Вы находитесь на странице: 1из 234

INSTALLATION AND

OPERATION MANUAL

RICi-16
Advanced Ethernet Services over Multiple
PDH Links NTU
Version 2.5

The Access Company

RICi-16
Advanced Ethernet Services over Multiple PDH Links NTU
Version 2.5

Installation and Operation Manual


Notice
This manual contains information that is proprietary to RAD Data Communications Ltd. ("RAD").
No part of this publication may be reproduced in any form whatsoever without prior written
approval by RAD Data Communications.
Right, title and interest, all information, copyrights, patents, know-how, trade secrets and other
intellectual property or other proprietary rights relating to this manual and to the RICi-16 and
any software components contained therein are proprietary products of RAD protected under
international copyright law and shall be and remain solely with RAD.
The RICi-16 product name is owned by RAD. No right, license, or interest to such trademark is
granted hereunder, and you agree that no such right, license, or interest shall be asserted by
you with respect to such trademark. The RAD name, logo, logotype, and the terms EtherAccess,
TDMoIP and TDMoIP Driven, and the product names Optimux and IPmux, are registered
trademarks of RAD Data Communications Ltd. All other trademarks are the property of their
respective holders.
You shall not copy, reverse compile or reverse assemble all or any portion of the Manual or the
RICi-16. You are prohibited from, and shall not, directly or indirectly, develop, market, distribute,
license, or sell any product that supports substantially similar functionality as the RICi-16, based
on or derived in any way from the RICi-16. Your undertaking in this paragraph shall survive the
termination of this Agreement.
This Agreement is effective upon your opening of the RICi-16 package and shall continue until
terminated. RAD may terminate this Agreement upon the breach by you of any term hereof.
Upon such termination by RAD, you agree to return to RAD the RICi-16 and all copies and
portions thereof.
For further information contact RAD at the address below or contact your local distributor.

International Headquarters
RAD Data Communications Ltd.

North America Headquarters


RAD Data Communications Inc.

24 Raoul Wallenberg Street


Tel Aviv 69719, Israel
Tel: 972-3-6458181
Fax: 972-3-6498250, 6474436
E-mail: market@rad.com

900 Corporate Drive


Mahwah, NJ 07430, USA
Tel: (201) 5291100, Toll free: 1-800-4447234
Fax: (201) 5295777
E-mail: market@radusa.com

2006 2009 RAD Data Communications Ltd.

Publication No. 506-200-10/12

Limited Warranty
RAD warrants to DISTRIBUTOR that the hardware in the RICi-16 to be delivered hereunder shall
be free of defects in material and workmanship under normal use and service for a period of
twelve (12) months following the date of shipment to DISTRIBUTOR.
If, during the warranty period, any component part of the equipment becomes defective by
reason of material or workmanship, and DISTRIBUTOR immediately notifies RAD of such defect,
RAD shall have the option to choose the appropriate corrective action: a) supply a replacement
part, or b) request return of equipment to its plant for repair, or c) perform necessary repair at
the equipment's location. In the event that RAD requests the return of equipment, each party
shall pay one-way shipping costs.
RAD shall be released from all obligations under its warranty in the event that the equipment has
been subjected to misuse, neglect, accident or improper installation, or if repairs or
modifications were made by persons other than RAD's own authorized service personnel, unless
such repairs by others were made with the written consent of RAD.
The above warranty is in lieu of all other warranties, expressed or implied. There are no
warranties which extend beyond the face hereof, including, but not limited to, warranties of
merchantability and fitness for a particular purpose, and in no event shall RAD be liable for
consequential damages.
RAD shall not be liable to any person for any special or indirect damages, including, but not
limited to, lost profits from any cause whatsoever arising from or in any way connected with the
manufacture, sale, handling, repair, maintenance or use of the RICi-16, and in no event shall
RAD's liability exceed the purchase price of the RICi-16.
DISTRIBUTOR shall be responsible to its customers for any and all warranties which it makes
relating to RICi-16 and for ensuring that replacements and other adjustments required in
connection with the said warranties are satisfactory.
Software components in the RICi-16 are provided "as is" and without warranty of any kind. RAD
disclaims all warranties including the implied warranties of merchantability and fitness for a
particular purpose. RAD shall not be liable for any loss of use, interruption of business or
indirect, special, incidental or consequential damages of any kind. In spite of the above RAD
shall do its best to provide error-free software products and shall offer free Software updates
during the warranty period under this Agreement.
RAD's cumulative liability to you or any other party for any loss or damages resulting from any
claims, demands, or actions arising out of or relating to this Agreement and the RICi-16 shall not
exceed the sum paid to RAD for the purchase of the RICi-16. In no event shall RAD be liable for
any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if RAD
has been advised of the possibility of such damages.
This Agreement shall be construed and governed in accordance with the laws of the State of
Israel.

Product Disposal
To facilitate the reuse, recycling and other forms of recovery of waste
equipment in protecting the environment, the owner of this RAD product is
required to refrain from disposing of this product as unsorted municipal
waste at the end of its life cycle. Upon termination of the units use,
customers should provide for its collection for reuse, recycling or other form
of environmentally conscientious disposal.

General Safety Instructions


The following instructions serve as a general guide for the safe installation and operation of
telecommunications products. Additional instructions, if applicable, are included inside the
manual.

Safety Symbols

Warning

This symbol may appear on the equipment or in the text. It indicates potential
safety hazards regarding product operation or maintenance to operator or service
personnel.

Danger of electric shock! Avoid any contact with the marked surface while the
product is energized or connected to outdoor telecommunication lines.

Protective ground: the marked lug or terminal should be connected to the building
protective ground bus.

Warning

Some products may be equipped with a laser diode. In such cases, a label with the
laser class and other warnings as applicable will be attached near the optical
transmitter. The laser warning symbol may be also attached.
Please observe the following precautions:

Before turning on the equipment, make sure that the fiber optic cable is intact
and is connected to the transmitter.

Do not attempt to adjust the laser drive current.

Do not use broken or unterminated fiber-optic cables/connectors or look


straight at the laser beam.

The use of optical devices with the equipment will increase eye hazard.

Use of controls, adjustments or performing procedures other than those


specified herein, may result in hazardous radiation exposure.
ATTENTION: The laser beam may be invisible!
In some cases, the users may insert their own SFP laser transceivers into the product. Users are
alerted that RAD cannot be held responsible for any damage that may result if non-compliant
transceivers are used. In particular, users are warned to use only agency approved products that
comply with the local laser safety regulations for Class 1 laser products.
Always observe standard safety precautions during installation, operation and maintenance of
this product. Only qualified and authorized service personnel should carry out adjustment,
maintenance or repairs to this product. No installation, adjustment, maintenance or repairs
should be performed by either the operator or the user.

Handling Energized Products


General Safety Practices
Do not touch or tamper with the power supply when the power cord is connected. Line voltages
may be present inside certain products even when the power switch (if installed) is in the OFF
position or a fuse is blown. For DC-powered products, although the voltages levels are usually
not hazardous, energy hazards may still exist.
Before working on equipment connected to power lines or telecommunication lines, remove
jewelry or any other metallic object that may come into contact with energized parts.
Unless otherwise specified, all products are intended to be grounded during normal use.
Grounding is provided by connecting the mains plug to a wall socket with a protective ground
terminal. If a ground lug is provided on the product, it should be connected to the protective
ground at all times, by a wire with a diameter of 18 AWG or wider. Rack-mounted equipment
should be mounted only in grounded racks and cabinets.
Always make the ground connection first and disconnect it last. Do not connect
telecommunication cables to ungrounded equipment. Make sure that all other cables are
disconnected before disconnecting the ground.
Some products may have panels secured by thumbscrews with a slotted head. These panels may
cover hazardous circuits or parts, such as power supplies. These thumbscrews should therefore
always be tightened securely with a screwdriver after both initial installation and subsequent
access to the panels.

Connecting AC Mains
Make sure that the electrical installation complies with local codes.
Always connect the AC plug to a wall socket with a protective ground.
The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A. The circuit breaker in the building installation should have high breaking
capacity and must operate at short-circuit current exceeding 35A.
Always connect the power cord first to the equipment and then to the wall socket. If a power
switch is provided in the equipment, set it to the OFF position. If the power cord cannot be
readily disconnected in case of emergency, make sure that a readily accessible circuit breaker or
emergency switch is installed in the building installation.
In cases when the power distribution system is IT type, the switch must disconnect both poles
simultaneously.

Connecting DC Power
Unless otherwise specified in the manual, the DC input to the equipment is floating in reference
to the ground. Any single pole can be externally grounded.
Due to the high current capability of DC power systems, care should be taken when connecting
the DC supply to avoid short-circuits and fire hazards.
DC units should be installed in a restricted access area, i.e. an area where access is authorized
only to qualified service and maintenance personnel.
Make sure that the DC power supply is electrically isolated from any AC source and that the
installation complies with the local codes.

The maximum permissible current capability of the branch distribution circuit that supplies power
to the product is 16A. The circuit breaker in the building installation should have high breaking
capacity and must operate at short-circuit current exceeding 35A.
Before connecting the DC supply wires, ensure that power is removed from the DC circuit. Locate
the circuit breaker of the panel board that services the equipment and switch it to the OFF
position. When connecting the DC supply wires, first connect the ground wire to the
corresponding terminal, then the positive pole and last the negative pole. Switch the circuit
breaker back to the ON position.
A readily accessible disconnect device that is suitably rated and approved should be incorporated
in the building installation.
If the DC power supply is floating, the switch must disconnect both poles simultaneously.

Connecting Data and Telecommunications Cables


Data and telecommunication interfaces are classified according to their safety status.
The following table lists the status of several standard interfaces. If the status of a given port
differs from the standard one, a notice will be given in the manual.

Ports

Safety Status

V.11, V.28, V.35, V.36, RS-530, X.21,


10 BaseT, 100 BaseT, Unbalanced E1,
E2, E3, STM, DS-2, DS-3, S-Interface
ISDN, Analog voice E&M

SELV

xDSL (without feeding voltage),


Balanced E1, T1, Sub E1/T1

TNV-1 Telecommunication Network Voltage-1:

FXS (Foreign Exchange Subscriber)

TNV-2 Telecommunication Network Voltage-2:


Ports whose normal operating voltage exceeds the
limits of SELV (usually up to 120 VDC or telephone
ringing voltages), on which overvoltages from
telecommunication networks are not possible. These
ports are not permitted to be directly connected to
external telephone and data lines.

FXO (Foreign Exchange Office), xDSL


(with feeding voltage), U-Interface
ISDN

TNV-3 Telecommunication Network Voltage-3:


Ports whose normal operating voltage exceeds the
limits of SELV (usually up to 120 VDC or telephone
ringing voltages), on which overvoltages from
telecommunication networks are possible.

Safety Extra Low Voltage:


Ports which do not present a safety hazard. Usually
up to 30 VAC or 60 VDC.

Ports whose normal operating voltage is within the


limits of SELV, on which overvoltages from
telecommunications networks are possible.

Always connect a given port to a port of the same safety status. If in doubt, seek the assistance
of a qualified safety engineer.
Always make sure that the equipment is grounded before connecting telecommunication cables.
Do not disconnect the ground connection before disconnecting all telecommunications cables.
Some SELV and non-SELV circuits use the same connectors. Use caution when connecting cables.
Extra caution should be exercised during thunderstorms.

When using shielded or coaxial cables, verify that there is a good ground connection at both
ends. The grounding and bonding of the ground connections should comply with the local codes.
The telecommunication wiring in the building may be damaged or present a fire hazard in case of
contact between exposed external wires and the AC power lines. In order to reduce the risk,
there are restrictions on the diameter of wires in the telecom cables, between the equipment
and the mating connectors.

Caution

To reduce the risk of fire, use only No. 26 AWG or larger telecommunication line
cords.

Attention

Pour rduire les risques sincendie, utiliser seulement des conducteurs de


tlcommunications 26 AWG ou de section suprieure.

Some ports are suitable for connection to intra-building or non-exposed wiring or cabling only. In
such cases, a notice will be given in the installation instructions.
Do not attempt to tamper with any carrier-provided equipment or connection hardware.

Electromagnetic Compatibility (EMC)


The equipment is designed and approved to comply with the electromagnetic regulations of
major regulatory bodies. The following instructions may enhance the performance of the
equipment and will provide better protection against excessive emission and better immunity
against disturbances.
A good ground connection is essential. When installing the equipment in a rack, make sure to
remove all traces of paint from the mounting points. Use suitable lock-washers and torque. If an
external grounding lug is provided, connect it to the ground bus using braided wire as short as
possible.
The equipment is designed to comply with EMC requirements when connecting it with unshielded
twisted pair (UTP) cables. However, the use of shielded wires is always recommended, especially
for high-rate data. In some cases, when unshielded wires are used, ferrite cores should be
installed on certain cables. In such cases, special instructions are provided in the manual.
Disconnect all wires which are not in permanent use, such as cables used for one-time
configuration.
The compliance of the equipment with the regulations for conducted emission on the data lines
is dependent on the cable quality. The emission is tested for UTP with 80 dB longitudinal
conversion loss (LCL).
Unless otherwise specified or described in the manual, TNV-1 and TNV-3 ports provide secondary
protection against surges on the data lines. Primary protectors should be provided in the building
installation.
The equipment is designed to provide adequate protection against electro-static discharge (ESD).
However, it is good working practice to use caution when connecting cables terminated with
plastic connectors (without a grounded metal hood, such as flat cables) to sensitive data lines.
Before connecting such cables, discharge yourself by touching ground or wear an ESD preventive
wrist strap.

FCC-15 User Information


This equipment has been tested and found to comply with the limits of the Class A digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses and can radiate radio frequency energy and, if not installed and used
in accordance with the Installation and Operation manual, may cause harmful interference to the
radio communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own
expense.

Canadian Emission Requirements


This Class A digital apparatus meets all the requirements of the Canadian Interference-Causing
Equipment Regulation.
Cet appareil numrique de la classe A respecte toutes les exigences du Rglement sur le matriel
brouilleur du Canada.

Warning per EN 55022 (CISPR-22)


Warning

Avertissement

Achtung

This is a class A product. In a domestic environment, this product may cause radio
interference, in which case the user will be required to take adequate measures.
Cet appareil est un appareil de Classe A. Dans un environnement rsidentiel, cet
appareil peut provoquer des brouillages radiolectriques. Dans ces cas, il peut tre
demand lutilisateur de prendre les mesures appropries.
Das vorliegende Gert fllt unter die Funkstrgrenzwertklasse A. In Wohngebieten
knnen beim Betrieb dieses Gertes Rundfunkstrrungen auftreten, fr deren
Behebung der Benutzer verantwortlich ist.

Franais

Mise au rebut du produit


Afin de faciliter la rutilisation, le recyclage ainsi que d'autres formes de
rcupration d'quipement mis au rebut dans le cadre de la protection de
l'environnement, il est demand au propritaire de ce produit RAD de ne pas
mettre ce dernier au rebut en tant que dchet municipal non tri, une fois
que le produit est arriv en fin de cycle de vie. Le client devrait proposer des
solutions de rutilisation, de recyclage ou toute autre forme de mise au rebut
de cette unit dans un esprit de protection de l'environnement, lorsqu'il aura
fini de l'utiliser.

Instructions gnrales de scurit


Les instructions suivantes servent de guide gnral d'installation et d'opration scurises des
produits de tlcommunications. Des instructions supplmentaires sont ventuellement
indiques dans le manuel.

Symboles de scurit
Ce symbole peut apparaitre sur l'quipement ou dans le texte. Il indique des risques
potentiels de scurit pour l'oprateur ou le personnel de service, quant
l'opration du produit ou sa maintenance.

Avertissement

Danger de choc lectrique ! Evitez tout contact avec la surface marque tant que le
produit est sous tension ou connect des lignes externes de tlcommunications.

Mise la terre de protection : la cosse ou la borne marque devrait tre connecte


la prise de terre de protection du btiment.

Avant la mise en marche de l'quipement, assurez-vous que le cble de fibre


optique est intact et qu'il est connect au transmetteur.

Ne tentez pas d'ajuster le courant de la commande laser.

N'utilisez pas des cbles ou connecteurs de fibre optique casss ou sans


terminaison et n'observez pas directement un rayon laser.

L'usage de priphriques optiques avec l'quipement augmentera le risque pour


les yeux.

L'usage de contrles, ajustages ou procdures autres que celles spcifies ici


pourrait rsulter en une dangereuse exposition aux radiations.
ATTENTION : Le rayon laser peut tre invisible !
Les utilisateurs pourront, dans certains cas, insrer leurs propres metteurs-rcepteurs Laser SFP
dans le produit. Les utilisateurs sont avertis que RAD ne pourra pas tre tenue responsable de
tout dommage pouvant rsulter de l'utilisation d'metteurs-rcepteurs non conformes. Plus
particulirement, les utilisateurs sont avertis de n'utiliser que des produits approuvs par
l'agence et conformes la rglementation locale de scurit laser pour les produits laser de
classe 1.
Respectez toujours les prcautions standards de scurit durant l'installation, l'opration et la
maintenance de ce produit. Seul le personnel de service qualifi et autoris devrait effectuer
l'ajustage, la maintenance ou les rparations de ce produit. Aucune opration d'installation,
d'ajustage, de maintenance ou de rparation ne devrait tre effectue par l'oprateur ou
l'utilisateur.

Manipuler des produits sous tension


Rgles gnrales de scurit
Ne pas toucher ou altrer l'alimentation en courant lorsque le cble d'alimentation est branch.
Des tensions de lignes peuvent tre prsentes dans certains produits, mme lorsque le
commutateur (s'il est install) est en position OFF ou si le fusible est rompu. Pour les produits
aliments par CC, les niveaux de tension ne sont gnralement pas dangereux mais des risques
de courant peuvent toujours exister.
Avant de travailler sur un quipement connect aux lignes de tension ou de tlcommunications,
retirez vos bijoux ou tout autre objet mtallique pouvant venir en contact avec les pices sous
tension.
Sauf s'il en est autrement indiqu, tous les produits sont destins tre mis la terre durant
l'usage normal. La mise la terre est fournie par la connexion de la fiche principale une prise
murale quipe d'une borne protectrice de mise la terre. Si une cosse de mise la terre est
fournie avec le produit, elle devrait tre connecte tout moment une mise la terre de
protection par un conducteur de diamtre 18 AWG ou plus. L'quipement mont en chssis ne
devrait tre mont que sur des chssis et dans des armoires mises la terre.
Branchez toujours la mise la terre en premier et dbranchez-la en dernier. Ne branchez pas des
cbles de tlcommunications un quipement qui n'est pas mis la terre. Assurez-vous que
tous les autres cbles sont dbranchs avant de dconnecter la mise la terre.

Franais

Certains produits peuvent tre quips d'une diode laser. Dans de tels cas, une
tiquette indiquant la classe laser ainsi que d'autres avertissements, le cas chant,
sera jointe prs du transmetteur optique. Le symbole d'avertissement laser peut
aussi tre joint.
Avertissement
Veuillez observer les prcautions suivantes :

Franais

Connexion au courant du secteur


Assurez-vous que l'installation lectrique est conforme la rglementation locale.
Branchez toujours la fiche de secteur une prise murale quipe d'une borne protectrice de mise
la terre.
La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A. Le coupe-circuit dans l'installation du btiment devrait avoir une capacit
leve de rupture et devrait fonctionner sur courant de court-circuit dpassant 35A.
Branchez toujours le cble d'alimentation en premier l'quipement puis la prise murale. Si un
commutateur est fourni avec l'quipement, fixez-le en position OFF. Si le cble d'alimentation ne
peut pas tre facilement dbranch en cas d'urgence, assurez-vous qu'un coupe-circuit ou un
disjoncteur d'urgence facilement accessible est install dans l'installation du btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si le systme de distribution de
courant est de type IT.

Connexion d'alimentation CC
Sauf s'il en est autrement spcifi dans le manuel, l'entre CC de l'quipement est flottante par
rapport la mise la terre. Tout ple doit tre mis la terre en externe.
A cause de la capacit de courant des systmes alimentation CC, des prcautions devraient
tre prises lors de la connexion de l'alimentation CC pour viter des courts-circuits et des risques
d'incendie.
Les units CC devraient tre installes dans une zone accs restreint, une zone o l'accs n'est
autoris qu'au personnel qualifi de service et de maintenance.
Assurez-vous que l'alimentation CC est isole de toute source de courant CA (secteur) et que
l'installation est conforme la rglementation locale.
La capacit maximale permissible en courant du circuit de distribution de la connexion alimentant
le produit est de 16A. Le coupe-circuit dans l'installation du btiment devrait avoir une capacit
leve de rupture et devrait fonctionner sur courant de court-circuit dpassant 35A.
Avant la connexion des cbles d'alimentation en courant CC, assurez-vous que le circuit CC n'est
pas sous tension. Localisez le coupe-circuit dans le tableau desservant l'quipement et fixez-le
en position OFF. Lors de la connexion de cbles d'alimentation CC, connectez d'abord le
conducteur de mise la terre la borne correspondante, puis le ple positif et en dernier, le
ple ngatif. Remettez le coupe-circuit en position ON.
Un disjoncteur facilement accessible, adapt et approuv devrait tre intgr l'installation du
btiment.
Le disjoncteur devrait dconnecter simultanment les deux ples si l'alimentation en courant CC
est flottante.

Declaration of Conformity
Manufacturer's Name:

RAD Data Communications Ltd.

Manufacturer's Address:

24 Raoul Wallenberg St.


Tel Aviv 69719
Israel

Declares that the products:


RICi-16E1, RICi-16T1

Product Names:

Conform to the following standard(s) or other normative document(s):


EMC:

Safety:

EN 55022:1998 +
A1:2000, A2: 2003

Information technology equipment Radio


disturbance characteristics Limits and
methods of measurement.

EN 55024: 1998 +
A1:2001, A2:2003

Information technology equipment


Immunity characteristics Limits and
methods of measurement.

EN 61000-3-2:2000
+ A2:2005

Electromagnetic compatibility (EMC)


Part 3-2: Limits Limits for harmonic
current emissions (equipment input current
up to and including 16A per phase).

EN 61000-3-3:1995
+ A1:2001

Electromagnetic compatibility (EMC)


Part 3-3: Limits Limitation of voltage
changes, voltage fluctuations and flicker in
public low-voltage supply systems, for
equipment with rated current 16A per
phase and not subject to conditional
connection.

EN 60950-1:2001 +
A11:2004

Information technology equipment Safety


Part 1: General requirements

Supplementary Information:
The products herewith comply with the requirements of the EMC Directive 89/336/EC, the Low
Voltage Directive 2006/95/EC and the R&TTE Directive 99/5/EC for wired equipment. The product
was tested in a typical configuration.
Tel Aviv, 9 December 2007

Haim Karshen
VP Quality
European Contact: RAD Data
Ottobrunn-Riemerling, Germany

Communications

GmbH,

Otto-Hahn-Str.

28-30,

85521

Glossary
Address

A coded representation of the origin or destination of data.

Agent

In SNMP, this refers to the managed system.

Analog

A continuous wave or signal (such as human voice).

ANSI

American National Standards Institute.

Attenuation

Signal power loss through equipment, lines or other transmission


devices. Measured in decibels.

AWG

The American Wire Gauge System, which specifies wire width.

Balanced

A transmission line in which voltages on the two conductors are


equal in magnitude, but opposite in polarity, with respect to
ground.

Bandwidth

The range of frequencies passing through a given circuit. The


greater the bandwidth, the more information can be sent through
the circuit in a given amount of time.

Baud

Unit of signaling speed equivalent to the number of discrete


conditions or events per second. If each signal event represents
only one bit condition, baud rate equals bps (bits per second).

Bipolar

Signaling method in E1/T1 representing a binary 1 by alternating


positive and negative pulses, and a binary 0 by absence of
pulses.

Bit

The smallest unit of information in a binary system. Represents


either a one or zero (1 or 0).

bps (Bits Per Second)

A measure of data transmission rate in serial transmission.

Bridge

A device interconnecting local area networks at the OSI data link


layer, filtering and forwarding frames according to media access
control (MAC) addresses.

Bus

A transmission path or channel. A bus is typically an electrical


connection with one or more conductors, where all attached
devices receive all transmissions at the same time.

Byte

A group of bits (normally 8 bits in length).

Carrier

A continuous signal at a fixed frequency that is capable of being


modulated with a second (information carrying) signal.

Cell

The 53-byte basic information unit within an ATM network. The


user traffic is segmented into cells at the source and reassembled

at the destination. An ATM cell consists of a 5-byte ATM header


and a 48-byte ATM payload, which contains the user data.
Channel

A path for electrical transmission between two or more points.


Also called a link, line, circuit or facility.

Clock

A term for the source(s) of timing signals used in synchronous


transmission.

Congestion

A state in which the network is overloaded and starts to discard


user data (frames, cells or packets).

Data

Information represented in digital form, including voice, text,


facsimile and video.

Data Link Layer

Layer 2 of the OSI model. The entity, which establishes, maintains,


and releases data-link connections between elements in a
network. Layer 2 is concerned with the transmission of units of
information, or frames, and associated error checking.

Diagnostics

The detection and isolation of a malfunction or mistake in a


communications device, network or system.

Differential Delay

Differential delay is caused when traffic is split over different lines


that may traverse shorter and longer paths. Products like the RAD
IMX-2T1/E1 inverse multiplexer compensate for any differential
delay (up to 64 msec) between the T1 lines, to properly
reconstruct the original stream.

Digital

The binary (1 or 0) output of a computer or terminal. In data


communications, an alternating, non-continuous (pulsating) signal.

E1 Line

A 2.048 Mbps line, common in Europe, that supports thirty-two 64


kbps channels, each of which can transmit and receive data or
digitized voice. The line uses framing and signaling to achieve
synchronous and reliable transmission. The most common
configurations for E1 lines are E1 PRI, and unchannelized E1.

E3

The European standard for high speed digital transmission,


operating at 34 Mbps.

Encapsulation

Encapsulating data is a technique used by layered protocols in


which a low level protocol accepts a message from a higher level
protocol, then places it in the data portion of the lower-level
frame. The logistics of encapsulation require that packets traveling
over a physical network contain a sequence of headers.

Ethernet

A local area network (LAN) technology which has extended into


the wide area networks. Ethernet operates at many speeds,
including data rates of 10 Mbps (Ethernet), 100 Mbps (Fast
Ethernet), 1,000 Mbps (Gigabit Ethernet), 10 Gbps, 40 Gbps, and
100 Gbps.

Flow Control

A congestion control mechanism that results in an ATM system


implementing flow control.

Frame

A logical grouping of information sent as a link-layer unit over a


transmission medium. The terms packet, datagram, segment, and

message are also used to describe logical information groupings.


Framing

At the physical and data link layers of the OSI model, bits are fit
into units called frames. Frames contain source and destination
information, flags to designate the start and end of the frame,
plus information about the integrity of the frame. All other
information, such as network protocols and the actual payload of
data, is encapsulated in a packet, which is encapsulated in the
frame.

Full Duplex

A circuit or device permitting transmission in two directions


(sending and receiving) at the same time.

FXO (Foreign Exchange


Office)

A voice interface, emulating a PBX extension, as it appears to the


CO (Central Office) for connecting a PBX extension to a
multiplexer.

FXS (Foreign Exchange


Subscriber)

A voice interface, emulating the extension interface of a PBX (or


subscriber interface of a CO) for connecting a regular telephone
set to a multiplexer.

G.703

An ITU standard for the physical and electrical characteristics of


various digital interfaces, including those at 64 kbps and 2.048
Mbps.

Gateway

Gateways are points of entrance and exit from a communications


network. Viewed as a physical entity, a gateway is that node that
translates between two otherwise incompatible networks or
network segments. Gateways perform code and protocol
conversion to facilitate traffic between data highways of differing
architecture.

Half Duplex

A circuit or device capable of transmitting in two directions, but


not at the same time.

Impedance

The combined effect of resistance, inductance and capacitance on


a transmitted signal. Impedance varies at different frequencies.

Interface

A shared boundary, defined by common physical interconnection


characteristics, signal characteristics, and meanings of exchanged
signals.

IP Address

Also known as an Internet address. A unique string of numbers


that identifies a computer or device on a TCP/IP network. The
format of an IP address is a 32-bit numeric address written as four
numbers from 0 to 255, separated by periods (for example,
1.0.255.123).

Laser

A device that transmits an extremely narrow and coherent beam


of electromagnetic energy in the visible light spectrum. Used as a
light source for fiber optic transmission (generally more expensive,
shorter lived, single mode only, for greater distances than LED).

Latency

The time between initiating a request for data and the beginning
of the actual data transfer. Network latency is the delay
introduced when a packet is momentarily stored, analyzed and
then forwarded.

Loopback

A type of diagnostic test in which the transmitted signal is


returned to the sending device after passing through all or part of
a communications link or network.

Manager

An application that receives Simple Network Management Protocol


(SNMP) information from an agent. An agent and manager share a
database of information, called the Management Information Base
(MIB). An agent can use a message called a traps-PDU to send
unsolicited information to the manager. A manager that uses the
RADview MIB can query the RAD device, set parameters, sound
alarms when certain conditions appear, and perform other
administrative tasks.

Master Clock

The source of timing signals (or the signals themselves) that all
network stations use for synchronization.

Multiplexer

At one end of a communications link, a device that combines


several lower speed transmission channels into a single high speed
channel. A multiplexer at the other end reverses the process.
Sometimes called a mux. See Bit Interleaving/Multiplexing.

Network

(1) An interconnected group of nodes. (2) A series of points,


nodes, or stations connected by communications channels; the
collection of equipment through which connections are made
between data stations.

Node

A point of interconnection to a network.

Packet

An ordered group of data and control signals transmitted through


a network, as a subset of a larger message.

Payload

The 48-byte segment of the ATM cell containing user data. Any
adaptation of user data via the AAL will take place within the
payload.

Physical Layer

Layer 1 of the OSI model. The layer concerned with electrical,


mechanical, and handshaking procedures over the interface
connecting a device to the transmission medium.

Polling

See Multidrop.

Port

The physical interface to a computer or multiplexer, for connection


of terminals and modems.

Protocol

A formal set of conventions governing the formatting and relative


timing of message exchange between two communicating
systems.

Scalable

Able to be changed in size or configuration to suit changing


conditions. For example, a scalable network can be expanded from
a few nodes to thousands of nodes.

Serial Transmission

A common mode of transmission, where the character bits are


sent sequentially one at a time instead of in parallel.

Single Mode

Describing an optical wave-guide or fiber that is designed to


propagate light of only a single wavelength (typically 5-10 microns

in diameter).
Space

In telecommunications, the absence of a signal. Equivalent to a


binary 0.

Sync

See Synchronous Transmission.

Synchronous
Transmission

Transmission in which data bits are sent at a fixed rate, with the
transmitter and receiver synchronized.

T1

A digital transmission link with a capacity of 1.544 Mbps used in


North America. Typically channelized into 24 DS0s, each capable of
carrying a single voice conversation or data stream. Uses two pairs
of twisted pair wires.

T3

A digital transmission link with a capacity of 45 Mbps, or 28 T1


lines.

Telnet

The virtual terminal protocol in the Internet suite of protocols. It


lets users on one host access another host and work as terminal
users of that remote host. Instead of dialing into the computer,
the user connects to it over the Internet using Telnet. When
issuing a Telnet session, it connects to the Telnet host and logs in.
The connection enables the user to work with the remote machine
as though a terminal was connected to it.

Throughput

The amount of information transferred through the network


between two users in a given period, usually measured in the
number of packets per second (pps).

Timeslot

A portion of a serial multiplex of timeslot information dedicated to


a single channel. In E1 and T1, one timeslot typically represents
one 64 kbps channel.

VLAN-Aware

A device that is doing the Layer 2 bridging according to the VLAN


tag in addition to the standard bridging parameters. A VLAN-aware
device will not strip or add any VLAN header.

VLAN Stacking

A technique that lets carriers offer multiple virtual LANs over a


single circuit. In essence, the carrier creates an Ethernet virtual
private network to tunnel customer VLANs across its WAN; this
helps avoid name conflicts among customers of service providers
who connect to the carrier. Stacking works by assigning two VLAN
IDs to each frame header. One is a "backbone" VLAN ID used by
the service provider; the other one has up to 4,096 unique 802.1Q
VLAN tags.

Quick Start Guide


Only an experienced technician should install RICi-16. If you are familiar with
RICi-16, use this guide to prepare the unit for operation.

1.

Installing RICi-16

Connecting the Interfaces


1. Connect the network to the RJ-45 connectors designated E1 or T1.
2. Connect the user LAN to the RJ-45 connectors designated 10/100 BaseT (up
to four connectors).
3. Connect the control terminal to the front panel CONTROL connector
OR
Connect a Telnet host, a PC running a Web browsing application, or an SNMP
management station to the Ethernet port.

Connecting the Power

Connect the power cable to the power socket on the RICi-16 front panel and
the other end to the power outlet.
The unit has no power switch. Operation starts when the power is
applied to the power connector(s).

2.

Configuring RICi-16

Configure RICi-16 to the desired operation mode via an ASCII terminal connected
to the front panel CONTROL port. After configuring, you can manage the unit
over Telnet, a PC that runs a Web browser, or SNMP via either Ethernet or an
E1/T1 port.

Note

RICi-16 Ver. 2.5

Remote management requires configuring an IP address.

Configuring RICi-16

Quick Start Guide

Installation and Operation Manual

Starting a Terminal Session

To start a terminal session:


1. Turn on the control terminal PC and set its default port parameters to the
following:

Baud rate: 9600 bps

Data bits: 8

Stop bits: 1

Parity: None

Flow control: None.

2. To optimize the view of the system menus, do the following:

Set the terminal emulator to VT100.

If you are using HyperTerminal, set the terminal mode to the 132-column
mode.

3. Enter your user name and password and proceed with the management
session.

Note

The RICi-16 default user name is su (lower case). The default password is 1234.

Configuring Basic Parameters

To configure RICi-16 for management:

From the Host menu (Main > Configuration > System > Management > Host),
configure the following parameters:

Host IP address

Host IP mask

Default gateway

From the Encapsulation menu (Main > Configuration > System > Management
> Host > Encapsulation), configure Host tagging (untagged/tagged). If you
select Tagged, additional parameters that need to be defined appear:

Host VLAN ID

Host VLAN Priority

Configuring RICi-16

RICi-16 Ver. 2.5

Installation and Operation Manual

Quick Start Guide

Configuring RICi-16 Bridge Ports


The unit ships with a factory-set configuration, as defined below. To reconfigure,
you have to delete and reconfigure every bridge port parameter. You cannot
delete bridge port bindings to the host port and Ethernet ports.

Factory-Set Configuration
Bridge Port

Configured to

Reserved for management

Ethernet port 1

Ethernet port 2

Ethernet port 3

Ethernet port 4

GFP 1 (logical port 2)

If you reconfigure the unit for a minimum working configuration, define at least
two bridge ports (BP) and bind them to either a physical or logical port.

One BP bound to a GFP interface

One BP bound to a Fast Ethernet interface.

Configuring RICi-16

Quick Start Guide

Configuring RICi-16

Installation and Operation Manual

RICi-16 Ver. 2.5

Contents
Chapter 1. Introduction
1.1 Overview.................................................................................................................... 1-1
Product Options...................................................................................................... 1-2
Applications ............................................................................................................ 1-2
Features ................................................................................................................. 1-2
1.2 Physical Description ................................................................................................... 1-8
1.3 Functional Description................................................................................................ 1-8
Interfacing with User Traffic .................................................................................... 1-8
WAN Interfaces ....................................................................................................... 1-8
Ethernet Access (Bridge Mode) ............................................................................... 1-9
GFP, VCAT, and LCAS ............................................................................................. 1-14
Operating in Flow Mode ........................................................................................ 1-17
Prioritizing Traffic Using QoS ................................................................................. 1-19
Timing .................................................................................................................. 1-20
Management ........................................................................................................ 1-21
1.4 Technical Specifications............................................................................................ 1-23
Chapter 2. Installation and Setup
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9

Site Requirements and Prerequisites .......................................................................... 2-1


Package Contents ...................................................................................................... 2-2
Required Equipment ................................................................................................... 2-2
Mounting the Unit ...................................................................................................... 2-3
Connecting to Ethernet Equipment ............................................................................. 2-3
Connecting to E1/T1 Equipment ................................................................................. 2-3
Connecting to T3 Equipment ...................................................................................... 2-4
Connecting to the Terminal ........................................................................................ 2-4
Connecting to Power .................................................................................................. 2-4
Connecting to AC Power.......................................................................................... 2-5
Connecting to DC Power ......................................................................................... 2-5
Removing/Installing the Hot-Swappable Power Supply Units .................................... 2-6

Chapter 3. Operation
3.1
3.2
3.3
3.4

Turning On the Unit ................................................................................................... 3-1


Indicators .................................................................................................................. 3-2
Default Settings ......................................................................................................... 3-3
Configuration and Management Alternatives .............................................................. 3-5
Working with Terminal ............................................................................................ 3-5
Working with the Web Browser ............................................................................... 3-8
Working with RADview ............................................................................................ 3-9
3.5 Menu Maps .............................................................................................................. 3-10
Configuration Menu .............................................................................................. 3-11
Monitoring Menu .................................................................................................. 3-16
Diagnostics Menu ................................................................................................. 3-18
Utilities Menu ....................................................................................................... 3-19
3.6 Turning Off the Unit ................................................................................................. 3-19

RICi-16 Ver. 2.5

Table of Contents

Installation and Operation Manual

Chapter 4. Configuration
4.1 Configuring RICi-16 for Management .......................................................................... 4-1
Entering Device Information .................................................................................... 4-1
Configuring Host IP Parameters ............................................................................... 4-2
Configuring SNMPv3 ................................................................................................ 4-4
Configuring Management Access ........................................................................... 4-11
4.2 Configuring RICi-16 for Operation............................................................................. 4-16
Setting System-Level Parameters .......................................................................... 4-17
Configuring Physical-Layer Parameters .................................................................. 4-26
Configuring the Logical Layer ................................................................................ 4-38
Configuring the Application Layer Parameters........................................................ 4-42
Configuring the OAM............................................................................................. 4-61
4.3 Performing Additional Tasks ..................................................................................... 4-63
Viewing Inventory ................................................................................................. 4-63
Viewing the License Information ........................................................................... 4-64
Configuring Control Port Parameters ..................................................................... 4-65
Changing User Access Parameters ......................................................................... 4-65
Transferring Software and Configuration Files ....................................................... 4-66
Resetting RICi-16 .................................................................................................. 4-68
Chapter 5. Configuring Typical Applications
5.1 Application with Ethernet Cellular Backhauling over PDH/SONET/SDH .......................... 5-1
Configuring System Parameters............................................................................... 5-2
Configuring the Physical Layer ................................................................................. 5-4
Configuring the Logical Layer .................................................................................. 5-7
5.2 Ethernet Services over PDH/SONET/SDH ..................................................................... 5-8
Configuring System Parameters............................................................................... 5-8
Configuring the Physical Layer ............................................................................... 5-10
Configuring the Logical Layer ................................................................................ 5-11
5.3 Multiple Customer Premises Supported by Channelized DS-3 .................................... 5-15
Configuring System Parameters............................................................................. 5-17
Chapter 6. Diagnostics and Troubleshooting
6.1 Monitoring Performance ............................................................................................. 6-1
Viewing Device Status ............................................................................................. 6-1
Displaying Interface Statistics ............................................................................... 6-13
6.2 Handling Alarms and Traps ....................................................................................... 6-19
Displaying Events .................................................................................................. 6-19
Displaying Syslog Statistics ................................................................................... 6-20
6.3 Testing the RICi-16 Unit ........................................................................................... 6-21
Running a Ping Test .............................................................................................. 6-21
Tracing the Route ................................................................................................. 6-22
Running a Cable Test ............................................................................................ 6-22
Running Loopback Tests ....................................................................................... 6-23
Performing Bit Error Rate Test (BERT).................................................................... 6-24
Running OAM Tests............................................................................................... 6-27
6.4 Troubleshooting ....................................................................................................... 6-28
6.5 Technical Support .................................................................................................... 6-29

ii

RICi-16 Ver. 2.5

Installation and Operation Manual

Table of Contents

Appendix A. Connector Wiring


Appendix B. Boot Sequence and Downloading Software
Appendix C. Operation, Administration and Maintenance (OAM)

RICi-16 Ver. 2.5

iii

Table of Contents

iv

Installation and Operation Manual

RICi-16 Ver. 2.5

Chapter 1
Introduction
1.1

Overview

RICi-16 is a Network Termination Unit (NTU) that connects Fast Ethernet LANs
over 16 bonded E1 or T1 circuits, or over up to two bonded clear T3 circuits, or
over a channelized T3 interface. The bonded circuits create a scalable, virtual pipe
for transferring Ethernet traffic.
The unit enables service providers to supply high capacity Ethernet services to
remote locations. The units can also transparently connect corporate LANs
utilizing existing E1 or T1 lines.
RICi-16 uses the Ethernet over NG PDH standards and applies the Generic
Framing Procedure (GFP) to encapsulate the packet data for bandwidth utilization
and improving the latency for delay-sensitive applications. Virtual Concatenations
(VCAT) bond the required PDH connections for transmitting data, providing
flexible bandwidth for different applications. Link Capacity Adjustment Scheme
(LCAS) ensures seamless PDH capacity changes without affecting traffic and error
handling on individual E1/T1 links.
RICi-16 supports up to 16 GFP VCAT groups (VCG), for connecting of up to 16
different customers per site.
The following standard bonding and encapsulation protocols make RICi-16
interoperable with third-party devices:

Generic Framing Procedure (GFP G.8040)

Virtual Concatenation (VCAT - G.7043)

Link Capacity Adjustment Scheme (LCAS - G.7042).

End-to-end OAM, based on IEEE 802.1ag and ITU-T Y.1731 enables Ethernet
service providers to monitor their services proactively, measure end-to-end
performance and guarantee that the customers receive the contracted SLA. Fault
monitoring and performance measurement include Frame Delay, Frame Delay
Variation, Frame Loss and Availability. RICi-16 features single segment (link) OAM
according to IEEE 802.3ah fault indication, including remote loopback.
In both Bridge-based and Flow-based operation modes, incoming customer traffic
is classified (in Flow mode only) and mapped according to port-based (all-in-one)
bundling or by user port and CE VLAN-ID, VLAN priority, DSCP and IP precedence.
Operators can differentiate services using classification methods, police the
traffic and enforce SLA per service.

RICi-16 Ver. 2.5

Overview

1-1

Chapter 1 Introduction

Installation and Operation Manual

RICi-16 supports Telnet, Web-based, and SNMP applications for inband


configuration and management, as well as an ASCII terminal for out-of-band
management.

Product Options
Uplink Options
RICi-16 is available with E1/T1/T3 interfaces as follows:
E1/T1:

4, 8, or 16 ports, which can be balanced or unbalanced

T3:

Two bonded clear channel links or a single channelized link

Ethernet Port Options


The Ethernet ports are available as four 10/100BaseTx interfaces or one SFP
interface and two 10/100BaseTx interfaces.
The Fast Ethernet interfaces (10/100BaseTx) operate in full or half duplex, with
auto-negotiation and flow control.

Temperature-hardened Version
A temperature hardened version is available, significantly extending the permitted
operating temperature range.

Applications
Typical applications include Ethernet VPN services over E1 or T1 lines; aggregation
of enterprise LANs over E1 or T1 circuits; and IP DSLAM, cellular IP, and WiMAX
base station backhauling.

Figure 1-1 illustrates a typical application in which RICi-16 connects remote LANs
to the packet-switched network over 16 E1/T1 circuits using an SDH/SONET
connection.

Figure 1-1. RICi-16 Extends Ethernet Services over Multiple E1/T1 Circuits

Features
GFP VCAT LCAS
Ethernet over GFP VCAT encapsulation is supported as defined in ITU-T G.8040.
The links are grouped using VCAT as defined in ITU T G.7043. The LCAS protocol is
supported as defined in ITU T G.7042.
1-2

Overview

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

The RICi-16 GFP VCAT LCAS features are:

Note

Up to 16 Virtual Concatenation Groups (VCGs) are supported

LCAS mechanisms:

Ensure that traffic flow recovers quickly from E1/T1 link failures

Allow on-the-fly addition/deletion of group members.

Up to 250 ms differential delay for E1/T1

Up to 217 ms differential delay for T3.

GFP VCAT LCAS maps Ethernet over framed E1/T1/T3 links. For E1/T1 the LCAS
information is aligned to the E1/T1 multiframe. Therefore E1/T1 carrying Ethernet
over GFP VCAT LCAS must be transported transparently over the PDH/SDH
network, to avoid damaging the multiframe alignment.

Encapsulation
RICi-16 supports 16 GFP VCAT LCAS groups with up to 16 E1/T1s per group (VCG).

Bridge Mode
RICi-16 provides a bridging function between its bridge ports:

Fast Ethernet ports

GFP logical ports (Ethernet over PDH)

Internal host.

The internal bridge operates in VLAN-Unaware or VLAN-Aware modes.

VLAN-Unaware
In the VLAN-unaware mode all ports share the same broadcast domain (broadcast
frames are forwarded to all ports). When filtering is enabled, each port learns
MAC addresses of the connected devices and forwards traffic according to them.
When filtering is disabled (transparent mode), the switch operates as a simple
hub; it does not build a MAC table, and sends each frame to all its ports.

VLAN-Aware
In the VLAN-aware mode connections between the switch ports are determined
by their VLAN membership. This means that the traffic can be forwarded from
one port to another only if they are members of the same VLAN. For example, in
the figure below (see Figure 1-2) bridge ports 2 and 3 are members of VLAN 3,
serving the user traffic and completely separating it from the other traffic flows.
The management traffic running on VLAN 4 has to arrive to all ports, including the
device host. To achieve this, all bridge ports must be configured as VLAN 4
members.

RICi-16 Ver. 2.5

Overview

1-3

Chapter 1 Introduction

Installation and Operation Manual

VLAN 3
VLAN 3
User
Equipment

BP4

Bridge

BP2

BP5

VLAN 4
NMS

BP3

VLAN 4
BP6

BP1
Host

Figure 1-2. Separating User and Management Traffic via VLANs

VLAN Membership
Bridge ports can be configured as egress tagged or egress untagged VLAN
members:

Egress tagged ports add the tag of its VLAN to all untagged frames at the
bridge egress. Frames arriving with the tag of the VLAN the port belongs
remain intact.

Egress untagged ports remove the tag of its VLAN from all arriving frames at
the bridge egress.

Tag Handling and PVID


Before being processed by the VLAN membership mechanism frames are handled
at the ingress (and egress) of each bridge port. These actions are called:

Stacking Adding PVID (port VID or default VLAN tag) to all arriving (ingress)
or outgoing (egress) frames, both untagged and tagged. In case of the
tagged frames, the PVID is stacked over the existing VLAN tag. When stacking
is disabled (set to None), PVID is added to the untagged frames only.

Stripping Removing the outer VLAN tags at the egress or ingress of the
bridge ports.

Flow Mode
RICi-16 provides traffic flow classification between the traffic source and its final
destination. RICi-16 supports up to 64 unidirectional flows. Each flow is defined
by a classification profile.
In Flow-based operation mode, incoming customer traffic is classified and
mapped according to port-based (all-in-one) bundling or by user port and CE
VLAN-ID, VLAN priority, DSCP and IP precedence. Operators can differentiate
services using classification methods, police the traffic and enforce SLA per
service

1-4

Overview

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

Classification
The RICi-16 classifier uses the following classification fields/ rules per port. The
following classification combinations are possible:

Unclassified

802.1p

VLAN

DSCP

IP Precedence

VLAN + 802.1p

VLAN + DSCP

VLAN + IP Precedence

Untagged

No IP

No IP + VLAN

Up to 64 classification profiles/instances are supported.


For more information about flow classification, refer to Functional Description.

Tagging and Marking


RICi-16 supports several options for per flow VLAN tagging, including adding and
removing of VLAN tags and VLAN marking. RICi-16 also marks P-bits.

Traffic Prioritization Using QoS


Different service types require different levels of QoS to be provided end-to-end.
QoS can be defined per subscriber as well as per service. QoS has three aspects;
rate limitation (policing), traffic prioritization and traffic shaping.

Policing and Bandwidth profiles


Policers are applied per flow and operate according to the dual bucket mechanism
(CIR + CBS, EIR + EBS). RICi-16 supports up to 32 policers.

Traffic Prioritization and Queue Mapping


The queue mapping functionality associates the user priorities with queue
numbers.
Once traffic has been associated with a flow, it can be mapped to network
ingress queues that can be defined to be strict (Strict Priority) queues, WFQ
(Weighted Fair Queues) or mix of both.
Priority queues can be mapped according to user priority (P-bit, DSCP, IP
Precedence).

Traffic Shaping
RICi-16 performs shaping at the network egress and port level.

RICi-16 Ver. 2.5

Overview

1-5

Chapter 1 Introduction

Installation and Operation Manual

L2CP Handling
RICi-16 can be configured to pass through the Layer-2 control frames across the
network to peer supported protocols (OAM.ah), or to discard the L2CP frames.

Management
Setup, control, and monitoring of status and diagnostics information can be
performed using the following methods:

Local and remote inband management via the Ethernet network or GFP logical
port using Telnet SSH.

Out-of-band management via one of the user data ports that can be
configured as a management port

Local management via an ASCII terminal connected to the V.24 (RS-232) DCE
control port.

RADview: RADs SNMP-based element management software, providing SNMP


traps, status polling, and configuration download. RICi-16 now supports the
SNMP version 3, providing secure access to the device by authenticating the
encrypted packets transmitted over the network.

The following tasks are performed by the internal management software:

Viewing system information

Modifying configuration and mode of operation, including setting system


default values and resetting the unit

Monitoring performance

Initiating connectivity tests

Defining ping and trace routes

Downloading/uploading remote software and configuration files (TFTP)

Upgrading software.

Security
The following security protocols are provided by RICi-16 to ensure client-server
communication privacy and correct user authentication:

RADIUS (client authentication only)

SSLv3 for Web-based management application

SSHv2 for Secure Shell communication session

SNMPv3 (SNMPv1 is used if SNMPv3 is not enabled).

Ethernet OAM
RICi-16 provides two types of Ethernet OAM:

1-6

CFM (End-to-end OAM) based on IEEE 802.1ag and ITU T Y.1731 enable
Ethernet service providers to monitor their services proactively, measure endto-end performance and guarantee that the customers receive the
contracted SLA. Fault monitoring and performance measurement include
Frame Delay, Frame Delay Variation, Frame Loss and Availability

Overview

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

EFM OAM (link OAM) according to IEEE 802.3ah for fault indication, including
remote loopback and MIB parameters.

For additional information on OAM, refer to Appendix C.

Timing
RICi-16 has a two-clock domain with master and fallback sources for timing, one
clock for T3 timing and one for T1s mapped to VCGs. The clock source can be an
internal oscillator or a recovered clock signal from one of the links.

Diagnostics
RICi-16 offers several types of diagnostic and troubleshooting procedures:

Remote loopbacks on the E1/T1/T3 ports

Ping tests

Trace Route

Ethernet cable test

Bit Error Rate Test (BERT) on the E1/T1/T3 ports

OAM test

Events/Traps Traps can be masked, per manager IP address, upon user


configuration.

Statistics
RICi-16 provides statistics and counter capabilities for the physical Ethernet,
E1/T1 levels, and logical GFP statistics.

Event Log File


The Log File includes entries at the system, Ethernet, GFP, VCG, and E1/T1/T3
levels.

Fault Propagation
The unit features a user-configurable bidirectional fault propagation mechanism
that notifies local and remote equipment of faulty conditions. This enables
routers and switches on both ends of the link to reroute traffic.

Power Supply Redundancy


Two redundant load-sharing power supply modules provide AC or DC power to
the device. In case any single power supply module fails or loses its input power,
the remaining power supply module continues to supply power to the chassis,
without disruptions.

RICi-16 Ver. 2.5

Overview

1-7

Chapter 1 Introduction

Installation and Operation Manual

1.2

Physical Description

RICi-16 is a 1U high standalone or rack mountable device.

Figure 1-3 illustrates a three-dimensional view of RICi-16/T3 with T1 interfaces


and Ethernet SFP port, over RICi-16/E1 with E1 interfaces.

Figure 1-3. RICi-16/E1 and RICi-16/T3 Front Views


LEDs, interfaces, and control connectors are located on the front panel. For
additional information, refer to Chapter 3.

1.3

Functional Description

This section describes key functions of RICi-16.

Interfacing with User Traffic


RICi-16 provides one or four half-/full-duplex, 10/100 Mbps Fast Ethernet ports,
with flow control and autonegotiation support. All ports are used for user traffic.

WAN Interfaces
The unit supports the following WAN interfaces:

1-8

Framed E1 circuits (G732N with CRC), up to 16. The E1 interfaces are G.704,
G.703 compliant.

Framed T1 (ESF) circuits, up to 16. The T1 interfaces are ANSI T1.403


compliant. Network should be transparent for framed T1.

Channelized or clear T3 circuits (T1oT3 {TDM} and ETHoT1oT3) to facilitate


cellular backhauling. The T3 interfaces support M23 (channelized only) or Cbit parity framing. Up to 16 T1 circuits can be mapped over a channelized T3
interface, and the rest of the 28 channels or all of them can be mapped to up

Functional Description

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

to 16 VCGs. Multi VCG enables supporting multiple service providers per site.
Two clear T3 circuits facilitate up to 100 Mbps uplink.

Note

The network should be transparent for framed E1, T1 and T3 interfaces.

T3 Port Protection
RICi-16 supports 1+1 link protection on the T3 links, if the unit is operating with a
channelized T3 network interface.

Ethernet Access (Bridge Mode)


RICi-16 has a multi-port bridging capability handling up to 6 bridge ports. The
Bridge supports two modes of operation:

VLAN-Aware

VLAN-Unaware.

The mechanism of each mode can be described as five different processes:


Ingress:

Checks each frame entering the bridge to decide if and how


this frame should be passed on to the forwarding process

Learning:

Learns new MAC table entries (MAC only or MAC VID pairs)

Term

Checks the forwarding MAC table periodically

Forwarding:

Decides to which bridge port/ports to forward the frame

Transmission
(VLAN-Aware mode only):

Selects the format of the transmitted frame at the output


port with VLAN ID (tagged) or without VLAN ID (untagged).

Bridge features and these five processes are described below for each mode.

VLAN-Aware Mode
This mode enables creating sub-groups of bridge ports within the bridge. Each
sub-group is defined per VLAN and is associated with a unique VLAN ID (VID).
Frames containing a VID can be forwarded only between bridge ports that are
members of this specific VLAN, enabling a total separation between different
VLAN users within the same bridge.

Bridge

RICi-16 Ver. 2.5

Full VLAN-aware bridge in accordance with 802.1q

Learning and forwarding according to MAC address and VID

Learning of up to 2,018 MAC table entries (MAC + VID pairs) and 30 static
addresses

Configuration of the aging time

MAC table viewing (all learned and static MACs).

Functional Description

1-9

Chapter 1 Introduction

Installation and Operation Manual

Ingress Process
The ingress process is composed of the following three steps:

Frame Admission: Has two modes of operation (configured per bridge port):

Admit All Frames: All frames arriving from the port are admitted and
proceed to the ingress filtering process. PVID is assigned to untagged or
priority-only tagged frames.

Admit Only VLAN Tagged Frames: Only VLAN tagged frames are admitted
and allowed to proceed to the ingress filtering process. Untagged or
priority-only tagged frames are discarded.

Ingress Filtering: Available for one of the following modes (configured per
bridge port):

Enable: Performs ingress filtering according to VIDs. Only frames that


share a VID assigned to this bridge port are admitted

Disable: All frames are forwarded.


Only admitted frames that pass filtering are submitted to learning and
forwarding processes.

PVID Assignment: Is per bridge port configuration:


In VLAN-aware mode, every received frame entering the bridge is
associated with a single VID. If the received frame does not contain a
VLAN ID (untagged or priority only tagged frames), a specific PVID is
assigned to these frames before they pass to the forwarding process.
Accordingly, the untagged/priority tagged frames that have passed the
admission/ingress filtering, are tagged with PVID and proceed to the
forwarding process. Tagged frames will be double tagged with the PVID
only if Tag Stacking is enabled.
For untagged frames that were tagged during this process to VID=PVID,
the priority tag is assigned at the VLAN priority field, according to the
default priority configuration.

Table 1-1 summarizes the behavior of the ingress process:


Table 1-1. Ingress Process
Frame
Admission
Mode

Ingress
Filtering
Mode

Bridge Behavior

Admit all frames

Enable

VLAN tagged frames with a VID (or PVID for


untagged/priority tagged frames) that do not include
the bridge port in their VLAN member set are
dropped.

Disable

All frames pass.

Enable

VLAN tagged frames with a VID that do not include


the bridge port in their member set are dropped.
Untagged/priority-only tagged frames are dropped.

Admit VLAN
tagged frames

Disable

1-10

Functional Description

All VLAN tagged frames pass. Untagged/priority-only


tagged frames are dropped.

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

Frames that pass this stage are submitted to the forwarding and learning
processes.

Learning Process
The learning process observes the source MAC address (SA) and the VID of the
received frame, and updates the database with the MAC VID pair and with the
bridge port that the frame was received from. The Forwarding Data Base (FDB) is
also referred to as a MAC table.
Entries in the MAC table can be dynamic (inserted by the learning process) or
static (inserted by configuration). A dynamic entry has an aging time associated
with it.
The RICi-16 VLANAware bridge is an Independent VLAN Learning (IVL) bridge.
The learning process inserts a new dynamic entry into the MAC table. This entry
consists of a MAC-VID pair and bridge port.
If the MAC-VID pair already exists for the same port, the aging time is updated.
If the MAC-VID pair already exists but for a different bridge port (dynamic entry),
the new entry overrides the existing one.
If the MAC-VID pair already exists for a different bridge port (static entry), the
static entry prevails.

Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic
entry-aging period that has exceeded the configured Aging Time Limit is deleted.
The aging period represents the time passed since the last frame for this entry
entered the bridge. The periodic check of the MAC table (aging time intervals)
results in the actual aging time that can reach up to twice the value that was
configured by the user.

Forwarding Process
The forwarding process is performed based on the frame destination MAC VID
pair. The frame is forwarded to the bridge port specified in the MAC table for this
MAC VID pair.
Untagged frames are forwarded according to the PVID attached to them during
the ingress process.
Frames are forwarded, dropped, or flooded according to the following guidelines:

Forwarded: If the bridge port of the pair entry (DA, VID) in the MAC table is
both an active bridge port and a member of the VLAN, the frame is forwarded
to that bridge port only.

Dropped:

RICi-16 Ver. 2.5

If the bridge port for the pair entry (DA, VID) in the MAC table is the port
on which the frame was received, the frame is dropped.

If there are no active ports associated with the frames VID, or if the VID
is not defined at all, the frame is dropped.

Flooded:

Functional Description

1-11

Chapter 1 Introduction

Installation and Operation Manual

If the pair (DA, VID) is not learned and does not exist in the MAC table,
the frame is transmitted to all bridge ports that are associated with the
frames VLAN ID.

Multicasts and broadcasts are flooded only through the bridge ports
whose VLAN ID is identical to the frames VLAN ID.

Frames that pass this stage are submitted to the forwarding and learning
processes.

Transmission Process
After the forwarding process identifies the destination bridge port/ports to which
the frames must be transmitted, the frames are transmitted in the appropriate
format.
The frame format can be configured for each VLAN and port:

VLAN-tagged: In this mode:

VLAN-tagged frames are transmitted unchanged

Untagged frames are transmitted tagged with VID=PVID of the entry port.

Priority-tagged frames are transmitted tagged with original priority and


VID = PVID.

Untagged: In this mode, all frames are transmitted as untagged.

VLAN-Unaware Mode
In this mode the bridge forwarding ignores the VLAN ID of VLAN-tagged frames.
Each Ethernet frame received from each bridge port (Ethernet or E1s) is
forwarded according to its destination MAC address.

Bridge Features
Bridge features include:

Learning and forwarding according to MAC address only

Learning of up to 2,018 MAC table entries and 30 static addresses

Configuration of the aging time

VLAN tagged frames transparency (forwarding according to MAC only)

MAC table viewing (All MACs).

Ingress Process
All frames are accepted in this mode: untagged, priority-tagged, or VLAN tagged.
Learning and forwarding is based on the MAC addresses, with no regard to the
VLAN.

Learning Process
The learning process observes the source MAC address (SA) of the received frame
and updates the forwarding database (FDB) with the MAC address and the bridge
port that the frame was received from. (FDB is also referred to as MAC table).

1-12

Functional Description

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

The learning process inserts a new entry into the MAC table. This entry consists
of the MAC and bridge port.

If the MAC already exists for the same bridge port, the aging time will be
updated.

If the MAC already exists, but for a different bridge port, (dynamic entry) the
new entry will override the existing one.

Aging Process
The aging process checks the forwarding MAC table periodically. Each dynamic
entry aging time period that has exceeded the configured Aging Time Limit is
deleted. The aging time period is the period of time since the last frame for this
entry entered the bridge. The periodic check of the MAC table (aging time
intervals), results in an actual aging time that can reach up to twice the userconfigured value.

Forwarding Process
The forwarding process is performed based on the frame MAC Destination
Address (MDA). The frame is forwarded to the bridge/port specified in the MAC
table for this MAC.
Frames are forwarded, dropped, or flooded at this stage:

Forwarded: The frame is forwarded according to DA, to the bridge port where
the DA was learned.

Dropped: If the port for the DA entry in the MAC table is the port for which
the frame was received, the frame is dropped.

Flooded:

If there is no information regarding the DA in the MAC table, the frame is


flooded to all ports.

Frames with multicast or broadcast addresses are flooded to all ports.

Transmission Process
In this bridge mode (VLAN-Unaware), the frames are transmitted unchanged, that
is no tags are added or removed.

VLAN Stacking
VLAN Stacking mode for a bridge port refers to the addition of a tag to a frame
either at ingress or egress (regardless of whether it already has an existing VLAN
tag), and removal of a tag at ingress or egress when the frame leaves through
this port.
This setting is independent of the bridge activity.

VLAN Stripping
VLAN Stripping mode for a bridge port refers to the removal of a tag at ingress or
egress when the frame leaves from this port.
This setting is independent of the bridge activity.

RICi-16 Ver. 2.5

Functional Description

1-13

Chapter 1 Introduction

Installation and Operation Manual

GFP, VCAT, and LCAS


Using Generic Framing Procedure (GFP) for encapsulation, together with the
virtual concatenation (VCAT) and Link Capacity Adjustment Scheme (LCAS)
protocols, the 16 E1/T1 or 2 T3 ports are bundled together providing a less rigid,
more robust transfer method.
VCAT breaks the bundled payload into individual bytes that are transported over
the E1/T1/T3 lines. Since each byte may use a different physical route (different
E1) through a network, VCAT supports the buffering of the information to
account for delays.
LCAS is a signaling protocol for sizing virtually concatenated paths. It provides
removes links that are not carrying traffic, due to failures or user configuration.
The link is detected and automatically removed from the VCG.

GFP Technical Overview


TX Traffic Path
In this direction, the ETHERNET packet with the CRC32 is encapsulated into GFP.
The encapsulation can be divided into two main sections: a Core Header and a
Payload Area.
The Core Header contains the packet length and a CRC16 result of the length. It
is used by the frame-delineation procedure (as explained in the RX path
description below) to detect the boundaries of the frame. The Core Header is
scrambled by xoring the 32 bits (length and CRC16) with the 32 bits B6AB31E0.
The scrambling of the GFP Core Header improves the robustness of the framedelineation procedure, and provides a sufficient number of 0 1 and 1 0
transitions during idle transmission periods.

Figure 1-4. GFP Encapsulation


The Payload Area is divided into three subsections: the Payload header, the User
data (Ethernet packet), and an optional FCS (CRC 32) that is calculated on all
1-14

Functional Description

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

payload information filed. For encapsulation of Ethernet frames, this CRC appears
to be unnecessary. The PFCS addition is user configurable.
All octets in the GFP Payload Area are scrambled using a 1 + x^43 scrambler; this
scrambler is always activated.
The Payload Area contains between 4 and 64 bytes, according to the following:

Figure 1-5. GFP Encapsulation Payload Area


The PTI (Payload Type Identifier) indicates the content of the GFP frame: user
frame or management frame (RICi-16 does not generate management frames in
the TX direction).
The PFI indicates whether the packet includes PFCS.
The EXI indicates the type of extension header encapsulated in the frame.
RICi-16 supports transmission of a Null extension header (i.e., no extension
header is added).
The UPI indicates the type of user data encapsulated in the GFP format.
RICi-16 transmits an Ethernet-over-GFP payload identifier when the GFP frames
are user frames. When there is no user packet to be transmitted over GFP,
RICi-16 generates idle frames.
Special four-octet GFP control frames consisting of only a GFP Core Header with
the PLI and cHEC fields set to 0. These frames are generated by the transmitter in
order to keep the frame-delineation mechanism in the far-end receiver in a sync
state.
The GFP signal is mapped into TDM according to the following. The procedure of
mapping the GFP packets over the PDH signals is described in the G-8040
standard.
The PDH signal works in multiframe mode: CRC-4 multiframe mode for E1 (31
timeslots) and ESF framing mode for T1 (24 timeslots) are supported
The first timeslot in each multiframe is used for transferring the VCAT header
information
In all other timeslots there is user data after the encapsulation of GFP according
to G.7041 (as described above).
The VCAT header information is the LCAS CONTROL packet, as described in the
G.7043 standard. One control packet is transmitted in a period of
16 multiframes.

RICi-16 Ver. 2.5

Functional Description

1-15

Chapter 1 Introduction

Installation and Operation Manual

RX Traffic Path
RICi-16 assumes that the traffic received from TDM ports is traffic arriving from a
non-LCAS GFP transmitter. RICi-16 treats this data according to the following:

RICi-16 extracts the VCAT header from the first timeslot of each multiframe.

RICi-16 recognizes the frame border by synchronization on the core header


which contains the frame length & CRC16 on the length (see Error! Reference
source not found.). The GFP LINK is kept in sync state if the cHEC is correct
per frame. To ensure that the GFP LINK is always synchronized, the
transmitter in RICi-16 generates idle frames, with the Delta parameter equal
to 2.

The GFP receiver has the ability to correct a single-bit error in tHEC or cHEC or
tHEC. This function is always active. The single-bit error correction on Chec is
not active when the GFP signal is in Presync or hunt state.

The data is also descrambled (during sync state) before the packets are
transferred to the bridge.
Payload FCS / CRC 32 of Ethernet packet check: The GFP receiver checks that the
payload FCS (if enabled) or the CRC32 of Ethernet is correct. If incorrect, it
discards the packet.
GFP over PDH actual bandwidth: GFP mapping over a PDH signal involves the
following overhead:

The PDH signal works in multiframe mode. For E1, TS0 is used for frame
synchronization, and for T1, the F bit is used.

Space is also reserved for a VCAT header every multiframe.

From this it can be determined that the actual PDH rate for GFP frames is as
follows:
E1 links:

(2.048Mbs 64Kbps 64/16 k) = 1.98Mbs

T1 links:

(1.544Mbs 8Kbps 64/24 k) ~1.533Mbs. The overall calculation must


also take into account the following overhead for GFP encapsulation:

Chec_O (Core header encapsulation) four bytes (always added to the


packet)

Thec_O (Type header encapsulation) four bytes (always added to the


packet)

Ehec_O (Linear extension header encapsulation) four bytes (optional;


user-configurable)

P_FCS (Payload FCS -CRC32) four bytes (optional; user-configurable).

The maximum PPS (packets per second) that can be generated on the PDH is thus
determined as follows (where P_SIZE is the packet size, and other parameters are
as described above):

for E1 links: PPS =1.98Mbs/ 8/ ( P_SIZE + Chec_O + Thec_O + Ehec_O + P_FCS )

for T1 links: PPS ~1.533Mbs / 8/ ( P_SIZE + Chec_O + Thec_O + Ehec_O +


P_FCS).

In RICi-16:

1-16

Ehec_O is 0

Functional Description

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

P_FCS is user-configurable.

Operating in Flow Mode


RICi-16 supports up to 64 unidirectional flows. Flows are defined by ingress and
egress ports, a classification profile and a priority.
The flow traffic can be passed, dropped or policed. It can be subject to packet
editing (VLAN tag, p-bit marking) and mapped to a priority queue.

Figure 1-6. Data Flow User Interface to Network Interface

Figure 1-7. Data Flow Network Interface to User Interface

RICi-16 Ver. 2.5

Functional Description

1-17

Chapter 1 Introduction

Installation and Operation Manual

Classification
The ingress user traffic is mapped to the Ethernet flows using classification types.
RICi-16 allows two of the following combinations per port (port + )

VLAN (Range)

P-bit (Range)

IP Precedence (Range)

DSCP (Range)

VLAN (Range) + P-bit (Range)

VLAN (Range) + IP Precedence (Range): Only for User to Network

VLAN (Range) + DSCP (Range): Only for User to Network

In addition to the selected combination above the following classification are


supported per port:

Untagged

Non-IP

VLAN (Range) + Non-IP

Unclassified

Policing and Bandwidth Profiles


RICi-16 supports 32 policer profiles and instances.
Policers can be applied per flow. The policers operate according to the dual token
bucket mechanism with the following configurable parameters:

CIR

CBS

EIR

EBS

RICi-16 does not support policer for Network to User flows.

Tag Editing
RICi-16 supports several options for VLAN tagging and p-bit tagging/mapping
actions including adding/removing VLAN tags and setting P-bit for the VLAN tag
(as per a mapping function). The following options are available.

Push VLAN tag/stack (push)

Pop VLAN tag/stack (pop)

Mark VLAN tags/stack (mark)

Add two levels of VLAN tag/stack

Remove two levels of VLAN tag/stack

None (no action)

P-bit actions (for pushed VLANs)

1-18

Set to a fixed value

Functional Description

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

Copy from C-VLAN tag

Mark according to a defined mapping profile according to the user priority (Pbit, IP Precedence or DSCP)

Queue Management
The following sections explain how queues are managed.

Priority Queues
RICi-16 supports five queues at the egress network port. The first queue (#0) is
dedicated to host (management, OAM) traffic and user traffic cannot be assigned
to this queue.
The scheduling method can be configured by the user, per queue, to be strict or
WFQ, according to the scheduling method.
Strict. The data flow set to the highest priority is transmitted first. If this data
flow stops, all tasks at lower priorities move up by one priority level. For example,
the data flow set to the second-highest priority is then transmitted at the
highest priority.
WFQ. Allows different scheduling priorities to statistically multiplex data flows
with different shares on the service. Each data flow has a separate FIFO queue. A
link transmitting at a data rate R, N non-empty data flows are served
simultaneously according to the assigned share w, each at an average rate of
R/(w1 + w2 + w3 + +wN). If one data flow stops, the remaining data flows each
receive a larger share w.

Congestion Control
Each queue employs an early discard mechanism to ensure CIR traffic (green
packets). Early discard of yellow packets (EIR), upon crossing a predefined fill
level threshold ensures CIR traffic over EIR traffic.

Prioritizing Traffic Using QoS


RICi-16 maps QoS to priority queues (4 PQ, strict priority or WFQ or both)
according to one of the following:

VLAN priority (802.1p)

DSCP (bits 0-5 in IP TOS byte)

IP Precedence

0
0

1
1

2
1

3
1

IP
HEADER

VERSION

IHL
TOTAL LENGTH
TOS
IDENTIFICATION
FLAGS
FRAGMENT OFFSET
TIME TO LIVE
PROTOCOL
HEADER CHECKSUM
SOURCE ADDRESS
DESTINATION ADDRESS
OPTIONS
PADDING

Figure 1-8. IP Header

RICi-16 Ver. 2.5

Functional Description

1-19

Chapter 1 Introduction

Installation and Operation Manual

Bit 0

Bit 1

DS5

Bit 2

DS4

DS3

Bit 3
DS2

Bit 4
DS1

Bit 5
DS0

Bit 6

Bit 7

XX

XX

DSCP: six bits (DS5DS0)

Figure 1-9. ToS Byte DSCP Field

Timing
E1/T1 Uplink
The Tx clock for the E1/T1 links is determined by the system clock, which can be
derived from the internal oscillator or the recovered clock signal from one of the
Rx links. You can configure the master and fallback source for the system clock.
The following figures show typical clock configurations for the E1/T1 links.

Figure 1-10. E1/T1 Clock Configuration for RICi-16 Working Opposite RICi-16

Figure 1-11. E1/T1 Clock Configuration for RICi-16 Working Opposite Egate-100

T3 Uplink
In T3 mode, RICi-16 supports two system clocks:

1-20

E1/T1 clock, for E1/T1s mapped to VCGs, in the case of channelized T3. The
E1/T1 clock source options are:

Internal oscillator

Recovered clock signal from one of the E1/T1 links.

T3 clock. The T3 clock sources options are:

Internal oscillator

Recovered clock signal from one of the T3 links.

Functional Description

RICi-16 Ver. 2.5

Installation and Operation Manual

Note

Chapter 1 Introduction

Clock timing is not required for TDM T1s mapped over DS-3 (M13), as they are
transparently mapped over DS-3.
The following figures show typical clock configurations for the T3 links.

Figure 1-12. T3 Clock Configuration for RICi-16 Working Opposite RICi-16

Figure 1-13. T3 Clock Configuration for RICi-16 Working Opposite Egate-100

Management
RICi-16s performance can be locally monitored from an ASCII terminal, or from a
remote site using Telnet or the ConfiguRAD Web-based application. RADs SNMP
network management application RADview is supported as well.

Inband Management
RICi-16 supports inband management via Telnet, SNMP, and Web (ConfiguRAD).
Configuration, monitoring, and statistics are available.

Out-of-Band Management
RICi-16 allows full configuration and diagnostics via an ASCII terminal. The ASCII
terminal is connected to the control port on the front panel.

Chapter 3 explains how to activate the ASCII terminal and provides general
instructions for navigating through the system menus and windows to view and
modify data.

Security
ASCII terminal, Telnet SSH, and Web access are password protected. After 15
minutes of inactivity, the system exits and you will have to log in again.

RICi-16 Ver. 2.5

Functional Description

1-21

Chapter 1 Introduction

Installation and Operation Manual

Telnet, Web, and SNMP access can be individually disabled or restricted to


stations in the manager list.
RICi-16 supports the following access authorization levels:

Superuser mode for configuration and monitoring

User mode for monitoring and configuration view only.

Management Access
The units architecture allows access from every bridge port to the host devices.
In certain configuration modes, a total separation of management traffic from
user traffic can be achieved.
In VLAN-aware mode, RICi-16 forwards the management traffic to the
management station in the Ethernet network. Because a different VLAN is used,
total separation between user traffic and management traffic is maintained.
In the scenario illustrated by Figure 1-15, traffic coming from the remote CPE
uses separate VLANs for user and management traffic. Each remote unit uses two
VLANs, one for user traffic and one for management.

Figure 1-14. Management Traffic in a VLAN-Aware Application

1-22

Technical Specifications

RICi-16 Ver. 2.5

Installation and Operation Manual

1.4
E1 Interface

T1 Interface

T3 Interface

Chapter 1 Introduction

Technical Specifications

Number of Ports

4, 8, or 16

Compliance

G.703, G.704

Framing

Framed (G732N with CRC)

Data Rate

2.048 Mbps

Impedance

120, balanced
75, unbalanced (via adapter cable)

Line Coding

HDB3, AMI

Connector

Electrical, RJ-45

Number of Ports

4, 8, or 16

Compliance

ANSI T1.403

Framing

ESF

Data Rate

1.544 Mbps

Impedance

100, balanced

Line Coding

B8ZS, AMI

Connector

Electrical, RJ-45

Number of Ports

1 (channelized)
2 (clear channel)

Compliance

GR-499-CORE
ANSI T1.107
ANSI T1.102

Fast Ethernet
RICi-16 Ver. 2.5

Framing

C-bit parity, M23 (channelized only)

Data Rate

44.736 Mbps

Impedance

75, unbalanced

Line Coding

B3ZS

Connector

Coaxial BNC

Number of Ports

3 or 4

Technical Specifications

1-23

Chapter 1 Introduction

Installation and Operation Manual

10/100BaseT
Interfaces

Encapsulation

Interface

4 10/100BaseTx interfaces or
2 10/100BaseTx interfaces and 1 SFP interface

Standards

Ethernet, Relevant sections of IEEE 802.3, 802.3u

Maximum Frame
Size

1,700

Data Rate

100 Mbps

Interface type,
connector

Electrical, RJ-45

Range

100 meters/328 feet on UTP category 5 cables

Autonegotiation

Supported

Flow control

PAUSE

Duplex modes

Full/half duplex

ETH over
GFP VCAT LCAS

Compliance: G.7042, G.7043, G.8040

SFP

Up to 16 E1/T1 links per VCG


Up to 16 VCGs
Differential delay: Up to 250 ms for E1/T1
Up to 217 ms for T3

Internal Bridge

Ports

Fast Ethernet (up to 4)


For local host (1)
GFP

Control Port

Monitoring

1-24

LAN Table

Learning of up to 2,018 MAC table entries and 30 static


addresses

Operation Mode

VLANAware, VLAN-Unaware

Filtering and
forwarding

Transparent or filter

Interface

RS-232/V.24 (DTE asynchronous)

Data Rate

9.6, 19.2, 115.2 kbps

Connector

DB-9, female

Statistics

System and physical layer Alarms

Technical Specifications

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 1 Introduction

ETH o E1 frame counters


Ethernet physical layer statistics and frame counters

Indicators

PWR (green)

On RICi-16 is powered on
Off RICi-16 is off

TST (yellow)

On Loop is set on one of the interfaces


Off No loop is set on one of the interfaces

ALM (red)

On System or interface alarm is active


Off No Alarm

LINK (green) for


each Ethernet port

On Ethernet link is active

ACT (blinking
green) for each
Ethernet port

Blinking Ethernet frame received or sent within the


last second

LOC (red) for each


port (E1 only)

On Local sync loss for E1

REM (red) for each


port (E1 only)

On Remote sync loss for E1

RED (red) for each


port (T1)

On Local sync loss

Indicators (cont.) YEL (yellow) for


each port (T1)
Power

Physical

RICi-16 Ver. 2.5

Off Ethernet link is inactive

Off No frame received or sent within the last second

Off No loss

Off No loss

Off No loss
On Remote sync loss
Off No loss

AC or DC Voltage

100240 VAC, 50/60 Hz or 48/60 VDC nominal (4072


VDC)

Power
Consumption

13W

Height

43.7 mm (1.7 in) (1U)

Width

440.0 mm (17.3 in)

Depth

240.0 mm (9.4 in)

Weight

2.2 kg (4.7 lb)

Technical Specifications

1-25

Chapter 1 Introduction

Environment

Installation and Operation Manual

Temperature

Regular option:
0 to 50C (32 to 122F)
Temperature-hardened option:
-22 to 65C (-7.6 to 149F)

Humidity

1-26

Technical Specifications

Up to 90%, non-condensing

RICi-16 Ver. 2.5

Chapter 2
Installation and Setup
This chapter includes the following topics:

Site Requirements and Prerequisites

Package Contents

Equipment Needed

Installation and Setup.

The RICi-16 unit ships completely assembled with factory defaults set for basic
operation. It is designed for installation as a desktop unit or mounting in a
19-inch rack. For rack installation instructions, refer to the Rack Mounting Kit for
19-inch Racks guide that comes with the RM kit.
After installing the unit, use an ASCII terminal connected to the CONTROL port to
perform any configuration necessary. The configuration procedures are described
in Chapter 3 and Chapter 4.
If problems are encountered, refer to Chapter 6.

Warning

No internal settings, adjustment, maintenance and repairs should be performed


by either the operator or the user. Such activities must be performed only by
skilled personnel who are aware of the hazards involved.
Always observe standard safety precautions during installation, operation and
maintenance of this product.

2.1

Site Requirements and Prerequisites

AC-powered units should be installed within 1.5 meters (5 feet) of an easily


accessible grounded AC outlet capable of furnishing the required supply voltage,
in the range of 100 to 240 VAC, 50/60 Hz. DC-powered units require a 48 VDC or
60 VDC nominal standard DC supply. Refer to the Connecting DC Power section at
the front of the manual.
Allow at least 90 cm (36 in) of frontal clearance for operator access. For
continuous product operation allow at least 10 cm of frontal clearance and at
least 15 cm at rear of the unit, for cable connections and ventilation. For proper
ventilation, keep at least 2.5 cm clearance from the sides and top of the product.
The ambient operating temperature of RICi-16 is 0 to 50 C (32 to 122F), at a
relative humidity of up to 90%, non-condensing.

RICi-16 Ver. 2.5

Site Requirements and Prerequisites

2-1

Chapter 2 Installation and Setup

2.2

RICi-16 Installation and Operation Manual

Package Contents

The package contains the following items:

One RICi-16 with E1/T1/T3 ports

AC power cord

DC connector kit

RM-34 kit for mounting in a 19 rack

CBL-RJ45/2BNC/E1 RJ-45 to BNC adapter cable, if an unbalanced E1 interface


was ordered.

2.3

Required Equipment

RICi-16 needs no special tools for installation. You need a screwdriver for
mounting the unit in a 19-inch rack.
RICi-16 ships with the appropriate country- or region-specific power cord equipped
with a DC adapter to allow connecting DC power. The power cord connects
RICi-16 to the mains using the power socket on the rear panel.
Refer to the following table to determine which cables are required for
installation. Appendix A specifies all connector pin-outs.

Table 2-1. Required Connection Media


Equipment/Port

Cable

Control port

Straight RS-232/V.24 cable

Fast Ethernet interface

RJ-45 cable
SFP

E1/T1 interface

RJ-45 cable
For an unbalanced E1 interface, use the adapter cable
provided

T3 Interface

2-2

Required Equipment

BNC coax cable

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

2.4

Chapter 2 Installation and Setup

Mounting the Unit

For rack installation instructions, refer to the Rack Mounting Kit for 19-inch Racks
guide that comes with the RM kit. A wall-mounting (WM) kit is available upon
request. For wall installations, refer to the Wall Mounting Kit for Installation of
8.5-inch Units.

2.5

Connecting to Ethernet Equipment

The RICi-16 Fast Ethernet interface terminates in an 8-pin RJ-45 connector.

Note

When connecting Ethernet and/or Gigabit Ethernet cables longer than 30m, it is
recommended to use shielded cables.
To connect RICi-16 to Ethernet equipment:

Connect the LAN line (RJ-45, 8-pin connector or SFP) to the RJ-45 connector
labeled 10/100BaseT.

Figure 2-1. Ethernet Ports

2.6

Connecting to E1/T1 Equipment

The E1/T1 interfaces terminate in an 8-pin RJ-45 connector.

To connect E1 or T1 equipment:

Connect an E1 or T1 line (RJ-45, 8-pin connector) to the RJ-45 connector


designated E1 or T1 (1-16).

For unbalanced E1 connections, use the RAD-supplied adaptor.

Figure 2-2. E1/T1 Ports

RICi-16 Ver. 2.5

Connecting to E1/T1 Equipment

2-3

Chapter 2 Installation and Setup

2.7

RICi-16 Installation and Operation Manual

Connecting to T3 Equipment

The T3 interfaces terminate in BNC coax connectors.

To connect T3 equipment:
1. Connect the Rx cable (BNC coax connector) to the BNC labeled Rx.
2. Connect the Tx cable (BNC coax connector) to the associated BNC labeled Tx.

Figure 2-3. T3 Ports

2.8

Connecting to the Terminal

To connect the ASCII terminal:


Connect the RS-232 cable (straight RS-232/V.24 connector) to the ASCII terminal
or an out-of-band management station.
Connect the RS-232 cable (DB-9 female connector) to the units CONTROL port

Caution Terminal cables must have a frame ground connection. Use ungrounded cables
when connecting a supervisory terminal to a DC-powered unit with floating
ground. Using improper terminal cable may result in damage to supervisory
terminal port.

Figure 2-4. ASCII Terminal

2.9

Connecting to Power

RICi-16 can accept either AC power or DC power.

Warning

Before connecting or disconnecting any communication cable, the unit must be


grounded by connecting its power cord to a power outlet with a ground terminal,
and by connecting the ground terminal on the panel (if provided) to protective
ground.
Any interruption of the protective (grounding) conductor (inside or outside the
instrument) or disconnecting the protective ground terminal may render this unit
dangerous. Intentional interruption is prohibited.

2-4

Connecting to Power

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

Chapter 2 Installation and Setup

Connecting to AC Power
AC power is supplied via a standard 3-prong inlet with an integral fuse holder.
AC power should be supplied through the 1.5m (5 ft) standard power cable
terminated by a 3-prong socket. The cable is provided with the unit.

To connect AC power:
1. Connect the power cable socket to the power connector on the RICi-16 rear
panel.
2. Connect the power cable plug to mains outlet.
The unit turns on automatically upon connection to the mains.

Figure 2-5. Power Connector

Connecting to DC Power
A special IEC 60320 adapter for 48/60 VDC power connection is supplied with the
unit.

To connect to DC power:
For instructions on wiring the DC adapter, refer to the DC power supply
connection supplement located at the end of this manual.
For safety instructions, refer to the Handling Energized Products section at the
beginning of this manual.

RICi-16 Ver. 2.5

Connecting to Power

2-5

Chapter 2 Installation and Setup

RICi-16 Installation and Operation Manual

Removing/Installing the Hot-Swappable Power Supply Units


You can replace RICi-16s power supply units in the field whenever necessary.

To remove a hot-swappable power supply unit:


To prevent electrocution, DISCONNECT THE POWER SUPPLY CABLE FROM THE
POWER SUPPLY UNIT before removing the power supply unit.

Warning

1. Using a flathead screwdriver, unscrew the two tightening screws that secure
the unit to the chassis.
2. Carefully pull and remove the power supply unit from the chassis.

Warning

To install the hot-swappable power supply unit:


To prevent electrocution, KEEP THE POWER SUPPLY CABLE DISCONNECTED FROM
THE POWER SUPPLY UNIT until it has been fully installed.

Caution Do not install the RICi-16 power supply units in other products. The power supply
units are intended solely for RICi-16.
3. Carefully slide the new power supply into its slot until the unit's rear
connector engages the mating connector on the backplane, and the power
supply unit fits into place.
4. Using a flathead screwdriver, secure the power supply unit with the two
tightening screws.

2-6

Connecting to Power

RICi-16 Ver. 2.5

Chapter 3
Operation
This chapter:

Explains how to power RICi-16 up and down.

Provides a detailed description of the front panel controls and indicators and
their functions.

Provides instructions for using a terminal connected to the RICi-16 control


port.

Describes how to navigate menus.

Defines the configuration alternatives.

For a detailed explanation of parameters in the menus, see Chapter 4.

3.1

Turning On the Unit

To turn on the unit:

Connect the power cord to the mains.


The PWR indicator turns on and remains on as long as RICi-16 receives
power.

Once installed, RICi-16 requires no operator attention, except for occasionally


monitoring the front panel indicators. Intervention is only required when the unit
must be configured to its operational requirements, or when diagnostic tests are
performed.

RICi-16 Ver. 2.5

Turning On the Unit

3-1

Chapter 3 Operation

RICi-16 Installation and Operation Manual

3.2

Indicators

The unit's LEDs are located on the front panel. Table 3-1 lists the functions of
the LED indicators.

Figure 3-1. RICi-16 Front Panel with T3 Connectors


Table 3-1. RICi-16 LEDs and Controls
Name
POWER

Color
Green

Function
On Unit is powered
Off Unit is off

TST

Yellow

On Self test or diagnostics underway


Off no test running

ALM

Red

On interface alarm detected


Off no alarm currently detected

LOC for each E1 port

Red

On Local sync loss


Off No loss

REM for each E1 port

Red

On Remote sync loss


Off No loss

RED for each T1 port

Red

On Local sync loss


Off No loss

YEL for each T1 port

Yellow

On Remote sync loss


Off No loss

LINK for each Ethernet


port

Green

ACT for each


Ethernet port

Yellow

On Ethernet link is up

Off Ethernet link is down


Blinking Ethernet frame received or sent within
the last second
Off No frame received or sent within the last
second

3-2

Indicators

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

3.3

Chapter 3 Operation

Default Settings

Configuration parameters in RICi-16 may or may not have default values.


Configuration parameters that have default values fall into one of two categories:

Set/configured defaults For example, terminal bit rate, which is auto-detect


and set on power up. These defaults are presented on the screen.

Not set/configured defaults These defaults are not visible when entering
the screen and are presented by a blank field. They show up after a Save
operation is done in the particular screen. For example, the ingress filtering
parameter shows the default value after changes in the bridge configuration
screen are saved.

Configuration parameters that do not have default values must have values
entered in their respective fields, or the Save operation will fail.

Table 3-2 lists the default settings of the RICi-16 configuration parameters.
Table 3-2. Default System Settings
Type

Parameter

Default Value

Default gateway

0.0.0.0

Default IP

0.0.0.0

DHCP

Disable

IP address

0.0.0.0

IP mask

255.255.255.0

Read community

Public

Trap community

Public

Write community

Private

Contact Person

Name of the contact person

Description

Fast Ethernet over 16 NTU


HW Ver: 0.0, SW 2.10

Location

The Location of the device

Name

RICi-16

SNMP access

Enable

Telnet/ SSH access

Enable

Web access

Enable

User name for superuser

su (full control)

User name for guest user

user (read-only)

System

Host

Device Info

Management Access

User Access

RICi-16 Ver. 2.5

Default Settings

3-3

Chapter 3 Operation
Type

Encapsulation

Alarm Trap Mask

Control Port

Network Interface

RICi-16 Installation and Operation Manual


Parameter

Default Value

Host Tagging

Untagged

Host VLAN ID

Host VLAN Priority

Alarm ID

Trap Status

Active

Baud Rate

9600 bps

Set Scrolling Window Size

Security Timeout

10

Network Operation Mode

T3

Note: Applicable only for unit


with T3 ports
Physical Ports

Ethernet User

E1

T1

T3

3-4

Default Settings

Administrative Status

Up

Autonegotiation

Enable

Flow Control

Enable

Max Capability Advertised

100base TX Full Duplex

MDIX Auto Cross Over

Enable

Administrative Status

Up

Interface Type

Balanced

Line Code

HDB3

Line Type

G732N-CRC

Receiver Sensitivity

Long haul

Restoration Time

Immediate

Transmit Clock Source

System

Administrative Status

Up

Line Type

ESF

Line Interface

CSU

Line BuildOut

0 dB

Line Code

B8ZS

Receiver Sensitivity

Long haul

Restoration Time

1 Sec

Transmit Clock Source

System

Administrative Status

Up

Clock

System

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual


Type

Chapter 3 Operation

Parameter

Default Value

Line type

M23

Line length

Up to 225ft

Structure

Channelized

Aging Time

300

Bridge Ports

1 = Reserved for management host

Application Layer

Bridge

2 = Ethernet 1
3 = Ethernet 2
4 = Ethernet 3
5 = Ethernet 4
6 = GFP1

Bridge Port

Forwarding Mode

Filter

VLAN Mode

Unaware

Activation

Enable

Accept Frame Type

All

Copy Original Priority

Disable

Default Priority Tag

--

Egress Tag Handling

None

Ingress Filtering

Disable

Ingress Tag Handling

Bridge Port

3.4

Copy Origin Priority

Disable

Default Priority

Port VID/Stacking VID

VLAN Tag Stacking

Disable

Configuration and Management Alternatives

Configuration and monitoring operations are performed locally from an ASCII


terminal connected to the control port or from a PC running a Web browser.

Working with Terminal


RICi-16 includes a V.24/RS-232 asynchronous DTE port designated CONTROL that
utilizes a 9-pin D-type female connector. The control port continuously monitors
the incoming data stream and immediately responds to any input string received.
The control port can be configured to communicate at 9.6, 19.2 or 115.2 kbps.

RICi-16 Ver. 2.5

Configuration and Management Alternatives

3-5

Chapter 3 Operation

RICi-16 Installation and Operation Manual

To start a terminal control session:


1. Make sure all relevant communication cables and connectors are properly
connected. Refer to Chapter 2 for installation and setup procedures.
2. Connect the RS-232 cable (straight RS-232/V.24 connector) to the ASCII
terminal emulation application on the PC.
3. Connect the RS-232 cable (DB-9 female connector) to the RICi-16 units
CONTROL port. The default settings are as follows:
Baud Rate:

9600 bps

Data Bits:

Parity:

None

Stop Bits:

Flow Control:

None

4. To optimize the view of the system menus:

Set the terminal emulator to VT100.

If you are using HyperTerminal, set the terminal mode to the 132-column
mode.

5. After the initialization and the self-test passed successfully, a menu appears
displaying initialization and self-test results.

Logging In

To log in:
1. Use su as user name with read/write permission.
2. Use 1234 as the (default) password for the first login.

Note

It is recommended to change default passwords to prevent unauthorized access


to the unit.

Choosing Options
This section explains how to select options and save changes.

To select an option:
1. Type the number corresponding to the option and press <Enter>.
2. If you performed a change, Save appears as the last option in the menu.
3. Type the number corresponding to the Save option in the current menu, and
press <Enter> to save your change.
RICi-16 updates its database with the new value or displays a new menu
for the selected option.
4. To exit the menu, press <ESC>.
The following message appears:
Do you want to save changes (Y/N/C)?

3-6

Configuration and Management Alternatives

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

Chapter 3 Operation

Type the appropriate letter for Yes, No, or Cancel.

Note

When a menu option has only two values, typing the option number and pressing
<Enter> will toggle between the available values.

Screen Example
Figure 3-2 illustrates a typical screen, displaying the main items.
Product Title (RICi-16)
Menu Path
1. Sub Menu>
2. Sub Menu>
3. Parameter X [Range] (value)
4. Parameter Y>
(Select value from the list)
5. Table Z []
prompt>
Help line message
Help line of keyboard shortcuts, such as Esc-prev for
returning to the previous menu
-----------Division screen line -----------------Scroll messages

Figure 3-2. Sample Screen

Navigating Tables
Some of the management screens, such as the Inventory table and Manager
table, exceed the size of regular menu screens and require scrolling to navigate
between parameters. These screens are best viewed when your terminal screen is
set to 132 character width.
Use the following keys (case-sensitive) for table navigation:

Note

<Ctrl+L>:

scroll left, Left Arrow move left

<Ctrl+R>:

scroll right, Right Arrow move right

<Ctrl+U>:

scroll up, Up Arrow move up

<Ctrl+D>:

scroll down, Down Arrow move down

<Tab>:

select the next changeable cell

G<row number>,
<col number>:

go to the specified cell

You can display these navigation keys by typing <?> from a table.
The following figure illustrates an empty VLAN table. VIDs and Names are the
columns of the parameters to be defined.

RICi-16 Ver. 2.5

Configuration and Management Alternatives

3-7

Chapter 3 Operation

RICi-16 Installation and Operation Manual

RICi-16
VLAN Table
1. VID

| NAME

>
ESC-prev. menu; !-main menu; &-exit; ?-Help

1 user (s)

Figure 3-3. Sample Table Screen (VLAN)

Working with the Web Browser


RADs Web-based remote access terminal management software provides a userfriendly interface for configuring, collecting statistics and performing diagnostic
tests on the unit.
The management software supports the following browsers:

Note

Internet Explorer 6.0 and up, running on Windows

In order to work with Internet Explorer 8 and Internet Explorer 9, you must enable
the work in compatibility mode.
Before you start using a Web browser for remote management or monitoring:

Enable scripts.

Configure the firewall that might be installed on your PC to allow access to


the destination IP address.

Disable pop-up blocking software, such as Google Popup Blocker. You may
also have to configure spyware and adware protecting software to accept
traffic from/to the destination IP address.

To prevent configuration errors, you must clear out the files stored in your
browser cache whenever you return to the same screen.

Logging In

To log in from a Web browser:


1. Connect the Ethernet port to the LAN. Refer to Chapter 2 for information
about connecting to Ethernet equipment.
2. Verify that an IP address has been assigned to the relevant unit, using an
ASCII terminal (see Working with Terminal)
3. Open the Web browser.
4. Disable any pop-up blocking software, such as Google Popup Blocker.
5. In the address field, enter the IP address of RICi-16 and then press <Enter>.
The address line reads something like http://172.16.100.253.
The Opening window appears.
6. Click LOGIN; you are asked for the user name and the password.

3-8

Configuration and Management Alternatives

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

Chapter 3 Operation

7. Enter your user name and the password. The default user name for
read/write permission is su and the default password is 1234.
The Web browsers Main menu appears.

Notes

It is recommended to change default passwords to prevent unauthorized

access to the unit.


RICi-16 allows six management sessions to be active simultaneously: five

network sessions (Telnet, Web, RADview-Lite) and one ASCII terminal session.
If no user input is detected for 5 minutes during a Web session,

RICi-16 automatically disconnects from the management station.

Navigating the Web Browser Menus


At the left-hand bottom corner, the Web browser provides auxiliary management
tools:

Status:

displays the number of users currently managing the unit

Trace:

opens an additional pane for system messages, progress


indicators (ping, software and configuration file downloads) and
alarms

Refresh All:

refreshes the data currently displayed

To choose an option:
1. Click a link in the Web screen to display the next menu.
2. Once the target screen is displayed, select a value from the drop-down box or
enter it in a text box.

Working with RADview


RADview-EMS is a user-friendly and powerful SNMP-based element management
system (EMS), used for planning, provisioning, and managing heterogeneous
networks. RADview-EMS provides a graphical user interface for monitoring RAD
products via their SNMP agents.
RADview-EMS for RICi-16 is bundled in the RADview-EMS/NGN package for PC
(Windows-based) or UNIX.
For more details about this network management software, and for detailed
instructions on how to install, set up, and use RADview, contact your local
distributor or refer to the RADview-EMS User's Manual, located on the Technical
Documentation CD

RICi-16 Ver. 2.5

Configuration and Management Alternatives

3-9

Chapter 3 Operation

RICi-16 Installation and Operation Manual

3.5

Menu Maps

Once you have logged into RICi-16 via an ASCII terminal or Web Terminal, navigate
the hierarchical menus to set and view the units configuration parameters, and
perform other essential operations.

Figure 3-4 shows the actual main menu in an ASCII terminal screen. All system
configuration and control functions are access via this menu.
RICi-16 RAD Data Communications
Main Menu
1.
2.
3.
4.
5.

Inventory
Configuration
Monitoring
Diagnostics
Utilities

>
>
>
>
>

>
Please select item <1 to 5>
ESC-Previous menu; !-Main menu; &-Exit

Figure 3-4. Main Menu for RICi-16 (Terminal Screen)


The main menu options are:
Inventory (type 1)

View system information, HW/SW versions and HW


configuration

Configuration (type 2)

Set and configure all parameters required for the


operation of RICi-16

Monitoring (type 3)

Monitor system performance and statistics

Diagnostics (type 4)

Perform diagnostics

Utilities (type 5)

Upload/download application files, configuration files


and backup files

The figures on the following pages summarize the menus available in the menu
map.

Note

3-10

Not all menus illustrated in the menu map are actually available. Available menus
depend on the configuration you purchased.

Menu Maps

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

Chapter 3 Operation

Configuration Menu
The following figures summarize the paths available for the configuration options:

Figure 3-5. Main Menu > Configuration >System 1

RICi-16 Ver. 2.5

Menu Maps

3-11

Chapter 3 Operation

RICi-16 Installation and Operation Manual

Figure 3-6. Main Menu > Configuration >System 2

3-12

Menu Maps

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

Chapter 3 Operation

Figure 3-7. Configuration > Physical Layer

Figure 3-8. Configuration > Logical Layer


RICi-16 Ver. 2.5

Menu Maps

3-13

Chapter 3 Operation

RICi-16 Installation and Operation Manual

Figure 3-9. Configuration > Applications 1

3-14

Menu Maps

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

Chapter 3 Operation

Figure 3-10. Configuration > Applications 2

RICi-16 Ver. 2.5

Menu Maps

3-15

Chapter 3 Operation

RICi-16 Installation and Operation Manual

Monitoring Menu
The following figures summarize the paths available for the monitoring options:

Figure 3-11. Main Menu > Monitoring > System

3-16

Menu Maps

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

Chapter 3 Operation

Figure 3-12. Main Menu > Monitoring > Physical Port

Figure 3-13. Main Menu > Monitoring > Logical Layer

RICi-16 Ver. 2.5

Menu Maps

3-17

Chapter 3 Operation

RICi-16 Installation and Operation Manual

Figure 3-14. Main Menu > Monitoring > Applications

Diagnostics Menu
The following figure summarizes the paths available for the diagnostics options:

Figure 3-15. Main Menu > Diagnostics

3-18

Menu Maps

RICi-16 Ver. 2.5

Utilities Menu
The following figure summarizes the paths available for the additional tasks
options:

Figure 3-16. Main Menu > Utilities

3.6

To turn off the unit:

RICi-16 Ver. 2.5

Turning Off the Unit

Remove the power cord from the power source.

Turning Off the Unit

3-19

Chapter 3 Operation

3-20

Turning Off the Unit

RICi-16 Installation and Operation Manual

RICi-16 Ver. 2.5

Chapter 4
Configuration
This chapter describes how to configure RICi-16 for management and operation.
Configuration screens are illustrated and configuration parameters explained.

Note

The configuration screens illustrated in this chapter are taken from a terminal
screen, but most of the menus are similar to those viewed in Telnet and the
Web-based management application.
This chapter includes the following sections:

Configuring RICi-16 for Management

Configuring RICi-16 for Operation

Performing Additional Tasks.

For instructions on accessing and navigating the screens, and a complete list of
all menu items, see Chapter 3.

4.1

Configuring RICi-16 for Management

Entering Device Information


The RICi-16 management software allows you to assign a name to the unit and
specify its location to distinguish it from other units installed in your system. A
contact person can also be assigned.

To enter device information:


1. From the Main menu, navigate to Configuration > System > Management >
Device Information.
The Device Information menu appears as illustrated in Figure 4-1

Note

RICi-16 Ver. 2.5

The description of the unit is factory-set and cannot be changed.

Configuring RICi-16 for Management

4-1

Chapter 4 Configuration

Installation and Operation Manual

RICi-16
Configuration > System > Management > Device Information
Description

(Ethernet over Bonded PDH Network Termination Unit)


(HW Ver: x.x, SW Ver: x.xx)

1. Name
2. Location
3. Contact

... (RICi-16)
... (The Location of the Device)
... (Name of Contact Person)

>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

Figure 4-1. Typical Device Information Menu


2. Select Name, and type a name for the unit. The default name is
RICi-16.
3. Select Location, and type a location name/description.
4. Select Contact, and type the name of a contact person for this unit.
5. Select Save.

Configuring Host IP Parameters


You can manage RICi-16 via a network management station connected to one of
the units ports. To establish a proper connection, it is necessary to configure the
Host parameters such as the IP address. In addition, by selecting a forwarding
mode and VLAN parameters, it is possible to create a separate management
VLAN.

To define the Host parameters:


1. From the Main menu, navigate to Configuration > System > Management >
Host.
The Host menu appears as illustrated in Figure 4-2.
RICi-16
Configuration > System > Management > Host
1.
2.
3.
4.
5.
6.
7.

IP Address
Mask
Default gateway
Read community
Write community
Trap community
Encapsulation

...
...
...
...
...
...
>

>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

(0.0.0.0)
(255.255.255.0)
(0.0.0.0)
(public)
(private)
(public)

1 user(s)

Figure 4-2. Host Menu

4-2

Configuring RICi-16 for Management

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

2. Select IP Address and enter the IP address of the IP host.


3. Select Mask and enter the host IP subnet mask.
4. Select Default Gateway and enter the default gateway IP address.
5. Select Read Community and type the name of a community with read-only
authorization.
6. Select Write Community and type the name of a community with write
authorization.
7. Select Trap Community and type the name of a community to which the unit
should send traps.
8. Select Encapsulation to define VLAN tagging performed by the host.
The Encapsulation menu appears as illustrated in Figure 4-3.
RICi-16
Configuration > System > Management > Host > Encapsulation
1. Host tagging
2. Host VLAN ID [1-4094]
3. Host Priority Tag [0-7]

(Tagged)
... (2)
... (0)

>
s - Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-3. Encapsulation Menu


9. Select Host Tagging and toggle between Untagged and Tagged.

Note

Untagged The host sends and receives frames with no VLAN tag
to/from the bridge.

Tagged The host receives frames only if they are tagged with the hosts
VLAN ID, and it sends frames to the bridge with this tag.

When Host Tagging is set to Tagged, two parameters are added to the menu:
Host VLAN ID and Host Priority Tag.
10. Select Host VLAN ID to specify the host VLAN ID (14094).
11. Select Host Priority Tag to specify the priority level for the host VLAN (07).
12. Select Save.
13. Return to the Host menu and select Save again.

RICi-16 Ver. 2.5

Configuring RICi-16 for Management

4-3

Chapter 4 Configuration

Installation and Operation Manual

Configuring SNMPv3
RICi-16 supports SNMP version 3 entity, providing secure SNMP access to the
device by authenticating and encrypting packets transmitted over the network.
Follow these steps to configure the SNMPv3 entity:
1. Configuring the SNMP Engine ID
2. Enable SNMPv3.
3. Define SNMP engine ID
4. Add a new user.
5. Add a new notification entry.
6. Assign traps to notification entries.
7. Configure target (NMS) parameters.
8. Specify target address, define its parameter set and assign notification tags.
9. Map SNMPv3 setting to SNMPv1 settings (if necessary).

Configuring the SNMP Engine ID


Engine ID is an alphanumeric string used for identification of the RICi-16 agent in
the SNMPv3 environment. The engine ID must be unique to allow the user to
query the SNMP engine. It must be defined prior to enabling SNMPv3
functionality. The length of the string is up to 27 characters.

To define the SNMP engine ID:


1. Navigate to the SNMP Engine ID menu (Configuration > System >
Management > SNMP Engine ID),
2. Select Remaining Bytes and define the value of the engine ID section reserved
for user SNMP engine identification.
The value is automatically translated in hexadecimal format and displayed
in the read-only Engine ID field.
RICi-16
Configuration > System > Management>SNMP Engine ID
Engine ID,
... (800000a40400000000)
Engine ID Config Type >
(Text)
1. Remaining Bytes
... (2)
>
S - Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-4. SNMP Engine ID Menu


3. Select Save.

4-4

Configuring RICi-16 for Management

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Enabling SNMPv3

To enable SNMPv3:
1. From the Management menu (Configuration > System > Management), select
SNMPv3 and then select Save.
A warning message is displayed advising that the current configuration of
SNMP agent will be deleted.
2. Select Y to continue or N to cancel.
Once enabled, the SNMPv3 Settings line is added to the Management
menu as illustrated in Figure 4-5.
RICi-16
Configuration > System > Management
1.
2.
3.
4.
5.
6.
7.

Device Information >


SNMPv3
Host
>
Managers List
[]>
SNMP Engine ID
>
SNMPv3 Setting
>
Management Access
>

(Enabled)

>
s - Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-5. Management Menu


3. From the Management menu, select SNMPv3 Settings.
The SNMPv3 Settings menu is displayed as illustrated in Figure 4-6.
RICi-16
Configuration > System > Management>SNMPv3 Setting

1.
2.
3.
4.
5.
6.

Engine Boots
Engine Time
SNMP Message Size
Users
Targets & Notify
SNMPv1/v3 Mapping
SNMPv3 Factory Defaults
Summary User Table
Summary Target Table

(2)
(276)
... (1500)
>
>
>
[]
[]

>
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-6. SNMPV3 Settings Menu

RICi-16 Ver. 2.5

Configuring RICi-16 for Management

4-5

Chapter 4 Configuration

Installation and Operation Manual

Adding SNMPv3 Users


RICi-16 supports up to ten SNMPv3 managers with different authorization and
privacy attributes.

Note

Access control policy is defined via the vacmSecurityToGroupTable and


vacmAccessTable tables, which can be accessed via an SNMP browser only.
To add an SNMPv3 user:
1. From the SNMPv3 Settings menu (Configuration > System > Management >
SNMPv3 Settings), select Users.
The SNMPv3 Settings menu appears.
2. Select Security Name and enter security name for a new user (up to 32
alphanumeric characters).
The Privacy Protocol, Authentication Password and Privacy Password lines are
added to the SNMPv3 Users menu as illustrated in Figure 4-7.
RICi-16
Configuration > System > Management>SNMPv3 Settings>Users
1.
2.
3.
4.
5.

Security Name
Authentication Protocol
Privacy Protocol
Authentication Password
Privacy Password

...
>
>
...
...

(1)
(usmHMACM5AuthProtocol)
(usmDESPrivProtocol)
[]
[]

>
FForward; BBack; RRemove; S-Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-7. SNMPv3 Users Menu


3. Select Authentication Protocol and define the authentication protocol to be
used for authenticating the user:

usmNoAuthProtocol (No authentication is performed)

usmHMACMD5AuthProtocol (MD5 protocol)

usmHMACSHAAuthProtocol (SHA protocol)

4. Select Privacy Protocol and define the type of privacy protocol to be used for
encryption:

usmNoPrivProtocol (Privacy protocol is not used)

usmDESPrivProtocol (DES protocol)

5. Select Authentication Password and define the authentication password of


the user. This is not available if authentication has been disabled.
6. Select Privacy Password and define the private key used for encryption. This is
not available if privacy has been disabled.

Note

4-6

Minimum password length is at least 8 characters long.

Configuring RICi-16 for Management

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

7. Select Save.

To view the summary of the SNMPv3 user configuration:

From the SNMPv3 Settings menu (Configuration > System > Management >
SNMPv3 Settings), select Summary User Table.

To delete an SNMPv3 user:

From the Users menu (Configuration > System > Management > SNMPv3
Settings > Users), perform the following:

Type F (Forward) or B (Back) to select an SNMPv3 user.

Type R (Remove) to delete the selected user.

Adding SNMPv3 Notification Entries


You can define which types of notification will be sent to the target management
stations (the target stations are defined separately, as explained in Configuring
Target Parameters).

To define a notification entry:


1. From the SNMPv3 Settings menu (Configuration > System > Management >
SNMPv3 Settings), select Targets & Notify.
2. Select Notify.
The Notify menu is displayed as illustrated in Figure 4-8.
3. From the Notify menu, define the following:

Name up to 60 characters (ASCII string identifying the notification


entry)

Tag 0-255 (A tag value to be associated with the current notification


entry. This tag is used to identify the current notification entry when
configuring the target address).

RICi-16
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Notify
Type

>

1. Name
2. Tag

(Trap)

...()
...()

>
F-Forward B-Backwards R- Remove
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-8. Notify Menu


4. Select Save.

To delete a notification entry:

RICi-16 Ver. 2.5

From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Notify.
Configuring RICi-16 for Management

4-7

Chapter 4 Configuration

Installation and Operation Manual

Type F (Forward) or B (Back) to select a notification entry.

Type R (Remove) to delete the selected entry.

Assigning Traps
One or more traps must be assigned to each notification entry.

To assign traps to notification entries:


1. From the Target & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Trap.
The Trap menu is displayed as illustrated in Figure 4-9.
2. From the Trap menu, define the following:

Tag Name (A tag from the list of previously defined notification tags)

Trap (A trap to be assigned to the selected tag).

RICi-16
Configuration>System>Management> SNMPv3 Settings> Target & Notify > Trap
1. Tag Name
2. Trap

>
>

(Power Failure)
(1)

>
F-Forward B-Backwards R-Remove
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-9. Trap Menu

To delete a trap:

From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Trap.

Type F (Forward) or B (Back) to select a notification entry.

Type R (Remove) to delete the selected entry.

Configuring Target Parameters


Target is an SNMPv3 network management station to which RICi-16 is going to
send trap notifications. A set of parameters has to be configured and assigned to
each target.

To configure target parameters:


1. From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Params.
The Target Params menu is displayed as illustrated in Figure 4-10.
2. From the Target Params menu, configure the following:

4-8

Name (An ASCII string identifying current set of target parameters)

Message Processing Model (The Message Processing Model to be used


when generating SNMP messages using this entry):

Configuring RICi-16 for Management

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

SNMPv1

SNMPv2c

SNMPv2u

SNMPv3

Security Model (The Security Model to be used when generating SNMP


messages using this entry):

Any

SNMPv1

SNMPv2c

User-Based Security Model (USM)

Not defined

Security Name (Identification of the principal on whose behalf SNMP


messages are to be generated using this entry. This can be either
SNMPv3 user or SNMPv1/SNMPv2 community string.)

Security Level (The level of security to be used when generating SNMP


messages using this entry):

noAuthNoPriv (Authorization and privacy are disabled)

authNoPriv (Authorization is enabled, privacy is disabled)

authPriv (Authorization and privacy are enabled)


RICi-16

Configuration>System>Management> SNMPv3 Settings> Target & Notify > Target Params

1.
2.
3.
4.
5.

Name
Message Processing Model
Security Model
Security Name
Security Level

...
>
>
...
>

(11)
(SNMPv1)
(Any)
()
(noAuthNoPriv)

>
F-Forward B-Backwards R-Remove
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-10. Target Params Menu


3. Select Save.

To delete a target parameter:

RICi-16 Ver. 2.5

From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Parameters.

Type F (Forward) or B (Back) to select a notification entry.

Type R (Remove) to delete the selected entry.

Configuring RICi-16 for Management

4-9

Chapter 4 Configuration

Installation and Operation Manual

Configuring Target Address


Each target must have a valid IP address, IP mask. In addition, a previously
configured parameter set and notification tags must be assigned to the target.
To configure the target address:

1. From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Address.
The Target Address menu is displayed as illustrated in Figure 4-11.
2. From the Target Address menu, configure the following:

Name (ASCII string identifying the target)

IP Address (Valid IP address of the NMS. Must be in the


xxx.xxx.xxx.xxx:162 format, where 162 is a standard SNMP port used for
sending traps)

Params Name (List of previously defined target parameter names)

Address Mask (An IP mask of the NMS)

Tag List (List of previously defined notification tags).

3. Select Save.

To view the summary of the SNMPv3 target configuration:

From the SNMPv3 Settings menu (Configuration > System > Management >
SNMPv3 Settings), select Summary Target Table.
RICi-16

Configuration>System>Management> SNMPv3 Settings> Target & Notify > Target Address

1.
2.
3.
4.

Name
IP Address
Params Name
Tag List

...
...
...
...

(11)
(0.0.0.0)
(param1)
(traps)

>
F-Forward B-Backwards R-Remove>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-11. Target Address Menu

To delete a target address:

From the Targets & Notify menu (Configuration > System > Management >
SNMPv3 Settings > Targets & Notify), select Target Address.

Type F (Forward) or B (Back) to select a notification entry.

Type R (Remove) to delete the selected entry.

Mapping SNMPv1 to SNMPv3


RICi-16 supports coexistence of different SNMP versions by mapping
SNMPv1/SNMPv2 community name to the SNMPv3 security name value. The
mapping is performed according to the RFC 3584 requirements.

4-10

Configuring RICi-16 for Management

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

To map SNMPv1 to SNMPv3:


1. From the SNMPv3 Settings menu (Configuration > System > Management >
SNMPv3 Settings), select SNMPv1/v3 Mapping.
The SNMPv1/v3 Mapping menu is displayed as illustrated in Figure 4-12.
2. From the SNMPv1/v3 Mapping menu, define the following:

Community Index (SNMP community index)

Community Name (SNMPv2/SNMPv2 community name)

Security Name (SNMPv3 security name to be mapped to the


SNMPv2/SNMPv2 community name)

Transport Tag (Specifies a set of the transport endpoints that are used,
in either of the following methods:

Specifying the transport endpoints from which an SNMP entity


accepts management requests
Specifying the transport endpoints to which a notification may be
sent, using the community string matching the corresponding
instance of community name.
RICi-16

Configuration>System>Management>SNMPv3 Settings>SNMPv1/v3 Mapping

1.
2.
3.
4.

Community Index
Community Name
Security Name
Transport Tag

...
...
...
...

()
()
()
()

>
F-Forward B-Backwards R-Remove
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-12. SNMPv1/v3 Mapping Menu


3. Select Save.

Configuring Management Access


RICi-16 allows you to enable or disable remote access via an SNMP, Telnet and
Web to the I2C management system. By disabling remote management access,
you prevent unauthorized access to the system when security of the unit's IP
address has been compromised. You can allow users to be defined on a Radius
server, which is an easily accessible and centralized server from which RICi-16
units (as well as other units that support Radius) can authenticate individual
users and their passwords. You can set the availability and priority of both the
Radius and local (terminal) login methods via the unit's general access policy.
In addition, you can limit access to the device to only those stations defined in
the managers list. The Managers List menu details management access
implementation, depending on whether the network managers are defined or not
as illustrated in Figure 4-16

RICi-16 Ver. 2.5

Configuring RICi-16 for Management

4-11

Chapter 4 Configuration

Note

Installation and Operation Manual

When remote management access is disabled, RICi-16 can be managed via a


direct ASCII-based terminal connection only.
To configure management access:
1. From the Main menu, navigate to Configuration > System > Management >
Management Access.
The Management Access menu appears as illustrated in Figure 4-13.
RICi-16
Configuration > System > Management > Management Access
1.
2.
3.
4.
5.
6.
7.

User Access
RADIUS Parameters
Telnet
SSH Access
SNMP Access
WEB Access
Access Policy

>
>
>
>
>
>
>

(Enable)
(Enable)
(Enable)
(Enable)

>
S Save
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 1 C

Figure 4-13. Management Access Menu


2. From the Management Access menu, select the access level you wish to
change and then select the access permission setting for the selected access
level (see

Table 4-1. Management Access Options


Parameter

Description

Possible Value

Telnet

Access using Telnet

Enable - Telnet access is enabled


Disable - Telnet access is disabled
Managers Only - Access is enabled
only for the management stations

SSH Access

Access using Secure Shell

Enable - Secure Shell access is


enabled
Disable - Secure Shell access is
disabled
Managers Only - Access is enabled
only for the management stations

SNMP Access

Access using an SNMP


client such as RADview

Enable - SNMP access is enabled


Disable - SNMP access is disabled
Managers Only - Access is enabled
only for the management stations

4-12

Configuring RICi-16 for Management

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Parameter

Description

Possible Value

WEB Access

Access via Web based


interface using a Web
browser

Enable - Web access is enabled


Disable - Web access is disabled
Managers Only - Access is enabled
only for the management stations
listed in the manager list
Enable Secure - Secure access
enabled via Secure Shell (SSH) or
Secure Socket Layer (SSL) for
anybody
Manager Only Secure - Secure access
enabled via Secure Shell (SSH) or
Secure Socket Layer (SSL) for
management stations listed in the
manager list

Note

Available access permission settings depend on the access level selected in the
Management Access menu
3. Select Save.

Configuring the Radius Server Parameters


RICi-16 provides connectivity to up to four Radius authentication servers. If
RICi-16 is required to authenticate users via a centralized Radius server in any
given application, the required parameters must be configured.

To configure the Radius server parameters:


1. From the Management Access menu (Configuration > System > Management >
Management Access), select Radius parameters.
The Radius Parameters menu is displayed as illustrated in Figure 4-14.

RICi-16
Configuration> System> Management> Management Access> Radius parameters

1.
2.
3.
4.
5.
6.

Server sequence number


Server status
Server access
Server IP address
Key string
Number of retries [0-10]
Timout (in seconds) [1-5]
Authentication port [1-65535]

>
...
...
...
...
...

(1)
(Not Connected)
(Disable)
(100.150.200.50)
(****)
(2)
(2)
(1812)

>
F-Forward
B-Backwards
ESCprevious menu; !main menu; &-exit

Figure 4-14. Radius Parameters Menu


2. Define the following Radius parameters:

RICi-16 Ver. 2.5

Configuring RICi-16 for Management

4-13

Chapter 4 Configuration

Installation and Operation Manual

Table 4-2. Radius Parameters


Parameter

Description

Possible Value

Server Access

Enable or disable the specific Radius


server which details are displayed

Enable
Disable

Server IP Address

IP address of this Radius server

0.0.0.0

Key String

Non-disclosed string used to encrypt


the user password

Number of Retries

Maximum number of times an


authentication request should be resent to the server in case of no
response

0-10

Timeout (secs)

Period in seconds during which RICi16 waits for a response from the
Radius server

1-5

Authentication Port

UDP port number used for the


authentication channel

1-65535

3. Select Save
4. To switch to additional Radius servers, select <F> Forward or <B> Backward
respectively.

Defining the Access Policy


Access policy allows configuration of multiple authentication protocols. User
authentication is performed in the order the methods are selected. If the first
authentication method is not available or the user is not found, the next selected
method is used.

To define the access policy:


1. From the Management Access menu (Configuration > System > Management >
Management Access), select Access Policy.
The Access Policy menu is displayed as illustrated in Figure 4-15.
RICi-16

Configuration> System> Management> Management Access> Access policy


1. 1st level
2. 2nd level

> (Radius)
> (Local)

>
S-Save
ESCprevious menu; !main menu; &-exit

Figure 4-15. Access Policy Menu


2. Configure the following:

4-14

1st Level (First level of authentication):

Configuring RICi-16 for Management

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RADIUS (RICi-16 uses authentication database stored on the RADIUS


server)
Local (RICi-16 uses locally stored authentication database)

2nd Level (Second level of authentication. Available only when the 1st
level authentication is set to RADIUS):

None (Second authentication level is disabled; access to RICi-16 is


allowed using the 1st level method only)
Local (RICi-16 uses locally stored authentication database)

3. Select Save.

Configuring Network Managers


You can define or modify the network management stations to which the SNMP
agent of the RICi-16 sends traps. Up to ten managers can be defined. Entering
the IP address defines each management station. The manager list defines the
network management stations that will receive these traps. In addition, you can
temporarily prevent a manager station from receiving traps by masking the
network manager.

Note

This option is only available if SNMPv3 is disabled.


To define the manager list:
1. From the Management menu (Configuration > System > Management), select
Managers List.
The Managers List menu is displayed as illustrated in Figure 4-16.
RICi-16
Configuration>System>Management>Managers List
Manager ID
1
2
3
4
5
6
7
8
9
10

Manager IP
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0

1. Change cell

Manager Trap Mask


Unmasked
Unmasked
Unmasked
Unmasked
Unmasked
Unmasked
Unmasked
Unmasked
Unmasked
Unmasked
... (0.0.0.0)

>
ESC-prev.menu; !-main menu; &-exit

1 user(s)

Figure 4-16. Managers List Menu


Table 4-3 describes the IP address and the Trap mask fields in the Managers List
menu as illustrated in Figure 4-16.

RICi-16 Ver. 2.5

Configuring RICi-16 for Management

4-15

Chapter 4 Configuration

Installation and Operation Manual

Table 4-3. Managers List Values


Parameter

Description

IP Address

The managers IP address

Possible Value

Default: 0.0.0.0
Trap Mask

Masks and unmasks traps to the


Manager. Trap Mask is always on but
access is only possible when the IP
address is provided

Masked
Unmasked

Default: Unmasked

2. The list contains 10 entries. Use the Tab key to select the next changeable
cell.
3. To change the IP value of a cell, select the field (it will appear highlighted),
then choose Change Cell and enter the new IP value.
4. To change the Trap Mask value of a cell, select the field (it will appear
highlighted), then choose Change Cell for Masked, or choose Change Cell again
for Unmasked.

4.2

Configuring RICi-16 for Operation

Configuring RICi-16 for operation entails setting the following parameters:

System level parameters:

Clock source

Date and time

Interface groups

Syslog

Fault propagation

Application mode, selecting the Bridge or Flows mode

Operational mode, select the E1/T1 or T3 mode

Physical layer parameters:

4-16

Fast Ethernet interfaces

Application layer parameters:

Bridge

QoS

Flows

OAM.

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Setting System-Level Parameters


This section includes procedures for setting the clock source, setting date and
time, defining interface groups, viewing syslog information, configuring fault
propagation and selecting the network application and operation mode.

Selecting the Clock Source


Transmitted data can be clocked either from an internal clock within the RICi-16
unit, or from an external clock via the E1/T1/T3 ports.
In channelized T3 network mode the device has two system clocks, one for the
T1 ports and one for the T3 ports. In unchannelized T3 mode, only the T3 clock is
active. In T1 network mode, only the T1 clock is active.
The unit can be assigned two sources for timing:
Master Source:

main clock source

Fallback Source:

activated when the master source fails (for example, when


the E1/T1 link supplying the timing fails).

It is recommended to assign different clock types for the master and fallback
clock sources, for example: Rx Clock (external) for the master source and Internal
for the fallback source.
If the fallback source fails, the internal source takes over.

To select the master clock source:


1. Navigate to Configuration > System > Source Clock > Master Clock.
The Master Clock menu appears (see Figure 4-17 and Figure 4-18). If the
unit has T3 network mode and channelized T3 structure, the menu
indicates it is the T1 clock.
2. Select Source and choose the master clock source:
Internal:

for setting the internal clock as the master clock source

Rx Clock:

for setting an external clock (from E1/T1/T3 link) for the


master clock source.

3. If you chose Rx Clock, specify the port to be used:

Note

E1/T1 Port 116:

for configuring the E1/T1 master clock source

T3 Port 12:

for configuring the T3 master clock source.

For T1 clock in channelized T3 mode, RX sources are the internal T1 channels


1-28
4. Select Save to save the clock source settings.
5. If the unit starts in T3 network mode and channelized T3 structure, type f to
advance to the T3 master clock source, and repeat steps 2 through 4 to
configure the T3 master clock source.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-17

Chapter 4 Configuration

Installation and Operation Manual

To select the fallback clock source:


1. Navigate to Configuration > System > Source Clock > Fallback Clock.
The Fallback Clock menu appears (see Figure 4-19 and Figure 4-20). If the
unit has T3 network mode and channelized T3 structure, the menu
indicates it is the T1 clock.
2. Select Source and choose the fallback clock source:
Internal:

for setting the internal clock as the fallback clock source

Rx Clock:

for setting an external clock (from E1/T1/T3 link) for the


fallback clock source

3. If you chose Rx Clock, specify the port to be used:


E1/T1 Port 116:

for configuring the E1/T1 fallback clock source

T3 Port 12:

for configuring the T3 fallback clock source

4. Select Save to save the clock source settings.


5. If the unit starts in T3 network mode and channelized T3 structure, type f to
advance to the T3 fallback clock source, and repeat steps 2 through 4 to
configure the T3 fallback clock source.
RICi-16
Configuration > System > Source Clock > Master Clock
System Clock
1. Source

(T1)
(Internal)

>
f - Forward
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-17. Master Clock Menu, T3 Network Mode and Channelized T3 Structure
RICi-16
Configuration > System > Source Clock > Master Clock
1. Source

(Internal)

>
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-18. Master Clock Menu, E1 Interface or T1 Network Mode or


Unchannelized T3 Structure

4-18

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration > System > Source Clock > Fallback Clock
System Clock
1. Source

(T1)
(Internal)

>
f - Forward
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-19. Fallback Clock Menu, T3 Network Mode and Channelized T3


Structure
RICi-16
Configuration > System > Source Clock > Fallback Clock
1. Source

(Internal)

>
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-20. Fallback Clock Menu, E1 Interface or T1 Network Mode or


Unchannelized T3 Structure

Configuring the Date and Time


The Date and Time menu is used to configure the SNTP client parameters. The
SNTP client is used as a means to receive the date and time from the network.
When the SNTP server is properly configured and accessible, the device displays
the real date and time as was received from the SNTP server, instead of the
system uptime, which is the default state.

To set the SNTP client parameters:

From the Date and Time menu (Configuration > System > Date and Time) set
the SNTP client parameters according to Figure 4-21 and Table 4-4.
RICi-16

Configuration> System> Date and Time


1.
2.
3.
4.
5.
6.
7.

Date
Time
SNTP
GMT
SNTP
SNTP
Send

[YYYY-MM-DD]
[HH-MM-SS]
mode
server IP address
update interval (sec)
initiated SNTP request

...
...
>
>
...
...

(2008-31-01)
(02:34:45)
(Unicast client)
(0)
(255.255.255.1)
(5)

>
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-21. Date and Time Menu

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-19

Chapter 4 Configuration

Installation and Operation Manual

Table 4-4. Date and Time Menu Parameters


Parameter

Description

Possible Values

Date

Date in format of: [YYYY-MM-DD]

2000-01-01 to
2099-12-31

Time

Time in format of: [HH:MM:SS]

00:00:00 to 23:59:59

SNTP mode

Availability and type of the SNTP time


retrieval:

Disable

Disable the SNTP service is disabled.

Default: Unicast client

Unicast client RICi-16 works in SNTP


mode as a Unicast client.

GMT

Unicast client

The Greenwich Mean Time (GMT) offset of


the manually entered time (not relevant in
SNTP mode).

-12 to +12, in jumps of


1 (integers only)

SNTP server
IP address

IP address of the SNTP server. Valid only


when the SNTP mode is 'Unicast client'.

0.0.0.0
255.255.255.255

SNTP update
interval (min)

The required delay in minutes between


automatic SNTP request initiations.

11440

Default: 0

Default: 60

You can manually initiate an SNTP request by selecting the Send initiated
SNTP request option. An SNTP request is immediately sent to the specified SNTP
server address upon selecting this option. Valid only when the SNTP mode is
'Unicast client'.

Defining Interface Groups


Each port can be allocated to an interface group. Once an interface group had
been defined you can then add specific ports to that group.

To define an interface group:


1. Navigate to the Interface Groups menu (Configuration >System >Interface
Groups).
The Interface Groups menu appears as illustrated in Figure 4-22.
RICi-16
Configuration> System> Interface Groups
Group Id [1-10]
1. Ethernet Interfaces
2. GFP Interfaces

(0)
> (-)
> (-)

>
a-Add; f-Forward; b-Backward
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-22. Interface Groups Menu


2. Type <a> to add an interface group.

4-20

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

3. Type <s> to save the interface group.

Note

The maximum number of interface groups that can be defined is 10.


To add a port to an interface group:
1. Navigate to the Interface Groups menu (Configuration >System >Interface
Groups).
The Interface Groups menu appears as illustrated in Figure 4-22.
2. Type <f> Forward or <b> Backwards to select the desired interface group.
3. Select the relevant interface type and add the desired port to the interface
group.

Note

You can add a single port (1) as well as a range of ports (1-4 for Ethernet and 116 For GFP) to an interface group.
4. Select Save.
5. Repeat this procedure for all interface groups in use.

Selecting the Application Mode


You can set the application operation mode to Bridge Mode or Flows Mode,
according to your application requirements.

To set the application operation mode:


1. From the Main menu, navigate to Configuration > System.
The System Configuration menu appears as illustrated in Figure 4-23.
2. Select Application Mode and set to either Bridge Mode or Flows Mode.
3. Select Save.

Selecting the Network Operation Mode


Note

This section is relevant only for RICi-16/T3.


You can select the network operation mode to be E1/T1 or T3, according to your
application requirements.

To set the network operation mode:


1. From the Main menu, navigate to Configuration > System.
The System Configuration menu appears as illustrated in Figure 4-23.
2. Select Network Operation Mode and set it to E1/T1 or T3.
3. Select Save.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-21

Chapter 4 Configuration

Note

Installation and Operation Manual

Changing the network operation mode is a time-consuming operation. It may


take 10 to 30 seconds for RICi-16 to complete the transition.
When you change the network operation mode, all VCG and VLAN configurations
are lost. The device reverts to default VCG and VLAN configuration.
RICi-16
Configuration > System
1. Source Clock
2. Management
3. Terminal
4. Date and Time
5. Interface Groups
6. Syslog
7. Fault Propagation
8. Application Mode
9. Network Operation Mode
10. Protection
11. Factory Defaults

>
>
>
>
>
>
>
(Bridge Mode)
(T3)
>
>

>
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-23. System Configuration Menu


If the T3 network mode is defined, the T3 port protection parameters option
appears in the System menu, see Configuring T3 Port Protection.

Setting the Syslog Parameters


Once the date and time are set, system events are logged accordingly. To allow
logging/sharing of system events on a server instead of internally, you need to
configure the Syslog parameters.

To set the Syslog parameters:


1. From the System menu (Configuration > System), select Syslog.
The Syslog menu is displayed.
2. Configure the Syslog parameters according to Figure 4-24 and Table 4-5.
3. Select Save.

4-22

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration> System> Syslog
1.
2.
3.
4.
5.

Device Logging Status


Device UDP Port [1-65535]
Facility
Severity Level
Server Parameters

>
...
>
>
>

(Enabled)
(514)
(Local 1)
(Minor)

>
S-Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-24. Syslog Menu


Table 4-5. Syslog Parameters
Parameter

Description

Possible Values

Device logging
status

Determines whether logging to


the Syslog server is enabled or
disabled. When disabled, RICi-16
logs the events internally.

Enabled
Disabled

Default: Disabled
Device UDP
port

The local UDP port from which the


Syslog messages are sent.

165535

Default: 514

Note: The port cannot be changed


when the logging status is
enabled.
Facility

Identifies the software module,


task or function from which the
Syslog messages are sent.

Local 1 Local 7

Default: Local 1
Severity level

Only events that their severity


equals or exceeds the selected
severity level are sent. The
severity levels are:
Default: Minor

Critical corresponds to the


Emergency (0) severity level of
Syslog
Major corresponds to the Alert
(1) and Critical (2) severity levels
of Syslog
Minor corresponds to the Error
(3) severity level of Syslog
Warning corresponds to the
Warning (4) severity level of
Syslog
Event corresponds to the Notice
(5) severity level of Syslog
Info corresponds to the
Informational (6) severity level of

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-23

Chapter 4 Configuration

Installation and Operation Manual

Parameter

Description

Possible Values
Syslog
Debug corresponds to the
Debug (7) severity level of Syslog

To set the Syslog server parameters:


1. From the Syslog menu (Configuration > System > Syslog), select Server
Parameters.
The Server Parameters menu is displayed.
2. Set the Server parameters according to Figure 4-25 and Table 4-6.
3. Select Save.
RICi-16
Configuration> System> Syslog >Server Parameters
Server
Server
1. Server
2. Server

Sequence
Access
IP Address
UDP Port

...
>
...
...

(1)
(Disable)
(190.72.140.100)
(514)

>
S-Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-25. Syslog Server Parameters Menu


Table 4-6. Syslog Server Parameters
Parameter

Description

Possible Values

Server
Sequence

Server sequence number

15

Server Access

Whether to enable or disable syslog server


access

Enabled
Disabled

Default: Disabled
Server IP
Address

IP address of the Syslog server to which the


event logs are sent

0.0.0.0
255.255.255.255

Server UDP Port

The UDP port of the Syslog server.

165535

Default: 514

Note: The port cannot be changed when the


logging status is enabled

4-24

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Configuring Fault Propagation


When fault propagation is enabled, the fault propagation mechanism notifies
local and remote equipment whenever there is a faulty condition between
interface groups. This enables routers and switches on both ends of the link to
reroute traffic. Each port can be allocated to an interface group, see Defining
Interface Groups. You can configure each interface group to perform a specific
action according to the activated fault.
You can also specify the wait to restore (WTR) time for each interface. WTR is the
time period RICi-16 waits before enabling the interface group once the network is
restored.

To configure fault propagation:


1. From the Main menu, navigate to Configuration > System > Fault Propagation.
The Fault Propagation menu appears as illustrated in Figure 4-26.
RICi-16
Configuration > System > Fault Propagation
Faulty Interface
Affected Interface
1. Fault
2. Action
3. Wait to Restore [0-3600]

> ()
> ()
()
()
()

>
a - Add
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-26. Fault Propagation Menu


2. Type <a> to add a fault propagation definition.
3. Select Save.
A new fault propagation definition has been added to the Fault
Propagation screen.
4. Set the fault propagation definitions and parameters according to Figure 4-26
and Table 4-7.

Table 4-7. Fault Propagation Parameters


Parameter

Description

Possible Values

Faulty Interface

Interface group that initiated the


the fault alarm

Group 1-10

Affected Interface

Interface group to which the fault


alarm should be forwarded

Group 1-10

Fault

Fault on which the action should be


taken

Interface Down
OAM Signaling

Default: OAM Signaling

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-25

Chapter 4 Configuration

Installation and Operation Manual

Parameter

Description

Possible Values

Action

Action taken on affected interface

Interface Down
OAM Signaling

Default: OAM Signaling


Wait to Restore

Time period RICi-16 waits before


enabling the interface once the
network is restored

0-3600
(0 disables the WTR)

Default: 0

5. Select Save.
6. Repeat this procedure for all fault propagation definitions in use.

Configuring Physical-Layer Parameters


RICi-16 is equipped with 16 E1/T1 ports and four fast Ethernet interfaces. The
Ethernet and E1 or T1 (depending on your unit) configuration menus are available
from the Physical Layer menu.

Configuring the Fast Ethernet Ports


The following parameters can be configured for the Ethernet ports at the physical
level:

Administration status

Auto negotiation

Flow control

Maximum advertised capability for the Auto Negotiation procedure

Data rate and duplex mode (only when Auto Negotiation is disabled)

MDIX Auto Cross-over

OAM (EFM)

Policer Profile

VLAN Tag Ether Type (hex)

MAC Access Control You can specify that the port accepts traffic only from
the first MAC address(es) from which it receives traffic.

L2CP Filtering Profile.

To configure the Fast Ethernet port at the physical level:


1. From the Main menu, navigate to Configuration > Physical Layer > Ethernet.
The Ethernet menu appears as illustrated in Figure 4-27.

4-26

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration > Physical Layer > Ethernet
Port
Interface
OAM EFM Mode
1. Administrative Status
2. Auto-Negotiation
3. Flow Control
4. Max Capability Advertised
5. MDIX Cross Over
6. OAM EFM
7. Policer Profile
8. VLAN Tag Ether Type (hex)
9. MAC Access Control
10.L2CP Filtering Profile

(1)
(RJ45)
(Passive)
(Up)
(Enable)
(Enable)
> (100base TX Full Duplex)
(Enable)
(Enable)
> (None)
...(8100)
>
> (default 2cpProfile)

>
S Save; F forward; B backward
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-27. Ethernet Menu


2. From the Ethernet menu, type <F> Forward or <B> Backwards to select the
desired Fast Ethernet port.
3. Type <N> or <P> accordingly to scroll up and down through the available
Ethernet parameters.
4. Set the physical layer parameters of the selected port according to
Figure 4-27 and Table 4-8,
5. Select Save.
6. Repeat for all ports in use.

Table 4-8. Ethernet Parameters


Parameter

Decription

Possible Values

Port

Fast Ethernet port number. This parameter is


read-only

14

Default: 1
Interface

Interface type. This parmeter is read-only

OAM EFM Mode

OAM mode type. This parmeter is read-only


Default: Passive

Passive
Active

Administrative
Status

Fast Ethernet mode of operation

Up
Down

Auto-Negotiation

Auto negotiation signaling over the Ethernet

Default: Up

Enable
Disable

Default: Enable
Flow Control

Administrative PAUSE mode for this interface


Default: Enable

RICi-16 Ver. 2.5

Enable
Disable

Configuring RICi-16 for Operation

4-27

Chapter 4 Configuration

Installation and Operation Manual

Parameter

Decription

Possible Values

Max Capability
Advertised

Set of capabilities advertised by the local


auto-negotiation entity

10baseT Half Duplex


10baseT Full Duplex
100baseTX Half Duplex
100base TX Full Duplex

Default: 100base TX Full Duplex

Note: This parameter only appears when


aout-negotiation is enabled
Speed & Duplex

Status speed and duplex that the port uses


when the auto-negotiation is disabled
Default: 100base TX Full Duplex

Note: This parameter only appears when


aout-negotiation is disabled

10baseT Half Duplex


10baseT Full Duplex
100baseTX Half Duplex
100base TX Full Duplex

MDIX Auto Cross


Over

Auto Cross Over functionality


Default: Enable

Enable
Disable

OAM EFM

OAM Ethernet in the First Mile (IEEE 802.3ah)


functionality

Enable
Disable

Default: Disable
Policer Profile

Sets a profile that performs traffic policing


for the port

VLAN Tag Ether


Type

VLAN Tag identifier

MAC Access
Control

MAC access control for the port. Defines the


number of allowed MAC access addresses.
Also defines whether the port accepts traffic
only from the first MAC address(es) from
which it receives traffic

0-FFFF

Default: 8100
Enable
Disable

Default: Disable
L2CP Filtering
Profile

Sets a L2CP filtering profile that performs


traffic filtering for the port

Configuring MAC Access Control Parameters


You can add up to 10 static MAC addresses to every Ethernet port. You may
define up to 10 static MAC addresses for every port. If this number is exceeded
and you want to add an additional MAC address, you must delete an existing MAC
address before the new one can be added.

To set the MAC access control parameters:


1. From the Ethernet menu (Configuration > Physical Layer > Ethernet) select
MAC Access Control.
The MAC Access Control parameters menu is displayed.
2. Configure MAC Access Control parameters according to Figure 4-28 and
Table 4-9.
3. Select Save.
4. Repeat this procedure for all ports in use.

4-28

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration>Physical Layer>Ethernet>MAC Access Control
Port
...(1)
Current Number of Permitted MAC Addresses
...(1)
1. MAC Access Control Administrative Status
> (Enable)
2. Maximum Number of Permitted MAC Addresses [0-10]...(0)
3. Permitted Static MAC Addresses
[]>
>
s-Save; f-Forward; b-Backward
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-28. MAC Access Control Menu


Table 4-9. MAC Access Control parameters
Parameter

Description

Possible Values

Port

Fast Ethernet port number.


This parameter is read-only

14

Default: 1
Current Number of
Permitted MAC Addresses

Current number of learned


MAC Addresses being
protected. This parameter
is read-only

0-10

Default: 0
MAC Access Control
Administrative Status

Current status of the MAC


access control

Enable
Disable

Default: Disable
Maximum Number of
Permitted MAC Addresses

Specifies the maximum


number of source MAC
addresses from which the
port is allowed to receive
traffic

0-10

Default: 0

Once you have defined the maximum number of permitted MAC addresses
parameter (see Table 4-9) you can start to define static MAC addresses.

To define static MAC addresses


1. From the MAC Access Control menu (Configuration > Physical Layer > Ethernet
> MAC Access Control) select Permitted Static MAC Addresses.
The Permitted Static MAC Addresses menu is displayed.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-29

Chapter 4 Configuration

Installation and Operation Manual

2. Select <A> to add a new MAC address.


A new MAC address appears as illustrated in Figure 4-29.
3. Select the desired MAC Address and define the address.
4. Select Save.
5. Repeat this procedure for all MAC addresses in use.
RICi-16
Configuration > Physical Layer >Ethernet > MAC Access Control >
Permitted Static MAC Addresses
1. MAC Address

... (000000000000)

>
S-Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-29. Permitted Static MAC Addresses Menu

Configuring the L2CP Filtering Profile


L2CP (Layer 2 Device Control Protocol) can be used to access and manage RICi16. L2CP filtering can be defined in order to assign an action based on the
address assigned to the profile. The following parameters can be configured for
the L2CP filtering profile at the physical level:

Profile Name

Profile Addresses.

To configure the L2CP Filtering Profile:


1. From the Main menu, navigate to Configuration > Physical Layer > L2CP
Filtering Profile.
The L2CP Filtering Profile menu appears as illustrated in Figure 4-30
RICi-16
Configuration > Physical Layer > L2CP Filtering Profile
Profile [1-4]
1. Profile Name
2. Addresses

(1)
... (Default Profile 1)
>

>
aAdd; fForward; bBackward; d-Delete
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-30. L2CP Filtering Profile Menu


2. Configure the L2CP filtering profile parameters (see Figure 4-30).
3. Press <A> to add a L2CP filtering profile.
4. Press <F> to switch to a different L2CP filtering profile.

4-30

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

To configure the Profile Address:


1. Navigate to the Profile Address menu (Configuration >Physical Layer >L2CP
Filtering Profile >Addresses).
The Profile Addresses menu appears.
RICi-16
Configuration>Physical Layer>L2CP Filtering Profile > Addresses
Profile
Address Index [1-32]
Address
1. Action

>

(Default Profile 1)
(1)
(000000000000)
(Tunnel)

>
aadd; fforward; bbackward; d-Delete
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-31. Profile Address Menu


2. Configure the Profile Address parameters. Parameter descriptions and possible
values are provided in Table 4-10 and Figure 4-31.
3. Press <A> to add a new profile address.
4. Press <F> to switch to a different profile address.

Table 4-10. Profile Address Parameters


Parameter

Description

Possible Values

Profile Name

Name of the profile

DefaultProfile1

Address Index [1-32]

Index number allocated to the


profile address

1-32

Default: 1
Address

L2CP address

000000000000

Action

Action that should be taken


when destination address is
received

Discard
Tunnel

Default: Tunnel

5. Select Save.
6. Repeat this procedure for all address profiles in use.

Configuring the E1 Ports


Note

This section is relevant only for RICi-16 equipped with E1 ports.


To configure E1 ports:
1. From the Physical Layer menu (Configuration >Physical Layer), select E1.
The E1 menu appears as illustrated in Figure 4-32.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-31

Chapter 4 Configuration

Installation and Operation Manual

RICi-16
Configuration > Physical Layer > E1
Port [1 16]
TX Clock Source
Line type
Restoration Time
1.
2.
3.
4.

(1)
> (System)
> (G.732N-CRC)
(Immediate)

Administrative Status
Interface Type
Line Code
Rx Sensitivity

(Up)
(Balanced)
> (HDB3)
(Long Haul)

>
SSave;

fforward;

bbackward;

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-32. E1 Port Configuration Menu


2. Configure E1 port parameters for each E1 port. Parameter descriptions and
possible values are provided in Table 4-11.
Press <F> to switch to a different E1 port.

Table 4-11. E1 Port Parameters


Parameter

Description

Possible Values

Port number

Index of E1 ports. This parameter is read-only.

1-16

TX Clock Source

Transmit clock source of the E1 port

System

Line Type

Type of E1 line in this circuit. The type of circuit


affects the number of bits per second that the
circuit can reasonably carry, as well as the
interpretation of the usage and error statistics.
This parameter is read-only.

G.732N-CRC

Restoration Time

Used to change the synchronization algorithms


to reduce the time required for the port to
return to normal operation after local loss of
synchronization (LOF event). This parameter is
read-only.

Immediate

Administrative
Status

Administrative status of E1 port

Up
Down

Interface Type

E1 interface type

Default: Up

Default: Balanced
Line Code

Transmission line code.


Default: HDB3

4-32

Configuring RICi-16 for Operation

Balanced
Unbalanced
HDB3
AMI

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Parameter

Description

Possible Values

Rx Sensitivity

Maximum attenuation of the receive signal that


can be compensated for by the interface receive
path

Long Haul
Short Haul

Default: Long Haul

3. Select Save.
4. Repeat this procedure for all E1 ports in use.

Note

If two CPEs such as RICi-16 communicate via VCG (VCAT) interfaces using a
16-frame multi-frame protocol (G.732N), network devices along the path must be
set to forward E1 frames transparently.

Configuring the T1 Ports


Note

This section is relevant only for RICi-16 with T1 network ports, or channelized T3
network interface.
To configure T1 ports:
1. From the Physical Layer menu (Configuration >Physical Layer), select T1.
The T1 menu appears as illustrated in Figure 4-33.
RICi-16
Configuration > Physical Layer > T1
Port [1 16]
TX clock Source
Line Type
Restoration Time
1.
2.
3.
4.
5.
6.

>
>

Administrative Status
Line Code
Line Interface
Line Length
Line Build Out (db)
Rx Sensitivity

>
>

(1)
(System)
(ESF)
(1 sec)
(Up)
(B8ZS)
(DSU)
(0133 ft)
(0)
(Long Haul)

>
s-Save;

fForward;

bBackward;

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-33. T1 Port Configuration Menu


2. Configure the T1 port parameters for each T1 port. Table 4-12 lists
explanations and possible values for the listed parameters.
Press <F> to switch to a different T1 port.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-33

Chapter 4 Configuration

Installation and Operation Manual

Table 4-12. T1 Port Parameters


Parameter

Description

Possible Values

Port

Index of T1 ports. This parameter is readonly

1 - 16

Line Type

Type of T1 line implementing this circuit.


The type of circuit affects the number of
bits per second that the circuit can
reasonably carry, as well as the
interpretation of the usage and error
statistics. This parameter is read-only

ESF

TX clock source

Transmit clock source of the T1 port

System

Restoration Time

Reduces the time required for the T1 port


to return to normal after loss of
synchronization (LOF)

1 sec.

Default: 1 sec.
Administrative Status

Administrative status of the T1 port


Default: Up

Line Code

Transmission line code


Default: B8ZS

Line Interface

Type of line interface of the T1 port


Default: CSU

Line Length

The length of the DSL line (only visible if the


Line Interface parameter is set to DSU)
Default: 0-133 ft

Line Build Out (dB)

The TX gain of the DSL line (only visible if


the Line Interface parameter is set to CSU)
Default: 0 dB

Rx Sensitivity

Maximum attenuation of the receive signal


that can be compensated for by the
interface receive path

Up
Down
B8ZS
AMI
DSU
CSU
0-133 ft
133-266
266-399
399-533
533-655

ft
ft
ft
ft

0 dB
-7.5 dB
-15 dB
Short Haul
Long Haul

Default: Long Haul

3. Select Save.
4. Repeat this procedure for all T1 ports in use.

Note

4-34

If two CPEs such as RICi-16 communicate via VCG (VCAT) interfaces using a
24-frame multi-frame protocol (ESF), network devices along the path must be set
to forward T1 frames transparently.

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Configuring the T3 Ports


Note

This section is relevant only for RICi-16/T3.


This section describes the configuration of the T3 port parameters. To configure
the T3 channel mapping, refer to Configuring the T3 Channel Mapping.

To configure the T3 port:


1. From the Physical Layer menu (Configuration >Physical Layer), select T3.
The T3 menu appears as illustrated in Figure 4-34.
RICi-16
Configuration > Physical Layer > T3
Port [1-2]
TX Clock Source
1.
2.
3.
4.
5.

>

Administrative Status
Structure
Line Type
Line Length
Mapping

(1)
(System)
(Up)
(Channelized)
(M23)
(Up to 225ft)

[]>

>
sSave;

fForward;

bBackward

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-34. T3 Port Configuration Menu


2. Configure the T3 port parameters. Table 4-13 lists explanations and possible
values for the parameters.

Table 4-13. T3 Port Parameters


Parameter

Description

Possible Values

Port

Index of T3 port. This parameter is read-only

12

TX Clock Source

Transmit clock source of the T3 port

System

Administrative Status

Administrative status of the T3 port

Up
Down

Default: Up
Structure

Channelized: Aggregated T3 up to 28 T1 channels.


Unchannelized: Native T3 channel

Channelized
Unchannelized

Default: Channelized

Note: Changing the T3 structure is a


time-consuming operation and may take as long as
30 seconds to complete. All VCG and VLAN
configurations are lost when you change the T3
structure. The device reverts to default VCG and
VLAN configurations

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-35

Chapter 4 Configuration

Installation and Operation Manual

Parameter

Description

Possible Values

Line Type

Type of T3 line implementing this circuit. The type


of circuit affects the number of bits per second
that the circuit can reasonably carry, as well as the
interpretation of the usage and error statistics

M23
C-bit Parity

Default: M23

Note: The Line Type parameter changes if you


change the T3 structure: M23 for channelized
structure, C-bit Parity for unchannelized structure
Line Length

The length of the DSL line


Default: Up to 225ft

Up to 225ft
Over 225ft

3. Select Save.
4. Repeat this procedure for both T3 ports if T3 structure is unchannelized. Only
the first T3 ports are available to be configured if T3 structure is channelized.

Note

If two CPEs such as RICi-16 communicate via VCG (VCAT) interfaces using a
24-frame multi-frame protocol (ESF), network devices along the path must be set
to forward T1 frames transparently.

Configuring T3 Port Protection


RICi-16 enables you to configure port protection for T3 ports in cases where an
active port fails another is automatically assigned to take over the extra
workload.

Note

This section is relevant only for RICi-16/T3.


This section describes the configuration of T3 port protection.

To configure the T3 port protection:


1.

From the System menu (Configuration > System > Protection), select
Protection and perform the following:

2. Select the port protection method:


1+1:

Load sharing, with both ports in the pair active, sharing the overall
traffic load. When one of the ports fails, the other port takes over.

None:

No protection, in this case, each port operates independently

3. Select a working port (12).


4. Select Save.
5. Repeat this procedure for both T3 ports.

Configuring the T3 Channel Mapping


Note

4-36

This section is relevant only for RICi-16/T3. Mapping capabilities for RICi-16/T3
depend on the user license (1-4, 1-8, 1-12, 1-16) that you currently hold

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

The T3 channel map offers a bird's eye view of which channel is mapped to which
port. You can map up to 28 T3 channels to up to 16 physical T1 ports and up to
16 VCGs. A physical T1 port can be mapped only once to a T3 channel. A VCG
logical port can be mapped to up to 16 T3 channels. The default T3 channel
mapping configuration is:

Note

T3 channels 116 mapped to T1 ports 116 respectively

T3 channels 1728 mapped to logical port 1 (VCG 1).

If you want to map a T3 channel to a VCG other than VCG 1, you must first create
the VCG logical port. Refer to Configuring the Logical Layer for details.

To view the T3 channel mapping:

From the T3 menu (Configuration > Physical Layer > T3), select Mapping.
The T3 Mapping menu appears as illustrated in Figure 4-35. The default
mapping configuration is shown. When the mapping menu appears, the
cursor is positioned at the connection for channel 1.

RICi-16
Configuration > Physical Layer > T3 > Mapping
Channel
1
2
3
4
5
6
7
8
9
10

Connection
T1-1
T1-2
T1-3
T1-4
T1-5
T1-6
T1-7
T1-8
T1-9
T1-10

1. T1-1
2. T1-2
3. T1-3

4. T1-4
5. T1-5
6. T1-6

Channel
11
12
13
14
15
16
17
18
19
20
7. T1-7
8. T1-8
9. T1-9

Connection
T1-11
T1-12
T1-13
T1-14
T1-15
T1-16
LP1
LP1
LP1
LP1
10. T1-10
11. T1-11
12. T1-12

>
ESC-Previous menu; !-Main menu; &-Exit

Channel
21
22
23
24
25
26
27
28

13. T1-13
14. T1-14
15. T1-15

Connection
LP1
LP1
LP1
LP1
LP1
LP1
LP1
LP1

16. T1-16
17. LP1
18. N/C

1 M/ 2 C

Figure 4-35. T3 Mapping Menu, Default Configuration


The rows at the bottom of the screen show the values corresponding to potential
connections, to use when changing the channel mapping. Use the N/C value to
set a channel to unmapped. Setting a channel to unmapped causes an AIS signal
to propagate over the T3 connection on that channel.

To change a T3 channel mapping:


1. Use the arrow keys to position the cursor at the channel for which you want
to change the mapping.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-37

Chapter 4 Configuration

Installation and Operation Manual

2. Type the value corresponding to the connection that you want to map to the
channel, and click <Enter>. For example, type 1 to map to T1 port 1, or 16 to
map to logical port 1. If the list of potential connections is too large to fit on
the screen, type <n> to display the next part of the list, and <p> to display the
previous part of the list.

Configuring the Logical Layer


You can map multiple E1/T1 ports or T3 clear channels to a VCAT VCG group, via
the Logical Layer menu. If the RICi-16 unit has a T3 channelized interface, then
you map the logical ports to T3 channels via the T3 mapping menu, not via the
Logical Layer menu.
To ease configuration effort and save time, the RICi-16 unit is supplied with the
logical ports preconfigured, according to the network interface (see Table 4-14
through Table 4-16). When you change the network interface, the corresponding
default configuration is automatically created.
A logical port in RICi-16 is either a VCG logical port bound to physical E1/T1/T3
ports or T1 channels, or a GFP logical port that is bound to a VCG logical port.
When you create a VCG logical port, RICi-16 automatically creates a GFP logical
port that is bound to the VCG logical port, and configures a bridge port bound to
the GFP logical port. Therefore, you only need to add/delete VCG logical ports.
You do not manually add/delete GFP logical ports.
You can create up to 16 VCG logical ports if the network interface is E1/T1 or
channelized T3. You can create only two VCG logical ports if the network interface
is unchannelized T3.

Note

A physical port can be bound to only one logical VCG port.


Table 4-14. Default Logical Port Settings for T3 Network Interface, Channelized
Logical
Port

Interface
Type

Port Name

Bound to

VCG

VCG 1

Internal ports (T3 channels) 1728

GFP

GFP 1

Logical port VCG 1

Table 4-15. Default Logical Port Settings for T3 Network Interface,


Not Channelized

4-38

Logical
Port

Interface
Type

Port Name

Bound to

VCG

VCG 1

Physical (T3) ports 12

GFP

GFP 1

Logical port VCG 1

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Table 4-16. Default Logical Port Settings for E1/T1 Network Interface

Logical
Port

Interface
Type

Port Name

Bound to

VCG

VCG 1

Physical (E1/T1) ports 116

GFP

GFP 1

Logical port VCG 1

To configure the Logical Layer:


1. From the Main menu, navigate to Configuration > Logical Layer.
The Logical Layer menu appears. Depending on the interface type and
logical port type, the screen appears as shown in Figure 4-36 through
Figure 4-38.
RICi-16
Configuration > Logical Layer

1.
2.
3.
4.

Port

(1)

Interface Type
>
Bind To Internal Ports
>
Max differential delay (msec)[0 - 256]
Administrative Status
Port Name
...
Loop Detection
Signal Degrade
>

(VCG)
(13-28)
(256)
(Up)
(VCG 1)
(Enable)
(10-6)

>
aadd; fforward; bbackward
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-36. Logical Layer Menu (VCG) T3 Interface, Channelized


RICi-16
Configuration > Logical Layer

1.
2.
3.
4.
5.

Port

(1)

Interface Type
>
Max differential delay (msec)[0 - 256]
Administrative Status
Port Name
...
Bind to Physical Ports
>
Loop Detection
Signal Degrade

(VCG)
(256)
(Up)
(VCG 1)
(1-2)
(Enable)
(10-6)

>
aadd; fforward; bbackward
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-37. Logical Layer Menu (VCG) E1/T1 or T3 Interface, Not Channelized

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-39

Chapter 4 Configuration

Installation and Operation Manual

RICi-16
Configuration > Logical Layer
Port

1.
2.
3.
4.

(2)

Interface Type
Bind To
Administrative Status
Port Name
Payload FCS
Mac Parameters

>

(GFP)
(VCG 1)
(Up)
... (GFP 1)
(Absent)
>

>
aAdd; fForward; b-Backward
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-38. Logical Layer Menu (GFP)


2. Configure the logical parameters for each port. Parameter descriptions and
possible values are provided in Table 4-17.
Type <F> to scroll through the ports.

Table 4-17. Logical Layer Parameters


Parameter

Description

Possible Values

Port

The logical port being configured

116

Interface Type

Type of interface set for the port

VCG
GFP

Bind to Internal Ports

VCAT VCG Logical Port: Links to T3 channels.

128
(Single number or range)

This parameter is read-only and applies only when


the T3 interface is configured as channelized
Bind to Physical Ports

VCAT VCG Logical Port: E1/T1 links or T3 clear


channels that are members of the VCG
This parameter applies only when RICi-16 is
configured for T1 network mode or
T3 unchannelized interface

E1/T1: 116
T3: 12
(Single number or range)

Bind to

GFP Logical Port: Links to VCG. This parameter is


read-only

VCG <n>

Administrative Status

Administrative state of the logical port

Up
down

Default: Up
Port Name

Free text to assign a name to the logical port


Default: GFP 1

Max Differential Delay


(msec)

Maximum allowed delay variation in milliseconds.


This parameter is read-only

VCG 1
GFP 1
256

Default: 256

4-40

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Parameter

Description

Possible Values

Payload FCS

GFP payload FCS

Present
Absent

Default: Absent
Loop Detection

Looped members are automatically detected and not


added to the LCAS when loop detection is enabled..
The VCG restarts after enabling or disabling the loop
detection

Enable
Disable

Default: Enable
Signal Degrade

Enables defining the signal degrade threshold


parameters. If the bit error on the E1/T1/T3 line
exceeds the defined signal degrade threshold, the
VCG member is temporally removed from the VCAT
group.

10-6

Configuring MAC Parameters for a GFP Logical Port


When you create a VCG logical port, RICi-16 automatically creates a GFP logical
port that is bound to the VCG logical port. RICi-16 allows you to define MAC
parameters for each GFP logical port.

To define MAC parameters for a GFP logical port:


1. From the Logical Layer menu (Configuration > Logical Layer), press <f> until
the desired GFP logical port is displayed (see Figure 4-38).
2. Select MAC Parameters and press Enter.
The MAC Parameters menu is displayed as illustrated in Figure 4-39.
RICi-16
Configuration > Logical Layer > MAC Parameters
Port

(2)

OAM EFM Mode


Port Name
VLAN Tag Ether Type (hex) [0-ffff]
OAM EFM
Queue Profile

(Passive)
... (GFP 1)
... (8100)
(Disable)
(QDefaultProfile1)

aAdd; fForward; b-Backward


ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

1.
2.
3.
4.
>

Figure 4-39. MAC Parameters Menu


3. Configure the MAC parameters for each GFP logical port according to the
parameter descriptions and possible values in Table 4-18.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-41

Chapter 4 Configuration

Installation and Operation Manual

Table 4-18. MAC Parameters


Parameter

Description

Possible Values

Port

Logical port number. This parameter is


read-only.

12

OAM EFM Mode

OAM EFM mode type. This parmeter is


read-only

Passive (default)
Active

Port Name

User defined name allocated to the port


(e.g. GFP 1)

VLAN Tag Ether Type (hex) [0ffff]

The VLAN TAG identifier

OAM EFM

OAM Ethernet in the First Mile (IEEE


802.3ah) functionality

0-FFFF

Default: 8100
Enable
Disable

Default: Disable
Queue Profile

Queue default profile

Profile name

4. Select Save.

Configuring the Application Layer Parameters


Configuring the Internal Bridge
The internal bridge connects the units ports. You need to configure the internal
bridge for it to process the VLAN tags correctly and maintain the priority of the
data flows.

Note

If the application mode is set to Flows, the bridge parameters do not show
To set the application mode to Bridge:

From the System menu (Configuration > System), select Application Mode
and press Enter.
The application mode is set to Bridge. The Bridge menu is available in the
Applications menu (Configuration > Applications).

To configure the internal bridge:


1. From the Main menu, navigate to Configuration > Applications > Bridge.
The Bridge menu appears.
2. In the Bridge menu, configure the parameters according to Figure 4-40 and

Table 4-19

4-42

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration > Applications > Bridge
1.
2.
3.
4.
5.
6.

VLAN Mode
Forwarding Mode
Aging Time (sec) [300 - 4080]
Static MAC Table
Bridge Port
VLAN Membership

>
>

(Aware)
(Filter)
... (300)

[]>
>
>

>
sSave
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-40. Bridge Menu


Table 4-19. Internal Bridge screen
Parameter

Description

Possible Values

VLAN Mode

Determines whether packet


forwarding is based on MAC
address only or on VLAN+MAC

Aware Bridge operates according to 802.1q,


forwarding packets based on VLAN+MAC
address
Unaware Bridge operates according to
802.1d, forwarding packets based on MAC
address only

Forwarding Mode

Aging Time

Determines whether the bridge


learns MAC addresses

Filter Learning and filtering are enabled

Aging time for entries in the


MAC table. If the aging time
elapses, and no frame has
been received with the MAC
address, it is erased from the
MAC table

300-4080 secs

Transparent No learning is performed. Each


packet received is forwarded to all other ports
automatically, unless static MAC is used.

3. To configure the Static MAC Table, refer to Configuring the MAC Table.
4. To configure the Bridge Port, refer to Configuring the Bridge Ports.
5. To configure the VLAN Membership (in Aware bridge only), refer to Configuring
VLAN Membership.

Configuring the MAC Table


Static MAC addresses are stored in the MAC table.

To add a static MAC address:


1. From the Main menu, navigate to Configuration > Applications > Bridge >
Static MAC Table.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-43

Chapter 4 Configuration

Installation and Operation Manual

The Static MAC Table appears as illustrated in Figure 4-41, with VLAN ID
entries for a VLAN-aware bridge only.
RICi-16
Configuration > Applications > Bridge > Static MAC Table
VLAN ID
1
2
3
4
5

|
v

MAC Address
111111111111
222222222222
333333333333
444444444444
555555555555

Bridge Port
1
2
3
4
5

>
sSave; aAdd; rRemove; c-Clear
ESC-prev menu; !-main menu; &-exit; ?-help

1 M/ 2C

Figure 4-41. Static MAC Table


2. In the Static MAC Table, press <A> to add a static MAC address.
The Static MAC Table switches to the MAC Table Handling mode as
illustrated in Figure 4-42.
RICi-16
MAC Table Handling
1. VLAN ID [1-4094]
2. MAC Address
3. Bridge Port [1-21]

... (0)
... (000000000000)
... (0)

>
s - Save
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

1 M/ 2 C

Figure 4-42. Static MAC Table, Add Mode


3. In the MAC Table Add mode, perform the following:

Select MAC Address, and enter a new MAC address.

Select VLAN ID, and choose a VLAN ID for the MAC address between
1 and 4094.

Select Bridge Port, and choose the interface this MAC address should be
attached to.

Select Save to save the MAC address.

Press <ESC> to return to the Static MAC Table screen.

To remove a static address from the table:

In the Static MAC Table (Figure 4-41), select the desired MAC address and
press <R>.
The MAC address is deleted from the table.

4-44

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

To clear the MAC table:


1. In the Static MAC Table screen (Figure 4-41), press <X>.
The following message appears:
Are you sure (Y/N)?
2. To confirm your request, press <Y>.
All MAC addresses are deleted from the table.

Configuring the Bridge Ports


You can use the Bridge Port menu for configuration of the bridge port
parameters, other than binding to logical ports.
The unit ships with default bridge port bindings preconfigured for basic use. The
factory defaults are listed in Table 4-20. You cannot delete bridge port bindings
to the host port and Ethernet ports. You can create or delete bridge port
bindings to GFP logical ports only indirectly, by adding or deleting the
corresponding VCG logical port, via the Logical Layer menu.

Table 4-20. Default Bridge Port Bindings

Bridge Port

Bound to

Reserved for management host

Ethernet port 1

Ethernet port 2

Ethernet port 3

Ethernet port 4

GFP 1 (logical port 2)

To configure a bridge port:


1. From the Main menu, navigate to Configuration > Applications > Bridge >
Bridge Ports.
The Bridge Port menu appears as illustrated in Figure 4-43.
2. In the Bridge Port menu, configure the bridge port parameters according to
Figure 4-43 and Table 4-21.
3. Select Save.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-45

Chapter 4 Configuration

Installation and Operation Manual

RICi-16
Configuration > Applications > Bridge > Bridge Ports
Bridge port [1 16]
Bind To
1.
2.
3.
4.
5.
6.
7.
8.
9.

Activation
Ingress Filtering
Accept Frame Type
Port VID\Stacking VID [1 4094]
Copy Origin Priority
Default Priority Tag [0-7]
Egress Tag Handling
Ingress Tag Handling
Queue Mapping Profile

(2)
(Fast Ethernet 1)
(Enable)
(Disable)
(All)
... (3)
(Disable)
... (4)
(Stacking)
(Stripping)
>
(QMDefaultProfile1)

>
f-Forward ; b-Backward; g-Go To ; d-Delete sSave
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

1 M/ 2 C

Figure 4-43. Bridge Port Menu


Table 4-21. Bridge Port Parameters
Parameter

Possible Values

Possible Values

Bridge Port

Remarks

1120

Bind to

Number that identifies the bridge port


displayed
Bridge port 1 is reserved for the host bridge
port

Fast Ethenet
Logical Port
Host

Press <F> to navigate between ports


Activation

Fast Ethernat, GFP Logical Port and Host


bridge ports. This parameter is read-only

Enable
Disable

Default: Enable
Ingress Filtering

Specifies if this port is available or not


Default: Disable

Accept Frame Type

When enabled, the device discards incoming


frames for VLANs of which the port is not a
member

Enable
Disable
All
Tag Only

When disabled, the port accepts all incoming


frames
Default: All
Port VID \ Stacking VID

Tag Only specifies that the device discards


untagged frames. All specifies that untagged
frames received on this port are accepted
and assigned to the PVID for this port

14094

Default: 2

4-46

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Parameter

Possible Values

Possible Values

Copy Origin Priority

This is the PVID, the VLAN ID assigned to


untagged frames or priority-tagged frames
received on this port. If Stacking is enabled,
this is the tag to be added

Enable
Disable (default)

Default: Disable
Default Priority Tag

Enable: The priority tag of the original VLAN is


copied if a frame arrives with a stacked VLAN
tag, otherwise the default priority is used

07

Disable: The default priority is used


Default: 0
Egress Tag Handling

Default VLAN frame priority, applies to


untagged frames

Ingress Tag Handling

Default: None

Stacking
Stripping
None

Stacking: Adds the PVID to every frame


transmitted from the port (push).

Stacking
Stripping

Stripping: Removes the first VLAN tag from


every transmitted frame, on the egress of the
port (pop)
Default: None
Queue Mapping Profile

Stacking: Adds the PVID to every frame


received on the ingress of the port (push).

Profile name

Stripping: Removes the first VLAN tag from


every received frame, on the ingress of the
port (pop)

Configuring VLAN Membership

To configure VLAN membership:


1. From the Main menu, navigate to Configuration > Applications > Bridge > VLAN
Membership.
The VLAN Membership menu appears as illustrated in Figure 4-44.
RICi-16
Configuration > Applications > Bridge > VLAN Membership
1. VLAN ID [1-4094]
2. Egress Tagged Ports
3. Egress UnTagged Ports
>

...
>
>

(1)
(1-10,12)
(6,9,120)

>
sSave; fForward; bBack; gGo; dDelete;
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-44. VLAN Membership Menu

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-47

Chapter 4 Configuration

Installation and Operation Manual

2. Select VLAN ID, and type the VLAN ID you wish to configure.
3. Select Egress Tagged Ports. Define the set of ports to transmit packets for
this VLAN as tagged.
4. Select Egress UnTagged Ports. Define the set of ports to transmit packets for
this VLAN as untagged.
5. Select Save.

Configuring Quality of Service (QoS)


RICi-16 supports Quality of Service (QoS) with priority methods according to
various QoS profiles. The following QoS profiles are supported:

Queue Mapping profiles

Marking profiles

Policer profiles

Shaper profiles

Queue profiles.

Profiles can be applied to the traffic flows to ensure the desired flow
classification and prioritization.

Defining the Queue Mapping Profile


Queue mapping profiles can be applied to traffic flows to ensure the desired flow
classification and prioritization. Queue mapping classification and prioritization
can be defined using the Queue Mapping Profiles menu.

To configure the queue mapping for the 802.1p method:


1. Navigate to Configuration > Application > QoS.
The QoS Profiles menu appears as illustrated in Figure 4-45.
RICi-16
Configuration > Application > QoS
1.
2.
3.
4.
5.

Queue Mapping Profiles


Marking Profiles
Policer Profiles
Shaper Profiles
Queues Profiles

>
>
>
>
>

>
ESC-prev.menu; !-main menu; &-exit

Figure 4-45. QoS Profiles Menu


2. From the QoS menu, select Queue Mapping Profiles.
The Queue Mapping Profiles menu appears as illustrated in Figure 4-46.

4-48

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration > Application > QoS > Queue Mapping Profiles
Profile [1-32]
(1)
1. Name
... ()
2. Ingress Priority Method > (802.1p)
3. Mapping
[]>
>
a-Add; f-Forward; b-Backward; d-delete
ESC-prev.menu; !-main menu; &-exit

Figure 4-46. Queue Mapping Profiles Menu


3. Press <A> to add a new profile.
The new profile appears under the Profile ID.
4. Select Name and define a new profile name.
5. Select Ingress Priority Method and choose the 802.1p method.
6. Select Save.
7. Select Mapping.
The associated Mapping menu appears as illustrated in Figure 4-47.
8. From the Mapping menu, select a priority tag value 07 and map it to a
priority queue (14).
RICi-16
Configuration>Application>QoS>Queue Mapping Profiles>Mapping
802.1p
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value

0
1
2
3
4
5
6
7

Queue
1
1
2
2
3
3
4
4

1. Change cell [1-4]

... (1)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-47. Mapping Menu (802.1p Method)

To configure the queue mapping for the DSCP method:


1. From the QoS menu (Configuration > Application > QoS), select Queue
Mapping Profiles.
The Queue Mapping Profiles menu appears as illustrated in Figure 4-46.
2. Press <A> to add a new profile.
The new profile appears under the Profile ID.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-49

Chapter 4 Configuration

Installation and Operation Manual

3. Select Name and define a new profile name.


4. Select Ingress Priority Method and choose the DSCP method.
5. Select Save.
6. Select Mapping.
The associated Mapping menu appears as illustrated in Figure 4-48.
7. From the Mapping menu, select a priority tag value 07 and map it to a
priority queue (14).

To add or delete a tag value for the DSCP method:

Press <A> to add a tag value and then define the tag value (0-63).

Press <B> to delete a tag value and then define the tag value to be deleted.

RICi-16
Configuration>Application>QoS>Queue Mapping Profiles>Mapping
1.
2.
3.
4.
5.
6.
7.
8.

Tag
Tag
Tag
Tag
Tag
Tag
Tag
Tag

Value
Value
Value
Value
Value
Value
Value
Value

0
1
2
3
4
5
6
7

[1-4]
[1-4]
[1-4]
[1-4]
[1-4]
[1-4]
[1-4]
[1-4]

...
...
...
...
...
...
...
...

(1)
(1)
(2)
(2)
(3)
(3)
(4)
(4)

>
a-Add; d-Delete
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-48. Mapping Menu (DSCP Method)

To configure the queue mapping for the IP Precedence method:


1. From the QoS menu (Configuration > Application > QoS), select Queue
Mapping Profiles.
The Queue Mapping Profiles menu appears as illustrated in Figure 4-46.
2. Press <A> to add a new profile.
The new profile appears under the Profile ID.
3. Select Name and define a new profile name.
4. Select Ingress Priority Method and choose the IP Precedence method.
5. Select Save.
6. Select Mapping.
The associated Mapping menu appears as illustrated in Figure 4-49.
7. From the Mapping menu, select a priority tag value 07 and map it to a
priority queue (14).

4-50

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration>Application>QoS>Queue Mapping Profiles>Mapping
IP Precedence
Tag Value 0
Tag Value 1
Tag Value 2
Tag Value 3
Tag Value 4
Tag Value 5
Tag Value 6
Tag Value 7

Queue
1
1
2
2
3
3
4
4

1. Change cell [1-4]

... (1)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-49. Mapping Menu (IP Precedence Method)

Defining Marking Profiles


Marking profiles can be applied to the traffic flows to ensure the desired flow
classification and prioritization. Marking classification and prioritization can be
defined using the Marking Profiles

To configure marking for the 802.1p method:


1. Navigate to Configuration > Application > QoS.
The QoS Profiles menu appears as illustrated in Figure 4-45.
2. From the QoS menu, select Marking Profiles.
The Marking Profiles menu appears as illustrated in Figure 4-50.
RICi-16
Configuration > Application > QoS > Marking Profiles
Profile [1-32]
(1)
1. Name
... ()
2. Ingress Priority Method > (802.1p)
3. Mapping
[]>
>
a-Add, f-Forward, b-Backward
ESC-prev.menu; !-main menu; &-exit

Figure 4-50. Marking Profiles Menu


3. Press <A> to add a new profile.
The new profile appears under the Profile ID.
4. Select Name and define a new profile name.
5. Select Ingress Priority Method and choose the 802.1p method.
6. Select Save.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-51

Chapter 4 Configuration

Installation and Operation Manual

7. Select Mapping.
The associated Mapping menu appears as illustrated in Figure 4-51.
8. From the Mapping menu, select a priority tag value 07 and map it to a
priority queue (07).
RICi-16
Configuration > Application > QoS > Marking Profiles > Mapping
802.1p
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value
Tag Value

0
1
2
3
4
5
6
7

Marking
0
1
2
3
4
5
6
7

1. Change cell [0-7]

... (1)

>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-51. Mapping Menu (802.1p Method)

To configure marking for the DSCP method:


1. From the QoS menu (Configuration > Application > QoS), select Marking
Profiles.
The Marking Profiles menu appears as illustrated in Figure 4-50.
2. Press <A> to add a new profile.
The new profile appears under the Profile ID.
3. Select Name and define a new profile name.
4. Select Ingress Priority Method and choose the DSCP method.
5. Select Save.
6. Select Mapping.
The associated Mapping menu appears as illustrated in Figure 4-52.
7. From the Mapping menu, select a priority tag value 07 and map it to a
priority queue (07).

4-52

To add or delete a tag value for the DSCP method:

Press <A> to add a tag value and then define the tag value (0-63).

Press <B> to delete a tag value and then define the tag value to be deleted.

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration > Application > QoS> Marking Profiles > Mapping
1.
2.
3.
4.
5.
6.
7.
8.

Tag
Tag
Tag
Tag
Tag
Tag
Tag
Tag

Value
Value
Value
Value
Value
Value
Value
Value

0
1
2
3
4
5
6
7

[0-7]
[0-7]
[0-7]
[0-7]
[0-7]
[0-7]
[0-7]
[0-7]

...
...
...
...
...
...
...
...

(0)
(1)
(2)
(3)
(4)
(5)
(6)
(7)

>
a-Add; d-Delete
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-52. Mapping Menu (DSCP Method)

To configure marking for the IP Precedence method:


1. From the QoS menu (Configuration > Application > QoS), select Marking
Profiles.
The Marking Profiles menu appears as illustrated in Figure 4-50.
2. Press <A> to add a new profile.
The new profile appears under the Profile ID.
3. Select Name and define a new profile name.
4. Select Ingress Priority Method and choose the IP Precedence method.
5. Select Save.
6. Select Mapping.
The associated Mapping menu appears as illustrated in Figure 4-53.
7. From the Mapping menu, select a priority tag value 07 and map it to a
priority queue (07).
RICi-16
Configuration > Application > QoS > Marking Profiles > Mapping
IP Precedence
Tag Value 0
Tag Value 1
Tag Value 2
Tag Value 3
Tag Value 4
Tag Value 5
Tag Value 6
Tag Value 7

Marking
0
1
2
3
4
5
6
7

1. Change cell [0-7]


... (1)
>
ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 4-53. Mapping Menu (IP Precedence Method)


RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-53

Chapter 4 Configuration

Installation and Operation Manual

Defining Policer Profiles


Policer profiles can be applied to the traffic flows to ensure the desired flow
classification and prioritization. Policer configuration can be defined using the
Policer Profiles menu.

To configure policer profiles:


1. Navigate to Configuration > Application > QoS.
The QoS Profiles menu appears as illustrated in Figure 4-45.
2. From the QoS menu, select Policer Profiles.
The Policer Profiles menu appears as illustrated in Figure 4-54.
RICi-16
Configuration > Application > QoS > Policer Profiles

1.
2.
3.
4.
5.

Policer [1-32]
Name
CIR [0-100000]
CBS [0-12176]
EIR [0-100000]
EBS [0-12176]

...
...
...
...
...

(1)
(DefaultPolicer1)
(0)
(0)
(100000)
(12176)

>
a-Add, f-Forward, b-Backward
ESC-prev.menu; !-main menu; &-exit

Figure 4-54. Policer Profiles Menu


3. Press <A> to add a new profile.
The new profile appears under the Profile ID.
4. Select Name and define a new profile name.
5. Define the associated policer parameters according to Table 4-22.
6. Select Save.

Table 4-22. Policer Profiles Parameters


Parameter

Description

Possible Values

CIR

Defines the Committed Information Rate (CIR) for the


current profile. The CIR specifies a bandwidth with
committed service guarantee (green bucket rate).

0,64100,000 kbps

Granularity: 64 Kbps up to 130 Mbps and


512 Kbps up to 1 Gbps
Default: 0
CBS

Defines the Committed Burst Size (CBS) for the


current profile. The CBS specifies the maximum
guaranteed burst size (green bucket size).

0,6412,176 kbps

1 x Byte granularity
Default: 0

4-54

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Parameter

Description

Possible Values

EIR

Defines the Excess Information Rate (EIR). The EIR


specifies an extra bandwidth with no service
guarantee (yellow bucket rate).

0,64100,000 kbps

Granularity: 64 Kbps up to 130 Mbps and


512 Kbps up to 1 Gbps
Default: 100,000
EBS

Defines the Excess Burst Size (EBS). The EBS specifies


the extra burst with no service guarantee (yellow
bucket size).

0,64-12,176 kbps

1 x Byte granularity
Default: 12,176

Defining Shaper Profiles


Shaper profiles can be applied to the traffic flows to ensure the desired flow
classification and prioritization. Shaper configuration can be defined using the
Shaper Profiles menu.

To configure shaper profiles:


1. Navigate to Configuration > Application > QoS.
The QoS Profiles menu appears as illustrated in Figure 4-45.
2. From the QoS menu, select Shaper Profiles.
The Shaper Profiles menu appears as illustrated in Figure 4-55.
RICi-16
Configuration > Application > QoS > Shaper Profiles
Shaper [1-21]
1. Name
2. CIR [0-100000]

... (1)
... (DefaultShaper1)
... (100000)

>
a-Add; f-Forward; b-Backward
ESC-prev.menu; !-main menu; &-exit

Figure 4-55. Shaper Profiles Menu


3. Press <A> to add a new profile.
The new profile appears under the Profile ID.
4. Select Name and define a new profile name.
5. Define the associated shaper parameters according to Table 4-23.
6. Select Save.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-55

Chapter 4 Configuration

Installation and Operation Manual

Table 4-23. Shaper Profiles Parameters


Parameter

Description

Possible Values

CIR

Defines the Committed Information Rate (CIR) for the


current profile. The CIR specifies a bandwidth with
committed service guarantee (green bucket rate).

0,64100,000 kbps

Granularity: 64 Kbps up to 130 Mbps and


512 Kbps up to 1 Gbps
Default: 0

Defining Queue Profiles


Queue profiles can be applied to the traffic flows to ensure the desired flow
classification and prioritization. Queue configuration can be defined using the
Queue Profiles menu.

To configure queue profiles:


1. Navigate to Configuration > Application > QoS.
The QoS Profiles menu appears as illustrated in Figure 4-45.
2. From the QoS menu, select Queue Profiles.
The Queue Profiles menu appears as illustrated in Figure 4-56.
RICi-16
Configuration > Application > QoS > Queue Profiles
1. Name
2. Shaper Profile
3. Internal Queues

... (QDefaultProfile1)
>
(DefaultShaper1)
>

>
a-Add, f-Forward, b-Backward
ESC-prev.menu; !-main menu; &-exit

Figure 4-56. Queue Profiles Menu


3. Press <A> to add a new profile.
The new profile appears.
4. Select Name and define a new profile name.
5. Select Shaper Profile and choose a shaper profile from the available list.
6. Select Save.
Once you have saved the queue profile, the Internal Queues option appears.

To configure internal queues:


1. From the Queue Profiles menu (Configuration>Application>QoS> Queue
Profiles), select Internal Queues.
The Internal Queues menu appears as illustrated in Figure 4-57.

4-56

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration>Application>QoS>Queue Profiles>Internal Queues
1.
2.
3.
4.

ID [1-5]
Scheduling
Weight [1-100]
Shaper Profile

...
...
...
...

(1)
(WFQ)
(50)
(DefualtShaper1)

>
f-Forward; b-Backward
ESC-prev.menu; !-main menu; &-exit

Figure 4-57. Internal Queues Menu


2. Press <F> to select an internal queue (15) that you intend to configure.
3. Configure the internal queue according to Table 4-24.
4. Select Save.

Table 4-24. Internal Queue Parameters


Parameter

Description

Possible Values

Scheduling

Defines the queue scheduling method. If


one of the internal queues is configured to
the WFQ mode, the queues with the lower
priority cannot be configured to the strict
mode.

Strict High-priority queues that are


always serviced first. If a lower-priority
queue is being serviced and a packet
enters a higher queue, that queue is
serviced immediately.

Note: In configurations with Strict and WFQ


queues, the WFQ frames are transmitted
only after the transmission of packets
associated with the Strict queues is
completed.

WFQ Weighted Fair Queuing, if one port


does not transmit, its unused bandwidth
is shared by the transmitting queues
according to the assigned weight.

Determines the weight of an internal queue


when the scheduling weight is configured to
WFQ.

150

Defines the shaper profile to use for the


internal queue.

Default Shaper Profile

Weight

Shaper Profile

Default: WFQ

Default: 50

Configuring Flows
RICi-16 provides traffic flow classification between the traffic source and its final
destination. RICi-16 supports up to 64 unidirectional flows. Each flow is defined
by a classification profile.
In Flow-based operation mode, incoming customer traffic is classified and
mapped according to port-based (all-in-one) bundling or by user port and CE
VLAN-ID, VLAN priority, DSCP and IP precedence. Operators can differentiate
services using classification methods, police the traffic and enforce SLA per
service
This section explains how to define flows and add packets to the flows according
to specific criteria.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-57

Chapter 4 Configuration

Note

Installation and Operation Manual

If RICi-16s application mode is set to Bridge, the Flows parameter does not
show.
The following flow related options are available:

Classification profiles

Flow definitions.

To set the application mode to Flows:


1. From the System menu (Configuration > System), select Application Mode and
press Enter.
The application mode is set to Flows. The Flows menu is available in the
Applications menu (Configuration > Applications).
2. Select Save.

Defining Flows

To define the flow:


1. From the Flows menu (Configuration > Applications > Flows), select Flow
Definition.
The Flow Definition menu appears as illustrated in Figure 4-58.
2. To add a flow, press <a>.
A new flow is added and a Flow ID is assigned (1-64).
3. Specify the desired Flow Name before you press <S> for Save.
The remaining interface parameters are displayed once you have saved
for the first time.
4. Configure the remaining parameters as detailed in Figure 4-58 and Table 4-25.

4-58

To navigate to a different flow ID, press <f> or <b> to browse the Flow
IDs forward or backward respectively.

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration > Applications > Flows > Flow Definition
Flow [1-64]
Ingress Port
1. Name
2. Administrative Status
3. Priority [1-256]
4. Classifier Profile
5. Policer Profile
6. Egress Port
7. Queue Mapping Method
8. Queue [1-4]
9. Drop Frames
10.Looopback Action
11.VLAN Actions

(1)
(ETH1)
... (Flow 1)
(Enable)
... (1)
>
(DefaultUnclassified)
>
(DefaultPolicer1)
>
(GFP1)
(Fixed)
>
(1)
(Disable)
(Disable)
>

>
a-Add; f-Forward; b-Backward; d-Delete
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-58. Flows Definitions Screen


Table 4-25. Flow Definitions
Parameter

Description

Possible Values

Flow ID

Flow ID, automatically assigned when adding a


flow.

1 32

Name

Assign a name to a specific flow


Default: Flow-<ID#>

Administrative Status

Defines the administartive staus of the flow.


Default: Disable

Ingress Port

Enable
Disable

Default: None

Host
ETH1-4
GFP1-16

Priority

Priority of the port

1-256

Classifier Profile

Defines which classification profile to use

ClassificationDefaultProfile1

Defines which port the flow starts

Default: None
Policer Profile

Ingress brandwidth profile index

DefaultPolicer1

Default: None
Egress Port

Queue Mapping Method

Default: None

Host
ETH1-4
GFP-1

Method to use when classifying frames into


queues

Fixed
Profile

To which port the flow is forwarded

Default: Fixed

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-59

Chapter 4 Configuration

Installation and Operation Manual

Parameter

Description

Possible Values

Queue

Fixed queue protocol

04

Default: 0
Drop Frames

Defines whether to allow dropped frames or not

Enable
Disable

Loopback Action

Defines whether to allow loopback actions or


not

Enable
Disable

VLAN Actions

VLAN action for the current flow

Defining VLAN Actions for Flows


To define VLAN actions for flows:

1. From the Flow Definition menu (Configuration > Applications > Flows > Flow
Definition), select VLAN Actions.
The VLAN Actions menu appears as illustrated in Figure 4-59.
RICi-16
Configuration > Applications > Flows > Flow Definition > VLAN
Actions
1.
2.
3.
5.
6.
7.
8.
9.
10.
11.
13.

Outer
Outer
Outer
Outer
Outer
Outer
Inner
Inner
Inner
Inner
Inner

VLAN Action
VLAN[0-4094]
Pbit Method
Pbit Profile
Mark
Mark VLAN[0-4094]
VLAN Action
VLAN [0-4094]
Pbit Method
Pbit Value[0-7]
Mark

>
(Push)
... (1)
(Profile)
>
(MarkingDefault1)
(Enable)
... (0)
>
(Push)
... (0)
(Fixed)
... (0)
(Disable)

>
s-Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-59. Flows Definition - Classification Screen


Table 4-26. Flows Definition (Classification)
Parameter

Description

Possible Values

Outer VLAN Action

Defines the Outer VLAN action for the current flow

Push
Pop
None

Default: None
Outer VLAN

Defines the VLAN to be added to the frame. Only visible


when Outer VLAN Action parameter is set to Push

0 4094

Default: 0

4-60

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Parameter

Description

Possible Values

Outer Pbit Method

Defines the Pbit method used for marking. Only visible


when Outer VLAN Action parameter is set to Push

Profile
Fixed

Default: Fixed
Outer Pbit Profile

Defines an index to the marking profile. Only visible


when Outer VLAN Action parameter is set to Push and
Outer Pbit Method is set to Profile

Valid marking profile

Default: DefaultMarkingProfile1
Outer Mark

Default: Disable

Enable
Disable

Defines the Outer VLAN value for Mark

0 - 4094

Defines the Outer VLAN MARK action

Outer Mark VLAN

Default: 0
Inner VLAN Action

Inner VLAN

Default: None

Push
Pop
None

Defines the Inner VLAN that is added to the frame

0 - 4094

Defines the Inner VLAN action for the curent flow

Default: 0
Inner Pbit Method

Defines the Inner Pbit method used for marking. Only


visible when Inner VLAN Action parameter is set to Push
Default: Fixed

Inner Pbit Value

Defines the Inner Pbit value when the Pbit method is


defined as fixed. Only visible when Outer VLAN Action
parameter is set to Push and Outer Pbit Method is set to
Fixed

Profile
Copy
Fixed
0-7

Default: 0
Inner Mark

Defines the Inner VLAN MARK action


Default: Disable

Enable
Disable

Configuring the OAM


RICi-16 provides OAM -CFM (End-to-end OAM) based on IEEE 802.1ag and ITU T
Y.1731. This provides operation, administration, and maintenance capabilities in
packet switched networks.

To configure the OAM:


1. From the OAM (Configuration > Applications > OAM) menu, select CFM.
The OAM options appear listed as illustrated in Figure 4-60.

RICi-16 Ver. 2.5

Configuring RICi-16 for Operation

4-61

Chapter 4 Configuration

Installation and Operation Manual

RICi-16
Configuration > Applications > OAM > CFM
1. Maintenance Domains
2. Standard OAM MAC Address
3. Standard OAM EtherType [0-ffff]

>
... (0180C2000030)
... (8902)

>
Please select item <1 to 3>
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-60. OAM-CFM Menu


Table 4-27. OAM-CFM Menu
Parameter

Description

Standard OAM MAC


Address

Specifies the MAC Address for Operation and


Maintenance.

Possible Values

Default: 0180C2000030
Standard OAM
EtherType

Specifies the Operation and Maintenance EtherType.

0 - ffff

Default: 8902

2. If necessary, modify the OAM MAC Address and/or the Standard OAM Ether
Type as defined in Table 4-27.
3. Click Save.

Configuring a Maintenance Domain


RICi-16 lets you add or remove Maintenance Domains (MD). MDs are configured
with different level values to keep them separate. Each domain provides enough
information in order to perform management end-to-end monitoring.

To view and edit existing maintenance domain:


1. To view configured Maintenance Domains, press <f> or <b> to scroll forward
or backward respectively.
The associated MD ID, the protocol type, the MD format, the MD name
and the MD level appear.
2. Modify the Protocol type, MD format, MD name and MD level as defined in
Table 4-28.
3. Select Save.

To add a maintenance domain:


1. From the CFM menu, select Maintenance Domains.
2. Press <a>.
The new MD ID appears as illustrated in Figure 4-61 .
3. Modify the Protocol type, MD format, MD name and MD level as defined in
Table 4-28.
4. Select Save.

4-62

Configuring RICi-16 for Operation

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

RICi-16
Configuration > Applications > OAM > CFM > Maintenance Domains

1.
2.
3.
4.
5.

MD ID

... (000000000102)

Protocol Type
MD Name Format
MD Name
MD Level [0-7]
Maintenance Associations

(Standard)
>
(String)
... ()
... (3)
>

>
a-Add New MD; f-Forward; b-Backward; d-Delete
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-61. MD Names Menu


Table 4-28. MD Names Menu
Parameter

Description

Possible Values

MD ID

The maintenance domains ID

Protocol Type

Indicates the maintenance domains protocol type


Default: Standard

Pre-Standard
Standard

MD Format

Indicates maintenance group entity IDs (MEG ID) domain


name format.

None
String
DNS Like
MAC + UINT

Default: String
MD Name

Indicates maintenance group entity IDs (MEG ID) domain


name. One MD name (None) remains by default.
Default: The latest configured name or none

MD Level

Indicates the maintenance domains level.

0-7

Default: 0

To delete a maintenance domain:

Press <d>.

4.3

Performing Additional Tasks

Viewing Inventory
The inventory displays a description of the unit including its hardware revision
and power supply type.

Note

RICi-16 Ver. 2.5

The inventory is a wide table with 132 characters. It is best viewed by setting
your terminal to 132 character wide display.

Performing Additional Tasks

4-63

Chapter 4 Configuration

Installation and Operation Manual

To display the inventory:

From the Main menu, select Inventory.


Hardware and software appear listed as illustrated in Figure 4-62.

To navigate in the inventory list, use the arrow keys.


RICi-16

Inventory
ID
1001
| 7001
v 7002
7003
7004
7005
7006
7007
7008
- >

Description
RICi-16 Device
Fast Eth Port 1
Fast Eth Port 2
Fast Eth Port 3
Fast Eth Port 4
E1 Port 1
E1 Port 2
E1 Port 3
E1 Port 4
>

Vendor type Class


Chassis
Port
Port
Port
Port
Port
Port
Port
Port

Entity name
RICi-16
FAST 1
FAST 2
FAST 3
FAST 4
E 1
E 2
E 3
E 4

HWRev
1.00

>

Figure 4-62. Typical Inventory Screen


Note

Power supply can be PS 1 or PS 2.

Viewing the License Information


RICi-16 is delivered with a prefixed software license pack, which lists the
functional features available. You can view which features are defined in the
unit's license file.

To view the license information:

From the Main Menu, navigate to Utilities > License Management > Feature
Status.
The Feature Status information is displayed.
RICi-16

Utilities> License Management> Feature Status


Enable
Enable
Enable
Enable

4 E1/T1 Ports
8 E1/T1 Ports
12 E1/T1 Ports
16 E1/T1 Ports

...
...
...
...

(Enabled)
(Disable)
(Disable)
(Disable)

>
ESCprevious menu; !main menu; &-exit

Figure 4-63. Feature Status Menu

4-64

Performing Additional Tasks

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Configuring Control Port Parameters


You can manage RICi-16 using an ASCII terminal connected to the Control Port.
The management software allows you to configure the terminal baud rate.

Note

The Baud Rate parameter is masked during a Telnet session.

To configure the control port parameters:


1. From the Main menu, navigate to Configuration > System > Terminal.
The Terminal menu appears as illustrated in Figure 4-64.
RICi-16
Configuration > System > Terminal
1. Baud Rate

>

(9600 bps)

>
s - Save
ESC-Previous menu; !-Main menu; &-Exit

Figure 4-64. Control Port Menu


2. From the Terminal menu, select Baud Rate.
3. Select the desired baud rate (9600, 19200, 115200).
The default baud rate is 9600.
4. Select Save.

Changing User Access Parameters


From the User Access menu you can change the current user name and
password. RICi-16 supports two user names and passwords. The unit is supplied
with the following default user settings:

User

User Name

Password

su

1234

user

1234

To change the current user name and password:


1. From the Main menu, navigate to Configuration > System > Management >
Management Access > User Access.
The User Access menu appears.

RICi-16 Ver. 2.5

Performing Additional Tasks

4-65

Chapter 4 Configuration

Installation and Operation Manual

RICi-16
Configuration > System > Management > Management Access > User Access
1.
2.
3.
4.

User Name
Old Password
New Password
Confirm New Password

...
...
...
...

(su)
(********)
(********)
(********)

>
s - Save
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-65. User Access Menu


2. In the User Access menu, select User Name, and enter a new user name. The
user name can be up to twenty characters.
3. Select Old Password, and enter the current password (default is 1234).
4. Select New password and assign a new password of up to eight characters to
the new or existing user name.

Note

The password is case sensitive.


5. Select Confirm New Password to confirm the new password.
If the new password is invalid, an error message appears indicating that the
password is illegal. Assign a different password.
6. Select Save.
The new password is saved.

Transferring Software and Configuration Files


This section instructs you on installing new software releases on
RICi-16 units and transferring configuration files.
RICi-16 stores two software versions, each of them in one of the two partitions
of its flash memory, which also contains a boot program. The software is stored
in compressed format. The active version is decompressed and loaded into the
RICi-16 RAM upon power-up. The passive software is kept for backup purposes. If
the active software becomes corrupted, you can swap it with the backup. By
default, RICi-16 ships active software only.
New software releases are distributed as image files (*.img) downloaded to
RICi-16. Once downloading starts, the current backup is erased and the new
software release is placed in the backup partition instead. When downloading is
completed, the unit checks the integrity of the new software file. If approved, the
new software release becomes active and the previously active software
becomes the backup. If a failure occurs while downloading, the new version is
erased and only the previous version remains on the flash memory.
Configuration files can be uploaded for storage and backup.

4-66

Performing Additional Tasks

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 4 Configuration

Management software allows file transfer via TFTP only. You may also download
the software files to RICi-16 using the Boot Manager, using XMODEM or TFTP, as
explained in Appendix B.

To transfer files via TFTP:


1. From the Main menu navigate to Utilities > File Transfer > TFTP.
The File Transfer menu appears as illustrated in Figure 4-66.
RICi-16
Utilities > File Transfer > TFTP
1.
2.
3.
4.

Server IP Address
Remote File Name
File Type
Command

... (0.0.0.0)
... ()
(Configuration)
>

>
s - Save
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 4-66. TFTP Menu


2. From the File Transfer menu, perform the following:

Select Server IP Address, and enter the IP address of the TFTP server.

Select Remote File Name, and enter a file name as explained below.

For downloading, assign a name to the file that is about to be


downloaded to RICi-16.
For uploading, assign a name to the file that will be saved on the
remote server.

Select File Type, and choose whether you intend to transfer software
(IMG) or configuration (Configuration) file.

Select Save to save the changes.

Select Command to start the desired procedure:

Upload saving software or a configuration file on a remote server.


Download transferring software or a configuration file to
RICi-16.

RICi-16 starts the file transfer.


The TFTP file transfer process is logged by the system messages listed below,
which are stored in the log file:
TFTP Starting Upload
TFTP Starting Download
TFTP Upload Failed
TFTP Download Failed.

RICi-16 Ver. 2.5

Performing Additional Tasks

4-67

Chapter 4 Configuration

Installation and Operation Manual

Resetting RICi-16
RICi-16 lets you reset the unit while preserving customized parameters or
resetting all customized parameters to the factory defaults.

Resetting to Factory Defaults

To reset to the default settings:


1. From the System menu, select Factory Defaults.
You are asked to confirm your request:
The device will restart. Do you want to proceed? (Y/N)
2. Press <Y> to confirm your request.
RICi-16 resets all parameters to their default settings.

Resetting the Unit


You can restart RICi-16 while preserving the parameters you configured.

To reset RICi-16:
1. From the Utilities menu, select Reset Device.
You are asked to confirm your request:
The device will restart. Do you want to proceed? (Y/N)
2. Press <Y> to confirm your request.
RICi-16 resets, preserving the last-saved settings.

4-68

Performing Additional Tasks

RICi-16 Ver. 2.5

Chapter 5
Configuring Typical
Applications
This chapter provides instructions for configuring RICi-16 for typical applications.

5.1

Application with Ethernet Cellular Backhauling


over PDH/SONET/SDH

Figure 5-1 illustrates an application where three RICi-16 units provide Ethernet
cellular backhauling, working opposite a third-party Ethernet device. Each unit has
a different interface option: channelized DS-3, 16 E1 ports, and unchannelized
T3.

Figure 5-1. Ethernet Cellular Backhauling over PDH/SONET/SDH


This application has the following requirements:

RICi-16 Ver. 2.5

Channelized DS-3 links to the SDH/SONET network

E1 links to the SDH/SONET network

T3 links to the SDH/SONET network

Third-party Ethernet device that can work opposite all the RICi-16 interface
options.

Application with Ethernet Cellular Backhauling over PDH/SONET/SDH

5-1

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

The configuration procedure is divided into the following stages:


1. Configuring host IP parameters
2. Configuring physical port parameters
3. Configuring the logical layer.

Table 5-1. Host IP Parameters


Device

Host IP

IP mask

Default Gateway

RICi-16 (A)

192.188.10.12

255.255.255.0

192.188.10.1

RICi-16 (B)

192.188.10.14

255.255.255.0

192.188.10.1

RICi-16 (C)

192.188.10.16

255.255.255.0

192.188.10.1

Configuring System Parameters


Configuring the Host Parameters for RICi-16
The configuration procedure for host parameters is similar for all three RICi-16
units, except for defining different host IP addresses.

To define the host parameters:


1. For RICi-16 (A), navigate to the Host menu (Configuration> System >
Management> Host), and configure the host parameters as shown in
Table 5-1.
2. For RICi-16 (B) and RICi-16 (C), perform the same procedure, using the host
parameters as shown in Table 5-1 for each respective unit.
RICi-16
Configuration > System > Management > Host
1. IP Address
2. IP Mask
3. Default gateway
4. Read community
5. Write community
6. Trap community
7. Encapsulation
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

...
...
...
...
...
...
>

(192.188.10.12)
(255.255.255.0)
(192.188.10.1)
(public)
(private)
(public)

1 user(s)

Figure 5-2. Host Menu, RICi-16 (A

5-2

Application with Ethernet Cellular Backhauling over PDH/SONET/SDH

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

Configuring the System Clock Source for RICi-16


The configuration procedure for system clock parameters is similar for all three
RICi-16 units.

To configuring the system clock source:


1. For RICi-16 (A), navigate to the System Clock menu (Configuration> System >
System Clock).
RICi-16
Configuration > System > System Clock
1. Master Clock
>
2. Fallback Clock
>
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

1M/ 1C

Figure 5-3. Host Menu, RICi-16 (A


2. Select Master Clock.
RICi-16
Configuration > System > System Clock
1. Source
> (Rx Clock)
2. Port
> (T1 Port)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

1M/ 1C

Figure 5-4. Host Menu, RICi-16 (A


3. Select Source and choose Rx Clock.
4. Select Port and specify the port to be used.
5. Select Save.
6. For RICi-16 (B) and RICi-16 (C), perform the same procedure, using the
system clock parameters as shown in Figure 5-4 for each respective unit.

Note

RICi-16 Ver. 2.5

For this type of configuration the network must provide the internal clock.

Application with Ethernet Cellular Backhauling over PDH/SONET/SDH

5-3

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

Configuring the Physical Layer


Configuring the Physical Layer for RICi-16 (A)
In the RICi-16 (A), you need to configure the T1 ports and the T3 channels.

Configuring the T1 Physical Layer

To configure the T1 physical layer:

For the RICi-16 (A) unit, you can use the default T1 port configurations. Use
the T1 Physical Layer menu to check that the default configuration is in place
for T1 ports 116.
RICi-16

Configuration > Physical Ports > T1


Port
TX clock Source
Line Type
Restoration Time
1.
2.
3.
4.
5.

Administrative Status
Line Code
Line Interface
Line Length
Rx Sensitivity

(1)
> (System)
> (ESF)
(1 Sec)

>
>

(Up)
(B8ZS)
(DSU)
(0133 ft)
(Long Haul)

>
f forward

b backward

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-5. T1 Port Configuration Menu

5-4

Application with Ethernet Cellular Backhauling over PDH/SONET/SDH

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

Configuring the T3 Interface

To configure the T3 interface:

Use the T3 Physical Layer menu to ensure that the T3 interface is


channelized.
RICi-16

Configuration > Physical Layer > T3


Port
TX Clock Source
1.
1.
2.
4.
3.

(1)
> (System)

Administrative Status
Structure
Line Type
Line Length
Mapping

(Up)
(Channelized)
(M23)
(Up to 225ft)
[]>

>
f forward;

b backward

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-6. T3 Channelized

Configuring the T3 Channel Mapping


You can use the default configuration T3 channel mapping (T3 channels 116
mapped to T1 ports 116). Use the T3 mapping menu to check that the default
configuration is in place.
RICi-16
Configuration > Physical Layer > T3 > Mapping
Channel
Connection
Channel
Connection
1
T1-1
11
T1-11
2
T1-2
12
T1-12
3
T1-3
13
T1-13
4
T1-4
14
T1-14
5
T1-5
15
T1-15
6
T1-6
16
T1-16
7
T1-7
17
LP1
8
T1-8
18
LP1
9
T1-9
19
LP1
10
T1-10
20
LP1
1. T1-1
4. T1-4
7. T1-7
10. T1-10
2. T1-2
5. T1-5
8. T1-8
11. T1-11
3. T1-3
6. T1-6
9. T1-9
12. T1-12
>
ESC-Previous menu; !-Main menu; &-Exit

Channel
21
22
23
24
25
26
27
28

13. T1-13
14. T1-14
15. T1-15

Connection
LP1
LP1
LP1
LP1
LP1
LP1
LP1
LP1

16. T1-16
17. LP1
18. N/C

1 M/ 2 C

Figure 5-7. T3 Mapping Menu, Default Configuration


RICi-16 Ver. 2.5

Application with Ethernet Cellular Backhauling over PDH/SONET/SDH

5-5

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

Configuring the Physical Layer for RICi-16 (B)

To configure the E1 physical layer:

For the RICi-16 (B) unit, you can use the default E1 port configurations. Use
the E1 Physical Layer menu to check that the default configuration is in place
for E1 ports 116.

RICi-16
Configuration > Physical Layer > E1

1.
2.
3.
4.

Port
TX Clock Source
Line type
Restoration Time

(1)
(System)
(G.732N-CRC)
(Immediate)

Administrative Status
Interface Type
Line Code
Rx Sensitivity

(Up)
(Balanced)
(HDB3)
(Long Haul)

>
s Save;

f forward;

b backward

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-8. E1 Port Configuration Menu

Configuring the Physical Layer for RICi-16 (C)


Configuring the T3 Interface

To configure the T3 interface:

Use the T3 Physical Layer menu to ensure that the T3 interface is not
channelized.
RICi-16

Configuration > Physical Layer > T3

1.
2.
3.
4.

Port
TX Clock Source

(1)
(System)

Structure
Line Type
Administrative Status
Line Length

(Unchannelized)
(M23)
(Up)
(Up to 225ft)

>
s Save;

f forward

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-9. T3 Channelized


5-6

Application with Ethernet Cellular Backhauling over PDH/SONET/SDH

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

Configuring the Logical Layer


Configuring the Logical Layer for RICi-16 (B)
For the RICi-16 (B) unit, you can use the default logical layer configuration (logical
port VCG 1 bound to E1 ports 116). Use the Logical Layer menu to check that
the default configuration is in place.
RICi-16
Configuration > Logical Layer

1.
2.
3.
4.
>

Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-16)
E1/T1 Loop Detection
Enable

a add; f forward; b backward; d delete


ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-10. Logical Layer Menu (VCG) E1 Interface

Configuring the Logical Layer for RICi-16 (C)


For the RICi-16 (C) unit, you can use the default logical layer configuration (logical
port VCG 1 bound to T3 ports 12). Use the Logical Layer menu to check that the
default configuration is in place.
RICi-16
Configuration > Logical Layer

1.
2.
3.
4.
>

Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-2)
E1/T1 Loop Detection
Enable

a add; f forward; b backward; d delete


ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-11. Logical Layer Menu (VCG) T3 Interface, Not Channelized

RICi-16 Ver. 2.5

Application with Ethernet Cellular Backhauling over PDH/SONET/SDH

5-7

Chapter 5 Configuring Typical Applications

5.2

Installation and Operation Manual

Ethernet Services over PDH/SONET/SDH

Figure 5-1 illustrates an application where two RICi-16 units, with eight and four
E1 ports respectively, extend Ethernet services over PDH/SONET/SDH, working
opposite RADs Egate-100.

Figure 5-12. Ethernet Services over PDH/SONET/SDH


This application has the following requirements:

E1 links to the SDH/SONET network

Egate-100 with STM-1/OC-3 or channelized DS-3 links to the SDH/SONET


network.

The configuration procedure is divided into the following stages:


1. Configuring host IP parameters
2. Configuring physical port parameters
3. Configuring the logical layer.

Table 5-2. Host IP Parameters


Device

Host IP

IP mask

Default Gateway

RICi-16 (A)

192.188.10.12

255.255.255.0

192.188.10.1

RICi-16 (B)

192.188.10.14

255.255.255.0

192.188.10.1

Configuring System Parameters


Configuring the Host Parameters for RICi-16
The configuration procedure for host parameters is similar for both RICi-16 units,
except for defining different host IP addresses.

5-8

Ethernet Services over PDH/SONET/SDH

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

To define the host parameters:


1. For RICi-16 (A), navigate to the Host menu (Configuration> System >
Management> Host), and configure the host parameters as shown in
Table 5-2.
2. For RICi-16 (B), perform the same procedure, using the host parameters as
shown in Table 5-2.
RICi-16
Configuration > System > Management > Host
1. IP Address
2. IP Mask
3. Default gateway
4. Read community
5. Write community
6. Trap community
7. Encapsulation
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

...
...
...
...
...
...
>

(192.188.10.12)
(255.255.255.0)
(192.188.10.1)
(public)
(private)
(public)

1 user(s)

Figure 5-13. Host Menu, RICi-16 (A

Configuring the System Clock Source for RICi-16


The configuration procedure for system clock parameters is similar for both RICi16 units.

To configuring the system clock source:


1. For RICi-16 (A), navigate to the System Clock menu (Configuration> System >
System Clock).
RICi-16
Configuration > System > System Clock
1. Master Clock
>
2. Fallback Clock
>
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

1M/ 1C

Figure 5-14. Host Menu, RICi-16 (A


2. Select Master Clock.

RICi-16 Ver. 2.5

Ethernet Services over PDH/SONET/SDH

5-9

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

RICi-16
Configuration > System > System Clock
1. Source
> (Rx Clock)
2. Port
> (T1 Port)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

1M/ 1C

Figure 5-15. Host Menu, RICi-16 (A


3. Select Source and choose Rx Clock.
4. Select Port and specify the port to be used.
5. Select Save.
6. For RICi-16 (B), perform the same procedure, using the system clock
parameters as shown in Figure 5-15 for each respective unit.

Note

For this type of configuration, either the Egate-100 (located in the Central Office)
should be configured for internal clock, or the network must provide the internal
clock.

Configuring the Physical Layer


Configuring the Physical Layer for RICi-16 (A)

To configure the E1 physical layer:

For the RICi-16 (A) unit, you can use the default E1 port configurations. Use
the E1 Physical Layer menu to check that the default configuration is in place
for E1 ports 18.

RICi-16
Configuration > Physical Layer > E1

1.
2.
3.
4.

Port [1 16]
TX Clock Source
Line type
Restoration Time

(1)
(System)
(G.732N-CRC)
(Immediate)

Administrative Status
Interface Type
Line Code
Rx Sensitivity

(Up)
(Balanced)
(HDB3)
(Long Haul)

>
s Save;

f forward;

b backward

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-16. E1 Port Configuration Menu, RICi-16 (A)

5-10

Ethernet Services over PDH/SONET/SDH

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

Configuring the Physical Layer for RICi-16 (B)

To configure the E1 physical layer:

For the RICi-16 (B) unit, you can use the default E1 port configurations. Use
the E1 Physical Layer menu to check that the default configuration is in place
for E1 ports 14.

RICi-16
Configuration > Physical Layer > E1

1.
2.
3.
4.

Port [1 16]
TX Clock Source
Line type
Restoration Time

(1)
(System)
(G.732N-CRC)
(Immediate)

Administrative Status
Interface Type
Line Code
Rx Sensitivity

(Up)
(Balanced)
(HDB3)
(Long Haul)

>
s Save;

f forward;

b backward

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-17. E1 Port Configuration Menu, RICi-16 (B)

Configuring the Logical Layer


Configuring the Logical Layer for RICi-16 (A)
For the RICi-16 (A) unit, you need a logical port bound to E1 ports 1-8. The
instructions in this section describe how to change the default configuration of
logical port VCG 1 from bound to E1 ports 116, to bound to E1 ports 1-8.

To configure the logical port:


1. Navigate to Configuration > Logical Layer.
The Logical Layer menu appears as illustrated in Figure 5-18.
2. Select Bind to Physical Ports
The Bind to Physical Ports menu appears as illustrated in Figure 5-19.
3.

Type 2 to delete range.


You are prompted to provide a range of values to remove from the list.

4. Type 916.
5. Type s to save your changes.
6. Click <ESC> to return to the previous menu. The logical port is now bound to
to E1 ports 1-8, as illustrated in Figure 5-20.

RICi-16 Ver. 2.5

Ethernet Services over PDH/SONET/SDH

5-11

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

RICi-16
Configuration > Logical Layer

1.
2.
3.
4.
>

Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-16)
E1/T1 Loop Detection
Enable

a add; f forward; b backward; d delete


ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-18. Logical Layer Menu (VCG) Bound to E1 Ports 116, RICi-16 (A)
RICi-16
Configuration > Logical Layer > Bind To Physical Ports (116)
1. [1-16]...
2. Delete Range...
>

(18)

ESC-Previous menu; !-Main menu; &-Exit; A-add

1 M/ 2 C

Figure 5-19. Bind to Physical Ports, RICi-16 (A)


RICi-16
Configuration > Logical Layer

1.
2.
3.
4.

Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-8)
E1/T1 Loop Detection
Enable

>
s Save; f forward; b - backward
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-20. Logical Layer Menu (VCG) Bound to E1 Ports 18, RICi-16 (A)

5-12

Ethernet Services over PDH/SONET/SDH

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

Configuring the Logical Layer for RICi-16 (B)


For the RICi-16 (B) unit, you need a logical port bound to E1 ports 1-4. The
instructions in this section describe how to change the default configuration of
logical port VCG 1 from bound to E1 ports 116, to bound to E1 ports 1-4.

To configure the logical port:


1. Navigate to Configuration > Logical Layer.
The Logical Layer menu appears as illustrated in Figure 5-21.
2. Select Bind to Physical Ports
The Bind to Physical Ports menu appears as illustrated in Figure 5-22.
3.

Type 2 to delete range.


You are prompted to provide a range of values to remove from the list.

4. Type 516.
5. Type s to save your changes.
6. Click <ESC> to return to the previous menu. The logical port is now bound to
to E1 ports 1-4, as illustrated in Figure 5-23.
RICi-16
Configuration > Logical Layer

1.
2.
3.
4.
>

Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-16)
E1/T1 Loop Detection
Enable

a add; f forward; b backward; d delete


ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-21. Logical Layer Menu (VCG) Bound to E1 Ports 116, RICi-16 (B)
RICi-16
Configuration > Logical Layer > Bind To Physical Ports (116)
1. [1-16]...
2. Delete Range...
>

(14)

ESC-Previous menu; !-Main menu; &-Exit; A-add

1 M/ 2 C

Figure 5-22. Bind to Physical Ports, RICi-16 (B)

RICi-16 Ver. 2.5

Ethernet Services over PDH/SONET/SDH

5-13

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

RICi-16
Configuration > Logical Layer

1.
2.
3.
4.
>

Port
(1)
Interface Type
> (VCG)
Max differential delay (msec)[0 - 256] (256)
Administrative Status
(Up)
Port Name
... (VCG 1)
Bind to Physical Ports
(1-4)
E1/T1 Loop Detection
Enable

S Save; f forward; b - backward


ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-23. Logical Layer Menu (VCG) Bound to E1 Ports 18, RICi-16 (B)

5-14

Multiple Customer Premises Supported by Channelized DS-3

RICi-16 Ver. 2.5

Installation and Operation Manual

5.3

Chapter 5 Configuring Typical Applications

Multiple Customer Premises Supported by


Channelized DS-3

Figure 5-1 illustrates an application where a RICi-16 unit with channelized DS-3
interface supports four customer premises with RICi-16T1 units and one
customer premises with RICi T1 unit.

Figure 5-24. RICi-16 with Channelized DS-3 Supporting Multiple Customer Premises
This application has the following requirements:

Channelized DS-3 links to the SDH/SONET network

RICi-16T1 units with T1 links to the SDH/SONET network.

RICi-T1 unit with T1 links to the SDH/SONET network.

The configuration procedure is divided into the following stages:


1. Configuring host IP parameters
2. Configuring physical port parameters
3. Configuring logical layer
4. Configuring T3 channel mapping.

RICi-16 Ver. 2.5

Multiple Customer Premises Supported by Channelized DS-3

5-15

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

The required channel mapping and logical ports for this application are shown in
the following table.

Table 5-3. Channel Mapping and Logical Ports

5-16

T3 channel

Logical port number

Logical port name

Corresponding Unit

VCG 1

RICi-16T1 (A)

VCG 1

RICi-16T1 (A)

VCG 1

RICi-16T1 (A)

VCG 1

RICi-16T1 (A)

VCG 2

RICi-16T1 (B)

VCG 2

RICi-16T1 (B)

VCG 2

RICi-16T1 (B)

VCG 2

RICi-16T1 (B)

VCG 2

RICi-16T1 (B)

10

VCG 2

RICi-16T1 (B)

11

VCG 2

RICi-16T1 (B)

12

VCG 2

RICi-16T1 (B)

13

VCG 3

RICi-16T1 (C)

14

VCG 3

RICi-16T1 (C)

15

VCG 3

RICi-16T1 (C)

16

VCG 3

RICi-16T1 (C)

17

VCG 3

RICi-16T1 (C)

18

VCG 3

RICi-16T1 (C)

19

VCG 3

RICi-16T1 (C)

20

VCG 3

RICi-16T1 (C)

21

VCG 4

RICi-16T1 (D)

22

VCG 4

RICi-16T1 (D)

23

VCG 4

RICi-16T1 (D)

24

VCG 4

RICi-16T1 (D)

25

VCG 5

RICi-T1 (E)

26

VCG 5

RICi-T1 (E)

27

VCG 5

RICi-T1 (E)

28

VCG 5

RICi-T1 (E)

Multiple Customer Premises Supported by Channelized DS-3

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

Configuring System Parameters


Configuring the Host Parameters for RICi-16
The configuration procedure for host parameters is similar for both RICi-16 units,
except for defining different host IP addresses.

To define the host parameters:

Navigate to the Host menu (Configuration> System > Management> Host),


and configure the host parameters as illustrated in Figure 5-25.

RICi-16
Configuration > System > Management > Host
1. IP Address
2. IP Mask
3. Default gateway
4. Read community
5. Write community
6. Trap community
7. Encapsulation
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

...
...
...
...
...
...
>

(192.188.10.12)
(255.255.255.0)
(192.188.10.1)
(public)
(private)
(public)

1 user(s)

Figure 5-25. Host Menu

Configuring the System Clock Source for RICi-16


The configuration procedure for system clock parameters is similar for all RICi-16
units.

To configuring the system clock source:


1. For RICi-16 (A), navigate to the System Clock menu (Configuration> System >
System Clock).
RICi-16
Configuration > System > System Clock
1. Master Clock
>
2. Fallback Clock
>
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

1M/ 1C

Figure 5-26. Host Menu, RICi-16 (A


2. Select Master Clock.

RICi-16 Ver. 2.5

Multiple Customer Premises Supported by Channelized DS-3

5-17

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

RICi-16
Configuration > System > System Clock
1. Source
> (Rx Clock)
2. Port
> (T1 Port)
>
s - Save
ESC-Previous menu; !-Main menu; &-Exit;

1M/ 1C

Figure 5-27. Host Menu, RICi-16 (A


3. Select Source and choose Rx Clock.
4. Select Port and specify the port to be used.
5. Select Save.
6. For RICi-16 (B), (C), (D) perform the same procedure, using the system clock
parameters as shown in Figure 5-27 for each respective unit.

Note

For this type of configuration, either the RICi-16 (located at the Central Office)
should be configured for internal clock, or the network must provide the internal
clock.

Configuring the Physical Layer

To configure the T3 interface:

Use the T3 Physical Layer menu to ensure that the T3 interface is


channelized.
RICi-16

Configuration > Physical Layer > T3

1.
2.
3.
4.
3.

Port
TX Clock Source

(1)
(System)

Structure
Line Type
Administrative Status
Line Length
Mapping

(Channelized)
(M23)
(Up)
(Up to 225ft)
>

>
s Save;

f forward;

b backward

ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-28. T3 Channelized

5-18

Multiple Customer Premises Supported by Channelized DS-3

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

Configuring the Logical Layer


You must create logical ports for VCGs 25 for this application, as illustrated in
Table 5-3. You do not need to create VCG 1, which is automatically created by
RICi-16.

To create the VCG logical ports:


1. Navigate to Configuration > Logical Layer.
The Logical Layer menu appears as illustrated in Figure 5-29.
RICi-16
Configuration > Logical Layer
Port
(1)
Interface Type
> (VCG)
Bind To Internal Ports
(17-28)
Max differential delay (msec)[0 - 256] (256)
1. Administrative Status
(Up)
2. Port Name
... (VCG 1)
3. E1/T1 Loop Detection
Enable
>
a add; f forward; b backward; d delete
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-29. Logical Layer Menu (VCG), Logical Port 1


2. Type a to add a logical port.
A screen appears showing the new logical port, with all parameters empty
except the port number, and a message at the bottom prompting you to
save the VCG.
RICi-16
Configuration > Logical Layer
Port
(3)
Interface Type
> ()
Bind To Internal Ports
(-)
Max differential delay (msec)[0 - 256] ()
1. Administrative Status
()
2. Port Name
... ()
3. E1/T1 Loop Detection
>
s save; a add; f forward; b backward; d delete
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

-------------------------------------------------------Press s to save new VCG

Figure 5-30. Logical Layer Menu (VCG), New Logical Port

RICi-16 Ver. 2.5

Multiple Customer Premises Supported by Channelized DS-3

5-19

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

3. Type s to save the logical port.


The logical port is saved as VCG 2 (logical port 3).

RICi-16
Configuration > Logical Layer
Port
(3)
Interface Type
> (VCG 2)
Bind To Internal Ports
(-)
Max differential delay (msec)[0 - 256] (256)
1. Administrative Status
(Up)
2. Port Name
... (VCG 2)
3. E1/T1 Loop Detection
Enable
>
a add; f forward; b backward; d delete
ESC-Previous menu; !-Main menu; &-Exit

1 M/ 2 C

Figure 5-31. Logical Layer Menu (VCG), Logical Port 3


4. Repeat the same procedure to create the following:

Note

VCG 3 (logical port 5)

VCG 4 (logical port 7)

VCG 5 (logical port 9).

The corresponding GFP logical port is created automatically by RICi-16 for each
new VCG logical port.

Configuring the T3 Channel Mapping


You must set up the T3 channel mapping as specified in Table 5-3:

Map channels 14 to logical port 1

Map channels 512 to logical port 3

Map channels 1320 to logical port 5

Map channels 2124 to logical port 7

Map channels 2528 to logical port 9.

To configure the T3 channel mapping:


1. Navigate to Configuration > Physical Layer > T3 > Mapping.
The T3 Mapping menu appears as illustrated in Figure 5-7, with the cursor
is positioned at the connection for channel 1. The list of connections at
the bottom only shows the T1 ports.
2. Type n to see the next set of connection values.

5-20

Multiple Customer Premises Supported by Channelized DS-3

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

The T3 Mapping menu appears as illustrated in Figure 5-33, with the


connection values shown for the logical ports.
RICi-16
Configuration > Physical Layer > T3 > Mapping
Channel
Connection
Channel
Connection
1
T1-1
11
T1-11
2
T1-2
12
T1-12
3
T1-3
13
T1-13
4
T1-4
14
T1-14
5
T1-5
15
T1-15
6
T1-6
16
T1-16
7
T1-7
17
LP1
8
T1-8
18
LP1
9
T1-9
19
LP1
10
T1-10
20
LP1
1. T1-1
3. T1-3
5. T1-5
7. T1-7
2. T1-2
4. T1-4
6. T1-6
8. T1-8
...(N)
>
ESC-Previous menu; !-Main menu; &-Exit

9. T1-9
10. T1-10

Channel
21
22
23
24
25
26
27
28

11. T1-11
12. T1-12

Connection
LP1
LP1
LP1
LP1
LP1
LP1
LP1
LP1

13. T1-13
14. T1-14

1 M/ 2 C

Figure 5-32. T3 Mapping Menu, First Set of Connections


RICi-16
Configuration > Physical Layer > T3 > Mapping
Channel
Connection
Channel
Connection
1
T1-1
11
T1-11
2
T1-2
12
T1-12
3
T1-3
13
T1-13
4
T1-4
14
T1-14
5
T1-5
15
T1-15
6
T1-6
16
T1-16
7
T1-7
17
LP1
8
T1-8
18
LP1
9
T1-9
19
LP1
10
T1-10
20
LP1
...(P)
15. T1-15 17. LP1
19. LP5
21. LP9
16. T1-16 18. LP3
20. LP7
22. N/C
>
ESC-Previous menu; !-Main menu; &-Exit

Channel
21
22
23
24
25
26
27
28

Connection
LP1
LP1
LP1
LP1
LP1
LP1
LP1
LP1

1 M/ 2 C

Figure 5-33. T3 Mapping Menu, Second Set of Connections

RICi-16 Ver. 2.5

Multiple Customer Premises Supported by Channelized DS-3

5-21

Chapter 5 Configuring Typical Applications

Installation and Operation Manual

3. Type 17 and then click <Enter>.


T3 channel 1 is mapped to logical port 1.
4. Follow the same procedure for T3 channels 24, using the arrow keys to
position the cursor.
T3 channels 24 are mapped to logical port 1.
5. Position the cursor at T3 channel 5, and type 18 and then click <Enter>.
T3 channel 5 is mapped to logical port 3.
6. Follow the same procedure for T3 channels 612, using the arrow keys to
position the cursor.
T3 channels 612 are mapped to logical port 3.
7. Position the cursor at T3 channel 13, and type 19 and then click <Enter.
T3 channel 13 is mapped to logical port 5.
8. Follow the same procedure for T3 channels 1420, using the arrow keys to
position the cursor.
T3 channels 1420 are mapped to logical port 5.
9. Position the cursor at T3 channel 21, and type 20 and then click <Enter>.
T3 channel 21 to is mapped logical port 7.
10. Follow the same procedure for T3 channels 2124, using the arrow keys to
position the cursor.
T3 channels 2124 are mapped to logical port 7.
11. Position the cursor at T3 channel 25, and type 21 and then click <Enter>.
T3 channel 25 is mapped to logical port 9.
12. Follow the same procedure for T3 channels 2628, using the arrow keys to
position the cursor.
T3 channels 2628 are mapped to logical port 9.

5-22

Multiple Customer Premises Supported by Channelized DS-3

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 5 Configuring Typical Applications

Figure 5-34 Illustrates the mapping after the above steps have been performed.
RICi-16
Configuration > Physical Layer > T3 > Mapping
Channel
Connection
Channel
Connection
1
LP1
11
LP3
2
LP1
12
LP3
3
LP1
13
LP5
4
LP1
14
LP5
5
LP3
15
LP5
6
LP3
16
LP5
7
LP3
17
LP5
8
LP3
18
LP5
9
LP3
19
LP5
10
LP3
20
LP5
1. T1-1
3. T1-3
5. T1-5
7. T1-7
2. T1-2
4. T1-4
6. T1-6
8. T1-8
...(N)
>
ESC-Previous menu; !-Main menu; &-Exit

9. T1-9
10. T1-10

Channel
21
22
23
24
25
26
27
28

11. T1-11
12. T1-12

Connection
LP7
LP7
LP7
LP7
LP9
LP9
LP9
LP9

13. T1-13
14. T1-14

1 M/ 2 C

Figure 5-34. T3 Mapping Menu, First Set of Connections

RICi-16 Ver. 2.5

Multiple Customer Premises Supported by Channelized DS-3

5-23

Chapter 5 Configuring Typical Applications

5-24

Multiple Customer Premises Supported by Channelized DS-3

Installation and Operation Manual

RICi-16 Ver. 2.5

Chapter 6
Monitoring and
Diagnostics
This section describes how to:

Monitor the system performance

Display statistics

Display system messages

Detect errors

Troubleshoot the device

Perform connectivity tests.

6.1

Monitoring Performance

Viewing Device Status


The software provides access to the following status information:

Device level MAC address, connection status, connected managers and


event log file

Physical level Ethernet and E1/T1, T3 port status

Logical level VCG and GFP ports status

Application level MAC table and flow status.

The status information is available via the Monitoring menu.

Displaying Device Status Information


The System menu shows the interface connection status, connected managers,
Syslog and Event Log file. For a description of system messages displayed via the
Event Log file, refer to Displaying Events.

To display system status information:


1. Navigate to Main Menu > Monitoring > System.
The Monitoring System screen appears as illustrated in Figure 6-1.

RICi-16 Ver. 2.5

Monitoring Performance

6-1

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

RICi-16
Main Menu > Monitoring > System
MAC address
System Up Time
Date
Time
Security Key
1.
2.
3.
4.
5.
6.
7.

(00-D2-20-10-20-30)
(12:09:12)
(2007-03-01)
(21:06:57)
(SSL + SSH)

Interface Status
Event log
Radius Statistics
Syslog Statistics
Connected Managers
Current Clock Source
Power Supply Status

[]
[]
[]
>
[]
>
[]

>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-1. Monitoring System Screen

To display interface connection information:

Navigate to Main Menu > Monitoring > System > Interface Status.
The Interface Status screen appears as illustrated in Figure 6-2.

RICi-16
Main Menu > Monitoring > System > Interface Status
Description
ETH Port 1
I ETH Port 2
I ETH Port 3
V ETH Port 4
T1 Port 1
T1 Port 2
T1 Port 3

Type
Fast
Fast
Fast
Fast
T1
T1
T1

Eth
Eth
Eth
Eth

Activation
Up
Up
Up
Up
Up
Up
Up

Operation
Down
Down
Down
Down
Up
Down
Up

Speed
100000000
100000000
100000000
100000000
1544000
1544000
1544000

>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-2. Interface Status Screen

Displaying Protection Status and Statistics


The Connected Managers menu details management access implementation,
connection type and status, depending on how the network managers are
defined.
The Radius server checks whether access authentication information is correct
(user name and password) before network access is authorized. The Radius
Statistics menu details the network accesss accept/reject statistics for each
server in use.

6-2

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Displaying the Connected Managers Status

To display connected managers status:

From the System menu (Monitoring >System), select Connected Managers.


The Connected Managers screen appears as illustrated in Figure 6-3.

RICi-16
Main Menu > Monitoring > System > Connected Managers
Index
1
2
3
4

IP Address
172.18.187.60
172.18.187.60
172.18.187.166
172.18.187.166

Connection Type
SSH
SSL
TELNET
TELNET

User Name
su
su
su
su

>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-3. Connected Managers Screen

Displaying Radius Statistics

To display radius statistics:


1. From the System menu (Monitoring > System), select Radius Statistics.
The Radius Statistics screen appears as illustrated in Figure 6-4. The
parameters are described in Table 6-1.

RICi-16
Main Menu > Monitoring > System > Radius Statistics

Access Requests
Access Retransmits
Access Accepts
Access Rejects
Access Challenges
Malformed Responses
Bad Authenticators
Pending Requests
Timeouts
Unknown Types
Packets Dropped

Server 1
0
0
0
0
0
0
0
0
0
0
0

Server 2
0
0
0
0
0
0
0
0
0
0
0

Server 3
0
0
0
0
0
0
0
0
0
0
0

Server 4
0
0
0
0
0
0
0
0
0
0
0

>
c-Clear Counters
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-4. Radius Statistics Screen

RICi-16 Ver. 2.5

Monitoring Performance

6-3

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

Table 6-1. Radius Statistics Parameters

6-4

Parameter

Description

Access Requests

The number of Radius access requests sent to the server


excluding retransmissions.

Access Retransmits

The number of Radius access requests retransmitted to the


server.

Access Accepts

The number of Radius access acceptances (valid and invalid)


received from the server.

Access Rejects

The number of Radius access rejects (valid and invalid)


received from the server.

Access Challenges

The number of Radius access challenges (valid and invalid)


received from the server.

Malformed Responses

The number of malformed Radius access responses received


from the server. This does not include invalid authenticators
or signature attributes.

Bad Authenticators

The number of Radius access responses containing invalid


authenticators or signatures received from the server.

Pending Requests

The number of Radius access requests sent to the server


that are still pending.

Timeouts

The number of Radius access requests sent to the server


that have a timeout status.

Unknown Types

The number of Radius access requests received from the


server that have an unknown type status.

Packets Dropped

The number of Radius access responses received from the


server that have been dropped.

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Displaying the Physical Layer Status


You can view the status of the units physical ports.

Displaying the Ethernet Port Status

To display the Ethernet port status:


1. From the Ethernet menu (Monitoring > Physical Ports > Ethernet), select
Status.
The Fast Ethernet Status screen appears as illustrated in Figure 6-5. The
parameters are described in Table 6-2.
2. Press <f> to select the port number.
RICi-16
Main Menu > Monitoring > Physical Ports > Ethernet > Status
Port

(1)

Port Type
Administrative Status
Operation Status
Speed & Duplex
Flow Control

(SFP 1310nm 15km LC SM)


(Enable)
(Up)
(100Mbps TX Full Duplex)
(Enable)

>

1. SFP Information

>

>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-5. Ethernet Status Screen


Table 6-2. Ethernet Status Parameters

RICi-16 Ver. 2.5

Parameter

Description

Port

The port slot number to be handled.

Port Type

The interface used for the port

Admistrative Status

Whether the interface is enabled or disabled.

Operation Status

The actual operational status of the link (Up or Down).

Speed & Duplex

The current data rate and duplex mode of the link


(100 full, 100 half, 10 full, or 10 - half).

Flow Control

Whether flow control is enabled or disabled.

Monitoring Performance

6-5

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

To display the SFP information:


1. From the Ethernet Starus menu (Monitoring > Physical Ports > Ethernet >
Status), select SFP Information.
The SFP Information screen appears as illustrated in Figure 6-6.
RICi-16
Monitoring >Physical Ports >Ethernet >Status >SFP Information
Connector Type
Manufacturer Name
Manufacturer PN
Typical Max. Range [m/km]
Wave Length [nm]
Fiber Type

(LC)
(FIBERXON INC.)
(FTM-3001C-SL15G)
(15)
(1310)
(SM)

>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-6. Ethernet Status Screen

Displaying the E1/T1 Port Status

To display the E1/T1 port status:


1. From the T1 menu (Monitoring > Physical Ports > T1), select Status.
The E1/T1 Status screen appears as illustrated in Figure 6-7.
2. Press <f> to select the port number.
RICi-16
Main Menu > Monitoring > Physical Ports > T1 > Status
1. Port [1-16]

(1)

Connector Type
Administrative Status
Operation Status

(RJ45)
(Up)
(Up)

>
F - Forward; B - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-7. E1/T1 Status Screen

6-6

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Displaying the T3 Port Status

To display the T3 port status:


1. From the T3 menu (Monitoring > Physical Ports > T3), select Status.
The T3 Status screen appears as illustrated in Figure 6-8.
2. Press <f> to select the port number.
RICi-16
Main Menu > Monitoring > Physical Ports > T3 > Status
1. Port [1-16]

(1)

Connector Type
Administrative Status
Operation Status

(BNC)
(Up)
(Down)

>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-8. T3 Status Screen

Displaying Logical Layer Status


You can view the status of the GFP and VCG logical ports.
For a description of the logical layer statistics, refer to Displaying Logical Layer

Statistics.

Displaying the GFP and VCG Logical Ports Status

To display the GFP and VCG logical port status:


1. From the Logical Layer menu (Monitoring > Logical Layer), select Status.
The GFP and VCG Logical Ports Status screen appears as illustrated in
Figure 6-9 and Figure 6-10.
2. Press <f> to select the port number.
RICi-16
Monitoring > logical Layer > Status
Port

(1)

Interface Type
Port Name
GFP Frame Delineation

(GFP)
(GFP 1)
(Not Delineated)

>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-9. GFP Logical Port Status Screen

RICi-16 Ver. 2.5

Monitoring Performance

6-7

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

RICi-16
Monitoring > logical Layer > Status
Port

(1)

Interface Type
Port Name
1. L-CAS Member Status

>

(VCG)
(VCG 1)

[]

>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-10. VCG Logical Port Status Screen

To display L-CAS member status:


1. From the Logical Port Status menu (Monitoring > Logical Layer > Status),
select L-CAS Member Status.
The L-CAS Status screen appears as illustrated in Figure 6-11.
RICi-16
Monitoring >Logical Layer >Status >L-CAS Member Status
Link
1
2
3
I 4
I 5
V 6
7
8
9
10
11
12

Source Status
OK
OK
OK
OK
OK
Fail
OK
OK
OK
OK
OK
OK

Sink Status
OK
OK
OK
OK
OK
Fail
OK
OK
OK
OK
OK
OK

>
f - Forward; b - Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-11. Ethernet Status Screen

6-8

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Displaying Application-Level Status


The RICi-16 can operate in Bridge or Flow mode, which can be configured by the
user.

Displaying Bridge Information


In Bridge mode, the unit provides information on the MAC addresses (static and
learned) and their bridge port assignments, as well as VLAN IDs and their bridge
port assignments.

To display the MAC table:

From the Bridge menu (Monitoring > Application > Bridge), select View MAC
Table.
The MAC Table screen appears as illustrated in Figure 6-12 and
Figure 6-13. The parameters are described in Table 6-3.

RICi-16
Main Menu > Monitoring > Application > Bridge > View MAC Table

1
| 2
v 3
4
5

VLAN ID

MAC address

Bridge port

Status

1
2
3
4
5

111111111111
222222222222
333333333333
444444444444
555555555555

1
2
3
3
5

Static
Dynamic
Static
Dynamic
Dynamic

>
x-Clear Table
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-12. View MAC Table (VLAN-Aware)

RICi-16
Main Menu > Monitoring > Application > Bridge > View MAC Table

1
| 2
V 3
4
5

MAC address

Bridge port

Status

11-11-11-11-11-11
22-22-22-22-22-22
33-33-33-33-33-33
44-44-44-44-44-44
55-55-55-55-55-55

1
2
3
3
5

Static
Dynamic
Static
Dynamic
Dynamic

>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-13. View MAC Table (VLAN-Unaware)

RICi-16 Ver. 2.5

Monitoring Performance

6-9

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

Table 6-3. View MAC Table Parameters


Parameter

Description

VLAN ID
(VLAN aware mode only)

The VLAN ID corresponding to the MAC address (1 4094).

MAC Address

The destination MAC address in a frame to which this


entry's filtering information applies.

Bridge Port

The port number of the port from which a frame must be


received in order for this entry's filtering information to
apply.

Status

The status of the entry (Static or Dynamic).

Displaying Flow Information


In flow mode the unit provides information on incoming customer traffic. This
traffic is mapped to the Ethernet flows according to user defined per-port
criteria.

To display flow information:

From the Application menu (Monitoring > Application), select Flows.


The Flow screen appears as illustrated in Figure 6-14. The parameters are
described in Table 6-4.

RICi-16
Main Menu > Monitoring > Application > Flows
Flow [1-64]
Name
Fwd Green Packets
Fwd Green Bytes
Fwd Yellow Packets
Fwd Yellow Bytes
Dscrd Green Packets
Dscrd Green Bytes
Dscrd Yellow Packets
Dscrd Yellow Bytes
Dscrd Red Packets
Dscrd Red Bytes

(2)
(Flow1)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
(0)

>
f-Forward
b-Backward
c-Clear Statistics
ESC-Previous menu; !-Main menu; &-Exit

Figure 6-14. View Flow Screen

6-10

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Table 6-4. View Flow Parameters

RICi-16 Ver. 2.5

Parameter

Description

Flow [1-64]

Flow ID

Name

Flow name corresponding to the flow ID.

Fwd Green Packets

Number of forwarded packets that were marked as green


by the policer located on the flow.

Fwd Green Bytes

Number of forwarded bytes that were marked as green by


the policer located on the flow.

Fwd Yellow Packets

Number of forwarded packets that were marked as yellow


by the policer located on the flow.

Fwd Yellow Bytes

Number of forwarded bytes that were marked as yellow by


the policer located on the flow.

Dscrd Green Packets

Number of discarded packets that were marked as green by


the policer located on the flow, due to lack of egress buffer
space.

Dscrd Green Bytes

Number of discarded bytes that were marked as green by


the policer located on the flow, due to lack of egress buffer
space.

Dscrd Yellow Packets

Number of discarded packets that were marked as yellow


by the policer located on the flow, due to lack of egress
buffer space.

Dscrd Yellow Bytes

Number of discarded bytes that were marked as yellow by


the policer located on the flow, due to lack of egress buffer
space.

Dscrd Red Packets

Number of discarded packets that were marked as red by


the policer located on the flow, due to lack of egress buffer
space.

Dscrd Red Bytes

Number of discarded bytes that were marked as red by the


policer located on the flow, due to lack of egress buffer
space.

Monitoring Performance

6-11

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

Displaying OAM Information

To display the OAM status:

From the OAM.CFM menu (Monitoring > Application > OAM.CFM), select
Status.
The OAM.CFM Status screen appears as illustrated in Figure 6-15). The
parameters are described in Table 6-5.

RICi-16
Monitoring > Application > OAM.CFM > Status
1.
2.
3.
4.

MD ID
MA ID
MEP ID [1-8191]
Remote MEP ID [1-8191]

...
...
...
...

(0)
(0)
(0)
(0)

>
Please select item <1 to 4>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-15. OAM.CFM Status Screen


Table 6-5. OAM.CFM Status

6-12

Parameter

Description

MD ID

ID of the Maintenance group

MA ID

ID of the MAC address

MEP ID[1-8191]

ID of the Maintenance entity group

Remote Mep ID[1 8191]

Remote ID of the Maintenance entity group

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Displaying Interface Statistics


You can display statistical data for the Ethernet, E1/T1, T3 ports, and the logical
layer.

Displaying Ethernet Statistics

To view Ethernet statistics:


1. In the Main menu, navigate to Monitoring > Physical Ports > Ethernet.
2. Select Statistics.
3. Type f to navigate through port numbers.
The Ethernet Statistics screen appears as illustrated in Figure 6-16.

To clear Ethernet statistics:

In the Ethernet Statistics menu, type c to clear port statistics.

RICi-16
Monitoring > Physical Ports > Ethernet > Statistics
Port

(1)

Rx
Rx
Rx
Tx
Tx
Tx
Tx
Tx
Tx
Tx
Tx

(709073132)
(533197630)
(0)
(21532)
(2139845)
(0)
(0)
(0)
(0)
(0)
(0)

Correct Frames
Correct Octets
FCS Errors
Correct Frames
Correct Octets
Single Collision
Collision
Multiple Collision)
Deferred Transmissions
Late Collisions
Congestion Dropped Frames

>
f-Forward; b-Backwards; c-Clear statistics
ESC-Previous menu; !-Main menu; &-Exit;

1 M/ 1 C

Figure 6-16. Ethernet Statistics

Displaying E1/T1 Statistics


E1/T1 statistics can be displayed for 15-minute intervals or 1-day periods.

To view E1/T1 port statistics:


1. In the Main menu, navigate to Monitoring > Physical Ports > E1/T1 >
Statistics.
2. Select one of the following:

RICi-16 Ver. 2.5

15 Min. Intervals To view statistics for current and previous 15-minute


intervals.

Monitoring Performance

6-13

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

1 Day Interval To view statistics for current one-day intervals.


The E1/T1 Statistics screen appears as illustrated in Figure 6-17. The
statistics are described in Table 6-6.

To clear statistics:

In the Statistics menu, select Clear Statistics to clear all E1/T1 statistics.

RICi-16
Monitoring > Physical Ports > E1/T1 > Statistics>15 Min
Intervals
1. Port [1 16]
2. Interval [0-96]

... (1)
... (0)

Time Elapsed
ES
SES
UAS
BES

(10)
(0)
(0)
(0)
(0)

>
f-Forward; c-Clear Statistics: F-Frw(Int; B-Bkw(Int)
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-17. E1/T1 Statistics


Table 6-6. E1/T1 Statistics Parameters
Parameter

Description

Port number

Statistics regarding selectable port number

Interval number

Selectable interval (interval 0 displays the current interval)

Time elapsed

For interval 0 displays number of seconds passed from the start


time of the interval

ES

Number of seconds where errored seconds (ES) are detected. For


ESF and E1-CRC links an Errored Second is a second with:
One or more Path Code Violation
or,
One or more Out of Frame defects
or
One or more Controlled Slip events
or
A detected AIS defect.
For D4 and E1-noCRC links, the presence of Bipolar Violations also
triggers an Errored Second. This is not incremented during an
Unavailable Second.

6-14

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Parameter

Description

SES

Number of seconds where SES is detected.


A Severely Errored Second for ESF signals is a second with:
320 or more Path Code Violation Error Events
or
One or more Out of Frame defects
or
A detected AIS defect.
For E1-CRC signals, a Severely Errored Second is a second with:
832 or more Path Code Violation error events
or
One or more Out of Frame defects.
For E1-noCRC signals, a Severely Errored Second is a 2048 LCVs or
more.
For D4 signals, a Severely Errored Second is:
A count of one- second intervals with Framing Error events
or
An OOF defect
or
1544 LCVs or more.
Controlled slips are not included in this parameter. This is not
incremented during an Unavailable Second.

UAS

Number of seconds where SES is detected as Unavailable Seconds


(UAS). Calculated by counting the number of seconds for which the
interface is unavailable. The DS1 interface is said to be unavailable
from the onset of 10 contiguous SESs, or the onset of the
condition leading to a failure.

BES

Number of seconds where BES is detected. A Bursty Errored


Second is a second with fewer than 320 and more than 1 Path
Coding Violation error events, no Severely Errored Frame defects
and no detected incoming AIS defects. Controlled slips are not
included in this parameter. This is not incremented during an
Unavailable Second. It applies to ESF signals only. Valid only for E1CRCon and T1-ESF

Displaying T3 Statistics
T3 statistics can be displayed for 15-minute intervals or 1-day periods.

To view T3 port statistics:


1. In the Main menu, navigate to Monitoring > Physical Ports > T3 > Statistics.
2. Select one of the following:

RICi-16 Ver. 2.5

15 Min. Intervals To view statistics for current and previous 15-minute


intervals.

1 Day Interval To view statistics for current one-day intervals.

Monitoring Performance

6-15

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

The T3 Statistics screen appears as illustrated in Figure 6-18. The


statistics are described in Table 6-7.

To clear statistics:

In the Statistics menu, select Clear Statistics to clear all E1/T1 statistics.

RICi-16
Monitoring > Physical Ports > T3> Statistics>15 Min Intervals

1.

Port [1 - 2]
Interval [0 - 96]

(1)
(0)

Time Elapsed (sec)


LES
PES
PSESS
CES
CSES
SEFS
UAS

(10)
(0)
(0)
(0)
(0)
(0)
(0)
(0)

>
f-Forward; c-Clear Statistics; ^F-Frw (Int); ^B-Bkw (Int)
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-18. T3 Statistics


Table 6-7. T3 Statistics Parameters
Parameter

Description

Port number

Statistics regarding selected port number

Interval number

Selectable interval (interval 0 displays the current interval)

Time elapsed

For interval 0 displays number of seconds passed from the start time
of the interval

LES

Number of seconds where Line Errored Seconds are detected. A Line


Errored Second is a second with:
One or more Code Violations
or,
One or more Loss of Signal defects

PES

Number of seconds where P-bit Errored Seconds are detected.


A P-bit Errored Second is a second with:
One or more Path Code Violation Error Events
or
One or more Out of Frame defects
or
A detected incoming AIS defect.
This counter is not incremented when Unavailable Seconds (UAS) are
counted.

6-16

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Parameter

Description

PSES

Number of seconds where P-bit Severely Errored Seconds are


detected.
A P-bit Errored Second is a second with:
44 or more Path Code Violation Error Events
or
One or more Out of Frame defects
or
A detected incoming AIS defect.
This counter is not incremented when Unavailable Seconds (UAS) are
counted.

CES

Number of seconds where C-bit Errored Seconds are detected.


A C-bit Errored Second is a second with:
One or more CCV Error Events
or
One or more Out of Frame defects
or
A detected incoming AIS defect.
This counter is not incremented when Unavailable Seconds (UAS) are
counted.

Note: This count is only for the SYNTRAN and C-bit Parity DS3
applications.
CSES

Number of seconds where C-bit Severely Errored Seconds are


detected.
A C-bit Severely Errored Second is a second with:
44 or more CCV Error Events
or
One or more Out of Frame defects
or
A detected incoming AIS defect.
This counter is not incremented when Unavailable Seconds (UAS) are
counted.

Note: This count is only for the SYNTRAN and C-bit Parity DS3
applications.
SEFS

Number of seconds where Severely Errored Framing Seconds are


detected.
A Severely Errored Framing Second is a second with:
One or more Out of Frame defects
or
A detected incoming AIS defect.
This counter is not incremented during unavailable seconds

UAS

RICi-16 Ver. 2.5

Number of seconds where the interface is unavailable. The DS3


interface is said to be unavailable from the onset of 10 contiguous
LESs, or the onset of the condition leading to a failure.

Monitoring Performance

6-17

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

Displaying Logical Layer Statistics


You can display the statistics for the GFP logical ports. There are no statistics for
VCG logical ports.

To view the Logical Layer statistics:

In the Main menu, navigate to Monitoring > Logical Layer > Statistics.
The Logical Layer Statistics screen appears as illustrated in Figure 6-19.
The statistics are explained in Table 6-8.

To clear Logical Layer statistics:

In the Logical Layer Statistics menu, type c to clear port statistics.

RICi-16
Monitoring > Logical Layer > Statistics
Port
Interface Type
Port name
Rx
Rx
Rx
Rx
Rx
TX
TX
Tx

(2)
>

Correct Frames
Correct Octets
cHEC Errors
tHEC Errors
FCS Errors
Frames
Octets
congestion Dropped Frames

(GFP)
(GFP 1)
(0)
(0)
(0)
(0)
(0)
(453160)
(45609507)
(0)

>
f-Forward; b-Backward; c-Clear Statistics
ESC-Previous menu; !-Main menu; &-Exit;

1 M/ 1 C

Figure 6-19. Logical Layer Statistics (GFP)


Table 6-8. Logical Layer Statistics

6-18

Parameter

Description

Port

Logical port being monitored

Interface Type

Interface type

Port Name

Given name to logical port

RX Correct Frames

Total number of frames received

RX Correct Octets

Total number of octets received

RX cHEC Errors

Total number of frames received with errors in the cHEC


field of the header

RX tHEC Errors

Total number of frames received with errors in the tHEC


field of the header

Monitoring Performance

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Parameter

Description

RX FCS Errors

Total number of frames received with frame checksum


errors

TX Frames

Total number of frames transmitted

TX Octets

Total number of octets transmitted

TX Congestion Dropped
Frames

Total number of frames dropped because of congestion

6.2

Handling Alarms and Traps

RICi-16 maintains a log file, which can hold up to 1000 system messages. All
events are time-stamped. In addition, RICi-16 allows logging and sharing of
system events on a server instead of internally. The statistical information of
logging and sharing system events is displayed in the Syslog menu.

Displaying Events

To access the event log:


1. In the Main menu, navigate to Monitoring > System > Event Log.
The Event Log screen appears as illustrated in Figure 6-20.
2. In the Event Log screen, use <Ctrl-u> to scroll up, <Ctrl-d> to scroll down,
<Ctrl-r> to move right and <Ctrl-l> to move left in the Events list.
RICi-16

Monitoring > System > Event Log

I
I
V

Source
E1 Port 2
E1 Port 6
Eth Port 1
T1 Port 4
T1 Port 3
T1 Port 2
T1 Port 1
->>

Description
LINK_DOWN
LINK_UP
LINK_DOWN
LINK_DOWN
LINK_DOWN
LINK_DOWN
LINK_UP

Current time: 03:07:59


Information
E1 port
E1 port
Eth port
T1 Port
T1 Port
T1 Port
T1 Port

Severity
Major
Minor
Major
Major
Major
Major
Major

>
x - Clear Table
ESC-Previous menu; !-Main menu; &-Exit;

?-help

Figure 6-20. Typical Log File


Table 6-9 presents some of the event types that appear in the event log.

RICi-16 Ver. 2.5

Handling Alarms and Traps

6-19

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

Table 6-9. Event List


Code

Event

Description

System Events
10

LINK_UP

A port has been connected

20

LINK_DOWN

A port has been disconnected

30

HW_FAILURE

Hardware failure has been detected

32

PS_FAILED_ON

(Dual power supply only) One of the power supplies has failed

33

PS_FAILED_OFF

(Dual power supply only) The power supply has been turned back
on after a failure

40

SNMP_AUTH_FAIL

SNMP Authentication Failure trap has been received

50

WEB_START

Web session has been initiated

51

WEB_FINISH

Web session has been finished

70

TFTP_START

TFTP session has been initiated

71

TFTP_FINISH

TFTP session has been finished

72

TFTP_FAILURE

TFTP session has failed

90

TELNET_ACCESS_DENIED

Access via Telnet was denied, either because the current IP address
does not appear in the manager list, or because Telnet access was
disabled via user configuration.

91

WEB_ACCESS_DENIED

Access via Web was denied, either because the current IP address
does not appear in the manager list, or because web access was
disabled via user configuration.

92

SNMP_ACCESS_DENIED

Access via SNMP was denied, either because the current IP address
does not appear in the manager list, or because SNMP access was
disabled via user configuration.

100

E1/T1 Major

An E1/T1 event that has the severity major.

101

E1/T1 Minor

An E1/T1 event that has the severity minor.

102

E1/T1 Event

There is a momentary even on the E1/T1.

105

T1 FDL Remove LLB

An event occurs for removal of a local loopback.

108

T1 FDL LLB

Message sent to begin a local loopback.

111

SFP Event

Indicates whether SFP is present, not present, or of incompatible


type.

112

Signal Degrade On

The number of PDH E1/T1/T3 errors were above the threshold; the
line was disconnected.

113

Signal Degrade Off

Traffic was renewed after the number of errors dropped beneath


the threshold.

160

MAC Protection Violation

Violation occurred either because a frame was received with an


incorrect MAC.

180

Loop Detected

A loop was detected on Ethernet and GFP.

6-20

Handling Alarms and Traps

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Code

Event

Description

181

Loop Recovery

The loop on Ethernet and GFP has stopped.

182

Cold Start

The device has been powered up.

183

Login

Login has succeeded.

184

Failed Login

Login has failed.

OAM Ag Events
0x1001

CC OK

OAM connectivity check (CC) with remote MEP has been confirmed

0x1002

CC Mismerge

A MEP receives a CCM frame with correct MEG Level but incorrect
MEG ID.

0x1003

Unexpected MEP On

A MEP receives a CCM frame with correct MEG Level, correct MEG ID
but with unexpected MEP ID.

0x1004

Unexpected MEP Off

During an interval equal to 3.5 times the CCM transmission periods,


the MEP does not receive CCM frames with an unexpected MEP ID.

0x1005

Unexpected Period On

A MEP receives a CCM frame with correct MEG Level, correct MEG ID,
correct MEP ID, but with a Period field value different than its own
CCM transmission period.

0x1006

CC Failure On

A MEP receives no CCM frames from a peer MEP (MEP ID = i) during


an interval equal to 3.5 times the CCM transmission period.

0x1007

RDI Detected On

A MEP receives a CCM frame with the RDI field set.

0x1008

Unexpected MD Level On

A MEP receives a CCM frame with incorrect MEG Level.

0x1009

Unexpected MD Level Off

During an interval equal to 3.5 times the CCM transmission period,


the MEP does not receive CCM frames with incorrect MEG Level.

0x100A

Frame Loss Ratio On

The number of service frames not delivered divided by the total


number of service frames during time interval T, where the number
of service frames not delivered is the difference between the
number of service frames arriving at the ingress ETH flow point and
the number of service frames delivered at the egress ETH flow point
in a point-to-point ETH connection.

0x100C

Frames Above Delay On

Frame Delay can be specified as round-trip delay for a frame, where


Frame Delay is defined as the time elapsed since the start of
transmission of the first bit of the frame by a source node until the
reception of the last bit of the loop backed frame by the same
source node, when the loopback is performed at the frame's
destination node.

0x100
D

Frames Above Delay Off

Frame Loss Ratio Threshold has been reached (exceeded / dropped


below)

0x100E

Frames Above Delay Var On

Frame Delay Variation is a measure of the variations in the Frame


Delay between a pair of service frames, where the service frames
belong to the same CoS instance on a point-to-point ETH
connection.

0x1010

Unavailability Ratio
Dropped On

The total number of unavailable seconds divided by the elapsed


time, and the defect is on if the unavailability ratio threshold is

RICi-16 Ver. 2.5

Handling Alarms and Traps

6-21

Chapter 6 Monitoring and Diagnostics


Code

Event

Installation and Operation Manual


Description
exceeded.

0x1011

Unavailability Ratio
Dropped Off

The exit criteria of the above, i.e. when the ratio is below threshold.

Refer to Table 6-10 for the list of traps sent by RICi-16


Table 6-10. Traps List
Trap

Description

OID

coldStart

The unit has been restarted

1.3.6.1.6.3.1.1.5.1

authenticationFailure

User authentication has failed

1.3.6.1.6.3.1.1.5.5

linkDown

Interface has been disconnected

1.3.6.1.6.3.1.1.5.3

linkUp

Interface has been connected

1.3.6.1.6.3.1.1.5.4

risingAlarm

User-set threshold for OAM ag


alarm has been exceeded

1.3.6.1.2.1.16.0.1

fallingAlarm

User-set threshold for OAM ag


alarm is no longer exceeded

1.3.6.1.2.1.16.0.2

dsx1LineStatusChange

Status change of E1/T1 ports

1.3.6.1.2.1.10.18.15.0.1

tftpStatusChangeTrap

TFTP operation has successfully


completed or has failed

1.3.6.1.4.1.164.6.1.0.1

agnStatusChangeTrap

The device status has changed

1.3.6.1.4.1.164.6.1.0.2

prtStatusChangeTrap

SFP module is removed or inserted

1.3.6.1.4.1.164.6.1.0.3

agnPowerFailureTrap

Power failure occurred

1.3.6.1.4.1.164.6.1.0.13

ethOamCfmDefectCondition

Status change of OAM ag MEP

1.3.6.1.4.1.164.3.1.6.1.3.0.1

dsx3LineStatusChange

Status change of T3 ports

1.3.6.1.2.1.10.30.15.0.1

prtLoopDetectTrap

Loop detected/cleared on Ethernet


or GFP port

1.3.6.1.4.1.164.6.1.0.32

To clear the event log:

6-22

In the Event Log screen, press <x>.

Handling Alarms and Traps

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Displaying Syslog Statistics

To access the Syslog Statistics:


1. In the Main menu, navigate to Monitoring > System > Syslog Statistics.
The Syslog Statistics screen appears as illustrated in Figure 6-21.

RICi-16
Monitoring > System > Syslog Statistics
Total Tx Messages
Unqueued Dropped Messages

(0)
(4)

>
c - Clear
ESC-Previous menu; !-Main menu; &-Exit;

?-help

Figure 6-21. Typical Log File

To clear the Syslog:

In the Syslog Statistics screen, press <c>.

6.3

Testing the RICi-16 Unit

RICi-16 checks network integrity by running a number of tests. All RICi-16


network integrity testing can be performed from the Diagnostics menu.
You can perform the following diagnostics tests:

RICi-16 Ver. 2.5

Ping

Trace route

Cable test

T1 loopback

T3 loopback

BERT

OAM test

Testing the RICi-16 Unit

6-23

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

Running a Ping Test


You can ping the remote IP host to check the IP connectivity.

To ping an IP host:
1. In the Main menu, navigate to Diagnostics > Ping.
The Ping menu appears as illustrated in Figure 6-22.
2. In the Ping menu, configure the following:

Destination IP Address. This is the IP address of the host that you intend
to ping. Use values between 0.0.0.0 and 255. 255. 255. 255.

Number of Frames to Send. Select 0 to send a continuous stream of


frames, or 1-50 to send a specified number of frames.

3. To start sending pings, select Send Ping.


The results are displayed in the lower scrolling message window.
4. To stop sending pings, select Stop Ping.
RICi-16
Diagnostics > Ping
1.
2.
3.
4.

Destination IP Address
Number of Frames to Send [0-50]
Send Ping
Stop Ping

... (0.0.0.0)
... (10)

>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-22. Ping Menu

Tracing the Route


This diagnostic utility traces the route through the network from RICi-16 to the
destination host.

To trace a route:
1. In the Main menu, navigate to Diagnostics > Trace Route.
The Trace Route menu appears as illustrated in Figure 6-23.
2. In the Trace Route menu, select Destination IP Address and enter the IP
address of the host to which you intend to trace the route.
3. To start tracing, select Display Trace Route.
RICi-16 starts tracing the route, displaying the IP addresses of all hop
nodes.
4. To stop the tracing, select Stop Trace Route.

6-24

Testing the RICi-16 Unit

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

RICi-16
Diagnostics > Trace Route
1. Destination IP Address
2. Display Trace Route
3. Stop Trace Route

... (0.0.0.0)

>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-23. Trace Route Menu

Running a Cable Test


This diagnostic can be used to check the quality of the Tx/Rx cables, connectors
and terminations by running a cable test.

To run the cable test:


1. In the Main menu, navigate to Diagnostics > Cable Test.
The Cable Test menu appears as illustrated in Figure 6-24.
2. From the Cable Test menu, type F to select the RICi-16 user port for the cable
that you intend to test.
3. Select the Start Test command to initiate the virtual cable test on the
selected port.
The virtual cable test results are displayed for receive and transmit wires:

RICi-16 Ver. 2.5

Tx/Rx test results:


Fail:

Tx/Rx cable has a non-compliant termination i.e. less than


85 or greater than 115

Normal:

Tx/Rx cable is normal and has a termination between the


IEEE specified limits of 85 to 115

Open:

Tx/Rx cable is not terminated

Short:

Tx/Rx cable is shorted

Rx/Tx distance of reflection: Approximate distance to the location of a


cable break or short in meters.

Testing the RICi-16 Unit

6-25

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

RICi-16
Diagnostics > Cable Test
Port

>

(3)

Tx
Tx
Rx
Rx

>
...
>
...

(Normal)
(2m)
(Normal)
(2m)

>

(Start Test)

Test Result
Distance of Reflection
Test Result
Distance of Reflection

1. Command
>
f Forward;
b-Backwards
>ESC-prev.menu; !-main menu; &-exit

1 Mngr/s

Figure 6-24. Virtual Cable Test Menu

Running Loopback Tests


Testing E1/T1 Links
This diagnostic utility performs remote loopback tests on the E1/T1 links in order
to determine the source of a break in the data flow. These loopbacks are
performed on the device toward the TDM network.

To execute a loopback test on an E1/T1 link:


1. In the Main menu, navigate to Diagnostics > E1/T1 Loopback.
The E1/T1 Loopback menu appears as illustrated in Figure 6-25.
2. Navigate to the E1/T1 link to test, by using f and b.
3. Select the Loopback State and specify Remote to perform remote loopback
or Disable to disable loopback testing.
4. Select Duration and enter a value between 0 and 3600 to specify how many
seconds to run the loopback test.
RICi-16
Diagnostics > E1/T1 Loopback
Port [1 4]

(1)

1. Loopback State
(Disable)
2. Duration (sec)[0 3600] ... (60)
>
f-Forwards; b-Backwards
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

1 M/ 1 C

Figure 6-25. E1/T1 Loopback Menu

6-26

Testing the RICi-16 Unit

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Testing T3 Links
This diagnostic utility performs remote loopback tests on the T3 links in order to
determine the source of a break in the data flow. These loopbacks are performed
on the device toward the TDM network.

To execute a loopback test on a T3 link:


1. In the Main menu, navigate to Diagnostics > T3 Loopback.
The T3 Loopback menu appears as illustrated in Figure 6-26.
2. Navigate to the T3 link to test, by using f and b.
3. Select the Loopback State and specify Remote to perform remote loopback
or Disable to disable loopback testing.
4. Select Duration and enter a value between 0 and 3600 to specify how many
seconds to run the loopback test.
RICi-16
Diagnostics> T3 Loopback
Port

(1)

1. Loopback State
(Disable)
2. Duration (sec)[0 3600] ... (60)
>
f-Forward; b-Backwards
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

1 M/ 1 C

Figure 6-26. T3 Loopback Menu

Local Loopback
RICi-16 supports FDL (facility data link)-activated local loopback (LLB) code only.
This means that when RICi-16 receives a loop up/down pattern it is configured on
the receiving port towards the TDM network.

Performing Bit Error Rate Test (BERT)


Testing E1/T1 Physical Layers
This diagnostics utility performs a Bit Error Rate Test (BERT) to check that the
E1/T1 physical layer is free of errors.

To perform a Bit Error Rate Test on the E1/T1 physical layer:


1. In the Main menu, navigate to Diagnostics > BERT
2. Select E1/T1.
The BERT E1/T1 menu appears as illustrated in Figure 6-27.
3. Navigate to the E1/T1 port to test, by using <f> and <b>.

RICi-16 Ver. 2.5

Testing the RICi-16 Unit

6-27

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

4. Define the pattern according to your testing requirements as illustrated in


Figure 6-26.
5. Select Send BERT and set it to On to start the test.
6. Select Save.
The test starts. If errors occur, Bit Error Count indicates how many errors.
7. If desired, select Inject Error to inject an error.
Indication of inject error is shown in the lower scrolling message window,
as illustrated in Figure 6-28.
RICi-16
Main Menu > Diagnostics > BERT > T1
Port [1-4]

(1)

1. Pattern
2. Send BERT

>

(215-1)
(OFF)

>
f-Forward b-Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-27. BERT Menu


RICi-16
Main Menu > Diagnostics > BERT
Port
Sync State
Bit Error Count
1. Pattern
2. Send BERT
3. Inject Error

(1)
> (Not Sync)
(0)
> (215-1)
(ON)

>
f-Forward b-Backward
ESC-Previous menu; !-Main menu; &-Exit; ?-Help
--------------------------------------------------------Inject Error
Inject Error

Figure 6-28. BERT Menu with Inject Error

6-28

Testing the RICi-16 Unit

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Table 6-11. BERT Parameters


Parameter

Description

Possible Values

Port

Index of E1/T1 port

1Number of E1/T1 ports


(4 or 8)

Sync State

E1/T1 port synchronization status. This parameter is


read-only and cannot be configured.

Not Sync
Sync

Note: The BERT is executed only if Sync State is


Sync.
Bit Error Count

Number of bit errors occurred in test. This


parameter is read-only and cannot be configured

0-Number of bit errors

Pattern

Bit pattern to send

2^11-1
QRSS
2^15-1

Send BERT

Set to On to start the test


Set to Off to stop the test.

On
Off

Inject Error

Select this to inject an error into the test

Testing T3 Physical Layers


This diagnostics utility performs a Bit Error Rate Test (BERT) to check that the T3
physical layer is free of errors.

To perform a Bit Error Rate Test on the T3 physical layer:


1. In the Main menu, navigate to Diagnostics > BERT
2. Select T3.
3. The BERT T3 menu appears as illustrated in Figure 6-29.
4. Navigate to the T3 port to test, by using <f> and <b>.
5. Define the pattern according to your testing requirements as illustrated in
Table 6-12.
6. Select Send BERT and set it to On to start the test.
7. Select Save.
The test starts. If errors occur, Bit Error Count indicates how many errors.
RICi-16
Main Menu > Diagnostics > BERT > T3
Port
Sync State
Bit Error Count
1. Pattern
2. Send BERT

(1)
> (Not Sync)
(0)
> (215-1)
(Off)

f-Forward b-Backward
>ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-29. BERT Menu


RICi-16 Ver. 2.5

Testing the RICi-16 Unit

6-29

Chapter 6 Monitoring and Diagnostics

Installation and Operation Manual

Table 6-12. BERT Parameters


Parameter

Description

Possible Values

Port

Index of T3 port

1Number of T3 ports (4)

Sync State

T3 port synchronization status. This


parameter is read-only and cannot be
configured.

Not Sync
Sync

Note: The BERT is executed only if Sync


State is Sync.
Bit Error Count

Number of bit errors occurred in test.


This parameter is read-only and cannot
be configured

0-Number of bit errors

Pattern

Bit pattern to send

2^11-1
QRSS
2^15-1

Send BERT

Set to On to start the test


Set to Off to stop the test.

On
Off

Running OAM Tests


This diagnostic utility traces the OAM monitoring statistics on selected virtual
Ethernet connections (flows). You can initiate a loopback and trace the OAM
monitoring statistics according to the selected maintenance end point (MEP).

To perform a loopback:
1. From the OAM Tests menu (Diagnostics > OAM Tests), select Loopback.
The Loopback menu appears as illustrated in Figure 6-30.
2. Define the test parameters according to Table 6-13.
RICi-16
Main Menu > Diagnostics > OAM Tests > Loopback
1. MD ID
2. MA ID
3. MEP ID [1-8191]

... (1)
... (1)
... (255)

>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-30. Loopback Menu

6-30

Testing the RICi-16 Unit

RICi-16 Ver. 2.5

Installation and Operation Manual

Chapter 6 Monitoring and Diagnostics

Table 6-13. Loopback Menu


Parameter

Description

Possible Values

MD ID

The ID of the maintanance domain

18

MA ID

The ID of the MAC address

MEP ID

ID of the maintenance endpoint, terminating the


maintenance entity. If set to 0, no maintenance end
point (MEP) is assigned.

1-8191

Default: 0

To trace OAM monitoring statistics:


1. From the OAM Tests menu (Diagnostics > OAM Tests), select Link Trace.
The Link Trace menu appears as illustrated in Figure 6-31.
2. Define the test parameters according to Table 6-14.
3. Select Results to view the OAM monitoring statistics.
RICi-16
Main Menu > Diagnostics > OAM Tests > Link Trace
1.
2.
3.
4.

MD ID
MA ID
MEP ID [1-8191]
Results

... (1)
... (1)
... (255)
[]

>
ESC-Previous menu; !-Main menu; &-Exit; ?-Help

Figure 6-31. Link Trace Menu


Table 6-14. Link Trace Menu
Parameter

Decription

Possible Values

MD ID

The ID of the maintanance domain

18

MA ID

The ID of the MAC address

MEP ID

ID of the maintenance endpoint, terminating the


maintenance entity. If set to 0, no maintenance end
point (MEP) is assigned.

1 65535

Default: 0

RICi-16 Ver. 2.5

Testing the RICi-16 Unit

6-31

Chapter 6 Monitoring and Diagnostics

6.4

Installation and Operation Manual

Troubleshooting

Use the chart shown in Table 6-15 to identify and remedy problems in unit
operation.

Table 6-15. Troubleshooting Chart


Fault

Probable Cause

Remedial Action

Power LED off

No power supplied to unit.

Check the power source.

Check whether the power cable is


connected and correctly wired.

Check whether the cable is


connected and correctly wired.

Check the switch and RICi-16s


Ethernet port configuration
(negotiation, rate, duplex mode).

Use the event log to check events.

Check whether the cable is


connected and correctly wired.

Check the E1/T1 physical


connection (use loopbacks).

Check the configuration of the


E1/T1 lines at local and remote
sites.

Use the event log to check events.

Use the System Interface Status


screen for assistance. All active
ports that show ActivationUp,
should show OperationUp.

Use the log file to check events.

Check RICi-16s configuration and,


if necessary, other RICi-16
parameters.

Check timing settings.

Ethernet Link LED off

E1/T1 local or remote Sync


Loss LED on

No traffic flow between two


units

Partial Traffic Flow

No Ethernet Link detected.

The rate or the duplex mode of


the Ethernet ports on the
switch and RICi-16 do not
match.

No E1/T1 Link detected at the local


or remote site.

Configuration or logical layer


problems.

Timing configuration is not


properly set.

6.5

Technical Support

Technical support for this product can be obtained from the local distributor from
whom it was purchased.
For further information, please contact the RAD distributor nearest you or one of
RAD's offices worldwide. This information can be found at www.rad.com. (Offices
About RAD > Worldwide Offices; Distributors Where to Buy > End Users).

6-32

Technical Support

RICi-16 Ver. 2.5

Appendix B
Boot Sequence and
Downloading Software
RICi-16 allows you to download software. In order to do so, you have to connect
an ASCII terminal to RICi-16s Control port.
Software is stored in the in two separate sectors on the flash memory, in the
boot sector and in the file system. The boot sector includes a boot program that
calls the rest of the program from the file system.
The file system can hold two compressed copies of the RICi-16 code. One copy is
called the operating file, and the other one is called the backup file. The
operating file is the default-executable RICi-16 code. The backup file is used
whenever the operating file is absent or corrupted.

B.1

Booting RICi-16

RICi-16 boots automatically. Once powered up, no further user intervention is


required, except when the user wants to access the file system to modify or
update the software or the RICi-16 configuration.

Accessing the Boot Manager


The Boot Manager menu is an option that allows the user to perform basic file
transfer operations. These operations are all optional.

To access the Boot Manager menu:

Press <Enter> several times immediately after powering RICi-16 up.


The Boot Manager menu appears as illustrated in Figure B-1.

RICi-16 Ver. 2.5

Booting RICi-16

B-1

Appendix B Boot Sequence and Downloading Software

RICi-16 Installation and Operation Manual

RICi-XN Boot Version 1.10 (Dec 31 2007)


Boot manager version 10.07 (Dec 31 2007)
0
1
2
3
4
5
6
7
8
9

Exit boot-manager
Dir
Set active software copy
Delete software Copy
Download boot manager or an application by XMODEM
Format flash
Show basic hardware information
Reset board
System configuration.
Download boot manager or an application by TFTP

Select:

Figure B-1. Typical Boot Manager Menu


From the Boot Manager menu, you can:

List all files stored in the flash memory

Exchange the operating and backup files

Delete the operating file; the backup file becomes the operating file

Download a new operating file via XMODEM; the previous operating file is
saved as the backup file

Delete all software and configuration files

Display basic hardware information such as RAM, ROM size etc.

Reset RICi-16

Configure the IP address, the IP mask and the default gateway for the
consecutively downloading via TFTP.

If you choose to exchange or delete a file, you are prompted for confirmation.

B.2

Transferring the Software and Configuration


Files

New software releases are distributed as separate files, which are downloaded to
RICi-16 using the XMODEM protocol or TFTP from the Boot Manager menu.
Alternatively, you can download a new software release via TFTP, when the
RICi-16 management software is already running (Main menu > Utilities > File
Transfer).
The TFTP protocol can also be used for uploading configuration files that contain
the RICi-16 database to the management station. When RICi-16 is running,
administrators can use this capability to distribute verified configuration files to
all other units that use the similar configuration.

B-2

Transferring the Software and Configuration Files

RICi-16 Ver. 2.5

RICi-16 Installation and Operation Manual

Appendix B Boot Sequence and Downloading Software

Downloading Application Files via XMODEM


Use the XMODEM protocol to download applications from the Boot Manager
menu.

To download application file via XMODEM:


1. Configure your ASCII terminal or terminal emulation utility running on your PC
to a data rate of 115.2 kbps.
2. Enter the Boot Manager menu.
The Boot Manager menu appears as illustrated in Figure B-1.
3. From the Boot Manager menu, select Download Files or an Application by
XMODEM.
RICi-16 displays the following message:
Select Copy number for download (0)
4. Enter the number associated with the backup partition, 0 or 1.
RICi-16 responds with the following string:
Please start the XMODEM download.
5. Start sending the application file to RICi-16 using the XMODEM utility of your
terminal application.
Once completed, RICi-16 saves the new release as an active partition, the
previously active partition becomes the backup partition and the boot
sequence continues normally.
In case downloading fails, the partially downloaded file is erased and only the
active software file remains in the flash memory.

Downloading Application Files via TFTP

To download application file via TFTP


1. From the Boot Manager menu, select System Configuration.
2. Configure the IIP address, the IP mask and the default gateway. These
parameters are only valid for the TFTP file transfer via the Boot Manager.
3. Start a TFTP application and configure the TFTP communication parameters as
follows:

Connection timeout more than 30 seconds to prevent an automatic


disconnection during the backup partition deletion (about 25 seconds)

Block size 512 bytes

UDP port 69.

4. Select a local software release file to download.


5. Enter the TFTP server IP address.
6. Start downloading.
RICi-16 erases the backup partition. Once completed, RICi-16 saves the
new release as an active partition. The previously active partition
becomes the backup partition.

RICi-16 Ver. 2.5

Transferring the Software and Configuration Files

B-3

Appendix B Boot Sequence and Downloading Software

B-4

Transferring the Software and Configuration Files

RICi-16 Installation and Operation Manual

RICi-16 Ver. 2.5

Appendix C
Operation, Administration
and Maintenance (OAM)
This appendix describes the Ethernet OAM functionality of RICi-16.

C.1

Introduction

Currently RICi-16 support pre-standard implementation of Ethernet OAM based


on Y.1731 and standard implementation based on Y.1731 and IEEE P802.1ag. The
pre-standard implementation is only used for performance measurements when
using two RAD units working opposite each other or when working against a RAD
that runs an older version of RADs Ethernet OAM software. This appendix
describes the pre-standard implementation. The standard implementation can be
found in the standards Y.1731 and IEEE P802.1ag documents.
RICi-16 has the following capabilities for providing operation, administration, and
maintenance (OAM) in the packet-switched networks:

Continuity check

Non-intrusive loopback which used to detect loss of bidirectional continuity

Performance measurements (per service).

Table C-1 lists the Ethernet OAM-related terms used in the appendix.
Table C-1. Ethernet OAM Terminology

RICi-16 Ver. 2.5

Term

Description

UNI

User Network Interface. The physical demarcation point


between the responsibility of the Service Provider and the
responsibility of the Subscriber

UNI_C

Customer side of a UNI link

UNI_N

Network side of a UNI link

Service frame

An Ethernet frame transmitted across the UNI toward the


Service Provider or an Ethernet frame transmitted across the
UNI toward the Subscriber.

Flow

Ethernet Virtual Connection : An association of two or more


UNIs that limits the exchange of Service Frames to UNIs in the
Ethernet Virtual Connection

Point-to-point Flow

Flow connecting exactly two UNIs

Introduction

C-1

Appendix C Operation, Administration and Maintenance (OAM)

Installation and Operation Manual

Term

Description

Multipoint-to-Multipoint
Flow

Flow connecting two or more UNIs

Service Instance / Class


of service (CoS)

A set of Service Frames that have a commitment from the


Service Provider to receive a particular level of performance

Service Instance
Identifier (CoS ID)

Service Frame delivery performance is specified for all Service


Frames transported within a flow with a particular Class of
Service instance. The Class of Service instance is identified by a
Class of Service Identifier associated with each Service Frame
(Class of service can be identified by more than one
parameter/frame attribute)

MEP

Proactive OAM reference point which is capable to initiate and


terminate proactive OAM frames. MEP is also capable to initiate
and react to diagnostics OAM frames.

MIP

A provisioned OAM reference point which is capable to respond


to diagnostics OAM frames initiated by the MEP.

MEP Service Instance


Source

The receiver of OAM frames in each Service Instance

MEP Service Instance


Destination

The transmitter of OAM frames in each Service Instance

C.2

Reference Architecture

Figure C-1 illustrates two OAM flows:

OAM flow originating from the CPE


The CPE-to-CPE OAM flow is transferred transparently by RICi-16 and treated
as data.

OAM flow originating from the RICi-16 devices.


The RICi-16 OAM flow runs on a data flow on the same VLAN.
The RICi-16 units terminate the OAM flow and can be referred as a
Maintenance Entity (ME). Each device supports up to 8 such MEs. In this case,
the RICi-16 units act as MEPs (Maintenance End-Points) and not as a MIP
(Maintenance Intermediate Points) and all measurements are performed on
the UNI_N to UNI_N segment.

C-2

Reference Architecture

RICi-16 Ver. 2.5

Installation and Operation Manual

Appendix C Operation, Administration and Maintenance (OAM)

Figure C-1. OAM Architecture

Handling of OAM Levels


UNI_C to UNI_N Direction
In the UNI_C to UNI_N direction RICi-16 blocks all OAM messages with OAM level
greater than 2. Messages with other OAM levels are passed transparently.

Network Ingress to UNI_N Direction


All OAM messages coming from the network ingress with the ETX MAC address or
with the special OAM multicast address are sent to the CPU. All other OAM
messages are passed transparently to the user ports as per the respective flow
definition.

C.3

OAM Entities

This section describes the OAM entities hierarchy. Figure C-2 illustrates the
relationship between UNI, flow and Service Instance (COS ID), when one or more
service instances belong to one flow and one or more flow belong to a UNI. From
the OAM perspective, the continuity messages and defects are activated per flow,
and the PM is activated per service instance.

Note

A flow can belong only to one UNI in the same RICi-16.

Figure C-2. UNI, Flow and Service Instance (COS ID)


Figure C-3, Figure C-4 and Figure C-5 illustrate different combinations of UNIs,
flows and service instances. Each UNI contains at least one flow, which contain at
least one service instance.

RICi-16 Ver. 2.5

In the one flow per UNI case (Figure C-3), the PM and CC are transmitted
once.
OAM Entities

C-3

Appendix C Operation, Administration and Maintenance (OAM)

Installation and Operation Manual

Figure C-3. One Flow per UNI

In case of multiple flows per UNI (Figure C-4), PM and CC are transmitted
three times.

Figure C-4. Multiple Flows per UNI

In case of one flow and multiple CoS (Service Instances) per UNI (Figure C-5),
the PM is transmitted three times and the CC once.

Figure C-5. One Flow and Multiple CoS (Service Instances) per UNI

C.4

OAM Flows

Figure C-6 illustrates a typical OAM traffic flow. The OAM message is transmitted
from the source MEP 1 to the destination MEP 2 and the reply is transmitted back
The source is also a destination for messages from the other direction.
The OAM interval is one second, so each NTU transmits one request and one
reply and receive one request and one reply. Total of four messages are
transmitted per second per service instance.
OAM Message
Request
MEP 1

Source

MEP 2
OAM Message
Reply

Destination

Figure C-6. OAM Flow

C-4

OAM Flows

RICi-16 Ver. 2.5

Installation and Operation Manual

Appendix C Operation, Administration and Maintenance (OAM)

OAM Messages Addressing


The OAM defines two modes of addressing, unicast and multicast. Unicast
addressing is used for point-to-point connections, while multicast addressing is
used in cases where the MAC address of the destination MEP is not known.

OAM Message Association


On the receiver side the OAM frame is associated with a flow and a service.

Flow Association
When an OAM frame is associated with a flow, the following steps are performed:

Request message reception


When a request message is received, the VLAN is extracted to find the Flow
ID. The Flow ID found at the receiver is compared against the Flow ID in the
frame. If the IDs are equal, further service association is made. If it is not
found, the Flow ID no match notification is returned in the reply message.

Reply message reception


When a reply message is received, the VLAN is extracted to find the Flow ID.
The Flow ID found at the receiver is compared against the Flow ID in the
frame. If the IDs are equal, further service association is made. If it is not
found, the frame is discarded and connectivity alarm is issued.

Service Association
When an OAM frame is associated with a service, the following steps are
performed:

Request message reception


The class of service characteristics are extracted from the frame and must be
matched to an entry in the flows <-> services table at the receiver. If they are
matched, the frame is processed. If not, the service ID is returned with the
Not Found notification.

Reply message reception


The class of service characteristics are extracted from the frame and must be
matched to an entry in the flow <-> services table at the receiver. If they are
matched, the frame is processed. If not, the frame is discarded.

Ethernet Loopback (ETH-LB)


The ETH-LB can be used to verify connectivity. The ETH-LB is performed by
sending a request ETH-LB message to the remote unit and expecting an ETH-LB
reply message back to verify connectivity. When the insertion rate of ETH-LB
messages is much slower compared to data rate between the flow points, ETH-LB
is suitable to perform in-service connectivity verification and to measure round
trip delays.
The message is initiated by the local device and runs periodically making it
suitable for fault detection.
RICi-16 Ver. 2.5

OAM Flows

C-5

Appendix C Operation, Administration and Maintenance (OAM)

Installation and Operation Manual

Unicast ETH-LB request message is sent from a MEP to a specific MEP (remote
device). The DA of the request message is a unicast MAC address of destination
device. Upon receipt of the request message, the MEP responds with unicast ETHLB reply message. The DA of the reply message is a unicast MAC address of
requesting device, learned from request message.

Continuity Check (ETH-CC)


Ethernet Continuity Check (ETH-CC) can be used to detect continuity failures
across flows between a given pair of edge service point on a flow. Continuity
failures are caused by:

Major failures (link failure, device failure, network path failure etc)

Minor failures (software failure, memory corruption, incorrect configuration


etc).

The ETH-CC signal is generated by one MEP. Upon receipt of the first ETH-CC
signal from a sending MEP, the receiving MEP detects continuity with sending MEP
and expects to receive further periodic ETH-CC signals. Once the receiving MEP
stops receiving periodic ETH-CC signals from sending MEP, it declares continuity
failure. The MEP that detects the continuity failure notifies the operator by
sending an alarm or a trap.

OAM Procedures
This section discusses the continuity check (CC) and the performance
measurement (PM) procedures.

Continuity Check Procedure


The loopback message and the ETH-CC messages are used for continuity check. In
case the services are defined and PM collection is enabled, they are also used to
carry PM messages. If PM collection is disabled, the messages are used for
continuity check only.
If the RX CC mode of the receiver is configured to CC-based, the continuity
detection is based on ETH-CC. If the mode is set to LB-based, the continuity
detection is based on ETH-LB. If the mode is disabled, the continuity detection is
not performed.

ETH-LB Method
The ETH-LB method includes the following elements:

Unicast ETH-LB transmission


Unicast ETH-LB request message is transmitted by a MEP (RICi-16) every
1 second. The transmitted Transaction Identifier is retained for at least
5 seconds after the unicast ETH-LB signal is transmitted. The Transaction
Identifier must be changed for every unicast ETH-LB message, and no
Transaction Identifier from the same MEP is allowed to be repeated within
1 minute.

C-6

OAM Flows

Unicast ETH-LB reception and reply transmission

RICi-16 Ver. 2.5

Installation and Operation Manual

Appendix C Operation, Administration and Maintenance (OAM)

Whenever a valid unicast ETH-LB request message is received by MEP


(RICi-16), a unicast ETH-LB reply message is generated and transmitted to the
requesting MEP. Every field in the unicast ETH-LB request message is copied
to the unicast ETH-LB reply message with the following exceptions:

The source and destination MAC addresses are swapped.

The OpCode field is vendor-specific oxFE.

The Flow and MEP ID are processed as follows: if the Flow/MEP ID do not
exist in the device, it changes them to No Match otherwise they are left
intact.

Unicast ETH-LB reply receipt


When a unicast ETH-LB reply message is received by a MEP (RICi-16)
diagnostic flow termination function, it examines the TLVs returned in the
unicast ETH-LB reply message. The signal is declared invalid if the TLVs do not
match those sent in the corresponding unicast ETH-LB request signal,
including MEP ID and Flow ID.

Continuity declarations
Loss of Continuity and Connectivity Mismatch states are declared by the
ETH-LB mechanism.

Loss of continuity declaration


After the source device sends an ETH-LB message a timer is set with a
3.52 second timeout. If the destination device does send reply within the
timeout, the source enters the loss of continuity state. Upon reply from
the destination, the source resets the timer to 23.5 seconds. Regarding
the continuity check message, the source checks only the Flow ID with
the MEP ID. When the source enters the loss of continuity state, it adds
24 to Unavailable Seconds counter. The 23.5 second period is calculated
as a sliding window.
Loss of continuity state is cleared after 3.52 seconds with at least
21 reply messages from the destination. In this case the Unavailable
Seconds counter decreased by 24.

Connectivity mismatch declaration


If the source Flow ID is not equal to the destination Flow ID as recorded
in the reply message for 10 consecutive times, the source enters in to
misconnection state.
Misconnection state is cleared after 10 consecutive reply messages with
the correct flow name from the destination.
The Unavailable counter is maintained by the service according to the
number of PM messages that did not receive replies. If a mismatch
notification is received to the LB request, the frame is dropped and reply
message is not sent. This is why the service becomes unavailable (no
reply) in case of mismatch and the unavailable counter is raised.

RICi-16 Ver. 2.5

OAM Flows

C-7

Appendix C Operation, Administration and Maintenance (OAM)

Installation and Operation Manual

ETH-CC Method
The ETH-CC method includes the following elements:

ETH-CC transmission
Unicast ETH-CC request message is transmitted by a MEP (RICi-16) every
1 second (depending on the configuration). The transmitted Transaction
Identifier is retained for at least 5 seconds after the unicast ETH-CC signal is
transmitted. The Transaction Identifier must be changed for every Unicast
ETH-CC message, and no Transaction Identifier from the same MEP is allowed
to be repeated within 1 minute.

Unicast ETH-CC reply receipt


When a unicast ETH-CC message is received by a MEP (RICi-16) diagnostic
flow termination function, it examines the TLVs returned in the unicast
ETH-CC message, and declares the signal invalid if the TLVs do not match
those sent in the corresponding exiting MEP ID and Flow ID.

Continuity declarations
Loss of Continuity and Connectivity Mismatch states are declared by the
ETH-CC mechanism.

Loss of continuity declaration


When the MEP receives the ETH-CC message a timer is set with a
3.5 seconds timeout. If the source does send another message during
this period, the destination enters the loss of continuity state. Upon
receipt of the ETH-CC message, the destination resets the timer to
3.5 seconds. Regarding the continuity check message, the destination
check the Flow ID and the MEP ID. When the destination enters the loss
of continuity state, it adds 4 to the Unavailable Seconds counter. The
3.5 second period is calculated as a sliding window.
Loss of continuity state is cleared after 3.5 seconds with at least
2 messages from the source. In this case the Unavailable Seconds counter
is decreased by 4.

Connectivity mismatch declaration


If the source Flow ID is not equal to the destination Flow ID for
10 consecutive times, the destination enters in to misconnection state.
Misconnection state is cleared after 10 consecutive reply messages with
the correct flow name from the source.
The Unavailable counter is maintained by the service according to the
number of PM messages that did not receive replies. If a mismatch
notification is received to the LB request, the frame is dropped and reply
message is not sent. This is why the service becomes unavailable (no
reply) in case of mismatch and the unavailable counter is raised.

C-8

OAM Flows

RICi-16 Ver. 2.5

Installation and Operation Manual

Appendix C Operation, Administration and Maintenance (OAM)

Performance Measurement
RICi-16 measures performance during 15-minute intervals. It also stores
performance history data of nthe last 24 hours (96 intervals). Table C-2 lists the
PM counters supported by RICi-16.

Table C-2. PM Counters


Parameter

Description

Frames Above Delay Obj.

Number of frames that exceeded delay objective

Frames Below Delay Obj.

Number of frames below or equal delay objective

Frames Above DV Obj.

Number of frames that exceeded delay variation objective

Frames Below DV Obj.

Number of frames below or equal delay variation objective

Frames Transmitted

Total number of OAM frames transmitted in the current interval

Frames Lost

Number of frames lost in the current interval

Unavailable Seconds

Number of seconds during which the service was unavailable in the current
interval

Elapsed Time

Time (in seconds) elapsed from beginning of the interval 0900

Min. RT Delay

Minimum round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)

Avg. RT Delay

Average round trip delay (in mseconds) calculated in the interval (or up to
elapsed time in current interval)

Max. RT Delay

Maximum round trip delay (in mseconds) calculated in the interval (or up
to elapsed time in current interval)

Avg. DV

Average delay variation (in mseconds) calculated in the interval (or up to


elapsed time in current interval)

Max. DV

Maximum delay variation (in mseconds) calculated in the interval (or up to


elapsed time in current interval)

OAM Transmitted Frames


Counter

Total number of OAM frames transmitted since the service was enabled

OAM Frames Loss Counter

Total number of OAM frames lost since the service was enabled

OAM Frame Loss Ratio

Total number of lost OAM frames divided by total number of transmitted


OAM frames since the service was enabled

Elapsed Time

Time (in seconds) elapsed since the service was enabled

Unavailable Seconds

Total number of unavailable seconds since the service was enabled

Unavailability Ratio

Total number of unavailable seconds divided by elapsed time

RICi-16 Ver. 2.5

RMON Statistics

C-9

Appendix C Operation, Administration and Maintenance (OAM)

C.5

Installation and Operation Manual

RMON Statistics

In addition to the regular statistics collection, RICi-16 supports proactive SLA


measurements per RICi-16 port, as per RMON-based RFC 2819. The device sends
reports when one of the available counters (physical layer or OAM) rise above or
drop below the set thresholds within the specified sampling period of time. These
reports can be sent as SNMP traps to the defined network management stations
or be written to the event log.
The following counters can be monitored:

C-10

Dropped Frames

Undersize Frames

Oversize Frames

Fragmented Frames

Jabbers

Frame Loss Ratio

Frames Above Delay

Frames Above Delay Variation

Unavailability Ratio.

RMON Statistics

RICi-16 Ver. 2.5

Index

A
AC power, connecting, 2-5
Aging, 1-9
Aging Process
VLANAware bridge, 1-11
VLANUnaware bridge, 1-13
Application, 1-2
Ethernet cellular backhauling, 5-1, 5-15
Ethernet services, 5-8
Application-level status
displaying, 6-9
B
BERT, 6-24, 6-26
Bit Error Rate Test, 6-24, 6-26
Boot Manager, B-1
Bridge, 1-3, 1-9
Ethernet access, 1-9
specifications, 1-24
VLAN Stripping mode, 1-13
VLANAware, 1-9
Bridge, internal
configuring, 4-42
C
Cables, 2-2
Choosing options
ConfiguRAD, 3-9
ConfiguRAD, 3-8
configuring access, 4-11
Configuration
ASCII terminal, 3-5
manager list, 4-15
Configuring
defining flows, 4-58
device information, 4-1
E1 ports, 4-31
Ethernet port, 4-26
fault propagation, 4-25
Flows, 4-57
IP host parameters, 4-2
L2CP Filtering Profile, 4-30
MAC Access Control, 4-28
ports, 4-26
QoS priorities, 4-48
T1 ports, 4-33, 4-35
terminal parameters, 4-65
user priorities, 4-48
Connecting
AC power, 2-5
DC power, 2-5

E1/T1 port, 2-3


terminal, 2-4
Connectivity tests, 6-21
Connectors, 2-2
Control interface
pinouts, A-2
Control Port, 3-5, See Terminal
specifications, 1-24
D
Date and time, 4-19
Date and Time
configuring, 4-19
DC power, connecting, 2-5
Default settings, 3-3
Device information, 4-1
Diagnostics, 6-1
connectivity tests, 6-21
loopback, E1/T1, 6-23
loopback, T3, 6-24
ping, 6-21
trace route, 6-22
VCT, 6-22
Dimensions, 1-25
E
E1 interface, 1-23
connecting the port, 2-3
default settings, 3-3
pinouts, A-2
E1 Interface
configuring, 4-31
E1/T1 status, 6-7
Environmental specifications, 1-26
Equipment
cables, 2-2
connectors, 2-2
hand tools, 2-2
power cable, 2-2
Ethernet. See Ethernet
access, 1-9
Ethernet interface
default settings, 3-3
pinouts, A-1
statistics, 6-13
Ethernet Interface, 1-2, 1-8
Ethernet Port, 4-26
Ethernet status, 6-5

I-1

Index

F
Fault Propagation, 4-25
File downloading, B-2
File transfer, 4-66, B-2
Flow, 1-4, 4-57
Flows, 4-57
defining, 4-58
Forwarding, 1-9
Forwarding Process
VLANAware bridge, 1-11
VLANUnaware bridge, 1-13
Front panel
LEDs, 3-2
G
GFP, 1-2
RX traffic, 1-16
Tx traffic, 1-14
GFP and VCG port status, 6-8
H
Host, 4-2
Host tagging
tagged, 4-3
untagged, 4-3
I
Indicators, 1-25
Ingress, 1-9
Ingress process
VLANAware bridge, 1-10
VLANUnaware bridge, 1-12
Installation, 2-1
Interfaces
pinouts
control, A-2
E1, A-2
Ethernet, A-1
statistics, 6-13
Internal bridge
configuring, 4-42
Inventory, 4-63
L
L2CP Filtering Profile, 4-30
LCAS, 1-2
Learning, 1-9
Learning Process
VLANAware bridge, 1-11
VLANUnaware bridge, 1-12
LEDs, 3-2
License pack
viewing details, 4-64
Log file, 6-19
Logical layer
Default configuration, 4-38
Logical ports
Configuration, 4-38
Logical-level status
displaying, 6-8
Login
I-2

Installation and Operation Manual


terminal, 3-6
Web browser, 3-9
Loopback
E1/T1, 6-23
T3, 6-24
M
MAC Access Control, 4-28
MAC port protection, 4-26
MAC table, 4-43
Management, 1-6, 1-21
access method, 4-11
functions, 1-6
SNMPv3, 4-4
via terminal port, 3-5
via Web browser, 3-8
Menu tree, 3-10
Menus
Management, 4-5
navigating, 3-9
Notification Entries, 4-7
reference, 3-10
SNMP Engine ID, 4-4
SNMPv1/v3 Mapping, 4-11
SNMPv3 Settings, 4-5
SNMPv3 Users, 4-6
Target Address, 4-10
Target Params, 4-9
Trap, 4-8
Virtual Cable Test, 6-23
Monitoring, 6-1
connected managers status, 6-3
Ethernet statistics, 6-13
log file, 6-19
MAC table, 6-9
port status, 6-5, 6-7
ports status, 6-8
statistics, 6-13
Status, 6-1
system messages, 6-19
Monitoring statistics, 1-24
N
Network Application Mode
configuring, 4-21
Network interface
default settings, 3-3
Network Operation Mode
configuring, 4-21
O
OAM, 4-61
Operation, 3-1
P
Package contents, 2-2
Password, 4-65
default, 3-6
Physical Ports, 4-26
Physical specifications, 1-25
Physical-level status
displaying, 6-5
Ping, 6-21
RICi-16 Ver. 2.5

Installation and Operation Manual


Pinouts, A-1
Pop-ups
blocking, 3-8
Port
protection, 4-36
Ports
E1/T1 port, 2-3
Power
installing hot-swappable unit, 2-6
Power cable, 2-2
Power supply
AC, 2-5
DC, 2-5
Powering down, 3-19
Powering up, 3-1
Protection status, 6-3
Q
Quality of service, 4-48
Quality of Service, 1-19
R
Resetting
device, 4-68
to factory defaults, 4-68
RS-232 port, 3-5
S
Screens
reset device, 4-68
Security, 1-21
Security Protocols, 1-6
Setting up, 2-1
Site requirements, 2-1
SNMP
configuring access, 4-11
SNMPv3, 4-4
Software
files, B-1
in flash memory, B-1
new releases, 4-66
updates, 4-66, B-2
versions, 4-66
Software license
viewing details, 4-64
Source clock, 4-17
Specifications
bridge, 1-24
control port, 1-24
dimensions, 1-25
environmental, 1-25
Statistics
E1/T1, 6-13
T3, 6-15
Statistics, 6-13
Ethernet, 6-13

RICi-16 Ver. 2.5

Index
System messages, 6-19
T
T1 interface, 1-23
connecting the port, 2-3
default settings, 3-3
pinouts, A-2
T1 Interface
configuring, 4-33, 4-35
T3 interface, 1-23
default settings, 3-3
T3 status, 6-7
Tables
navigating, 3-7
technical specifications
power, 1-25
Technical Specifications, 1-24
Telnet, 4-11
Terminal, 3-5
baud rate, 4-65
configuring, 3-5
connecting, 2-4
login, 3-6
parameters, 4-65
TFTP, 4-67, B-2
Trace route, 6-22
Transmission, 1-9
Transmission Process
VLANAware bridge, 1-12
VLANUnaware bridge, 1-13
Troubleshooting, 6-1
U
User interface
default settings, 3-3
User name, 4-65
Utilities
File transfer, 4-67
reset device, 4-68
V
VCAS, 1-2
VCT, 6-22
Virtual cable test, 6-22
VLANAware mode, 1-9
VLANUnaware mode, 1-12
W
WAN Interface, 1-8
Web browser, 3-8
login, 3-9
X
XMODEM, B-3

I-3

Index

I-4

Installation and Operation Manual

RICi-16 Ver. 2.5

Supplement

AC/DC Adapter
(AD) Plug
for DC Power Supply Connection

Note

Ignore this supplement if the unit is AC-powered.


Certain units are equipped with a wide-range
AC/DC power supply. These units are equipped
with a standard AC-type 3-prong power input
connector located on the unit rear panel. This
power input connector can be used for both AC
and DC voltage inputs.
For DC operation, a compatible straight or
90-degree AC/DC Adapter (AD) plug for attaching
to your DC power supply cable is supplied with
your RAD product (see Figure 1 and Figure 2).

Figure 1. Straight AD Plug

Connect the wires of your DC power supply cable


to the AD plug, according to the voltage polarity
and assembly instructions provided on page 2.

Figure 2. 90-Degree AD Plug


Caution

Prepare all connections to the AD plug before inserting it into the units power
connector.

Publication No. SUP-930-07/08

The Access Company

AC/DC Adapter (AD) Plug

To prepare the AD plug and connect it


to the DC power supply cable:
1. Loosen the cover screw on the bottom
of the AD plug to open it (see
Figure 3).
2. Run your DC power supply cable
through the removable cable guard
and through the open cable clamp.
3. Place each DC wire lead into the
appropriate AD plug wire terminal
according to the voltage polarity
mapping shown. Afterwards, tighten
the terminal screws closely.
4. Fit the cable guard in its slot and then
close the clamp over the cable.
Tighten the clamp screws to secure
the cable.
5. Reassemble the two halves of the AD
plug and tighten the cover screw.

Figure 3. AD Plug Details

6. Connect the assembled power supply


cable to the unit.

Note: You have to flip over the


non-90-degree AD plug type by
180 degrees to insert it into the unit.
After inserting it, verify that the blue
(negative) wire is connected to the
POWER and the brown (positive) wire is
connected to the RETURN.
Reversing the wire voltage polarity will not cause damage to the unit, but the
internal protection fuse will not function.

Warning

Always connect a ground wire to the AD plugs chassis (frame) ground


terminal. Connecting the unit without a protective ground, or interrupting the
grounding (for example, by using an extension power cord without a
grounding conductor) can damage the unit or the equipment connected to it!
The AD adapter is not intended for field wiring.

Supplement

Terminal Block
Connector
for DC Power Supply Connection

Note

Ignore this supplement if the unit is AC-powered.


Certain DC-powered units are equipped
with a plastic 3-pin VDC-IN power input
connector, located on the unit rear
panel. Different variations of the
connector are shown in Figure 1. All
are functionally identical.
0

Supplied with such units is a kit


including a mating Terminal Block (TB)
type connector plug for attaching to
your power supply cable.
Connect the wires of your power
supply cable to the TB plug, according
to the voltage polarity and assembly
instructions provided on the following
pages.

Caution

Figure 1. TB DC Input Connector Types


Appearing on Unit Panels

Prepare all connections to the TB plug before inserting it into the units VDC-IN
connector.

Publication No. SUP-220-06/08

The Access Company

Terminal Block Connector

To prepare and connect the power


supply cable with the TB Plug:

Note: Refer to Figure 2 for assistance.


1

1. Strip the insulation of your power


supply wires according to the
dimensions shown.
2. Place each wire lead into the
appropriate TB plug terminal according
to the voltage polarity mapping shown
in Figure 3. (If a terminal is not already
open, loosen its screw.) Afterwards,
tighten the three terminal screws to
close them.
2

3. Pull a nylon cable tie (supplied) around


the power supply cable to secure it
firmly to the TB plug grip, passing the
tie through the holes on the grip.

Figure 2. TB Plug Assembly

4. Isolate the exposed terminal


screws/wire leads using a plastic
sleeve or insulating tape to avoid a
short-circuit.
5. Connect the assembled power supply
cable to the unit by inserting the
TB plug into the units VDC-IN
connector until it snaps into place.

Figure 3. Mapping of the Power Supply Wire


Leads to the TB Plug Terminals

Reversing the wire voltage polarity can cause damage to the unit!

Warning

Always connect a ground wire to the TB plugs chassis (frame) ground


terminal. Connecting the unit without a protective ground, or interruption of
the grounding (for example, by using an extension power cord without a
grounding conductor) can cause harm to the unit or to the equipment
connected to it!

Terminal Block Connector

Note: Certain TB plugs are equipped with


captive screws for securing the assembled
cables TB plug to the units VDC-IN
connector (C and E types only). To secure
the plug, tighten the two screws on the
plug into the corresponding holes on the
sides of the input connector as shown in
Figure 4.
3

Figure 4. TB Plug with Captive Screws (optional)

To disconnect the TB plug:


1. If the TB plug is equipped with captive screws, loosen the captive screws
(see Figure 4).
4

2. If the units VDC-IN connector is type B, lift the locking latch (see Figure 1).
5

3. Pull out the TB plug carefully.

Caution Always lift the locking latch of type B connectors before disconnecting the
TB plug, to avoid damaging the TB plug.

Terminal Block Connector

24 Raoul Wallenberg Street, Tel Aviv 69719, Israel


Tel: +972-3-6458181, Fax +972-3-6483331, +972-3-6498250
E-mail: erika_y@rad.com, Web site: http://www.rad.com

Customer Response Form


RAD Data Communications would like your help in improving its product documentation.
Please complete and return this form by mail or by fax or send us an e-mail with your
comments.
Thank you for your assistance!

Manual Name:

RICi-16 Version 2.5

Publication Number:

506-200-10/12

Please grade the manual according to the following factors:

Excellent

Good

Fair

Poor

Very Poor

Installation instructions

Operating instructions

Manual organization

Illustrations

The manual as a whole

What did you like about the manual?

Error Report
Type of error(s) or
problem(s):

Incompatibility with product

Difficulty in understanding text

Regulatory information (Safety, Compliance, Warnings, etc.)

Difficulty in finding needed information

Missing information

Illogical flow of information

Style (spelling, grammar, references, etc.)

Appearance

Other

Please list the exact page numbers with the error(s), detail the errors you found (information missing,
unclear or inadequately explained, etc.) and attach the page to your fax, if necessary.

Please add any comments or suggestions you may have.

You are:

Who is your distributor?


Your name and company:
Job title:
Address:
Direct telephone number and extension:
Fax number:
E-mail:

Distributor

End user

VAR

Other

Publication No. 506-200-10/12

International Headquarters
24 Raoul Wallenberg Street
Tel Aviv 69719, Israel
Tel. 972-3-6458181
Fax 972-3-6498250, 6474436
E-mail market@rad.com

North America Headquarters


900 Corporate Drive
Mahwah, NJ 07430, USA
Tel. 201-5291100
Toll free 1-800-4447234
Fax 201-5295777
E-mail market@radusa.com

www.rad.com

Вам также может понравиться