Вы находитесь на странице: 1из 244

Title page

Alcatel-Lucent 1646
Synchronous Multiplexer (SM) | Release 2.3
User Provisioning Guide
3KC18078ADAATQZZA
Issue 1 | June 2013
Legal notice

Legal notice

Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective
owners.

The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright © 2013 Alcatel-Lucent. All rights reserved.

Notice

The information in this document is subject to change without notice. Although every effort has been made to make this document as accurate, complete, and
clear as possible, Alcatel-Lucent and its predecessors assume no responsibility for any errors that appear in this document.

Security Statement

In rare instances, unauthorized individuals make connections to the telecommunications network. In such an event, applicable tariffs require that the
customer pay all network charges for traffic. Alcatel-Lucent and its predecessors cannot be responsible for such charges and will not make any allowance or
give any credit for charges that result from unauthorized access.

Limited warranty

Alcatel-Lucent provides a limited warranty for this product. For more information, consult your local Alcatel-Lucent customer support team.

Ordering information

To order more copies of this document or other Alcatel-Lucent documents, please access the Online Customer Support (OLCS) (https://support.lucent.com).

Information product support

To comment on this information product, go to the Online Comment Form (http://www.alcatel-lucent-info.com/comments/enus/) or email your comments to
the Comments Hotline (comments@alcatel-lucent.com).
Contents

About this document


Purpose ......................................................................................................................................................................................... xxv
xxv

Intended audience ..................................................................................................................................................................... xxv


xxv

How to use this document ...................................................................................................................................................... xxv


xxv

Signal words ............................................................................................................................................................................. xxvii


xxvii

Conventions used ................................................................................................................................................................... xxvii


xxvii

Related information ............................................................................................................................................................... xxvii


xxvii

Technical support .................................................................................................................................................................. xxviii


xxviii

How to order ........................................................................................................................................................................... xxviii


xxviii

How to comment ................................................................................................................................................................... xxviii


xxviii

1 Getting Started

Overview ...................................................................................................................................................................................... 1-1


1-1

ZIC Functionality ...................................................................................................................................................................... 1-1


1-1

2 System Management

Overview ...................................................................................................................................................................................... 2-1


2-1

ZIC overview .............................................................................................................................................................................. 2-2


2-2

Procedure 2-1: Establish ZIC session ................................................................................................................................ 2-3


2-3

ZIC icons and symbols ........................................................................................................................................................... 2-5


2-5

Menus ............................................................................................................................................................................................ 2-6


2-6

Equipment menu ....................................................................................................................................................................... 2-7


2-7

Provider Bridge menu ............................................................................................................................................................. 2-8


2-8

Connection menu ...................................................................................................................................................................... 2-8


2-8

....................................................................................................................................................................................................................................
1646 SM iii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Contents

....................................................................................................................................................................................................................................
Data menu .................................................................................................................................................................................... 2-9
2-9

Communication menu ........................................................................................................................................................... 2-10


2-10

Alarms menu ............................................................................................................................................................................ 2-11


2-11

Protection menu ...................................................................................................................................................................... 2-11


2-11

Synchronization menu .......................................................................................................................................................... 2-12


2-12

System Management menu ................................................................................................................................................. 2-13


2-13

Security menu .......................................................................................................................................................................... 2-14


2-14

Tools menu ................................................................................................................................................................................ 2-15


2-15

Help menu ................................................................................................................................................................................. 2-15


2-15

3 Equipment management

Overview ...................................................................................................................................................................................... 3-1


3-1

Procedure 3-1: Configure a board ....................................................................................................................................... 3-1


3-1

Procedure 3-2: Refresh Tree ................................................................................................................................................. 3-5


3-5

Procedure 3-3: System Information ................................................................................................................................... 3-5


3-5

4 Connection

TDM Search ................................................................................................................................................................................ 4-1


4-1

Procedure 4-1: Search VCn cross-connection ................................................................................................................ 4-1


4-1

Procedure 4-2: Create Connection ...................................................................................................................................... 4-4


4-4

Procedure 4-3: Ethernet P2P XC ......................................................................................................................................... 4-9


4-9

Procedure 4-4: Ethernet Flow Based Switching ......................................................................................................... 4-11


4-11

Procedure 4-5: Search OverHead connection .............................................................................................................. 4-13


4-13

Procedure 4-6: Create OverHead Connection ............................................................................................................ 4-14


4-14

5 Ethernet Functions

Overview ...................................................................................................................................................................................... 5-1


5-1

Procedure 5-1: Traffic descriptor ........................................................................................................................................ 5-2


5-2

Procedure 5-2: Resource Availability ................................................................................................................................ 5-5


5-5

Procedure 5-3: VLAN Profile .............................................................................................................................................. 5-7


5-7

Procedure 5-4: Create color profile .................................................................................................................................... 5-9


5-9

....................................................................................................................................................................................................................................
iv 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Contents

....................................................................................................................................................................................................................................
Procedure 5-5: Bridge configuration ............................................................................................................................... 5-10
5-10

Procedure 5-6: IGMP management .................................................................................................................................. 5-11


5-11

Procedure 5-7: Global setting ............................................................................................................................................ 5-13


5-13

Procedure 5-8: Create maintenance domain ................................................................................................................. 5-13


5-13

Procedure 5-9: Create maintenance association .......................................................................................................... 5-15


5-15

Procedure 5-10: Search MEP ............................................................................................................................................. 5-17


5-17

Procedure 5-11: Create MEP .............................................................................................................................................. 5-19


5-19

Procedure 5-12: EFM tool ................................................................................................................................................... 5-21


5-21

Procedure 5-13: Configure EFM tool ............................................................................................................................. 5-22


5-22

Procedure 5-14: Create VLAN .......................................................................................................................................... 5-23


5-23

Procedure 5-15: ConfigureVLAN .................................................................................................................................... 5-24


5-24

Procedure 5-16: Dynamic filtering DB .......................................................................................................................... 5-26


5-26

Procedure 5-17: Configure static unicast filtering ..................................................................................................... 5-27


5-27

Procedure 5-18: Configure static multicast filtering ................................................................................................. 5-28


5-28

Procedure 5-19: Create ERP topology ............................................................................................................................ 5-29


5-29

Procedure 5-20: Create ELP ............................................................................................................................................... 5-36


5-36

6 Data Communication

Overview ...................................................................................................................................................................................... 6-1


6-1

DCC

Overview ...................................................................................................................................................................................... 6-2


6-2

Procedure 6-1: Network IF .................................................................................................................................................... 6-2


6-2

Procedure 6-2: XC Overhead ............................................................................................................................................... 6-3


6-3

DCN Phys. If

Overview ...................................................................................................................................................................................... 6-6


6-6

Procedure 6-3: IP Address ..................................................................................................................................................... 6-6


6-6

Procedure 6-4: LAN management ...................................................................................................................................... 6-7


6-7

IP tunnel management

Overview ...................................................................................................................................................................................... 6-8


6-8

....................................................................................................................................................................................................................................
1646 SM v
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Contents

....................................................................................................................................................................................................................................
Procedure 6-5: Administer IP tunnel .................................................................................................................................. 6-8
6-8

Procedure 6-6: Configure IP tunnel .................................................................................................................................... 6-9


6-9

Network domain

Overview ................................................................................................................................................................................... 6-11


6-11

Procedure 6-7: Configure IP route ................................................................................................................................... 6-11


6-11

Procedure 6-8: OSI management ...................................................................................................................................... 6-14


6-14

Management Access Control

Overview ................................................................................................................................................................................... 6-17


6-17

Procedure 6-9: Create MAC Access Control List (ACL) ........................................................................................ 6-17
6-17

7 Alarm Management

Overview ...................................................................................................................................................................................... 7-1


7-1

Procedure 7-1: TCA Profiles ................................................................................................................................................. 7-2


7-2

Procedure 7-2: Create ASAP ................................................................................................................................................ 7-3


7-3

Procedure 7-3: Modify or Delete an ASAP profile ...................................................................................................... 7-8


7-8

Procedure 7-4: ALM cutoff ................................................................................................................................................... 7-9


7-9

Procedure 7-5: ALM resynch. ............................................................................................................................................ 7-10


7-10

Procedure 7-6: Condition log ............................................................................................................................................. 7-11


7-11

Procedure 7-7: Housekeeping support ............................................................................................................................ 7-13


7-13

8 Synchronization

Overview ...................................................................................................................................................................................... 8-1


8-1

Synchronization menu ............................................................................................................................................................. 8-1


8-1

Procedure 8-1: Modify BITS-0 ............................................................................................................................................ 8-2


8-2

Procedure 8-2: Modify BITS-1 ............................................................................................................................................ 8-4


8-4

Procedure 8-3: Modify BITS-OUT0 .................................................................................................................................. 8-5


8-5

Procedure 8-4: Modify BITS-OUT1 .................................................................................................................................. 8-7


8-7

Procedure 8-5: Administer system timing BITS ............................................................................................................ 8-8


8-8

Synchronization outgoing ................................................................................................................................................... 8-16


8-16

....................................................................................................................................................................................................................................
vi 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Contents

....................................................................................................................................................................................................................................
9 Security

Overview ...................................................................................................................................................................................... 9-1


9-1

Procedure 9-1: Change user password ............................................................................................................................. 9-2


9-2

Procedure 9-2: Retrieve user information ........................................................................................................................ 9-3


9-3

Procedure 9-3: Create user account .................................................................................................................................... 9-3


9-3

Procedure 9-4: Change user account ................................................................................................................................. 9-5


9-5

Procedure 9-5: Modify account default settings ............................................................................................................ 9-8


9-8

Procedure 9-6: View current sessions ................................................................................................................................ 9-9


9-9

Procedure 9-7: Modify command privileges ................................................................................................................ 9-10


9-10

Procedure 9-8: Manage audit ............................................................................................................................................. 9-12


9-12

Procedure 9-9: Log settings ................................................................................................................................................ 9-14


9-14

Procedure 9-10: Modify in progress message settings ............................................................................................. 9-16


9-16

10 Provisioning: Detailed level Procedures

Overview ................................................................................................................................................................................... 10-1


10-1

Procedure 10-1: Log into the system .............................................................................................................................. 10-2


10-2

Procedure 10-2: Log out of the system .......................................................................................................................... 10-3


10-3

Procedure 10-3: Retrieve software version ................................................................................................................... 10-4


10-4

Procedure 10-4: In-Service Upgrade ............................................................................................................................... 10-6


10-6

Procedure 10-5: Initialize and Upgrade with a new release ................................................................................... 10-7
10-7

Procedure 10-6: DB management remote file copy ................................................................................................... 10-7


10-7

Procedure 10-7: DB management cancel remote file copy .................................................................................. 10-10


10-10

Procedure 10-8: Network Element management ...................................................................................................... 10-11


10-11

Procedure 10-9: LAC Management .............................................................................................................................. 10-12


10-12

Procedure 10-10: MAC File Collection ....................................................................................................................... 10-14


10-14

Procedure 10-11: Administer NTP ................................................................................................................................ 10-15


10-15

Procedure 10-12: Network IF .......................................................................................................................................... 10-18


10-18

Procedure 10-13: OSI ULC Report ............................................................................................................................... 10-20


10-20

Procedure 10-14: Create Overhead XC ....................................................................................................................... 10-21


10-21

Procedure 10-15: Create linear MSP ............................................................................................................................ 10-23


10-23
....................................................................................................................................................................................................................................
1646 SM vii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Contents

....................................................................................................................................................................................................................................
Procedure 10-16: Create MS-SPRing ........................................................................................................................... 10-25
10-25

Procedure 10-17: Create Provider Bridge Service ................................................................................................... 10-27


10-27

Procedure 10-18: LAG management ............................................................................................................................ 10-29


10-29

Procedure 10-19: IGMP Snooping ................................................................................................................................ 10-34


10-34

Procedure 10-20: Remove LAG member ................................................................................................................... 10-34


10-34

Procedure 10-21: Retrieve system information ........................................................................................................ 10-39


10-39

Procedure 10-22: Create IP route ................................................................................................................................... 10-40


10-40

Procedure 10-23: Create IP tunnel ................................................................................................................................. 10-42


10-42

Procedure 10-24: NE TL1 Parameter ........................................................................................................................... 10-44


10-44

Procedure 10-25: TL1 console ........................................................................................................................................ 10-44


10-44

Procedure 10-26: Create FTP Server Configuration ............................................................................................... 10-48


10-48

Glossary

Index

....................................................................................................................................................................................................................................
viii 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of tables

1 Signal words for hazard severity ...................................................................................................................... xxvii

3-1 Board xx panel parameters ..................................................................................................................................... 3-2

3-2 Board xx Restart panel parameters ..................................................................................................................... 3-3

3-3 System Information parameters ............................................................................................................................ 3-5

4-1 Connection panel ....................................................................................................................................................... 4-3


4-3

4-2 Create Connection panel ......................................................................................................................................... 4-7


4-7

4-3 P2P data connection panel parameters ............................................................................................................ 4-10

4-4 P2P data connection panel parameters ............................................................................................................ 4-12

4-5 OverHead Connection parameters .................................................................................................................... 4-14

5-1 Traffic descriptor panel parameters ..................................................................................................................... 5-2

5-2 Service type parameters .......................................................................................................................................... 5-3


5-3

5-3 Resource Management Pool parameters ........................................................................................................... 5-6

5-4 VLAN Protocol Profile panel parameters ......................................................................................................... 5-8

5-5 Color Profile panel parameters ............................................................................................................................. 5-9

5-6 Maintenance Domain panel parameters .......................................................................................................... 5-14

5-7 Maintenance Domain panel parameters .......................................................................................................... 5-15

5-8 Create Maintenance Association panel parameters .................................................................................... 5-16

5-9 Maintenance Domain panel parameters .......................................................................................................... 5-18

5-10 Maintenance Domain panel parameters .......................................................................................................... 5-19

5-11 Create MEP panel parameters ............................................................................................................................ 5-20

5-12 Modify VLAN parameters ................................................................................................................................... 5-25

5-13 Static Unicast Filtering Entry parameters ...................................................................................................... 5-27

....................................................................................................................................................................................................................................
1646 SM ix
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of tables

....................................................................................................................................................................................................................................
5-14 Static Multicast Filtering Entry parameters ................................................................................................... 5-28

5-15 ERP topology parameters ..................................................................................................................................... 5-30

5-16 The ERP Protection Group parameters ........................................................................................................... 5-33

5-17 Ethernet Linear Protection parameters ............................................................................................................ 5-37

6-1 Filter by parameters .................................................................................................................................................. 6-3


6-3

6-2 IP address of Network Element ............................................................................................................................ 6-4

6-3 Filter by parameters .................................................................................................................................................. 6-6


6-6

6-4 IP tunnel panel parameters ..................................................................................................................................... 6-8

6-5 IP Routing panel parameters ............................................................................................................................... 6-12

6-6 OSI area panel parameters ................................................................................................................................... 6-14

6-7 OS Address panel parameters ............................................................................................................................. 6-15

7-1 Create ASAP parameters ......................................................................................................................................... 7-7


7-7

7-2 Alarm log parameters ............................................................................................................................................ 7-12


7-12

7-3 Input points attributes panel parameters ......................................................................................................... 7-14

9-1 Create user account panel parameters ................................................................................................................ 9-4

9-2 Change User information window ...................................................................................................................... 9-7

9-3 Current sessions ....................................................................................................................................................... 9-10


9-10

10-1 Copy remote file panel parameters ................................................................................................................... 10-9

10-2 Cancel Copy of Remote File panel parameters .......................................................................................... 10-11

10-3 Lac state panel parameters ................................................................................................................................ 10-13

10-4 MAC File Collection panel parameters ........................................................................................................ 10-15

10-5 NE interface details parameters ....................................................................................................................... 10-19

10-6 NE interface details parameters ....................................................................................................................... 10-24

10-7 NE interface details parameters ....................................................................................................................... 10-26

10-8 Provider Bridge Service ..................................................................................................................................... 10-28

10-9 Link aggregation parameters ............................................................................................................................ 10-31

10-10 Link Aggregator configuration panel parameters ..................................................................................... 10-33

10-11 System Information panel parameters ........................................................................................................... 10-39

10-12 IP routing parameters .......................................................................................................................................... 10-41

....................................................................................................................................................................................................................................
x 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of tables

....................................................................................................................................................................................................................................
10-13 NE IP tunnel parameters .................................................................................................................................... 10-43

10-14 Create FTP server parameters .......................................................................................................................... 10-49

....................................................................................................................................................................................................................................
1646 SM xi
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of tables

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
xii 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of figures

2-1 ZIC authentication window ................................................................................................................................... 2-2

2-2 ZIC main window ...................................................................................................................................................... 2-3


2-3

2-3 NE of ZIC Launcher ................................................................................................................................................. 2-4


2-4

2-4 ZIC launcher ................................................................................................................................................................ 2-5


2-5

2-5 ZIC icons and symbols ............................................................................................................................................ 2-6

2-6 Equipment menu ........................................................................................................................................................ 2-7


2-7

2-7 Provider Bridge menu .............................................................................................................................................. 2-8


2-8

2-8 Connection menu ....................................................................................................................................................... 2-8


2-8

2-9 Data menu .................................................................................................................................................................... 2-9


2-9

2-10 Communication menu ........................................................................................................................................... 2-10


2-10

2-11 Alarms menu ............................................................................................................................................................. 2-11


2-11

2-12 Protection menu ....................................................................................................................................................... 2-11


2-11

2-13 Synchronization menu ........................................................................................................................................... 2-12

2-14 System Management menu .................................................................................................................................. 2-13

2-15 Security menu ........................................................................................................................................................... 2-14


2-14

2-16 Tools menu ................................................................................................................................................................ 2-15


2-15

3-1 Rack xx > Shelf xx > Board xx ............................................................................................................................ 3-2

3-2 Rack xx > Shelf xx > Board xx > Module xx ................................................................................................. 3-4

3-3 System Information .................................................................................................................................................. 3-5


3-5

3-4 System Information panel ....................................................................................................................................... 3-6

4-1 TDM search ................................................................................................................................................................. 4-3


4-3

4-2 TDM create with ENT-CRS .................................................................................................................................. 4-4

....................................................................................................................................................................................................................................
1646 SM xiii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of figures

....................................................................................................................................................................................................................................
4-3 TDM create with ENT-CRSPROT ...................................................................................................................... 4-4

4-4 STMnAU4 window .................................................................................................................................................. 4-5

4-5 LOPOOL window ..................................................................................................................................................... 4-6


4-6

4-6 VC4 list ......................................................................................................................................................................... 4-6


4-6

4-7 Create LOVC12 ......................................................................................................................................................... 4-7


4-7

4-8 Connection Detail ...................................................................................................................................................... 4-7


4-7

4-9 XC mapping ................................................................................................................................................................. 4-8


4-8

4-10 P2P Panel ...................................................................................................................................................................... 4-9


4-9

4-11 P2P data connection panel ................................................................................................................................... 4-10

4-12 ETS switching .......................................................................................................................................................... 4-11


4-11

4-13 ETS Switching Service ........................................................................................................................................ 4-12

4-14 OverHead Connection .......................................................................................................................................... 4-13

4-15 Create OverHead Connection ............................................................................................................................ 4-14

5-1 Traffic descriptor panel ........................................................................................................................................... 5-2


5-2

5-2 Resource Management Pools ................................................................................................................................ 5-6

5-3 VLAN Profile .............................................................................................................................................................. 5-8


5-8

5-4 Color profile ................................................................................................................................................................ 5-9


5-9

5-5 Bridge configuration panel .................................................................................................................................. 5-11

5-6 Create Maintenance Domain panel ................................................................................................................... 5-14

5-7 Maintenance Associations Range panel .......................................................................................................... 5-15

5-8 Create Maintenance Association panel ........................................................................................................... 5-16

5-9 MA MEP List Range panel .................................................................................................................................. 5-18

5-10 MEP List Range panel ........................................................................................................................................... 5-19


5-19

5-11 Create MEP panel ................................................................................................................................................... 5-20


5-20

5-12 EFM tool .................................................................................................................................................................... 5-21


5-21

5-13 EFM tool .................................................................................................................................................................... 5-22


5-22

5-14 VLAN Registration ................................................................................................................................................ 5-23


5-23

5-15 VLAN Registration ................................................................................................................................................ 5-24


5-24

5-16 Modify VLAN .......................................................................................................................................................... 5-25


5-25
....................................................................................................................................................................................................................................
xiv 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of figures

....................................................................................................................................................................................................................................
5-17 Dynamic filtering database .................................................................................................................................. 5-26

5-18 Dynamic filter error message .............................................................................................................................. 5-26

5-19 Static Unicast Filtering .......................................................................................................................................... 5-27


5-27

5-20 Static Multicast Filtering ...................................................................................................................................... 5-28


5-28

5-21 ERP[ITU-T G.8032] ............................................................................................................................................. 5-29

5-22 Ethernet Ring Protection Topology .................................................................................................................. 5-29

5-23 ERP Topology ........................................................................................................................................................... 5-30


5-30

5-24 East/West Ports ........................................................................................................................................................ 5-31


5-31

5-25 ERP instance ............................................................................................................................................................. 5-32


5-32

5-26 ERP Protection Group ........................................................................................................................................... 5-32

5-27 ERP topology panel ................................................................................................................................................ 5-33


5-33

5-28 MEPs for East/West ports .................................................................................................................................... 5-34

5-29 MEP Range ................................................................................................................................................................ 5-35


5-35

5-30 Ethernet Linear Protection ................................................................................................................................... 5-36

5-31 Ethernet Linear Protection Group ..................................................................................................................... 5-36

5-32 Create Ethernet Linear Protection Group ....................................................................................................... 5-37

5-33 PU interface ............................................................................................................................................................... 5-39


5-39

5-34 VLAN-ID Range ..................................................................................................................................................... 5-40


5-40

5-35 MD/MA/MEP Range ............................................................................................................................................. 5-41

6-1 DCC Channel .............................................................................................................................................................. 6-2


6-2

6-2 Overhead Channel Cross Connection ................................................................................................................ 6-4

6-3 DCC Channel .............................................................................................................................................................. 6-6


6-6

6-4 Customer LAN management ................................................................................................................................. 6-7

6-5 Create IP tunnel .......................................................................................................................................................... 6-9


6-9

6-6 IP route creation ....................................................................................................................................................... 6-12


6-12

6-7 AID Type Selection ................................................................................................................................................ 6-13


6-13

6-8 OSI Area ..................................................................................................................................................................... 6-14


6-14

6-9 OS Address ................................................................................................................................................................ 6-15


6-15

6-10 MAC Access Control List .................................................................................................................................... 6-17

....................................................................................................................................................................................................................................
1646 SM xv
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of figures

....................................................................................................................................................................................................................................
6-11 Modify MAC Access Control List ................................................................................................................... 6-18

6-12 Management Access Control Element (ACE) ............................................................................................. 6-19

6-13 Create Access Control Element ........................................................................................................................ 6-20

6-14 Management Actual Access Control Element (ACE) ................................................................................ 6-21

7-1 TCA Profile .................................................................................................................................................................. 7-2


7-2

7-2 Search TCA Profiles ................................................................................................................................................. 7-2


7-2

7-3 Create TCA Profile .................................................................................................................................................... 7-3


7-3

7-4 ASAP Mng ................................................................................................................................................................... 7-4


7-4

7-5 ASAP Type ................................................................................................................................................................... 7-4


7-4

7-6 ASAP AID .................................................................................................................................................................... 7-5


7-5

7-7 ASAP AID list ............................................................................................................................................................ 7-5


7-5

7-8 ASAP AID details ...................................................................................................................................................... 7-6


7-6

7-9 Create ASAP .............................................................................................................................................................. 7-6


7-6

7-10 Modify ASAP-AID ................................................................................................................................................... 7-8

7-11 Delete ASAP AID ...................................................................................................................................................... 7-9


7-9

7-12 Alarm cutoff .............................................................................................................................................................. 7-10


7-10

7-13 Refresh alarms .......................................................................................................................................................... 7-11


7-11

7-14 Alarm log ................................................................................................................................................................... 7-12


7-12

7-15 Input Points shelf selection panel ...................................................................................................................... 7-13

7-16 Input points attributes ............................................................................................................................................ 7-14


7-14

7-17 Alarms report ............................................................................................................................................................ 7-14


7-14

7-18 Operate/Release Output Points .......................................................................................................................... 7-15

8-1 BITS Select shelf panel ........................................................................................................................................... 8-2


8-2

8-2 Modify BITS 0 ........................................................................................................................................................... 8-3


8-3

8-3 BITS 1 Select shelf panel ....................................................................................................................................... 8-4

8-4 Modify BITS 1 ........................................................................................................................................................... 8-4


8-4

8-5 Modify BITS OUT Select shelf panel ................................................................................................................ 8-5

8-6 Modify BITS OUT0 panel ..................................................................................................................................... 8-6

8-7 Modify BITS OUT1 Select shelf panel ............................................................................................................. 8-7

....................................................................................................................................................................................................................................
xvi 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of figures

....................................................................................................................................................................................................................................
8-8 Modify BITS OUT1 panel ..................................................................................................................................... 8-7

8-9 Synchronization panel .............................................................................................................................................. 8-9


8-9

8-10 Retrieve synchronization timing entity ........................................................................................................... 8-10

8-11 Modify Synchronization panel ........................................................................................................................... 8-11

8-12 Operate - Modify synchronization switch ...................................................................................................... 8-12

8-13 Release - Modify synchronization switch ...................................................................................................... 8-13

8-14 Retrieve Synchronization Message panel ...................................................................................................... 8-15

8-15 Search synchronization message results ......................................................................................................... 8-15

8-16 Synchronization Outgoing Search .................................................................................................................... 8-16

8-17 Modify Synchronization Switch Outgoing Operate ................................................................................... 8-17

8-18 Modify Synchronization Switch Outgoing Release ................................................................................... 8-18

9-1 Change user password ............................................................................................................................................. 9-2

9-2 User information ........................................................................................................................................................ 9-3


9-3

9-3 Create user account ................................................................................................................................................... 9-4


9-4

9-4 Change User information ........................................................................................................................................ 9-6

9-5 Modify account default settings panel ............................................................................................................... 9-9

9-6 Current sessions ......................................................................................................................................................... 9-9


9-9

9-7 Command Access Privileges page .................................................................................................................... 9-11

9-8 Modify Command Access Privileges panel ................................................................................................... 9-12

9-9 Retrieve audit log .................................................................................................................................................... 9-13


9-13

9-10 Retrieve audit page with results ......................................................................................................................... 9-14

9-11 Modify log attributes ............................................................................................................................................. 9-15


9-15

9-12 Modify in progress message settings panel ................................................................................................... 9-17

10-1 ZIC loading ............................................................................................................................................................... 10-3


10-3

10-2 Logout message screen ......................................................................................................................................... 10-4

10-3 About window .......................................................................................................................................................... 10-5


10-5

10-4 In-Service Upgrade Status ................................................................................................................................... 10-6

10-5 Copy remote file panel .......................................................................................................................................... 10-8


10-8

10-6 Cancel Copy of Remote File panel ................................................................................................................ 10-10

....................................................................................................................................................................................................................................
1646 SM xvii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of figures

....................................................................................................................................................................................................................................
10-7 System configuration ........................................................................................................................................... 10-12

10-8 LAC State Management panel ......................................................................................................................... 10-13

10-9 MAC File Collection ........................................................................................................................................... 10-14


10-14

10-10 NTP Config - with Disabled Server Synchronization ............................................................................. 10-16

10-11 NTP Config - with Enabled Server Synchronization .............................................................................. 10-17

10-12 NTP Server Address Provision ........................................................................................................................ 10-18

10-13 DCC Channel ......................................................................................................................................................... 10-19


10-19

10-14 DCC channel - filter by ...................................................................................................................................... 10-20

10-15 OSI Routing Configuration .............................................................................................................................. 10-21

10-16 Overhead channel cross-connection .............................................................................................................. 10-22

10-17 Overhead channel cross-connection - enter channel ................................................................................ 10-22

10-18 Linear MSP ............................................................................................................................................................. 10-23


10-23

10-19 Linear multiplex section protection provision panel ............................................................................... 10-24

10-20 Multiplex section shared protection provision panel ............................................................................... 10-25

10-21 Provider Bridge Service ..................................................................................................................................... 10-27

10-22 Create Provider Bridge ....................................................................................................................................... 10-28

10-23 Link aggregation management ........................................................................................................................ 10-30

10-24 Link aggregator configuration ......................................................................................................................... 10-32

10-25 ..................................................................................................................................................................................... 10-34


10-34

10-26 Two member in one LAG .................................................................................................................................. 10-35

10-27 Configure LAG selection ................................................................................................................................... 10-36

10-28 Configure LAG ...................................................................................................................................................... 10-37


10-37

10-29 Actor Admin key selection window ............................................................................................................... 10-37

10-30 Configure LAG for 0 Unlink Port .................................................................................................................. 10-38

10-31 LAG pop up window ........................................................................................................................................... 10-38

10-32 System Information .............................................................................................................................................. 10-39


10-39

10-33 IP Routing Configuration ................................................................................................................................... 10-40

10-34 IP tunnel - network element .............................................................................................................................. 10-43

10-35 Tools - TL1 console ............................................................................................................................................. 10-45

....................................................................................................................................................................................................................................
xviii 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of figures

....................................................................................................................................................................................................................................
10-36 Tools - Accessing TL1 console ........................................................................................................................ 10-46

10-37 Tools - Telnet console ......................................................................................................................................... 10-47

10-38 Tools - TL1 command ......................................................................................................................................... 10-48

10-39 Create FTP server ................................................................................................................................................. 10-49


10-49

....................................................................................................................................................................................................................................
1646 SM xix
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of figures

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
xx 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of procedures

2 System Management

2-1 Establish ZIC session ............................................................................................................................................... 2-3


2-3

3 Equipment management

3-1 Configure a board ...................................................................................................................................................... 3-1


3-1

3-2 Refresh Tree ................................................................................................................................................................. 3-5


3-5

3-3 System Information .................................................................................................................................................. 3-5


3-5

4 Connection

4-1 Search VCn cross-connection ............................................................................................................................... 4-1

4-2 Create Connection ..................................................................................................................................................... 4-4


4-4

4-3 Ethernet P2P XC ........................................................................................................................................................ 4-9


4-9

4-4 Ethernet Flow Based Switching ......................................................................................................................... 4-11

4-5 Search OverHead connection ............................................................................................................................. 4-13

4-6 Create OverHead Connection ............................................................................................................................ 4-14

5 Ethernet Functions

5-1 Traffic descriptor ....................................................................................................................................................... 5-2


5-2

5-2 Resource Availability ............................................................................................................................................... 5-5


5-5

5-3 VLAN Profile .............................................................................................................................................................. 5-7


5-7

5-4 Create color profile ................................................................................................................................................... 5-9


5-9

5-5 Bridge configuration .............................................................................................................................................. 5-10


5-10

5-6 IGMP management ................................................................................................................................................. 5-11


5-11

5-7 Global setting ............................................................................................................................................................ 5-13


5-13

5-8 Create maintenance domain ................................................................................................................................ 5-13

....................................................................................................................................................................................................................................
1646 SM xxi
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of procedures

....................................................................................................................................................................................................................................
5-9 Create maintenance association ......................................................................................................................... 5-15

5-10 Search MEP ............................................................................................................................................................... 5-17


5-17

5-11 Create MEP ............................................................................................................................................................... 5-19


5-19

5-12 EFM tool .................................................................................................................................................................... 5-21


5-21

5-13 Configure EFM tool ............................................................................................................................................... 5-22


5-22

5-14 Create VLAN ............................................................................................................................................................ 5-23


5-23

5-15 ConfigureVLAN ...................................................................................................................................................... 5-24


5-24

5-16 Dynamic filtering DB ............................................................................................................................................ 5-26


5-26

5-17 Configure static unicast filtering ....................................................................................................................... 5-27

5-18 Configure static multicast filtering ................................................................................................................... 5-28

5-19 Create ERP topology .............................................................................................................................................. 5-29


5-29

5-20 Create ELP ................................................................................................................................................................. 5-36


5-36

6 Data Communication

6-1 Network IF ................................................................................................................................................................... 6-2


6-2

6-2 XC Overhead ............................................................................................................................................................... 6-3


6-3

6-3 IP Address ..................................................................................................................................................................... 6-6


6-6

6-4 LAN management ..................................................................................................................................................... 6-7


6-7

6-5 Administer IP tunnel ................................................................................................................................................. 6-8


6-8

6-6 Configure IP tunnel ................................................................................................................................................... 6-9


6-9

6-7 Configure IP route ................................................................................................................................................... 6-11


6-11

6-8 OSI management ..................................................................................................................................................... 6-14


6-14

6-9 Create MAC Access Control List (ACL) ....................................................................................................... 6-17

7 Alarm Management

7-1 TCA Profiles ................................................................................................................................................................ 7-2


7-2

7-2 Create ASAP ............................................................................................................................................................... 7-3


7-3

7-3 Modify or Delete an ASAP profile ...................................................................................................................... 7-8

7-4 ALM cutoff .................................................................................................................................................................. 7-9


7-9

7-5 ALM resynch. ........................................................................................................................................................... 7-10


7-10

7-6 Condition log ............................................................................................................................................................ 7-11


7-11
....................................................................................................................................................................................................................................
xxii 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of procedures

....................................................................................................................................................................................................................................
7-7 Housekeeping support ........................................................................................................................................... 7-13

8 Synchronization

8-1 Modify BITS-0 ........................................................................................................................................................... 8-2


8-2

8-2 Modify BITS-1 ........................................................................................................................................................... 8-4


8-4

8-3 Modify BITS-OUT0 ................................................................................................................................................. 8-5

8-4 Modify BITS-OUT1 ................................................................................................................................................. 8-7

8-5 Administer system timing BITS ........................................................................................................................... 8-8

9 Security

9-1 Change user password ............................................................................................................................................ 9-2

9-2 Retrieve user information ....................................................................................................................................... 9-3


9-3

9-3 Create user account ................................................................................................................................................... 9-3


9-3

9-4 Change user account ................................................................................................................................................. 9-5


9-5

9-5 Modify account default settings ........................................................................................................................... 9-8

9-6 View current sessions ............................................................................................................................................... 9-9


9-9

9-7 Modify command privileges ............................................................................................................................... 9-10

9-8 Manage audit ............................................................................................................................................................ 9-12


9-12

9-9 Log settings ............................................................................................................................................................... 9-14


9-14

9-10 Modify in progress message settings ............................................................................................................... 9-16

10 Provisioning: Detailed level Procedures

10-1 Log into the system ................................................................................................................................................ 10-2


10-2

10-2 Log out of the system ............................................................................................................................................ 10-3

10-3 Retrieve software version ..................................................................................................................................... 10-4

10-4 In-Service Upgrade ................................................................................................................................................. 10-6


10-6

10-5 Initialize and Upgrade with a new release ..................................................................................................... 10-7

10-6 DB management remote file copy .................................................................................................................... 10-7

10-7 DB management cancel remote file copy .................................................................................................... 10-10

10-8 Network Element management ........................................................................................................................ 10-11

10-9 LAC Management ................................................................................................................................................ 10-12


10-12

....................................................................................................................................................................................................................................
1646 SM xxiii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
List of procedures

....................................................................................................................................................................................................................................
10-10 MAC File Collection ........................................................................................................................................... 10-14
10-14

10-11 Administer NTP .................................................................................................................................................... 10-15


10-15

10-12 Network IF .............................................................................................................................................................. 10-18


10-18

10-13 OSI ULC Report ................................................................................................................................................... 10-20


10-20

10-14 Create Overhead XC ........................................................................................................................................... 10-21


10-21

10-15 Create linear MSP ................................................................................................................................................ 10-23


10-23

10-16 Create MS-SPRing ............................................................................................................................................... 10-25


10-25

10-17 Create Provider Bridge Service ....................................................................................................................... 10-27

10-18 LAG management ................................................................................................................................................ 10-29


10-29

10-19 IGMP Snooping ..................................................................................................................................................... 10-34

10-20 Remove LAG member ........................................................................................................................................ 10-34

10-21 Retrieve system information ............................................................................................................................. 10-39

10-22 Create IP route ....................................................................................................................................................... 10-40


10-40

10-23 Create IP tunnel ..................................................................................................................................................... 10-42


10-42

10-24 NE TL1 Parameter ............................................................................................................................................... 10-44


10-44

10-25 TL1 console ............................................................................................................................................................ 10-44


10-44

10-26 Create FTP Server Configuration ................................................................................................................... 10-48

....................................................................................................................................................................................................................................
xxiv 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
About this document
About this document

Purpose
This User Provisioning Guide provides the following information about the
Alcatel-Lucent 1646 Synchronous Multiplexer, Release 2.3:
• Accessing and logging into the Zero Installation Craft (ZIC) terminal
• Using the Zero Installation Craft (ZIC) terminal.
• Provisioning, Configuration, Operations and Maintenance, Performance Monitoring,
Fault Management.

Intended audience
This User Provisioning Guide is intended primarily for telecommunications technicians
and communications network providers.
Procedural information in this document is intended primarily for maintenance, operation,
and provisioning personnel responsible for operating and maintaining the Alcatel-Lucent
1646 SM.

How to use this document


This guide includes descriptive and procedural chapters with supporting information (for
example, safety instructions, glossary, and index). See the Contents section to locate
specific information.
Assumptions
This document assumes that users have an understanding of the following:
• Basic principles of telecommunication transmission
• Common telecommunication and system terminology (a glossary is provided in this
document to assist you)
• Test sets and tools used in the telecommunication industry

...................................................................................................................................................................................................................................
1646 SM xxv
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
About this document

....................................................................................................................................................................................................................................
• Local operations and functional procedures of the company
• Personal computer (PC) operation, common PC terminology, and navigational
procedures in a windows-style user interface

Chapter Description
“About this document” This chapter
• Describes the guide's purpose, intended audience,
and organization
• Lists related documentation
• Explains how to comment on this document
Chapter 1, “Getting Started” Contains all the general introduction of the Network
Element including its application in the
telecommunication network.
Chapter 2, “System Management” Contains all the description about the menus.
Chapter 3, “Equipment management” Contains complete provisioning information on the
equipment, including the equipment protection,
according to the user needs.
Chapter 4, “Connection” Contains the provisioning procedures for the
cross-connection.
Chapter 5, “Ethernet Functions” Contains procedures necessary to provision Ethernet
features.
Chapter 6, “Data Communication” Contains the procedure related to data
communication.
Chapter 7, “Alarm Management” Contains all information related to alarms.
Chapter 8, “Synchronization” Contains all the description about synchronization
procedures.
Chapter 9, “Security” Contains all information related to security.
Chapter 10, “Provisioning: Detailed Contains all other detailed level procedures using the
level Procedures” ZIC.
“Glossary” Defines and explains the following:
• Telecommunication terms
• Abbreviations
• Acronyms
Index Contains a list of index references

....................................................................................................................................................................................................................................
xxvi 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
About this document

....................................................................................................................................................................................................................................
Signal words
The signal words that identify the hazard severity levels are shown in Table 1, “Signal
words for hazard severity” (p. xxvii)

Table 1 Signal words for hazard severity

Signal word Meaning


DANGER Indicates an extremely hazardous situation which, if not
avoided, will result in death or serious injury.
WARNING Indicates a hazardous situation which, if not avoided, could
result in death or serious injury.
CAUTION Indicates a hazardous situation which, if not avoided, could
result in minor or moderate injury.
NOTICE Indicates a hazardous situation not related to personal injury.

See Alcatel-Lucent 1646 SM Release 2.3 Safety Guide (3KC18083ADAATQZZA) for


safety related information.

Conventions used
The following conventions are used in this document:
• This font indicates a document reference.
• This font indicates buttons, icons, or menu items.
Example:
Configuration -> Equipment
• This font indicates window names or special emphasis.
Example:
The Configure Equipment window is displayed.
• Blue text indicates hyperlinks (cross-references) to other text in the document or
another step in the procedure.
• Important messages are displayed as follows:
Note: This is important information.

Related information
The following table lists the documents included in the Alcatel-Lucent 1646 SM
documentation set:

Part Number Title Description


3KC18077ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Provides information on the
Product Information and Planning Product and detailed
Guide descriptions of the product
specifics.
....................................................................................................................................................................................................................................
1646 SM xxvii
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
About this document

....................................................................................................................................................................................................................................

Part Number Title Description


3KC18078ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Provides information on
User Provisioning Guide provisioning, configuration,
operation, performance
monitoring and maintenance
using the Zero Installation
Craft (ZIC) terminal.
3KC18079ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Provides information on
Installation and System Turn-Up product installation and
Guide commissioning.
3KC18080ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Provides information on
Maintenance and Trouble-Clearing Fault Management, alarms
Guide and clearance procedures.
3KC18082ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Provides information on
TL1 User Provisioning Guide provisioning, configuration,
operation, performance
monitoring and maintenance
using the TL1 interface in
the Zero Installation Craft
(ZIC) terminal Interface.
3KC18083ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Provides information on the
Safety Guide Safety instructions,
precautions, labels and
instructions in handling the
product.

Technical support
For technical support, contact your local Alcatel-Lucent customer support team. See the
Alcatel-Lucent Support web site (http://www.alcatel-lucent.com/support/) for contact
information.

How to order
To order Alcatel-Lucent documents, contact your local sales representative or use Online
Customer Support (OLCS) (http://support.alcatel-lucent.com)

How to comment
To comment on this document, go to the Online Comment Form (http://infodoc.alcatel-
lucent.com/comments/) or e-mail your comments to the Comments Hotline
(comments@alcatel-lucent.com).

....................................................................................................................................................................................................................................
xxviii 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
1 Getting Started
1

Overview
Purpose
This Chapter introduces the Zero Installation Craft (ZIC) terminal Alcatel-Lucent
software and the main functions of the ZIC Menu. The ZIC provides local management of
single network element, with an ITU compliant Information Model Interface that
manages the Network Element.

Contents

ZIC Functionality 1-1

ZIC Functionality
Purpose
The following is a listing of the functionality of the Zero Installation Craft terminal in
managing the NE.

System Management
Provides descriptions of the following:
• System Overview
• Hierarchical menu
• System Functions

Equipment and Board Management


Provides a description of the presentation of the equipment and the hierarchical tree
structure.
Equipment/Board Management also provides information on:
• Setting, Modifying and Removing Boards
• Board Hierarchy

...................................................................................................................................................................................................................................
1646 SM 1-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Getting Started ZIC Functionality

....................................................................................................................................................................................................................................
• Remote Inventory
• Port Management
Port Management permits configuration and viewing of transmission resources at the
port level. The following are the Port level configuration menu listing:
– Automatic Laser Shutdown
– MSP protection
– Loopback management and configuration
– Single fiber configuration
– TP Frame Mode Configuration
– Re-timing
– Ethernet Port Configuration
• Equipment Protection Management
Protection Management comprises of:
– Equipment protection switching
– Multiple Section Protection

Network Configuration
Provides an overview and description of the Network and an introduction to Provisioning
using the ZIC.

Data Communication
Provides a description of the Communication ports, functions and a description of traffic.

Ethernet functions
Provides descriptions of Ethernet related features and the detailed level provisioning
procedures for the same.

Synchronization
Provides descriptions of time and alarm Synchronization functions.

Fault Management
Provides a description and listing of the Alarms and the alarm management system.

Performance Management
Provides a description and procedure on Performance Monitoring and Remote Monitoring
functions.

Security
Provides descriptions and procedures based on Security Management.

....................................................................................................................................................................................................................................
1-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Getting Started ZIC Functionality

....................................................................................................................................................................................................................................
Provisioning
Provides detailed level procedures for the following:
• Accessing the Zero Installation Craft (ZIC) terminal.
• Provisioning, Administering and Creation of:
– Data Communication
– Alarms
– Protection
– Synchronization
– System Management
– Security

....................................................................................................................................................................................................................................
1646 SM 1-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Getting Started ZIC Functionality

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
2 System Management
2

Overview
Purpose
Provides a description of the Zero Installation Craft (ZIC) terminal system overview and
hierarchical menu.

Contents

ZIC overview 2-2


Procedure 2-1: Establish ZIC session 2-3
ZIC icons and symbols 2-5
Menus 2-6
Equipment menu 2-7
Provider Bridge menu 2-8
Connection menu 2-8
Data menu 2-9
Communication menu 2-10
Alarms menu 2-11
Protection menu 2-11
Synchronization menu 2-12
System Management menu 2-13
Security menu 2-14
Tools menu 2-15
Help menu 2-15

...................................................................................................................................................................................................................................
1646 SM 2-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management ZIC overview

....................................................................................................................................................................................................................................

ZIC overview
Overview
The Zero Installation Craft (ZIC) terminal is a project in charge of the local management
of single network elements, providing ITU-compliant Information Model Interface to the
Network Element.
The ZIC can be integrated to products in charge of the management of networks and
network elements. The Network Element (NE) provides the web server while the user
only needs to start a standard available web browser to access the ZIC application.

Figure 2-1 ZIC authentication window

The Authentication dialog window displays the product name and release number. It also
contains the following fields:
• User - Specifies a unique user identifier.
• Password - Specifies the user login password. According to the specification, it is a
sequence of case-sensitive alphanumeric characters.
• Local Time - This check-box allows to select the local PC time.
• Language - Allows to select the language. Default is English.
• Login - Allows to login to the home page of the NE.

....................................................................................................................................................................................................................................
2-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management ZIC overview

....................................................................................................................................................................................................................................

Figure 2-2 ZIC main window

The following are the components of the ZIC:


• Starting from left to right, the Page header contains the company logo, the equipment
title, the user ID and the Logout hyperlink.
• The Client area is the area in which the user works.
• Menu bar is present at the top of a page browser (under the title of the page) and
above the client area. They appear automatically along with the page. They contain
the titles from which pull down menus and cascading menus are opened.
• Tree area in the left pane allows the user to select the resources from a list. Click on
the NE icon to expand the tree as shown in Figure 2-2, “ZIC main window” (p. 2-3).
• The Alarms table presents the detailed list of the current alarm.

Procedure 2-1: Establish ZIC session


When to use
Use this procedure to establish a Zero Installation Craft (ZIC) terminal session.
...................................................................................................................................................................................................

1 If this is the first usage of ZIC, go to Step 2, otherwise, go to Step 3.

....................................................................................................................................................................................................................................
1646 SM 2-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Procedure 2-1: Establish ZIC session

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Start the Alcatel-Lucent ZIC Launcher. Click Add from the NE menu and enter the IP
address of the NE as shown in the Figure 2-3, “NE of ZIC Launcher” (p. 2-4).

Figure 2-3 NE of ZIC Launcher

....................................................................................................................................................................................................................................
2-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Procedure 2-1: Establish ZIC session

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Start the Alcatel-Lucent ZIC Launcher. From the File menu click Load and the previously
saved NE's IP address opens as shown in Figure 2-4, “ZIC launcher” (p. 2-5) and click
Open.

Figure 2-4 ZIC launcher

...................................................................................................................................................................................................

4 The authentication dialog window opens as shown in Figure 2-1, “ZIC authentication
window” (p. 2-2).
...................................................................................................................................................................................................

5 In the authentication dialog box enter the user name and password and click Login or
press the Enter key. The ZIC application opens and loads the NE information as shown in
Figure 2-2, “ZIC main window” (p. 2-3).
E...................................................................................................................................................................................................
N D O F S T E P S

ZIC icons and symbols


This section displays the icons and symbols as shown in the ZIC application.

....................................................................................................................................................................................................................................
1646 SM 2-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management ZIC icons and symbols

....................................................................................................................................................................................................................................

Figure 2-5 ZIC icons and symbols

Menus
Description
This section describes an important aspect of the user interface. The user constantly has to
open Pages, select icons and navigate through the different functionalities of the Zero
Installation Craft (ZIC) terminal. A menu consists of a title, that usually identifies the
nature of the actions that can be undertaken, and a list of options associated with actions.
Menu types can be classified as:
• Menu bars
• Pull-down menus
• Cascading menus
• Pop-up menus

....................................................................................................................................................................................................................................
2-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Menus

....................................................................................................................................................................................................................................
Menu bars
Menu bars present at the top of a page's browser (under the title of the page) and above
the client area. They appear automatically along with the page.

Pull down menu


A pull-down menu is pulled down from a menu item present in a menu bar. To open a
pull-down menu, click on the title of the menu you need to open with the“Select” mouse
button.
Note: A menu option followed by “...” means that selecting this option opens another
view. For example the Open... or Save As... menu options in the File pull-down
menu.

Cascading menus
Cascading menus are derived from pull-down menus and represent additional options for
the pull-down menu item selected. Cascading menus are indicated if the “>” sign follows
an option in a pull-down menu.
To open a cascading menu, click on the menu option with the “>” sign in the pull-down
menu.

Equipment menu
This menu allows to manage the equipment configuration. The menu options are shown
in the following figure:

Figure 2-6 Equipment menu

Refresh Tree - Allows to update the page area tree


System Information - Allows to view the system information

....................................................................................................................................................................................................................................
1646 SM 2-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Provider Bridge menu

....................................................................................................................................................................................................................................

Provider Bridge menu


This menu allows to manage the Bridge configuration.

Figure 2-7 Provider Bridge menu

The menu options are :


• Ethernet Services XC

Connection menu
The connection menu allows to manage (provisioning, service type etc.) the client/line
traffic.

Figure 2-8 Connection menu

The menu options are shown in the following figure :


• TDM Search - Allows to set the SDH service.
• TDM Create - Allows to configure the SDH service.
• OH XC
- OH Search - Allows to search Overhead Connection.
- OH Create - Allows to Create Overhead Connection.
• ETS XC - Allows to set the Point-to-Point cross-connection services.

....................................................................................................................................................................................................................................
2-8 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Data menu

....................................................................................................................................................................................................................................

Data menu
The data menu allows to set the service for Data traffic. The menu options are shown in
the following figure:

Figure 2-9 Data menu

• Traffic descriptor - To set the operation mode.


• Resource Avilability - To monitor and to count the amount of dynamic NE resources.
• MAC Access Control List - To create access control list.
• VLAN Profile - To set the virtual LAN mode.
• ASAP list - To show and manage the Alarm Severity Assignment Profile.
• Bridge - To create a bridge configuration.
• IGMP Management - This displays the details of Board, Router Neighbor Timeouts
and their status
• Queue Management - This allows management of the queue.
• OAM Management - This allows operation and maintenance management.
The suboptions are:
– OAM Resource Config.
• EFM Tool - To manage EFM.
• Virtual LAN Management - To manage Virtual LAN.
– Virtual LAN
– DB Filtering

....................................................................................................................................................................................................................................
1646 SM 2-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Communication menu

....................................................................................................................................................................................................................................

Communication menu
The communication menu allows to configure and set the external communication for NE
management interfaces. The menu options are shown in the following figure:

Figure 2-10 Communication menu

• DCC - Allows to specifies the reference of DCC Channel (Line or Section).


• DCN Physical Interface - Allows to specify the supported Layer 3 (network layer) of
the OSI Data Communication Network (DCN).
• IP Tunnel - Allows the operator to manage an IP tunnel instance on the NE.
• Network Domain
– Allows the operator to enter (add) a new static IP route in the IP routing table.
– Allows to instruct the NE to provide routing database information that is
supported by network layer of the OSI DCN.
– Allows to retrieve a list of all immediate OSC neighbors to the local network
element.
– Allows retrieve the parameters of a configured OSIAREA that the NE is part of.

....................................................................................................................................................................................................................................
2-10 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Alarms menu

....................................................................................................................................................................................................................................

Alarms menu
The alarms menu allows to manage entities yield alarms when they malfunction. The
menu options are shown in the following figure:

Figure 2-11 Alarms menu

• TCA Profile - Allows to configure and display of the active threshold crossing alarm
profile (TCA = Threshold Crossing Alarm).
• ASAP Mng - Allows to configure and display the ASAP (Alarm Severity Assignment
Profile).
• ALM CUTOFF - Allows to silence the office audible alarm indications.
• ALM Resynch. - Allows to update the alarm database to the current alarm situation.
• Condition Log - Allows to collect the alarm history report from the NE.
• House Keeping - Allows to manage the input and output points of the shelf.

Protection menu
This menu allows the to manage the available protection systems.

Figure 2-12 Protection menu

....................................................................................................................................................................................................................................
1646 SM 2-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Protection menu

....................................................................................................................................................................................................................................
The menu options are shown in the following figure:
• Equipment Protection
• E1 Equipment Protection
• Linear MSP
• MS-SPRing
• Ethernet Liner Protection

Synchronization menu
This menu allows the operator to manage the ports dedicated to BITS (Building
Integrated Timing Source) facilities for clock distribution purposes. A BITS output
reference is a DS1 signal.

Figure 2-13 Synchronization menu

The menu options are :


• Bits
– Modify BITS 0
– Modify BITS 1
– Modify BITS-OUT 0
– Modify BITS-OUT 1
• Synchornization
– Search
– Operate
– Release
– Sync.Message
....................................................................................................................................................................................................................................
2-12 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Synchronization menu

....................................................................................................................................................................................................................................
• Synch.Outgoing
– Search
– Operate
– Release

System Management menu


This menu provides options for users and administrators to manage the system.

Figure 2-14 System Management menu

The menu options are:


• Initialize and Upgrade
– In-Service Upgrade
- Upgrade Status
• DB Management
– Data Base
- DB Information
• Remote File
– Perform Copy
– Cancel Copy
• Network Element

....................................................................................................................................................................................................................................
1646 SM 2-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management System Management menu

....................................................................................................................................................................................................................................
• Lac
– State
– Default
• Manager List
• PM Global File
• MAC File Collection
• Network Time Protocol

Security menu
This menu contains the following sub-menu options for user and administrative users.

Figure 2-15 Security menu

• User Account
– Change Password
– Information
• Administration
– Accounts
- Change Account
– Current Sessions
– Commands Privileges
– Audit
– Log Settings
– IP Message Settings
• Logout

....................................................................................................................................................................................................................................
2-14 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Tools menu

....................................................................................................................................................................................................................................

Tools menu
The menu options are shown in the following figure:

Figure 2-16 Tools menu

Tools menu allows the operator to open a Telnet console for TL1 commands :
• TL1 Console
• NE TL1 Param
• FTP Server Configuration

Help menu
The menu options are shown in the following figure:

Help menu allows the operator to obtain information about:


• About (software version)
• NE TL1 Syntax

....................................................................................................................................................................................................................................
1646 SM 2-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
System Management Help menu

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
2-16 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
3 Equipment management
3

Overview
Purpose
Use this chapter to perform equipment provisioning.

Contents

Procedure 3-1: Configure a board 3-1


Procedure 3-2: Refresh Tree 3-5
Procedure 3-3: System Information 3-5

Procedure 3-1: Configure a board


When to use
Use this procedure to configure a board.

...................................................................................................................................................................................................................................
1646 SM 3-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Equipment management Procedure 3-1: Configure a board

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Rack xx → Shelf xx → Board xx from the tree area.

Figure 3-1 Rack xx > Shelf xx > Board xx

...................................................................................................................................................................................................

2 The following table provides description of the Rack xx > Shelf xx > Board xx
parameters.

Table 3-1 Board xx panel parameters

Parameter Description
Access Identifier Specifies the access identifier of the selected board
Current Provisioned Specifies the type of equipment to be provisioned
Type
Alarm Profile Specifies the alarm profile.

....................................................................................................................................................................................................................................
3-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Equipment management Procedure 3-1: Configure a board

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The following table provides description of the Restart panel parameters.

Table 3-2 Board xx Restart panel parameters

Parameter Description
Access Identifier Specifies the access identifier of the selected board
Phase Specifies the reload of dynamic and static data (sw and db if
present). Processor is restarted. It is supported by all the
Processor-based cards, without affecting the traffic, if the current
configuration is in line with the one to be reloaded.
For SCC card only COLD reset type is supported in R2.0

...................................................................................................................................................................................................

4 Click Save to save the settings on the page.


...................................................................................................................................................................................................

5 Click View to view the Alarms on the alarms panel.


E...................................................................................................................................................................................................
N D O F S T E P S

Provision a module
...................................................................................................................................................................................................

1 Click Provision hyperlink to provision the SFP module for the selected board as shown in
Figure 3-1, “Rack xx > Shelf xx > Board xx” (p. 3-2).

....................................................................................................................................................................................................................................
1646 SM 3-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Equipment management Procedure 3-1: Configure a board

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The following screen appears for the module selected.

Figure 3-2 Rack xx > Shelf xx > Board xx > Module xx

...................................................................................................................................................................................................

3 Select the SFP/XFP module from the Provisioned Type drop-down list box.
...................................................................................................................................................................................................

4 Click Save to save the settings, the tree area displays the XFP module provisioned on the
selected facility.
...................................................................................................................................................................................................

5 Click Remote Inventory to view the details of the selected module.


...................................................................................................................................................................................................

6 Click Save to save the settings.


...................................................................................................................................................................................................

7 Click View hyperlink displayed under Alarms and Conditions panel to view the
alarms/conditions raised by the equipment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
3-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Equipment management Procedure 3-2: Refresh Tree

....................................................................................................................................................................................................................................

Procedure 3-2: Refresh Tree


When to use
Use this procedure to Refresh the Tree view on the left pane.

Procedure
...................................................................................................................................................................................................

1 Select Equipment → Refresh Tree.


Result: The tree view on the left is refreshed and any new ports added are displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 3-3: System Information


When to use
Use this procedure to view the system information.

Procedure
...................................................................................................................................................................................................

1 Select Equipment → System Information.


Result: The System Information tab is displayed.

Figure 3-3 System Information

Table 3-3 System Information parameters

Parameter Description
Node Type Specifies the provisioned Node type.
Software Specifies the type of equipment to be provisioned
System Type Specifies the System type.
Release ID Specifies the Release ID of the software.
Release Date Specifies the Release date of the software
Matrix Size Specifies the size of the matrix.

....................................................................................................................................................................................................................................
1646 SM 3-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Equipment management Procedure 3-3: System Information

....................................................................................................................................................................................................................................
Table 3-3 System Information parameters (continued)

Parameter Description
Status Specifies the status of software installation.
Region Specifies the region for which the software is customized.
Provision Mode Specifies the mode in which the system is provisioned.
User Label Specifies the user label.
Save Click to save the settings on the page.
Cancel Click to undo the changes and return back to previous window.

...................................................................................................................................................................................................

2 Click on the ACTSW link.


Result: The System Information panel is displayed.

Figure 3-4 System Information panel

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
3-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
4 Connection
4

TDM Search
Purpose
Use this chapter to perform the cross-connection provisioning.

Contents

Procedure 4-1: Search VCn cross-connection 4-1


Procedure 4-2: Create Connection 4-4
Procedure 4-3: Ethernet P2P XC 4-9
Procedure 4-4: Ethernet Flow Based Switching 4-11
Procedure 4-5: Search OverHead connection 4-13
Procedure 4-6: Create OverHead Connection 4-14

Procedure 4-1: Search VCn cross-connection


When to use
Use this procedure to retrieve a VCn cross-connection.
Four types of cross connection can be created:
• VC44C
• VC4
• VC3
• VC12

...................................................................................................................................................................................................................................
1646 SM 4-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-1: Search VCn cross-connection

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Choose specific STM-N optical SFP to configure high order structure.

Note: For VC44C cross-connection, STM-4 and STM-16 are available and for VC4,
VC3, and VC12 cross-connection, STM-1, STM-4 and STM-16 are available.
...................................................................................................................................................................................................

2 Select Connection → TDM Search option from the menu bar to view and set the
cross-connection parameters for the search criteria

....................................................................................................................................................................................................................................
4-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-1: Search VCn cross-connection

....................................................................................................................................................................................................................................
The following Connection panel is displayed.

Figure 4-1 TDM search

...................................................................................................................................................................................................

3 This panel lists the parameters described in the following table.

Table 4-1 Connection panel

Parameters Description
Retrieve Connection The options are:
command • (RTRV-CRS) - To retrieve general cross-connections. This removes
the VC Type drop-down list box.
• (RTRV-CRS-) - To retrieve lower order protected cross-connections..
This option adds the VC Type drop-down list box.
• (RTRV-CRSPROT) - To retrieve protected cross-connections. This
option removes the VC Type
• (RTRV-CRSPROT-) - To retrieve lower order protected
cross-connections.. This option adds the VC Type
Filter by Access Allows to filter by Access Identifier Type
Identifier Type

...................................................................................................................................................................................................

4 Click Search. The system retrieves the cross-connection details based on the search
parameter defined.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 4-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Procedure 4-2: Create Connection


Create VCn cross-connection
...................................................................................................................................................................................................

1 Click on the Create hyperlink as shown in Figure 4-1, “TDM search” (p. 4-3) or select
Connection → TDM Create from the menu bar.
Result: The Create Connection tab is displayed.

Figure 4-2 TDM create with ENT-CRS

Figure 4-3 TDM create with ENT-CRSPROT

...................................................................................................................................................................................................

2 Create cross connection between STMnAU4 and LOPOOL.

....................................................................................................................................................................................................................................
4-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................
Note: Step 2 to Step 8 is only for LOVC12 and LOVC3. Step 1 is for high order
VC4/VC44C.
...................................................................................................................................................................................................

3 To create lower order cross connection (e.g. LOVC12/ LOVC3) set VC4 level cross
connection from STMnAU4 XC to Lower Order AID LOPOOL. After VC4 cross
connection is set MVC4 AID is returned.
Note: For bidirectional service, another VC4 from LOPOOL to STMnAU4 need to be
created. The related LOVC12 of this MVC4 channel is used to set LOVC12 to real
PDH or VCG port/Channel.
...................................................................................................................................................................................................

4 Select STMnAU4 from From selection button.


Result: The From window is displayed.

Figure 4-4 STMnAU4 window

...................................................................................................................................................................................................

5 Choose LOPOOL from To selection button.

....................................................................................................................................................................................................................................
1646 SM 4-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................
Result: The To window is displayed.

Figure 4-5 LOPOOL window

...................................................................................................................................................................................................

6 Click Save to save the configuration.


...................................................................................................................................................................................................

7 Search the Cross connection from ZIC.


Result: A new cross connection is found.

Figure 4-6 VC4 list

...................................................................................................................................................................................................

8 Create LOVC12 path to PDH/VCG AID.

....................................................................................................................................................................................................................................
4-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................
Result: The Create Connection tab is displayed

Figure 4-7 Create LOVC12

Figure 4-8 Connection Detail

...................................................................................................................................................................................................

9 This panel lists the parameters described in the following table.

Table 4-2 Create Connection panel

Parameters Description
Enter Command The options are:
• ENT-CRS
• ENT-CRSPROT
VC type is selected using the drop-down list.
From Allows to select the start direction.
To Allows to select the end point.
Cross Connection Cross Connection Type is 1WAY for ENT-CRS and 1WAYSNCP for
Type ENT-CRSPROT
Revertive The options are:
• Y- Yes
• N - No
Hold Off Time Values are 0, 100, 300, 500, 700, 1000, 3000, 5000, 10000
Protection Type The options are:
• SNCN
• SNCI

...................................................................................................................................................................................................

10 Click Select hyperlink to select the From and To directions.

....................................................................................................................................................................................................................................
1646 SM 4-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................
Result: The following window pops up.

Figure 4-9 XC mapping

Solution: Managing a ‘fake’ MVC4 which can be easily mapped to AU4


• MVC4-1-1-7-1-{1-8} <-> AU4 in slot1
• MVC4-1-1-7-1-{9-16} <-> AU4 in slot2
• MVC4-1-1-7-1-{17-24} <-> AU4 in slot3
• MVC4-1-1-7-1-{25-32} <-> AU4 in slot4
• MVC4-1-1-7-1-{33-40} <-> AU4 in slot5
• MVC4-1-1-7-1-{41-48} <-> AU4 in slot6
• MVC4-1-1-7-1-{49-64} <-> AU4 in slot7
Impacts: MVC4, MVC4TU3, MVC4TU12 are supported but the AID number is not
generated by matrix but fixed with a AU4 number in a slot.
...................................................................................................................................................................................................

11 Click Save to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
4-8 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-3: Ethernet P2P XC

....................................................................................................................................................................................................................................

Procedure 4-3: Ethernet P2P XC


When to use
Use this procedure to manage the P2P cross-connection.

Procedure
...................................................................................................................................................................................................

1 Select Connection → ETS XC → P2P option from the menu bar.

Figure 4-10 P2P Panel

...................................................................................................................................................................................................

2 The P2P panel provides the cross-connection search criteria range.


...................................................................................................................................................................................................

3 Click Search to find a service instance defined in the specified range.

....................................................................................................................................................................................................................................
1646 SM 4-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-3: Ethernet P2P XC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click Create to create a new P2P instance. The following screen appears.

Figure 4-11 P2P data connection panel

This panel lists the parameters described in the following table:

Table 4-3 P2P data connection panel parameters

Parameter Description
Type Specifies the type of P2P service
From Allows to select the source point
To Allows to select the end point
Service Label Allows to enter a service label string

...................................................................................................................................................................................................

5 Click Select hyperlink to select the From and To directions.


Result: The boards panel is displayed.
...................................................................................................................................................................................................

6 Select the boards that have to be cross-connected by double-clicking on them.


Result: The selected boards are displayed in the From and To boxes.
...................................................................................................................................................................................................

7 Click Save & Exit to save the settings and exit from the window.
...................................................................................................................................................................................................

8 Click Save & Continue to save the settings and configure another P2P instance.
....................................................................................................................................................................................................................................
4-10 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-3: Ethernet P2P XC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

9 Click Cancel to cancel all the settings and return to the previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 4-4: Ethernet Flow Based Switching


When to use
Use this procedure to manage the ETS cross-connection.

Procedure
...................................................................................................................................................................................................

1 Select Connection → ETS XC → Flow based Switching option from the menu bar.
Result: The ETS switching panel is displayed.

Figure 4-12 ETS switching

...................................................................................................................................................................................................

2 Enter the range of XC IDs to be searched and Click Search.

....................................................................................................................................................................................................................................
1646 SM 4-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-4: Ethernet Flow Based Switching

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Create to create a new ETS Switching Service instance. The following screen
appears.

Figure 4-13 ETS Switching Service

This panel lists the parameters described in the following table:

Table 4-4 P2P data connection panel parameters

Parameter Description
Type Specifies the type of switching service
Ingress Allows to select the source point
Egress Allows to select the end point
Service Label Allows to enter a service label string
Traffic descriptor Allows to select the Traffic Descriptor
Topology Classifier Allows to select the Topology Classifier
Policing mode Allows to select the Policing mode
VLAN pop Allows to select the VLAN pop
VLAN push Allows to select the VLAN push

...................................................................................................................................................................................................

4 Click Save & Exit to save the settings and exit from the window.
...................................................................................................................................................................................................

5 Click Save & Continue to save the settings and configure another ETS Switching service
instance.

....................................................................................................................................................................................................................................
4-12 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-4: Ethernet Flow Based Switching

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Click Cancel to cancel all the settings and return to the previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 4-5: Search OverHead connection


When to use
Use this procedure to retrieve a OverHead connection.
...................................................................................................................................................................................................

1 Select Connection -> OH XC ->OH Search from the menu bar as shown in Figure 4-14,
“OverHead Connection ” (p. 4-13).

Figure 4-14 OverHead Connection

The following are the parameter description:


• Retrieve Connection command: RTRV-AUX- retrieves the provisioned parameters
for AUX channel functionality.
• Filter by Access Identifier: Allows to filter by Access Identifier type.
...................................................................................................................................................................................................

2 Click Search. The system retrieves the overhead connection details based on the search
parameter defined.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 4-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-6: Create OverHead Connection

....................................................................................................................................................................................................................................

Procedure 4-6: Create OverHead Connection


Purpose
Use this procedure to configure OverHead connection.
...................................................................................................................................................................................................

1 Select Connection -> OH XC ->OH Create from the menu bar as shown in Figure 4-15,
“Create OverHead Connection ” (p. 4-14).

Figure 4-15 Create OverHead Connection

Table 4-5, “OverHead Connection parameters” (p. 4-14) provides description of Create
OverHead Connection panel parameters:

Table 4-5 OverHead Connection parameters

Parameter Description
Enter Command ENT-AUX command is used to provision AUX
channel configuration parameters.
From Allows to select the start point.
To Allows to select the end point.

....................................................................................................................................................................................................................................
4-14 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-6: Create OverHead Connection

....................................................................................................................................................................................................................................
Table 4-5 OverHead Connection parameters (continued)

Parameter Description
Overhead Byte Correlation Tag, associates input command
with its output responses
• S27 - F1 byte, overhead byte postion in
SOH: row=2, col=7.
• S24 - F1 byte, overhead byte postion in
SOH: row=2, col=4.
• S25 - F1 byte, overhead byte postion in
SOH: row=2, col=5.
• S97 - F1 byte, overhead byte postion in
SOH: row=9, col=7.
• S38 - F2 byte, overhead byte postion in
SOH: row=3, col=8.
• S39 - F2 byte, overhead byte postion in
SOH: row=3, col=9.
• S62 - F2 byte, overhead byte postion in
SOH: row=6, col=2.
• S89 - F2 byte, overhead byte postion in
SOH: row=8, col=9.

...................................................................................................................................................................................................

2 Click Select to select the From and To directions.


Results: The following window pops up.

....................................................................................................................................................................................................................................
1646 SM 4-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Connection Procedure 4-6: Create OverHead Connection

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Save to create a OverHead connection.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
4-16 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
5 Ethernet Functions
5

Overview
Purpose
Provides a description of the Ethernet functionality and features supported in the Zero
Installation Craft (ZIC) terminal.

Contents

Procedure 5-1: Traffic descriptor 5-2


Procedure 5-2: Resource Availability 5-5
Procedure 5-3: VLAN Profile 5-7
Procedure 5-4: Create color profile 5-9
Procedure 5-5: Bridge configuration 5-10
Procedure 5-6: IGMP management 5-11
Procedure 5-7: Global setting 5-13
Procedure 5-8: Create maintenance domain 5-13
Procedure 5-9: Create maintenance association 5-15
Procedure 5-10: Search MEP 5-17
Procedure 5-11: Create MEP 5-19
Procedure 5-12: EFM tool 5-21
Procedure 5-13: Configure EFM tool 5-22
Procedure 5-14: Create VLAN 5-23
Procedure 5-15: ConfigureVLAN 5-24
Procedure 5-16: Dynamic filtering DB 5-26
Procedure 5-17: Configure static unicast filtering 5-27
Procedure 5-18: Configure static multicast filtering 5-28
Procedure 5-19: Create ERP topology 5-29
Procedure 5-20: Create ELP 5-36

...................................................................................................................................................................................................................................
1646 SM 5-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................

Procedure 5-1: Traffic descriptor


When to use
This procedure is to be used as a guideline for a set of instructions to create, configure,
activate and delete a traffic descriptor.
A Traffic descriptor is the set of Committed Information Rate (CIR), Committed Burst
Size (CBS), Peak Information Rate (PIR), and Peak Burst Size (PBS) parameters used by
the System for bandwidth checks related to port bit rate or Virtual Transport bit rate on
which tunnels and pseudowires are defined. Main use is metering and policing operations.

Create traffic descriptor


Use this procedure to create traffic descriptor:
...................................................................................................................................................................................................

1 From Data menu, Select Traffic descriptor.


Result: The traffic Descriptor tab is displayed.
...................................................................................................................................................................................................

2 Click Create hyperlink.


Result: The Traffic Descriptor panel is displayed.

Figure 5-1 Traffic descriptor panel

Traffic Descriptor panel

Table 5-1 Traffic descriptor panel parameters

Parameter Description
User Label Indicates the label for Traffic Descriptor.
Service type Specifies the type of service the traffic. Identifies the used output queue.
Queue is specified by specifying the service type.
CIR [Kb/sec] Committed Information Rate - This is the maximum rate (kb/sec) with
high priority guaranteed for the packets delivery.
PIR [Kb/sec] Peak Information Rate - This is the maximum peak rate allowed
(kb/sec).
....................................................................................................................................................................................................................................
5-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................
Table 5-1 Traffic descriptor panel parameters (continued)

Parameter Description
CBS [KBytes] Committed Burst Size - This is the maximum burst size (byte) with high
priority guaranteed for delivery.
PBS [KBytess] Peak Burst Size - This is the maximum burst rate allowed (byte).

...................................................................................................................................................................................................

3 The Traffic Descriptor tab displays the table that contains different traffic descriptor
entries.

Table 5-2 Service type parameters

Parameter Description
Service type Indicates the Traffic codification, according to international standard
conversion:
bestEffortService - serves Low priority traffic, which relies on transport
layer protocol to recover from loss and tolerates large delay; for
example: E-mail and file transfer applications. Best Effort denotes BW
(PIR > CIR = 0 in 100kbps increments), which may or may not be
available per network operator’s reservation for Best Effort policy. It
may therefore be unavailable under congestion conditions.
backGroundService
regulatedService - serves Medium priority traffic, which relies on
transport layer protocol to recover from occasional loss and requires
moderate delay; for example, client–server applications. Regulated
service denotes BW (PIR > CIR >0 in 100 Kbps increments), which may
be overbooked per network operator’s overbooking policy. The portion
of bandwidth between CIR and PIR (EIR) may therefore be partially
available under congestion conditions.
Grouped
regulatedService1
regulatedService3
regulatedService4
guaranteedService - serves High priority traffic for mission critical
applications that require loss–less delivery and minimal delay.
Guaranteed SLA denotes BW (CIR = PIR > 0 in 100 Kbps increments),
that is always available regardless of any congestion conditions. Traffic
delivered using Guaranteed BW, is policed to the CIR value with a burst
window equal to the CBS.
guaranteedService2

....................................................................................................................................................................................................................................
1646 SM 5-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................
Table 5-2 Service type parameters (continued)

Parameter Description
CIR [Kb/sec] This is the normal medium rate (expressed in kb/sec) of the data flow
(Effective Bandwidth) and it ranges from 0 to PIR value. It can be set
only if the RegulatedService has been selected; in BestEffortService
case it is set to 0 by the system; in GuaranteedService case it is set equal
to PIR value.
PIR [Kb/sec] This is the maximum rate (expressed in kb/sec) up to which the source
can transmit for a short time period and it ranges from 3 to
physical-linerate of the relative Port.
CBS [Kbytes] This is the committed number of bytes for which the source may
transmit the PIR; it ranges from 0 to 64 MB. It can be set only if the
RegulatedService traffic has been selected; in BestEffortService case it
is set to 0 by the system; in GuaranteedService case it is set equal to PBS
value. A value greater than MTU (e.g. 2000) is advisable.
PBS [Kbytes] This is the number of bytes for which are allowed to be sent above PIR
or CIR before the colour (drop eligibility) of the packet changes; it
ranges from 1 to 64 MB (this max value cannot be greater than the
minimum value of 64 MB or 256xCBS. I.e.: if CBS=2000, then
PBS<512 kB). A value greater than MTU (e.g. 2000) is advisable.

...................................................................................................................................................................................................

4 TD Policing Mode contains a drop-down list containing the following options:


• td_undefined
• td_colorBlind
• td_colorAware
• td_colorAwareNoCoupling
• td_colorAwareWithCoupling
...................................................................................................................................................................................................

5 Click Cancel to return to the previous page.


...................................................................................................................................................................................................

6 Click Save & Exit to save all the changes and exit from the window.
...................................................................................................................................................................................................

7 Click Save & Continue to save the settings and create another traffic descriptor.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
5-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................

Procedure 5-2: Resource Availability


When to use
This procedure is used to monitor and to count the amount of dynamic NE resources,
where dynamic NE resources (for example, ETS Classifier, ETS Inflow, ETS Outflow
and so on..) are mapped inside NE internal resources.
This features allows you to perform the following functions:
• to report the “Used” amount of entries and the “Available” amount of entries
(associated to each dynamic NE resource) to a Management operator, informing the
Management Operator when available resources are exhausted
• to support Resource management feature to track Resources limitations (“on per-NE
basis”) through dedicated Resource Management pools (see Figure 5-2, “Resource
Management Pools” (p. 5-6) ). Each Resource Management Pool allows the
monitoring of a resource, relying on the following retrieved information (for each
resource):
– used entries
– available entries
• to keep aligned the values inside Management Pools with Packet processor CAM

Resource Management Pools


Use this procedure to view the resource management pools:
...................................................................................................................................................................................................

1 From Data menu, Select Resource Availability.

....................................................................................................................................................................................................................................
1646 SM 5-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................
Result: The Resource Management Pools tab is displayed.

Figure 5-2 Resource Management Pools

Resource Management Pool

Table 5-3 Resource Management Pool parameters

Parameter Description
ETS Cross-Connections
Used Specifies the Used number of entries for the NE resource ETS
Cross-Connections
Available Specifies the Available number of entries for the NE resource ETS
Cross-Connections.
Unavailable Specifies the Unavailable number of entries for the NE resource
ETS Cross-Connections.
Nominal Specifies the nominal number of entries for the NE resource ETS
Cross-Connections.
Ethernet OAM MEPs
Used Specifies the Used number of entries for the NE resource Ethernet
OAM MEPs.
Available Specifies the Available number of entries for the NE resource
Ethernet OAM MEPs.
Unavailable Specifies the Unavailable number of entries for the NE resource
Ethernet OAM MEPs.

....................................................................................................................................................................................................................................
5-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................
Table 5-3 Resource Management Pool parameters (continued)

Parameter Description
Nominal Specifies the nominal number of entries for the NE resource
Ethernet OAM MEPs.
Static Vlan Reg. Entry
Used Specifies the Used number of entries for the NE resource static
VLAN.
Available Specifies the Available number of entries for the NE resource static
VLAN.
Unavailable Specifies the Unavailable number of entries for the NE resource
static VLAN.
Nominal Specifies the nominal number of entries for the NE resource static
VLAN.
Static Filtering
Used Specifies the Used number of entries for the NE resource static
filtering.
Available Specifies the Available number of entries for the NE resource static
filtering.
Unavailable Specifies the Unavailable number of entries for the NE resource
static filtering.
Nominal Specifies the nominal number of entries for the NE resource static
filtering.

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-3: VLAN Profile


When to use
The virtual LAN (VLAN) management provides reports the registered VLANs associated
to the Ethernet interface existing on the each data card and in specific range. VLAN
registration is not applicable to MAC Bridge case.
User this procedure to view the virtual LAN mode.

....................................................................................................................................................................................................................................
1646 SM 5-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-3: VLAN Profile

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Data → VLAN profile option from the menu bar.

Figure 5-3 VLAN Profile

...................................................................................................................................................................................................

2
Table 5-4 VLAN Protocol Profile panel parameters

Parameter Description
State Specifies the state of the VLAN.
User label Specifies the default user label of the VLAN.
Ethernet type (0x) Specifies the Ethernet type values, which is an hexadecimal value
for the provider protocol-type (PT) that is inserted into the 2-bytes
field of the Stacked-VLAN shim header; the value identifies the
network provider and has to be 2-bytes long in hexadecimal
notation; the third non-included byte is forced by default to “0x”.
The PT is used to recognize the type of different VLAN frames,
that is, if they are “S-Vlan-tagged” or “Q-Vlan tagged”;
In 1646, the types of VLAN frames supported are only 88A8 or
8100 for 802.1ad or 802.1Q.

...................................................................................................................................................................................................

3 Click Cancel to cancel the operation and return to the previous page.
...................................................................................................................................................................................................

4 Click Save & continue to apply the changes and continue the configuration process.
...................................................................................................................................................................................................

5 Click Save & Exit to apply the changes and the following page appears.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
5-8 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-4: Create color profile

....................................................................................................................................................................................................................................

Procedure 5-4: Create color profile


When to use
Use this procedure to create a new color profile.

Procedure
...................................................................................................................................................................................................

1 Select Data → Color profile option from the menu bar.


...................................................................................................................................................................................................

2 Click Create hyperlink.


The following screen appears.

Figure 5-4 Color profile

...................................................................................................................................................................................................

3
Table 5-5 Color Profile panel parameters

Parameter Description
Color Profile Mode Specifies the color profile mode.
The values are
• Priority
• Dscp
User Label Specifies the label for the new color profile

....................................................................................................................................................................................................................................
1646 SM 5-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-4: Create color profile

....................................................................................................................................................................................................................................
Table 5-5 Color Profile panel parameters (continued)

Parameter Description
Priority Bits 0 to 7 Specifies the priority bits. The valid range is 0-7.
The values are
• green
• red
• yellow

...................................................................................................................................................................................................

4 Select Dscp from the Color Profile Mode drop-down list. The Priority bits increases to 0-
63.
...................................................................................................................................................................................................

5 Click Cancel to unsave the settings and return to the previous page.
...................................................................................................................................................................................................

6 Click Save & Exit to save the settings and return to the previous page.
...................................................................................................................................................................................................

7 Click Save & Continue to save the settings and continue to create another color profile.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-5: Bridge configuration


When to use
User this procedure to create a new bridge configuration.

....................................................................................................................................................................................................................................
5-10 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-5: Bridge configuration

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

1 Select Data → Bridge → Configuration option from the menu bar.

Figure 5-5 Bridge configuration panel

...................................................................................................................................................................................................

2 Select the Type of bridge to be configured from the Bridge Type drop-down list box.
The values are:
• Bridge802.1D
• Bridge802.1Q
• Bridge802.1ad
...................................................................................................................................................................................................

3 Select the type of protocol from the Protocol Type drop-down list box.
The values are:
• manualDisable
• STP
• RSTP
...................................................................................................................................................................................................

4 Click Save & Continue to save the setting and continue to create another bridge
configuration.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-6: IGMP management


When to use
Use this procedure to set IGMP management settings.

....................................................................................................................................................................................................................................
1646 SM 5-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-6: IGMP management

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Data → IGMP Management option from the menu bar.


Result: The IGMP Management per NE tab is displayed

...................................................................................................................................................................................................

2 The IGMP Management per NE displays the details of Board, Router Neighbor Timeouts
and their status.
Click Create link to configure IGMP management for a new board.
Result: The IGMP Configurations per NE panel is displayed

...................................................................................................................................................................................................

3 Click Select link to choose the board for IGMP configuration is done.
Result: A new window is displayed with a list of boards.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
5-12 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-7: Global setting

....................................................................................................................................................................................................................................

Procedure 5-7: Global setting


When to use
Use this procedure to set OAM - Global Configuration.

Procedure
...................................................................................................................................................................................................

1 Select Data → OAM management → Global Setting option from the menu bar.
...................................................................................................................................................................................................

2 The NE Global Setting tab displays the OAM Global Configuration panel.
This panel contains the following parameters:
• ETH Type
• LBM Time Out [sec]

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-8: Create maintenance domain


When to use
Use this procedure to configure the maintenance domain.

Procedure
...................................................................................................................................................................................................

1 Select Data → OAM Management → OAM Resource config. → MD option from the
menu bar.
Click Create hyperlink.

....................................................................................................................................................................................................................................
1646 SM 5-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-8: Create maintenance domain

....................................................................................................................................................................................................................................
Result: The Create Maintenance Domain panel is displayed.

Figure 5-6 Create Maintenance Domain panel

This panel lists the parameters described in the following table:

Table 5-6 Maintenance Domain panel parameters

Parameter Description
MD Label Specifies the maintenance domain label. The default values is MD#0
Name Specifies the name for the maintenance domain
MHFCreation Indicates the MIP Half Function (MHF) Creation.
The values are:
• defMHFnone
• defMHFdefault
Format Specifies the MD format.
The values are:
• charString
• dnsLikeName
• none
Level Specifies the maintenance domain levels. The valid range is from Level0
to Level7
Status Specifies the maintenance domain status. The values are:
• up
• down

...................................................................................................................................................................................................

2 Click Save to save the settings and return to the previous panel.

....................................................................................................................................................................................................................................
5-14 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-8: Create maintenance domain

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Cancel to cancel the settings and return to the previous panel.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-9: Create maintenance association


When to use
Use this procedure to configure the maintenance association.

Procedure
...................................................................................................................................................................................................

1 Select Data → OAM Management → OAM Resource config. → MA option from the
menu bar.
Result: The Maintenance Associations Range panel is displayed.

Figure 5-7 Maintenance Associations Range panel

This panel lists the parameters described in the following table:

Table 5-7 Maintenance Domain panel parameters

Parameter Description
Search Filter Specifies the search criteria. The values are show all or specify criteria
MD From To Specifies the MD range from 1-4
MA From To Specifies the MA range from 1-80

....................................................................................................................................................................................................................................
1646 SM 5-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-9: Create maintenance association

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Click Search/Refresh to filter the Maintenance Association based on the range selected.
...................................................................................................................................................................................................

3 Click Create to configure a new Maintenance Association.


Result: The Create Maintenance Association panel is displayed.

Figure 5-8 Create Maintenance Association panel

This panel lists the parameters described in the following table:

Table 5-8 Create Maintenance Association panel parameters

Parameter Description
MD Specifies the MD number.
Status Specifies the maintenance domain status. The values are:
• up
• down
MA Index Specifies the index for new Maintenance Association.
MHFCreation The values are:
• defMHFnone
• defMHFdefault
MA Name Specifies the new name for Maintenance Association.
CCM Interval The values are:
• interval100ms
• interval1s
• interval10s
• interval1min
• interval10min
....................................................................................................................................................................................................................................
5-16 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-9: Create maintenance association

....................................................................................................................................................................................................................................
Table 5-8 Create Maintenance Association panel parameters (continued)

Parameter Description
Format Specifies the format for new Maintenance Association. The values are:
• charString
Type Type is vid
Vid Click on Select to choose the Vid.

...................................................................................................................................................................................................

4 Click Cancel to cancel the settings and return to the previous panel.
...................................................................................................................................................................................................

5 Click Save to save the settings and return to the previous panel.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-10: Search MEP


When to use
Use this procedure to search for a list of MEPs.

Procedure
...................................................................................................................................................................................................

1 Select Data → OAM Management → OAM Resource config. → MA MEP List option from
the menu bar.

....................................................................................................................................................................................................................................
1646 SM 5-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-10: Search MEP

....................................................................................................................................................................................................................................
Result: The Maintenance Associations Range panel is displayed.

Figure 5-9 MA MEP List Range panel

This panel lists the parameters described in the following table:

Table 5-9 Maintenance Domain panel parameters

Parameter Description
Search Filter Specifies the search criteria. The values are Show all or Specify
Criteria.
MD From To Specifies the MD range from 1-4
MA From To Specifies the MA range from 1-80
MEP From To Specifies the MEP range from 1-8190

...................................................................................................................................................................................................

2 Select the filter criteria from the Search Filter drop-down list box. The values are: Show
alland specify criteria.
...................................................................................................................................................................................................

3 If Show all is selected as a search filter the MD From and To and MA From and To range
cannot be set by the user. To set the specified range, select specify criteria and click
Search that displays the existing MA MEP list.
...................................................................................................................................................................................................

4 Click Search to filter the MEP based on the range selected.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
5-18 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-11: Create MEP

....................................................................................................................................................................................................................................

Procedure 5-11: Create MEP


When to use
Use this procedure to configure a new MEP.

Procedure
...................................................................................................................................................................................................

1 Select Data → OAM Management → OAM Resource config. → MEP option from the
menu bar.
Result: The Maintenance Associations Range panel is displayed.

Figure 5-10 MEP List Range panel

This panel lists the parameters described in the following table:

Table 5-10 Maintenance Domain panel parameters

Parameter Description
Search Filter Specifies the search criteria. The values are Show all or Specify
Criteria.
MD From To Specifies the MD range from 1-4
MA From To Specifies the MA range from 1-80
MEP From To Specifies the MEP range from 1-8190

...................................................................................................................................................................................................

2 Select the filter criteria from the Search Filter drop-down list box. The values are: Show
alland specify criteria.

....................................................................................................................................................................................................................................
1646 SM 5-19
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-11: Create MEP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 If Show all is selected as a search filter the MD From and To and MA From and To range
cannot be set by the user. To set the specified range, select specify criteria and click
Search that displays the existing MA MEP list.
...................................................................................................................................................................................................

4 Click Search to filter the MEP based on the range selected.


...................................................................................................................................................................................................

5 Select Data → OAM Management → OAM Resource config. → MEP option from the
menu bar.
Click Create hyperlink.

Figure 5-11 Create MEP panel

This panel lists the parameters described in the following table:

Table 5-11 Create MEP panel parameters

Parameter Description
MA Label Specifies the MA label for the MEP
MEP Identifier Specifies the MEP identifier for the MEP. The ID must come from MA's
settings.
If Index Specifies the If Index value for the MEP
LTM/CCM Priority Specifies the LTM priority. The valid range is 0-7
(0..7)
LBM Priority Specifies the LBM priority. The default value is 7
CCIEnable Specifies the CCIEnable as either True or False
Active Indicates the Activation State. The values are:
• true
• false
Direction Indicates the MEP Direction. The values are:
• Up
• Down

....................................................................................................................................................................................................................................
5-20 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-11: Create MEP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Click Select to choose the MA Label, MEP Identifier and If index values and click Save
to store the settings.
...................................................................................................................................................................................................

7 Click Cancel to revoke all the settings and return to the previous panel
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-12: EFM tool


When to use
Use this procedure to search for the available local ports.

Procedure
...................................................................................................................................................................................................

1 Select Data → EFM tool option from the menu bar.


Result: The EFM tool tab displays the Search Local Port panel.

Figure 5-12 EFM tool

...................................................................................................................................................................................................

2 Click Search link to search for the available ports.


Result: The boards panel is displayed.
...................................................................................................................................................................................................

3 Click boards link on the left pane.


Result: The list of local ports available are displayed in the right pane.
...................................................................................................................................................................................................

4 Click on any of the available port link to select that port.


Result: The selected port name is displayed in the Search Local Port panel.
...................................................................................................................................................................................................

5 Click Show.

....................................................................................................................................................................................................................................
1646 SM 5-21
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-12: EFM tool

....................................................................................................................................................................................................................................
Result: The EFM Tool panel with Configuration and Link Monitoring tabs is
displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-13: Configure EFM tool


When to use
Use this procedure to configure the available local ports.

Procedure
...................................................................................................................................................................................................

1 Select Data → EFM tool option from the menu bar.


Result: The EFM tool panel is displayed with the Configuration and Link Monitoring
tabs. By default the Configuration tab is opened.

Figure 5-13 EFM tool

....................................................................................................................................................................................................................................
5-22 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-13: Configure EFM tool

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Selectenabled to enable the Admin State.


Result: The boards panel is displayed.
...................................................................................................................................................................................................

3 Click Save on the bottom left pane of the panel to save the changes.
...................................................................................................................................................................................................

4 Click Cancel to undo the changes and return back to the Search Local Port panel.
...................................................................................................................................................................................................

5 Click Show.
Result: The EFM Tool panel with Configuration and Link Monitoring tabs is
displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-14: Create VLAN


When to use
Use this procedure to search, create and configure VLAN.

Procedure
...................................................................................................................................................................................................

1 Select Data → Virtual LAN Management → Virtual LAN option from the menu bar.
Result: The VLAN Registration tab is displayed

Figure 5-14 VLAN Registration

...................................................................................................................................................................................................

2 Enter the range of ports to be searched in From: and To: boxes and click Search.

....................................................................................................................................................................................................................................
1646 SM 5-23
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-14: Create VLAN

....................................................................................................................................................................................................................................
Result: The search result is displayed.
...................................................................................................................................................................................................

3 Click Create link on the bottom left pane of the VLAN Registration tab.
Result: The Create VLAN panel is displayed.
...................................................................................................................................................................................................

4 Enter a numeric value in the VLAN Id: text box. Then select the port to which you want to
assign the VLAN Id from the list of ports in Available Port panel and by clicking
.
Result: The selected port is displayed in the Selected Port: panel.
...................................................................................................................................................................................................

5 Click Save to save the VLAN created


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-15: ConfigureVLAN


When to use
Use this procedure to configure VLAN.

Procedure
...................................................................................................................................................................................................

1 Select Data → Virtual LAN Management → Virtual LAN option from the menu bar.
Result: The VLAN Registration tab is displayed

Figure 5-15 VLAN Registration

...................................................................................................................................................................................................

2 Enter the range of ports to be searched in From: and To: boxes and click Search.

....................................................................................................................................................................................................................................
5-24 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-15: ConfigureVLAN

....................................................................................................................................................................................................................................
Result: The search result is displayed.

...................................................................................................................................................................................................

3 Select the check box of the VLAN that you want to configure and click Configure link
given for the selected VLAN.
Result: The Modify VLAN panel is displayed.

Figure 5-16 Modify VLAN

This panel lists the parameters described in the following table:

Table 5-12 Modify VLAN parameters

Parameter Description
VLAN Specifies the VLAN Id assigned.
Limit in learning Indicates the status. The values are:
process • disabled
• enabled
Port# Specifies the Port#
Value Specifies the Value
Untagged Specifies the Untagged ports

...................................................................................................................................................................................................

4 Click Save to save the VLAN modified.


....................................................................................................................................................................................................................................
1646 SM 5-25
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-15: ConfigureVLAN

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click Cancel to undo the changes and return back to VLAN Registration panel.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 5-16: Dynamic filtering DB


When to use
Use this procedure to view modify the dynamic filtering parameter.

Procedure
...................................................................................................................................................................................................

1 Select Data → Virtual LAN Management → DB Filtering option from the menu bar.
Result: The Dynamic Filtering Parameter panel is displayed

Figure 5-17 Dynamic filtering database

...................................................................................................................................................................................................

2 Enter the time interval in seconds in Aging Time (seconds): text box and click Save.
Note: The value entered for Aging Time (seconds): should be in multiples of 60. If
any value other than this is entered, it throws up an error as shown in Figure 5-18,
“Dynamic filter error message” (p. 5-26).

Figure 5-18 Dynamic filter error message

Result: The Dynamic filtering parameter is saved.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
5-26 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-17: Configure static unicast filtering

....................................................................................................................................................................................................................................

Procedure 5-17: Configure static unicast filtering


When to use
Use this procedure to configure static unicast filtering.

Procedure
...................................................................................................................................................................................................

1 Select Data → Virtual LAN Management → DB Filtering option from the menu bar.
Result: The Static Unicast Filtering tab is displayed

Figure 5-19 Static Unicast Filtering

...................................................................................................................................................................................................

2 Click Create link to configure a new static unicast filtering entry. .


Result: The Static Unicast Filtering Entry tab is displayed.

Table 5-13 Static Unicast Filtering Entry parameters

Parameters Description
VLAN ID Specifies the Virtual LAN ID of the equipment.
MAC Address Specifies the MAC address of the port.
Outbound port Specifies the outbound port of the equipment.

...................................................................................................................................................................................................

3 Click on the Select link to choose an existing VLAN ID from the drop-down list.
...................................................................................................................................................................................................

4 Click on the Select link to choose an existing outbound data ports from the drop-down
list.
...................................................................................................................................................................................................

5 Click Save & Exit to save the settings and return to the previous window.
...................................................................................................................................................................................................

6 Click Save & Continue to save the setting and configure another unicast entry.
...................................................................................................................................................................................................

7 Click Cancel to cancel the settings and return back to previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 5-27
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-18: Configure static multicast filtering

....................................................................................................................................................................................................................................

Procedure 5-18: Configure static multicast filtering


When to use
Use this procedure to configure static multicast filtering.

Procedure
...................................................................................................................................................................................................

1 Select Data → Virtual LAN Management → DB Filtering option from the menu bar.
Result: The Static Multicast Filtering tab is displayed

Figure 5-20 Static Multicast Filtering

...................................................................................................................................................................................................

2 Click Create link to configure a new static multicast filtering entry. .


Result: The Static Multicast Filtering Entry tab is displayed.

Table 5-14 Static Multicast Filtering Entry parameters

Parameters Description
VLAN ID Specifies the Virtual LAN ID of the equipment.
MAC Address Specifies the MAC address of the port.
Outbound port Specifies the outbound port of the equipment.

...................................................................................................................................................................................................

3 Click on the Select link to choose an existing VLAN ID from the drop-down list.
...................................................................................................................................................................................................

4 Click on the Select link to choose an existing outbound data ports from the drop-down
list.
...................................................................................................................................................................................................

5 Click Save & Exit to save the settings and return to the previous window.
...................................................................................................................................................................................................

6 Click Save & Continue to save the setting and configure another multicast entry.
...................................................................................................................................................................................................

7 Click Cancel to cancel the settings and return back to previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
5-28 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Procedure 5-19: Create ERP topology


When to use
Use this procedure to create a new Ethernet Ring Protection (ERP).

Procedure
...................................................................................................................................................................................................

1 Select Protection → ERP[ITU-T G.8032] option from the menu bar.

Figure 5-21 ERP[ITU-T G.8032]

...................................................................................................................................................................................................

2 Select theERP topology for which the user wants to configure an ERP.

Figure 5-22 Ethernet Ring Protection Topology

....................................................................................................................................................................................................................................
1646 SM 5-29
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Create to configure a new ERP topology.

Figure 5-23 ERP Topology

...................................................................................................................................................................................................

4 ERP topology panel parameters are described in the following table.

Table 5-15 ERP topology parameters

Parameter Description
ERP Label Specifies the ERP label.
Interconnection Node The values are True or False. Only the value
False is supported in R2.2.
East Port Allows to select the east port.
West Port Allows to select the west port.

....................................................................................................................................................................................................................................
5-30 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Figure 5-24 East/West Ports

E...................................................................................................................................................................................................
N D O F S T E P S

Create ERP instance


...................................................................................................................................................................................................

1 Select the ERP Topology.


...................................................................................................................................................................................................

2 Click on Activate to activate the ERP topology for which the instance is to be created.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 5-31
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................
Create ERP Instance

Figure 5-25 ERP instance

Create ERP Protection Group


Use this procedure to create ERP Protection Group.
...................................................................................................................................................................................................

1 Click create from the tree area. The Create ERP Protection Group is displayed.

Figure 5-26 ERP Protection Group

....................................................................................................................................................................................................................................
5-32 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Select the ERP topology for which the ERP instance has to be created.

Figure 5-27 ERP topology panel

...................................................................................................................................................................................................

3 The CreateERP Protection Group panel allows changing the settings of the resource by
means of the following parameters:

Table 5-16 The ERP Protection Group parameters

Parameter Description
ERP label Specifies the ERP label.
Scope Specifies the ERP scope in which the ERP
instance operates. The values are Per port and
Per_VLAN.
RPL Owner It is an Ethernet Ring Node adjacent to the
RPL that is responsible for blocking its end of
the RPL under normal conditions.
Wait-to- restore WTR This parameter must be in the set { 0, 1, 2, ..,
12 minutes}, with default value at 5 minutes.
A value “infinite” (corresponding to “non
revertive “switching behavior) is not supported
Guard Timer This parameter must be in the range [10 - 2000
msec] with 10 msec steps. Default value is 500
msec.

....................................................................................................................................................................................................................................
1646 SM 5-33
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................
Table 5-16 The ERP Protection Group parameters (continued)

Parameter Description
Hold-off Timer This parameter must be in the range [ 0 - 10
sec], with 0.1 sec. steps. Default value is 0 sec.
Revertive The values are True or False. Only the value
True is supported in R2.2.
ERP Version Specifies the ERP version.
APS Ring VLAN ID Specifies the APS Ring VLAN ID.
Maintenance Entity Level Maintenance Entity Level represents the
information to be used to distinguish between
OAM signals belonging to different nested
MEs, at any point in a network.
VLAN priority Specifies the VLAN ID priority.

...................................................................................................................................................................................................

4 Select the MEPs associated with the corresponding East and West ports.
Note:
1. Create and activate ERP instance so as to create APS ring VLAN which will be
used for associating MA.
2. Create MD, MA, MEP list, and then map the MEP with the ERP.

Figure 5-28 MEPs for East/West ports

....................................................................................................................................................................................................................................
5-34 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Parameter Description
Switch Command The values are Clear, w-FS and e-FS.
• Clear-This command clears all the
externally initiated switch commands.
• w-FS- This command locally issues
Forced Switch on West.
• e-FS- This command locally issues Forced
Switch on East.

Figure 5-29 MEP Range

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 5-35
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................

Procedure 5-20: Create ELP


When to use
Use this procedure to create a new Ethernet Linear Protection (ELP).

Procedure
...................................................................................................................................................................................................

1 Select Protection → Ethernet Linear Protection from the menu bar.

Figure 5-30 Ethernet Linear Protection

...................................................................................................................................................................................................

2 The Ethernet Linear Protection Group Management screen is displayed:

Figure 5-31 Ethernet Linear Protection Group

....................................................................................................................................................................................................................................
5-36 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click create to configure a new Ethernet Linear Protection Group. The following screen
is displayed:

Figure 5-32 Create Ethernet Linear Protection Group

...................................................................................................................................................................................................

4 The Ethernet Linear Protection panel allows changing the settings of the resource by
means of the following parameters:

Table 5-17 Ethernet Linear Protection parameters

Parameter Description
User Label Specifies the user label.
Status Specifies the status. The values are active or
Notinservice.

....................................................................................................................................................................................................................................
1646 SM 5-37
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
Table 5-17 Ethernet Linear Protection parameters (continued)

Parameter Description
Name Specifies Ethernet Linear Protection Group
name.
Wait-to- restore WTR This parameter must be in the set [0, 1, 2, ..,
12 minutes], with default value at 5 minutes. A
value “infinite” (corresponding to “non
revertive” switching behavior) is not supported
Hold-off Timer This parameter must be in the range [0 - 10
sec], with 0.1 sec. steps. Default value is 0 sec
Switch Command The values are Clear, Lockout of Protection,
Forced Switch and Manual.
• Clear- This command clears all the
externally initiated switch commands
• Lockout of Protection- This command
fixes the selector position to the working
connection. Prevents the selector from
switching to the protection connection
when it is selecting the working
connection. Switches the selector from the
protection to the working connection when
it is selecting the protection connection.
• Forced Switch- This command switches
the selector from the working connection
to the protection connection, unless a
higher priority switch request (that is, LO)
is in effect.
• Manual- This command switches the
selector from the working connection to
the protection connection, unless an equal
or higher priority switch request (i.e., LO,
FS, SF or MS) is in effect.

....................................................................................................................................................................................................................................
5-38 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select the PU interface from the list as shown in the figure.

Figure 5-33 PU interface

....................................................................................................................................................................................................................................
1646 SM 5-39
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Select the PU VLAN-ID value from the list as shown in the figure.

Figure 5-34 VLAN-ID Range

....................................................................................................................................................................................................................................
5-40 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Select the PU MD/MA/MEP values from the list as shown in the figure.

Figure 5-35 MD/MA/MEP Range

...................................................................................................................................................................................................

8 Click save to save all the settings.


...................................................................................................................................................................................................

9 Click cancel to revoke all changes and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 5-41
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Ethernet Functions Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
5-42 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
6 Data Communication
6

Overview
Purpose
Provides an introduction to the data communication ports and features.

Contents

DCC 6-2
Procedure 6-1: Network IF 6-2
Procedure 6-2: XC Overhead 6-3
DCN Phys. If 6-6
Procedure 6-3: IP Address 6-6
Procedure 6-4: LAN management 6-7
IP tunnel management 6-8
Procedure 6-5: Administer IP tunnel 6-8
Procedure 6-6: Configure IP tunnel 6-9
Network domain 6-11
Procedure 6-7: Configure IP route 6-11
Procedure 6-8: OSI management 6-14
Management Access Control 6-17
Procedure 6-9: Create MAC Access Control List (ACL) 6-17

...................................................................................................................................................................................................................................
1646 SM 6-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Overview
DCC
....................................................................................................................................................................................................................................

DCC

Overview
Purpose
The purpose of this procedure is to create SEL for Data Communication Network (DCN).

Contents

Procedure 6-1: Network IF 6-2


Procedure 6-2: XC Overhead 6-3

Procedure 6-1: Network IF


When to use
Use this procedure to create the network interface.

Procedure
Follow this procedure to create network interface:
...................................................................................................................................................................................................

1 Select Communication → DCC→ Network IF from the menu bar.


Result: The DCC Channel tab is displayed.Figure 6-1, “DCC Channel” (p. 6-2).

Figure 6-1 DCC Channel

...................................................................................................................................................................................................

2 Click Create SEL link.

....................................................................................................................................................................................................................................
6-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-1: Network IF
DCC
....................................................................................................................................................................................................................................
Result: The Filter by panel is displayed.

Table 6-1 Filter by parameters

Parameter Description
AID type Specifies the AID type available
• STM1
• STM4
• STM16
Cancel Cancels the AID type selection and returns back to the
previous window.
Search Searches the available DCC channels for the selected AID
type.

...................................................................................................................................................................................................

3 Click Search to search for the DCC channel with the selected AID type.
Result: The DCC channels available for the selected AID type is displayed.
...................................................................................................................................................................................................

4 Select any one of the DCC channels and click Apply & Exit link.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 6-2: XC Overhead


When to use
Use this procedure to create Overhead channel cross-connection.

Procedure
...................................................................................................................................................................................................

1 Select Communication → DCC→ XC Overhead from the menu bar.


....................................................................................................................................................................................................................................
1646 SM 6-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-2: XC Overhead
DCC
....................................................................................................................................................................................................................................
Result: The Overhead channel Cross connection tab is displayed.

Figure 6-2 Overhead Channel Cross Connection

...................................................................................................................................................................................................

2 Click on the Create hyperlink to create a cross-connection.


Result: The Enter Channel panel is displayed

Table 6-2 IP address of Network Element

Parameter Description
DCC Channel Specifies the type of DCC
• SECTION
• LINE
From From Access identifier determines the entity Access Identifier (AID) of
either end of cross-connection for 2WAY cross-connections. The
cross-connection is bidirectional
To To Access identifier determines the entity Access Identifier (AID) of the
other end of a cross-connection for 2WAY cross-connections. The
cross-connection is bidirectional
Cancel Allows to cancel the selection and return back to the previous screen.
Save Allows to save the cross-connect settings.

...................................................................................................................................................................................................

3 Click Select links to choose the source and the destination to configure a
cross-connection.
...................................................................................................................................................................................................

4 Click Save to store all the settings and return back to the previous page.

....................................................................................................................................................................................................................................
6-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-2: XC Overhead
DCC
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click Cancel to revoke all the settings and return back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 6-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Overview
DCN Phys. If
....................................................................................................................................................................................................................................

DCN Phys. If

Overview
Purpose
The purpose of this procedure is to create DCN Physical interface management features.

Contents

Procedure 6-3: IP Address 6-6


Procedure 6-4: LAN management 6-7

Procedure 6-3: IP Address


When to use
Use this procedure to manage the system's IP address.

Procedure
Follow this procedure to manage system's IP address
...................................................................................................................................................................................................

1 Select Communication → DCN Phy. If →IP Address from the menu bar.
Result: The system IP address panel is displayed.

Figure 6-3 DCC Channel

Table 6-3 Filter by parameters

Parameter Description
IP Address: This is the IP Address of the NE. The entry box allows to
digit the IP address of the NE (value range
[1-99,101-126,128-223]-[0-255]-[0-255]-[0-254]).

....................................................................................................................................................................................................................................
6-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-3: IP Address
DCN Phys. If
....................................................................................................................................................................................................................................
Table 6-3 Filter by parameters (continued)

Parameter Description
Subnet mask: This is the entry box for subnet mask of the network the NE
is connected to (value range [128-255]-[0-255]-[0-255]-[0-
255]). The mask, in binary representation, must contain a
contiguous string of 1s (the network portion) and a
contiguous string of 0s (the host portion).

...................................................................................................................................................................................................

2 Click Save link to store the settings and return back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 6-4: LAN management


When to use
Use this procedure to manage the customer LAN.

Procedure
...................................................................................................................................................................................................

1 Select Communication → DCN Phys. If→LAN manag from the menu bar.
Result: The Customer LAN mangement tab is displayed.

Figure 6-4 Customer LAN management

...................................................................................................................................................................................................

2 Click Save to store all the settings and return back to the previous page.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 6-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Overview
IP tunnel management
....................................................................................................................................................................................................................................

IP tunnel management

Overview
Purpose
The purpose of this procedure is to manage an IP tunnel instance on the NE.
The IP tunnel that has to be created is specified by its AID. If the AID specified matches
any of the ID for existing IP tunnels, an error message is returned in response.

Contents

Procedure 6-5: Administer IP tunnel 6-8


Procedure 6-6: Configure IP tunnel 6-9

Procedure 6-5: Administer IP tunnel


When to use
Use this procedure to retrieve, create and delete an IP tunnel instance on the NE.

Procedure
Follow this procedure to view an IP tunnel:
...................................................................................................................................................................................................

1 Click Communication → IP Tunnel.


Result: The Network IP Tunnel Configuration panel is displayed.
This panel lists the parameters described in the table below:

Table 6-4 IP tunnel panel parameters

Parameter Description
Access Identifier IPT- Specifies the access identifier of the LSP tunnel for the network
connection. It is assigned by system at connection creation.
Remote NSAP Specifies the Network Service Access Point (NSAP) for the IP
Tunnel
Encapsulation Type Specifies the Encapsulation Type required for the Tunnel
configuration
• ALU
• GRE

....................................................................................................................................................................................................................................
6-8 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-5: Administer IP tunnel
IP tunnel management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The Delete hyperlink allows to remove from the list the selected item by the check box.
...................................................................................................................................................................................................

3 The Create hyperlink allows to configure a new IP Tunnel. For details refer to Procedure
6-6: “Configure IP tunnel” (p. 6-9).
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 6-6: Configure IP tunnel


When to use
Use this procedure to create an IP tunnel instance on the NE. The IP tunnel that has to be
created is specified by its Access Identifier (AID).

Procedure
...................................................................................................................................................................................................

1 Select Communication → IP Tunnel.


...................................................................................................................................................................................................

2 Click Create to configure the IP Tunnel as shown in Figure 6-5, “Create IP tunnel”
(p. 6-9).

Figure 6-5 Create IP tunnel

See Table 6-4, “IP tunnel panel parameters” (p. 6-8) for parameter description.
...................................................................................................................................................................................................

3 Enter the IP tunnel access identifier in the entry box.


...................................................................................................................................................................................................

4 Enter the Remote NSAP value for the IP tunnel.

....................................................................................................................................................................................................................................
1646 SM 6-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-6: Configure IP tunnel
IP tunnel management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select the encapsulation type from the drop-down list box and click Save to create new IP
tunnel.
...................................................................................................................................................................................................

6 Click Close to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
6-10 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Overview
Network domain
....................................................................................................................................................................................................................................

Network domain

Overview
Purpose
The purpose of this procedure is to manage network domain.

Contents

Procedure 6-7: Configure IP route 6-11


Procedure 6-8: OSI management 6-14

Procedure 6-7: Configure IP route


When to use
Use this procedure to configure the IP Routing and enter (add) a new static IP route in the
IP routing table.

Procedure
Follow this procedure to configure the IP Routing:
...................................................................................................................................................................................................

1 Click Communication→Network Domain→IP Route from the menu bar.


Result: The IP Routing Configuration panel is displayed.
The panel displays the existing IP route entry along with its attributes.

....................................................................................................................................................................................................................................
1646 SM 6-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-7: Configure IP route
Network domain
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Click Create hyperlink to configure a new IP route as displayed in Figure 6-6, “IP route
creation” (p. 6-12).

Figure 6-6 IP route creation

Table 6-5, “IP Routing panel parameters” (p. 6-12) provides description of the IP route
panel parameters.

Table 6-5 IP Routing panel parameters

Parameter Description
Access Identifier Access Identifier, it specifies the facility carrying the DCC with the next
hop network interface or identifies the IP Tunnel or Customer LAN. The
select hyperlink allows to open the window shown in Figure 6-7, “AID
Type Selection” (p. 6-13) for the selection of the resource. After the
selection procedure, the chosen value will be reported
Destination Address This is the IP address of the destination host or network (in the format
nnn-nnn-nnn-nnn). The address 0-0-0-0 is used to specify a default
route. If NETMASK is not all '1' (that is, a network route is specified),
the host portion of the DESTADDR must be all '0'
Subnet Mask This is the IP subnet mask of the route (in the format nnn-nnnnnn- nnn).
The mask 0-0-0-0 is used to specify a default route
Metric This is the cost metric of the route. The valid range is 1- 65535
Status Specifies the status of the configuration.

....................................................................................................................................................................................................................................
6-12 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-7: Configure IP route
Network domain
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Enter the Access Identifier for the new IP route. Click Select hyperlink to choose the AID
type. The values are DCC, NE IPT, and LAN as shown in Figure 6-7, “AID Type
Selection” (p. 6-13).

Figure 6-7 AID Type Selection

...................................................................................................................................................................................................

4 Select one of the radio button to choose the AID value and click Send hyperlink, the
choice are added in the relevant field of the previous page. Close hyperlink allows to
leave the window.
...................................................................................................................................................................................................

5 Enter the Destination Address and Subnet mask for the IP route to be configured.
...................................................................................................................................................................................................

6 Enter the Metric value and set the Advertise value to either Y or N.
...................................................................................................................................................................................................

7 Click Save & Exit to save the settings and return to the window.
...................................................................................................................................................................................................

8 Click Save to store the settings and return to the previous panel.
...................................................................................................................................................................................................

9 Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 6-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-8: OSI management
Network domain
....................................................................................................................................................................................................................................

Procedure 6-8: OSI management


When to use
This option retrieves the parameters of a configured OSI AREA that the NE is part of.
It contains the following two sub-menu options:
• OSI NE Area
• OSI OS Address

Administer OSI NE area


...................................................................................................................................................................................................

1 Select Communication → Network Domain → OSI Mng → OSI NE Area option from the
menu bar. The OSI area panel is displayed as shown in Figure 6-8, “OSI Area” (p. 6-14).

Figure 6-8 OSI Area

...................................................................................................................................................................................................

2 Table 6-6, “OSI area panel parameters” (p. 6-14) provides description of OSI NE area
parameters.

Table 6-6 OSI area panel parameters

Parameter Description
OSI AREA Determines an access Identifier for an OSI area
Level 3 Initial Assigns the initial domain part of the manual area address (8
Domain Part hexadecimal characters)
Level 3 Domain Assigns the domain format identifier field of the manual area address (2
Format Identifier hexadecimal characters)
Level 3 Assigns the organization field of the manual area address (8 hexadecimal
ORGanization characters)

....................................................................................................................................................................................................................................
6-14 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-8: OSI management
Network domain
....................................................................................................................................................................................................................................
Table 6-6 OSI area panel parameters (continued)

Parameter Description
Level 3 Reserved Assigns the reserved field of the manual area address (4 hexadecimal
characters)
Level 3 Routing Assigns the routing domain and routing area within the routing domain
of the manual area address (8 hexadecimal characters)
Level 3 System This is the system identifier assigned to the card (12 hexadecimal
Identifier characters)

...................................................................................................................................................................................................

3 The Save hyperlink closes the page and return back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Administer OSI OS address


...................................................................................................................................................................................................

1 Select Communication → Network Domain → OSI Mng → OSI OS Address option from
the menu bar. The OS Address panel is displayed as shown in Figure 6-9, “OS Address”
(p. 6-15).

Figure 6-9 OS Address

...................................................................................................................................................................................................

2 Table 6-7, “OS Address panel parameters” (p. 6-15) provides description of the OS
address parameters.

Table 6-7 OS Address panel parameters

Parameter Description
Operating System Specifies the operating system for the open system
interconnection management. The values are: OSI and
IP.
Main Address Specifies the main address for the OSI management
Spare Address Specifies the spare address for the OSI management

....................................................................................................................................................................................................................................
1646 SM 6-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-8: OSI management
Network domain
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Save hyperlink closes the page and returns back to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
6-16 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Overview
Management Access Control
....................................................................................................................................................................................................................................

Management Access Control

Overview
Purpose
The purpose of this procedure is to create and manage MAC ACL and ACE

Contents

Procedure 6-9: Create MAC Access Control List (ACL) 6-17

Procedure 6-9: Create MAC Access Control List (ACL)


Purpose
Use this procedure to create a MAC Access Control List.
...................................................................................................................................................................................................

1 Select Data -> MAC Access Control List from the menu bar.

Figure 6-10 MAC Access Control List

....................................................................................................................................................................................................................................
1646 SM 6-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-9: Create MAC Access Control List (ACL)
Management Access Control
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Click ACL hyperlink the Modify MAC Access Control panel is displayed.

Figure 6-11 Modify MAC Access Control List

The Modify MAC Access Control panel that contains the following parameters.

Parameter Description
ACL Identifier Identifies the entity for which the output data
are retrieved.
ACL Name Name of the MAC Access Control
Apply Change The supported values are
• true - Managment Actual Access Control
Element (ACE) panel is displayed.
• false - Managment Access Control
Element (ACE) and Managment Actual
Access Control Element (ACE) panel is
displayed
Status Specifies the state of the MAC Access Control

...................................................................................................................................................................................................

3 Click Save. The MAC Access Control is created.


E...................................................................................................................................................................................................
N D O F S T E P S

Search and Create MAC Access Control Element (ACE)


...................................................................................................................................................................................................

1 Select Data -> MAC Access Control List from the menu bar. Click ACL hyperlink.

....................................................................................................................................................................................................................................
6-18 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-9: Create MAC Access Control List (ACL)
Management Access Control
....................................................................................................................................................................................................................................
Result: The Modify MAC Access Control panel is displayed.
...................................................................................................................................................................................................

2 Click View to view the Management Access Control Element (ACE) as shown in menu
bar.

Result: Management Access Control Element (ACE) panel is displayed.

Figure 6-12 Management Access Control Element (ACE)

...................................................................................................................................................................................................

3 Enter the values in From and To search range. Click Search.


Result: The existing list of the MAC ACE is displayed.
...................................................................................................................................................................................................

4 Click Create to create a new Access Control Element.

....................................................................................................................................................................................................................................
1646 SM 6-19
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-9: Create MAC Access Control List (ACL)
Management Access Control
....................................................................................................................................................................................................................................
Result: The following screen appears.

Figure 6-13 Create Access Control Element

This panel lists the parameters described in the following table:

Parameter Description
Order Specifies the order range from 0 to 65535.
MAC Source Specifies the Valid 48 bit MAC address.
MAC Destination Specifies the Valid 48 bit MAC address.
VID Indicates the VLAN Id of the ACE . The valid range from
0 to 4097.
Action Indicates the state of the ACE.
The supported values are
• Permit
• Deny
Status Indicates if the ACE is in service.
The supported values are
• active : indicates that the MAC ACE is active.
• notInService : indicates that the MAC ACE is not
active.
The default value is notInService.

...................................................................................................................................................................................................

5 Click Save to save the ACE or click Cancel to return to the previous screen without
saving.

....................................................................................................................................................................................................................................
6-20 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-9: Create MAC Access Control List (ACL)
Management Access Control
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Click View to view the Management Actual Access Control Element (ACE) as shown in
menu bar.

Management Actual Access Control Element (ACE) panel is displayed.

Figure 6-14 Management Actual Access Control Element (ACE)

...................................................................................................................................................................................................

7 Enter the management actual access control element From and To values and click
Search.
...................................................................................................................................................................................................

8 Click Cancel to return to the previous page.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 6-21
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Data Communication Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
6-22 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
7 Alarm Management
7

Overview
Purpose
Alcatel-Lucent 1646 SM supports different types of alarms and events in various
scenarios related to the equipment and transmission.
This section defines the alarms or events supported on the Alcatel-Lucent 1646 SM
network element. The probable cause, raise/clear criteria, object against which alarm is
raised, alarm domain, and consequent actions for each of the supported alarms are defined
in the following table.

Contents

Procedure 7-1: TCA Profiles 7-2


Procedure 7-2: Create ASAP 7-3
Procedure 7-3: Modify or Delete an ASAP profile 7-8
Procedure 7-4: ALM cutoff 7-9
Procedure 7-5: ALM resynch. 7-10
Procedure 7-6: Condition log 7-11
Procedure 7-7: Housekeeping support 7-13

...................................................................................................................................................................................................................................
1646 SM 7-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-1: TCA Profiles

....................................................................................................................................................................................................................................

Procedure 7-1: TCA Profiles


When to use
Use this procedure to create and search and retrieve Threshold profiles.

Procedure
...................................................................................................................................................................................................

1 Select Alarms → TCA Profile from the menu bar.

Figure 7-1 TCA Profile

...................................................................................................................................................................................................

2 Select the Profile type and click on Search. The corresponding TCA profiles are
displayed.

Figure 7-2 Search TCA Profiles

....................................................................................................................................................................................................................................
7-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-1: TCA Profiles

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Create to create a new TCA Profile.

Figure 7-3 Create TCA Profile

...................................................................................................................................................................................................

4 TCA Profile panel parameters are described in the following table.

Parameter Description
Profile Type Specifies the Threshold profile type.
User Label Specifies the User Label.
Default The values are Y or N.

...................................................................................................................................................................................................

5 Click Save to save all settings.


...................................................................................................................................................................................................

6 Click Cancel to revoke all changes and return to previous page.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 7-2: Create ASAP


When to use
This procedure allows to create an Alarm Severity Assigned Profile (ASAP) Management
instance for a given profile type.

....................................................................................................................................................................................................................................
1646 SM 7-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Alarms →ASAP Mng option from the menu bar.

Figure 7-4 ASAP Mng

...................................................................................................................................................................................................

2 Select the ASAP Type from the drop-down list as shown in the figure.

Figure 7-5 ASAP Type

....................................................................................................................................................................................................................................
7-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select the ASAP AID from the drop-down list as shown in the figure.

Figure 7-6 ASAP AID

...................................................................................................................................................................................................

4 Enter the User Label.


...................................................................................................................................................................................................

5 Click search to view the list of ASAP AID.

Figure 7-7 ASAP AID list

...................................................................................................................................................................................................

6 Select the ASAP AID.


....................................................................................................................................................................................................................................
1646 SM 7-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Click on view to view the details of the selected ASAP AID

Figure 7-8 ASAP AID details

...................................................................................................................................................................................................

8 Click cancel to return back to the previous page.


...................................................................................................................................................................................................

9 Click create to configure new ASAP profile. The following screen is displayed.

Figure 7-9 Create ASAP

....................................................................................................................................................................................................................................
7-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10 The create ASAP panel parameters are described in the following table.

Table 7-1 Create ASAP parameters

Parameter Description
ASAP type Specifies the ASAP type for which the ASAP
profile can be created. The values are EQPT,
BITS, TIMING, SECU, GBE, STM1, STM4,
STM16, VC4, VC44C, LOVC3,
LOVC12,E1,E3,T3,VCG,T1
User Label Specifies the User Label. System assigned
values for User Label are in the format
LBL-ASAP<ASAP-TYPE>-<ASAP AID INDEX.
Default The values are Y of N.
Clone From Specifies the following ASAP-AID parameters
using the index number greater than equal to
5:
• NULL ASAP Proflie (0)- is used for the
NULL ASAP which contains NR( Not
Reported) notification code for all the
conditions in the ASAP type.
• FACTORY DEFAULT ASAP(1) - is used
for the factory default ASAP
• NOT PRIMARY COND.(2) - is used for
the primary conditions which are not
disabled.
• ASAP Prof. FERF-AIS CONDITION
Disabled (3)- is used for FERF and AIS
conditions disabled.
• ALL CONDITION ASAP Profile(4)- is
used for all conditions enabled.

...................................................................................................................................................................................................

11 Click save to save all the settings


...................................................................................................................................................................................................

12 Click cancel to revoke all changes and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 7-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-3: Modify or Delete an ASAP profile

....................................................................................................................................................................................................................................

Procedure 7-3: Modify or Delete an ASAP profile


When to use
This procedure allows to modify or delete an Alarm Severity Assigned Profile
(ASAP)Management instance for a given profile type.

Procedure
...................................................................................................................................................................................................

1 Select the ASAP-AID to be modified as shown in the figure

Figure 7-10 Modify ASAP-AID

...................................................................................................................................................................................................

2 Modify the settings and click on save.


...................................................................................................................................................................................................

3 Click cancel to revoke all changes and return to the previous page.

....................................................................................................................................................................................................................................
7-8 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-3: Modify or Delete an ASAP profile

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 To delete an ASAP profile select the ASAP AID to be deleted and click delete as shown in
the figure.

Figure 7-11 Delete ASAP AID

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 7-4: ALM cutoff


When to use
Use this procedure to stop the office audible alarm indications.

....................................................................................................................................................................................................................................
1646 SM 7-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-4: ALM cutoff

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Alarms → ALM CUTOFF option from the menu bar.

Figure 7-12 Alarm cutoff

...................................................................................................................................................................................................

2 Click on SEND functional button a command cuts off the office audible alarm indications
without changing the local alarm reporting.
...................................................................................................................................................................................................

3 OPERATION COMPLETED or OPERATION FAILED message is displayed.


The currently active audible alarm indications will be silenced. The visual alarm
indications are not affected. Future alarm reporting is not be affected and new audible
alarm indications will be provided for any new alarms.
The ACO LED turns on and a new alarm arrives, it is presented to the audible
closures and the ACO LED switches off. Alarms silenced is not presented to the
Audible closures even if they are still present (only new alarms).
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 7-5: ALM resynch.


When to use
Use this procedure to update the alarm database to the current alarm situation.

....................................................................................................................................................................................................................................
7-10 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-5: ALM resynch.

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Alarms → Resynch. option from the menu bar.

Figure 7-13 Refresh alarms

...................................................................................................................................................................................................

2 Click Resynchronize, a command refreshes the alarms and the relevant information is
referred.
...................................................................................................................................................................................................

3 OPERATION COMPLETED or OPERATION FAILED message is displayed.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 7-6: Condition log


When to use
Use this procedure to collect the alarm history report from the NE.

....................................................................................................................................................................................................................................
1646 SM 7-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-6: Condition log

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Alarms → Condition Log option from the menu bar.

Figure 7-14 Alarm log

...................................................................................................................................................................................................

2 The Alarm Log tab displays the Filter by panel that contains the following parameters.

Table 7-2 Alarm log parameters

Parameter Description
Domain Specifies the domain for filtering the alarm. The values are ALL, TDM,
and DATA.
Note1: If the selected Domain value is DATA, the widow displays
Severity drop down, the values are: CRITICAL, MAJOR, MINOR,
WARNING, and CLEARED.
Note2: If the selected Domain value is ALL, the Event Type and Aid
Type parameters are not available.
Event Type Specifies the event type that triggers alarm. The values is ALM.
Aid Type Specifies the Access Identifier type.
From Date & Time Specifies From date & time to apply filter to the alarm.
To Date & Time Specifies To data & time to apply filter to the alarm.

...................................................................................................................................................................................................

3 The Search link allows to filter the alarm details based on the selection criteria.
...................................................................................................................................................................................................

4 The Reset Criteria link allows to reset the new criteria to apply the filter.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
7-12 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

Procedure 7-7: Housekeeping support


When to use
The NE will be able to receive and process three separate customer-defined inputs for
fault conditions arising externally to the NE. The fault conditions will be processed and
reported as for internally detected fault conditions.
It will be possible to disable the reporting from any input if not used. The inputs will be
capable of interfacing to a dry relay contact, that is, an input will comprise two wire
interfaces capable of detecting an open or closed circuit condition between the two
connections. Each user alarm input is separately configured to accept either a closed
circuit or open circuit state as the active alarm condition. The inputs from the dry contacts
are normally used for site specific alarms such as open door, high temperature, high water
level, and so on. The polarity of an external input control determines the relationship
between the declaration of an environmental condition and the physical signal. The NE
shall drive one separate output station controls for customer defined, site specific
facilities external to the NE, such as air conditioning, generators, and so on. Operating an
external control means that a relay is activated to control some external device. Releasing
an external control means deactivating the relay. The polarity of an external output
control determines the relationship between the control state (CONTSTATE) value and
the physical signal. Provisioning of housekeeping alarms and controls is persistent
Customer access to the Housekeeping (HKP) connections is through 25 pin D-Sub
connector on the NE user access panel.

Input Points
...................................................................................................................................................................................................

1 From the Alarms menu, Select Housekeeping → Input Points.

Figure 7-15 Input Points shelf selection panel

...................................................................................................................................................................................................

2 Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

3 Click Continue.

....................................................................................................................................................................................................................................
1646 SM 7-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................
Result: The following screen appears.

Figure 7-16 Input points attributes

...................................................................................................................................................................................................

4 The Input points attributes panel contains the following parameters.

Table 7-3 Input points attributes panel parameters

Parameter Description
Alarm Access Identifier Specifies the Alarm Access Identifier.
Notification Code Specifies the Notification Code.
Alarm Type Specifies the type of alarm.
Alarm Message Specifies the alarm message.
Polarity Specifies the type of polarity.
The polarity of an external input control determines the relationship
between the declaration of an environmental condition and the
physical signal.

...................................................................................................................................................................................................

5 Select View under the Alarm Access Identifier column.


Result: The following screen appears

Figure 7-17 Alarms report

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
7-14 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................
Output Points
...................................................................................................................................................................................................

1 From the Alarms menu, Select Housekeeping → Output Points.


Result: The Select Shelf panel appears.
...................................................................................................................................................................................................

2 Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

3 Click Continue.
Result: The following screen appears.

Figure 7-18 Operate/Release Output Points

...................................................................................................................................................................................................

4 Select the Access Identifier that requires the Action.


...................................................................................................................................................................................................

5 Click Release to release (deactivate) the External Control Output Points.


Note: Releasing an external control means deactivating the relay.
...................................................................................................................................................................................................

6 Click Operate to operate (activate) the External Control Output Points.


Note: Operating an external control means that a relay is activated to control some
external device.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 7-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Alarm Management Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
7-16 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
8 Synchronization
8

Overview
Purpose
Provides an overview of the chapter contents and an introduction to Time and Alarm
Synchronization.

Contents

Synchronization menu 8-1


Procedure 8-1: Modify BITS-0 8-2
Procedure 8-2: Modify BITS-1 8-4
Procedure 8-3: Modify BITS-OUT0 8-5
Procedure 8-4: Modify BITS-OUT1 8-7
Procedure 8-5: Administer system timing BITS 8-8
Synchronization outgoing 8-16

Synchronization menu
This menu allows the operator to manage the ports dedicated to BITS (Building
Integrated Timing Source) facilities for clock distribution purposes. A BITS output
reference is a DS1 signal.
The menu options are:
• BITS - Allows to modify the characteristics (BITS-0 as Primary and BITS-1 as
Secondary) and the outgoing port of reference clock.
• Synchronization - Allows to modify the parameters of the synchronization system.
• Synch. Outgoing - Allows to modify the parameters of the synchronization outgoing.

...................................................................................................................................................................................................................................
1646 SM 8-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-1: Modify BITS-0

....................................................................................................................................................................................................................................

Procedure 8-1: Modify BITS-0


When to use
Use this procedure to edit bit 0 related to a given shelf.

Procedure
...................................................................................................................................................................................................

1 Select Synchronization → Bits → Modify BITS 0. The following panel appears.

Figure 8-1 BITS Select shelf panel

...................................................................................................................................................................................................

2 Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

3 Click Continue to continue with the operation.

....................................................................................................................................................................................................................................
8-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-1: Modify BITS-0

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The following screen appears.

Figure 8-2 Modify BITS 0

The Modify BITS panel contains the following fields:


• Access Identifier - Specifies the access identifier for the selected BITS
• Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-NOSSM,
or 2MBIT-SSM
• SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
• SSM Supported - Specifies whether the timing input port supports SSM or not. The
values are Y and N.
...................................................................................................................................................................................................

5 The Save link is used to send the related command to the Network Element.
Automatically the Modify BITS page is loaded to show updated data.
...................................................................................................................................................................................................

6 A further panel Alarms allows to display the alarms relevant to the BITS. Click View
hyperlink to view the alarms.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 8-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-2: Modify BITS-1

....................................................................................................................................................................................................................................

Procedure 8-2: Modify BITS-1


When to use
Use this procedure to edit bit 1 related to a given shelf.

Procedure
...................................................................................................................................................................................................

1 Select Synchronization → Bits → Modify BITS 1. The following panel appears.

Figure 8-3 BITS 1 Select shelf panel

...................................................................................................................................................................................................

2 Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

3 Click Continue to continue with the operation.


...................................................................................................................................................................................................

4 The following screen appears.

Figure 8-4 Modify BITS 1

The Modify BITS panel contains the following fields:


• Access Identifier - Specifies the access identifier for the selected BITS
• Signal Format - Specifies the signal format. The values are 2MHZ, and 2MBIT-SSM

....................................................................................................................................................................................................................................
8-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-2: Modify BITS-1

....................................................................................................................................................................................................................................
• SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
• SSM Supported - Specifies whether the timing input port supports SSM or not. The
values are Y and N.
...................................................................................................................................................................................................

5 The Save link is used to send the related command to the Network Element.
Automatically the Modify BITS page is loaded to show updated data.
...................................................................................................................................................................................................

6 A further panel Alarms allows to display the alarms relevant to the BITS. Click View
hyperlink to view the alarms.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 8-3: Modify BITS-OUT0


When to use
Use this procedure to edit to search and edit bit out related to a given shelf

Procedure
...................................................................................................................................................................................................

1 Select Synchronization → Bits → Modify BITS OUT0. The following panel appears.

Figure 8-5 Modify BITS OUT Select shelf panel

...................................................................................................................................................................................................

2 Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

3 Click Continue to continue with the operation.

....................................................................................................................................................................................................................................
1646 SM 8-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-3: Modify BITS-OUT0

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The following screen appears.

Figure 8-6 Modify BITS OUT0 panel

...................................................................................................................................................................................................

5 The Modify BITS panel contains the following fields:


• Access Identifier - Specifies the access identifier for the selected BITS
• Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-NOSSM,
or 2MBIT-SSM
• SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
• Transmitted ESF - Specifies if the output signal is the DUS message or is the actual
SSM value. The values are DUS and ACT. The default value is the previous existing
value. If the existing value is empty. The default existing value is DUS.
• Enable Output - Specifies the output mode to which the facility is set. The values are
Y and N. The default value is N.
• AIS Mode - Specifies which signal is inserted for the timing output port if the output
signal is squelched. The values are AISMODE and QLMODE. The default values is
the previous value. If the existing value is empty, the default factory value is
QLMODE.
• Outgoing Signal Quality - Specifies the quality value level for the out-going signal at
the timing output port. The values are PRC, SSUL, SSUT, SEC, and DUS.
• SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
• SSM Supported - Specifies whether the timing input port supports SSM or not. The
values are Y and N.

....................................................................................................................................................................................................................................
8-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-3: Modify BITS-OUT0

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Click Save that is used to send the related command to the Network Element.
Automatically the Modify BITS OUT page is loaded to show updated data.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 8-4: Modify BITS-OUT1


When to use
Use this procedure to edit to search and edit bit out related to a given shelf

Procedure
...................................................................................................................................................................................................

1 Select Synchronization → Bits → Modify BITS OUT1. The following panel appears.

Figure 8-7 Modify BITS OUT1 Select shelf panel

...................................................................................................................................................................................................

2 Select the Shelf Access Identifier from the drop-down list.


...................................................................................................................................................................................................

3 Click Continue to continue with the operation.


...................................................................................................................................................................................................

4 The following screen appears.

Figure 8-8 Modify BITS OUT1 panel

....................................................................................................................................................................................................................................
1646 SM 8-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-4: Modify BITS-OUT1

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 The Modify BITS panel contains the following fields:


• Access Identifier - Specifies the access identifier for the selected BITS
• Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-SSM
• SA Bit Location - Specifies the SA bit location used to carry the SSM information.
The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the
previous existing value. If the existing value is empty. The default existing value is
SA4.
• Transmitted ESF - Specifies if the output signal is the DUS message or is the actual
SSM value. The values are DUS and ACT. The default value is the previous existing
value. If the existing value is empty. The default existing value is DUS.
• Enable Output - Specifies the output mode to which the facility is set. The values are
Y and N. The default value is N.
• AIS Mode - Specifies which signal is inserted for the timing output port if the output
signal is squelched. The values are AISMODE and QLMODE. The default values is
the previous value. If the existing value is empty, the default factory value is
QLMODE.
• Outgoing Signal Quality - Specifies the quality value level for the out-going signal at
the timing output port. The values are PRC, SSUL, SSUT, SEC, and DUS.
• SSM Supported - Specifies whether the timing input port supports SSM or not. The
values are Y and N.
...................................................................................................................................................................................................

6 Click Save that is used to send the related command to the Network Element.
Automatically the Modify BITS OUT page is loaded to show updated data.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 8-5: Administer system timing BITS


When to use
Use this procedure to retrieve, edit, remove, and restore Building Integrated Timing
Source (BITS) timing and to switch system clock synchronization from one reference to
the other.

General
Time Division Multiplexing (TDM) ports provides external synchronization from a
network timing source to the system. Under normal conditions, all terminating and
outgoing STMn’s have identical average frequency derived from the network timing
source.

....................................................................................................................................................................................................................................
8-8 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
The Network Element (NE) utilizes external Building Integrated Timing Supply (BITS)
timing to synchronize the system. BITS timing signal enters the system either directly via
the backplane (Rear Access Shelf) or via dedicated front plane integral, a panel just below
the fan.
The following clock modes are supported:
• Locked mode (normal mode) - Steady state, the SETG generated clock signal is
controlled by the selected external timing reference determined by the T0 selection
process
• Holdover mode - Steady state. The operating condition of a clock that has lost its
references and is using data previously acquired (when it was operating in the normal
mode) to control its output signal.
• Free-running mode - Temporary operating mode. The operating condition when the
output signal is totally internally controlled with no influence of a present or previous
reference.

Procedure
...................................................................................................................................................................................................

1 Select Synchronization → Synchronization → Search. The following panel appears.

Figure 8-9 Synchronization panel

...................................................................................................................................................................................................

2 Select the access identifier from the Access Identifier drop-down list.
The values are:
• ALL
• SYNC
• EXTREF
• LINEREFSYS

....................................................................................................................................................................................................................................
1646 SM 8-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Search to retrieve the synchronization timing BITS.

Figure 8-10 Retrieve synchronization timing entity

...................................................................................................................................................................................................

4 The Retrieve Synchronization displays the following SHELF timing entities:


• System timing entity
• Reference timing entity
...................................................................................................................................................................................................

5 Click the radio button under Select column to set the access identifier.

....................................................................................................................................................................................................................................
8-10 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Click Modify hyperlink to edit the system timing entity parameters as shown in the
following figure.

Figure 8-11 Modify Synchronization panel

...................................................................................................................................................................................................

7 The Access Identifier displays the system timing entity selected.


...................................................................................................................................................................................................

8 Set the Sync Messaging to either Y or N. Click Default to choose the default setting.
...................................................................................................................................................................................................

9 Click View to view the alarm profile for the selected timing entity from the Alarms panel.
...................................................................................................................................................................................................

10 Click Save to set the synchronization settings for the system timing entity and return to
the Synchronization window.
...................................................................................................................................................................................................

11 Click Operate or Release hyperlinks to perform the operate and release functions on
either system timing or references timing entities.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 8-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
Operate
...................................................................................................................................................................................................

1 Select Synchronization → Synchronization → Operate. The following panel appears.

Figure 8-12 Operate - Modify synchronization switch

...................................................................................................................................................................................................

2 The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch
panel that contains the following parameters:

Parameter Description
Switch Command Specifies the switch command that is requested by the
user.
The values are:
• LOCKOUT
• FRCD
• MAN
• INT
Shelf Access Identifier This is used to change the content of Switch To
Reference parameter according to the selected shelf
access identifier

....................................................................................................................................................................................................................................
8-12 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

Parameter Description
Switch To Reference Specifies the access identifier of the synchronization
facility
The values are:
• EXTREF-1–1–0
• EXTREF-1–1–1
• LINEREFSYS-1–1–0
• LINEREFSYS-1–1–1
• SYNC-1–1–0

...................................................................................................................................................................................................

3 Click Operate to send the command to the agent.


E...................................................................................................................................................................................................
N D O F S T E P S

Release
...................................................................................................................................................................................................

1 Select Synchronization → Synchronization → Release. The following panel appears.

Figure 8-13 Release - Modify synchronization switch

...................................................................................................................................................................................................

2 The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch
panel that contains the following parameters:
• Switch Command - Specifies the switch command that is requested by the user. The
values are CLOCKSWITCH and REFSWITCH
• Shelf Access Identifier - This is used to change the content of Switch To Reference
parameter according to the selected shelf access identifier
• Access Identifier

....................................................................................................................................................................................................................................
1646 SM 8-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
The values are:
– SYNC
– EXTREF
– LINEREFSYS

Parameter Description
Switch Command Specifies the switch command that is requested by the
user.
The values are:
• CLOCKSWITCH
• REFSWITCH
Shelf Access Identifier This is used to change the content of Switch To
Reference parameter according to the selected shelf
access identifier
Switch To Reference Specifies the access identifier of the synchronization
facility
The values are:
• EXTREF-1–1–0
• EXTREF-1–1–1
• LINEREFSYS-1–1–0
• LINEREFSYS-1–1–1
• SYNC-1–1–0

...................................................................................................................................................................................................

3 Click Release to send the TL1 command to the agent.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
8-14 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
Retrieve Synchronization Message
...................................................................................................................................................................................................

1 Select Synchronization → Synchronization → Sync. message. The following panel


appears.

Figure 8-14 Retrieve Synchronization Message panel

...................................................................................................................................................................................................

2 The Synchronization Message tab displays the Retrieve Synchronization Message


panel that displays the following parameters:
• Shelf Access Identifier - This is used to change the access identifier according to the
selected shelf identifier
• Access Identifier - Specifies the access identifier of the synchronization facility
...................................................................................................................................................................................................

3 The Search link sends the TL1 command to the agent and results are displayed in the
following Synchronization Message Search page.

Figure 8-15 Search synchronization message results

....................................................................................................................................................................................................................................
1646 SM 8-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The Retrieve Synchronization Message table contains the following columns:


• Access Identifier - Specifies the timing entity facility
• Incoming SSM Message - Specifies the actual quality value for the incoming SSM
derived from corresponding OH byte value of a timing reference.

E...................................................................................................................................................................................................
N D O F S T E P S

Synchronization outgoing
This option contains the following sub-menu options:
• Search - To retrieve and edit outgoing synchronization resources related to a given
shelf
• Operate - To operate switching outgoing synchronization resources related to a given
shelf
• Release - To release switching outgoing synchronization resources related to a given
shelf

Search
...................................................................................................................................................................................................

1 Select Synchronization → Synch. Outgoing → Search. The following panel appears.

Figure 8-16 Synchronization Outgoing Search

...................................................................................................................................................................................................

2 The Synchronization Outgoing tab displays the Synchronization Outgoing panel that
contains the following parameters:
• Shelf Access Identifier - This is used to change the content of Access Identifier
parameter according to the selected shelf
• Access Identifier - Specifies the access identifier of the synchronization facility
...................................................................................................................................................................................................

3 Click Search to retrieve the shelf information based on the selection.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
8-16 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Synchronization outgoing

....................................................................................................................................................................................................................................
Operate
...................................................................................................................................................................................................

1 Select Synchronization → Synch. Outgoing → Operate. The following panel appears.

Figure 8-17 Modify Synchronization Switch Outgoing Operate

...................................................................................................................................................................................................

2 The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch
Outgoing panel that contains the following parameters:
• Switch Command - Specifies the switch command that is requested by the user. The
values are LOCKOUT, FRCD, and MAN
• Shelf Access Identifier - This is used to change the content of Switch To Reference
parameter according to the selected shelf access identifier
• Switch To Reference - Specifies the access identifier of the synchronization facility
...................................................................................................................................................................................................

3 The Operate link sends the TL1 command to the agent.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 8-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Synchronization Synchronization outgoing

....................................................................................................................................................................................................................................
Release
...................................................................................................................................................................................................

1 Select Synchronization → Synch. Outgoing → Release. The following panel appears.

Figure 8-18 Modify Synchronization Switch Outgoing Release

...................................................................................................................................................................................................

2 The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch
Outgoing panel that contains the following parameters:
• Shelf Access Identifier - This is used to change the content of the Access Identifier
parameter according to the selected shelf access identifier
• Access Identifier - Specifies the access identifier of the synchronization facility
...................................................................................................................................................................................................

3 The Release link sends the TL1 command to the agent.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
8-18 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
9 Security
9

Overview
Purpose
This section is related to security within the Zero Installation Craft (ZIC) terminal. The
functions of configuration and installation are accessible only to the administrator.
Provides an overview of the Security menu and features.

Contents

Procedure 9-1: Change user password 9-2


Procedure 9-2: Retrieve user information 9-3
Procedure 9-3: Create user account 9-3
Procedure 9-4: Change user account 9-5
Procedure 9-5: Modify account default settings 9-8
Procedure 9-6: View current sessions 9-9
Procedure 9-7: Modify command privileges 9-10
Procedure 9-8: Manage audit 9-12
Procedure 9-9: Log settings 9-14
Procedure 9-10: Modify in progress message settings 9-16

...................................................................................................................................................................................................................................
1646 SM 9-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-1: Change user password

....................................................................................................................................................................................................................................

Procedure 9-1: Change user password


When to use
Use this procedure to change or configure the password used when logging into a
Network Element (NE).

Procedure
...................................................................................................................................................................................................

1 Select Security → User Account → Change Password option from the menu bar.

Figure 9-1 Change user password

...................................................................................................................................................................................................

2 The User Identifier and Old Password ID entry boxes display the user name and
password with which the user has logged in.
...................................................................................................................................................................................................

3 Enter the new password in the New Password ID entry box. Enter the same password in
Confirm New Password ID entry box.
...................................................................................................................................................................................................

4 Click Save to set the newly entered password.


...................................................................................................................................................................................................

5 The system generates an error message if the newly entered password is violating the
password naming convention. Go to Step 3 to re-enter the correct string.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
9-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-2: Retrieve user information

....................................................................................................................................................................................................................................

Procedure 9-2: Retrieve user information


When to use
Use this procedure to retrieve user information.

Procedure
...................................................................................................................................................................................................

1 Select Security → User Account → Information.


...................................................................................................................................................................................................

2 The following screen appears.

Figure 9-2 User information

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-3: Create user account


When to use
Use this procedure to create a user account.

....................................................................................................................................................................................................................................
1646 SM 9-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-3: Create user account

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Security → Administration → Accounts → Create Account.

Figure 9-3 Create user account

...................................................................................................................................................................................................

2 This panel lists the parameters described in the following table:

Table 9-1 Create user account panel parameters

Parameter Description
User Identifier Allows to enter the user id
Password Identifier Allows to enter the user password
Confirm Password Allows the re-enter the user password to confirm
Identifier
Password Duration Allows to enter the validity of the password. Default is 30 days.
[day]
Warning on Allows to enter the warning period of the password. Default is 7 days.
Password Duration
[day]
Access after Default is 3 days.
Password Duration
Password Default is 180 days.
Obsolescence
Interval [day]
User ID Duration Default is 60 days.
[day]

....................................................................................................................................................................................................................................
9-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-3: Create user account

....................................................................................................................................................................................................................................
Table 9-1 Create user account panel parameters (continued)

Parameter Description
Available User This table lists the Available User Access Privileges.
Access Privileges
User Access This table lists the current User Access Privileges
Privileges
SNMPv3 Privacy Default is NOPRIV.
Protocol
SNMPv3 Default is NOAUTH.
Authorization
Protocol

...................................................................................................................................................................................................

3 Click Save to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-4: Change user account


When to use
Use this procedure to change user account details.

Procedure
...................................................................................................................................................................................................

1 Select Security → Administration → Accounts → Change Account.

....................................................................................................................................................................................................................................
1646 SM 9-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-4: Change user account

....................................................................................................................................................................................................................................
The following screen is displayed.

Figure 9-4 Change User information

....................................................................................................................................................................................................................................
9-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-4: Change user account

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The panel displays the following parameters.

Table 9-2 Change User information window

Parameter Description
ACTION This allows to take the following actions:
• Modify Account
• Inhibit User
• Allow User
• Delete Account
User Identifier Specifies a unique user ID
User Access Specifies the User access privileges granted to the user.
Privileges Values are:
• Read-only (READ)
• Provision (PROV)
• Configure (CONF)
• Network Administrator (NETADMIN)
• Security Administrator (SEC)
• Test (DEBUG)
• No link timeout (NOTMOUT)
User State This shows the new user's login password. The values that can be
displayed are Active and Suspended
Password Duration Specifies the number of days of validity for the password.
[day] 0 (zero) means that Password aging is disabled
Warning on This shows the number of days after the expiration date, that is allowed
Password Duration for the user to change the password.
[day] 0 (zero) means that grace period after password expiration is disabled.
Access after This shows the number of times that a user can log in after Password
Password Duration expiration.
0 (zero) means that the grace extra log-in after password expiration is
disabled.
Password This shows the minimum time interval that is required if the User wishes
Obsolescence to use a password that was already used.
Interval [day] 0 (zero) means that reuse of old passwords is disabled.
Password Expiration Specifies the expiry date and time for the password.
date and time
User ID Duration This shows the aging or expiry interval of a particular User Id.
[day] 0 (zero) means that User ID aging is disabled.

....................................................................................................................................................................................................................................
1646 SM 9-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-4: Change user account

....................................................................................................................................................................................................................................
Table 9-2 Change User information window (continued)

Parameter Description
Login Fails Number Specifies the number of unsuccessful authentication (login) attempts
since the last authenticated session.
Last Login This shows the last recorded Login time of a user.
TimeStamp
Keep Alive Message This shows the time interval, in minutes, after which the NE shall send a
Interval [min] KEEP ALIVE MESSAGE on a TCP connection inactivity. The value
range is 0 - 240. 0 (zero) means that KEEP ALIVE MESSAGE sending
is disabled.
Minimum Interval This shows the minimum interval, in seconds, between invalid login
between invalid attempts before an NE shall logout a user and lockout the user channel.
attempts [sec] The value range is 0 - 60. 0 (zero) means no minimum interval between
consecutive invalid login attempts.
Maximum Invalid This shows the maximum number of invalid login attempts before an NE
Attempts shall logout a user and lockout the user channel. The value range is 0 -
15. 0 (zero) means that no limit to the invalid login attempts.
User Session This shows User Session Activity Link TimeOut, specifies the amount of
Inactivity Timeout time (in minutes) that the User Session link is inactive with regards to
[min] user TL1 input before a user session link time-out occurs.
0 (zero) means that no user session link time–out will occur (disabled).
SNMPv3 Privacy This parameter allows enabling/disabling of the configuration of the
Protocol SNMPv3 privacy protocol. NOPRIV means that privacy is disabled for
this user.
SNMPv3 This parameter allows enabling/disabling of the configuration of the
Authorization SNMPv3 authorization protocol. NOAUTH means that authorization is
Protocol disabled for this user.

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-5: Modify account default settings


When to use
Use this procedure to modify account default settings.

Procedure
...................................................................................................................................................................................................

1 Select Security → Administration → Accounts → Default settings.

....................................................................................................................................................................................................................................
9-8 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-5: Modify account default settings

....................................................................................................................................................................................................................................
The following screen is displayed.

Figure 9-5 Modify account default settings panel

...................................................................................................................................................................................................

2 See Table 9-2, “Change User information window” (p. 9-7) for parameter description.
...................................................................................................................................................................................................

3 Click Default hyperlink next to each parameter to enter the default settings.
...................................................................................................................................................................................................

4 Click Save to save the settings entered on the page.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-6: View current sessions


When to use
Use this procedure to view current sessions.
...................................................................................................................................................................................................

1 Select Security → Administration → Current Sessions.

Figure 9-6 Current sessions

....................................................................................................................................................................................................................................
1646 SM 9-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-6: View current sessions

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 This panel lists the parameters described in the following table.

Table 9-3 Current sessions

Parameters Description
Action Contains the Log Off User hyperlink which allows to close the session
User Identifier Specifies a unique user ID (e.g. ALCATEL)
Session Specifies by a unique identifier allocated to a client connection that
distinguishes that connection from other connections in the system
Address Specifies the address where the user is connecting from. It is the port/IP
address that is being used for access. If a non IP port is used to connect
to the NE, the values DCC, LAN, USB, RS232 are used
Last login timestamp Specifies by a quoted string the last recorded Login time of a user. This
time is displayed every time a user logs in

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-7: Modify command privileges


When to use
Use this procedure to modify command privileges.

....................................................................................................................................................................................................................................
9-10 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-7: Modify command privileges

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Security → Administration → Command Privileges.

Figure 9-7 Command Access Privileges page

....................................................................................................................................................................................................................................
1646 SM 9-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-7: Modify command privileges

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The page the command security privileges assigned to the specified TL1 command.
The columns of the table are:
• Action - Contains the hyperlinks in order to modify the security privilege. The
manager actions related to these hyperlinks are:
– The Modify hyperlink activates the following Modify Command Access
Privileges page.

Figure 9-8 Modify Command Access Privileges panel

• Command Identifier - Specifies the TL1 command code. The value for the parameter
can be any one of the TL1 command codes, in upper or lower case.
• Command Access Privilege - Allows to choose the User access privileges granted to
the user.

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-8: Manage audit


When to use
Use this procedure to activate the Audit Security Log page and retrieve audit log.

....................................................................................................................................................................................................................................
9-12 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-8: Manage audit

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Security → Administration → Audit.

Figure 9-9 Retrieve audit log

...................................................................................................................................................................................................

2 The Audit Log tab contains the Retrieve Audit Log panel with the following parameters:
• From - Specifies the beginning date and time used to filter the response messages. By
means the combo-boxes it is possible to change data and time.
• To - Specifies the beginning date and time used to filter the response messages. By
means the combo-boxes it is possible to change data and time.
• Set User Identifier - The combo-box allows to select the user identifier.

....................................................................................................................................................................................................................................
1646 SM 9-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-8: Manage audit

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Retrieve hyperlink send the command to the agent, then the Retrieve Audit Log
page is reloaded and the table with Security log is displayed

Figure 9-10 Retrieve audit page with results

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-9: Log settings


When to use
Use this procedure to manage the log sessions.

....................................................................................................................................................................................................................................
9-14 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-9: Log settings

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Security → Administration → Log Settings.

Figure 9-11 Modify log attributes

...................................................................................................................................................................................................

2 The Modify Log Attributes page is made up of description of the TL1 command and the
Modify Log Attributes panel that contains:
• Current Log File Max Size [Mbyte] - Specifies the size, in 1 Megabyte blocks, of the
Security Log File system's disk buffer.
• New Log File Max Size [Mbyte] - Allows to change the size, in 1 Megabyte blocks,
of the Security Log File system's disk buffer. When the SECULOG has reached its
max size, the SECULOG wraps reducing its size to the 70% of its max size discarding
the oldest events (30%). The Default hyperlink allows to set the relevant value
automatically.
• Current Warning Message - This is the provisioned user-logon warning message is
shown
• New Warning Message - Allows to provision a new user-logon warning message. The
Default hyperlink allows to set the relevant warning message automatically. The Set
Empty hyperlink allows to deplete the entry field.
• Current Log Events - Specifies the current log event.

....................................................................................................................................................................................................................................
1646 SM 9-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-9: Log settings

....................................................................................................................................................................................................................................
• Available Log Events - Specifies the list of events that, upon their occurrence, are
included in the security log (i.e., events that are specified for logging, if they occur).
The values are:
– Authentication Event (EIUA) - It logins, logoffs, invalid user authentication
attempts and the alarms/alerts generated due to the invalid authentication attempts
– Changes to the User's Security Accounts (EUSP) - Specifies the details of the
changes made in a user's security profiles and attributes
– Changes to the NE/NS Security Configuration (ESCC) - Specifies the details of
changes made in the NE/NS security configuration
– Changes to NE/NS resources (ECMR) - Specifies the creation and modification of
NE/NS resources performed via standard operations and maintenance procedures.
This does not address creations and modifications carried offline. Commands
creating log events of this type are all the commands not mentioned in the lists
above, having Y in the security field of the command security table
– All Events (ALL) - All events
• New Log Events - This shows the log events for the command. The entry box has the
Default hyperlink in order to set the User access privileges forecast for the account.
They can be copied or removed from one of the entry box using the left or right arrow
buttons available between the two entry boxes.
...................................................................................................................................................................................................

3 Click Save hyperlink to send the command to the agent; the main page is reloaded.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 9-10: Modify in progress message settings


When to use
Use this procedure to modify in progress message settings.

....................................................................................................................................................................................................................................
9-16 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-10: Modify in progress message settings

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Security → Administration → IP Message Settings.

Figure 9-12 Modify in progress message settings panel

...................................................................................................................................................................................................

2 The Modify In Progress Message Settings panel is displayed that contains the following
parameters:
• IP Message Interval Time [sec] - Allows to enter IP Message Interval Time in
seconds.
• IP Message Interval Time - Specifies the IP Message Interval Time.
...................................................................................................................................................................................................

3 Click Save to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 9-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Security Procedure 9-10: Modify in progress message settings

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
9-18 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
10 10
Provisioning: Detailed
level Procedures

Overview
Purpose
Provides an overview of the detailed level procedures documented in this chapter.

Contents

Procedure 10-1: Log into the system 10-2


Procedure 10-2: Log out of the system 10-3
Procedure 10-3: Retrieve software version 10-4
Procedure 10-4: In-Service Upgrade 10-6
Procedure 10-5: Initialize and Upgrade with a new release 10-7
Procedure 10-6: DB management remote file copy 10-7
Procedure 10-7: DB management cancel remote file copy 10-10
Procedure 10-8: Network Element management 10-11
Procedure 10-9: LAC Management 10-12
Procedure 10-10: MAC File Collection 10-14
Procedure 10-11: Administer NTP 10-15
Procedure 10-12: Network IF 10-18
Procedure 10-13: OSI ULC Report 10-20
Procedure 10-14: Create Overhead XC 10-21
Procedure 10-15: Create linear MSP 10-23
Procedure 10-16: Create MS-SPRing 10-25
Procedure 10-17: Create Provider Bridge Service 10-27
Procedure 10-18: LAG management 10-29
Procedure 10-19: IGMP Snooping 10-34
Procedure 10-20: Remove LAG member 10-34
Procedure 10-21: Retrieve system information 10-39

...................................................................................................................................................................................................................................
1646 SM 10-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Overview

....................................................................................................................................................................................................................................

Procedure 10-22: Create IP route 10-40


Procedure 10-23: Create IP tunnel 10-42
Procedure 10-24: NE TL1 Parameter 10-44
Procedure 10-25: TL1 console 10-44
Procedure 10-26: Create FTP Server Configuration 10-48

Procedure 10-1: Log into the system


When to use
Use this procedure to log into the Zero Installation Craft (ZIC) terminal.

Procedure
...................................................................................................................................................................................................

1 See Procedure 2-1: “Establish ZIC session” (p. 2-3) for the initial steps to launch the ZIC
session.
...................................................................................................................................................................................................

2 Enter the User Identifier and Password in the respective entry boxes, set the Language
from the drop-down list box. The default is English.
The default User is ALCATEL and password is Alcatel_1.
...................................................................................................................................................................................................

3 Enable the Local Time check box for the network element to display the local time.

....................................................................................................................................................................................................................................
10-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-1: Log into the system

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click Login to log into the system, the browser starts loading the ZIC.

Figure 10-1 ZIC loading

Note: After the maximum number of attempts the user is disabled. Check parameters
for spelling and case-sensitive characters.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-2: Log out of the system


When to use
Use this procedure to log out from the ZIC application.

Procedure
...................................................................................................................................................................................................

1 To log out from the Zero Installation Craft (ZIC) terminal, click the Logout hyperlink
displayed in the top right corner of the ZIC application.
OR
Select Security → Logout.

....................................................................................................................................................................................................................................
1646 SM 10-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-2: Log out of the system

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The following window appears.

Figure 10-2 Logout message screen

...................................................................................................................................................................................................

3 Click Yes to log out of ZIC terminal.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-3: Retrieve software version


When to use
Use this procedure to obtain information about the software version.

Procedure
...................................................................................................................................................................................................

1 From the menu bar, select Help → About option.

....................................................................................................................................................................................................................................
10-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-3: Retrieve software version

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The following window message is displayed.

Figure 10-3 About window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 10-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-4: In-Service Upgrade

....................................................................................................................................................................................................................................

Procedure 10-4: In-Service Upgrade


When to use
Use this procedure for a software refresh.
...................................................................................................................................................................................................

1 Select System Management -> Initialize and Upgrade -> In-Service Upgrade ->
Upgrade Status menu as shown in Figure 10-4, “In-Service Upgrade Status” (p. 10-6)

Figure 10-4 In-Service Upgrade Status

...................................................................................................................................................................................................

2 The In-Service Upgrade Status tab displays status of the in-service upgrade.
The status are:
• Download In Progress (DLIP) - Indicates that a COPY-RFILE command for software
package transfer is ongoing.
• Initialize New In Progress (INITNIP) - Indicates the INIT-SYS-NEW system
initialization process is in progress.
• No Status In Progress (NOSTAIP) - Indicates that no generic in-service upgrade
procedure is in progress or has been attempted.
• Status Completed (STAC) - Indicates that the STA-ISU command completed
successfully and is awaiting the issuance of the INIT-SYS-NEW command.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
10-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-5: Initialize and Upgrade with a new release

....................................................................................................................................................................................................................................

Procedure 10-5: Initialize and Upgrade with a new release


When to use
This option starts the background activity on the NE to perform the actual switch over
from the current release to the new release. This option returns a completion message to
the user when the background activity is successfully started.
A copy of the primary database is generated during its execution and used for database
conversion in the upgrade processing. This backup is also used to revert to the old release
database when the Initialize System With Old Release option is issued after the system is
upgraded to the new release.

Procedure
...................................................................................................................................................................................................

1 Select System Management → Initialize and Upgrade → Initialize System → With


New Release.
...................................................................................................................................................................................................

2 The panel contains the Apply hyperlink that is used to start the new release downloading
procedure.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-6: DB management remote file copy


When to use
Use this procedure to perform remote file copy.

....................................................................................................................................................................................................................................
1646 SM 10-7
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-6: DB management remote file copy

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select System Management → DB Management → Remote File → Perform Copy.

Figure 10-5 Copy remote file panel

....................................................................................................................................................................................................................................
10-8 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-6: DB management remote file copy

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 This panel lists the parameters described in the following table.

Table 10-1 Copy remote file panel parameters

Parameters Description
From Determines the location from which the DB remote file is to be copied.
The supported values are:
• Database backup on a Remote File Server (RFSDB) - Represents a
database on a Remote File Server. Multiple instances of RFSDB can
exist in different locations on an RFS. A specific instance is always
addressed with this AID, with the addition of information in the
LOCATION parameter in the command.
• Software Generic on a Remote File Server (RFSSW) - Represents a
software generic on a Remote File Server. Multiple instances of
RFSSW can exist in different locations on an RFS. A specific
instance is always addressed with this AID, with the addition of
information in the LOCATION parameter in the command.
• Local NE PM Global File collection (LOCPMGLB) - Represents the
PM Global File Collection in the local NE. There is a maximum of
one instance of LOCPMGLB in the NE.
• LOCMACGLB (LOCMACGLB) - Represents the MAC File
Collection in the local NE. There is a maximum of one instance of
LOCMACGLB in the NE.
• System's primary backup database (ACTDSKDB) - Represents the
active database in the local NE .
To Determines the location to which the DB remote file is to be copied.
The supported values are:
• Database Backup on a Remote File Server (RFSDB)
• Remote File Server PM Global File Collection (RFSPMGLB) -
Represents the PM Global File Collection on a Remote File Server.
Multiple instances of RFSPMGLB can exist in different locations on
an RFS.A specific instance is always addressed with this AID, with
the addition of information in the LOCATION parameter in the
command.
• Remote File Server MAC File Collection (RFSMACGLB) -
Represents the MAC File Collection on a Remote File Server.
Multiple instances of RFSMACGLB can exist in different locations
on an RFS. A specific instance is always addressed with this AID,
with the addition of information in the LOCATION parameter in the
command.
• System's primary backup database (ACTDSKDB)
• Active software generic on the NE (ACTSW)
User The user identifier used for the ftp connection on the RFS.
Password The user password used for the ftp connection on the RFS
Host The IP address of the host (the Remote File Server)
....................................................................................................................................................................................................................................
1646 SM 10-9
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-6: DB management remote file copy

....................................................................................................................................................................................................................................
Table 10-1 Copy remote file panel parameters (continued)

Parameters Description
Port The port number to connect to. Most schemes designate protocols that
have a default port number.
URL Path The details of how the specified resource (i.e. the directory where the
file(s) reside) can be accessed.

...................................................................................................................................................................................................

3 Click Apply to apply the configuration settings.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-7: DB management cancel remote file copy


When to use
Use this procedure to cancel the copy of remote file.

Procedure
...................................................................................................................................................................................................

1 Select System Management → DB Management → Remote File → Cancel Copy.

Figure 10-6 Cancel Copy of Remote File panel

....................................................................................................................................................................................................................................
10-10 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-7: DB management cancel remote file copy

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The Remote file tab displays the Cancel Copy of Remote File panel that contains the
following parameters.

Table 10-2 Cancel Copy of Remote File panel parameters

Parameters Description
From Determines the location from which the DB remote file copy is to be
cancelled.
The supported values are:
• Database backup on a Remote File Server (RFSDB)
• Software Generic on a Remote File Server (RFSSW)
• Local NE PM Global File collection (LOCPMGLB)
• LOCMACGLB (LOCMACGLB)
• System's primary backup database (ACTDSKDB)
To Determines the location to which the DB remote file copy is to be
cancelled.
The supported values are:
• Database Backup on a Remote File Server (RFSDB)
• Remote File Server PM Global File Collection (RFSPMGLB)
• Remote File Server MAC File Collection (RFSMACGLB)
• System's primary backup database (ACTDSKDB)
• Active software generic on the NE (ACTSW)

...................................................................................................................................................................................................

3 Click Apply to apply the configuration settings.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-8: Network Element management


When to use
Use this procedure to retrieve general system level configuration information consisting
of:
• system type
• software release identifier
• software release date
• matrix size
• system restart status

....................................................................................................................................................................................................................................
1646 SM 10-11
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-8: Network Element management

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select System Management → DB Management → Network Element.

Figure 10-7 System configuration

...................................................................................................................................................................................................

2 The System Configuration tab displays the following general system level configuration
information.
• Access Identifier
• Matrix Size
• Node Type
• Provision Mode
• Region
• Release Date
• Release Identification
• System Restart Process Status
• System Type
• USER LABEL

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-9: LAC Management


When to use
Local Access Control (LAC) is used to manage the ZIC.
This option displays the current and default status of the DB management.

....................................................................................................................................................................................................................................
10-12 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-9: LAC Management

....................................................................................................................................................................................................................................
LAC state management
...................................................................................................................................................................................................

1 Select System Management → DB Management → Lac → State.

Figure 10-8 LAC State Management panel

...................................................................................................................................................................................................

2 The LAC state tab displays the Lac State Management panel that contains the following
parameters.

Table 10-3 Lac state panel parameters

Parameters Description
LAC current state Specifies the current LAC state. The default value is Granted.
LAC state Specifies the LAC state. The values are Requested or Denied.
• Requested - Indicates that the local CRAFT is waiting to get access
the NE to send provisioning data.
• Denied - Indicates that the local CRAFT is denied to access the NE
to send provisioning data.

...................................................................................................................................................................................................

3 Click Save hyperlink to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

LAC default management


...................................................................................................................................................................................................

1 Select System Management → DB Management → Lac → Default.

....................................................................................................................................................................................................................................
1646 SM 10-13
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-9: LAC Management

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Click Save hyperlink to save the settings.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-10: MAC File Collection


When to use
The mechanism of MAC File Collection is an efficient way of collecting MAC addresses
of the entire NE in a single file.
The collection of MAC data will be done on the basis of the input filtering, where the
input filters consists of MAC address, slot AIDs and FDB IDs. The MAC File Collection
then generated will contain one line (record) for every retrieved MAC address in the NE
according to the input filtering.

Procedure
...................................................................................................................................................................................................

1 Select System Management → MAC File Collection.

Figure 10-9 MAC File Collection

....................................................................................................................................................................................................................................
10-14 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-10: MAC File Collection

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The MAC File Collection tab displays the following panels.


• MAC File Collection Status
• MAC File Collection
...................................................................................................................................................................................................

3 The MAC File Collection Status panel displays the Collection State and contains the
following hyperlinks:
• Refresh
• File View
...................................................................................................................................................................................................

4 The MAC File Collection panel displays the following parameters.

Table 10-4 MAC File Collection panel parameters

Parameters Description
MAC Address Allows to enter the MAC Address
Board Allows to select the board
VLAN Specifies the input filtering VLAN for the collection preparation.
MAC Learning Type Specifies the type of MAC learning. Dynamically Learned MAC and
Static MAC

...................................................................................................................................................................................................

5 Click Set Empty to make the entries empty.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-11: Administer NTP


When to use
This procedure provides the instructions to retrieve the Network Time Protocol (NTP)
server IP address, provision NTP servers, and delete NTP servers. It also provides
instructions to enable and disable the NTP synchronization.
NTP servers are used for time-of-day synchronization when the NTP protocol is enabled.
If no NTP server is entered and the NTP protocol is enabled, the time-of-day clock
synchronizes with the last known internal clock frequency.
When NTP is enabled, the NE internal time-of-day clock uses the calculated Coordinated
Universal Time (UTC) from the selected NTP server, which is modified by the
user-provisioned offset. All messages, event reports, logs, and events that carry time
stamps use the following time of day: NTP UTC time + provisioned offset.

....................................................................................................................................................................................................................................
1646 SM 10-15
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-11: Administer NTP

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select System Management → Network Time Protocol option from the menu bar.

Figure 10-10 NTP Config - with Disabled Server Synchronization

The NTP config tab contains the Time and Date and Network Time Protocol panels.
...................................................................................................................................................................................................

2 The Time and Date panel allows to manually set the system date and time by means of
six combo-boxes Year, Month, Day, Hour, Minute and Sec. This command is not allowed
if NTP is enabled as shown in Figure 10-11, “NTP Config - with Enabled Server
Synchronization” (p. 10-17).
...................................................................................................................................................................................................

3 Click Save to save the settings and Refresh to refresh the page.

....................................................................................................................................................................................................................................
10-16 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-11: Administer NTP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The Network Time Protocol panel shows the following information.


• Current NTP Server Synchronization - The time synchronization from the NTP
server; The value are Enabled or Disabled. Factory default is Disabled
• Current Offset - The time offset to apply to NTP server UTC time, +/- HH-MM, for
all events and time stamps reported by this NE. Factory default is +08-00
• Current Operating Mode - The current operating mode of the NTP service. The
values are: NTPSYNC - NTP is enabled, and the NE is using the NTP protocol to
synchronize to an NTP server.
• NTP Server Synchronization
• New Offset

Figure 10-11 NTP Config - with Enabled Server Synchronization

....................................................................................................................................................................................................................................
1646 SM 10-17
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-11: Administer NTP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click Create hyperlink and the following window appears.

Figure 10-12 NTP Server Address Provision

The NTP Server Address Provision window contains:


–Server IP Address - Four entry boxes whose allow to digit the IP address of an NTP
server. the address in the [0-126,128-223]-[0-255]-[0-255]-[0-255] format.
The window has the following hyperlinks:
• Cancel allows to leave the page without applying the previously selections.
• Save allows to apply the previously selections.
...................................................................................................................................................................................................

6 Click Delete hyperlink to delete the selected IP address.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-12: Network IF


When to use
Use this procedure to modify the various network interface parameters on a specified
DCC channel on an optical port for data communication purposes. The network interface
must be first provisioned on the line or section DCC of the specific STMn facility. The
DCC is identified as STMn and the DCCCHNL parameter.

....................................................................................................................................................................................................................................
10-18 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-12: Network IF

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Communication → DCC → Network IF option from the menu bar.

Figure 10-13 DCC Channel

...................................................................................................................................................................................................

2 Click the radio button to select the previously created DCC Channel entries from the
table.

Table 10-5 NE interface details parameters

Parameters Description
Access Identifier Specifies the Access Identifier of a resource for the selected port
DCC Channel Specifies the reference of DCC Channel.
The values are:
• LINE
• SECTION
Layer 2 The values are:
• USER
• NETWORK
OSI Protocol Specifies if the OSI protocol runs on the addressed DCC or not.
The values are:
• ENABLE
• DISABLE

....................................................................................................................................................................................................................................
1646 SM 10-19
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-12: Network IF

....................................................................................................................................................................................................................................
Table 10-5 NE interface details parameters (continued)

Parameters Description
OSI Area Specifies which OSI Area the addressed DCC belongs to. The default
value is 1

...................................................................................................................................................................................................

3 Click Save to store all the settings and click Create to configure a new DCC Channel as
shown in the following figure.

Figure 10-14 DCC channel - filter by

...................................................................................................................................................................................................

4 Select the AID type from the combo-box to filter DCC Channel that the user wants to
configure.
...................................................................................................................................................................................................

5 Click Search to filter the DCC Channel.


...................................................................................................................................................................................................

6 The available resources are displayed, else No configurable resources found message is
displayed.
...................................................................................................................................................................................................

7 Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-13: OSI ULC Report


When to use
Allows to modify OSI upper layers stack parameters that are common to all the stack
interfaces of the NE.

....................................................................................................................................................................................................................................
10-20 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-13: OSI ULC Report

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Communication → DCC → OSI USL Report option from the menu bar.

Figure 10-15 OSI Routing Configuration

...................................................................................................................................................................................................

2 The OSI Routing Configuration tab displays the OSI upper layers common parameters
panel that contains the following parameters:
Layer 3 IS Level: This is the IS level provisioning. Check for the option from the drop
down list.
The Values are:
• 1 - It is a Level 1 IS
• 2 - It is a Level 2 IS
...................................................................................................................................................................................................

3 Click Save to close the page and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-14: Create Overhead XC


When to use
Use this procedure to create overhead channel cross-connection.

....................................................................................................................................................................................................................................
1646 SM 10-21
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-14: Create Overhead XC

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select Communication → DCC → XC Overhead from the menu bar.

Figure 10-16 Overhead channel cross-connection

...................................................................................................................................................................................................

2 Click Create to configure a new Overhead Channel Cross-Connection. The following


screen is displayed.

Figure 10-17 Overhead channel cross-connection - enter channel

...................................................................................................................................................................................................

3 The Enter Channel panel contains the following parameters.


• DCC Channel - Specifies the reference of the DCC Channel.
The values are:
– LINE
– SECTION
• From - Specifies the source for the cross-connection
• To - Specifies the destination for the cross-connection

....................................................................................................................................................................................................................................
10-22 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-14: Create Overhead XC

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click Select to choose source and the destination to configure a cross-connection.


...................................................................................................................................................................................................

5 Click Save to store all the settings and return to the previous page.
...................................................................................................................................................................................................

6 Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-15: Create linear MSP


When to use
Use this procedure to create a new Linear MSP.

Procedure
...................................................................................................................................................................................................

1 Select Protection → Linear MSP from the menu bar.

Figure 10-18 Linear MSP

...................................................................................................................................................................................................

2 Select the available STMn Signal from the combo-box for which the user wants to
configure a Linear MSP.

....................................................................................................................................................................................................................................
1646 SM 10-23
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-15: Create linear MSP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Create to configure a new Linear MSP.

Figure 10-19 Linear multiplex section protection provision panel

...................................................................................................................................................................................................

4 Linear Multiplex Section Protection Provision panel parameters are described in the
following table.

Table 10-6 NE interface details parameters

Parameters Description
FFP Access Specifies the Access Identifier for Fast Facility Protection
Identifier
Protection Type Specifies the type of protection. The default values is Linear
Revertive Mode The values are Y or N
Revertive Delay The valid range is from 0-15
Time (min)
Hold Off Time Indicates the Hold off time in milliseconds. The valid range is 0–10000.
(msec)
Protected Access Specifies the Access Identifier for the protected resource
Identifier
Protecting Access Specifies the Access Identifier for the protecting resource
Identifier
Protection Switching Specifies the switching direction. The values are UNI or BI
Direction

...................................................................................................................................................................................................

5 Click Select to choose the Protected Access Identifier and Protecting Access
Identifier.

....................................................................................................................................................................................................................................
10-24 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-15: Create linear MSP

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Click Save to store all the settings and return to the previous page.
...................................................................................................................................................................................................

7 Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-16: Create MS-SPRing


When to use
Use this procedure to create a new MS-SPRing.

Procedure
...................................................................................................................................................................................................

1 Select Protection → MS-SPRing from the menu bar.


Result: The MS-SPRing panel is displayed.
...................................................................................................................................................................................................

2 Select the available STMn Signal from the drop-down list for which the user wants to
configure a MS-SP.
...................................................................................................................................................................................................

3 Click Search to view the provisioned MS-SPRing.


Result: The available list of provisioned MS-SPRings is displayed.
...................................................................................................................................................................................................

4 Click Create to configure a new MS-SPRing.

Figure 10-20 Multiplex section shared protection provision panel

....................................................................................................................................................................................................................................
1646 SM 10-25
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-16: Create MS-SPRing

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Multiplex Section Shared Protection RingProvision panel parameters are described in


the following table.

Table 10-7 NE interface details parameters

Parameters Description
FFP Access Specifies the Access Identifier for Fast Facility Protection
Identifier
Protection Type Specifies the type of protection. The default values is MSSPRING2F
Revertive Mode The values are Y or N
Revertive Delay The valid range is from 0-15
Time (min)
Hold Off Time Indicates the Hold off time in milliseconds. The valid range is 0–10000.
(msec)
East Access Specifies the east side for the MS-SPRing is created.
Identifier Important:
The East and West Access identifiers should have the same data rates.
West Access Specifies the west side for the MS-SPRing is created.
Identifier Important:
The East and West Access identifiers should have the same data rates.
Node Identifier Indicates the node identifier connected to MS-SPRing. The valid range
is 0–15.
Node Descriptor Indicates the MS-SPRing node descriptor. The valid range is 0–255
ASCII characters.

...................................................................................................................................................................................................

6 Click Save to store all the settings and return to the previous page.
...................................................................................................................................................................................................

7 Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
10-26 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-17: Create Provider Bridge Service

....................................................................................................................................................................................................................................

Procedure 10-17: Create Provider Bridge Service


Purpose
Use this procedure to create the Provider Bridge service.
...................................................................................................................................................................................................

1 Select Provider Bridge -> Ethernet Services XC from the menu bar as shown in Figure
10-21, “Provider Bridge Service” (p. 10-27).

Figure 10-21 Provider Bridge Service

This panel lists the Range filter parameters:


From XC ID - the minimum value to implement the range visualization.
To XC ID - the maximum value to implement the range visualization.

....................................................................................................................................................................................................................................
1646 SM 10-27
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-17: Create Provider Bridge Service

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Click Create to configure a new Provider Bridge service as shown in Figure 10-22,
“Create Provider Bridge” (p. 10-28).

Figure 10-22 Create Provider Bridge

Table 10-8, “Provider Bridge Service” (p. 10-28) provides the description of Create
Provider Bridge service parameters.

Table 10-8 Provider Bridge Service

Parameters Description
Topology Specifies the topology to establish the service.
The values are :
• UNI-NNI
• NNI-UNI
Ingress Specifies the input port
S-VID Specifies the static VLAN. Enter the from and
to range to search a specific VLAN
Service Label Specifies the name or label for the new service
Traffic Descriptor Specifies the operation mode
Topology Classifier Specifies the classifier for the selected
topology

....................................................................................................................................................................................................................................
10-28 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-17: Create Provider Bridge Service

....................................................................................................................................................................................................................................
Table 10-8 Provider Bridge Service (continued)

Parameters Description
Policing mode Refers to the policing of the incoming ETS
tarffic.
The values are :
• disabled
• color blind

...................................................................................................................................................................................................

3 Click Save & continue to save the changes and create a new service.
...................................................................................................................................................................................................

4 Click Cancel to return to the previous window without saving the changes.
...................................................................................................................................................................................................

5 Click Save & exit to save the changes and return to the previous window.
...................................................................................................................................................................................................

6 Click Search. The system retrieves the ethernet cross connection details based on the
search parameter defined.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-18: LAG management


When to use
The Link Aggregation function is an extension of the MAC layer which allows grouping
of a set of physical Ethernet interfaces into one logical interface with greater capacity and
reliability. The Link Aggregation Group (LAG) is valid only as a link between two
systems (called the Partners). Grouping of more interfaces linking one system with two or
more Partners is not allowed.
Permitted port rates to be aggregated are 1 Gbps and 10 Gbps (10 Mbps and 100 Mbps
are for future release). The max number of ports (LAG-size) to be aggregated is 16; (LAG
stands for Link Aggregation Group). Links may be anytime added or removed to/from the
bundle. Ports to be aggregated can be either located on the same board and also on
different boards.
Its management in the network is based upon the communication, between the aggregate
partner pieces of equipment, of LACP messages (Link Aggregation Control Protocol).
The LACP packets transport information about set-up, aggregation capability, links
failures, automatic reconfiguration after failure, etc.

....................................................................................................................................................................................................................................
1646 SM 10-29
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-18: LAG management

....................................................................................................................................................................................................................................
The benefits of Link Aggregation feature are:
• Bandwidth limitation overcoming
• Load balancing (the traffic is distributed over the constituting links)
• Reliability increasing (in case that a link of the aggregate fails, its traffic is
automatically distributed over the other links of the aggregate).
The conditions for Link Aggregation option are the following:
• All involved ports must work at the same rate.
• All involved ports must have the same configurations, regarding AutoNegotiation and
Flow Control.
• All aggregated links must be point-to-point (multicast is not allowed).
• All involved interfaces must work in full-duplex modality.
• All involved ports must be Local (remote ports are not allowed).
• Actor and Partner ports (local and far sides) must be of the same type.

Create LAG
Use this procedure to create LAG.
...................................................................................................................................................................................................

1 Click LAG Group from the Tree area. The Link Aggregation Mng window is displayed.

Figure 10-23 Link aggregation management

....................................................................................................................................................................................................................................
10-30 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-18: LAG management

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The Link Aggregator Creation panel parameters are described in the following table.

Table 10-9 Link aggregation parameters

Parameter Description
Name Allows to set the name of the LAG; the only suffix after # can be set by
the user, with an integer in the 1 to 123 range
Admin State This item can be set only after creation, in Configure Aggregator option.
The values are:
• enable: the LAG is in-service
• disable: the LAG is out-of-service
User Label Allows to indicate the LAG by means of a name defined by the user.
Size Allows to set the size of the LAG, i.e. number of Aggregated Ports;
possible values are integers in the 1 to 16 range.
Actor Admin Key Allows to indicate the LAG Key, the parameter identifying this LAG;
integer in the 1 to 65535 range.
EthClient Type Indicates the LAG client layer.
The values are:
• ets: for Ethernet Transparent System
• etb: for Ethernet Bridge System
Actor System Allows to indicate the LAG Priority. This parameter, together with the
Priority LAG Mac-Address, forms the System Identifier. The lowest System
Identifier value is elected as the Master of the link, i.e. the one that will
drive the actions in case of events such as failures, switches, etc. The
valid range is 0 to 65535.
Type Default value is ieee802.3adLag.
Maximum MRU Specifies the maximum MRU value.
LACP Enabled Link Aggregation Control Protocol (LACP).

...................................................................................................................................................................................................

3 Click Save hyperlink that applies the user’s operation in this page.
...................................................................................................................................................................................................

4 Select the LAG# from the LAG table to select any previously created LAG and Select
Configuration to configure the existing LAG.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 10-31
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-18: LAG management

....................................................................................................................................................................................................................................
Configure LAG
...................................................................................................................................................................................................

1 Click on LAG# from the tree area or select the LAG and select the Configuration
hyperlink.

Figure 10-24 Link aggregator configuration

...................................................................................................................................................................................................

2 See Table 10-9, “Link aggregation parameters” (p. 10-31) for Link Aggregator
Configuration panel parameters description.
...................................................................................................................................................................................................

3 Client Type Management panel contains the EthClient Type parameter that indicates the
LAG client layer.
The default value is ets (Ethernet Transparent System).

....................................................................................................................................................................................................................................
10-32 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-18: LAG management

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The Link Aggregator Configuration panel parameters are described in the following
table.

Table 10-10 Link Aggregator configuration panel parameters

Parameter Description
Mac Address A 6-octet MAC address value (NE MAC Address) consisting of the
unique identifier for Partner System.
Partner System Id A 6-octet System Id value consisting of the unique identifier for Partner
System.
Partner Admin Key Indicates the current administrative value of the Key for Link
Aggregation Group (in Partner System).
Partner Operator Indicates the current operational value of the Key for LAG (in Partner
Key System); in case of Active LAG, Partner Admin key = Partner Oper key.
Partner System A 2-octet value (NE System Priority) indicating priority value inside
Priority Partner’s NE SystemId.
N. Selected Ports Indicates the number of ports currently selected for aggregation inside
Link Aggregation Group.
N. Attached Ports Indicates the number of ports currently attached to the same Link
Aggregation Group.
Primary Port It is the index of the primary port in Link Aggregation Group used to
send BPDUs and flooding frames; Zero indicates no primary port is
available
Primary Port It is the port index number in the Link Aggregation Group used to send
Position BPDUs and flooding frames

...................................................................................................................................................................................................

5 Access Control List (ACL) Management panel contains ACL Index parameter that
indicates the ACL Management type.
The default value is 1.
...................................................................................................................................................................................................

6 Click Save & Continue to save the settings and configure another LAG.
...................................................................................................................................................................................................

7 Click Save & Exit to save the settings and exit from the window.
...................................................................................................................................................................................................

8 Click Cancel to cancel all the settings and return to the previous window.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 10-33
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-19: IGMP Snooping

....................................................................................................................................................................................................................................

Procedure 10-19: IGMP Snooping


Purpose
Use this procedure to retrieve a VLAN connection.
...................................................................................................................................................................................................

1 Click on LAG# from the tree area or select the LAG and select the Configuration
hyperlink.
Click on IGMP Snooping the following panel is shown.

Figure 10-25

This panel lists the parameters described below:


From (VLAN) - the minimum value to implement the range of VLAN.
To (VLAN) - the maximum value to implement the range of VLAN.
...................................................................................................................................................................................................

2 Click Search. The system retrieves the VLAN connection details based on the search
parameter defined.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-20: Remove LAG member


When to use
Use this procedure to remove LAG member.

....................................................................................................................................................................................................................................
10-34 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................
Procedure
...................................................................................................................................................................................................

1 Select the board from the tree area.

Figure 10-26 Two member in one LAG

....................................................................................................................................................................................................................................
1646 SM 10-35
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Select one VCG and click Configure LAG.

Figure 10-27 Configure LAG selection

....................................................................................................................................................................................................................................
10-36 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The following screen appears.

Figure 10-28 Configure LAG

...................................................................................................................................................................................................

4 Click Select hyperlink to select the Actor Admin key and the following window pops up.

Figure 10-29 Actor Admin key selection window

....................................................................................................................................................................................................................................
1646 SM 10-37
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click 0 Unlink Port. The following screen appears.

Figure 10-30 Configure LAG for 0 Unlink Port

...................................................................................................................................................................................................

6 Click Save & exit to save all the changes and exit from the window.
Note: If the member is not the first one, the saved settings are fine. If the member
which is removed is the first one, the following window pops up.

Figure 10-31 LAG pop up window

The user needs to change the remove sequence.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
10-38 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-21: Retrieve system information

....................................................................................................................................................................................................................................

Procedure 10-21: Retrieve system information


When to use
Use this procedure to retrieve general system level and global system configuration
information.

Procedure
...................................................................................................................................................................................................

1 Select Equipment → System Information option from the menu bar. The Zero
Installation Craft (ZIC) terminal displays the system level information.
The System Information panel is displayed.

Figure 10-32 System Information

...................................................................................................................................................................................................

2 This panel lists the parameters described in the following table.

Table 10-11 System Information panel parameters

Parameter Description
Node Type Specifies the type of NE.
Software Specifies the active or standby state of the software
System Type Specifies the type of NE.
Release ID Specifies the release identifier
Release Date Specifies the date of release
Matrix Size Specifies the bandwidth supported.
Status Specifies the download state of the software
Region Specifies the region of the NE
Provision Mode Specifies the provisioning mode
User Label Specifies the user label

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 10-39
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-22: Create IP route

....................................................................................................................................................................................................................................

Procedure 10-22: Create IP route


When to use
Use this procedure to configure the IP Routing.

Procedure
...................................................................................................................................................................................................

1 Select Communication → Network Domain → IP Routing option from the menu bar.
The following table displays the existing IP route entry along with its attributes.

Figure 10-33 IP Routing Configuration

....................................................................................................................................................................................................................................
10-40 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-22: Create IP route

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Click Create hyperlink to configure a new IP route.

...................................................................................................................................................................................................

3 Parameters of the screen are described in the following table.

Table 10-12 IP routing parameters

Parameter Description
Access Identifier Specifies the STMn facility carrying the DCC with the next hop network
interface or identifies the IP Tunnel or Customer LAN. The select
hyperlink allows to open the window shown in following figure for the
selection of the resource. After the selection procedure, the chosen value
will be reported.

Destination Address This is the IP address of the destination host or network (in the format
nnn-nnn-nnn-nnn). The address 0-0-0-0 is used to specify a default
route. If NETMASK is not all '1' (i.e., a network route is specified), the
host portion of the DESTADDR must be all '0'.

....................................................................................................................................................................................................................................
1646 SM 10-41
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-22: Create IP route

....................................................................................................................................................................................................................................
Table 10-12 IP routing parameters (continued)

Parameter Description
Subnet Mask This is the IP subnet mask of the route (in the format nnn-nnnnnn- nnn).
The mask 0-0-0-0 is used to specify a default route.

...................................................................................................................................................................................................

4 Enter the Access Identifier for the new IP route. Click Select hyperlink to choose the
AID type. The values are DCC, NE IPT, and LAN.
...................................................................................................................................................................................................

5 Enter the Destination Address and Subnet mask for the IP route to be configured.
...................................................................................................................................................................................................

6 Click Save & Exit to save the settings and return to the window.
...................................................................................................................................................................................................

7 Click Save to store the settings and return to the previous panel.
...................................................................................................................................................................................................

8 Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-23: Create IP tunnel


When to use
Use this procedure to create an IP tunnel instance on the NE. The IP tunnel that has to be
created is specified by its AID.

Procedure
...................................................................................................................................................................................................

1 Select Communication → IP Tunnel option from the menu bar.

....................................................................................................................................................................................................................................
10-42 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-23: Create IP tunnel

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Click Create to configure the IP Tunnel.

Figure 10-34 IP tunnel - network element

...................................................................................................................................................................................................

3 Parameters of the screen are described in the following table.

Table 10-13 NE IP tunnel parameters

Parameter Description
AID (IP Tunnel Identifier), it is the identifier of the specific IP tunnel to
create. Allowable values are in the 1 - 128 range
REMOTE NSAP (TL1 SID of the IP Tunnel target NE.) The Target NE must be reachable
via OSI over DCC and the NSAP address corresponding to this TID
must be able to be retrievable from the TARP cache. The values are:
<1-20 VALID TID CHARACTERS> or “<1-20 VALID TID
CHARACTERS>”. If the value contains non-alphanumeric characters, it
has to be enclosed in double quotes
Encapsulation Type Specifies the encapsulation type for the NE. The values are: ALU or
GRE.

...................................................................................................................................................................................................

4 Enter the IP tunnel access identifier in the entry box.


...................................................................................................................................................................................................

5 Enter the Remote NSAP value for the IP tunnel.


...................................................................................................................................................................................................

6 Select the encapsulation type from the drop-down list box and click Save to create new IP
tunnel.

....................................................................................................................................................................................................................................
1646 SM 10-43
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-23: Create IP tunnel

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Click Close to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-24: NE TL1 Parameter


When to use
Use this procedure to modify the NE TL1 parameters.

Procedure
...................................................................................................................................................................................................

1 Select Tools→ NE TL1 Param option from the menu bar.


Result: The NE TL1 parameters configuration details if any, are displayed.

...................................................................................................................................................................................................

2 Enter the Prompt information.


...................................................................................................................................................................................................

3 Click Save to store the settings and return to the previous panel.

E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-25: TL1 console


When to use
Use this procedure to view the TL1 console parameters.
...................................................................................................................................................................................................

1 Select Tools → TL1 console option from the menu bar.

....................................................................................................................................................................................................................................
10-44 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-25: TL1 console

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 In order to use this facility it is necessary to access the Telnet console. Enter User and
Password fields with the log accessing data.

Figure 10-35 Tools - TL1 console

....................................................................................................................................................................................................................................
1646 SM 10-45
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-25: TL1 console

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Connect.

Figure 10-36 Tools - Accessing TL1 console

Lower part used to digit the TL1 command.


Upper part used to answer the TL1 Telnet command.

....................................................................................................................................................................................................................................
10-46 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-25: TL1 console

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Client area is shown in Figure 10-37, “Tools - Telnet console” (p. 10-47).

Figure 10-37 Tools - Telnet console

....................................................................................................................................................................................................................................
1646 SM 10-47
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-25: TL1 console

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click the TL1 command RTRV-EQPT::ALL, press enter the following is shown.

Figure 10-38 Tools - TL1 command

...................................................................................................................................................................................................

6 Click QUIT or CANC-USER to close the Telnet session.


E...................................................................................................................................................................................................
N D O F S T E P S

Procedure 10-26: Create FTP Server Configuration


When to use
Use this procedure to create an FTP Server configuration.

Procedure
...................................................................................................................................................................................................

1 Select Tools→ FTP Server Configuration option from the menu bar.

....................................................................................................................................................................................................................................
10-48 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-26: Create FTP Server Configuration

....................................................................................................................................................................................................................................
Result: The available FTP server configuration details if any, are displayed.

...................................................................................................................................................................................................

2 Click Create to configure the FTP server.

Figure 10-39 Create FTP server

Table 10-14 Create FTP server parameters

Parameter Description
Host Specifies the IP address of the Host machine.
Port Specifies the Port number.
Path Specifies the complete path of the host machine.

...................................................................................................................................................................................................

3 Enter the IP address of the Host machine in text box.


...................................................................................................................................................................................................

4 Enter the Port number.


...................................................................................................................................................................................................

5 Enter the complete path of the host machine.


...................................................................................................................................................................................................

6 Click Save to store the settings and return to the previous panel.
...................................................................................................................................................................................................

7 Click Cancel to revoke all the settings and return to the previous page.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1646 SM 10-49
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Provisioning: Detailed level Procedures Procedure 10-26: Create FTP Server Configuration

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
10-50 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Glossary

...................................................................................................................................................................................................................................

A AIS
Alarm Indication Signal failure (Condition Type)

Alarm
Visible or audible signal indicating that an equipment failure or significant event/condition has
occurred.

Alarm Severity
An attribute that defines the priority of the alarm message. The way in which alarms are processed
depends on the severity.

APS
Automatic Protection Switching

...................................................................................................................................................................................................................................

B Backup
The backup and restoration features provide the capability to recover from loss of network
element data because of such factors as human error, power failure, and network element design
flaws.

BITS
Building Integrated Timing Supply

...................................................................................................................................................................................................................................

C CBS
Committed Burst Size is the maximum burst size (byte) with high priority guaranteed for the
Tunnel/Pseudowire packets deliver.

CFM
Connectivity Fault Management

CIF
Customer Interface

CIR
Committed Information Rate is the maximum rate (kb/sec) with high priority guaranteed for the
Tunnel/Pseudowire packets delivery.

....................................................................................................................................................................................................................................
1646 SM GL-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Glossary

....................................................................................................................................................................................................................................
Circuit
A combination of two transmission channels that permits bidirectional transmission of signals
between two points to support a single communication.

...................................................................................................................................................................................................................................

D DCC
Data Communication Channel

DCN
Data Communication Network.

DDM
Digital Diagnostic Monitoring.

DEI
Dropping Eligibility Indicator

...................................................................................................................................................................................................................................

E ESD
Electro Static Discharge. Static electrical energy potentially harmful to circuit packs and humans.

...................................................................................................................................................................................................................................

F FDB
Filtering Database. The filtering database maintains a dynamic list of paths to which packets are
routed based on the destination address. The database entries are created, updated, and removed
by the learning process.

FLC
First Level Controller

...................................................................................................................................................................................................................................

G GB
Gigabytes.

GUI
Graphical User Interface. This interface supports applications that consist of a series of
rectangular presentation regions called windows. Each window displays another application.

...................................................................................................................................................................................................................................

H HKP
HouseKeeping

...................................................................................................................................................................................................................................

I ID
Identifier

ISID
Backbone Service Identifier

....................................................................................................................................................................................................................................
GL-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Glossary

....................................................................................................................................................................................................................................
ITU
International Telecommunications Union

...................................................................................................................................................................................................................................

L LAC
Local Access Control

LACP
Link Aggregation Control Protocol

LAG
Link Aggregation Group.

LAN
Local Area Network.

Link Aggregation
A method of combining a group of IEEE 802.3 Ethernet links into a single logical link of up to the
aggregate rate.

...................................................................................................................................................................................................................................

M MA
Maintenance Association.

MAC
Media Access Control.

MD
Maintenance Domain.

MEG
Maintenance Entity Group.

MEP
Maintenance association End Point.

MHF
MIP Half Function

MIP
MEG Intermediate Point.

MP
Maintenance Point.

MTU
Maximum Transmission Unit.

....................................................................................................................................................................................................................................
1646 SM GL-3
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Glossary

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................

N NE
Network Element. A node in a telecommunication network that supports network transport
services and is directly manageable by a management system.

NIF
Network Interface.

Node
A node or network element is defined as all equipment that is controlled by one-system controller.

NTP
Network Time Protocol.

...................................................................................................................................................................................................................................

O OSS
Operational Support System.

OSTYPE
Operations System Type.

...................................................................................................................................................................................................................................

P Path
A logical connection between the point at which a standard frame format for the signal at the
given rate is assembled, and the point at which the standard frame format for the signal is
disassembled.

PBS
Peak Burst Size is the maximum burst rate allowed (byte) for the Tunnel/Pseudowire.

PDU
Power Distribution Unit.

PIP
Provider Instance Port. The set of Virtual Instance ports that are supported by a single instance of
the Internal sub-layer service.

PIR
Peak Information Rate.

PRC
Primary Reference Clock.

...................................................................................................................................................................................................................................

R Ring
A configuration of nodes comprised of network elements connected in a circular fashion. Under
normal conditions, each node is interconnected with its neighbor and includes capacity for
transmission in either direction between adjacent nodes.

....................................................................................................................................................................................................................................
GL-4 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Glossary

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................................................

S S-VID
Service VLAN Identifier.

SFP
Small Form Factor Pluggable.

Shelf
Basic rack assembly unit; contains subassemblies (usually circuit packs, also referred to as
modules).

SNCP
Sub-Network Connection Protection.

SSM
Synchronization Status Message.

...................................................................................................................................................................................................................................

T TDM
Time Domain Multiplexing.

...................................................................................................................................................................................................................................

U UNI
User-Network Interface.

...................................................................................................................................................................................................................................

V VCG
Virtual Concatenation Group.

VID
Virtual LAN Identifier

VLAN
Virtual Local Area Network.

...................................................................................................................................................................................................................................

X XFP
Extended Form-factor Pluggable.

...................................................................................................................................................................................................................................

Z ZIC
Zero Installation Craft Terminal. A NE-embedded graphical user interface application for local
operation and maintenance.

....................................................................................................................................................................................................................................
1646 SM GL-5
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Glossary

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
GL-6 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Index

A alarm, 7-1 ............................................................. OH


condition log, 7-11 I IGMP create, 4-14
cutoff, 7-9 snooping, 10-34 search, 4-13
resynch., 7-10 In-Service upgrade, 10-6 .............................................................

ASAP, 7-3 IP routing, 6-11 S security, 9-1


audit, 9-12 IP tunnel, 6-8 software version, 10-4
............................................................. ............................................................. synchronization, 8-1
B bridge L LAC, 10-12 BITS-0, 8-2, 8-4
configure, 5-10 LAG, 10-29 BITS-OUT, 8-5, 8-7
............................................................. configure, 10-32 outgoing, 8-16

C color profile, 5-9 create, 10-30 system

conventions, xxvii linear MSP, 10-23, 10-25 log in, 10-2

Create log settings, 9-14 log out, 10-3

provider bridge service, 10-27 ............................................................. .............................................................

Create MAC Access Control List, M MAC, 10-14 T TCA Profile, 7-2
6-17
MAC Access Control Element TL1
............................................................. (ACE), 6-18 console, 10-44
D DB management Modify ASAP, 7-8 traffic descriptor, 5-2, 5-5
cancel remote file copy, 10-10 ............................................................. .............................................................
remote file copy, 10-7 N NTP, 10-15 U user
documentation ............................................................. change account, 9-5
set, xxvii
O OAM change password, 9-2
.............................................................
global setting, 5-11, 5-13, 5-21, create account, 9-3
E ELP, 5-36 5-22, 5-23, 5-24, 5-26, 5-27,
information, 9-3
5-28
ERP instance, 5-29 modify settings, 9-8
MA, 5-15
ethernet .............................................................
MD, 5-13
P2P XC, 4-9, 4-11
V VCn cross-connection, 4-1
MEP, 5-17, 5-19

....................................................................................................................................................................................................................................
1646 SM IN-1
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013
Index

....................................................................................................................................................................................................................................
VLAN profile, 5-7

....................................................................................................................................................................................................................................
IN-2 1646 SM
3KC18078ADAATQZZA Release 2.3
Issue 1 June 2013

Вам также может понравиться