance Measurement
RICi-16 measures performance during 15-minute intervals. It also stores
performance history data of nthe last 24 hours (96 intervals). Table C-2 lists the
PM counters supported by RICi-16.
Description
Frames Transmitted
Frames Lost
Unavailable Seconds
Number of seconds during which the service was unavailable in the current
interval
Elapsed Time
Min. RT Delay
Minimum round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)
Avg. RT Delay
Average round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)
Max. RT Delay
Maximum round trip delay (in mseconds) calculated in the interval (or up
to elapsed time in current interval)
Avg. DV
Max. DV
Total number of OAM frames transmitted since the service was enabled
Total number of OAM frames lost since the service was enabled
Elapsed Time
Unavailable Seconds
Unavailability Ratio
RMON Statistics
C-9
C.5
RMON Statistics
C-10
Dropped Frames
Undersize Frames
Oversize Frames
Fragmented Frames
Jabbers
Unavailability Ratio.
RMON Statistics
Index
A
AC power, connecting, 2-5
Aging, 1-9
Aging Process
VLANAware bridge, 1-11
VLANUnaware bridge, 1-13
Application, 1-2
Ethernet cellular backhauling, 5-1, 5-15
Ethernet services, 5-8
Application-level status
displaying, 6-9
B
BERT, 6-24, 6-26
Bit Error Rate Test, 6-24, 6-26
Boot Manager, B-1
Bridge, 1-3, 1-9
Ethernet access, 1-9
specifications, 1-24
VLAN Stripping mode, 1-13
VLANAware, 1-9
Bridge, internal
configuring, 4-42
C
Cables, 2-2
Choosing options
ConfiguRAD, 3-9
ConfiguRAD, 3-8
configuring access, 4-11
Configuration
ASCII terminal, 3-5
manager list, 4-15
Configuring
defining flows, 4-58
device information, 4-1
E1 ports, 4-31
Ethernet port, 4-26
fault propagation, 4-25
Flows, 4-57
IP host parameters, 4-2
L2CP Filtering Profile, 4-30
MAC Access Control, 4-28
ports, 4-26
QoS priorities, 4-48
T1 ports, 4-33, 4-35
terminal parameters, 4-65
user priorities, 4-48
Connecting
AC power, 2-5
DC power, 2-5
I-1
Index
F
Fault Propagation, 4-25
File downloading, B-2
File transfer, 4-66, B-2
Flow, 1-4, 4-57
Flows, 4-57
defining, 4-58
Forwarding, 1-9
Forwarding Process
VLANAware bridge, 1-11
VLANUnaware bridge, 1-13
Front panel
LEDs, 3-2
G
GFP, 1-2
RX traffic, 1-16
Tx traffic, 1-14
GFP and VCG port status, 6-8
H
Host, 4-2
Host tagging
tagged, 4-3
untagged, 4-3
I
Indicators, 1-25
Ingress, 1-9
Ingress process
VLANAware bridge, 1-10
VLANUnaware bridge, 1-12
Installation, 2-1
Interfaces
pinouts
control, A-2
E1, A-2
Ethernet, A-1
statistics, 6-13
Internal bridge
configuring, 4-42
Inventory, 4-63
L
L2CP Filtering Profile, 4-30
LCAS, 1-2
Learning, 1-9
Learning Process
VLANAware bridge, 1-11
VLANUnaware bridge, 1-12
LEDs, 3-2
License pack
viewing details, 4-64
Log file, 6-19
Logical layer
Default configuration, 4-38
Logical ports
Configuration, 4-38
Logical-level status
displaying, 6-8
Login
I-2
Index
System messages, 6-19
T
T1 interface, 1-23
connecting the port, 2-3
default settings, 3-3
pinouts, A-2
T1 Interface
configuring, 4-33, 4-35
T3 interface, 1-23
default settings, 3-3
T3 status, 6-7
Tables
navigating, 3-7
technical specifications
power, 1-25
Technical Specifications, 1-24
Telnet, 4-11
Terminal, 3-5
baud rate, 4-65
configuring, 3-5
connecting, 2-4
login, 3-6
parameters, 4-65
TFTP, 4-67, B-2
Trace route, 6-22
Transmission, 1-9
Transmission Process
VLANAware bridge, 1-12
VLANUnaware bridge, 1-13
Troubleshooting, 6-1
U
User interface
default settings, 3-3
User name, 4-65
Utilities
File transfer, 4-67
reset device, 4-68
V
VCAS, 1-2
VCT, 6-22
Virtual cable test, 6-22
VLANAware mode, 1-9
VLANUnaware mode, 1-12
W
WAN Interface, 1-8
Web browser, 3-8
login, 3-9
X
XMODEM, B-3
I-3
Index
I-4
Supplement
AC/DC Adapter
(AD) Plug
for DC Power Supply Connection
Note
Prepare all connections to the AD plug before inserting it into the units power
connector.
Warning
Supplement
Terminal Block
Connector
for DC Power Supply Connection
Note
Caution
Prepare all connections to the TB plug before inserting it into the units VDC-IN
connector.
Reversing the wire voltage polarity can cause damage to the unit!
Warning
2. If the units VDC-IN connector is type B, lift the locking latch (see Figure 1).
5
Caution Always lift the locking latch of type B connectors before disconnecting the
TB plug, to avoid damaging the TB plug.
Manual Name:
Publication Number:
506-200-10/12
Excellent
Good
Fair
Poor
Very Poor
Installation instructions
Operating instructions
Manual organization
Illustrations
Error Report
Type of error(s) or
problem(s):
Missing information
Appearance
Other
Please list the exact page numbers with the error(s), detail the errors you found (information missing,
unclear or inadequately explained, etc.) and attach the page to your fax, if necessary.
You are:
Distributor
End user
VAR
Other
International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail market@rad.com
www.rad.com