Академический Документы
Профессиональный Документы
Культура Документы
Switch-5C (TSS-5C)
Release 6.1
8DG24624AGAATQZZA
Issue 7
September 2017
Legal notice
Nokia is a registered trademark of Nokia Corporation. Other products and company names mentioned herein may be trademarks or
tradenames of their respective owners.
The information presented is subject to change without notice. No responsibility is assumed for inaccuracies contained herein.
© 2017 Nokia.
Contains proprietary/trade secret information which is the property of Nokia and must not be made available to, or copied or used by
anyone outside Nokia without its written authorization.
Notice
The information in this document is subject to change without notice. Although every effort has been made to make this document as
accurate, complete, and clear as possible, Nokia and its predecessors assume no responsibility for any errors that appear in this document.
Security Statement
In rare instances, unauthorized individuals make connections to the telecommunications network. In such an event, applicable tariffs require
that the customer pay all network charges for traffic. Nokia and its predecessors cannot be responsible for such charges and will not make
any allowance or give any credit for charges that result from unauthorized access.
Limited warranty
Nokia provides a limited warranty for this product. For more information, consult your local Nokia customer support team.
Contents
Index ..................................................................................................................................................................462
List of tables
Table 1 Document changes ............................................................................................................................24
Table 2 Conventions used...............................................................................................................................26
Table 3 Documents related to the 1850 Transport Service Switch-5C............................................................27
Table 4 Examples of hyperlinks ......................................................................................................................37
Table 5 Traffic Descriptor, Policing Mode and Color Profile for INFLOW resource:........................................57
Table 6 Prioritization for OUTFLOW resource with "Stacked-VLAN management .........................................58
Table 7 Range panel parameters....................................................................................................................65
Table 8 Create user account parameters......................................................................................................106
Table 9 Modify user account parameters ......................................................................................................109
Table 10 Restore DB parameters....................................................................................................................123
Table 11 System DB backup Information parameters.....................................................................................124
Table 12 Create MAC ACE parameters ..........................................................................................................129
Table 13 IPv4 ace parameters ........................................................................................................................132
Table 14 IPv6 ace ...........................................................................................................................................136
Table 15 Database Management Copy Remote file .......................................................................................139
Table 16 Network Element ..............................................................................................................................142
Table 17 Configure Delay Measurement.........................................................................................................147
Table 18 Configure Synthetic Loss Measurement ..........................................................................................148
Table 19 Performance Monitoring Global File Collection status parameters ..................................................150
Table 20 Start Performance Monitoring Global File Collection .......................................................................151
Table 21 Copy Security Remote file................................................................................................................154
Table 22 Copy Security Remote file of SSL ....................................................................................................158
Table 23 Certificate signing request................................................................................................................160
Table 24 Network Time Protocol parameters ..................................................................................................163
Table 25 IP ACL Inputs....................................................................................................................................167
Table 26 Link aggregation parameters ...........................................................................................................175
Table 27 Modify LAG parameters ...................................................................................................................180
Table 28 Board configuration parameters ......................................................................................................186
Table 29 Board parameters ............................................................................................................................190
Table 30 Configure MPLSIF parameters.........................................................................................................196
Table 31 Maintenance Rx/Tx parameters .......................................................................................................203
List of figures
Figure 1 Page view with cascading menu..........................................................................................................39
Figure 2 TMPLS-TP/T-MPLS Global Network ...................................................................................................43
Figure 3 L2 encapsulation profile .......................................................................................................................44
Figure 4 PHB profile...........................................................................................................................................46
Figure 5 OAM PHB profile .................................................................................................................................46
Figure 6 Traffic descriptor management ............................................................................................................47
Figure 7 TMPLS/MPLS-TP Tunnel ....................................................................................................................48
Figure 8 PseudoWire .........................................................................................................................................49
Figure 9 Connection - TDM Search (ETSI) ........................................................................................................51
Figure 10 Connection- TDM create (ETSI) ........................................................................................................52
Figure 11 EVPL service......................................................................................................................................53
Figure 12 EVPLAN service ................................................................................................................................53
Figure 13 Data - Traffic descriptor......................................................................................................................56
Figure 14 VLAN profile with ghost objects .........................................................................................................56
Figure 15 Color profile .......................................................................................................................................59
Figure 16 Group segregation management .......................................................................................................59
Figure 17 Queue profile management ...............................................................................................................60
Figure 18 Global setting .....................................................................................................................................61
Figure 19 OAM resource configuration - MD .....................................................................................................62
Figure 20 OAM resource configuration - MD .....................................................................................................62
Figure 21 OAM resource configuration - Maintenance association ...................................................................63
Figure 22 Maintenance association MEP list .....................................................................................................64
Figure 23 MEP ...................................................................................................................................................64
Figure 24 MIP ....................................................................................................................................................66
Figure 25 Proactive delay measurement ...........................................................................................................66
Figure 26 Synthetic loss measurement..............................................................................................................67
Figure 27 On-Demand Delay Measurement ......................................................................................................68
Figure 28 EFM Tool............................................................................................................................................68
Figure 29 ELAN service .....................................................................................................................................69
Figure 30 Static filtering DB ...............................................................................................................................69
Figure 31 Storm control profile...........................................................................................................................70
List of procedures
3.2 Accessing ZIC..........................................................................................................................................97
What's new
This is Issue 7 of 1850 TSS-5C Release 6.1 User Provisioning Guide.
The following table shows the document changes in Issue 7.
Intended audience
Recycling/take-back/disposal of product
Electronic products bearing or referencing the displayed symbol, when put on the market within the
European Union, are collected and treated at the end of their useful life, in compliance with
applicable European Union and local legislation. They must not be disposed of as part of unsorted
municipal waste.
The product may contain materials such as heavy metals or batteries. Appropriate disposal of such
materials is necessary to avoid a negative impact on the environment and human health.
Note:In the European Union, a solid bar under the crossed-out wheeled bin indicates that the product was put
on the market after 13 August 2005.
Moreover, in compliance with legal requirements and contractual agreements, where applicable,
Nokia offers to provide for the collection and treatment of Nokia products at the end of their useful
life, or products displaced by Nokia equipment offers.
For information regarding take-back of equipment by Nokia, or for more information regarding the
requirements for recycling/disposal of product:
• Contact your Nokia account manager
• Contact Nokia Asset Recovery (mailto: asset.recovery@nokia.com).
• Contact Nokia Global Sustainability (mailto: sustainability.global@nokia.com).
• Visit Nokia Protecting the Environment (http://company.nokia.com/en/our-activities/protecting-
the-environment).
Conventions used
The typographical conventions used in this document are described in the following table:
Appearance Description
emphasis Text that is emphasized
document titles Titles of books or other documents
file or directory names The names of files or directories
graphical user interface text Text that is displayed in a graphical user
interface
keyboard keys The name of a key on the keyboard
system input Text that the user types as input to a system
system output Text that a system displays or prints
variable A value or command-line parameter that the
user provides
[] Text or a value that is optional
{ value1 │value2 } A choice of values or variables from which one
{ variable1 │ variable2 } value or variable is used
Related information
The following table lists the documents included in the 1850 TSS-5C documentation set:
Document support
For support in using this or any other Nokia document, contact Nokia at the following telephone
numbers:
• 1-888-582-3688 (from within the United States)
• +1-630-224-2485 (from outside the United States)
• origination country exit code-1-630-224-2485 (replace the plus sign with your country's exit
code) See a listing of exit codes. (Landline – phones lacking the plus (+) character)
Technical support
For technical support, contact your local customer support team. See the Support web site
(https://networks.nokia.com/support/) for contact information.
How to order
To order Nokia documents, contact your local sales representative or use the Online Customer
Support Site (OLCS) web site at https://online.networks.nokia.com (https://online.networks.nokia.
com).
How to comment
To comment on this document, go to the Online Comment Form (http://infodoc.alcatel-lucent.com/
comments/) or e-mail your comments to the Comments Hotline (mailto:comments@nokia.com).
1 Getting Started
1.1 Overview
1.1.1 Purpose
This chapter provides information on the Zero-Installation Craft terminal (ZIC) menu. The ZIC
provides local management of single network element, with an ITU compliant Information Model
Interface that manages the Network Element.
1.1.2 Contents
1.1 Overview 29
1.2 Craft terminal functionality 29
1.2.7 Synchronization
Provides descriptions of time and alarm Synchronization functions.
1.2.10 Security
Provides descriptions and procedures based on Security Management.
1.2.11 Provisioning
Provides detailed level procedures for the following:
• Accessing the ZIC
• Provisioning, Administering and Creation of:
− Data Communication
− Alarms
− Protection
− Synchronization
− System Management
− Security
2 System Management
2.1 Overview
2.1.1 Purpose
Provides a description of the Craft Terminal System Overview and Hierarchical menu.
2.1.2 Contents
2.1 Overview 31
2.2 Zero-Installation Craft terminal overview 31
2.3 Graphical User Interface 33
2.4 Mouse 34
2.5 browser window 35
2.6 Hyperlinks 36
2.7 Combo-boxes 38
2.8 Menus 38
2.9 Entry boxes 39
2.10 Dialog boxes 40
2.11 Menu description 40
System management
• Start-Up/Stop of the system
• Visualization of all the ZIC related processes
• The computing environment (system back-up/restore)
Security management
This section is related to security within the ZIC. The functions of configuration and installation are
accessible only to the Administrator. It contains:
• Access to the system (password modification, login, logout)
• Profile assignment (determines which functionalities the user has access to)
• Property of the map (public/private)
Some of the functionality offered by the ZIC are common to all the NEs, other functionalities are
dedicated and present only for some NE types.
• Supervision of NEs
• Changing of boards and subracks
• alarm and event notification
• Configuration of the alarm severity profile
• Time management
• Port management
• Performance monitoring. It consists of a set of functions that evaluate and report on the behavior
of the NEs and their effectiveness relating to the communications taking place on the Network.
• Synchronization
• Software download for NE upgrading, following the network evolution
Software management
The software management section refers to the software package(s) present in the NE. This is the
support of the ZIC application running on any NE. The operations concerned are:
• Getting information about the software downloaded in a selected NE
• Getting information about the software present on the FTP server for the NE
• Downloading software packages from the FTP server to a NE
Alarm management
This function is used to detect and correct abnormal functioning of the system. The managed
entities transmit alarms to the ZIC that processes them. The different alarm functionalities are:
• Reception and processing of alarms
• Establishment of filter criteria on alarm reception
• Log management of alarms
• Internal storing and treatment of alarm information
• User interface service management for displaying purposes
• User interface operations for alarm processing
• Alarm probable cause
• The alarms concerning a particular managed entity is represented in a synthetic way in all the
pages concerning the entity
The users work environment can be partitioned into the following utilities and widgets:
• Keyboards - The different keys and the actions they induce are defined.
• Mouse - The functioning of the mouse buttons is provided.
• Desktop - A desktop is the screen area where you bring the applications needed for your work,
arrange them to suit your preferences, and put them away when you're done. Desktop provides
a way to make a single display seem like several displays. You can customize the desktop by
adding shortcuts to your favorite programs, document, etc. and by changing its look as you like.
• Browser's pages - The page's or panel's general layout, menu and configuration (size) is
described.
• Buttons - The different types of buttons are described.
• Combo-boxes - The different types of buttons are described.
• Menus - The menu types used to open pages, select icons and navigate through the different
functionalities of the ZIC (Zero-Installation Craft terminal) are introduced.
• Entry and dialogue boxes - The different types of boxes and their aspect is defined so that the
user is familiar with them.
• Symbol and icon - A small, graphic representation of an object on the workspace. Objects can be
"iconified" (turned into icons) to clear a cluttered workspace and "normalized" (returned to their
original appearance) as needed. Processes executing in an object continue to execute when the
object is iconified.
2.3.2 Keyboard
2.4 Mouse
2.4.1 Description
The mouse is associated with a mouse pointer. This pointer represents the current position of the
mouse on the screen. Any movement of the mouse, on the mouse pad, moves the pointer on the
screen in an identical way. The mouse can be moved anywhere on the workspace.
Details on mouse configuration can be obtained in the "Mouse property" of "Control panel".
• Select/deselect - enables you to select/deselect objects.
• Custom Select - enables you to generate pop-up menus.
• Drag and drop - enables the user to move files from one location to the other by holding the left
mouse button.
In a right-handed mouse configuration the "Select / deselect" button is left side. With left handed
mouse configuration it is on the opposite side.
According to the choices, the Client area displays panel(s), table(s), and hyperlinks.
• Panel - is a rectangular light gray area that contains the combo-boxes.
2.6 Hyperlinks
2.6.1 Description
In any working application related to the ZIC (Zero-Installation Craft terminal), the operator will have
to confirm, cancel, select options or ask for help using hyperlinks. Different types of hyperlinks
exist and are described in this section.
The hyperlinks are identified by theword identifying the action associated with it. Some examples of
the different types of hyperlinks are described in Table 4, “Examples of hyperlinks” (p. 36)
Parameter Description
Save To save the settings
Save & continue To save and continue the settings
Save & exit To save and exit the settings
Provision To start the provision procedure
Deprovision To start the de-provision procedure
Cancel To cancel the settings
Delete To remove the settings
Exit To exit the settings
Remove To remove the provisioning from the settings
Remote Inventory To perform the data recovering of the involved entity
Retrieve Section Trace To recover the data of the section trace
Retrieve To recover the data of the involved entity
Select To open a further page in order to operate a selection
Modify To modify the settings without exiting the page
Apply To apply the involved entity
New To start the creation procedure of the entity
Search To start the search procedure about the involved entity
Continue To continue the operation with further options without
saving the actual settings
Default To set the relevant item at the factory default value
View To display the hidden values (usually for alarms)
Reset Criteria To cancel the search criteria previously set
Operate xxx To apply the setting for the xxx entity (e.g., Loopback
etc.)
To apply the action related to a hyperlink, position the mouse pointer over the word you wish to
select and click using the Select mouse button.
The hyperlinks may open dialogue boxes. The reader may note that often, identical hyperlinks are
found on different Pages, this is because they often require similar actions to be undertaken.
2.7 Combo-boxes
2.7.1 Description
When you click on an combo-box, you open an option menu from which you choose a single item.
Combo-boxes are used when a list of items are mutually exclusive.
Note: The example given above enables you to choose the Provisioned type. To open the
option menu, click on the option button. Select an item from the list of options.
For some fields a blank description is present. This allows to select none of the available items.
2.8 Menus
2.8.1 Description
This section describes an important aspect of the user interface. The user constantly has to open
Pages, select icons and navigate through the different functionalities of the ZIC (Zero-Installation
Craft terminal).
A menu consists of a title, that usually identifies the nature of the actions that can be undertaken,
and a list of options associated with actions.
Note: A menu option followed by "..." means that selecting this option opens another view. For
example the Open... or Save As... menu options in the File pull- down menu.
Note: The text entry areas may not be accessible for entering text. In this case they have a
different color than other entry areas in which text can be entered. In the example above, the
Granularity entry box may not be used for text entry. Its color is lighter than the other entry
areas. Furthermore the text cursor is dotted, indicating that text cannot be entered.
To access an entry box and enter text, click on the text entry area. The text cursor begins to blink.
The text cursor has an I-beam shape. The following keys are useful when entering text.
Key Function
Back Space Deletes to the left.
Del Deletes to the right.
Key Function
,,, Displace the cursor along the text.
To access another entry box, you can either click in the entry box using the Select mouse button or
use the Tab key on the keyboard.
Select the Tab key that enables you to pass to an entry box situated beneath the one from which
the Tab key is pressed. Select Shift+Tab keys to access an entry box situated above the one from
which the action is launched.
Note: The Tab key does not give you access to those entry boxes that are read only.
Therefore, when a dialogue box containing entry boxes opens, the Tab key takes you directly
to the first entry box in which you can write.
2.10.2 Tree
A tree area is generally a part of a page that enables the operator to consult and select items from
an existing list.
Note: In compliance with your access rights and the management state, you may or not have
access to some of the management options described below. The management options that
cannot be accessed aren't represented.
Refresh Tree - Allows to update the page area tree.
Following are the Menu and Sub-Menu options available:
2.11.2 TMPLS/MPLS-TP
TMPLS/MPLS-TP - Creates an application profile for the use MPLS frame format, the MPLS
forwarding paradigm, and the client to MPLS mapping in transport networks.
Menus Description
TMPLS/MPLS-TP Global Network Allows to manage all the global network parameters
assigned to T-MPLS.
L2 Encapsulation Profile Allows to configuration of the L2 encapsulation profile.
Quality of Service Allows to manage QoS information
PHB Profile This is the externally observable forwarding behavior
applied at a DS-compliant (Diff-Serv) node belonging to a
DS domain
OAM PHB Profile Supports the capability to configure an association
between a PHB value and a TMPLS OAM packet
Menus Description
Traffic Descriptor ATraffic Descriptor also called MPLS Tunnel Resource
Descriptor, can be associated to Tunnels and/or
Psuedowires. ATD is the set of CIR, CBS, PIR and PBS
parameters used by the System for bandwidth checks
related to "port bit rate" or "Virtual Transport bit rate" on
which Tunnels and Psuedowires are defined.
TMPLS/MPLS-TP Tunnel Allows to manage the association between two terminated
tunnels.
MPLS-TP Ring Association Allows to manage the ring association between two
terminated tunnels
TMPLS/MPLS-TP OAM Allows the management of Delay, Loss and Loop back.
Delay Measurement Tool A point-to-point connectivity service
MPLS-TP Loop Back Tool To be updated
Loop back tool To be updated
MIP discovery To be updated
PseudoWire Allows to manage the T-MPLS Pseudowires
• OAM CV Period - Specifies the selector of values range for CV Period into OAM CV frames.
The allowable values are:
− 4 (0.1ms, 0.5ms, 1ms, 3.33 ms,10 ms,100 ms,1s,10s, 1m, 10m)
− 4 (0.1ms, 0.5ms, 1ms, 3.33 ms,10 ms,100 ms,1s,10s, 1m, 10m)
• PHB Range - Specifies the selector of values range for user-defined PHB Profile.
The allowable values are:
− 1 (EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y)
− 2 (EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2)
• OAM Type - Specifies the OAM type of either T-MPLS or MPLS-TP.
L2 encapsulation profile
L2 Encapsulation Profile displays the following as shown in Figure 3, “L2 encapsulation profile”
(p. 44).
The Layer 2 Encapsulation Profile Management tab displays the following parameters:
• Access Identifier - This specifies the access identifier to the L2ENCAP profile stored in the
system. The values are in the range L2ENCAPPROF-{1-32}.
• MAC Destination Address - This specifies the Medium Access Control Address to be used in
case of mapping of MPLS when a switched network is present.
• Tagged Flag - Specifies the flag Tagged/Untagged.
• VLAN-ID - Specifies the VLAN identifier to be used in case of mapping of MPLS over Ethernet
when a switched network is present. The parameter is mandatory if Tagged Flag=TAGGED,
otherwise it is not valid.
• Priority - This specifies the priority value for TAGGED Ethernet frame. It is not valid if Tagged
Flag=UNTAGGED.
• Drop Eligible - This specifies the drop eligible indication according to 802.1ad. It is not valid if
Tagged Flag=UNTAGGED.
• In-Use - This specifies if the L2ENCAP Profile is referenced by a Tunnel Segment or Pseudowire
Segment.
Click Create to configure the L2 Encapsulation Profile.
Quality of Service
PHB profile
A Per-Hop Behavioral Profile is the externally observable forwarding behavior applied at a DS-
compliant (Diff-Serv) node belonging to a DS domain. A set of "data treatments" (defined as PSCs)
are requested to be applied to packets on each NE inside DiffServ domain, where this treatment
includes both:
• Selection of the queue and schedule discipline to apply at NE egress interface
• Congestion thresholds to be applied over NE egress queues
The user can profile the NE forwarding behavior for TU Segment and PW Segment, combining
PHB. The user can use the following PSCs:
• EF MPLS Expedited Forwarding - Used to give preferential queuing treatment in a Strict Priority
queue. Useful to provide low loss, low jitter and low delay handling within an MPLS node.
• HIGH2 - Used for delay/jitter sensitive traffic and sharping both the same relationship with MPLS
PSC bandwidth-based parameter and the same queuing type as in MPLS EF PSC.
• AF Assured Forwarding - This defines 4 independent forwarding classes (denoted as AF1, AF2,
AF3, and AF4). These PSCs are used when, in case of congestion, is necessary to define the
drop precedence of a packet according to An class. Both Green and Yellow packets belonging to
the same AF class are not requested to be re-ordered from the system and are requested to be
sent to the same egress WFQ forwarding queue. This PSC is composed by 8 PHB [AF11, AF12,
AF21, AF22, AF31, AF32, AF41, AF42].
• DE Default Behavior - Identifies the existing "best effort" traffic
• LOW2 - The same queuing type and the same relationship with MPLS PSC bandwidth-based
parameters as in MPLS DE PSC
Click PHB Profile menu as shown in Figure 4, “PHB profile” (p. 46).
The Per Hop Behavior Profile Management tab provides the following parameters:
• A column containing a check box, used to manage the deletion of a PHB Profile. The PHB
Profile must not be the default one, nor an In Use one.
• Access Identifier - This specifies the access identifier to the PHB profile stored in the system.
The values are in the range PHBPROF-{1-8}. Related to the value of PHB range in the Global
Network page, a factory default PHB Profile is defined. The default value is PHBPROF-1..
• An hyperlink on this object is present only if the PHB Profile can be modified, that is the PHB
Profile is not the default one or in not in use.
• EXP Bit 'i' - Reports the User association between the EXP-bit field value 'i' and the PHB class,
where i = 0-7.
• In Use - This specifies if the PHB is referenced by a Tunnel Segment or Pseudowire Segment.
• CoS - Class of Service. There are two PHB Profiles under Class of service, 5P3D and 8POD
Click Create to configure a new PHB Profile.
The OAM PHB Profile Management tab provides the following parameters:
• Access Identifier - Specifies the access identifier to the OAMPHB profile stored in the system.
The values are in the range OAMPHB-{1-8}
• TYPE ‘i’ - Reports the association between the ‘i’ type packet and a PHB value, where i = 1 to 8
• Profile In Use - Specifies if the OAMPHB is referenced by a Tunnel Segment or Pseudowire
Segment
Traffic descriptor
A Traffic Descriptor, also called MPLS Tunnel Resource Descriptor, is associated to Tunnels and/or
Pseudowires. A TD is the set of CIR, CBS, PIR, and PBS parameters used by the System for
bandwidth checks related to "port bit rate" or "Virtual Transport bit rate" on which Tunnels and
Pseudowires are defined. The user uses the following parameters to condition MPLS packets:
• CIR MPLS committed Information Rate - This is the maximum rate (kbyte/sec) with high priority
guaranteed for the Tunnel/Pseudowire packets delivery.
• CBS MPLS Committed Burst Size - This is the maximum burst size (byte) with high priority
guaranteed for the Tunnel/Pseudowire packets deliver.
• PIR MPLS Peak Information Rate - This is the maximum peak rate allowed (kbyte/sec) for the
Tunnel/Pseudowire.
• PBS MPLS Peak Burst Size - This is the maximum burst rate allowed (byte) for the Tunnel/
Pseudowire.
CIR and PIR values are used for CAC checks with respect to output port. When the TD is
referenced by a Tunnel then the system checks if sum of CIR<=available bandwidth on which port
the Tunnel is defined and if each PIR<= available bandwidth on which port the Tunnel is defined.
When the TD is referenced by a Pseudowire then the system checks if sum of CIR<=available
bandwidth on which Tunnel the Pseudowire is defined and if each PIR<= available bandwidth on
which Tunnel the Pseudowire is defined. All CAC checks are involved when this TD is used by a
Tunnel or Pseudowire.
The Traffic Descriptor Management tab contains the following as shown in Figure 6, “Traffic
descriptor management” (p. 47).
Note: Creation of the MPLS Traffic Descriptor will be enabled only when the Tunne/PWl is set
to On.
The TMPLS/MPLS-TP Tunnel Management tab displays the Filter by panel that contains the
following parameters:
• Tunnel Type - This specifies the type of tunnel. The values are:
− LOCAL - No filter applied
− ALL
• Tunnel Resource Filter - The drop-down provides the following resource filter options: This
specifies the type of Tunnel to be filtered. The values are:
− Tunnel ID - No filter applied
− Tunnel AID - All the tunnel related to the Control Plane
• Tunnel Ranging Filter - Allows to set the tunnel range to filter the tunnel group. The valid range
is 1-100.
The Create Head/Tail Tunnel is to create a new Tunnel. See 3.73 “Create head/tail tunnel”
(p. 310)
The Create Transit Tunnel is to create a new Transit Tunnel.
The Search allows to execute the search based on the entered tunnel range.
TMPLS/MPLS-TP OAM
The TMPLS/MPLS-TP OAM supports the following OAM functions
• Delay Measurement Tool – Allows to retrieve active DM session. See 3.66 “TMPLS/MPLS-TP
DM management ” (p. 296).
• MPLS-TP Loopback Tool – Allows to retrieve active Loopback session See 3.67 “TMPLS
Loopback tool management” (p. 298).
PseudoWire
The PseudoWire Management window displays the following as shown in Figure 8, “PseudoWire”
(p. 48).
Figure 8 PseudoWire
The PseudoWire tab displays the Filter by panel that provides the following parameter:
• Pseudowire Resource Filter - Select the Pseudowire Resource from the combo-box.
The supported values are:
− PW ID
− PW AID - Allows to enter the Pseudowire Access Identifier in the entry field.
• PW Ranging Filter - Provides the From and To Pseudowire filter range, in the supported range
of 1 to 100.
The Create Head/Tail Pseudowire allows to create a new Pseudowire.
The Create Transit Pseudowire allows to create a new Transit Pseudowire.
2.11.3 Connection
Connection- Allows to manage (provisioning, service type) the client/line traffic
Menus Description
TDM Search Allows to set the SDH service
Ethernet Sevice XC Allows cross-connection for Ethernet services.
EVPL A point-to-point connectivity service.
EVPLAN A point-to-multipoint connectivity service.
For ETSI region, the Search tab displays the Search Cross-Connections panel that contains the
following:
• Search Type - Allows to select XConnection or Protection legs:
The options are:
− Using Specific VC Type Commands (RTRV-CRS-[LO]VCn and RTRV-CRSPROT-
[LO]VCn for a searching identified by the VCn specific type declared in the next VC Type
combo-box.
− VC Type - The combo-box allows to select one of the items VC4, in order to chose the
hierarchical level of the signal.
• Retrieve Command - Specifies the TL1 Command used for the searching procedure set in the
Search Type field.
• VC Access Identifier - The entry box allows to select one of the available VCn. For the
information relevant to the procedure.
• Circuit Identifier - For search using circuit identifier (CKTID).
SelectSearch hyperlink to start the search operation to filter the results.
For ETSI region, the Create Cross Connection panel displays the following:
• Cross Connection Type - Specifies the type of cross-connection to be created.
The values are:
− Connection
− Connection Path Protected
• VC Type - The combo-box allows to select one of the items VC4, VC44C, VC416C, VC464C ,
LOVC12 or LOVC3 in order to chose the hierarchical level of the signal.
• Direction - Specifies the source and destination points to establish a cross-connect. The values
are Starting Fromping Starting Fromped and Ending To according to the selected type of
cross-connection..
Click Continue link to specify a VC of a type VC4.
Ethernet Services XC
EVPL
The EVPL displays the following as shown in Figure 11, “EVPL service” (p. 53).
EVPLAN
The EVPLAN service contains the following as shown in Figure 12, “EVPLAN service” (p. 53).
2.11.4 Data
Data - menu allows the operator to set the service for Data traffic:
Menus Description
Traffic descriptor Allows to set the operation mode
VLAN Profile Allows to set the virtual LAN mode
Color Profile Allows to set the signal color policing
Group Segregation Management Allows to set the segregation state
FDB Operations To be updated
MAC File Collection Allows to administer MAC file collection
MAC Aging Time Management Allows to administer MAC Time Management
MAC Table Configuration Allows to administer MAC Table configuration
Queue Management Allows to manage the data queue.
OAM Management Allows operation and maintenance management
Global Settings Allows to manage global settings
Menus Description
OAM Resource Config. Allows to create and maintenance management.
MD Allows to create maintenance domain
MA Allows to configure the maintenance association
MA MEP List Allows to search for a list of MEP's
MEP Allows to configure a new MEP
MIP Allows to configure a new MIP
Proactive Tool Allows the Delay measurement and Synthetic Loss
Measurement
Delay Measurement Allows to administer delay measurement
Synthetic Loss Measurement Tool Allows to create a Synthetic Loss Measurement
On-Demand tool Allows to manage Delay measurement
Delay Measurement To be updated
Alarm Indication Signal To be updated
EMF Tool Allows to manage EFM
E-LAN Service Management To be updated
E-LAN Service To be updated
Static Filtering DB To be updated
Traffic Control To be updated
Storm Control Profile To be updated
Packet Filtering Profile To be updated
CES Management Allows to manage traffic control
Generic TDM Management To be updated
PW Management To be updated
EVC Loopback Management Allows to supports to inhibit traffic forwarding among
group of ports.
EVC Instance Management To be updated
EVC Filter Instance Management To be updated
Traffic descriptor
Select Data -> Traffic Descriptor as shown in the Figure 13, “Data - Traffic descriptor” (p. 56).
To remove the existing traffic descriptor from the list, click Delete hyperlink.
To configure a new traffic descriptor, click Create to configure a data traffic descriptor tab.
VLAN profile
VLAN registration is not applicable to MAC Bridge case. Select Data -> VLAN profile as shown in
Figure 14, “VLAN profile with ghost objects” (p. 56).
• User Label - This is the name of the VLAN profile.
• Ethernet type - The value identifies the network provider and has to be 2-bytes long in
hexadecimal notation; the third non-included byte is forced by default to "0x".
Validating the check box Show ghost object the column State is shown where the status of the
VLAN is displayed as shown in Figure 14, “VLAN profile with ghost objects” (p. 56).
The Delete hyperlink is to select one or more VLAN profile to delete from the list.
The Create hyperlink to select one or more VLAN profiles to start the creation process.
See3.84 “Create VLAN” (p. 379).
Color profile
The prioritization of an Ethernet data flow can be indicated on the three user-priority bits (802.1p) of
the "Tagged-Ethernet" frame and also on the 3 "provider-priority" bits of the "Stacked-Vlan" frame.
Eight levels of User-priority can be defined: pri0 ... to pri7, where pri0 is the minimum and pri7 the
maximum. The relayed traffic towards a generic "Provider Network" can be "prioritized" using the
"Default" or "Regenerated" UserPriority" settings.
Sixty four levels of DSCP can be defined: DSCP0 ... to DSCP63, where DSCP0 is the minimum
and DSCP63 is the maximum.
Policing is a mechanism to check the data flow is respecting the traffic contract, providing to "cut" or
to forward the incoming traffic.
• "Disabled" means that no policing is carried out
• "Color-Blind" means that the policing is based upon the Traffic Descriptor (TD), without taking
into account the Priority and CoS
• "Color-Aware", means that the policing takes into account the Traffic Descriptor (TD), the
UserPriority and the CoS, by means of a defined "Color Profile"
According to the traffic contract, to the policing mode, and to the available bandwidth, the priority of
a data flow into the Provider-network is assigned by the traffic scheduler of the system.
In case the policing is in "Color-aware" mode, the Provider-prioritization granularity is made deeper,
taking into account the single VLAN-priorities, that can have assigned to any of them a green or
yellow or red color.
The Table 5, “Traffic Descriptor, Policing Mode and Color Profile for INFLOW resource:” (p. 57) and
Table 6, “Prioritization for OUTFLOW resource with "Stacked-VLAN management” (p. 58) contain
the relationships among Stacked-VLAN, Traffic Descriptor, Policing Mode and Color Profile.
ETS InFlow:
Table 5 Traffic Descriptor, Policing Mode and Color Profile for INFLOW resource:
Table 5 Traffic Descriptor, Policing Mode and Color Profile for INFLOW resource: (continued)
ETHOutFlow
Stacked VLAN
Management Priority Mode VLAN Provider-Prioritization
Unbound - no provider-prioritization
Bound Color-blind the frames are passed without any information
about Provider's colors
Color-aware green packets are assigned to the priority as
defined into the "Stack Priority" field
yellow packets are assigned to the priority as
defined into the "Stack Priority Yellow" field
Select Data -> Color Profile as shown in Figure 15, “Color profile” (p. 59)
The Port Segregation Group tab displays the Port Segregation Group Management panel that
contains the following parameters:
• Group Status - Activates the Segregation capability of the node. The default value is Destroy
that deactivates the Segregation capability of the node
• Send - Allows to forward the command in order to activate Create or deactivate Destroy the
Segregation capability of the node.
Queue management
The Queue Management tab displays the following as shown in Figure 17, “Queue profile
management” (p. 59).
OAM management
The option is used by the operations, administration, and maintenance personnel. It consists of the
following sub-menu options:
• Global Setting
• OAM Resource Configuration
• Proactive Tool
• On-Demand Tool
• Alarm Indication Signal
Global setting
Global Setting contains the following information as shown in Figure 18, “Global setting” (p. 61).
The NE Global Setting tab displays the OAM Global Configuration panel that contains the
following parameters:
• LBM Tx Interval [100 ms]
• LBM Time Out [sec]
Click Save to save all the settings.
The OAM Resource Configuration menu contains the following sub-menu options:
• MD
• MA
• MA MEP List
• MEP
• MIP
MD
The Maintenance Domain menu option contains the following as shown in Figure 19, “OAM
resource configuration - MD” (p. 62).
MD
The Maintenance Domain menu option contains the following as shown in Figure 20, “OAM
resource configuration - MD” (p. 62).
Select Delete, and Create links to create, or delete the parameter values.
Maintenance association
The Maintenance Association contains the following as shown in Figure 21, “OAM resource
configuration - Maintenance association” (p. 62).
The Maintenance Association tab displays the Range panel that consists the following
parameters:
• Search Filter
• MD From and To range
• MA From and To range
Select Search to perform the search. See to procedure.
Select Create to create a new Maintenance Association.
The MA MEP List tab displays the Range panel that contains the following parameters:
MEP
The MEP contains the following as shown in Figure 23, “MEP” (p. 64).
Figure 23 MEP
The MEP tab displays the Range panel that contains the following parameters:
• Search Filter
• MD From and To range
• MA From and To range
• MEP From and To range
Select Search to start the search, See to Search MEP procedure
MIP
When MA is created, MIP is created by default.
The MIP tab displays the Range panel that contains the following parameters:
Parameter Description
Port identifier Specifies the port identifier.
MD Level A small integer in a field in an OAMPDU that is
used, along with the VID in the VLAN tag, to
identify to which Maintenance Domain among
those associated with the OAMPDU frame’s
VID, and thus to which MA, a OAMPDU
belongs to.
Direction The MEP should have a field to indicate the
direction of the MIP.The values are up and
down.
Figure 24 MIP
Proactive Tool
Delay Measurement
The Delay Measurement contains the following as shown in Figure 25, “Proactive delay
measurement” (p. 66).
The Delay Measurement tab displays the Range panel that contains the following parameters:
• Search Filter
• MD-ETH-PRO-DM
• MEP-ETH-PRO-DM
Select Search to start the search.
Select Create to create a new synthetic loss measurement, See to Create Synthetic Loss
Measurement procedure. See3.23 “Administer Proactive Tool Delay Measurement” (p. 145).
The Synthetic Loss Measurement tab displays the Range panel that contains the following
parameters:
• Search Filter
• MD-ETH-PRO-SLM
• MEP-ETH-PRO-SLM
Select Search to start the search.
Select Create to create a new synthetic loss measurement, See to Create Synthetic Loss
Measurement procedure. See3.24 “Create Synthetic Loss Measurement” (p. 147).
On-Demand Tool
Select Data -> OAM Management -> On-Demand -> Delay Measurement, the Delay
Measurement screen is displayed as shown in Figure 27, “On-Demand Delay Measurement”
(p. 68).
EFM tool
Select Data -> EFM tool option from the menu bar.
The EFM tool tab displays the Search Local Port panel.
The E-LAN Service tab displays a table existing E-LAN service entries.
The Create link is used to configure a new E-LAN service.
Static Filtering DB
Select Data -> E-LAN Service Mgnt -> DB Filtering ->Static Filtering DB option as shown in
Figure 30, “Static filtering DB” (p. 69).
The E-LAN Serivce tab displays the Static Filtering panel that contains the following:
• Filter On - Allows to select the module for purpose of static filtering
• E-LAN Range Specification - Specifies the E-LAN range. The valid range is 1 to 100
Traffic control
Select Data -> Traffic control->Storm Control Profile as shown in Figure 31, “Storm control
profile” (p. 69).
CES management
Select Data -> CES Management->Generic TDM Parameters as shown in Figure 33, “TDM
Parameters” (p. 71).
Select Data -> EVC Loopback Management -> EVC Filter Instance Management as shown in
Figure 35, “EVC Filter Instance Management” (p. 72).
2.11.5 Protection
Protection - Allows the operator to manage the available protection systems.
Menus Description
1:1 Tunnel Protection A protection connection dedicated to each networking
connection.
MPLS-TP Ring Protection A protected ring connection to each networking
connection
2.11.6 Alarms
Alarms - Allows the operator to manage entities yield alarms when they malfunction. This section
deals with the configuration of ASAPs (Alarm Severity Assignment Profile).An ASAP is a list of
Alarm probable causes to which Severities Profiles are assigned, predefined or settable by the
operator.
Menus Description
CES TCA Profile Mng Allows to configure and display of the active threshold
crossing alarm profile of CES (TCA = Threshold Crossing
Alarm).
ETH TCA Profile Mng Allows to configure and display of the active threshold
crossing alarm profile of ETH.
TDM TCA Profile Mng Allows to configure and display of the active threshold
crossing alarm profile of TDM.
TDM ASAP Mng Allows to configure and display the TDM ASAP (Alarm
Severity Assignment Profile).
Data ASAP M Allows to configure and display the data ASAP.
PDH Alarm Global Mng Allows to configure and display the PDH alarm.
ALM Resynch Allows to update the alarm database to the current alarm
situation.
Condition Log Allows to collect the alarm history report from the NE.
Housekeeping The detection the external environmental issue via
external control input point
Input Points Defines input control point
Output Points Defines output control point
2.11.7 Communication
Communication - Allows the operator to configure and set the external communication for NE
management interfaces.
Menus Description
NE Gen. Config Allows to specify the Site Header information.
NE DIscovery To be updated
In Fiber In Band Management To be updated
DCN Phys. If Allows to specify the supported Layer 3 (network layer) of
the OSI Data Communication Network (DCN).
IP address Allows the operator to enter (add) a new static IP address
the IP routing table, by CP.
LAN management Allows to modify the various network interface
parameters associated with the customer LAN.
Auto Dcn To be updated
NE AutoDiscovery The NE implements the NE Autodiscovery mechanism for
automatic discovering by Network management system
of the NE presence in the network.
OSPF Specifies the Open Shortest Possible Path.
OSPF Area A mechanism that specifies the backbone area of the NE.
OSPF IF Parameter indicates if the authentication is activated (Y)
or un-activated (N) on the OSPF area.
Menus Description
Network Domain Allows the operator to enter (add) a new static IP route in
the IP routing table, to instruct the NE to provide routing
database information that is supported by network layer
of the OSI DCN, to retrieve a list of all immediate OSC
neighbors to the local network element and retrieve the
parameters of a configured OSIAREA that the NE is part
of.
IP Route Allows the operator to enter (add) a new static IP route in
the IP routing table, by CP
NSAP Report This instructs the NE to provide routing database
information that is supported by Layer 3 (network layer) of
the OSI Data Communication Network (DCN).
OSI Mng Retrieves the parameters of a configured OSIAREA that
the NE is part of.
OSI NE Area Allows to configure OSI Network Element area
OSI OS Address Allows to configure OSI OS address
OSI ULC Report Allows to modify OSI upper layers stack parameters that
are common to all the stack interfaces of the NE
NE Gen. Config
The NE Gen. Config menu option has only one sub-menu option:
• NE Discovery
NE discovery
This is used to retrieve the system's output response (site) header. Normally, the output response
header consists of the site identifier (SID) and the current date and time.
Select Communication -> NE Gen. Config -> NE Discovery option as shown in Figure 36, “NE
discovery - Site Header 1” (p. 77).
• The SITE HEADER tab displays the SITE HEADER panel that contains the following
parameters:
• PC - Determines the PC flag that assists in discovery of TIDs of remote NEs connected to a
Gateway NE via OSI over DCC. Selecting PC also provides the NE type and software release
number. This parameter also indicates the PC flag for 1301 autodiscovery version of this
command.
• TID - The Target Identifier of the target network element for this command. 40 hexadecimal
character NSAP address may be used to address an NE with unknown TID.
Click SEARCH hyperlink a second SITE HEADER panel shows the following information:
• Site ID - The site identifier
• Date - This shows the current date in the <year> -<month>-<day> format
• Time - This shows the current time in the <hour>-<minute>-<second> format
• NE Type - Specifies the Product group and Product name
• NE software release number - Specifies the software release number in the defined format. For
Example, R30.20.25.
The In Fiber In Band Management tab displays the In Fiber In Band Management Search panel
that contians the following:
• List Boards - The combo-box contains the list of boards that can be selected to perform the
search.
• Only Activate - A check-box that can be enabled/disabled based on the filter criteria. Enable the
check box to search for the borads that are currently active.
Click Search link to filter the boards that are active or inactive as shown in .
• LAN manag. - Allows to modify the various network interface parameters associated with the
customer LAN.
IP address
Allows to modify the various network interface parameters associated with the in band management
IP. Select Communication -> DCN Phys. If -> IP Address option as shown in Figure 39, “DCN
physical interface IP address” (p. 78).
The NE Generic Configuration tab displays the IP Address Management panel that contains the
following parameters:
• MAC ADDRESS (Medium Access Control address) - This is the MAC address assigned to the
card. Note that this parameter can only be read and cannot be modified.
• IP Address (Internet Protocol address) - This is the IP address of the NE. The entry box allows
to digit the IP address of the NE (value range [1-99, 101-126,128-223] - [0- 255] - [0-255] -
[0-254]).
• Subnet Mask - This is the entry box for subnet mask of the network the NE is connected to
(value range [128-255] - [0-255] - [0-255] - [0-255]). The mask, in binary representation, must
contain a contiguous string of 1s (the network portion) and a contiguous string of 0s (the host
portion).
The Save hyperlink saves the configuration, closes the page and returns to the previous page.
LAN Management
Allows to modify the various customer LAN management parameters.
Select Communication -> DCN Phys. If -> LAN Mang option as shown in Figure 40, “LAN
Management” (p. 80)
The Customer LAN Management tab displays the Customer LAN Management panel that
contains the following parameters:
• OSI Protocol - Determines if the OSI Protocol runs on the customer LAN or not. The values are:
− N (OSI Protocol is disabled on the Customer LAN)
− Y (OSI Protocol is enabled on the Customer LAN)
• Internet Protocol - Determines if the Internet Protocol runs on the customer LAN. The values
are:
− N (Internet Protocol is disabled on the Customer LAN)
− Y (Internet Protocol is enabled on the Customer LAN)
• OSI Area - Specifies which OSI Area the Customer LAN belongs to (“1”, if OSI was disabled
previously, previously existing value, otherwise).
• Integrated ISIS - Determines if the Integrated IS-IS Protocol runs on the customer LAN or not.
The values are:
− N (Integrated IS-IS Protocol is disabled on the customer LAN)
− Y (Integrated IS-IS Protocol is enabled on the customer LAN)
• Proxy Address Resolution Protocol - The values are:
− Y- Proxy Address Resolution Protocol is enabled on the customer LAN
− N - Proxy Address Resolution Protocol is disabled on the customer LAN
• Channel used by- The values are:
− MNGPLANE
− NONE
• IP address of NE - The IP address of the Network Element
• Subnet Mask - The subnet mask of the Network Element
• Gateway address- The gateway address of the Network Element
• MAC address - The Media Access Control address of the Network Element
• Negotiation mode with link partner - The values are AUTO, DISABLED, and RESTART
• Port speed selection - The port speed on the Network Element
• Port duplex mode selection - The port duplex mode selection of the Network Element
• OSPF - Specifies the Open Shortest Possible Path. The values are Y or N
The Save hyperlink closes the page and returns to the previous page.
NE autodiscovery
The NE Auto Discovery displays the following as shown in Figure 41, “NE autodiscovery” (p. 80).
Figure 41 NE autodiscovery
The NE Auto Discovery tab displays the Autodiscovery panel that contains the following
parameters:
• ENABLED - To enable or disable the NE Autodiscovery, use the following supported values:
− Y - NE Auto Discovery mechanism is enabled.
− N - NE Auto Discovery mechanism is disabled.
• STATE - Displays the current status of the autodiscovery protocol.
The supported values are:
− IDLE- Autodiscovery not enabled.
− Ongoing- Autodiscovery enabled, however no response received from the Network
Management System.
− Suceeded- Autodiscovery has succeeded and an acknowledgement is received from the
Network Management System.
− Failed- The Autodiscovery failed as received from the Network Management System.
The Save link is used to save the settings and return to the previous page.
OSPF area
Select Communication -> OSPF Area menu option as shown in Figure 42, “OSPF Area” (p. 82).
Network domain
IP route
This option allows the operator to enter (add) a new static IP route in the IP routing table, by CP. If
the AID specifies a STMn then the NEXTHOP parameter should not be specified. If the AID
specifies the LAN, then the NEXTHOP parameter must be specified.
Select Communication -> Network Domain -> IP Route option as shown in Figure 43, “IP route
configuration” (p. 82).
NSAP report
This option instructs the NE to provide routing database information that is supported by Layer 3
(network layer) of the OSI Data CommunicatOSIion Network (DCN).
Select Communication -> Network Domain -> NSAP report option as shown in Figure 44,
“Network service access point panel” (p. 82).
The NETWORK SERVICES ACCESS POINT panel that contains the following parameters:
• Lookup Type - Specifies the type of lookup function that will be performed to retrieve
neighboring NEs.
The values are:
− DRCT- Retrieves the NSAPs and the TIDs of all the directly reachable (1 hop away) Level 1
and Level 2 Intermediate Systems (ISs), to which an adjacency is formed
− L1ROU - Retrieves the NSAPs of all the reachable Level 1 ISs within all the areas, including
NEs
− L1ROUTID - Retrieves the NSAPs and the TIDs of all the reachable Level 1 ISs within all the
areas, including NEs
− L2ROU - Retrieves the area addresses of all the reachable Level 2 ISs, including NEs
The Search hyperlink allows to start the NSAP search procedure.
OSI management
This option retrieves the parameters of a configured OSIAREA that the NE is part of. It contains the
following two sub-menu options:
• OSI NE Area
• OSI OS Address
• OSI Tunnel
OSI NE area
Select Communication -> Network Domain -> OSI Mng -> OSI NE Area option as shown in
Figure 45, “OSI NE area” (p. 83).
The OSI tab displays the OSI AREA panel that contains the following parameters:
• OSI AREA. - To determine an access Identifier for an OSI area
• Level 3 Initial Domain Part - Assigns the initial domain part of the manual area address (8
hexadecimal characters)
• Level 3 Domain Format Identifier - Assigns the domain format identifier field of the manual
area address (2 hexadecimal characters)
• Level 3 Organization - Assigns the organization field of the manual area address (8
hexadecimal characters)
• Level 3 Reserved - Assigns the reserved field of the manual area address (4 hexadecimal
characters)
• Level 3 Routing - Assigns the routing domain and routing area within the routing domain of the
manual area address (8 hexadecimal characters)
• Level 3 System Identifier - This is the system identifier assigned to the card (12 hexadecimal
characters)
The Save hyperlink closes the page and return back to the previous page.
OSI OS address
The OSI OS Address displays the following as shown in Figure 46, “OSI OS address” (p. 84).
The Overhead Channel Cross Connection tab displays the OS Address panel that contains the
following parameters:
• Operating System - Specifies the operating system for the open system interconnection
management. The values are: OSI and IP
• Main Address - Specifies the main address for the OSI management
• Spare Address - Specifies the spare address for the OSI management
The Save option is used to save the settings and return to the previous page.
2.11.8 Sychronization
Sychronization - Allows the operator to manage the ports dedicated to BITS (Building Integrated
Timing Supply) facilities for clock distribution purposes. A BITS output reference is a DS1 signal.
Menus Description
Sync Ethernet Allows the page to retrieve and edit synchronization
resources related to a given shelf
Clock Management To be updated
Outgoing SSM Management To be updated
1588 Allows the page to release switching outgoing
synchronization resources related to a given shelf.
PTP Clock Mode To be updated
PTP Default Clock Cfg To be updated
PTP Clocks To be updated
PTP Ports To be updated
External Interfaces To be updated
Menus Description
Initialize and Upgrade To be updated
Initialize System To be updated
With New Release For a general upgrading of the software.
With Old Release For a software refresh
In Service Upgrade Allows to manage the in-service upgrading
Upgrade Status For retrieving the status of the ongoing upgrade
procedure
Software Information Displays the current Network Element Software
information
Start Upgrade For preparing the system for activation of the new
release.
Stop Upgrade For altering the in-service upgrade procedure and reverts
the system to the state before the Start Upgrade option
was issued.
Remove Old Upgrade For making the current release software as permanent
active software.
DataBase Allows Database management
Menus Description
Perform DB Backup Backs up the primary backup data base to the secondary
backup data base
Cancel DB Backup Cancels (aborts) a database backup currently in progress
Restore DB Copies the backup database stored on secondary backup
database to the primary backup database and resets the
system to activate the new database.
DB Information Reads the database label of the selected backup
database stored on the NE.
Remote File For Data Base Remote File Server management
Perform Copy Copies secondary backup database on the NE from/to
specified locations on a Remote File Server (RFS).
Cancel Copy Copies secondary backup database on the NE from/to
specified locations on a Remote File Server (RFS).
File Information Copies secondary backup database on the NE from/to
specified locations on a Remote File Server (RFS).
Network Element For retrieving general system level configuration
information consisting of: system type, software release
identifier, software release date, matrix size, system
restart status
Set Site Identifier For setting the Site Identifier (SID) code that is compared
to any Target Identifier (TID) value entered in a text field
Lac Specifies that only a manager at time can manage NE
with provisioning rights.
State To be updated
Default To be updated
Manager List Identifies the registration of TMN Upper Manager,
controlling NE
PM Global File Specifies the performance monitoring global file status
Network Time Protocol To be updated
Differential time frequency To be updated
Power Source Management To be updated
2.11.10 Security
Security - Contains menu item and submenu for all users and for administrator users.
Menus Description
User Account To be updated
Change Password Activates the "Change Password" page
Information Activates the "Account Information" page
Administration Specifies the administration of the users
Accounts To be updated
Create an Account To create a new user account
Change an Account To change an existing account
Global Settings Displays the default settings
Default Settings Displays the default settings
Current Sessions Displays the summary of the current sessions
Commands Privileges Displays the list of TL1 commands
MAC/IP Access Control List To be updated
IP ACL on CPU Port To be updated
Menus Description
SSH/SSL Managementt To be updated
SSH NE Key Management To be updated
Import SSH Public Key To be updated
SSL NE Key Management To be updated
SSL Cert Signing Request (CSR) To be updated
Import SSL Certificate To be updated
SSL Certificate Installation To be updated
Copy Security Remote File To be updated
Management RADIUS To be updated
Configure RADIUS To be updated
Configure Authority To be updated
PNAC Management To be updated
Enable PNAC To be updated
PNAC per port To be updated
Authentication Server Configuration To be updated
Authentication Type To be updated
Authentication Configuration To be updated
Network Element Logs Displays the Audit Log attributes
Log settings Displays the Log Attributes panel to modify the Log
attributes.
IP Message settings Displays the IP Message settings.
Logout Allows to exit the session
2.11.11 Tools
Tools - It opens a Telnet console for TL1 commands
Menus Description
TL1 Console Opens the Telnet console
NE TL1 Param Displays the NE TL1 Parameters
2.11.12 Help
Help - Allows the operator to obtain information about the application.
Menus Description
About To be updated
NE TL1 Syntax To be updated
3.1 Overview
3.1.1 Purpose
Provides an overview of the detailed level procedures documented in this chapter.
3.1.2 Contents
3.1 Overview 93
Provisioning via ZIC 97
3.2 Accessing ZIC 97
3.3 Log into the system 100
3.4 Log out of the system 101
3.5 Change user password 103
3.6 Change site identifier 104
3.7 Create user account 105
3.8 Change user account 107
3.9 Initialize and Upgrade with a new release 114
3.10 Administer In-Service upgrade 118
3.11 Database Management 119
3.12 Create a MAC/IP ACL 124
3.13 Create an access control element (ACE) 126
3.14 Create IPv4 Access Control Element (ACE) 130
3.15 Create IPv6 Access Control Element (ACE) 134
3.16 Configure Management RADIUS 137
3.17 Configure management radius authority 138
3.18 DB management remote file copy 139
3.19 Administer MAC File Collection 140
3.20 Administer Network Element 141
3.21 Administer LAC Management 142
3.22 Retrieve the Manager List 144
1
Double-click on the browser icon (e.g., Internet Explorer) on the desktop.
2
The browser opens its main page as shown in Figure 47, “Blank browser (example)” (p. 97).
3
Enter the IP address of the shelf in the Address field (in the example 151.98.152.196) and
press the "Enter" key and the "Authentication dialog box" as shown in Figure 48,
“Authentication dialog box” (p. 97).
4
In the Authentication Dialog box, enter your Login and Password.
5
Click the Login button or Enter key and a warning message. The ZIC application launches as
shown in Figure 50, “ZIC browser start (example)” (p. 100) loading the NE information.
Starting from left to right, the Page header presents the company logo, the equipment
description, the user ID and the Logout hyperlink which allows to close the session.
END OF STEPS
3.3.3 General
1
To login to the ZIC application, open the web browser (For example, Internet Explorer), enter
the IP address of the Network Element (NE) in the address bar as shown in Figure 51, “Login
window” (p. 101).
2
Enter the User Identifier and Password in the respective entry boxes, set the Language from
the drop-down list box. The default is English.
3
Enable the Local Time check box for the network element to display the local time.
4
Click Login command button to log into the system, the browser starts loading the ZIC
application.
5
After the maximum number of attempts the user is disabled. Check parameters for spelling and
case-sensitive characters. Go to Step 2 to re-login to the system.
END OF STEPS
3.4.2 General
1
To logout from the ZIC application, click the Logout hyperlink displayed in the top right corner of
the ZIC application as shown in Figure 52, “ZIC application window ” (p. 101) .
2
The Logout hyperlink displays the logout panel as shown in Figure 53, “Logout panel” (p. 102) .
3
Enter the user identifier in the entry box or click Default hyperlink if login as default user.
4
Click Yes to finally logout of the ZIC application.
END OF STEPS
3.5.3 General
1
To change the user password, Select Security -> User Account -> Change Password option
from the menu bar.
2
The Change password menu option displays the Modify Password Identifier panel.
3
The User Identifier and Old Password ID entry boxes displays the UID and PID with which
the user has logged in.
4
Enter the new password in the New Password ID entry box. Enter the exactly same password
in the Confirm New Password ID entry box.
Note: The string entered in the New Password ID and Confirm New Password ID entry
boxes should be identical.
5
Click Save to set the newly entered password.
6
The system generates an error message if the newly entered password is violating the
password naming convention. Go to Step 4 to re-enter the correct string.
END OF STEPS
3.6.2 Overview
The site identifier appears on the top left corner of the tree-area and is used as a target while
addressing the Network Element (NE). To retrieve and change the site identifier through TL1, refer
to the 1850 Transport Service Switch (TSS-5C) TL1 User Provisioning Guide.
1
To set the site identifier, select System Management -> DB Management -> Set Site
Identifier option from the menu bar. The ZIC application displays the Set Site Identifier panel
as shown in Figure 54, “Set Site Identifier” (p. 103) .
2
The Set Site Identifier panel displays the following parameters:
• Old Site Identifier-Specifies the old site identifier of the NE
• New Site Identifier-Specifies the new site identifier for the NE
3
Click Double Quotes hyperlink to insert double quotes for the new site identifier.
4
Click Save to save the newly created identifier.
END OF STEPS
1
To create a user account, select Security -> Administration -> Accounts ->Create Account
to display the User Account screen as shown in Figure 55, “Create user account” (p. 104).
2
Specify the User Account parameters as described in Table 8, “Create user account
parameters” (p. 105)
Parameter Description
User Identifier Specifies the User name.
Password Identifier Specifies the Password Identifier.
Confirm Password Identifier Confirms the Password Identifier
Password Duration [day] Specifies the duration of applicability of the
password in days. The supported value range is
0 to 999. The default value is 30 days.
Warning on Password Duration [day] Provides the duration for the applicability of the
password in days. The supported value range is
0 to 999. The default value is 7.
Access after Password Duration Specifies the duration after password duration is
complete. The supported value range is 0 to 999.
The default value is 3.
Password Obsolescence Interval [day] Specifies the Password obsolescence interval in
seconds. The supported value range is 0 to 999.
The default value is 3 days.
User Id Duration [day] Specifies the applicability Duration for the User Id
in days. The supported value range is 0 to 999.
The default value is 60 days.
SNMPv3 Privacy Protocol Specifies security for private messages.
The supported values are:
• NOPRIV
• CBCDES
• AES
SNMPv3 Authorization Protocol Specifies security for authentication messages
The supported values are:
• NOAUTH
• HMACMD5
Parameter Description
Available User Access Privileges Provides the available user access privileges.
The supported values are:
• Configure (CONF)
• Network Administrator (NETADMIN)
• Provision (PROV)
• Read-Only (READ)
• Security Administrator (SEC)
• Test (DEBUG)
• No inactivity timeout (NOTMOUT)
User Access Privileges Specifies the assigned User access privileges.
The default value is Read-Only (READ).
3
Click Default to select the default value against each field where the default option is permitted.
4
Click the Disable link for the field to reset the value to 0.
5
While assigning User privileges, click to select the user privilege in the Available User Access
Privileges field and click to assign the user access privilege to the defined user. To remove
the permissions for a user, select the mapped User Access Privilege and click
6
Click Default to select the default user access privilege.
7
Click Save to save the user privileges.
END OF STEPS
1
To change a user account, select Security -> Administration -> Accounts->Change Account
to display the User Account screen as shown in Figure 56, “Change user account” (p. 107).
2
For details on the user account parameters, please refer Table 8, “Create user account
parameters” (p. 106)
END OF STEPS
1
Navigate to the change user account screen and click Modify Account. The Modify User
Account screen is displayed as shown in Figure 57, “Modify user account” (p. 109).
2
Modify the parameters as described in Table 9, “Modify user account parameters” (p. 109)
Parameter Description
User Identifier Specifies the User name.
New User Identifier Specifies the new user name.
New Password Identifier Specifies the new password identifier.
Confirm Password Identifier Confirms the password identifier
Password Duration [day] Specifies the duration of applicability of the
password in days. The supported value range is 0 to
999. The default value is 0.
Parameter Description
Warning on Password Duration [day] Provides the duration for the applicability of the
password in days. The supported value range is 0 to
999. The default value is 0.
Access after Password Duration Specifies the duration after password duration is
complete. The supported value range is 0 to 999.
The default value is 0.
Password Obsolescence Interval Specifies the Password obsolescence interval in
[day] seconds. The supported value range is 0 to 999. The
default value is 0.
User Id Duration [day] Specifies the applicability Duration for the User Id in
days. The supported value range is 0 to 999. The
default value is 60 days.
SNMPv3 Privacy Protocol Specifies security for private messages.
The supported values are:
• NOPRIV
• CBCDES
• AES
SNMPv3 Authorization Protocol Specifies security for authentication messages
The supported values are:
• NOAUTH
• HMACMD5
Password Expiration date and time Specifies the date and time of password expiry.
Last Login Time Stamp Indicates the time stamp for the last login.
Note:Non-editable field.
User State Indicates whether the state of the User is Active or
Inactive.
Note:Non-editable field.
Login Fail Number Specifies the number of failed login attempts.
Note:Non-editable field.
Keep Alive Message Interval [min] Indicates the duration in minutes for the message
interval.
Note:Non-editable field.
Minimum Interval between invalid Indicates the interval span between invalid attempts.
attempts [sec] Note:Non-editable field.
Parameter Description
Maximum Invalid Attempts Indicates the number of invalid attempts.
Note:Non-editable field.
User Session Inactivity Timeout Indicates the user activity timeout duration.
[min] Note:Non-editable field.
Available User Access Privileges Provides the available user access privileges.
The supported values are:
• Configure (CONF)
• Network Administrator (NETADMIN)
• Provision (PROV)
• Read-Only (READ)
• Security Administrator (SEC)
• Test (DEBUG)
• No inactivity timeout (NOTMOUT)
User Access Privileges Specifies the assigned User access privileges. The
default value is Read-Only (READ).
3
While modifying User privileges, click to select the user privilege in the Available User Access
Privileges field and click to assign the user access privilege to the defined user. To remove
the permissions for a user, select the mapped User Access Privilege and click
4
Click Save to save the modifications.
5
Click Inhibit to restrain the current User account settings, confirm by clicking Yes in the dialog
displayed as shown in Figure 58, “Inhibit user permissions” (p. 112)
6
Click Allow to proceed with the assigned User permissions and click Yes in the dialog
displayed as shown in Figure 59, “Allow User permissions” (p. 112)
7
Click Cancel to cancel the modifications and return to the previous screen.
8
Click Delete to undo the changes and remove the user account. The account can also be
deleted via the User Information settings screen.
END OF STEPS
1
To create a user account, select Security -> Administration -> Accounts->Global Settings to
display the Account Default Settings screen as shown in Figure 60, “Modify Account Default
Settings” (p. 112).
2
Click with each field to modify the account default settings. Click the Default link provided for
the field to revert to the system defined default value.
3
Click Save to save the updates to the account default settings.
END OF STEPS
Note: Migration of all Hardware and Software is supported with a traffic hit of 5 minutes with
an objective of 2 minutes.
In case of configuration using FX interface at slot 4, around 90 seconds of traffic hit occurs
during warm reboot.
In case of configuration using LAG, around 1 second of traffic hit occurs during warm reboot.
In case configuration using R2O2E (Microwave card), 3 to 7 minutes of traffic hit occurs during
warm reboot and in other configurations hitless warm restart occurs within 50 milli seconds.
3.9.2 Steps
1
Select System Management -> Initialize and Upgrade -> Initialize System -> With New
Release as shown in Figure 61, “Initialize and Upgrade with a new release” (p. 113).
2
The Initialize System tab displays the Initialize System panel that shows the Apply hyperlink
that is used to start the new release downloading procedure.
Note: Note: If the IS-IS is provisioned using the following steps for all NEs, In Band
Management over IS-IS will work well after upgrade:
• Upgrade the Software
• Enable PPPoE on the NNI1 for CPE2 via IBM3. Enable PPPoE on the NNI1 for CPE3
via IBM
Note:When this step is complete all In Band Management traffic will be operationally
down.
• Ensure that the PC is connected to CPE1 out band interface, and the PC gateway is
CPE1 out band IP.
• Enable IS-IS protocol on the out band and NNI1 for CPE1, so that CPE2 can be
managed with the in band IP.
• Enable the IS-IS protocol on the NNI2 for CPE2, so that CPE3 can be managed with
the in band IP
END OF STEPS
1
Select Security -> Administration -> Current Session as shown in Figure 62, “Retrieve the
current sessions” (p. 114).
2
The page displays a table with information about current session.
3
Click Refresh to refresh the page.
END OF STEPS
1
Select Security -> Administration -> Command Privileges as shown in Figure 63,
“Command Privileges” (p. 115).
The page the command security privileges assigned to the specified TL1 command. The
columns of the table are :
• Action - contains the hyperlinks in order to modify the security privilege. The manager
actions related to these hyperlinks are:
− The Modify hyperlink activates the following Modify Command Access Privileges page.
• Command Identifier - Specifies the TL1 command code. The value for the parameter can be
any one of the TL1 command codes, in upper or lower case excluding the following TL1
command codes (that is the commands for factory default):
− ALW-USER-SECU - Allows to reinstate users, so the user can again establish a session
with the system
3
Click Modify to modify the command privileges and click Save to save the modification as
shown in
4
Click Cancel to return to the previous screen without saving.
END OF STEPS
1
Select System Management -> Initialize and Upgrade -> In-Service Upgrade -> Upgrade
Status menu as shown in Figure 65, “In-Service Upgrade Status” (p. 117).
The In-Service Upgrade Status tab displays status of the in-service upgrade. The status are:
• Initialize New Completed (INITNC) - Indicates the INIT-SYS-NEW system initialization
process completed successfully and the system is restarted on the new release
• Initialize New In Progress (INITNIP) - Indicates the INIT-SYS-NEW system initialization
process is in progress
• Initialize Old Completed (INITOC) - Indicates the INIT-SYS-OLD system initialization
process completed successfully and the system is restarted on the previous release
• Initialize Old In Progress (INITOIP) - Indicates the INIT-SYS-OLD system initialization
process is in progress
• No Status In Progress (NOSTAIP) - Indicates that no generic in-service upgrade procedure
is in progress or has been attempted
• Status Completed (STAC) - Indicates that the STA-ISU command completed successfully
and is awaiting the issuance of the INIT-SYS-NEW command
• Status In Progress (STAIP) - Indicates that an in-service upgrade procedure is in progress
• Stop Completed (STPC) - Indicates that the STP-ISU command completed successfully
END OF STEPS
1
Select System Management -> Initialize and Upgrade -> In-Service Upgrade -> Start
Upgrade.
2
The In-Service Upgrade tab displays the Start In-Service Upgrade panel that shows the
status of the in-service upgrade.
3
Click Apply to initiate the In-Service upgrade.
END OF STEPS
1
Select System Management -> Initialize and Upgrade -> In-Service Upgrade -> Stop
Upgrade. The status of the in-service upgrade is displayed.
2
Click Apply to stop the In-Service upgrade.
END OF STEPS
The NE provides mechanisms to transfer a locally stored disk database backup to an RFS and vice
versa.
The NE allows operator to reset its memory and primary backup database to a factory installed
default configuration.
The volatile memory database is maintained by the NE and reflects the NE configuration, its alarm
states and conditions. Two non-volatile disk database types exist for the NE: the primary backup
database and the secondary backup data base.
The primary backup database is maintained implicitly by the NE during its normal operation. At any
time, it reflects the state of the NE's volatile memory database. Updating the primary backup
database occurs online without interrupting the NE's normal service operation.
1
Select System Management -> DB Management -> Data Base -> Perform DB Backup.
2
Click Yes to confirm. The DB backup is completed and the system displays a completion
message as shown in Figure 67, “Perform DB backup complete” (p. 121)
END OF STEPS
1
Select System Management -> DB Management -> Data Base -> Cancel DB Backup as
shown in Figure 68, “Cancel DB Backup” (p. 121).
2
Click Yes to confirm cancellation.
END OF STEPS
3.11.4 Restore DB
The database restoration operation verifies the System Type, software release identifier, the date
and time of the backup creation, and Site ID (SID) of the system against the corresponding data
stored along with the secondary backup database. A database restoration with a System Type
mismatch cannot be performed. A database restoration with a software release identifier or SID
mismatch cannot be performed unless the command mode parameter is set to FRCD. A database
restoration with backup creation date and time different from the most recent backup created on the
system cannot be performed unless the command mode parameter is set to FRCD.
1
Select System Management -> DB Management -> Data Base -> Restore DB as shown in
Figure 69, “Restore DB” (p. 121).
Figure 69 Restore DB
2
Select the Command mode and click Apply to restore the Database configuration.
Parameter Description
Command Mode Assigns the command mode of the action.
The supported values are:
• Forced - The database restoration operation is
performed regardless both the BACKUP-DATE,
BACKUP-TIME indicated for the secondary backup
database is older/prior to the BACKUP-DATE,
BACKUP-TIME on the system (represented in label of
the Active Local Primary Hard disk Database) and the
SID indicated on the STBY DB does not match the
SID of the system.
The software release identifier indicated for the
secondary backup database does not match the
software release identifier indicated for the system.
• Normal - The command is denied if there is a
mismatch between the SID, the software release
identifier, system type or the backup time stamp of the
system and the information stored in the secondary
backup database.
END OF STEPS
3.11.5 DB information
1
Select System Management -> DB Management -> Data Base -> DB Information as shown
in Figure 70, “DB Information” (p. 123).
Figure 70 DB Information
2
The Database tab displays the Database Label panel that contains:
3
Click Default to set the Primary backup database (ACTDSKDB).
4
Click Retrieve to recover the information about the selection made by Access Identifier.
Parameter Description
Access Identifier Identifies the database. The values are: Primary
backup database (ACTDSKDB) or Secondary
backup database (STDBYDB)
System type Identifies the system software for the database at the
specified location or the equipment label.
Release Identification Identifies the release ID of the system after the
database restore command is completed, i.e. the
equipment release.
Site Identifier Indicates the SID of the system as provisioned.
Backup Date For Primary backup database, identifies the date when
the backup was created. For Secondary backup
database, identifies the date when the last backup was
created. The date is in the format of <YYYY>-<MM>-
<DD>
Backup Time For Primary backup database, identifies the date when
the backup was created. For Secondary backup
database, identifies the date when the last backup was
created. The date is in the format of <HH>-<MM>-<SS>
Cyclic Redundancy Check Indicates the 8-digit hexadecimal value of the 32-bit
Cyclic Redundancy Check stored on the backup media
END OF STEPS
1
Select Security -> Administration->MAC/ IP Access Control List from the menu bar as
shown in Figure 71, “MAC Access Control List Management” (p. 124).
2
Click Create to create a MAC /IP Access Control List. The MAC ACL creation screen is
displayed as shown in Figure 72, “Create a MAC Access Control list” (p. 125).
3
Enter the MAC/IP and ACL name in the field provided and Click Save. To Cancel the MAC/IP
ACL creation, Click Cancel.
4
The MAC ACL is created.
END OF STEPS
1
To modify a MAC ACL, Select the ACL to be modified as shown in Figure 73, “Modify a MAC
Access Control List” (p. 125)
2
In the section under MAC/IP Access Control List Management specify the unique name and
Select True under apply change. Click Save. A pop-up dialog box is displayed requesting to
apply the changes to the MAC ACL name. Click Yes to apply the changes.
3
Click Save in the MAC/IP ACL Management screen to save the modifications.
4
To Delete a MAC/IP ACL, Select ACL to be deleted and click Delete.
5
Click Yes in the pop-up to confirm deletion.
END OF STEPS
An ACE cannot be modified when the ACL is associated with a port. An Operator is not allowed/
permitted to configure the order (rank) for an Access Control Element. The order of Access Control
Element in an Access Control List is automatically assigned by NE, it depends on ACE type and
operation order. To create an ACE with classifier destination MAC and action permit:
Select Security -> Administration > MAC/IP Access Control List. The screen is refreshed to
display the MAC Access Control Element Management screen. An ACE can be created for a
created MAC ACL. Click editACE under Apply changes to create the MAC ACE. The screen is
refreshed to display the ACE screen. Click Create to create the MAC ACE. In the order of
execution within the ACL as shown in Figure 74, “Create MAC ACE” (p. 126), enter the Order
number for the ACE and click Send. The screen is refreshed to display the MAC ACL
Management parameters as shown in Figure 77, “MAC ACE with action Deny” (p. 129)
Parameter Description
User Label Is the system generated User Label for the MAC ACE.
Action Indicates the state of the ACE.
The supported values are
• Permit
• Deny
Status Indicates if the ACE is in service.
The supported parameters are:
• active: indicates that the MAC ACE is active.
• notInService: indicates that the MAC ACE is not
active.
The default value isnotInService.
MAC Source Specifies the Valid 48 bit MAC address.
MAC Destination Specifies the Valid 48 bit MAC address.
Ethernet Type Indicates the valid ethertype address.
Ethernet Type Bit Mask Indicates the valid Ethernet Type Bit Mask address.
Ace order Indicates the priority for the ACE.
MAC source MASK Indicates the source mask value of the ACE.
Parameter Description
MAC destination MASK Indicates the destination mask for the ACE.
VID Indicates the VLAN Id of the ACE
VID bitmask Indicates the valid VLAN ID bitmask.
2
Click Save to save the ACE or Click Save&Exit to save the ACE created and exit from the
screen. Click Cancel to return to the previous screen without saving.
END OF STEPS
1
Select Security->Adminsitration->MAC/IP Access Control List from the menu bar. The
Access Control List Management screen is displayed as shown in Figure 78, “Access control
list management” (p. 130)
2
Click on Configure from ACE the Access Control Element Management screen is shown in
Figure 79, “Access Control Element Management ” (p. 131)and then select CreateIPv4
hyperlink to configure a new IPv4 ACE as shown in Figure 80, “Create an IPv4 ACE” (p. 131)
3
Use the following parameters to Create an IPv4 ACE as shown in Table 13, “IPv4 ace
parameters” (p. 132).
Parameters Description
User Label Is the system generated User Label for the MAC
ACE.
Action Indicates the state of the ACE.
The supported values are
• Permit
• Deny
State Indicates if the ACE is in service.
The supported parameters are:
• active: indicates that the MAC ACE is active.
• notInService: indicates that the MAC ACE is not
active.
The default value isnotInService.
IPv4 SA Specifies the source IP address. The default value is
0 for the four hexadecimal octet format.
IPv4 SA Mask Specifies the source IP address mask. The default
value is 1 for the four hexadecimal octet format.
IPv4 DA Specifies the destination IP address. The default
value is 0 for the four hexadecimal octet format.
IPv4 DA Mask Specifies the destination IP address mask. The
default value is 1 for the four hexadecimal octet
format.
Protocol ID Indicates the value of the protocol identifier. The
default value is 256.
The protocol identifier options are:
• ICMP- Internet Control Message Protocol for IPv6
• IP- IP over IP encapsulation
• TCP- Transmission Control Protocol
• UDP- User Datagram Protocol
• IGP- Interior Gateway Protocol
• GRE- Generic Routing Encapsulation
The default value 256 is used to indicate Any
protocol. When the option Any Protocol is set to N,
the operator must insert a possible value into [0-255]
directly.
Note: ICMP is valid only for IPv4 and not ICMPv6.
Parameters Description
TCP Source Port Specifies the source TCP port. The values range
from [0-65537], the default value is 65537 (i.e., Don’t
care).
TCP Max Source Port Specifies the maximum source TCP port. The
possible values range from [0-65535], the default
value is zero.
TCP Destination Port Specifies the destination source TCP port. The
possible values range from [0-65537], the default
value is 65537 (i.e., Don’t care).
TCP Max Destination Port Specifies the maximum destination TCP port. The
possible values range from[0- 65535], the default
value is zero.
UDP Source Port Specifies the source UDP port. The possible values
range from [0-65537], the default value is 65537 (i.e.,
Don’t care).
UDP Max Source Port Specifies the maximum source UDP port. The
possible values range from [0-65535], the default
value is zero.
UDP Destination Port Specifies the destination UDP port. The possible
values range from [0-65537], the default value is
65537 (i.e., Don’t care)
UDP Max Destination Port Specifies the maximum destination UDP port. The
possible values range from [0- 65535], the default
value is zero.
Note: The values related to UDP port are editable
when the protocol type is UDP and TCP. These
values are non-editable for other types and the
default values are displayed.
The values related to the UDP port are editable when the protocol type is UDP or TCP. All other
types are non-editable and will display only the default options.
The use of ANY flag set to Y, allows the user to configure the following options:
• If IPv4 SA/DA is set to all Zeroes, then the attributes can be modified
• If IPv4 SA/DA MASK is set to all Zeroes, then any IPv4 SA/DA address will match.
• If the optional parameter is set to default value Don't care, then the field is locked and can be
opened by changing the flag to N.
The user must set non-null values for IPv4 SA or IPv4 DA. If the values are set to the default
setting of 0, the ACE will be considered invalid.
4
Click Cancel to restore the original settings.
5
Click Save to configure the new IPv4 ace settings.
END OF STEPS
1
Select Security->Adminsitration->MAC/IP Access Control List from the menu bar. The
Access Control List Management screen is displayed as shown in Figure 78, “Access control
list management” (p. 130)
2
Click on Configure from ACE the Access Control Element Management screen is shown in
Figure 82, “Access Control Element Management ” (p. 135) and then selectCreateIPv6
hyperlink to configure a new IPv6 ACE as shown in Figure 83, “Create an IPv6 ACE” (p. 135)
3
Use the following parameters to Create an IPv6 ACE as shown in Table 14, “IPv6 ace” (p. 136)
.
Parameters Description
User Label Is the system generated User Label for the MAC ACE.
Action Indicates the state of the ACE.
The supported values are
• Permit
• Deny
State Indicates if the ACE is in service.
The supported parameters are:
• active: indicates that the MAC ACE is active.
• notInService: indicates that the MAC ACE is not
active.
The default value is notInService.
IPv6 SA Specifies the source IP address. The default value is 0
for the sixteen hexadecimal octet format.
IPv6 SA Mask Specifies the source IPv6 address mask. The default
value is 1s for the four hexadecimal octet format.
IPv6 DA Specifies the destination IP address. The default value
is 1s for the sixteen hexadecimal octet format.
IPv6 DA Mask Specifies the destination IPv6 address mask. The
default value is 1s for the sixteen hexadecimal octet
format.
Protocol ID Indicates the value of the protocol identifier. The default
value is 256.
The protocol identifier options are:
• ICMP- Internet Control Message Protocol for IPv6
• ICMPv6- Internet Control Message Protocol for IPv6
• IP- IP over IP encapsulation
• TCP- Transmission Control Protocol
• UDP- User Datagram Protocol
• IGP- Interior Gateway Protocol
• GRE- Generic Routing Encapsulation
The default value 256 is used to indicate Any protocol.
When the option Any Protocol is set to N, the operator
can insert a possible value into [0-255] directly.
Note: ICMPv6 is valid for IPv6 and not for ICMP.
The use of ANY flag set to Y, allows the user to configure the following options:
• If IPv6 SA/DA is set to all Zeroes, then the attributes can be modified
• If IPv6 SA/DA MASK is set to all Zeroes, then any IPv6 SA/DA address will match.
The user must set non-null values for IPv6 SA or IPv6 DA. If the values are set to the default
setting of 0, the ACE will be considered invalid.
4
Click Cancel to restore to the original settings.
5
Click Save to configure the new IPv6 ace settings.
END OF STEPS
1
Select Security -> Administration -> Management RADIUS -> Configure RADIUS as shown
in Figure 84, “Configure RADIUS” (p. 136).
2
Following details are required:
• Server Number - Select the Server number from the drop down
• Status - Select the status Enable or Disable
• IP Address - Enter the valid IP Address
• Port - Enter the port number in the range of 1-65000
3
Click Save to save the changes.
END OF STEPS
1
Select Security -> Administration -> Management Radius -> Configure Authority as shown
in Figure 85, “Configure radius authority” (p. 137)
2
Following details are required:
• Authority Order - Select Local or Radius
• Retries - The number of retires, the value ranges form 0-100
• Timeout - The time-out in seconds, the value ranges from 0-1000
3
Click Save to save the changes.
END OF STEPS
1
Select System Management -> DB Management -> Remote File -> Perform Copy.
2
Specify the parameters as described in Table 15, “Database Management Copy Remote file”
(p. 139)
Parameter Description
From Determines the location from which the DM remote file is to
be copied.
The supported values are:
• Database backup on a Remote File Server (RFSDB)
• Secondary backup Database (STBYDB)
• Software Generic on a Remote File Server (RFSSW)
• Local NE PM Global File collection (LOCPMGLB)
• Local NE Daily Log File (LOCDAILYLOG)
• Local NE MAC Global file collection (LOCMACGLB)
Parameter Description
To Determines the location to which the DM remote file is to be
copied.
The supported values are:
• Database Backup on a Remote File Server (RFSDB)
• Secondary backup Database (STBYDB)
• Standby Software Generic on the NE (STBYSW)
• Remote File Server PM Global File Collection
(RFSPMGLB)
• Daily Log File on remote server (RFSDAILYLOG)
• Remote file server MAC file collection (RFSMACGLB)
User The user identifier used for the ftp connection on the RFS
Password The user password used for the ftp connection on the RFS
Host The IP address of the host (the Remote File Server)
Port The port number to connect to. Most schemes designate
protocols that have a default port number.
URL Path The details of how the specified resource (i.e. the directory
where the file(s) reside) can be accessed.
3
Click Apply to apply the configuration settings.
END OF STEPS
1
Click Data -> FDB Operations -> MAC File Collection to display the MAC File Collection
screen as shown in Figure 87, “MAC File Collection” (p. 141)
2
The MAC file collection status provides the collection state.
3
Click Refresh to refresh the MAC file collection status.
4
Specify the MAC address, select the board, VPLS instance and MAC learning type.
5
Click Start Collection to view the list of MAC files.
END OF STEPS
3.20.2 Steps
1
Select System Management -> DB Management -> Network Element as shown in Figure
88, “Network Element” (p. 142).
Use Table 16, “Network Element” (p. 142) to understand the parameters on this screen.
Parameter Description
Access Identifier Identifies the entity for which the output data are
retrieved.
The supported values are:
• ACTSW: The active software generic on the NE
• STBYSW: The standby software generic on the NE
Provision Mode Specifies the provisioning mode
Region Specifies the region
Release Date Identifies the date of the system software release in
the format of <YY>-<MM>-<DD>
Release Identification Identifies the release ID of the system software.
System Restart Process Status Identifies the status of any system restart process.
The supported values are:
• COMPLETE
• IN-PROGRESS
System Type Identifies the system type (i.e. 1850 TSS-5C)
User Label Identifies the system User label i.e 1850 TSS -5C
END OF STEPS
1
Select System Management -> DB Management -> Lac -> State as shown in Figure 89,
“LAC state Management” (p. 142).
The LAC state tab displays the Lac State Management panel that contains the following
parameters:
• LAC current state - Specifies the current LAC state. The default value is GRANTED
• LAC state - Specifies the LAC state. The values are REQUESTED or DENIED
3
Click Save to save the configuration.
END OF STEPS
1
Select System Management -> DB Management -> Lac -> Default as shown in Figure 90,
“LAC default” (p. 144)
The Lac Default Management tab displays the Lac Default Management panel that contains
the following parameter:
• Lac timer - Specifies the Lactimer values. The valid range is 1-30
3
Click Save to save the timer configuration.
END OF STEPS
1
Select System Management -> DB Management -> Manager List as shown in Figure 91,
“Retrieve the Manager list” (p. 145).
2
The Manager List tab displays the Manager List panel that displays the Current Manager
List. The default value is EML.
END OF STEPS
1
Click Data -> OAM Management -> Proactive Tool -> Delay Measurement from the menu
bar as shown in Figure 92, “Proactive delay measurement” (p. 146).
2
Click Create to create a DM tool as shown in Figure 93, “Create delay measurement tool”
(p. 146)
Parameter Description
MEP Select MEP ID
Priority Indicates the priority range between 0 to 7
Status Indicates the current status of the DM. The default
value is notInService. The supported values is
Inservice and notInService.
DM Mode Indicates the current mode of the DM. The default
value is disabled. The supported values are enabled,
2-way DM, 1-way DM and disabled
Destination Select the Destination as MEP ID or Mac Address.
Provide the MEP ID or the Mac Destination address
as per the destination selection
Period Indicates the current mode of the DM.The default
value is Interval1min.
Framesize Specify the Frame Size as Random or a value
between 0,64 and 9600.
3
Click Save to save the DM configuration or click Cancel to return to the previous screen without
saving.
END OF STEPS
1
Select Data -> OAM Management -> Proactive Tool -> Synthetic Loss Measurement Tool
from the menu bar as shown in Figure 94, “Proactive Synthetic Loss Measurement” (p. 148).
2
Click Create to create a Synthetic Loss Measurement tool, as shown in Figure 95, “Create
Synthetic Loss Measurement” (p. 148).
Parameter Description
MEP Select t the MEP ID
Parameter Description
Priority Indicates the priority range between 0 to 7.
Destination MEP ID Provide the Destination MEP ID as per the
destination selection
Destination MAC Address Provide the Destination MAC Address as per the
destination selection
Interval Select the interval in seconds or minutes. The
default value is 100ms.
The supported values are:
• 100ms
• 10ms
• 3.3ms
• 1ms
• 500us
• 100us
Status Indicates the current status. The default value is
notInService. The supported values are active and
notInService.
3
Click Save to save the Synthetic Loss Measurement configuration or click Cancel to return to
the previous screen without saving.
END OF STEPS
1
Select System Management ->PM Global file as shown in Figure 96, “PM Global file”
(p. 150).
Parameter Description
Collection State Specifies the current state for the file collection status.
The supported values are:
• EMPTY - No Performance Monitoring File Collection is
available.
• READY - A Performance Monitoring File Collection is
available
• INPREP - A Performance Monitoring File Collection is
currently in the process of preparing.
• FTRUNNING - File Transfer is currently running
Parameter Description
Monitor Date Start Monitor date, specifies the start date of the PM collection
period for which the Performance Monitoring File Collection
is prepared or will be prepared currently. The supported
value format is { MONTH - DAY : {01-12} - {01-31} }.
Monitor Time Start Specifies the start time of the PM collection period for which
the Performance Monitoring File Collection is prepared or
will be prepared currently. The supported value format for
Monitor time is { HOUR - MINUTE : {00-23} - {00-59} }.
Monitor Date End Specifies the End date of the PM collection period for which
the Performance Monitoring File Collection is prepared or
will be prepared currently. The supported value format for
Monitor end date is { MONTH - DAY : {01-12} - {01-31} }.
Monitor End Time Specifies the End time of the PM collection period for which
the Performance Monitoring File Collection is prepared or
will be prepared currently. The supported value format for
Monitor End Time is { HOUR - MINUTE-SECONDS :
{00-23} - {00-59}-{00-59} }
Parameter Description
Monitor Date Monitor date, specifies the (starting) date of the PM
collection period for which PM data is to be collected. The
supported value format is { MONTH - DAY : {01-12} -
{01-31}, ALL }.
Monitor Time Monitor Time, specifies the (starting) time of the PM
collection period for which PM data is to be collected. This
parameter affects the 15MIN values only. The supported
value format is { HOUR - MINUTE : {00-23} - {00-59}, ALL }.
Force Specifies if the initiation of the Performance Monitoring File
Collection preparation is forced in case there is an existing
file preparation process in progress.
The supported values are:
• Y - Yes, the file preparation shall be forced.
• N - No, the file preparation shall be not forced
END OF STEPS
Use this procedure to generate a new Public/Private key pair during SSH-2 authentication phase for
clients to have a credential for connection. The SSH key can be created when the NE is in a secure
or unsecure mode. The key could be used with the NE in the next SSH session in a secure mode.
1
Click Security -> Administration ->SSH / SSL Management->SSH NE Key Management
from the main menu. The SSH NE Key is displayed as shown in Figure 97, “Initialize SSH”
(p. 151)
2
The Key Type indicates the algorithm used to generate the specified NE key pair. Click to
Select the Key type as RSA or DSA or Click Default to specify RSA.
Note: When Key Type parameter is DSA the only allowed Key Length value is 1024.
3
The key length indicates the length for generation of the NE key pair. The default value is 1024.
The valid range is 768 to 2084.
4
Click Generate to generate the new NE key pair as shown in Figure 98, “SSH Key Generation”
(p. 153)
5
Click Transfer public keys to NMS to launch the Copy Security Remote file as shown in
Figure 99, “Copy Security Remote file” (p. 153) for administrator control. The administrator is
allowed to copy security sensible files or data from a local file system (NE) to a remote file
server.
Note: The From and To parameters are also visible when navigating from Security ->
Administration -> Copy Security Remote file from the main menu.
The following types of transfer are supported by the Copy security remote file:
• NE Public SSH Key from NE to RFS
• NMS Public SSH Key from RFS to NE
• NE Public SSL Key from NE to RFS
• NE CSR file in PEM format from NE to RFS
• NE CSR file in TEXT format from NE to RFS
• NE X509 Certificate file in PEM format from RFS to NE
• NE X509 Certificate file in TEXT format from RFS to NE
• User Activity Log (UAL) File in text zipped format from NE to RFS
In the Copy Security Remote file screen specify the following parameters:
Parameter Description
From Specifies the entity to be transferred.
The supported value is:
• LOCSSHKEY- Local NE SSH Public Key
• RFSSSHKEY - Remote NMS SSH Public Key
• LOCSSLKEY - Local NE SSL Public Key
• LOCCSRPEM - Local NE CSR File in PEM format
• LOCCSRTEXT - Local NE CSR File in Text format
• RFSX509PEM - Remote NE X509 Certificate File, signed
by NMS, in PEM format
• RFSX509TEXT - Remote NE X509 Certificate File, signed
by NMS, in Text format
Parameter Description
To Specifies the entity that is created as the result of the
command completion.
The supported values is:
• RFSSSHKEY - Remote NE SSH Public Key
• LOCSSHKEY - Local NMS Public Key
• RFSSSLKEY - Remote NE SSL Public Key
• RFSCSRPEM - Remote NE CSR File in PEM format
• RFSCSRTEXT - Remote NE CSR File in Text format
• LOCX509PEM - Local NE X509 Certificate File, signed by
NMS, in PEM format
• LOCX509TEXT - Local NE X509 Certificate File, signed
by NMS, in Text format
User Indicates the user identifier for the sftp connection on the
RFS.
Password Indicates the user password for the sftp connection on the
RFS.
Host Indicates the IP address of the host (the Remote File
Server).
Port Indicates the port number to connect. The default port
number for sftp is 22.
URL path Provides the details of how the specified resource (i.e. the
directory where the file(s) reside) can be accessed.
6
Click Apply to copy the security remote file.
7
To import the SSH public key, Click Security -> Administration ->SSH / SSL Management-
>Import SSH Public Key from the main menu. The screen is refreshed to display Copy
Security Remote file. Refer Table 21, “Copy Security Remote file” (p. 154) for details.
END OF STEPS
1
Click Security -> Administration ->SSH / SSL Management->SSL NE Key Management
from the main menu. The SSL NE Key is displayed as shown in Figure 100, “Initialize SSL”
(p. 155).
2
The key type indicates the algorithm used to generate the specified NE key pair. Click to Select
the Key type as RSA or DSA or Click Default to specify RSA.
3
The key length indicates the length for generation of the NE key pair. The default value is 1024.
The valid range is 512 to 4096.
4
Click Generate to generate the new NE key pair as shown in Figure 101, “SSL Key
Generation” (p. 157).
5
Click Transfer public key to NMS to launch the Copy Security Remote file as shown in for
administrator control. The administrator is allowed to copy security sensible files or data from a
local file system (NE) to a remote file server.
Note: The From and To parameters are also visible when navigating from Security ->
Administration -> Copy Security Remote file from the main menu.
The following types of transfer are supported by the Copy security remote file:
• NE Public SSH Key from NE to RFS
• NMS Public SSH Key from RFS to NE
• NE Public SSL Key from NE to RFS
• NE CSR file in PEM format from NE to RFS
• NE CSR file in TEXT format from NE to RFS
• NE X509 Certificate file in PEM format from RFS to NE
• NE X509 Certificate file in TEXT format from RFS to NE
• User Activity Log (UAL) File in text zipped format from NE to RFS
In the Copy Security Remote file screen specify the following parameters:
Parameter Description
From Specifies the entity to be transferred.
The supported value is:
• LOCSSHKEY- Local NE SSH Public Key
• RFSSSHKEY - Remote NMS SSH Public
Key
• LOCSSLKEY - Local NE SSL Public Key
• LOCCSRPEM - Local NE CSR File in PEM
format
• LOCCSRTEXT - Local NE CSR File in Text
format
• RFSX509PEM - Remote NE X509
Certificate File, signed by NMS, in PEM
format
• RFSX509TEXT - Remote NE X509
Certificate File, signed by NMS, in Text
format
Parameter Description
To Specifies the entity that is created as the
result of the command completion.
The supported values is:
• RFSSSHKEY - Remote NE SSH Public
Key
• LOCSSHKEY - Local NMS Public Key
• RFSSSLKEY - Remote NE SSL Public Key
• RFSCSRPEM - Remote NE CSR File in
PEM format
• RFSCSRTEXT - Remote NE CSR File in
Text format
• LOCX509PEM - Local NE X509 Certificate
File, signed by NMS, in PEM format
• LOCX509TEXT - Local NE X509
Certificate File, signed by NMS, in Text
format
User Indicates the user identifier for the sftp
connection on the RFS.
Password Indicates the user password for the sftp
connection on the RFS.
Host Indicates the IP address of the host (the
Remote File Server).
Port Indicates the port number to connect. The
default port number for sftp is 22.
URL path Provides the details of how the specified
resource (i.e. the directory where the file(s)
reside) can be accessed.
6
Click Apply to copy the security remote file.
7
To import the SSL public key, Click Security -> Administration ->SSH / SSL Management
->Import SSL Public Key from the main menu. The screen is refreshed to display Copy
Security Remote file Table 21, “Copy Security Remote file” (p. 154) for details.
END OF STEPS
1
Click Security -> Administration ->SSH / SSL Management->SSL Cert. Signing Request
(CSR) from the main menu. The Certificate Signing Request screen is displayed as shown in
Figure 103, “SSL Certificate Signing request” (p. 159).
2
Specify the Certificate Signing Request parameters as per table Table 23, “Certificate signing
request” (p. 160)
Parameter Description
CN IP Address Represents the domain name of the server. The default
value is the NE IP Address. For example,
CN=151-98-32-56. The supported value range is
{0-255}-{0-255}-{0-255}-{0-255}.
Organization Name Specifies the legal name the organization. For example,
Nokia.
Organization Unit Specifies the division of the organization handling the
certificate. For example, Optics Division.
Location Specifies the city where the organization is located. For
example, Milan.
State Specifies the state or region where the organization is
located. For example, Italy.
Note:The state name should not be abbreviated.
Parameter Description
Country Indicates the two-letter ISO code of the country where
the organization is locates, For example, IT.
Mail Specifies the email address used to contact the
organization. For example, TSS320.R5.0@nokia.com is
the default value.
3
Click Save to save the CSR or Click Transfer CSR to transfer the CSR using the Copy Security
Remote File screen as described in Table 21, “Copy Security Remote file” (p. 154)
4
To import the SSL public key, Click Security -> Administration ->SSH / SSL Management
->Import SSL Certificate from the main menu. The screen is refreshed to display Copy
Security Remote file Table 21, “Copy Security Remote file” (p. 154) for details.
5
To Install the SSL Certificate, Click Security -> Administration ->SSH / SSL Management-
>SSL Certificate Installation as shown in Table 21, “Copy Security Remote file” (p. 154).
6
Click Apply.
END OF STEPS
3.27.2 Steps
1
Select System Management -> Network Time Protocol option from the menu bar. The
system displays the Time and Date and Network Time Protocol panel parameters as shown in
Figure 105, “Network Time Protocol” (p. 163).
Table 24, “Network Time Protocol parameters” (p. 163) provides description of network time
protocol parameters.
Parameter Description
Current NTP Server Synchronization Specifies if the NTP server. synchronization is
enabled or disabled.
Current Offset Specifies the offset for the UTC.
Current Operating Mode Specifies the current operating mode. The
default value is FREE-RUNNING.
Date Date, identifies the new system date in the
format Year-Month-Day with supported value
ranges {05-25}-{01-12}-{01-31}
Time Identifies the new system time in the format
<HH>-<MM>-<SS>. The value entered should
be the actual desired local time to be displayed
by the NE.
2
Select the Date and time from the Date and time drop-down.
3
Click Save to save NTP server configuration.
4
Click Create to set up the new NTP server settings as shown in Figure 106, “Create NTP”
(p. 163).
5
The NTP Server Address provision panel displays the Server IP Address parameter. Enter the
server IP address to provision the NTP server synchronization. The default range is [0-99, 101-
126, 128-233], [0-255], [0-255], [0-255].
6
The Network Time Protocol panel now displays the NTP Server Synchronization drop-down list
box. The values are either NULL or ENABLED.
7
The user can also set the New Offset for the Network Time Protocol. Click Save to store the
configuration settings.
8
Enable the IP Address check box to select the server IP address and click Create hyperlink to
configure the network time protocol.
9
Select the Network Time Protocol to be deleted and click Delete.
END OF STEPS
1
Select System Management -> Network Time Protocol option from the menu bar. The
system displays the Time and Date and Network Time Protocol panel parameters as shown in
Figure 107, “Modify NTP” (p. 164).
2
Select the date and time from the Date and Time drop-down.
3
Select a value from the NTP Server Synchronization drop-down to modify the current NTP
server synchronization. Available values are ENABLED and DISABLED.
4
Click Save to save the NTP server configuration.
5
Select the NTP configuration to be deleted and click Delete.
END OF STEPS
1
Select System Management -> Differential time Frequency option from the menu bar as
shown in Figure 108, “Set differential time frequency” (p. 165).
2
Set the Frequency in Khz. The supported value range is 25000, 16384 and 77760.
3
Click Save to save the modifications.
END OF STEPS
1
Select Security -> Administration -> IP ACL option from the menu bar as shown in Figure
109, “Manage IP ACL” (p. 167).
2
Click Create to create the IP ACL rule.
3
Specify the parameters as described in Table 25, “IP ACL Inputs” (p. 167).
Parameter Description
IP Address Specifies the IP address added to the IP ACL.
The supported value range is {0-255}-{0-255}-{0-255}-{0-
255}
Max TCP Source port Determines the Maximum TCP Source port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Max TCP Destination Port Determines the maximum Destination Port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Max UDP source Port Determines the Maximum UDP Source Port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Max UDP Destin. Port Determines the Maximum UDP Destination Port. The
default value is 0. The supported value range is 0 to
65535.
Note: The default value 0 indicates don't care.
Parameter Description
IP Protocol Specifies the protocol field in the IP packet header. The
default value is 255. The supported value range is 0 to
255.
IP Mask Determines the IP subnet mask. The default value is
255-255-255-255.
Min TCP Source Port Determines the Minimum TCP Source port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Min TCP Destin. Port Determines the minimum Destination Port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Min UDP Source Port Determines the Minimum UDP Source Port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Min UDP Destin. Port Determines the Minimum UDP Destination Port. The
default value is 0. The supported value range is 0 to
65535.
Note: The default value 0 indicates don't care.
END OF STEPS
1
Select Security -> Administration -> IP ACL option from the menu and click on the IP ACL to
modify as shown in Figure 110, “Modify IP ACL” (p. 168).
2
Modify the parameters.
3
Click Save to save the changes or click Cancel to return to the previous screen without saving.
END OF STEPS
1
Select Security -> Administration -> IP ACL option from the menu and click on the details link
for the IP ACL to view the details as shown in Figure 111, “Viewing IP ACL details” (p. 168).
2
Click Cancel to return to the previous screen.
END OF STEPS
1
Select Security -> Administration -> IP ACL option from the menu.
2
Click to select the IP ACL to be deleted and click Delete.
3
A dialog is displayed confirming deletion. Click Yes to proceed or click No to cancel deletion.
END OF STEPS
1
Select Security -> Administration -> Network Element Logs as shown in Figure 112, “Audit
Log” (p. 169).
The Retrieve Audit Log page contains the Retrieve Audit Log panel with the following
parameters:
• From - Specifies the beginning date and time used to filter the response messages. By
means the drop down list it is possible to change data and time
• To - Specifies the ending date and time used to filter the response messages. By means the
combo-boxes it is possible to change data and time
• UID - The check-box allows to select the user identifier:
− ALL
− Admin
3
Check the check-box provided for Set user identifier and select the User Identifier from the
drop-down.
4
Click on hyperlink Retrieve to retrieve the audit logs
END OF STEPS
1
Select Security -> Administration -> Log Settings as shown in Figure 113, “Log Settings”
(p. 170).
The Modify Log Attributes page describes the TL1 commands and the Modify Log
Attributes panel that contains:
• Current Log File Max Size [Mbyte] - Specifies the size, in 1 Megabyte blocks, of the
Security Log File system's disk buffer.
• New Log File Max Size [Mbyte] - 1 Megabyte blocks, of the Security Log File system's disk
buffer. When the SECULOG has reached a maximum size, the SECULOG wraps reducing its
size to the 70% of its max size discarding the oldest events (30%). The Default hyperlink
allows to set the relevant value automatically
• Current Warning Message - The provisioned user-logon warning message is shown
• Warning Message - Allows to provision user-logon warning message. The Default hyperlink
allows to set the relevant warning message automatically
• New Warning Message - Allows to provision a new user-logon warning message. The
Default allows to set the relevant warning message automatically. The Set Empty allows
deletion of the entry field.
• Current Log Events - Specifies the current log event
• Available Log Events - Specifies the list of events that, upon their occurrence, are included
in the security log (i.e., events that are specified for logging, if they occur). The values are:
• Authentication Event (EIUA) - Login, Logout, invalid user authentication attempts and the
alarms/alerts generated due to the invalid authentication attempts
• Changes to the User's Security Accounts (EUSP) - Specifies the details of the changes
made in a user's security profiles and attributes
• Changes to the NE/NS Security Configuration (ESCC) - Specifies the details of changes
made in the NE/NS security configuration
• Changes to NE/NS resources (ECMR) - Specifies the creation and modification of NE/NS
resources performed via standard operations and maintenance procedures. This does not
address creations and modifications carried offline. Commands creating log events of this
type are all the commands not mentioned in the lists above, having Y in the security field of
the command security table.
• All Events (ALL) All events
• New Log Events - This shows the log events for the command. The entry box has the
Default to set the User access privileges forecast for the account.
They can be copied or removed from one of the entry box using the left or right arrow buttons
available between the two entry boxes.
Click Save to save the settings.
END OF STEPS
1
Select Security -> Administration -> IP Message Settings as shown in Figure 114, “IP
message settings” (p. 172).
2
Specify the IP message interval time in seconds and the Multiple IP messages as Yes or No.
3
Click Save to save the changes.
END OF STEPS
3.33.2 Steps
1
Select Protection -> 1:1 Tunnel Protection option from the menu bar. The window displays
protected and protecting equipment as shown in Figure 115, “1:1 Tunnel protection” (p. 172).
2
The tunnel protection window displays 1:1 protection details.
3
Enter the fast facility protection from and to values and click Search.
END OF STEPS
3.34.2 General
Its management in the network is based upon the communication, between the aggregate partner
pieces of equipment, of LACP messages (Link Aggregation Control Protocol). The LACP packets
transport information about set-up, aggregation capability, links failures, automatic reconfiguration
after failure, etc. The benefits of Link Aggregation feature are:
• Bandwidth limitation overcoming.
• Load balancing (the traffic is distributed over the constituting links).
• Reliability increasing (in case that a link of the aggregate fails, its traffic will be automatically
distributed over the other links of the aggregate).
1
Click LAG Group (Link Aggregation Management Group) icon from the tree area as shown in
Figure 116, “Aggregation management tree” (p. 175) expand. The Link Aggregation Mng
screen is displayed in the right hand side frame as shown in .
2
Select one of the LAG-x (Link Aggregation Group) icon and the client area displays.
Table 26, “Link aggregation parameters ” (p. 175) provides description of link aggregation
parameters.
Parameter Description
Name Allows to set the name of the LAG; the only suffix after "#"
can be set by the user, with an integer in the 1 to 16 range
Admin State This item can be set only after creation, in “Configure
Aggregator” option,. The values are:
• enable the LAG is in-service
• disable the LAG is out-of-service
User Label Allows to indicate the LAG by means of a name defined by
the user.
Size Allows to set the size of the LAG, i.e. number of
Aggregated Ports; possible values are integers in the 1 to 8
range
Actor Admin Key Allows to indicate the LAG “Key”, the parameter identifying
this LAG; integer in the 1 to 65535 range
Type Refers about the type of port (read only field, fixed by the
system to ieee8023adLag)
Parameter Description
EthClient Type (read only Indicates the transported layer. The values are:
field)
• ets: for Ethernet Transparent System
• etb: for Ethernet Bridge System
Actor System Priority Allows to indicate the LAG Priority. This parameter,
together with the LAG Mac-Address, forms the “System
Identifier”. The lowest System Identifier value will be
elected as the “Master” of the link, i.e. the one that will drive
the actions in case of events such as failures, switches, etc.
The valid range is 0-65535
Maximum MRU Specifies the maximum receiving unit that allows to adjust
the of packet transfer in control channel in octets. The
value ranges from 1574 to 9242 (R1.0) or from 1574 to
10240 (From R4.0).
Encaps Method Refers about the method of MAC packets encapsulation
inside the underlying physical layer. The options are:
• ethernetV2: default mode, set by the system
• IEEE8023: not yet operative
Frame Distribution The default value is C000
3
Enter the LAG Name in the field provided for name.
4
Enter the User name for the LAG in the field provided for User Label.
5
Specify the Actor Admin Key.
6
Specify the Actor System Priority.
7
Specify the Maximum MRU.
8
Click Hash Input to select the New Hashing Key Mask as shown in Figure 117, “Hash Input”
(p. 177)
9
Click Save to save the LAG configuration.
END OF STEPS
1
Click LAG Group (Link Aggregation Management Group) icon from the tree area and expand.
Select the LAG Group.
2
In the Link Aggregation Mng screen select the LAG to modify and click Configuration. Click LAG
in the Link Aggregator configuration screen
Table 27, “Modify LAG parameters” (p. 179) provides description of modify lag parameters.
Parameter Description
Link Aggregation Configuration
Name Allows to set the name of the LAG. The only suffix after
"#" can be set by the user, with an integer in the range
1-16.
Note:This is a non-editable field
Type Indicates the type of port (read only field, fixed by the
system to "ieee8023adLag")
Note:This is a non-editable field.
User Label Indicates the LAG by means of a name defined by the
user
Actor Admin Key Indicates the LAG "Key", the parameter identifying this
LAG; integer in the range 1 -65535
Actor System Priority Indicates the LAG Priority. This parameter, together with
the LAG Mac Address, forms the "System Identifier".
The lowest System Identifier value will be elected as the
"Master" of the link, i.e. the one that will drive the
actions in case of events such as failures, switches, etc.
Possible values are integers in the range 0-65535
Actor System ID A read-only field fixed by the system indicates the
"System Identifier", composed of the LAG Mac Address
and the above Actor System Priority. The LAG having
the lowest LAG-System Identifier value will be elected
as the "Master" of the LAG link, i.e. the one that will
drive the actions in case of events such as failures,
switches, etc.
Actor Op. key A read-only field fixed by the system indicates the actual
operational value of LAG-key for this LAG.
Parameter Description
Maximum MRU Allows to set the Maximum Recieve Unit (MRU) size of
the largest packet which can be sent on this LAG
interface, specified in octets. The value ranges from
1574 to 9242 (R1.0) or from 1574 to 10240 (From
R4.0).
Protocol Profile The entry field indicates the name of the 2-bytes
provider (S-VLAN-Prototypal) contained into the S-Vlan
ethernet frames afferent to the current Port.
Asap Name An entry field displays the name of alarms profile to be
associated to the current Port. The Select hyperlink
allows to start the selection procedure. After the
selection procedure, the chosen value will be reported.
Frame Distribution Hashing key facilitates handling of traffic distribution
from a generic NNI port (MPLS or Bridge port) toward
UNI access with a better granularity criteria. The default
value is C000.
Admin State Allows to set the Administration status. Possible values
are: enable (the LAG is in-service) or disable (the LAG
is out-of-service)
Oper. State The read-only field indicates the current operational
status of the Port, information about the actual state of
the Aggregation Port regarding the traffic; possible
values: up (the traffic on Aggregation Port is active) or
down (the traffic on Aggregation Port is inactive).
Bandwidth Indicates the actually used Bandwidth of the LAG, after
that Aggregated Ports have been associated to this
LAG. It is the sum of Aggregated Ports rate
Available Band Indicates the available Bandwidth of the LAG
LACP type Indicates if the Link Aggregation Control Protocol is ON
(i.e. lacpOn is active on this aggregator) or OFF
(IacpOff inactive); read only field, fixed by the system.
LACP Enabled Specifies if the LACP is enabled or disabled.
Size Allows to set the size of the LAG, i.e. number of
Aggregated Ports. The values are integers in the range
1 to 8
Encaps Method The entry field indicates the method of MAC packets
encapsulation inside the underlying physical layer.
Possible options are: ethernetV2 (default mode, set by
the system) or IEEE8023 (not yet operative).
3
Click Save and Continue to apply the previous settings and restart with new configuration.
4
Click Save and Exit to save the modification and return to the previous screen.
5
Click Cancelto exit the screen without saving.
6
To delete a LAG: Delete all LAG related traffic, unbind all ports and change ADMIN state to
disable. Navigate back to the LAG Group (Link Aggregation Management Group) icon from the
tree area and expand. Click to select the LAG Group. In the Link Aggregation Mng tab, select
the LAG configuration to be deleted and click Delete.
END OF STEPS
1
To access the node, click on the System Identifier in the Tree menu in the left panel and click on
the Node tab in the screen displayed as shown in Figure 120, “Accessing the node” (p. 181).
The provisioned Racks are listed.
2
Click on the Rack to view the Rack details as shown in
Note: The Rack details can also be viewed by clicking on the Rack name in the Tree
Menu.
3
Click UP to return to the Node screen.
END OF STEPS
1
Select SHELF-x-x: yyyy node from the tree area. The tree expands and shows the shelf
composition subtree and select one of the SHELF-x-x; yyy nodes from the tree area as shown
in Figure 122, “Accessing the Shelf” (p. 184).
2
The Rack x > Shelf x-x tab displays the UP Rack-x > Shelf-x and panel that consists of the
following parameters:
The UP Rack x Shelf x panel resumes the shelf info and displays the following read-only fields:
• Access Identifier - Specifies the equipment entity.
• Current Provisioned Type - Specifies the equipment entity.
• Actual Type - Specifies the physically equipped entity type (see Current Provisioned Type).
• Primary/secondary state - Specifies the primary and secondary service state.
• Shelf ID - Specifies, for the Shelf Types, the provisioned shelf identification value. It can
range from 1-31.
• Shelf Role - Specifies, for the Shelf Types, the provisioned shelf role. The value is: MAIN
(main shelf of the NE)
The Restart panel resets the specified equipment entity and displays the following fields:
• Phase - Allows to select the type of restart. The values are:
− Warm - Reload of dynamic and static data (db and sw). This field is used with AID = ALL
for normal full reset of the NE.
− Power-On
• Mode- Specifies if the restart is normal or forced
Note: In case AID is SHELF, the Restart section has only Phase=POWER-ON, and
MODE=FRCD.
3
To Restart Shelf, Core and I/0 card select the Phase and Mode of the card as shown in “
Steps” (p. 0).
4
Click Apply. The following window pops up for confirmation as shown in “ Steps” (p. 0).
5
Click Yes to start the restart function and No to exit.
6
Select the Shelf parameters as described in step 2 and click Apply to save and configure the
settings.
8
Click on the Equipment tab to view the application view of the shelf and slots as shown in
Figure 123, “Equipment view” (p. 185).
9
Resources can be modified via the Shelf screen or via the tree menu.
END OF STEPS
1
The Rack x > Shelf x > Board xx tab page presents two panels and a table. The Rack x >
Shelf x > Board xx panel contains the following parameters:
Parameter Description
Access Identifier Specifies the Equipment Access Identifier, identifies the
equipment entity access identifier.
Provisioned Type Specifies the type of the shelf actually provisioned.
Parameter Description
Actual Type Specifies the Physically equipped module type (see Current
Provisioned Type)
Primary state Specifies the primary and secondary service state.
2
Click on the View hyperlink provided for alarms to view the associated alarms for the board.
The Alarms Report for the PD board are displayed as shown in “Provisioning Boards” (p. 0).
3
Click on the View hyperlink provided for Conditions to view the associated conditions as shown
in Figure 125, “Conditions” (p. 189)
4
Click provision hyperlink to provision the SFP/XFP module for the selected board.
5
Select the SFP/XFP module from the Provisioned Type drop-down list box, the SFP details are
provided, in this instance SFP-1-1-2-7 as shown in Figure 126, “SFP details ” (p. 190)
Parameters Description
Access Identifier Specifies the access identifier of the selected module
Actual Type Specifies if the board is configured or not
Provisioned Type Specifies the type of equipment to be provisioned
Primary state Specifies the primary state of the equipment. The supported
values are:
• IS
• OOS
Command Mode Specifies the command mode of the equipment. The supported
values are:
• NORM
• FRCD
Alarm Profile Indicates the alarm profile.
6
Click Save to save the settings, the tree area displays the XFP module provisioned on the
selected facility.
7
Click Create hyperlink to configure the Ethernet port for the selected module.
8
The Rack xx > Shelf xx > Board xx > Module xx > Port xx displays the following tabs:
• Physical
• Quality of Service-This tab is displayed only if the Admin State parameter value is set to “up”.
• PM data-This tab is displayed only if the Admin State parameter value is set to “up”.
• PNAC
END OF STEPS
1
The PHYSICAL tab displays the following panels as shown in Figure 127, “Port Configuration”
(p. 190)
END OF STEPS
State
In this panel the settings of the resource can be modified by means of the following parameters:
• Admin state - Allows to set the administrative state. The choices are: up = active state or down
= not active state.
• Last change - Specifies the date and time when the resource had been managed last time.
• Operational state - Specifies the actual state of the resource.
• MAU Operational state - Specifies the actual state of the Medium Access Unit (MAU).
• Alarm Severity Profile - Specifies the ASAP label that is in use for the resource.
Ethernet Port
• Connector present - Indicates if the interface has a physical connector. The values are: true or
false.
• Type - Indicates the type of port (fixed to "ethernetCsmacd"). The values fixed:
ethernetCsmacd.
• Speed - Indicates the actual configured rate. The values are: 1000000 (1 Gb/s) or 10000000 (10
Gb/s).
• Alias - Indicates the friendly name for the interface that can be set by the user.
• Encapsulation mode - Indicates the method of MAC packets encapsulation inside the
underlying physical layer. The values are: ethernetV2 (default) or IEEE8023.
• Maximum MTU/MRU - Indicates the Maximum Transmit Unit/Maximum Receive Unit size of the
largest packet that can be sent/received on the interface, specified in octets. The value ranges
from 1574 to 9242 (R1.0) or from 1574 to 10240 (From R4.0).
• Promiscuous mode - Indicates indicating whether this interface has to inspect the packets'
MAC addresses. The values are: true or false.
• FCS discard errored frame - Indicates the insertion or removal of GFP-FCS (Frame Check
Sequence) field into the optional field FCS of the GFP frame. The values are: true or false.
• Client type - Indicates the transported layer. The values are: ets (for Ethernet Transparent
System), etb (for Ethernet Bridge System) or LinkAgg (for Link Aggregation System).
• Underlie layer - Indicates the associated layer. The allowable values are: mau (for Ethernet
Transparent System), vconc (virtual concatenation to permit the setting of the "virtual-
concatenation granularity" mode) or sdh (to permit the setting of the "Rate-Limiting" mode.
NOTE: this value is given only in the case that the concatenation number for the VC4 is equal to
1).
• Link up/down trap - Indicates whether linkUp / linkDown traps (notification upon the changing of
the node operational state from up to down and vice versa) should be generated for this
interface. possible options: enabled / disabled the associated layer. The values are: enabled or
disabled.
• Physical address
The Ethernet port mirroring allows duplicating traffic of a mirrored port in a service and sending a
copy of this traffic to another dedicated port without affecting the service. In order to configure the
port mirroring feature, specify the mirrored port, mirroring port, and mirroring direction (ingress,
egress). The speed of mirroring port is recommended to be greater than that of mirrored port.
• Mirror Type - Displays the type. The allowable types are no mirroring, mirroring input,
mirroring output.
• Mirrored port - Select the Ethernet port from the list whose traffic has to be duplicated.
Note: Only local ports support port mirroring. The mirrored port and the mirroring port must be
different ports and the ifAdminStatus of one local port must not be “DOWN” before it is
selected as mirrored port.
MAU
The panel has the Save hyperlink in order to save the settings.
• MAU panel - Allows to change the settings of the resource and displays the following
parameters:
• MAU identifier - Specifies a number assigned by the system. The value is: 1.
• Front Panel Port - Specifies a number assigned by the system; it is the identifier of the physical
port on the front of the PIM. The value is: <8 digit number>.
• State - Specifies the MAU current status. The values are: operational or shutdown.
• Jack Type List - Specifies the available connectors type. The values are: RJ45 for FE port or
fiberLC for GBE port.
Note: Use AN-enable for GE interworking between the TSS-5C and TSS-320.
• Jabber type - Specifies the state of the jabber process (checking about abnormal data
transmissions longer than the max permissible packet length).
• Default Type - Specifies the type of physical I/F. The values are:
• b1000BaseXFD for 1GE (1000Mbps) LAN
• Auto-negotiation supported - Indicates if the auto-negotiation is supported or not. The values
are: true or false.
• Auto-negotiation enabled - Indicates if the auto-negotiation is enabled or not. The values are:
enabled or disabled.
• Autonegotiation state - Indicates the state.
• bfdxPause
• bfdxBPause
• b1000baseXFD
The panel has the following hyperlinks:
Save link - To save the settings.
Enable autonegotiation - To change the last described field without using other page command.
Flow Management
• Flow management panel - Allows to change the settings of the resource and displays the
following parameters:
• VLAN Profile Protocol
• Egress Shaping Management panel
• (T)MPLS Management panel - Click CREATE MPLSIF link to create new MPLSIF.
1
Navigate to the Port in the main menu and click on the port, the port management screen is
displayed.
2
Specify the Egress scheduling rate in Kbps. Click Enableto enable egress port shaping.
Clicking Disable will disable the egress port shaping.
Note: The NE has the capability of supporting a total of four MPLS ports (including the
main board and the 08FXK board).
END OF STEPS
1
Click on MPLSIF under the TMPLS Management section to configure MPLSIF as shown in
Figure 128, “Configure MPLSIF” (p. 196) and described in Table 30, “Configure MPLSIF
parameters” (p. 196).
Parameter Description
MEP Specifies the Maintenance Entity Point. For enabling MEP function,
the direction of MEP is according to the direction of Tunnel Segment.
The values are ENABLE or DISABLE
MEG ID Specifies the Maintenance Entity Group Identifier. This parameter
must be unique in the system
Parameter Description
MEP ID Specifies the Maintenance Entity Point Identifier. This parameter is
unique inside MEG ID. If provisioned, this parameter must be different
from EXP MEP ID. The MEP ID is in the range 1 to 8191
OAM PHB Profile Specifies the PHB OAM Profile AID for OAM packets
The supported values are:
• OAMTYPE1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE8
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
The default value is EF.
CV Rx It enables/disables (ENABLE/DISABLE) capability to detect the Loss
of Continuity (LOC) alarm, associated to Sink Tunnel Segment
Termination. ENABLE value is not applicable if DIR=UNIDIRIN
CV PHB Specifies the CV packet transmission for PHB profile
CV Period Specifies the period (1/Frequency) of CV packet transmission
Parameter Description
CV Tx Specifies the period (1/Frequency) of CV packet transmission
EXP MEP ID Specify the MEP EXP ID in the value range of 1 to 8191.
Proactive DM Determines whether Proactive DM is enabled or disabled. When
Proactive DM is set to enabled, the PRODM performance monitoring
parameters can be configured.
Proactive DM Specifies the DM interval in terms of 1s, 10s, 1m and 10m.
Period
Proactive DM Determines the length of the Proactive DM Packet.
Packet Length
2
Click Save to save the MPLSIF configuration.
3
To configure PRODM Performance Monitoring parameters, click on the PRODM performance
monitoring tab and configure the PRODM Performance Monitoring parameters as described in
Step 17 to Step 29.
END OF STEPS
1
The Quality of Service tab displays the following as shown in
2
The Quality of service tab displays the VT for the selected port. Specify the VT range and click
Search/Refresh to retrieve the VT profile.
3
Click on the VT Index number to display the modify the VT parameters.
4
Click on the Queue to modify the VT queue profile as shown in Figure 131, “Modify VT Queue”
(p. 201)
5
Select the Queue Type Strict Priority or Weighted Bandwidth.
6
Specify the Committed Rate when queue type is Weighted Bandwidth.
7
Specify the shaping as true or false and the peak rate in Kb/sec.
8
Specify the associated queue profile.
9
Click Save to save the changes or Cancel to return to the previous screen without saving.
10
Click Cancel to cancel and return to the previous screen.
11
Click Save to save the profile changes.
12
Disfrute
Click Deactivate to deactivate the profile.
END OF STEPS
1
Press statistics button in CES PW management.
2
Click the PM data tab, the Performance Monitoring screen is displayed as shown in Figure
132, “Performance Monitoring Data” (p. 201).
• History Data
3
Click the Maintenance Rx tab to display the Maintenance Rx parameters as shown in Figure
133, “Maintenance Rx tab” (p. 202)
4
Specify the Maintenance Rx/Tx parameters as described in Table 31, “Maintenance Rx/Tx
parameters” (p. 203)
Parameter Description
Polling Period (sec) Provides an increment or decrease in the current value.
Select the up/down buttons to modify the existing value.
Number of Retries Provides an increment or decrease in the number of
retries. Select up/down arrow buttons to modify the
existing value.
Polling Window (sec) Polling Window value changes if the Polling Period and
Number of Retries values are modified.
Parameter Description
Polling row Indicates the polling interval as 15m or 24h.
Note:Only applicable to Current PM data
Direction Indicates the direction as Rx .
Note:Only applicable to Current PM data
Start or Stop Starts or stops the increment or decrease.
5
Click the Current Data tab to view the performance counters and create PM as shown in Figure
134, “Current Data” (p. 204).
6
Click Create PM to create. Specify the PM and Polling Management parameters and click Start/
Stop to increment or decrease the counters.
END OF STEPS
Polling management
The Polling Management panel has the same parameters as shown in Table 31, “Maintenance
Rx/Tx parameters” (p. 203).
1
Click the PM data tab the Performance Monitoring screen is displayed as shown in the following
figure.
2
Click the Maintenance Rx tab to display the Maintenance Rx parameters as shown in the
following figure.
3
Specify the Maintenance Rx parameters as described in Table 31, “Maintenance Rx/Tx
parameters” (p. 203)
4
Click the Current Data tab to view the performance counters and create PM as shown in the
following figure.
5
Click the History Data tab the Performance Monitoring screen is displayed as shown in the
following figure.
The History Data tab displays the history details of rlsrlsl2/ETHLocPort#1#1 port.
6
Specify the following PM parameters as described in the following table:
Parameter Description
Missing Packets Number of missing packets (as detected via
control word sequence number gaps).
Packets Re-Order Number of packets detected out of
sequence (via control word sequence
number), but successfully re-ordered
Jitter Buffer Underruns Number of times a packet needed to be
played out and the jitter buffer was empty.
Parameter Description
MisOrder Dropped Number of packets detected out of order (via
control word sequence numbers), and could
not be re-ordered, or could not fit in the jitter
buffer.
Malformed Packets Number of packets detected with
unexpected size, or bad header’s stack.
Errored Seconds The counter associated with the number of
Error Seconds encountered. Any malformed
packet, seq. error, LOPS and similar are
considered as error seconds.
Severely Errored Seconds The counter associated with the number of
Severely Error Seconds encountered.
Unavailable Seconds The counter associated with the number of
Unavailable Seconds encountered. Any
consecutive ten seconds of SES are
counted as one UAS.
END OF STEPS
1
After configuration of the MPLSIF, the In fiber In Band tab is displayed as shown in Figure 140,
“MPLSIF Ethernet Port Management” (p. 211)
2
Click on the In Fiber In Band tab, the screen is refreshed to display the In Fiber In band
configuration screen as shown in Figure 141, “In Fiber In Band Management” (p. 211)
3
Modify and click Save to save the In fiber in band management settings or click Cancel to
return to the previous screen.
4
Click Activate to activate the In fiber In Management setting as shown in Figure 142, “Activate
In Fiber In Band Management” (p. 213)
5
Click Deactivate to deactivate the In Fiber In Band Management.
END OF STEPS
1
Click the PNAC tab to configure PNAC parameters. Refer the 3.97 “PNAC Management”
(p. 451) section for configuration and management of PNAC parameters.
END OF STEPS
• Option slot 2: if O16E1/OTRI board, full capacity; is not allowed (not blocked by SW, if assigned,
port 1~2 can be used); in case the OTRI board is used, and in the future STM-1 CES is used,
the FE port 15 and 16 on main board should not be used (note: not blocked by SW). For slot 2
O8FEK is allowed full capacity.
• If the OTRI board is used in the first (or second) option slot, the GE port 9 (or 10) on main board
cannot be used.
• Option slot 2 for OFXK is allowed if the assigned ports 11-16 on main board are blocked.
Configura- Main Slot Main 1st Option slot 1st Usage 2nd Option slot 2nd Usage
tion Usage
4 12 OK 8 OK 2 0
O8FEK/O8FXK O16E1/R202E
6 12 OK 2 OK 2 OK
O16E1/R2O2E O16E1/R2O2E
8 12 OK 4 OTRI OK 2 OK
O16E1/R2O2E
Note: Always put the option board which needs higher FE capacity in option slot Requested
FE capacity: O8FEK/O8FXK > OTRI > O16E1.
Configuration Main slot usable GE 1st option slot 2nd option slot
ports
1,4,5,6 7, 8, 9,10 Not OTRI Not OTRI
3,8 7, 8, 10 OTRI with GE Not OTRI
2,7 7, 8, 9 Not OTRI OTRI with GE
Configuration Main slot usable GE 1st option slot 2nd option slot
ports
9 7, 8 OTRI with GE OTRI with GE
1
Select Data -> Traffic Descriptor from the menu bar as shown in Figure 143, “Traffic
descriptor” (p. 215).
2
Select Create to configure a new Traffic Descriptor as shown in Figure 144, “Create traffic
descriptor” (p. 216).
Click any entry under the User Label column to view the current status of the traffic descriptor.
3
Table 35, “Traffic descriptor parameters” (p. 216) provides description of Traffic descriptor
panel parameters:
Parameter Description
User Label Indicates the label for Traffic Descriptor
Parameter Description
Service Type Indicates the Traffic codification, according to international
standard conversion:
The Service Type drop-down list has the following options:
• guaranteedService
Serves High priority traffic for mission critical applications
that require loss–less delivery and minimal delay.
Guaranteed SLA denotes BW (CIR = PIR > 0), that is
always available regardless of any congestion conditions.
Traffic delivered using Guaranteed BW, is policed to the CIR
value with a burst window equal to the CBS.
• guaranteedService2
• regulatedService
Serves Medium priority traffic. The portion of bandwidth
between CIR and PIR (aka EIR) are partially available
under congestion conditions.
• regulatedService1
• regulatedService3
• regulatedService4
• bestEffortService
Serves Low priority traffic. Best Effort denotes BW (PIR >
CIR = 0), which may or may not be available per network
operator's reservation for Best Effort policy. It may therefore
be unavailable under congestion conditions
• backGroundService
• anyServiceClass
Note: Null traffic descriptor parameters encompassing PIR,
CIR, CBS, and PBS are all equal to zero (Starting from
Release 6.1.10).
CIR -Committed This is the guaranteed rate (expressed in kb/sec) of the data
Information Rate [kb/sec] flow (Effective Bandwidth) and it ranges from 0 to PIR value.
PIR - Peak Information This is the peak rate (expressed in kb/sec) up to which the
Rate [kb/sec] source can transmit and it ranges from 3 to physical-line-rate
of the relative Port
CBS - Committed Burst This is the committed number of bytes for which the source
Size [bytes] may transmit the CIR. The supported value range is 0 to 64
MBytes. A value greater than MTU (e.g. 2000) is advisable
PBS - Peak Burst Size This is the maximum number of bytes for which the source
[bytes] may transmit the PIR; it ranges from 2048 to 64 MBytes.
4
Click Cancel to return to the previous screen without saving.
5
Click Save & Exit to create a new Traffic Descriptor in the following described and leave the
page
6
Click Save & Continue to create a new Traffic Descriptor in the following described and create
another one.
7
The Traffic Descriptor tab displays the table that contains different traffic descriptor entries.
Click any entry under the User Label column to view the current status of the traffic descriptor.
The Traffic Descriptor panel displays the same parameters described for Create Traffic
Descriptor except the following parameter:
• State - Specifies the current state of the Traffic Descriptor.
9
Click Cancel to return to the previous page.
10
Click Deactivate to deactivate the active state of the traffic descriptor.
11
Click Save to store the changes.
12
Click Delete to remove the existing entries set for the parameters.
END OF STEPS
1
Select Data -> Queue Management from the menu bar as shown in Figure 145, “Queue
profile management” (p. 218).
2
Select the Show ghost objects check-box to configure the Queue Profile with ghost objects.
• User Label - specifies the user label of the Queue Profile.
• Status - specifies the status of the Queue Profile. It is visible only when the "Show ghosts
objects" is checked.
3
Click Create to configure a new Queue Profile as shown in Figure 146, “Create queue profile”
(p. 219).
4
Table 36, “Queue profile - new parameters” (p. 219) provides the description of Create Queue
Profile panel parameters:
Table 36, “Queue profile - new parameters” (p. 219) provides description of queue profile
parameters.
Parameter Description
User Label Specifies the canonical name assigned to WRED profile.
UpTh Green Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Green packets is 100
percent. This implies that all Green packets beyond this
point will be dropped. The default value is 90
LowTh Green Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Green packets starts to
rise above 0. The default value is 70
Max Prob of Green Pkts Specifies the drop probability (0 to 100) of Green packets
increases steadily from 0 (at Queue Profile Green Lower
Threshold) up to Queue Profile Green Drop Max
Probability (at Queue Profile Green Lower Threshold). The
default value is 80
UpTh Yellow Pkts Specifies the percentage of the buffer utilized after which
the drop probability of Yellow packets is 100 percent. This
implies that all packets beyond this point will be dropped.
The default value is 60
LowTh Yellow Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Yellow packets starts to
rise above 0. The default value is 50
Max Prob of Yellow Pkts Specifies the drop probability (0 to 100) of Yellow packets
increases steadily from 0 (at Queue Profile Yellow Lower
Threshold) up to Queue Profile Green Drop Max
Probability (at Queue Profile Yellow Lower Threshold). The
default value is 80
5
Click Save to store the settings and return to the previous page.
6
Click Cancel to revoke the changes and return to the previous page.
END OF STEPS
1
Click User Label hyperlink as shown in Figure 145, “Queue profile management” (p. 219), to
modify the Queue Profile as shown in Figure 147, “Queue profile management” (p. 220).
2
Table 37, “Modify queue profile parameters” (p. 222) provides the description of Modify Queue
Profile panel parameters:
Parameter Description
Index Defines the Queue Profile Index to be modified
User Label The label for the Modify queue profile instance
UpTh Green Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Green packets is 100
percent. This implies that all Green packets beyond this
point will be dropped. The default value is 90
LowTh Green Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Green packets starts
to rise above 0. The default value is 70
Max Prob of Green Pkts Specifies the drop probability (0 to 100) of Green
packets increases steadily from 0 (at Queue Profile
Green Lower Threshold) up to Queue Profile Green
Drop Max Probability (at Queue Profile Green Lower
Threshold). The default value is 80
UpTh Yellow Pkts Specifies the percentage of the buffer utilized after which
the drop probability of Yellow packets is 100 percent.
This implies that all packets beyond this point will be
dropped. The default value is 60
LoTh Yellow Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Yellow packets starts
to rise above 0. The default value is 50
Max Prob of Yellow Pkts Specifies the drop probability (0 to 100) of Yellow
packets increases steadily from 0 (at Queue Profile
Yellow Lower Threshold) up to Queue Profile Green
Drop Max Probability (at Queue Profile Yellow Lower
Threshold). The default value is 80
3
Click Cancel to return to the previous page.
4
Click Save to apply the changes and return to the previous page.
5
Click Deactivate to set the status to "not In Service" value.
6
Click Delete to remove the selected Queue Profile.
END OF STEPS
1
Select Color Profile from the Data menu as shown in Figure 148, “Color profile” (p. 222) .
2
The Color Profile tab displays the table that contains the existing color profiles.
3
Click Create to configure a new color profile as shown in Figure 149, “Color profile creation”
(p. 223) .
4
Table 38, “Color profile parameters ” (p. 223) provides description of Color Profile panel
parameters:
Parameters Description
Color Profile Mode Specifies the color profile mode. The default
value is Priority
User Label Specifies the label for the new color profile
Priority Bits 0 to 7 Specifies the priority bits. The valid range is
0-7. The values are:
• green
• yellow
• red
5
Click Cancel to cancel the settings and return to the previous page.
6
Click Save & Exit to save the settings and return to the previous page.
7
Click Save & Continue to save the settings and continue to create another color profile.
END OF STEPS
1
Select Data -> OAM Management -> OAM Resource config. -> MD from the menu bar as
shown in Figure 150, “Maintenance domain” (p. 225).
2
Click Create to configure a new Maintenance Domain.
3
Click the radio button to select the existing Maintenance Domain entry.
4
Table 39, “Maintenance Domain Parameters” (p. 225) provides description of Modify
Maintenance Domain panel parameters:
Parameter Description
MD Label Specifies the maintenance domain label.
The default values is MD#1
Name Specifies the name for the maintenance
domain
MHFCreation The values are:
• defMHFdefault
Status Specifies the maintenance domain status.
The values are:
• up
• down
Format Specifies the MD format. The values are:
• charString
• None
Level Specifies the maintenance domain levels.
The valid range is from Level0 to Level7
5
Click Save to save the settings and return to the previous panel.
6
Click Cancel to cancel the settings and return to the previous panel.
7
Click Delete to remove the select the Maintenance Domain entry from the tabular list.
END OF STEPS
1
Select the maintenance domain entry from the panel as shown in Figure 150, “Maintenance
domain” (p. 225).
2
See Table 39, “Maintenance Domain Parameters” (p. 225)that provides details on the domain
parameters, select the MD to modify and update the parameters.
END OF STEPS
1
Select Data -> OAM Management -> OAM Resource config. -> MA from the menu bar as
shown in Figure 151, “OAM resource config. - maintenance association” (p. 227).
2
Table 40, “Maintenance association - range parameters” (p. 227) provides description of
Range panel parameters:
Parameter Description
Search Filter Specifies the search criteria. The values are
Show all or Specify Criteria
MD From To Specifies the MD range from 1-8
MA From To Specifies the MA range from 1-128
3
Click Search to filter the Maintenance Association based on the range selected.
4
Click Create to configure a new Maintenance Association. The following screen is displayed as
shown in “Purpose” (p. 0).
5
Table 41, “Maintenance association - create parameters” (p. 228) provides description of
Create Maintenance Association panel parameters:
Parameter Description
MD Specifies the MD number. The values are MD#1 and
MD#2
MA Index Specifies the index for new Maintenance Association
MA Name Specifies the new name for Maintenance Association
Format Specifies the format for new Maintenance Association.
Status Specifies the current status. The values are:
• Up
• Down
MHFCreation The values are:
• defMHFdefault
CCM Interval The values are:
• interval100ms
• interval10ms
• interval3.33ms
• interval10s
• Interval1s
• interval1min
• interval10min
Vpn Id Specifies the Vpn Id of the equipment
6
Click Save to save the settings and return to the previous panel.
7
Click Cancel to cancel all the settings and return to the previous panel.
END OF STEPS
1
Click Search to view the existing or newly created maintenance association.
2
Table 42, “Maintenance association - Modify ” (p. 228) provides description of the maintenance
association parameters.
Item Description
MA Index Specify index value for new maintenance association
MA Name Specifies the new label for maintenance association
MHFCreation Specifies the MHF creation value.
Vid Specifies the VLAN id of the equipment
Status Specifies the current status. The values are:
• Up
• Down
Format Specifies the format for new Maintenance Association.
The values are:
• charString
CCM Interval The values are:
• Interval1s
• interval10s
• interval1min
• interval10min
• interval10ms
• interval3.33ms
• Interval100ms
3
Click Save to store the modified values for the maintenance association.
4
Click Cancel to quit without altering the parameter values.
END OF STEPS
1
Select Data -> OAM Management -> OAM Resource config. -> MEP from the menu bar as
shown in Figure 152, “OAM management - MEP” (p. 229).
2
Table 43, “MEP - range panel parameters” (p. 230) provides description of Range panel
parameters:
Parameter Description
Search Filter Specifies the search criteria. The supported value
is Specify Criteria.
MD From To Specifies the MD range from 1-512
MA From To Specifies the MA range from 1-512
MEP From To Specifies the MEP range from 1-8191
3
Click Create to configure a new MEP. The following screen is displayed as shown in Figure
153, “Create MEP” (p. 230)
4
Table 44, “MEP parameters” (p. 231) provides description of Create MEP panel parameters:
Parameter Description
MA Label Specifies the MA label for the MEP
MEP Identifier Specifies the MEP identifier for the MEP. The MEP ID is in
the range 1 to 8191.
MEP Association Specifies the MEP Association for the MEP.. The MEP
Association supports:
• Port
• pw
If Index Specifies the If Index value for the MEP
LTM/ CCM Priority Specifies the LTM Priority. The default valid range is 0-7
Parameter Description
Status Indicates the current status.
The values are:
• Up
• Down
Direction Indicates the MEP Direction.
The values are:
• Up
• Down
Active Specifies the MEP active state.
The values are:
• True
• False
CCIEnable Specifies the MEP CCIEnable state:
• True
• False
LBM Section
LBM priority Specifies the LBM Priority. The valid range is 0-7
Tx LBM Message Indicates the transmission of the LBM message. The value
range is 1-1024.
LBM Packet Length Specifies the LBM packet length. The maximum supported
bytes is 1564 and the default value is 64 bytes.
5
Click Cancel to revoke all the settings and return to the previous panel.
6
Click Save to save the settings. Click Search to display the new MEP list. The following screen
is displayed as shown in Figure 154, “OAM resource config - mep ” (p. 233).
7
Select the radio button and Click the Activate hyperlink to activate the configured MEP list.
The MEP Identifier, Direction, If Index, CCIEnable, Active, Status, LinkTrace, LoopBack,
CCMDB, LPT (Link Pass Through) parameters are displayed.
Note: The priority values (1- Background, 3-Regulated(2), 5-Regualated(1)) for Ethernet
OAM packets sent by UP MEP on UNI are not allowed if the NNI TUSEG’s PHB profile is
selected from PHB range 1 (i.e. 5P3D mode).
END OF STEPS
1
To modify an MEP, navigate to the MEP screen and click Search to display the configured
MEPs.
2
Click on the MEP to modify, the Modify MEP screen is displayed. Modify the MEP parameters
as described in Table 44, “MEP parameters” (p. 231)
3
Click Save to save the modifications or click Cancel to return to the previous screen without
saving.
4
To Delete an MEP, check the checkbox provided for the configured MEP and click Delete.
END OF STEPS
1
Select Data → EFM tool option from the menu bar.
The EFM tool panel is displayed with the Configuration and Link Monitoring tabs. By default
the Configuration tab is opened.
2
Click the Link Monitoring tab to display the Link Monitoring parameters as shown in Figure
156, “Link monitoring” (p. 235). Link monitoring tools are used for detecting and indicating link
faults under a variety of circumstances.
3
Specify the Link Monitoring parameters as described in Table 45, “Link monitoring parameters”
(p. 237).
Parameter Description
Errored Symbol Period Event Specifies the number of symbol errors that occurred
(errored symbols per second) during a specified period that exceeded a threshold.
These are coding symbol errors.
Errored Frame Period Event Specifies the number of frame errors within the last N
(errored frames per N frames) frames that exceeded a threshold.
Errored Frame Event (errored Specifies the number of frame errors detected during
frames per second) a specified period that exceeded a threshold.
Errored Frame Seconds (errored Specifies the number of errored seconds (one
secs per M seconds) second intervals with at least one frame error) within
the last M seconds that exceeded a threshold
4
Click Event Log tab to display the Event Log panel as shown in Figure 157, “Event log”
(p. 237).
5
Click Show Log hyperlink to display the Figure 158, “Show event log” (p. 238).
6
Click Refresh to refesh the values.
END OF STEPS
1
Select Data -> OAM Management -> On Demand Tool -> Delay Measurement, the Delay
Measurement screen is displayed as shown in Figure 27, “On-Demand Delay Measurement”
(p. 68).
2
Click Create to create the On-Demand DM as shown in Figure 160, “Create On-Demand Delay
Measurement” (p. 239).
3
Click Select, to select the MEP Id.
4
Select the Priority between 0 to 7 from the drop-down.
5
Select the Destination as MEP ID or Mac Address. Provide the MEP ID or the Mac Destination
address as per the destination selection.
6
Enter the number of samples (pkts) between the value range of 1 to 100.
7
Select the Period in terms of Intervals.
8
Specify the Frame Size as Random or a value between 64 and 9600.
9
Click Save to save the On Demand DM configuration or click Cancel to return to the previous
screen without saving.
END OF STEPS
1
Navigate to the Delay Measurement Tool screen, select the Search Filter. Specify the MEP-
ETH-OD-DM To and From values and click Search/Refresh to display the configured On-
Demand DM's in this range as shown in Figure 161, “Modify On-Demand DM” (p. 239)
2
Select the DM to modify and update the parameters as explained in Create On-demand DM.
3
Click Save to save the DM modification or click Cancel to return to the previous screen without
saving.
4
To Delete a On-Demand DM, click Search/Refresh to locate the available configured DM's,
select and Delete.
END OF STEPS
1
Select Data -> OAM Management -> Alarm Indication Signal, the Alarm Indication Signal
screen is displayed as shown in Figure 162, “Alarm Indication Signal” (p. 240).
2
Click Create to create an AIS as shown in Figure 163, “Alarm Indication Signal” (p. 242)
3
Click Select to select the MEP ID.
4
Select AIS Enable as True or False.
5
Select the Priority between the range of 1 and 7.
6
Select the Client MEL between the range of 0 and 7.
7
Select the Period in terms of Interval.
8
Click Save&Activate to save the configuration and activate the AIS or Click Cancel to return to
the previous screen without saving.
END OF STEPS
1
Navigate to the AIS screen as described under Create AIS. Select the Search Filter from the
drop-down. Specify the From and To MEP values and click Search/Refresh as shown in
Figure 164, “Modify Alarm Indication Signal” (p. 243).
2
Select the AIS to modify and update the parameters as explained in Create AIS.
3
Click Save to save the AIS modification or click Cancel to return to the previous screen without
saving.
4
To Delete a AIS, click Search/Refresh to locate the available configured AIS, select and Delete.
END OF STEPS
1
Click Data ->PM Threshold as shown in Figure 165, “Performance Monitoring Threshold”
(p. 244).
2
Click Create to create an Ethernet Port Threshold as shown in Figure 166, “Create PM
Threshold” (p. 245)
3
Specify a User Label and select the Granularity in intervals on minutes or hours.
4
Specify the Enable value of the Rx Profile parameters as True or False and specify the Clear
and Raise criteria for each Rx Profile.
5
Specify the Enable value of the Tx Profile parameters as True or False and specify the Clear
and Raise criteria for each Tx Profile.
6
Click Save and Activate to create the PM threshold profile and activate or click Cancel to
return to the previous screen without saving.
END OF STEPS
1
Navigate to the PM Threshold screen as described in the Create PM Threshold section. Under
the Eth Port Threshold, click to select the PM threshold instance to modify, the Modify
Threshold Profile screen is displayed as shown in Figure 167, “Modify PM Threshold” (p. 245).
2
Modify the User Label or the Rx and Tx profiles and click Save to save the modifications or
click Cancel to return to the previous screen without saving.
3
To Delete a PM Threshold, click to select the configured PM threshold under the Eth Port
Threshold section, click Delete and confirm Deletion.
END OF STEPS
1
Select Protection -> 1:1 Tunnel Protection from the menu bar as shown in Figure 168, “Fast
facility protection group management” (p. 247).
2
Click Create to configure a new Fast Facility Protection Group as shown in Figure 169, “Fast
facility protection group - create” (p. 248).
Table 46, “Fast facility protection group parameters” (p. 248) provides description of Create
Fast Facility Protection Group panel parameters:
Parameter Description
Working Tunnel Specifies the working tunnel for the FFP group. Click Select to
obtain it from the list
Protecting Tunnel Specifies the Protecting Tunnel for the FFP group. Click Select
to obtain it from the list
Layer Select the Layer from the combo-box. The default value is
TUNNEL
Revert Tim (min) Specifies the revert time in minutes. The valid range is 0-12 and
the single WTR=51 hours (3060 minutes) is also supported.
Protection Type Specifies the protection type. The default values is APSBIDIR.
The values available are:
• APSBIDIR
• DHOME-COLON
Revertive Specifies the revertive values for the FFP group.
The options are:
• Yes- The revertive option can be configured by selectingY
• No- The non-revertive option can be configured by SelectingN
Note: Default value is Y.
Hold Off Time (msec) Specifies the hold off time. The valid range is 0-10000
milliseconds
Parameter Description
APS PHB Specifies the APS PHB profile for the FFP group.
The supported values are:
• EXP0
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
Label Allows to define a label for the tunnel.
Parameter Description
DHOMEAPS Specifies the type of the APS indication transmitted for
dual-homing.
The supported values are:
• NONE - No Dual-homing APS indication is transmitted.
• R-APS - Only R-APS packet is transmitted as Dual-homing
APS indication
• CCMFLAG - Only CCM packet with flag bit set is transmitted
as Dual-homing APS indication
• BOTH - Both R-APS and CCM packet with flag bit set are
transmitted as Dual-homing APS indications
4
Click Save to store all the settings and return to the previous page.
5
Click Cancel to revoke all the settings and return to the previous page.
END OF STEPS
1
Select Communication -> NE Gen. Config -> NE Discovery option as shown in Figure 170,
“NE discovery - Site Header 1” (p. 251). Select PC from the drop-down.
Table 47, “NE Autodiscovery” (p. 252) provides description of NE autodiscovery parameters.
Table 47 NE Autodiscovery
Parameter Description
Site Identifier Target IDentifier of the target network
element for this command. 40
hexadecimal character NSAP address
may be used to address an NE with
unknown TID.
Date Shows the current date in the <year>
-<month>-<day> format
Time Shows the current time in the
<hour>-<minute>-<second> format
END OF STEPS
3.51.5 Steps
1
Configure OTRI pack on Slot 3, Slot 4, and STM-1 SFP.
2
In slot 4 of OTRI pack choose STM-1 port.
3
Select Protection tab. In Protected Access Identifier select slot 3 STM-1 port as protected port.
4
The following screen is displayed after the configuration is complete.
END OF STEPS
Use the following procedure to configure the IP address of the DCN Physical interface.
1
Select Communication -> DCN Phys. If -> IP Address option.
Result: NE Generic Cfg panel is displayed as shown in
Parameter Description
MAC ADDRESS (Medium Access Control address) - This is the MAC
address assigned to the card. Note that this parameter
can only be read and cannot be modified.
IP Address (Internet Protocol address) - This is the IP address of
the NE. The entry box allows to digit the IP address of
the NE. The supported value range is {1-99,
101-126,128-223}- {0-255} - {0-255} - {0-254}.
Subnet Mask The entry box for subnet mask of the network to which
the NE is connected. The supported value range is
{128-255} - {0-255} - {0-255} - {0-255}. The mask, in
binary representation, must contain a contiguous string
of 1s (the network portion) and a contiguous string of
0s (the host portion).
2
Click Save to save the configuration settings.
END OF STEPS
1
Select Communication -> DCN Phys. If -> IP Address option.
2
Modify the IP address and the subnet mask as described in Table 48, “IP address settings”
(p. 257) and click Save to save the IP address.
END OF STEPS
1
Select Communication -> DCN Phys. If -> LAN manag. The Customer LAN Management
tab displays the Customer LAN Management panel as shown in Figure 173, “DCN physical
interface page - LAN management” (p. 257).
Parameter Description
OSI Protocol OSI. Determines if the OSI Protocol will be run
on the customer LAN or not.
The supported values are:
• N: OSI Protocol is disabled on the Customer
LAN
• Y: OSI Protocol is enabled on the Customer
LAN
Internet Protocol Determines if the Internet Protocol will be run on
the customer LAN.
The supported values are:
• N (Internet Protocol is disabled on the
Customer LAN)
• Y (Internet Protocol is enabled on the
Customer LAN)
Integrated ISIS Determines if the Integrated IS-IS Protocol will
be run on the customer LAN or not.
The supported values are:
• N: Integrated IS-IS Protocol is disabled on the
Customer LAN.
• Y: Integrated IS-IS Protocol is enabled on the
Customer LAN.
Note: The IS-IS over PPPoE tunnel label should
be unique in the CPE.
Proxy Address Resolution Protocol Proxy Address Resolution Protocol. Determines
if the ARP proxy is enabled or disabled on the
Customer LAN.
The supported values are:
• Y - Proxy Address Resolution Protocol is
enabled on the customer LAN
• N - Proxy Address Resolution Protocol is
disabled on the customer LAN
Gateway Address The default gateway router's IP address. The
supported value range is (1-199, 101-126,
128-223) - (0-255) - (0-255) - (1-254). The
default gateway address is 0-0-0-0 or the
previously existing value.
MAC address The Media Access Control address of the
Network Element.
Parameter Description
Port Speed Selection Determines the Port speed.
The supported port speed values are:
• 10: 10Mb/s port speed
• 100: 100Mb/s port speed
The default port speed selection is 100 or the
previously existing value.
OSPF Determines whether or not the OSPF protocol
will be functional on the Customer LAN.
The supported values are:
• Y : OSPF is enabled on the Customer LAN
• N : OSPF is disabled on the Customer LAN
The default OSPF value is N or the previously
existing value.
OSI area Determines to which OSI Area the Customer
LAN belongs. The supported value is 1.
Subnet Mask The subnet mask of the network to which the NE
is connected. The supported value range for
subnet mask is (128-255) - (0-255) - (0-255) -
(0-255). The default value is 255-255-255-255 or
the previously existing value.
IP Address of NE The internet protocol address of the NE. The
supported value range for the IP address is
(1-99, 101-126, 128-223) - (0-255) - (0-255) -
(1-254). The default IP address is 10-10-10-10 or
the previously existing value.
Note:Values 0-0-0-0 as IP address is not
supported.
Channel used by Determines the Management Channel in use.
The supported values are:
• MNGPLANE
• NONE
Port Duplex Mode Selection Determines the port duplex mode selection
The support port duplex mode values are:
• Half Duplex Mode
• Full Duplex Mode
The default port duplex value is Full or the
previously existing value.
2
Click Save to save the configuration.
END OF STEPS
1
Navigate to the Customer LAN screen and click on the Customer LAN to modify. Modify the
Customer LAN parameters as described in table Table 50, “Modify a Customer LAN” (p. 260)
Parameter Description
IP Determines if the Internet Protocol will be run on
the customer LAN.
The supported values are
• Y:Internet Protocol is enabled on the Customer
LAN
• N: Internet Protocol is disabled on the
Customer LAN
LANIP Determines the IP address of the NE. The
address 0-0-0-0 is not allowed. Neither the
network nor the host portion of the address when
viewed in binary format may be all 0s or all 1s.
The supported value range is {1-99,
101-126,128-223} - {0-255} - {0-255} - {1-254}.
The default value is 10-10-10-10 or the
previously existing value.
LANMASK Determines the subnet mask of the network the
to which the NE is connected. The mask, in
binary representation, must contain a contiguous
string of 1s (network) and a contiguous string of
0s (host). The supported values are {128-255} -
{0-255} - {0-255} - {0-255}. The default value is
255-255-255- 255 or the previously existing
value.
Parameter Description
LANGW Is the default gateway router's IP address.
Leading zeros are allowed. A value of 0-0-0-0
disables the functionality associated with the use
of a default gateway. Neither the network nor the
host portion of the address when viewed in
binary format may be all 0s or all 1s. The
supported value range is {1-99,
101-126,128-223} - {0-255} - {0-255} - {1-254}
{0}-{0}-{0}-{0}. The default value is 0 - 0 - 0 - 0 or
the previously existing value.
OSI Protocol OSI. Determines if the OSI Protocol will be run
on the customer LAN or not.
The supported values are:
• N: OSI Protocol is disabled on the Customer
LAN
• Y: OSI Protocol is enabled on the Customer
LAN
Internet Protocol Determines if the Internet Protocol will be run on
the customer LAN.
The supported values are:
• N (Internet Protocol is disabled on the
Customer LAN)
• Y (Internet Protocol is enabled on the
Customer LAN)
Integrated ISIS Determines if the Integrated IS-IS Protocol will
be run on the customer LAN or not.
The supported values are:
• N: Integrated IS-IS Protocol is disabled on the
Customer LAN.
• Y: Integrated IS-IS Protocol is enabled on the
Customer LAN.
Note: The IS-IS over PPPoE tunnel label should
be unique in the CPE.
OSI area Determines to which OSI Area the Customer
LAN belongs. The supported value is 1.
Parameter Description
Subnet Mask The subnet mask of the network to which the NE
is connected. The supported value range for
subnet mask is (128-255) - (0-255) - (0-255) -
(0-255). The default value is 255-255-255-255 or
the previously existing value.
IP Address of NE The internet protocol address of the NE. The
supported value range for the IP address is
(1-99, 101-126, 128-223) - (0-255) - (0-255) -
(1-254). The default IP address is 10-10-10-10 or
the previously existing value.
Note:Values 0-0-0-0 as IP address is not
supported.
Gateway Address The default gateway router's IP address. The
supported value range is (1-199, 101-126,
128-223) - (0-255) - (0-255) - (1-254). The
default gateway address is 0-0-0-0 or the
previously existing value.
MAC address The Media Access Control address of the
Network Element.
END OF STEPS
1
Select Rack1 > Shelf1 > Board2 > Module10 from the tree area as shown in Figure 174,
“Accessing the Module” (p. 264).
Click Save.
2
On the left navigation tree select SFP-1-1-2-8 > Port.
Result: The Ethernet Port Management is shown.
3
Click CREATE MPLSIF-1-1-2-8.
Result: MPLSIF Ethernet Port Management is created.
4
From State section set the value for Admin. State to up from the drop down list.
5
Click Save.
Result: Administrative status, set by management. The values are up or down.
6
Select Communication -> DCN Phys. If -> IP Address option.
Result: The IP address of Network Element is shown.
7
Enter the IP addess of NE.
Click Save to save the configuration settings.
8
Select Communication -> DCN Phys. If -> LAN manag.
Result: The Customer LAN Management is as shown.
9
Enter the values for Customer LAN Management parameters.
Click Save to save the configuration settings.
Note: See 3.53 “Configure LAN Management” (p. 258) for more details.
10
Select Communication -> DCN Phys. If -> Auto Dcn.
Result: The Auto Dcn list panel as shown in Figure 178, “Auto Dcn List” (p. 268).
Parameter Description
Access IDentifier Specifies the Access Identifier for the
selected port
DCN Enabled Determines DCN remote setup can be
enabled/disabled per port
The supported values are:
• N (DCN remote setup is disabled per port)
• Y (DCN remote setup is enabled per port)
NAT State The supported values are:
• ACTIVE
• DEACTIVE
Operation Click Apply Change to save the changes.
Click Apply Changes to enable the DCN
END OF STEPS
1
Select Communication -> OSPF -> OSPF Area from the menu bar. The OSPF Area tab is
displayed as shown in Figure 179, “OSFP Area” (p. 269)
2
Click Create to configure a OSPF Area as shown in Figure 180, “Configure OSPF” (p. 269)
3
Select the Access Identifier (AID) OSPF Area - the supported value range is 1 to 3.
4
Select the OSPF Area ID. The supported value range is {0-255} - {0-255} - {0-255} - {0-255}.
5
Click Save to save the settings and return to the previous page.
6
Click Cancel to return to the previous screen without saving.
END OF STEPS
1
Click OSPF Area hyperlink to modify OSPF Area
2
Select the OSPF Area ID. The supported value range is {0-255} - {0-255} - {0-255} - {0-255}.
3
Click the drop-down menu for Md5 Enable field.
4
Click Save to store all the settings and return to the previous page.
5
Click Cancel to revoke all the settings and return to the previous page.
END OF STEPS
1
Select Communication -> OSPF -> OSPF IF from the menu bar.
2
Click Select to select the Access Identifier (AID) type.
Result: The AID Type selection window appears.
3
Click one of the radio buttons to select the AID type from the AID type selection window.
4
If LAN-1 is selected in AID Type selection window, the following screen appears.
Result:
5
If MPIFIB is selected in AID Type selection window, the following screen appears.
Result:
6
Click the drop-down menu for Authentication field.
The following fields is displayed if MD5 is selected for the Authentication field.
• Key ID: The value ranges from 1- 255.
• Key value: The value ranges from 1 - 16 characters.
7
Click Save to store all the settings and return to the previous page.
END OF STEPS
1
Select Communication-> Network Domain-> NSAP to view the Network Service Access Point
screen as shown in Figure 183, “Network Service Access Point” (p. 274)
2
Click the drop-down menu provided for the lookup type field to select the lookup type.
3
Click Search to retrieve the available NSAPs. The available NSAPs are retrieved as shown
below:
END OF STEPS
1
Select Communication -> Network Domain -> IP Routing option from the menu bar, the is
displayed as shown in Figure 185, “IP routing configuration” (p. 276).
2
The above table displays the existing IP route entry along with its attributes.
3
Click Create hyperlink to configure a new IP route as shown in Figure 186, “IP routing creation”
(p. 277) .
4
Table 51, “IP routing parameters ” (p. 277) provides the description of IP Routing panel
parameters:
Parameter Description
Access Identifier Access Identifier, specifies the in-band management interface or
Management LAN. The supported values are:
LAN-1: Customer LAN
MPIFIBPORT: {1}-{1}-{2,3,4}-{1-20}. Refers to the Management
Plane In-Fiber In-Band interface associated to local port.
Destination Address This is the IP address of the destination host or network (in the
format nnn-nnn-nnn-nnn). If MASK parameter is not all '1' (i.e., a
network route is specified), the host portion of DESTADDR must
be all '0'. The supported value range is {1-99, 101-126,
128-223}-{0-255}-{0-255}-{0-254}
IP Mask Indicates the IP subnet mask of the route (in the format
nnn-nnn-nnn-nnn. The supported value range is {0-255}-{0-255}-
{0-255}-{0-255}.
Parameter Description
Nexthop The IP address of the next interface in the route in the format
nnn-nnn-nnn-nnn. The supported value range is {1-99,
101-126, 128-223}-{0-255}-{0-255}-{0-254}.
Metric This is the cost metric of the route. The valid range is 1- 65535
5
Enter the Access Identifier for the new IP route. Click Select to choose the AID type. The
supported values are MPIFIBPORT, and LAN.
6
Select one of the radio button to choose the AID value and click Send hyperlink, the choice are
added in the relevant field of the previous page. Cancel hyperlink allows to leave the window.
7
Enter the Destination Address and Subnet mask for the IP route to be configured.
8
Enter the Metric value and set the Advertise value to either Y or N.
9
Click Save & Exit to save the settings and return to the window.
10
Click Save to store the settings and return to the previous panel.
11
Click Cancel to revoke all the settings and return to the previous page.
END OF STEPS
1
Select the IP configuration to delete and click Delete. A dialog is displayed, requesting
conformation. Click Yes to proceed or No to cancel deletion.
END OF STEPS
Use the following procedure to configure the OSI Network Element area:
1
Select Communication -> Network Domain -> OSI Mng -> OSI NE Area option as shown in
Figure 187, “OSI NE area” (p. 278).
Parameter Description
OSI AREA Determines an access Identifier for an OSI area.
Level 3 Initial Domain Part Assigns the initial domain part of the manual area
address (6 hexadecimal characters). It is
constituted by the AFI, IDI and IDI PAD fields of the
NSAP address.
Level 3 DFI DFI part of the NSAP address (fourth octet) 2
hexadecimal character.
Level 3 Organization Assigns the organization field of the manual area
address (6 hexadecimal characters)
Level 3 Reserved Assigns the reserved field of the manual area
address (4 hexadecimal characters)
Parameter Description
Level 3 Routing Assigns the routing domain and routing area within
the routing domain of the manual area address (8
hexadecimal characters)
Level 3 System Identifier This is the system identifier assigned to the card
(12 hexadecimal characters)
2
Click Save to save the configuration and return to the previous screen
END OF STEPS
Use the following procedure to configure the OSI Network Element area:
1
Select Communication -> Network Domain -> OSI Mng -> OSI ULC Report option as shown
in Figure 188, “OSI NE area” (p. 280).
2
Click to select the Layer 3 IS Level, to provision the IS level. The supported values are Level
1IS and Level 2IS.
3
Click Saveto save the OSI ULC report.
END OF STEPS
1
Select Rack XX> Shelf XX> Board XX> Module XX from the tree area.
Result:
Parameter Description
Port specifies a port.
Primary state Specifies the primary state to which the
equipment is set.
Admin state Allows to set the Administration status.
The choices are:
• up= active state
• down= not active state
Operational state Specifies the actual state of the resource.
2
Click Save to save the configuration.
END OF STEPS
Parameter Description
MEP Specifies the Maintenance Entity Point. For
enabling MEP function, the direction of MEP is
according to the direction of Tunnel Segment.
The values are ENABLE or DISABLE
MEG ID Specifies the Maintenance Entity Group
Identifier. This parameter must be unique in
the system.
MEP ID Specifies the Maintenance Entity Point
Identifier. This parameter is unique inside
MEG ID. If provisioned, this parameter must
be different from EXP MEP ID. The MEP ID is
in the range 1 to 8191
CV Rx Enabling/disabling capability to detect the Loss
Of Continuity (LOC) alarm, associated to Sink
MPLS Section Termination.
CV Tx Enabling/disabling capability to detect the Loss
Of Continuity (LOC) alarm at remote node,
associated to Source Section Termination.
Parameter Description
CV Period Specifies the period (1/Frequency) of CV
packet transmission
Protection Switch for DDM-SD This parameter enables/disables the
Protection Switch feature for Signal Degrade
detected on the basis of the optical power
monitored by Digital Diagnostic Monitoring
(DDM) capable SSF/TSF. The System
behavior is detailed in OAM RRS Core
Alarm Profile The Alarm Severity Assignment Profile (ASAP)
name to use with this facility.
EXP MEP ID Expected MEP values associated to Sink PW
Segment Termination, also called Peer
MEP-ID.
L2ENCAPPROF Aid L2 encapsulation profile AID to be used in
case of mapping of MPLS over Ethernet when
a switched network is present.
Click Save to save the configuration.
(T)MPLS Management
3.61 Overview
3.61.1 Purpose
Use the following procedures that allows the user to manage the (T)MPLS domain:
• Global Network - Allows to manage all the parameters assigned to T-MPLS.
• L2 Encapsulation Profile - Allows to manage the L2 Encapsulation Profile.
• Quality of Service - Allows to manage the quality of service.
• Tunnel Management - Allows to manage the tunnel management.
• PW Management - Allows to manage the T-MPLS Pseudowire.
• Ethernet Services XC - Allows to manage the Client Services based on T-MPLS.
3.61.2 Contents
1
Select (T)MPLS -> L2 Encapsulation Profile from the menu bar as shown in Figure 189,
“Layer 2 encapsulation profile management” (p. 285).
2
Select the check-box from the table to choose the existing Layer 2 Encapsulation Profile. Table
53, “Layer 2 encapsulation profile management parameters” (p. 285) provides the description of
Layer 2 Encapsulation Profile Management parameters:
Parameter Description
Access Identifier Specifies the access identifier to the
L2ENCAP profile stored in the system. The
values are in the range L2ENCAPPORF
1-32. An hyperlink on this object is present
only if the L2ENCAP Profile can be modified,
that is when the L2ENCAP Profile is not the
default one or is not in use
MAC Destination Address Specifies the Medium Access Control
Address to be used in the case of mapping
of MPLS over Ethernet when a switched
network is present
Tagged Flag Specifies the Tagged/Untagged flag
VLAN-ID Specifies the VLAN identifier to be used in
case of mapping of MPLS over Ethernet
when a switched network is present (802.1Q
mapping)
Priority Specifies the priority value for Tagged
Ethernet frame
The values available are:
• 0-7
• 0xFF
Drop Eligible Specifies Drop Eligible indication according
to 802.1ad
Parameter Description
In-Use Specifies if the L2ENCAP Profile is
referenced by a Tunnel Segment or
Pseudowire Segment
3
Click Delete that deletes the selected L2ENCAP Profile.
4
Click Create to configure a new Layer 2 Encapsulation Profile.
5
Table 54, “L2 encapsulation profile - create parameters” (p. 286) provides the description of
Create L2 Encapsulation Profile panel parameters:
Parameter Description
MAC Destination Address Specifies the Medium Access Control
Address to be used in the case of mapping
of MPLS over Ethernet when a switched
network is present
The values are 12 hexadecimal characters
Tagged Flag Specifies the Tagged/Untagged flag
This parameters is mandatory if
TAG=TAGGED, otherwise it is not valid.
VLAN Identifier Specifies the VLAN identifier to be used in
case of mapping of MPLS over Ethernet
when a switched network is present (802.1Q
mapping). The parameter is mandatory if
Tagged Flag=TAGGED, otherwise it is not
valid
Priority Specifies the priority value for Tagged
Ethernet frame. It is not valid if Tagged
Flag=UNTAGGED
The parameter is invalid if TAG=
UNTAGGED
Drop Eligible Specifies Drop Eligible indication according
to 802.1ad. It is not valid if Tagged
Flag=UNTAGGED
6
Click Save to store the all the settings and return to Figure 189, “Layer 2 encapsulation profile
management” (p. 285).
7
Click Cancel to revoke all the changes and return to Figure 189, “Layer 2 encapsulation profile
management” (p. 285).
8
Click Access Identifier link.
9
Enter the 12 different hex-decimal values for the MAC destination address.
10
Set the Tagged Flag to either Tagged or Untagged. If TAG=TAGGED, then VLANID, Priority,
and Drop Eligible required valid values.
11
Table 55, “L2 encapsulation profile - modify” (p. 286) provides the description of Modify L2
Encapsulation Profile panel parameters:
Parameter Description
Access Identifier Specifies the L2 Encapsulation Profile to
modify
MAC Destination Address Specifies the Media Access Control Address
to be used in case mapping of MPLS over
Ethernet when a switched network is
present. In case of mapping of MPLS over
Ethernet when a switched network is present
Tagged Flag Specifies the Tagged/Untagged flag
VLAN Identifier Specifies the VLAN identifier to be used in
case of mapping of MPLS over Ethernet
when a switched network is present (802.1Q
mapping). The parameter is mandatory if
Tagged Flag=TAGGED, otherwise it is not
valid
Priority Specifies the priority value for Tagged
Ethernet frame. It is not valid if Tagged
Flag=UNTAGGED
Parameter Description
Drop Eligible Specifies Drop Eligible indication according
to 802.1ad. It is not valid if Tagged
Flag=UNTAGGED
In-Use Specifies if the L2 Encapsulation Profile is
referenced by a Tunnel Segment or
Pseudowire Segment
12
Click Cancel that returns to Figure 189, “Layer 2 encapsulation profile management” (p. 285)
13
Click Save that applies the previous selection and return to Figure 189, “Layer 2 encapsulation
profile management” (p. 285).
END OF STEPS
1
Select TMPLS-TP/T-MPLS -> Quality of Service -> PHB Profile. Click Create to configure a
new PHB Profile as shown in Figure 190, “PHB profile create” (p. 288).
2
The Per Hop Behavior Profile Management panel contains EXP Bit i that associates a PHB
class to the MPLS packets with EXP=i, where i=0 to 7.
3
Click Create new 8P0D profile hyperlink to configure a new PHB profile as shown in Figure
191, “8P0D PHB profile - create” (p. 288) .
4
Set the EXP bits for individual CoS values. The valid range is 0-7.
5
Click Cancel to revoke all the changes and return to the previous page.
6
Click Save to store the all the settings and return to the previous page.
7
Select the configured PHB Profile from the table. Click.
8
Click on the Access Identifier hyperlink, to display the following page as shown in Figure 192,
“Modify PHB profile management” (p. 289).
9
Table 56, “Modify a PHB profile” (p. 290) provides the description to Modify a PHB Profile .
The panel contains the following parameters:
Parameter Description
Access Identifier It defines the PHB Profile to modify
EXP Bit 0 to 7 It associates a PHB class to the MPLS
packets with EXP=i where i= 0 to 7
Parameter Description
In Use Specifies if the PHB is referenced by a
Tunnel Segment or Pseudowire Segment.
10
Click Cancel to return to the previous page.
11
Click Save to apply changes and return to the previous page.
END OF STEPS
1
Select TMPLS/MPLS-TP -> Quality of Service -> OAM PHB Profile from the menu bar
Figure 190, “PHB profile create” (p. 288).
2
Click Create new OAM PHB profile hyperlink to configure a new PHB profile as shown in
Figure 191, “8P0D PHB profile - create” (p. 289) .
The Create OAM PHB Profile panel contains OAM Type i that associates a PHB class to the
OAM packet with Type = i, where i= 1 to 8.
3
Select the OAM Type from the drop-down box. The available options are: EF, HIGH2, AF21,
AF22, AF41, AF42, DE-G, DE-Y
Click Save to store the settings and return to the previous page.
4
Click Cancel to revoke all the changes and return to the previous page.
5
Select the previously configured PHB Profile from the table and click Delete to remove from the
list.
6
Click on the Access Identifier hyperlink, to display the following page as shown in Figure 192,
“Modify PHB profile management” (p. 290).
7
Table 56, “Modify a PHB profile” (p. 290) provides the description of Modify a PHB Profile
panel contains:
Parameter Description
Access Identifier It defines the PHB Profile to modify
EXP Bit 0 to 7 It associates a PHB class to the MPLS
packets with EXP=i where i= 0 to 7
In Use Specifies if the PHB is referenced by a
Tunnel Segment or Pseudowire Segment
8
Click Cancel to return to the previous page.
9
Click Save to apply changes and return to the previous page.
END OF STEPS
1
Select Protection -> MPLS-TP Protection from the menu bar as shown in Figure 196,
“MPLS-TP Ring Protection” (p. 293).
2
Click Create to configure a new Create MPLS-TP Fast Facility Protection Group as shown in
Figure 197, “Create a new MPLS-TP Fast Facility Protection Group” (p. 294).
Table 58, “MPLS-TP Fast Facility Protection Group Parameters” (p. 295) provides description
of Create MPLS-TP Fast Facility Protection Group panel parameters:
Parameter Description
Node ID Specifies the Node ID for the MPLS-TP FFP group ranging from
1 to 127
Protection Specifies the Protection for the MPLS-TP FFP group.
Click Select to obtain it from the list.
The Filter by panel is displayed:
The Filter by panel contains From and To fields.
• ID: The value ranges from 1-10000
• Instance: The value ranges from 1-65535
• Ingress IP: The value ranges from 0-255
• Egress IP: The value ranges from 0-255
East Port
East Neighbour ID Specifies the Neighbour ID for the MPLS-TP FFP group ranging
from 1 to 127
Layer Select the Layer from the combo-box. The default value is
TUNNEL
Revert Tim (min) Specifies the revert time in minutes. The valid range 0-4320 in
step of one minutes is supported.
User Name Enter the name of the user.
Alarm Profile Specifies the Alarm for MPLS-TP FFP group. ClickSelect to
obtain the list of Alarms
Select one of the following radio button from the ASAP
SELECTION pannel:
• ASAPFFP-0
• ASAPFFP-1
• ASAPFFP-2
• ASAPFFP-3
• ASAPFFP-4
Ring ID Specifies the Ring ID for the MPLS-TP FFP group ranging from
0 to 15
APS Code Specifies the APS Code for the MPLS-TP FFP group ranging
from 0 to 15
West Port
West Neighbour ID Specifies the Neighbour ID for the MPLS-TP FFP group ranging
from 1 to 127
Parameter Description
Hold Off Time Specifies the hold off time. The valid range is 0-100, in units of
(100msec) 100milliseconds
3
Click Save to store all the settings and return to the previous page.
4
Click Cancel to revoke all the settings and return to the previous page.
END OF STEPS
1
Select TMPLS/MPLS-TP -> TMPLS/MPLS-TP OAM -> Delay Measurement Tool from the
menu bar.
Result: The TMPLS/MPLS-TP Delay Measurement Tool window is displayed.
2
Enter the DM Tool range in the From and To text field and click Search to retrieve the DM tool
information.
3
Click Refresh to reset the text field for entering another range.
4
To create a new Delay Measurement, click Create.
Result: The TMPLS Create Delay Measurement Tool window is displayed.
5
Click Select TUSEG to enter Resource. Select the Per Hop Behavior from the drop-down list.
The values are EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y, AF1, AF2, AF3, AF4, DE,
LOW2.
Note: Considering DM OAM packets are drop ineligible (Green), AF21, AF41, DE-Y are
not allowed.
6
Specify the Number of Samples required.
7
Select the Period for which the data is to be retrieved. The values are 1s, 10s, 1m, and 10m.
8
Enter the Frame Length in the text field. The valid range is 82-9600.
9
Click Save to save the settings and create another DM tool.
10
Click Cancel to return to the previous page without creating the DM tool.
END OF STEPS
1
Select TMPLS/MPLS-TP -> TMPLS/MPLS-TP OAM -> MPLS-TP Loopback Tool->
Loopback Tool from the menu bar.
Result: The Active LB Session Retrieval window is displayed.
2
Enter specific range in the From and To field for the LB Tool to Search for the existing list.
3
Click Create to configure new Loopback Tool.
Result: The Create TMPLS Loopback Measurement Tool window is displayed.
5
Select the Per Hop Behaviour. The values are EF, HIGH2, AF21, AF22, AF41, AF42, DE-G,
DE-Y, AF1, AF2, AF3, AF4, DE, LOW2.
Note: Considering Loopback OAM packets are drop ineligible (Green), AF21, AF41, DE-Y
are not allowed.
6
Select the Bi-directional connectivity verification value as either Disable or Enable.
7
Enter the Destination MEP-ID and select the MIP values.
9
Enter the Number of Samples. The value range is [1:1024].
10
Select the Periodvalue. The value range [10:100].
11
Enter the Frame length .The value range is [82:9600]. The default value is 82 (bytes).
12
Click Save to save the settings and Cancel to exit the window without saving.
END OF STEPS
1
SelectTMPLS/MPLS-TP -> TMPLS/MPLS OAM->MPLS-TP LoopbackTool->MIP Discovery.
from the menu bar.
Result:
2
Click to select the Resource Tunnel Segment (TUSEG ) or Psuedowire Segment (PWSEG)
Port.
Result:
3
Select the PHB profile as applicable from the drop-down.
4
Select TTL either Single or Range from 1 to 255.
5
Select the Direction Egress, or Ingress from the check box.
6
Click Create & start to MPLS-TP DISCOVERY LB tool.
7
Click Cancel to return to the previous screen without saving.
END OF STEPS
1
Select Data -> Queue Management option from the menu bar that displays the queue
management tab as shown in Figure 201, “Queue profile management” (p. 302).
2
The Queue Profile Management tab displays the existing user label as DEFAULT.
3
Click Default to display the Modify Queue Profile screen as shown in Figure 202, “Modify
Queue Profile” (p. 304)
4
Table 59, “Queue profile management parameters ” (p. 304) provides description of the queue
profile parameters.
Parameter Description
User Label Specifies the queue profile user label
UpTh Green Pkts Specifies the Upper threshold of green packets in the queue.
The default value is 75.
Note:This field is non-editable.
LowTh Green Pkts Specifies the Lower threshold green packets in the queue.
The default value is 50.
Note:This field is non-editable.
Max Prob of Green Pkts Specifies the maximum dropping probability of green packets
in the queue. The default value is 100.
Note:This field is non-editable.
UpTh Yellow Pkts Specifies the Upper threshold of yellow packets in the queue.
The default value is 37.
Note:This field is non-editable.
Parameter Description
LowTh Yellow Pkts Specifies the Lower threshold of yellow packets in the queue.
The default value is 25.
Note:This field is non-editable.
Max Prob of Yellow Pkts Specifies the maximum dropping probability of yellow packets
in the queue. The default value is 100.
Note:This field is non-editable.
5
Click Cancel to return to the previous screen without saving.
END OF STEPS
1
Select TMPLS/MPLS-TP -> TMPLS/MPLS OAM -> Delay Measurement Tool as shown in
Figure 203, “Delay Measurement tool” (p. 305).
2
To Search for an existing DM Tool, enter the measurement range From and To and click
Search/Refresh.
3
Click Create to create a Delay Measurement as shown in Figure 204, “Create Delay
Measurement tool” (p. 305)
The supported Delay Measurement tool parameters are as described in Table 60, “Delay
Measurement Tool parameters” (p. 306).
Parameter Description
Resource AID Indicates the AID of the Terminated TMPLS facility where
the DM-Tool has to be configured.
The supported values are:
• TUSEG-1-1-{1-1024} (Tunnel Segment)
• PWSEG-1-1-{1-1024}(PW Segment)
Note:
• The default is that a value is required and the field
cannot be left blank.
• The TUSEG involved must have DIR=BIDIR
• The TUSEG involved must have TYPE=TERMINATED
• The TUSEG involved must have MEP=ENABLED
Parameter Description
PHB Indicates the PHB value associated to DMM packets.
The supported PHB values in range 1 are{EF, HIGH2,
AF21, AF22, AF41, AF42, DE-G, DE-Y}
The supported PHB values in range 2 are {EF, HIGH2,
AF1, AF2, AF3, AF4, DE, LOW2}
The default PHB value is EH.
Note:DM-PHB is not supported for on-demand 2-way
delay measurement over TMPLS interface The chosen
DM-PHB must be present in the PHB profile used by the
Terminated TMPLS Tunnel/PW referenced by AID
parameter.
Sender DM Tool MEP point that sends DMM packets and make
measurement when receives back DMR packets received
from the symmetrical tool RDMT.
Period Indicates the period for the transmission of DMM packets.
The supported values are 1s, 10s, 1m, 10m. The default
value is 1m.
Send Packet Number Indicates the number of DMM packets to send. The
Integer value is 32. The default value is 1.
Note: The system can send a maximum of 100 DMM
packets for this DM-Tool.
Packet Length Indicates Length in byte of DMM packet to send.
Packet length 0 indicates a random length between 82
and 9600 bytes. The default value is 82.
Note:The packet length supported on one MPLF
interface will be subject to the MTU/MRU configured on
the Ethernet port.
4
Click to select the Resource as either Tunnel Segment (TUSEG) or Pseudowire Segment
(PWSEG) Port.
5
If TUSEG is selected, a dialog is displayed where the Tunnel Segment can be located and
selected. Click to select the TUSEG From and To range and click Search.
6
If PWSEG is selected, a dialog is displayed where the Pseudowire Segment can be located and
selected. Click to select the pwsegFrom and pwsegTo range and click Search.
7
Click to select the port as resource.
8
Select the PHB profile as applicable from the drop-down.
9
Select the Number of Samples for the Sender DM Tool.
10
Select the sender Period.
11
Select the Frame length in bytes or the random range from bytes to MTU.
12
Click Save to save the configuration or click Cancel to return to the previous screen without
saving.
END OF STEPS
1
Navigate to the Delay Measurement Tool screen. Under the Active DM Sessions Retrieval,
specify a DM Tool value between 1 and 100.
2
Click Search/Refresh to locate the DM tool to modify and select.
3
Modify the DM tool parameters as required. Refer Table 60, “Delay Measurement Tool
parameters” (p. 306) for parameter descriptions.
4
Click Save to save the modifications or click Cancel to return to the previous screen without
saving.
END OF STEPS
1
Navigate to the Delay Measurement tool.
2
Enter the From and To DM Tool values and click Search/Refresh.
3
Click to select the DM tool to be removed and click Delete.
END OF STEPS
1
Select Data -> MAC Management option from the menu bar that displays the queue
management tab as shown in Figure 205, “MAC Flooding Threshold” (p. 308).
2
Specify the number of MAC Address per port between the value range 1 to 65535.
3
Click Save, to save the MAC Flooding threshold.
END OF STEPS
3.72 Overview
3.72.1 Purpose
This section describes the procedures for creating tunnels.
3.72.2 Contents
1
Select (T)MPLS/MPLS-TP -> Tunnel Management from the menu bar as shown in Figure
206, “Tunnel management - filter by panel” (p. 311).
2
Select Tunnel Location from the drop-down list to filter Tunnel information. It specifies where
the search must be executed.
3
Select Tunnel Type from the drop-down list that specifies the type of Tunnel to be filtered. The
values are:
• Tunnel ID
• Tunnel AID
4
Enter ID, Instance, Ingress IP, and Egress IP range in the From and To boxes for the Tunnel
Ranging Filter.
5
Click Search to filter the Tunnel details based on the selected parameter values as shown in
Figure 207, “Tunnel management - search” (p. 312).
6
Click Create Head/Tail Tunnel to create a new terminated Tunnel as shown in Figure 208,
“Tunnel management” (p. 312).
Note:
• The In label of one tunnel is unique among all tunnels in the same NEs.
• The out label of one tunnel can be same as that of other tunnel. But if two or more
tunnels are connected to the same NE, the out label of those tunnels shall be different
from each other.
7
Re-set the tunnel segment parameters or leave as default.
8
Table 61, “Tunnel segment parameters ” (p. 312) provides description of the Tunnel Segment
parameters
Parameters Description
MPLS Port Specifies the AID of the provisioned port that is a server of the
MPLS Tunnel Segment.
Direction Specifies the tunnel segment direction. The values are:
• BIDIR
In Label Specifies the expected Label for incoming segment associated to
Sink Tunnel Segment. This parameter is not relevant if
DIR=UNIDIROUT. The label value must be unique in the system
and in the range {16-131071}
PHB Profile Specifies the AID of PHB Profile resource
L2 Encapsulation Specifies the L2 Encapsulation profile AID to be used in case of
Profile mapping of MPLS over Ethernet when a switched network is
present. This parameter is relevant only if port parameter refers to
Local MPLS Interface.
FFP MPLS-TP Ring Allows to select the FFP MPLS-TP ring.
Protection Switch for Used to enable the protection switching also when DDM-SD is
DDM-SD detected at the Tunnel termination point, where aTSF is
generated.
The supported values are:
• Enable
• Disable
Type Specifies the type of Tunnel Segment. It is TERMINATION.
User Name Specifies the Tunnel Segment User name
Parameters Description
Out Label Specifies the transmitted Label for outgoing segment associated
to Source Tunnel Segment. This parameter is not relevant if
DIR=UNIDIRIN. The label value must be unique on MPLS port
basis and in the range {16-1048575}.
Alarm Profile Specifies the AID of alarm profile resource
Alarm Severity Assignment Profile (ASAP) name to be used for
the created or edited the TUSEG.
TCA Profile TCA profile name to be used for the created and edited TUSEG.
Operation and Maintenance
MEP Specifies the Maintenance Entity Point. For enabling MEP
function, the direction of MEP is according to the direction of
Tunnel Segment. The values are ENABLE or DISABLE
MEG ID Specifies the Maintenance Entity Group Identifier. This parameter
must be unique in the system
OAM Type Specifies the OAM type
MEP ID Specifies the Maintenance Entity Point Identifier. This parameter
is unique inside MEG ID. If provisioned, this parameter must be
different from EXP MEP ID. The MEP ID is in the range 1 to 8191.
Parameters Description
OAM PHB Profile Specifies the PHB OAM Profile AID for OAM packets
The supported values are:
• OAMTYPE1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE8
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
The default value is EF.
CV PHB Specifies the CV packet transmission for PHB profile
Parameters Description
CV & SLM Tools Specifies the Loss and Synthetic measurement loss tools.
The values supported are:
• CV-LM
• SLM CV
If SLM CV is selected the SLM CV panel is displayed as shown in
Table 62, “SLM CV parameters” (p. 317).
EXP MEP ID If provisioned, this parameter must be different from MEP ID.
Proactive DM The parameter defines the command option for proactive DM.
The values supported are: Enable, Disable.
Note: The default value is Disable.
Proactive DM PHB Specifies the PHB value associated to DMM packets. x
{EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y}
• {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y}- PHB
range 1
• {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2}- PHB range 2
Proactive DM Period Specifies the period for the transmission of the DMM packets.
The values supported are:
• 1s
• 10s
• 1m
• 10m
The default value is 1s.
Proactive DM Payload The parameter defines the command option for proactive DM
Length [bytes] Payload length
Cross Threshold Specifies the cross threshold limit for Proactive LM. The
supported values range from: 2 to 10.
The default value is 10.
Clear Threshold Specifies the clear threshold limit for the Proactive LM. The
supported values range from: 2 to 10.
The default value is 10.
CV Rx It enables/disables (ENABLE/DISABLE) capability to detect the
Loss of Continuity (LOC) alarm, associated to Sink Tunnel
Segment Termination. ENABLE value is not applicable if
DIR=UNIDIRIN.
Parameters Description
CV Period Specifies the period (1/Frequency) of CV packet.
CV Tx Specifies the period (1/Frequency) of CV packet transmission.
If SLM CV is selected from the CV & SLM Tools parameter, the SLM CV panel is displayed as
shown in Table 62, “SLM CV parameters” (p. 317).
Parameters Description
SLM CV Rx Specifies the synthetic loss measurement
CV packet Reception.
SLM CV Tx Specifies the synthetic loss measurement
CV packet Transmission.
Signal DEG Cross Threshold Specifies the cross threshold limit for
Proactive LM. The supported values range
from: 2 to 10.
The default value is 10
Signal DEG Clear Threshold Specifies the clear threshold limit for the
Proactive LM. The supported values range
from: 2 to 10.
The default value is 10
Packet Loss Probability Specifies the packet Loss Probability
Signal DEG RDI Status Specifies the signal DEG RDI Status
CV Period Specifies the period (1/Frequency) of CV
packet transmission
9
Click Save to save all the parameters settings to configure new tunnel segment.
10
Click Cancel to return to the previous window without saving the settings.
11
Click Create Transit Tunnel to create a swapped tunnel.
12
Click Search to filter the Tunnel details based on the selected parameter values as shown in
Figure 207, “Tunnel management - search” (p. 312)
13
The table displays the check box that is used to manage the deletion of a Tunnel, only when the
status is OFF or the tunnel is not involved in a protection or the tunnel does not contains
pseudowires, otherwise the check box is disabled. Table 63, “Tunnel management parameters
” (p. 317) provides description of tunnel management parameters:
Parameter Description
Access Identifier Specifies the Tunnel Identifier
Access Control Domain Specifies if the Tunnel is LOCAL
(Management Plane) or CP (Control Plane)
Direction Specifies the direction of the Tunnel (BIDIR)
Role Specifies the role (HEAD, TRANSIT, or TAIL)
of the Tunnel
Admin Status Specifies the administrative status (ON,
OFF) of the Tunnel
Oper Status Specifies the Operation status (UP).
State Specifies the operative status (UP, DOWN)
of the Tunnel
Tunnel Segment Specifies the tunnel segment for the MPLS
port
14
Click Delete to delete the selected Tunnel.
15
Click Access Identifier to modify a Tunnel.
16
Click General to display and modify the general information of a Tunnel.
17
Click Path to display and modify the path of a Tunnel.
18
Click PWs to display the pseudowires related to a Tunnel.
END OF STEPS
1
Select Create Transit Tunnel from the TMPLS/MPLS-TP Tunnel Management panel as shown
in Figure 209, “Tunnel segment - from and to” (p. 318).
Enter the following Tunnel Segment From and Tunnel Segment To parameter values:
• MPLS Port - Specifies the AID of the provisioned port that is a server of the MPLS Tunnel
Segment.
3
Click Select to select the MPLS Port as shown in Figure 210, “MPLS port - select” (p. 319).
4
Select the Board Selection drop-down box to choose the MPLS Port and Click Search to find
the selected MPLS port details.
5
Click Cancel to return to the previous panel.
• Direction - Specifies the Tunnel Segment Direction (BIDIR or UNIDIRIN)
• User Name - Specifies the Tunnel Segment User name
• In Label - Specifies the expected Label for incoming segment associated to Sink Tunnel
Segment. This parameter is not relevant if DIR=UNIDIROUT. The label value must be unique
in the system and in the range {16-131071}
• Out Label - Specifies the transmitted Label for outgoing segment associated to Source
Tunnel Segment. This parameter is not relevant if DIR=UNIDIRIN. The label value must be
unique on MPLS port basis and in the range {16-1048575}
• PHB Profile - Specifies the AID of PHB Profile resource
6
Click Select to choose the PHB Profile as shown in Figure 211, “PHB profile - select” (p. 320).
7
Select the radio button to choose the PHB Profile and click Apply & Exit.
8
Click Cancel to return to the previous panel.
9
Select the Alarm Profile from the ASAP SELECTION list and click Send.
10
Click Cancel to return to the previous panel.
• Primary State - Specifies the administrative state, IS/OOS (default IS)
• L2 Encapsulation Profile - Specifies the L2 Encapsulation profile AID to be used in case of
mapping of MPLS over Ethernet when a switched network is present. This parameter is
relevant only if port parameter refers to Local MPLS Interface
11
Click Select to choose the L2 Encapsulation Profile as shown in Figure 212, “L2 encapsulation
profile - select” (p. 321).
12
Select the L2 Encapsulation Profile and click Apply & Exit from the window.
13
Click Cancel to return to return to the previous panel.
• Cross-Connection Type - Identifies the type of cross-connect. 1WAY identifies an
unidirectional cross-connection between the selected FROM and TO facility Tunnel
Segments. 2WAY identifies bi-directional cross-connection between the selected FROM and
TO facility Tunnel Segments
14
Select the 1WAY or 2WAY cross-connection from the Cross-Connection Type drop-down list.
15
Click Save to store the all the settings and return to the previous page.
16
Click Cancel to revoke all the changes and return to the previous page.
This operation creates the cross-connection and automatically the Tunnel.
END OF STEPS
1
Select the Filter by parameters, or the Tunnel Ranging filters as the search criteria for
configured Tunnels. To view all the configured Tunnels, select Tunnel Location and Tunnel Type
as shown in
2
Click on the Tunnel AID to view the Tunnel parameters as shown in Figure 214, “Modify tunnel
segment” (p. 324)
Note:
• The In label of one tunnel is unique among all tunnels in the same NEs.
• The out label of one tunnel could be same as that of other tunnel. But if two or more
tunnels are connected to the same NE, the out label of those tunnels shall be different
from each other.
• LPT, AIS, CSF, proactive/on-demand DM, proactive SLM are supported only on VPWS.
• In MA’s MEP list, no more than one MEP can belong to the same NE.
3
Table 64, “Tunnel management - modify” (p. 324) provides description of Tunnel Management
parameters:
Parameter Description
Tunnel
Access Identifier Specifies the AID of LSP Tunnel
Access Control Domain Specifies the Control Plane as LOCAL or ALL
Identifier Specifies the Tunnel Identifier
Description Specifies the Tunnel Description
Direction Specifies the LSP Tunnel path topology.
The supported values:
• Bidirectional
Role Specifies the Tunnel position role
Tunnel Segment To Specifies the TO entity
Admin status Specifies the Tunnel administrative status, set by management.
The values are ON/OFF
Oper status Specifies the Tunnel operative status. The values are UP/DOWN
Parameter Description
Traffic Descriptor Specifies the Traffic Descriptor Identifier for the assigned
bandwidth profile to the LSP Tunnel
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
Tunnel Segment
AID Specifies the Tunnel Segment AID
Type Specifies the type of Tunnel Segment is SWAP.
MPLS port Specifies the AID of the provisioned port that is a server of the
MPLS Tunnel Segment
L2 Encapsulation Profile Specifies the L2 Encapsulation profile AID to be used in case of
mapping of MPLS over Ethernet when a switched network is
present. This parameter is relevant only if port parameter refers
to Local MPLS Interface
Direction Specifies the path.
The supported values:
• Bidirectional
User Name Specifies the User name for the tunnel segment
In label Specifies the expected Label for incoming segment associated
to Sink Tunnel Segment. This parameter is not relevant if
DIR=UNIDIROUT. The label value must be unique in the system
and in the range {16-131071}
Out label Specifies the transmitted Label for outgoing segment associated
to Source Tunnel Segment. This parameter is not relevant if
DIR=UNIDIRIN. The label value must be unique on MPLS port
basis and in the range {16-1048575}
PHB profile Specifies the AID of PHB Profile resource
Alarm Profile Specifies the Alarm Severity Assignment Profile (ASAP) name to
use with this Tunnel Segment
Parameter Description
Acces Control Domain Specifies the Control Plane as LOCAL or ALL
DDM Protection switch Specifies the whether the protections switch is enabled or
for SD disabled.
Tunnel AID Specifies the AID of LSP Tunnel
Primary State Indicates the primary state.
Operation and Maintenance
MEP Specifies the Maintenance Entity Point. For enabling MEP
function, the direction of MEP is according to the direction of
Tunnel Segment. The values are ENABLE or DISABLE
MEP ID Specifies the Maintenance Entity Point Identifier. This parameter
is unique inside MEG ID. If provisioned, this parameter must be
different from EXP MEP ID. The MEP ID is in the range 1 to
8191.
MEG ID Specifies the Maintenance Entity Group Identifier. This
parameter must be unique in the system
CV PHB Specifies the CV packet transmission for PHB profile
Parameter Description
OAM PHB Profile Specifies the PHB OAM Profile AID for OAM packets
The supported values are:
• OAMTYPE1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE8
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
The default value is EF.
Parameter Description
CV Rx It enables/disables (ENABLE/DISABLE) capability to detect the
Loss of Continuity (LOC) alarm, associated to Sink Tunnel
Segment Termination. ENABLE value is not applicable if
DIR=UNIDIRIN
CV Tx Specifies the period (1/Frequency) of CV packet transmission
CV Period Specifies the period (1/Frequency) of CV packet transmission
EXP MEP ID Specifies the EXP MEP ID.
Proactive DM
Proactive DM Specifies whether Proactive DM is enabled or disabled.
Proactive DM PHB Specifies whether the Proactive DM PHB is enabled or disabled.
4
Click Select to select the MPLS Port
5
Select the radio button to choose the MPLS Port Access Identifier and click Apply & Exit.
6
Click Cancel to return to the previous panel.
7
Click Select to choose the PHB Profile.
8
Select the PHB Profile access identifierand click Apply & Exit.
9
Click Cancel to return to the previous panel.
10
Click Select to choose the Alarm Profile.
11
Select the Alarm Profile from the ASAP SELECTION list and click Send.
12
Click Cancel to return to the previous panel.
13
Click Select to choose the L2 Encapsulation Profile.
14
Select the previously created L2 Encapsulation Profile and click Apply & Exit from the window.
15
Click Cancel to return to return to the previous panel.
16
Table 65, “Operation and maintenance parameters” (p. 329) provides the description of
Operation And Maintenance frame parameters:
Parameter Description
MEP Specifies the Maintenance Entity Point. For enabling MEP
function, the direction of MEP is according to the direction of
Tunnel Segment. The values are ENABLE or DISABLE
MEG ID Specifies the Maintenance Entity Group Identifier. This
parameter must be unique in the system
MEP ID Specifies the Maintenance Entity Point Identifier. This
parameter is unique inside MEG ID. If provisioned, this
parameter must be different from EXP MEP ID. The MEP ID is
in the range 1 to 8191.
Parameter Description
OAM PHB Profile Specifies the PHB OAM Profile AID for OAM packets
The supported values are:
• OAMTYPE1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE8
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
Parameter Description
CV PHB Specifies the CV packet transmission for PHB profile
CV RX It enables/disables (ENABLE/DISABLE) capability to detect the
Loss of Continuity (LOC) alarm, associated to Sink Tunnel
Segment Termination. ENABLE value is not applicable if
DIR=UNIDIRIN
CV TX It enables/disables (ENABLE/DISABLE) transmission of CV
packets, associated to Source Tunnel Segment Termination.
ENABLE value is not applicable if DIR=UNIDIRIN
CV Period Specifies the period (1/Frequency) of CV packet transmission
EXP MEP ID Specifies Expected MEP values list, integer associated to Sink
Tunnel Segment Termination, also called Peer MEP ID
17
Click Performance Monitoring to configure the Performance Monitoring parameters. The
default screen is the PM report screen.
18
Configure the PM report parameters as described in Figure 215, “PM report” (p. 333)
Parameter Description
Access Identifier Specifies the Access Identifier for the selected port.
Monitor level Specifies at which level the monitoring report is
required. The values are DN, DNORCMPL, UP, and
UPORNCMPL. The default value is 1-UP.
Monitored parameter type Specifies the parameter type to be monitored. The
values are MINP, MINB, MONP, MONB and ALL
Time period Specifies the time interval for the which the report is
being generated. The values are 15-MIN, 1-DAY, or
ALL. The default value is 15-min
Number of 15-minute Historical Specifies for how many 15-MIN reports are required.
Register The values are ALL, or 0-31 days a month. The
default is 0.
Number of 1-Day Historical Register Specifies how many 1-DAY reports are required. The
supported values are ALL or 0-7. The default is 0.
Monitor Date Specifies the Date, Month, and Day to retrieve the
PM report.
Monitor Time Specifies the Time, Hour, & Minutes to retrieve the
PM report.
19
The Retrieve link allows the user to retrieve the performance monitoring report after selecting
the parameters values. Click Retrieve to retrieve PM parameters as shown in Figure 216,
“Retrieve PM results” (p. 333)
20
Click Cancel to revoke all the changes and return to the previous page.
21
Click on PM Initialization to view the Initialize Performance Monitoring screen as shown in
Figure 217, “Initialize PM” (p. 335)
22
Specify the Initialize PM parameters as described in
Parameter Description
Access Identifier Specifies the Access Identifier for the selected
tunnel.
Monitored Counter Type Specifies the counter parameter type to be
monitored. The default values is ALL.
Time period Specifies the time interval for the which the report
is reset. The values are 15-MIN or 1-DAY. The
default value is 15-min.
23
Click Save to save the parameter setting or click Cancel to return to the previous screen.
24
Click PM Mode to view the Performance Monitoring Mode screen as shown in Figure 218,
“Performance Monitoring mode” (p. 336)
25
Configure the parameters as described in Table 68, “Performance Monitoring mode
parameters” (p. 336).
Parameter Description
Access Identifier Specifies the Access Identifier for the selected
tunnel.
Time Period Specifies the time interval for the which the report is
retrieved. The values are 15-MIN, 1-DAY, or BOTH.
The default value is BOTH.
26
Click Retrieve to retrieve the Performance Monitoring Mode results.
27
Click Cancel to return to the previous screen without saving.
28
Click on PM Set to view the Set Performance Monitoring screen as shown in Figure 219, “Set
Performance Monitoring ” (p. 337)
29
Figure 219, “Set Performance Monitoring ” (p. 337) describes the Set performance monitoring
parameters:
Parameter Description
Access Identifier Specified the Tunnel Segment AID.
Parameter Description
PM State Specify the PM state as On, Off or Disabled.
• ON - PM collection for all MONTYPE is enabled.
This command resets counters. Current data
and History data are retrievable.
• OFF - PM collection for all MONTYPE is
disabled. Current data and History data are
retrievable.
• DISABLED - PM collection for all MONTYPE is
disabled. Current data and History data are not
retrievable.
While creating the Tunnel Segment, the PM state
is set to OFF by default.
Note:
• When PMSTATE changes from ON to
DISABLED, counters are not retrievable
because resources are released.
• When PMSTATE changes from ON to OFF,
collection is stopped but counters are
retrievable.
• When PMSTATE changes from OFF to ON,
counters are cleared (0) and collection starts
again.
• When PMSTATE changes from OFF to
DISABLE, counters are not retrievable because
resources are released.
• When PMSTATE changes from DISABLE to
OFF (or ON) , counters resources are allocated
for data collection.
• When TUSEG is deleted collection is stopped
and counters resource are released.
• If PM collection is enabled then this parameter
can be OFF or DISABLED.
• If PM collection is OFF then this parameter can
be ON or DISABLED
• If PM collection is DISABLED then this
parameter can be ON or OFF.
• (PMSTATE=ON) can be enabled for a maximum
of 512 PM counters
Parameter Description
Time Period Time Period, identifies the accumulation time
period for performance monitoring information
(1-day or 15-minute collection register).
The supported values are:
• 15-DAY
• 1-DAY
• BOTH
30
Click Save to save the PM setting or click Cancel to return to the previous screen without
saving.
31
To configure PRODM Performance Monitoring parameters, click on the PRODM performance
monitoring tab and configure the PRODM Performance Monitoring parameters as described in
Step 17 to Step 29.
32
The Alarms panel contains the following hyperlink:
33
Click View that shows all the alarms related to the specified Tunnel Segment'
END OF STEPS
1
Click Performance Monitoring to configure the Performance Monitoring parameters. The
default screen is the PM report screen.
2
Configure the PM report parameters as described in Table 70, “Retrieve Performance
Monitoring parameters for E1” (p. 340)
Parameter Description
AID Identifies the entity access identifier. Only valid SDH
Facility or the AID combinations are allowed, all
other shall be rejected.
The supported value is E1-{1}-{1}-{3,4}-{1-16} (E1
contained in a CES module).
Monitored parameter type Identifies the parameter whose PM data register is
being initialized. The supported value is ALL (All
monitored types). ES-E1, SES-E1, SEFS-E1,
UAS-E1,CSS-E1, PCV-E1, LES-E1,
BES-E1,DM-E1,LCV-E1are valid for E1 facility, Near
End and ES-E1, SES-E1, UAS-E1are valid for E1
facility, Far End.
The supported values are:
• ALL: All monitored parameter types (valid for all E1
facilities).
• ES-E1 Errored Seconds E1 (Near End and Far
End)
• SES-E1 Severely Errored Seconds E1 (Near End
and Far End)
• UAS-E1:Unavailable Seconds E1 (Near End and
Far End)
• SEFS-E1: The number of Severely Errored
Framing Seconds (Near End)
• BES-E1: The number of Bursty Errored Seconds
(Near End)
• LES-E1: The number of Line Errored Seconds
(Near End)
• PCV-E1: The number of Path Coding Violations
(Near End)
• LCV-E1: The number of Path Coding Violations
(Near End)
• PCV-E1: The number of Controlled Slip Seconds
(Near End)
• DM-E1 : The number of Degraded Minutes (Near
End)
Parameter Description
Monitor level specifies the discrimination level of PM parameter
values to be reported for the specified monitored
parameter (MONTYPE). The format of MONLEV is
<LEVEL> - DIRECTION>
The supported values are:
• {0-4294967295} - DN <LEVEL>Down, Only PM
data for the specified MONTYPE that is less-than
or equal-to (≤ ) the value of <LEVEL> is reported.
• 0-4294967295}- DNORNCMPL <LEVEL> Down Or
Not Complete, Only PM data for the specified
MONTYPE that is ≤ the value of <LEVEL> or that
does not have a VLDTY flag of CMPL.
• {0-4294967295} - UP <LEVEL> Up, Only PM data
for the specified MONTYPE that is greater-than or
equal-to ( ≥ ) the value of <LEVEL> is reported.
• {0-4294967295} UPORNCMPL <LEVEL> Up Or
Not Complete, Only PM data for the specified
MONTYPE that is ≥ the value of <LEVEL> or that
does not have a VLDTY flag of CMPL.
Location Specifies the PM registers location to be initialized.
The supported values are:
• NEND: Near End registers
• FEND: Far End registers
• BIDIR: Bidirectional registers
• ALL: Near End, Far End and Bidirectional registers
Direction Specifies the direction of the signal being monitored
(receive or transmit).
The supported values are:
• RCV:Receive direction
• TRMT: Transmit direction. valid for E1 facilities for
LOCN not equal BIDIR. Valid for OT, AUn and TUn
facilities for LOCN not equal BIDIR.
• ALL: Receive and transmit direction
The default value is RCV.
Parameter Description
Time Period Specifies whether the 15-minute or 1-day (24 hour)
PM collection register is to be initialized.
The supported value are:
• 15-MIN 15 minutes registers, only valid for LOCN
not equal BIDIR
• 1-DAY 24 hour registers
Monitor date Specifies the (starting) date of the PM collection
period for which PM data is to be reported. The
supported format is { MONTH - DAY : {01-12} -
{01-31} }. The default value is the current date.
The supported values are:
• 15-MIN: 15 minutes registers
• 1-DAY: 24 hour registers
• BOTH 15 minutes and 24 hour registers
Monitor Time If the time period of {15-MIN, BOTH} is entered,
specifies the (starting) time of the PM collection
period for which PM data is to be retrieved. If time
period of 1-DAY is entered, the monitor time is
ignored. The minutes {0-14}, {15-29}, {30-44}, and
{45-59} specifies the first, second, third, and fourth
respective 15-minute period within the specified
hour.
Number of 15-minute historical Specifies the number of previous 15-minute
registers historical PM registers to retrieve in addition to that
specified by Monitor Date and Monitor Time.
The supported values are:
• 0-31: 0-31 previous historical 15-minute PM data
registers
• ALL: All previous historical 15-minute PM data
registers
Number of 1-day historical registers Specifies the number of previous 1-day historical PM
registers to retrieve in addition to that specified by
Monitor Date and Monitor Time.
The supported values are:
• 0-6: 0-6 previous historical 1-day PM data registers
• ALL: All previous historical 1-day PM data registers
Configure the initialize register parameters using the following E1 PM parameters applicable for
ETSI:
Parameter Description
AID Identifies the entity access identifier. Only valid SDH
Facility or the AID combinations are allowed, all
other shall be rejected.
The supported value is E1-{1}-{1}-{3,4}-{1-16} (E1
contained in a CES module).
Monitored parameter type Identifies the parameter whose PM data register is
being initialized. The supported value is ALL (All
monitored types).
Monitor Value Specifies the value to be set in the register specified
by LOCN and TMPER.
The only supported values is 0.
Location Specifies the PM registers location to be initialized.
The supported values are:
• NEND: Near End registers
• FEND: Far End registers
• BIDIR: Bidirectional registers
• ALL: Near End, Far End and Bidirectional registers
Direction Specifies the direction of the signal being monitored
(receive or transmit).
The supported values are:
• RCV:Receive direction
• TRMT: Transmit direction. valid for E1 facilities for
LOCN not equal BIDIR. Valid for OT, AUn and TUn
facilities for LOCN not equal BIDIR.
• ALL: Receive and transmit direction
The default value is RCV.
Time Period Specifies whether the 15-minute or 1-day (24 hour)
PM collection register is to be initialized.
The supported value are:
• 15-MIN 15 minutes registers, only valid for LOCN
not equal BIDIR
• 1-DAY 24 hour registers
Configure the PM mode parameters using the following E1 parameters applicable for ETSI:
Parameter Description
AID Identifies the entity access identifier. Only valid SDH
Facility or the AID combinations are allowed, all
other shall be rejected.
The supported value is E1-{1}-{1}-{3,4}-{1-16} (E1
contained in a CES module).
Location Specifies the PM registers location to be initialized.
The supported values are:
• NEND: Near End registers
• FEND: Far End registers
• BIDIR: Bidirectional registers
• ALL: Near End, Far End and Bidirectional registers
Direction Specifies the direction of the signal being monitored
(receive or transmit).
The supported values are:
• RCV:Receive direction
• TRMT: Transmit direction. valid for E1 facilities for
LOCN not equal BIDIR. Valid for OT, AUn and TUn
facilities for LOCN not equal BIDIR.
• ALL: Receive and transmit direction
The default value is RCV.
Time Period Specifies whether the 15-minute or 1-day (24 hour)
PM collection register is to be initialized.
The supported value are:
• 15-MIN 15 minutes registers, only valid for LOCN
not equal BIDIR
• 1-DAY 24 hour registers
Monitor Time If the time period of {15-MIN, BOTH} is entered,
specifies the (starting) time of the PM collection
period for which PM data is to be retrieved. If time
period of 1-DAY is entered, the monitor time is
ignored. The minutes {0-14}, {15-29}, {30-44}, and
{45-59} specifies the first, second, third, and fourth
respective 15-minute period within the specified
hour.
Parameter Description
AID Identifies the entity access identifier. Only valid SDH
Facility or the AID combinations are allowed, all
other shall be rejected.
The supported value is E1-{1}-{1}-{3,4}-{1-16} (E1
contained in a CES module).
Location Specifies the PM registers location to be initialized.
The supported values are:
• NEND: Near End registers
• FEND: Far End registers
• BIDIR: Bidirectional registers
• ALL: Near End, Far End and Bidirectional registers
Mode Type Specifies the PM mode type to be enabled or
disabled.
The supported values are:
• ALL: PM for all applicable parameters configured
• P: PM for E1 parameters is configured..
• ALL: Receive and transmit direction
The default value is RCV.
PM State Specifies whether the PM data collection for the
specified mode type is enabled or disabled.
The supported value are:
• ON: PM for the specified MODETYPE is enabled
• OFF: PM enabled and not counting for the
specified MODETYPE
• DISABLED: PM for the specified Mode type is
disabled, non-existent
Note:When the PMSTATE=OFF, the related
counters will be frozen with the current value.
Parameter Description
Direction Specifies the direction of the signal being monitored
(receive or transmit).
The supported values are:
• RCV:Receive direction
• TRMT: Transmit direction. valid for E1 facilities for
LOCN not equal BIDIR. Valid for OT, AUn and TUn
facilities for LOCN not equal BIDIR.
• ALL: Receive and transmit direction
The default value is RCV.
Time Period Specifies whether the 15-minute or 1-day (24 hour)
PM collection register is to be initialized.
The supported value are:
• 15-MIN 15 minutes registers, only valid for LOCN
not equal BIDIR
• 1-DAY 24 hour registers
END OF STEPS
1
Select (T)MPLS -> PseudoWire from the menu bar as shown in Figure 220, “Pseudowire
management” (p. 347).
2
Select ALL from the Pseudowire Resource drop-down list box to filter the pesudowire.
3
Set the PW Ranging Filter by entering a valid range in the From and To entry boxes.
Enable the PW AID Filter check-box to enter access identifier index. The panel displays the
following hyperlinks:
• Search - That executes a search operation based on the selected filters.
• 3.78 “Create head/tail pseudowire” (p. 358) - that is used to create a terminated pseudowire.
• 3.79 “Create transit pseudowire” (p. 360) - that is used to create a swapped Pseudowire.
5
Click Search to execute the search on ALL and all the shelves (i.e. SHELF 1-1).
6
After executing the Search operation, Table 74, “Pseudowire management - Search
parameters” (p. 347) provides the description of Pseudowire Management tab parameters:
Parameter Description
Access Identifier Specifies the Pseudowire identifier
Tunnel Access Identifier Specifies the Tunnel Pseudowire identifier
Parameter Description
Role Specifies the role (HEAD, TRANSIT, or TAIL)
of the Pseudowire
Status Specifies the administrative status (ON,
OFF) of the Pseudowire
State Specifies the operative status (UP, DOWN)
of the Pseudowire
7
Click Delete which deletes the selected check box for Pseudowire.
8
Click Access Identifier which modifies a Pseudowire.
END OF STEPS
1
Click any Access Identifier link from the values displayed after filtering as shown in Figure
221, “Modify Pseudowire” (p. 349).
Note:
• The In label of one PW is unique among all PWs in the same NEs.
• The out label of one PW could be same as that of other PW. But if two or more PWs
are connected to the same NE, the out label of those PWs shall be different from each
other.
2
Table 75, “Pseudowire panel parameters” (p. 350) provides the description of Pseudowire/
Pseudowire Segment panel parameters:
Parameter Description
Access Identifier Specifies the Access Identifier of the Pseudowire
Role Specifies the Pseudowire position role. For Pseudowire originated
from local node the HEAD is used, on transit nodes TRANSIT and
on destination nodes TAIL are used
Tunnel AID Specifies the identifier of the Tunnel to which the PW belongs
Description Specifies Pseudowire description
PWSEG From Specifies the FROM entity
PWSEG To Specifies the To entity
Admin Status Specifies the Pseudowire administrative status, set by
management. The values are On and OFF
VT Head Specifies pointer to head Virtual Transport
Operative Status Specifies the Pseudowire operative status. The values are
UP/DOWN
TD ID Specifies the Traffic Descriptor Identifier for the assigned
bandwidth profile to the Pseudowire
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
Pseudowire Segment Description
Panel
Access Identifier Specifies the AID of Pseudowire Segment
Port Specifies the AID of the provisioned port or Tunnel Segment
Type Specifies the type of Pseudowire Segment is SWAP.
Access Control It is local or Control Plane
Domain
User Name Specifies Pseudowire Segment User name
Parameter Description
Direction Specifies Pseudowire Segment Direction (BIDIR)
PHB Profile Specifies the AID of the PHB Profile resource
In Label Specifies the expected Label for incoming segment associated to
Sink Pseudowire Segment. The label value must be unique in the
system. The valid range is 16-131071
Out Label Specifies transmitted Label for outgoing segment associated to
Source Pseudowire Segment. The label value must be unique in
the system. The valid range is 16-1048575
Control Word (CW) It enables/disables capability to insertion/stripping of the Control
Word, associated to Termination Pseudowire Segment
Primary State Specifies the primary state.
The supported values are:
• In-Service (IS) - normal operational state of the interface (not
failed condition)
• Out-Of-Service - Management (OOS-MA): the interface has
been placed out of service by a management action. Otherwise
it performs normally.
• Out-Of-Service- Autonomous (OOS-AU): the interface is out of
service because of a failure and cannot perform its function
(alarms are present).
• Out-Of-Service - Autonomous (OOS-AUMA): the interface is out
of service because of both management action and failure
(normally used to suppress alarms while clearing the failure
cause)
3
Click Performance Monitoring to configure the Performance Monitoring parameters. The
default screen is the PM report screen.
4
Configure the PM report parameters as described in Figure 222, “PM Report” (p. 352)
Parameter Description
Access Identifier Specifies the Access Identifier for the selected port.
Monitor level Specifies the discrimination level of PM parameter
values to be reported for the specified monitored
counters (MONTYPE). The format of MONLEV is
<LEVEL> - <DIRECTION>
The supported values are:
• DN - Down, Only PM data for the specified
MONTYPE that is less-than or equal-to ( ≤) the
value of < LEVEL> is reported.
• DNORNCMPL - Down Or Not Complete, Only PM
data for the specified MONTYPE that is the ≤ value
of <LEVEL>or that does not have a VLDTY flag of
CMPL.
• UP - Up, Only PM data for the specified
MONTYPE that is greater-than or equal-to (≤) the
value of < LEVEL> is reported.
• UPORNCMPL - Up Or Not Complete, Only PM
data for the specified MONTYPE that is ≥ the value
of <LEVEL> or that does not have a VLDTY flag of
CMPL.
Parameter Description
Monitored parameter type Identifies the type of monitored registers that are
being retrieved. The MONTYPE = ALL allows to
specify the set of all PM counters supported by the
TUSEG facility.
The supported values are:
• ALL - All activated counters for specified AID
• MINP - MPLS Incoming Number of Packets
• MINB - MPLS Incoming Number of Bytes
• MONP - MPLS Outgoing Number of Packets
• MONB - MPLS Outgoing Number of Bytes
The default value is All.
Time period Specifies the time interval for the which the report is
being generated. The values are 15-MIN, 1-DAY, or
ALL. The default value is 15-min
Number of 15-minute Historical Specifies the number of previous 15-minute
Register historical PM registers to retrieve in addition to that
specified by MONDAT and MONTM.
The register specified with MONDAT and MONTM
will be the first output followed by the NUMMIN
previous registers values are:
• 0 :No previous historical 15-minute PM data
registers are required
• 1-32 :1-32 previous historical 15-minute PM data
registers
• ALL: All previous historical 15-minute PM data
registers
Number of 1-Day Historical Register Specifies the number of previous 1-day historical PM
registers to retrieve in addition to that specified by
MONDAT and MONTM. :
The register specified with MONDAT and MONTM
will be the first output followed by the NUMDAY
previous registers values are
• 0 :No previous historical 1-Day PM data registers
are required
• 1-7 previous historical 1-day PM data registers
• ALL: All previous historical 1-day PM data registers
Monitor Date Monitor date, specifies the (starting) date of the PM
collection period for which PM data is to be reported.
Parameter Description
Monitor Time Specifies the (starting) time of the PM collection
period for which PM data is to be retrieved. If
TMPER of 1-DAY is entered, the value of MONTM is
ignored (i.e., an entered value is validated, but does
not affect the command execution). The minutes
{0-14}, {15-29}, {30-44} resp. {45-59} specifies the
first, second, third respective the fourth 15-minute
period within the specified hour.
5
The Retrieve link allows the user to retrieve the performance monitoring report after selecting
the parameters values. Click Retrieve to retrieve PM parameters as shown in Figure 223,
“Retrieve PM Results” (p. 354)
6
Click Cancel to revoke all the changes and return to the previous page.
7
Click on PM Initialization to view the Initialize Performance Monitoring screen as shown in
Figure 224, “Initialize PM” (p. 354)
8
Specify the Initialize PM parameters as described in
Parameter Description
Access Identifier Specifies the Access Identifier for the selected
Pseudowire.
Monitored counter type Specifies the counter parameter type to be
monitored. The default values is ALL.
Time period Specifies the time interval for the which the report
is reset. The values are 15-MIN or 1-DAY. The
default value is 15-min.
9
Click Save to save the parameter setting or click Cancel to return to the previous screen.
10
Click PM Mode to view the Performance Monitoring Mode screen as shown in Figure 225,
“Performance Monitoring mode” (p. 356)
11
Configure the parameters as described in
Parameter Description
Access Identifier Specifies the Access Identifier for the selected
Pseudowire port.
Time Period Specifies the time interval for the which the report is
retrieved. The values are 15-MIN, 1-DAY, or BOTH.
The default value is BOTH.
12
Click Retrieve to retrieve the Performance Monitoring Mode results.
13
Click Cancel to return to the previous screen without saving.
14
Click on PM Set to view the Set Performance Monitoring screen as shown in Figure 226, “Set
Performance Monitoring ” (p. 357)
15
Table 79, “Set Performance Monitoring parameters” (p. 357) describes the Set performance
monitoring parameters:
Parameter Description
Access Identifier Specified the Pseudowire Segment AID.
PM State Specify the PM state as On, Off or Disabled.
Time Period Select the interval as 15min, 1-Day or both.
16
Click Save to save the PM setting or click Cancel to return to the previous screen without
saving.
17
The Alarms panel contains the following hyperlink:
18
Click View that shows all the alarms related to the specified Tunnel Segment'.
END OF STEPS
1
Click (T)MPLS -> PseudoWire Management from the menu bar as shown in Figure 227,
“Pseudowire segment” (p. 357).
2
Table 80, “Pseudowire segment parameters” (p. 358) provides the description of Pseudowire
Segment parameters:
Parameter Description
Port Specifies the AID of the provisioned port or Tunnel Segment
Type Specifies the type of Pseudowire Segment is SWAP.
Direction Specifies the Pseudowire Segment direction. The supported value is
BIDIR.
In Label Specifies the expected Label for incoming segment associated to Sink
Pseudowire Segment. The parameter is not relevant if DIR=UNIDIROUT.
The label value must be unique in the system. The valid range is
16-131071
PHB Profile Specifies the AID of PHB Profile resource
Parameter Description
Primary State Specifies the primary state. The default is IS
The supported values are:
• In-Service (IS) - normal operational state of the interface (not failed
condition)
• Out-Of-Service - Management (OOS-MA): the interface has been
placed out of service by a management action. Otherwise it performs
normally.
• Out-Of-Service- Autonomous (OOS-AU): the interface is out of service
because of a failure and cannot perform its function (alarms are
present).
• Out-Of-Service - Autonomous (OOS-AUMA): the interface is out of
service because of both management action and failure (normally used
to suppress alarms while clearing the failure cause)
User Name Specifies the Pseudowire Segment User name
Out Label Specifies transmitted Label for outgoing segment associated to Source
Pseudowire Segment. The parameter is not relevant if DIR=UNIDIRIN.
The label value must be unique in the system. The valid range is
16-1048575
Control Word It enables/disables capability to insertion/stripping of the Control Word,
(CW) associated to Termination Pseudowire Segment. This parameter is valid
only if TYPE=TERMINATION
Note:
• The In label of one PW is unique among all PWs in the same NEs.
• The out label of one PW can be same as that of other PW. But if two or more PWs are
connected to the same NE, the out label of those PWs shall be different from each
other.
3
Click Select to choose the Port.
4
Select the board from the Board Selection drop-down list box to search for TUSEG port.
5
Click Cancel to cancel the selection and return to the previous panel.
6
Click Select to choose the PHB Profile as shown in Figure 228, “PHB profile- select” (p. 360)
7
Select the radio button to choose the PHB Profile and click Apply & Exit.
8
Click Cancel to return to the previous panel.
9
Click Cancel to return to the previous page.
10
Click Save to store the settings and return to previous page.
11
Click Cancel to revoke the changes and return to previous page.
END OF STEPS
1
Select Create Transit Pseudowire from the Tunnel Management panel .
2
Table 81, “Pseudowire segment from - to parameters” (p. 360) provides the description of
Pseudowire Segment From and Pseudowire Segment To parameters:
Parameter Description
Port Specifies the AID of the provisioned port or Tunnel Segment
Parameter Description
Type Specifies the type of Pseudowire Segment is SWAP.
Direction Specifies the Pseudowire Segment direction. The supported value is
BIDIR.
User Name Specifies the Pseudowire Segment User name
In Label Specifies the expected Label for incoming segment associated to Sink
Pseudowire Segment. The parameter is not relevant if DIR=
UNIDIROUT. The label value must be unique in the system. The valid
range is 16-131071
Out Label Specifies transmitted Label for outgoing segment associated to Source
Pseudowire Segment. The parameter is not relevant if DIR=UNIDIRIN.
The label value must be unique in the system. The valid range is
16-1048575
PHB Profile Specifies the AID of PHB Profile resource
Primary State Specifies the primary state. The default is IS
The supported values are:
• In-Service (IS) - normal operational state of the interface (not failed
condition)
• Out-Of-Service - Management (OOS-MA): the interface has been
placed out of service by a management action. Otherwise it performs
normally.
• Out-Of-Service- Autonomous (OOS-AU): the interface is out of service
because of a failure and cannot perform its function (alarms are
present).
• Out-Of-Service - Autonomous (OOS-AUMA): the interface is out of
service because of both management action and failure (normally
used to suppress alarms while clearing the failure cause)
3
Select the board from the Board Selection drop-down list box to search for the TUSEG port.
4
Click Cancel to return to the previous panel.
5
Click Select to choose the PHB Profile.
6
Select the Access Identifier to choose the PHB Profile.
7
Click Cancel to return to the previous panel.
8
Click Cancel to return to return to the previous panel.
9
The Cross-Connection panel displays the following parameters:
• Cross-Connection Type - Identifies the type of cross-connect. 1WAY identifies an
unidirectional cross-connection between the selected FROM and TO facility Pseudowire
Segments. 2WAY identifies a bi-directional cross-connection between the selected FROM
and TO facility Pseudowire Segments.
10
Click Save to store the all the settings.
11
Click Cancel to revoke all the changes.
END OF STEPS
1
Select Communication -> In Fiber In Band Management as shown in Figure 229, “In fiber In
band Management” (p. 361).
The In Fiber In Band Management screen displays the In Fiber In Band Management Search
panel with the following options:
• List Boards - The combo-box contains the list of boards that can be selected to perform the
search.
• Only Activate - A check-box that can be enabled/disabled based on the filter criteria. Enable
the check box to search for the borads that are currently active.
2
Select the board and click Search to filter the boards that are active or inactive.
END OF STEPS
Ethernet services
3.80 Overview
3.80.1 Purpose
Carrier Ethernet Services are connectivity services based on Ethernet User Network Interfaces
(UNI) and packet formats.
They are proposed as an alternative to traditional leased line services as well as layer 3 services
(IP/MPLS) services, such as Virtual Private Networks (VPN).
The target of these services is to allow the service providers to migrate their customers toward a
packet optimized network, to provision services much faster and with far greater bandwidth
flexibility.
The ZIC (from Rel.3.0 onward) manage two basic Carrier Ethernet Services:
• EVPL - A point-to-point connectivity service.
• EVPLAN - A point-to-multipoint connectivity service.
Common for both of these services is the use of a standardized User Network Interface (UNI)
based on Ethernet, where service payload data is transported in Ethernet packets using PW
(EVPL) and E-LAN (EVPLAN)
3.80.2 Contents
1
Select Connections -> Ethernet Services XC -> EVPL from the menu bar as shown in Figure
230, “EVPL service” (p. 364).
Note: Confirm each EVPL flow with bidirectional XC before the upgrade operation, that is
for UNI -> NNI and NNI -> UNI. Operators can check by searching EVC.
2
Click Search to view the EVPL Service list.
Result: The ETS Flow involved is listed as shown in the Figure 231, “EVPL Service list”
(p. 366).
From Release 6.1.10, eight EVPLs can be provisioned with the same PW. For example, Figure
231, “EVPL Service list” (p. 366) shows five EVPLs.
Note:
• VLAN operation (that is VLAN pop, push, swap) are same for all EVPLs, and they are
located on the same UNI interface.
• NNI to UNI xc must be created with specific TD. All TD parameter (CIR, PIR, CBS, and
PBS) must be zero for NNI to UNI xc.
• For NNI to UNI xc, TD service type Anyservice will drop all flows in a PW. Other TD will
drop a specific flow with corresponding TD which is inserted in the upstream. For
example, node A uses TD service type =RegulatedService for an xc from UNI to NNI,
node B should create a NNI to UNI xc with TD service type= RegulatedService to drop
this flow.
3
From the figure Figure 231, “EVPL Service list” (p. 366), click on the link ETSInflow#1.
4
The ETS Inflow Management tab is displayed as shown in the figure Figure 232, “ETS Inflow
management” (p. 367).
5
The ETS Inflow Management panel parameters are described in the following table:
Parameter Description
State Specifies the state. The values are active or
inactive.
User Label Specifies the associated User label.
Service Type Specifies the service type. The value is
Ethernet.
Flow type Specifies the flow type. The value is Unicast
Traffic descriptor Specifies the operation mode.
Layer 2 control frames (0x) Specifies the protocol frames that can
accede the port.
Policing mode Refers to the policing of the incoming ETS
tarffic. The values are disabled, or color
blind.
Parameter Description
Color Profile Specifies the association between incoming
EVPL priorities and forwarded frames
coloring
VLAN Pop Select Enabled or disabled from the
drop-down.
Classification mode Specifies the classification mode.
Classifier Criteria Specifies the Classifier criteria. The values
are outer VLAN id, outer PRI, and untagged.
6
Click Create to configure a new EVPL Service as shown in Figure 233, “EVPL service - create”
(p. 369).
Note: From R6.1.10 onwards the TD of existing NNI->UNI service are converted to
anyservice type to indicate that it includes all the traffic without special classification. The
preliminary upgrade condition for EPVL service: all existing EVPL flow must be
provisioned with bidirectional Ethernet Service XC. The upgrade may be failed if there is
unidirectional EVPL service when upgrading from releases prior to R6.1.10.
Detailed request to provision is as follows:
• When ServiceType of TD used in XC is anyserviceclass on the way NNI -> UNI XC,
that means Multiple Flow to one PW is not implemented. Each PW can associate only
one flow.
• For NNI to UNI xc, TD service type Anyservice will drop all flows in a PW. Other TD will
drop a specific flow with corresponding TD which is inserted in the upstream. For
example, node A uses TD service type =RegulatedService for an xc from UNI to NNI,
node B should create a NNI to UNI xc with TD service type= RegulatedService to drop
this flow.
• One UNI > NNI XC at least has been present on node before create NNI > NNI XC for
multiple flow creation.
7
Table 83, “EVPL service parameters” (p. 370) provides the description of Create EVPL service
parameters.
Parameter Description
Topology Specifies the topology to establish the service. The values are:
UNI-NNI and NNI-UNI
Transport link (PW) Specifies the Transport link (PW) values. The options are 1-100.
Ingress Specifies the input port
Note: Ingress is displayed when the value UNI-NNI is selected
from the Topology drop-down.
Egress Specifies the input port
Note: Egress is displayed when the value NNI-UNI is selected
from the Topology drop-down.
Service Label Specifies the name or label for the new service
ETH UNI to TMPLS NNI EVC termination
Traffic descriptor Specifies the operation mode.
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
Note: Topology classifier on the right hand side of the figure
Figure 233, “EVPL service - create” (p. 369) is disabled when
UNI-NNI is selected from the Topology drop-down.
Topology classifier Specifies the classifier for the selected topology.
Layer 2 control frames Specifies the protocol frames that can accede the port
(0x)
Parameter Description
Policing Mode Refers to the policing of the incoming ETS traffic. Default value
is either disabled or colorBlind
Values are:
• disabled
• colorBlind
• ColorAware
• ColorAwareNoCoupling
• ColorAwareWithCoupling
Color Profile Specifies the association between incoming EVPL priorities and
forwarded frames coloring
VLAN Pop If enabled, it pops out the EVPL shim fields of the Ethernet
frame.
E-LAN Select an ELAN type.
VLAN Push If enabled, it pushes in the EVPL shim fields of the ethernet
frame.
The options are:
• Enabled
• Disabled
VLAN Id Specifies the VLAN ID to be entered.
Priority Mode Select priority mode by selecting either value or transperent
value Select the priority value from drop-down.
8
Click Cancel to return to the previous window without saving the changes.
9
Click Save & exit to save the changes and return to the previous window.
10
Click Save & continue to save the changes and create a new service.
11
After successful service creation of EVPL/ELAN ETS flow cross connection shall be created in
NE. It is possible to see the ETS Flow properties or modify them, as shown in the Figure 232,
“ETS Inflow management” (p. 367)
12
Click Save to save the configuration.
END OF STEPS
1
Select Connections -> Ethernet Services XC -> EVPLAN Service from the menu bar as
shown in Figure 234, “EVPLAN service” (p. 371).
2
Click Search to view the EVPLAN service list.
3
Click Create to configure a new EVPLAN service as shown in Figure 235, “EVPLAN service -
create” (p. 372).
Note:
• EVPLAN does not support classification based on TUNNEL/PW EXP value in NNI-
>UNI service. From R6.1.10 onwards the TD of existing NNI->UNI service are
converted to anyservice type to indicate it includes all the traffic without special
classification. Only anyservice TD can be used for NNI->UNI EVPLAN service.
• NNI -> UNI EVPLAN service can be created successfully only if at least one UNI ->
NNI EVPLAN service is present.
4
Table 84, “EVPLAN service parameters” (p. 374) provides the description to create EVPLAN
service parameters.
Parameter Description
Topology Specifies the topology to establish the service. The values are:
UNI-NNI and NNI-UNI
E-LAN service Specifies the E-LAN service to be established
Ingress Specifies the input port
Service Label Specifies the name or label for the new service
ETS flow to E-LAN section
Traffic descriptor Specifies the operation mode.
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
Topology classifier Specifies the classifier for the selected topology
Layer 2 control frames Specifies the protocol frames that can accede the port
(0x)
Policing mode Refers to the policing of the incoming ETS tarffic. The values are
disabled, color blind, color Aware, ColorAwareNoCoupling,
or ColorAwareWithCoupling.
Color profile Specifies the association between incoming EVPL priorities and
forwarded frames coloring
VLAN pop If enabled, it pops out the EVPL outer VLAN TAG of the ethernet
frame. The values are Enabled, or Disabled.
E-LAN to ETS flow section
Parameter Description
Traffic descriptor Specifies the operation mode.
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
VLAN push If enabled, it pushes the outer VLAN TAG in the ethernet frame.
The values are Enabled, or Disabled.
VLAN Id Specifies the VLAN Id.
Note: This field is populated only when VLAN Push is enabled.
Priority mode Specifies the Priority mode.
The supported values are:
• value
• transparent
Note: This field is populated only when VLAN Push is enabled.
Value Specifies the Frame Priority.
Note: This field is populated only when VLAN Push is enabled.
5
Click Cancel to return to the previous window without saving the changes.
6
Click Save & exit to save the changes and return to the previous window.
7
Click Save & continue to save the changes and create a new service.
END OF STEPS
1
Select Data -> E-LAN Service Mgnt menu option as shown in Figure 236, “E-lan service”
(p. 375).
2
Enter the range in the From and To entry boxes and click view.
3
Click Create to configure a new E-LAN service as shown in Figure 237, “E-lan service -
configuration” (p. 377).
4
Table 85, “E-lan service - configuration” (p. 377) provides the description of configuration panel
parameters.
Parameter Description
Service # Specifies the number for the service
Mac Learning Specifies the Mac learning for the service.
The values are True or False
Vpn Id Specifies the Virtual Private Network
Identifier for the Ethernet LAN service
5
Click Save to save the settings and return to the previous window.
6
Click Cancel to cancel the changes and return to the previous window.
7
Click the UNI Port Binding tab to create the port binding as shown in Figure 238, “UNI port
Binding” (p. 378)
8
Select the Board from the drop-down, the list of associated ports are displayed. Bind the ports
by selecting the port and clicking >>. To unbind a port from the binding, click to select the port
from the right pane and click <<.
9
Click Save to save the port binding or click Cancel to cancel the binding.
10
Click the PW Binding tab as shown in Figure 239, “PW binding” (p. 379)
11
Click the Search icon provided for the PW AID range. The list of Pseudowires in the specified
AID range are displayed. Bind the PW by selecting the PW and clicking >>. To unbind a PW
from the binding, Click to select the PW from the right pane and click <<.
12
Click Save to save the PW binding or click Cancel to cancel the binding.
END OF STEPS
1
Select Data -> VLAN profile from the Menu bar as shown in Figure 240, “VLAN profile”
(p. 380).
2
Select Create to configure a new VLAN profile as shown in Figure 241, “VLAN protocol profile”
(p. 380)
3
Table 86, “VLAN protocol profile parameters” (p. 380) provides description of VLAN Protocol
Profile panel parameters:
Parameter Description
User Label Allows to digit a mnemonic string to address the VLAN
Ethernet Type (0x) Allows to digit an hexadecimal value for the provider
protocol-type (PT) that is inserted into the 2-bytes field of the
Stacked-VLAN shim header; the value identifies the network
provider and has to be 2-bytes long in hexadecimal notation;
the third non-included byte is forced by default to "0x". The PT
is used to recognize the type of afferent VLAN frames, i.e. if
they are "S-Vlan-tagged" or others; by default, an hex value of
88A8 is interpreted as S-Vlan tagged. Frames with PT value
different than this will be treated as non-SVlan-tagged. An hex
value of 8100 is interpreted as Q-Vlan tagged. Other values of
PT will be interpreted as generic Stacked-Vlan frames, used to
interwork among different network providers
4
Click Cancel to cancel the operation and return to the previous page.
5
Click Save & continue to apply the changes and continue the configuration process.
6
Click Save & Exit to apply the changes and the following page appears.
7
Click Delete to remove the existing VLAN profile.
8
To modify the existing VLAN profile, select the existing VLAN user label from the table and
enable the check-box as shown in Figure 240, “VLAN profile” (p. 380) .
9
Enter the new user label to modify the existing protocol profile and click Save as shown in
Figure 242, “VLAN profile modify” (p. 380)
10
The State and Ethernet type (0x) parameters displays the default values as active and 0.
11
Click Deactivate to reset the state to as deactivate.
12
Click Delete to remove the VLAN profile and Click Cancel to return to the previous window
without saving the modified settings.
END OF STEPS
Use this procedure to administer static filtering for the E-LAN service:
1
Select Data -> E-LAN Service Mgmt -> Static Filtering DB from the menu bar as shown in
Figure 243, “ELAN service: Static Filtering” (p. 381).
2
Enter the E-LAN range specification. The values range is from 1 to 100.
3
Click Search to view the E-LAN service list.
4
Click Create to configure a DB as shown in Figure 244, “Create DB configuration” (p. 383).
5
Specify the configuration parameters as described in Table 87, “E-LAN: Static filtering
parameters” (p. 383) .
Parameter Description
Port Specification
Filter On Specifies where to apply the filter.
The supported values are:
• LAG
• PW
• Physical UNI ports
Port Determines the port on which to apply the filter.
Note: This parameter is only applicable to LAG.
PW AID range Determines the PW FROM and TO range.
Note: This parameter is only applicable to PW.
E-Lan Specification Determines the E-Lan range.
Mac Address Specification
Mac Address Determines the Mac address for the DB. For example,
01:23:45:67:89:AB.
6
Click Save to save the changes and return to the previous window.
7
Click Cancel to return to the previous window without saving the changes.
END OF STEPS
1
Select Data -> Traffic Control -> Storm Control Profile from the menu bar as shown in
Figure 245, “Storm Control profile” (p. 383).
2
Click Create to create a Storm Control Profile.
Parameter Description
User label Specifies the associated User label.
Unknown Unicast Determines the unknown unicast status.
The supported values are:
• True
• False
Unknown Unicast Bandwidth (Mbps) Specifies the Unknown Unicast bandwidth in
Mbps.
Parameter Description
Unknown Unicast Bucket Specifies the Unknown Unicast bucket capacity.
The supported values are:
• 4kb
• 16kb
• 64kb
• 256kb
• 1Mb
• 4Mb
• 8Mb
• 16Mb
Unknown L2 Multicast Determines the unknown L2 multicast status.
The supported values are:
• True
• False
Unknown L2 Multicast Bandwidth Specifies the Unknown L2 Multicast bandwidth in
(Mbps) Mbps.
Unknown L2 Multicast Bucket Specifies the Unknown L2 Multicast bucket
capacity.
The supported values are:
• 4kb
• 16kb
• 64kb
• 256kb
• 1Mb
• 4Mb
• 8Mb
• 16Mb
Row Status Specifies the row status as active or inactive.
Broadcast Determines the unknown Broadcast status.
The supported values are:
• True
• False
Broadcast Bandwidth (Mbps) Specifies the Broadcast Bandwidth in Mbps.
Parameter Description
Broadcast Bucket Specifies the broadcast bucket capacity.
The supported values are:
• 4kb
• 16kb
• 64kb
• 256kb
• 1Mb
• 4Mb
• 8Mb
• 16Mb
3
Click Save to save the changes and return to the previous window.
4
Click Cancel to return to the previous window without saving the changes.
END OF STEPS
1
Select Data-> Traffic Control -> Storm Control Profile from the menu bar. The following
screen is displayed as shown in “Modify Storm Control profile” (p. 0).
2
Click on the name of User label from the list of Storm control profile that has to be modified.
The following screen is displayed as shown in “Modify Storm Control profile” (p. 0).
3
After modifying the parameters click Save to save the configuration.
END OF STEPS
1
Select the profile that needs to be deleted as shown in “Delete Storm Control profile” (p. 0).
2
Click on Delete hyperlink to delete the profile.
END OF STEPS
1
Click on the Ethernet local port in the tree area as shown in “Associate Storm Control profile”
(p. 0).
2
The Ethernet Port Management page is displayed as shown in “Associate Storm Control
profile” (p. 0).
3
To Associate Storm Control profile go to Storm Control Profile Managment section as shown
in “Associate Storm Control profile” (p. 0).
4
Click on Select hyperlink and select the profile to associate. The following screen is displayed
as shown in “Associate Storm Control profile” (p. 0).
5
After selection the Storm Control Profile Management section is displayed as shown in
“Associate Storm Control profile” (p. 0).
6
Click on Details hyperlink to view the details of Storm Control Profile as shown in “Associate
Storm Control profile” (p. 0).
7
Click Cancel to exit form the current page.
END OF STEPS
1
Click on Dissociate hyperlink to dissociate the Storm Control profile as shown in “Dissociate
Storm Control profile” (p. 0)
2
The following screen is displayed as shown in “Dissociate Storm Control profile” (p. 0) after
dissociation.
END OF STEPS
1
Select Data -> Traffic Control -> Packet Filetring Profile from the menu bar as shown in
Figure 246, “Packet Filtering Profile” (p. 395).
2
Click Create to create a Storm Control Profile.
Parameter Description
User label Specifies the associated User label.
Unknown Unicast Filtering Determines the unknown unicast filtering status.
The supported values are:
• True
• False
Unknown Multicast Filtering Determines the unknown multicast filtering
status.
The supported values are:
• True
• False
Row Status Specifies the row status as active or inactive.
Broadcast Filtering Determines the Broadcast filtering status.
The supported values are:
• True
• False
3
Click Save to save the changes and return to the previous window.
4
Click Cancel to return to the previous window without saving the changes.
END OF STEPS
1
Select Data-> Traffic Control -> Packet Filtering Profile from the menu bar. The following
screen is displayed as shown in “Modify Packet Filtering profile” (p. 0).
2
Click on the name of User label from the list of Packet Filtering profile that has to be modified.
The following screen is displayed as shown in “Modify Packet Filtering profile” (p. 0).
3
After modifying the parameters click Save to save the configuration.
END OF STEPS
1
Select the profile that needs to be deleted as shown in “Delete Packet Filtering profile” (p. 0).
2
Click on Delete hyperlink to delete the profile.
END OF STEPS
1
Click on the Ethernet local port in the tree area as shown in “Associate Packet Filtering profile”
(p. 0).
2
The Ethernet Port Management page is displayed as shown in “Associate Packet Filtering
profile” (p. 0)
3
To Associate Packet Filtering profile go to Packet Filtering Profile Managment section as
shown in “Associate Packet Filtering profile” (p. 0).
4
Click on Select hyperlink and select the profile to associate. The following screen is displayed
as shown in “Associate Packet Filtering profile” (p. 0).
5
After selection the Packet Filtering Profile is displayed as shown in “Associate Packet
Filtering profile” (p. 0).
6
Click on Details hyperlink to view the details of Packet Filtering Profile as shown in “Associate
Packet Filtering profile” (p. 0).
7
Click Cancel to exit form the current page.
END OF STEPS
1
Click on Dissociate hyperlink to dissociate the Packet Filtering profile as shown in
2
The following screen is displayed as shown in “Dissociate Packet Filtering profile” (p. 0) after
dissociation.
END OF STEPS
3.88.2 Procedure
1
Select Alarms -> TDM ASAP Mng option from the menu bar as shown in Figure 247, “ASAP
creation” (p. 404)
2
Table 90, “ASAP filter parameters” (p. 404) provides the description of ASAP FILTER panel
parameters:
Parameter Description
ASAP AID Specifies the ASAP Access Identifier
The values supported are:
• ALL
• ASAPEQPT
• ASAPMPLSIF
• ASAPTUSEG
• ASAPSTM1
• ASAPVC4
• ASAPLOVC12
• ASAPT1
• ASAPE1
Parameter Description
ASAP TYPE Lists all the available ASAP without ASAP prefix. The values
are:
• ALL - all alarms
• EQPT = equipment alarms
• MPLSIF
• TUSEG= Tunnel segment alarms
• STM1
• VC4
• LOVC12
• T1
• E1 = ethernet alarms
User Label Digit a mnemonic string of the TDM ASAP (e.g TEST)
3
Click the radio button to activate the ASAP AID drop-down list box and select the Access
Identifier. For example ASAPEQPT. Select the AID from the two drop-down list boxes. The valid
range is 0-254 and 1-255.
4
Click the radio button to activate the ASAP-TYPE drop-down list box and select the ASAP
type. For example EQPT.
5
Enter the label for the ASAP and click the Search hyperlink. The system filters the ASAP based
on the criteria and displays the list of ASAP entries.
6
Click Create ASAPs to configure a new ASAP as shown in Figure 248, “ASAP create window”
(p. 406).
7
Table 91, “ASAP create parameters” (p. 406) provides the description of TDM ASAP CREATE
panel parameters:
Parameter Description
TDM ASAP Type Lists all the available TDM ASAP without
ASAP prefix. The values are:
• ALL - all alarms
• EQPT = equipment alarms
• MPLSIF
• TUSEG= Tunnel segment alarms
• STM1
• VC4
• LOVC12
• T1
• E1 = ethernet alarms
Default The default value is N
User Label Digit a mnemonic string of the TDM ASAP
(e.g. TEST)
8
Select the ASAP values from the drop-down list displayed next to user label.
9
Click Save & exit to store all the settings and return to the previous page.
10
Click Cancel to revoke all the settings and return to the previous page.
END OF STEPS
1
Select Data -> CES Management -> TDM Generic Parameters from the menu bar.
Result:
2
Click Create in the TDM Configuration Parameters screen. The Create TDM Parameters Profile
screen is displayed.
Result:
3
Specify the TDM parameters as described in Table 92, “TDM Configuration Parameters ”
(p. 408)
Parameter Description
User Label Specifies the CES profile User name.
Payload size (bytes) Specifies the payload value in bytes. The
default value is 256.
Rtp Hdr Used This parameter is true by default.
Clock Source Specifies the clock source type.
The supported values are:
• system
• adaptive
• differential
• tdmline
Jtr Bfr Depth (ms) Specifies the Jitter depth.
Pkt Filter Determines the packet filter range. The valid
range is 0 to 255. The default value is 255.
Payload Suppression Determines whether the payload is to be
suppressed or not.
The supported values are:
• enable
• disable
Parameter Description
Pkt Replace Policy Determines the replace policy against the
packet.
The supported values are:
• AllOnes
• Implementation Specific
• filter
Average Pkt Loss Time Window (ms) Provides the loss time in milliseconds.
Stray Pkt Detect Determines whether there is a stray packet.
The supported values are:
• True
• False
Excessive Pkt Loss Threshold (ms) Determines the packet loss threshold limit in
milliseconds.
Alarm Threshold (ms) Determines the alarm threshold limit in
milliseconds.
Clear Alarm Threshold (ms) Determines the time for clearance of alarms in
milliseconds.
Stray Pkt Threshold (pkt/sec) Determines the stray packet threshold in packet
per second. The supported range is 1 to 300.
Malformed Pkt Threshold (pkt/sec) Determines the Malformed packet Threshold in
packet per second in the value range of 1 to
300.
Buffer Overrun Threshold (pkt/sec) Determines the Buffer overrun threshold in
packet per second in the valid range of 1 to
300.
Buffer Underrun Threshold (pkt/sec) Determines the Buffer underrun threshold in
packet per second in the value range 1 to 300.
Remote Pkt Loss Threshold (pkt/sec) Determines the Remote Pkt Loss Threshold in
packet per second in the value range 1 to 300.
CESoETH Frame Loss Threshold Determines the CESoETH Frame Loss
(pkt/sec) Threshold in packet per second in the value
range 1 to 300.
4
Click Save to save the changes and return to the previous window.
5
Click Cancel to return to the previous window without saving the changes.
END OF STEPS
1
Select Data -> CES Management -> PW Management from the menu bar.
Result:
2
Click Create in the CES PW Management screen. The Create CES PW screen is displayed.
Result:
Note:
• One PW shall only be allowed to bind to one CES circuit and vice versa.
• One TDM port (E1/DS1 port) can only be bound to one CES circuit and vice versa.
• One TDM profile can only be bound to one CES circuit and vice versa.
Select the parameters as described in Table 93, “CES Pseudowire management” (p. 410)
Parameter Description
User label Specifies the Pseudowire User label.
PDH Port Specifies the PDH Port.
TDM Parameters Profile Specifies the TDM parameters.
Status Specifies the status of the PW.
The supported values are:
• active
• notinservice
The default value is active.
Type Specifies the PW type.
3
Click on Performance Monitoring in the CES statistics and configure PM data as described in
3.37.5 “PM Data tab” (p. 202).
4
Click Save to save the changes and return to the previous window.
5
Click Cancel to return to the previous window without saving the changes.
END OF STEPS
The alrms menu allows the operator to manage entities yield alarms when they malfunction. This
section deals with the configuration of ASAPs (Alarm Severity Assignment Profile). An ASAP is a list
of Alarm probable causes to which Severities Profiles are assigned, predefined or settable by the
operator. The menu options are:
• CES TCA Profile Mng - Allows to configure and display of the active threshold crossing alarm
profile of CES (TCA = Threshold Crossing Alarm).
• ETH TCA Profile Mng - Allows to configure and display of the active threshold crossing alarm
profile of ETH.
• TDM TCA Profile Mng - Allows to configure and display of the active threshold crossing alarm
profile of TDM.
• TDM ASAP Mng - Allows to configure and display the TDM ASAP (Alarm Severity Assignment
Profile).
• Data ASAP Mng - Allows to configure and display the data ASAP.
• PDH Global Settings - Allows to configure the PDH global settings.
• ALM Resynch. - Allows to update the alarm database to the current alarm situation.
• Condition Log - Allows to collect the alarm history report from the NE.
• House Keeping - Allows to manage the input and output points of the shelf.
The Create hyperlink allows to create a threshold profile. On selecting an instance and clicking
Delete hyperlink deletes the specific threshold profile.
Check the Show ghost objects option to know the status of the threshold profile as shown in .
The ethernet TCA profile displays Eth Port Threshold and Flow Threshold . The Flow Threshold
tab is displayed as shown in Figure 254, “ETH TCA profile - Flow Threshold tab” (p. 413).
• Eth Port Threshold - Allows to create and delete threshold profile for an ethernet port.
The TCA Profile tab contains the Filter panel that contains the following parameters:
• Profile Type - the associated combo-box lists all the TCA profile access Identifier.
The values are:
− blank = none
− ALL = all profiles
− STMn = STMn (Where n = 1, 4, 16, 64)
− VCn = VCn (Where n = 4, 44c, 416c, 464c)
− LOVCn = LOVCn (Where n = 3 and 12)
− OTU2 = OTU2 port profiles
− GBE = Gigabit Ethernet profiles
− MAU = MAU port profile
− TUSEG
− E1
• TCA-Profile ID - it has three associated combo-boxes:
− The first combo-box lists all the TCA profile access Identifier with the THP prefix followed by
the Profile Type abbreviation previously described, e.g. THPVC4
− The second and third combo-boxes allow to set a number for the profile access Identifier. The
range is from 0 to 256, e.g. THPVC4
• User Label - This is an entry field which allows to digit the user label of the profile access
Identifier. This is the TCA-AID with only one of the profile number and precedes by the LBL
description
The panel has the following hyperlinks:
The Cancel allows to close the page and return back to the previous page.
The Search allows to start the search procedure.
The TCA Profile page contains the Create hyperlink that allows to create a new TCP Profile. See
3.93 “Manage TDM TCA profile” (p. 424).
The ASAP Mng tab displays the ASAP FILTER panel that contains the following parameters:
• ASAP-TYPE - This is the associated combo-box lists all the available types services as the
tributary signal.
• ASAP AID - The associated combo-box lists all the available ID services as the tributary signal.
The default values are:
− ALL = all alarms
− ASAPEQPT
− ASAPTUSEG
− ASAPSTM1
− ASAPVC4
− ASAPLOVC12
− ASAPT1
− ASAPE1
− ASAPSECU
• User Label - The entry box shows a mnemonic string to address the ASAP. The xxxxxxx-0
and -1 are factory defined, while xxxxxx-2 to -n can be set by the user. Each single alarm can
be classified with a criterion selected by the operator.
The Search hyperlink allows to start the search procedure.
The Create allows to configure a new ASAP. See 3.88 “Manage TDM ASAP” (p. 403).
Click on Resynchronize functional button a command refresh the alarms and the relevant
information is referred.
The Alarm Log tab displays the Filter by panel that contains the following parameters:
• Domain - Specifies the domain for filtering the alarm. The values are ALL, TDM, and DATA.
Note: If the selected Domain value is DATA, the widow displays Severity drop down, the values
are: CRITICAL, MAJOR, MINOR, WARNING, and CLEARED.
Note: If the selected Domain value is ALL, the Event Type and Aid Type parameters are not
available.
• Event Type - Specifies the event type that triggers alarm. The values are ALM and NOTALM.
The Input Points tab displays the Input Points Attributes panel that contains the following
parameters:
• Action - Specifies the action of the alarm.
• Alarm - Specifies the alarm.
• Condition - Specifies the alarm condition.
• Access Identifier - Specifies the access identifier of the control input point.
• Notification Code - Specifies the notification code of the alarm.
The values are:
− CR - Critical Alarm
− MJ - Major Alarm
− MN - Minor Alarm
− WR - Warning Alarm
− NA - Not Alarmed
− NR - Not Reported
• Alarm Type - Specifies the alarm type.
• Alarm Message - Specifies the text message associated with the alarm.
• Polarity - Specifies the polarity of the alarm. The values are ALOW and AHIGH.
The Output Points tab displays the Operate/Release Output Points and Output Points Control
Attributes panels that contains the following parameters:
• Action -
• Access Identifier - Specifies the access identifier of the external control output point.
• Control Type - Specifies the alarm control type.
• Control State - Specifies the alarm control state.
• Alarm Message - Specifies the text message associated with the alarm.
• Polarity - Specifies the polarity of the alarm.
The values are:
− AHIGH - Active high
− ALOW - Active low
• Operation Mode - Specifies the operation mode of the alarm. The values are MANUAL or
AUTOMATIC.
• Selected Condition Type - Specifies the standing condition that triggers the alarm of the
selected external control output point.
• Selected Access Identifier - Specifies the access identifier of the standing condition that
triggers the alarm of the selected external control output point.
1
Select Alarms -> CES TCA Profile Mng to view the CES TCA Profile Management screen as
displayed in Figure 262, “CES TCA Profile alarm” (p. 420)
2
Click Create to create a CES TCA Profile alarm.
3
Specify the User label and select the granularity as 15-min or 24-hour.
4
Select true or false to enable the Near-end and far end parameters and provide a Low and High
value in the range 0 to 4294967295.
5
Click Save to save the CES alarm profile.
END OF STEPS
1
Navigate to the CES TCA alarm profile screen and select the CES alarm profile to modify. The
Figure 264, “CES threshold profile creation” (p. 422) screen is displayed.
2
Click Deactivate to deactivate the Alarm.
3
Click Save to save the modifications or click Cancel to return to the previous screen.
END OF STEPS
1
Select Alarms -> CES TCA Profile Mng to view the CES TCA Profile Management screen as
displayed in Figure 265, “PDH alarm global management” (p. 424)
2
Specify the PDH DEG Clear Threshold, the PDH DEG Raise Threshold and the PDH DEG
interval.
3
Click Saveto save the PDH threshold configuration.
END OF STEPS
1
Select Alarm ->TDM TCA Profile Mng option from the Menu bar as shown in Figure 266,
“TDM TCA profile” (p. 424).
To modify an existing profile, select the profile from the drop-down list box, choose any profile
type listed or Select the TCA Profile identifier and select the TCA profile identifier from the
corresponding drop-down list boxes or Enter the user label in the entry box and click Search to
apply the filter based on the criteria selected.
3
Table 94, “Filter panel parameters” (p. 424) provides the description of Filter panel parameters.
Parameter Description
AID E1 Access Identifier, specifies the selected E1 facility to
which the command is directed. The supported value is
E1-{1}-{1}-{3,4}-{1-16} (E1 contained in a CES module).
TCA Profile Identifier The PM Threshold Crossing Alert (TCA) profile name to
use with this facility.
1-40 alphanumeric characters (plus '-') assigned as the
userlabel for the desired profile
User Label Specifies the Label of the TCA profile.
Port Type Specifies the type of E1 port. The supported values are:
• NORMAL Normal E1 with a physical port connection
• PDHANY E1 transparently encapsulated in both
directions
Alarm Profile Specifies the The Alarm Severity Assignment profile
(ASAP) name to use with this facility.
Primary State Specifies the primary state to which the facility is set
The supported values are:
• IS: In Service
• OOS-AU: Out Of Service - Autonomous
• OOS-AUMA: Out Of Service - Autonomous and
Management
• OOS-MA: Out Of Service - Management
4
Click Create to configure a new TCA profile as shown in Figure 267, “TCA profile creation”
(p. 426).
5
Choose the Profile Type from the drop-down list box, enter the User Label, and set the default
value to either Y or N.
6
Table 94, “Filter panel parameters” (p. 425) provides the description of Create TCA Profile
panel parameters:
7
Click Save & Exit to save the settings and return to the window.
8
Click Save & Continue to save the settings and create another TCA Profile.
9
Click Cancel to revoke all the settings and return to the previous page.
END OF STEPS
Synchronization
1
Select Synchronization ->Sync Ethernet -> Clock Management from the menu bar as shown
in Figure 268, “Synchronization Ethernet: clock management” (p. 427).
Note:
• Use timing port #5 and #6 from main board (Slot #2) for line clocks.
• Use timing port #3 and #4 from Slot #3 for line clocks/adaptive recovered clocks.
• Use timing port #1 and #2 from Slot #4 for line clocks/adaptive recovered clocks.
2
Specify the clock synchronization reference resource setting as described in Table 95,
“Reference Sources Setting parameters” (p. 428)
Parameter Description
Sync Ref # Provides the serial number for referencing the
synchronization priority of the ports.
Port Preference Provides the port options for synchronization.
Provisioned SSM Determines the SSM classification.
The supported values are:
• AUTO
• PRC
• SSU_A
• SSU_B
• EEC
• DNU
• Disable
The default SSM is Disable.
Reference Type Indicates the clock type as line, 1588 Clock or
station Clock.
To set an SSM, click to Select the SSM and click Apply against each SSM type.
3
Click Refresh to refresh the values at any point. All changes are lost during a refresh.
4
Click Save All to save the Reference Sources Setting configured.
5
Click Alarms View to view the list of alarms as shown in Figure 269, “View Alarms” (p. 429)
END OF STEPS
1
Set the SSM SyncRef # associated with priority levels, by clicking against each SSM SyncRef#
mapped to the priority classification. Provide a value between 1 to 8 or select None, as
applicable as shown in Figure 270, “Equipment Clock - T0” (p. 430)
2
Click Refresh to refresh the values on the equipment clock. Changes made are not saved
during a Refresh.
3
Click Save to save the priority mapping for the equipment clock.
4
Click Legend to view the clock legend as shown in Figure 271, “Clock Legend” (p. 431).
END OF STEPS
1
Set the Revertive mode of the Equipment clock and the Output Clock as Yes or No, to enable or
disable.
2
Set the wait-to-restore time in minutes.
3
Set the Reference source to any of the mapped reference sources SynRef#1 to SynRef#8 or
select Auto for automatic mapping or freerunning.
4
Click Refresh to refresh the values on the screen without saving.
5
Click Save to save the clock setting.
END OF STEPS
1
Select the bandwidth for the equipment clock.
2
Click Refresh to refresh the values on the screen without saving.
3
Click Save to save the output setting.
END OF STEPS
1
Set the SSM SyncRef # associated with priority levels, by clicking against each SSM SyncRef#
mapped to the priority classification. Provide a value between 1 to 8 or select None, as
applicable as shown in Figure 272, “Output Clock - T4” (p. 431).
2
Click Refresh to refresh the values on the equipment clock. Changes made are not saved
during a Refresh.
3
Click Save to save the priority mapping for the equipment clock.
4
Click Legend to view the clock legend.
END OF STEPS
1
Select Synchronization-> Sync Ethernet-> Outgoing SSM Management as shown in Figure
273, “Outgoing SSM Management” (p. 433)
2
Select the Provisioned Outgoing SSM for each port from the drop-down using one of the
following supported values:
• DISABLED - default
• AUTO
• PRC
• SSU_A
• SSU_B
• EEC
• DNU
3
Click Apply against each port for which you have added a provisioned outgoing SSM to apply
the changes.
4
Click Save All to save the changes.
END OF STEPS
1
Select Synchronization ->1588 -> PTP Clock Mode from the menu bar.
Result: PTP Clock Mode screen appears.
Parameter Description
Current IEEE 1588 PTP Clock Mode States the current mode of the clock. The
default is Disabled.
New IEEE 1588 PTP Clock Mode Determines the new clock mode.
The supported values are:
• Ordinary Clock - Slave
• Ordinary Clock - Master
• Boundary Clock
• End-to-end Transparent Clock
• End-to-end Transparent Clock And
OC-Slave
2
Click Save to save the clock mode.
END OF STEPS
1
Select Synchronization ->1588 -> PTP Default clock cfg from the menu bar.
Result: The following screen is displayed when Slave mode as shown in Figure 275, “PTP
Default Clock configuration ” (p. 435).
2
To view the clock settings, click the name of the clock.
END OF STEPS
Use the following procedure to modify the PTP Default Clock Configuration.
1
Select the name of the PTP clock form the list.
Result: The following screen is displayed when Slave mode is selected.
Parameter Description
Clock Mode States the current mode of the clock.
Name Specifies the name of the clock.
Identifier Specifies the clock identity.
Clock Type Specifies the clock type.
The available options are:
• Phase/ToD
• Frequency + Phase/ToD (to RPC)
Domain Specifies the domain. The value ranges from
0-255.
Two Step Flag The available options are True or false.
Number Of Ports Specifies the number of ports.
IP address Internet Protocol address, it is the IP
address of the NE. The address 0-0-0-0 is
not allowed. Neither the network nor the host
portion of the address when viewed in binary
format may be all 0s or all 1s.
The values range from 0-223, 0-255, 0-255,
0-254.
Parameter Description
Subnet mask Mask, it is the subnet mask of the network
the NE is connected to. The mask, in binary
representation, must contain a contiguous
string of 1s (the network portion) and a
contiguous string of 0s (the host portion).
The values range from 0-255, 0-255, 0-255,
0-255.
Gateway Address Gateway address, it is the default gateway
router's IP address. Leading zeros are
allowed. A value of 0-0-0-0 disables the
functionality associated with the use of a
default gateway. Neither the network nor the
host portion of the address when viewed in
binary format may be all 0s or all 1s.
The values range from 0-223 , 0-255 ,
0-255, 0-254.
2
The following screen is displayed when Master mode is selected.
Parameter Description
Clock Mode States the current mode of the clock.
Name Specifies the name of the clock.
Identifier Specifies the clock identity.
Clock Type Specifies the clock type.
The available options are:
• Phase/ToD
• Frequency + Phase/ToD (to RPC)
Domain Specifies the domain.
Two Step Flag The available options are True or false.
Parameter Description
Number Of Ports Specifies the number of ports.
Class The applicable values are 13, 14, and 58. 13
if the 1588 protocol has a valid clock source
- BITS or Line. 14 if 1588 protocol has a
clock source which is in holdover for less
than 4 hours. 58 if the 1588 protocol has a
clock source which is in holdover for more
than 4 hours.
Accuracy TSS 5 uses an altenate PTP profile value for
clock accuracy. The applicable values are
80, 81 and 82 (hexadecimal). 80 if the 1588
protocol has a valid clock source - BITS or
Line. 81 if 1588 protocol has a clock source
which is in holdover for less than 4 hours. 82
implies that the 1588 protocol has a clock
source which is in holdover for more than 4
hours.
Offset Scaled log Variance
Priority 1 Specifies the priority. The value ranges from
0 to 255.
Priority 2 Specifies the priority. The value ranges from
0 to 255.
IP addess Internet Protocol address, it is the IP
address of the NE. The address 0-0-0-0 is
not allowed. Neither the network nor the host
portion of the address when viewed in binary
format may be all 0s or all 1s.
The values range from 0-223, 0-255, 0-255,
0-254.
Subnet mask Mask, it is the subnet mask of the network
the NE is connected to. The mask, in binary
representation, must contain a contiguous
string of 1s (the network portion) and a
contiguous string of 0s (the host portion).
The values range from 0-255, 0-255, 0-255,
0-255.
Parameter Description
Gateway Address Gateway address, it is the default gateway
router's IP address. Leading zeros are
allowed. A value of 0-0-0-0 disables the
functionality associated with the use of a
default gateway. Neither the network nor the
host portion of the address when viewed in
binary format may be all 0s or all 1s.
The values range from 0-223 , 0-255 ,
0-255, 0-254.
3
Click Save to save the configuration.
4
Click Cancel to return to the previous screen without saving.
END OF STEPS
1
Select Synchronization ->1588 -> PTP clocks from the menu bar.
Result: Local PTP clocks screen appears as shown in Figure 276, “PTP clocks” (p. 441).
2
Click Refresh to refresh the Local PTP clock listing.
END OF STEPS
1
Select the name of the PTP clock from the list of Local PTP clocks.
Result: The following screen is displayed as shown in Figure 277, “Modify Local PTP Clock”
(p. 441)
2
Click Save to save the configuration.
3
Click Cancel to return to the previous screen without saving.
END OF STEPS
1
Select Synchronization ->1588 -> PTP ports from the menu bar.
Result: Configure PTP Ports screen appears as shown in Figure 278, “PTP Ports”
(p. 442).
2
Click Create to create a PTP port.
Result:
3
Select the Port Type from the drop-down.
4
Click Select to select the port to apply the PTP as shown in Figure 280, “Select the physical
port” (p. 444)
5
Click Create to create the PTP port or click Cancel to return to the previous screen without
saving.
6
Click Refresh to refresh the Local PTP clock listing.
7
To delete a PTP port, ensure that the admin status of the PTP port shows as disabled and no
active PTP sessions are existing. Check the checkbox provided for the port and click Delete.
END OF STEPS
1
To modify the PTP port, Select Synchronization ->1588 -> PTP ports from the menu bar.
Result: Modify PTP port screen appears as shown.
2
Modify the parameters as described in the section on Create PTP ports.
3
Click Save to save the modifications or click Cancel to return to the previous screen without
saving.
4
To Delete the PTP port, ensure that the admin status of the PTP port shows as disabled and no
active PTP sessions are existing. Check the checkbox provided for the port and click Delete.
5
Click Refresh to refresh the configured PTP port list.
END OF STEPS
1
After creating the PTP port, Click Create under PTP session to create the PTP session.
Result:
2
Select the PTP port and specify the Session Id.
3
Click Create to create a new session.
Result: The following screen is displayed as shown in “Create a PTP Session” (p. 0)
4
Select the Name of the port to modify the port.
Note: PTP Admin state must be enabled before creating PTP Session.
END OF STEPS
1
To modify the PTP port, navigate to the Config PTP Port/Session screen and select the port to
modify as shown in Figure 282, “Modify PTP port session” (p. 447)
2
Select the Encapsulation Type
3
Specify the Unicast Destination IPV4 address is remote PTP node's In band IP address.
Note: If PTP is configured on Slave port role (OC-Slave or BC clock mode) or AUTO port role
(BC clock mode), then the unicast IP address for the peer master must be provisioned once,
when one of the above Encapsulation types is selected. If 1588 selects UDP/IPv4 over TMPLS-
MPLS-TP over Encapsulation, the PW needs to be specified for that session.
4
Specify the Multicast negotiation types. The options are: 0-Multicast; 1-Multicast-Unicast;
2-Unicast
5
Click Save to save the modifications or click Cancel to return to the previous screen without
saving.
6
To Delete the PTP session, check the checkbox provided for the session and click Delete.
7
Click Refresh to refresh the configured PTP session list.
END OF STEPS
1
Select Synchronization ->1588 -> External Interfaces from the menu bar.
Result: External Interfaces screen appears as shown in Figure 283, “External Interfaces”
(p. 449).
2
To modify an external interface, click on the name the modify.
Result: External Interfaces screen is displayed as shown in Figure 284, “Modify External
Interfaces” (p. 449).
3
Modify the Direction as Input or Output
4
Modify the Cable Correction in the value range of -100ms:100ms.
5
Set the Admin status as enabled or disabled.
6
Click Save to the save the modifications or click Cancel to return to the previous screen without
saving.
7
Click View, to view the list of alarms.
END OF STEPS
PNAC Management
1
Select Security->Administration->PNAC Management (802.1x)-> Enable PNAC. The
Configure PNAC per node screen is displayed as shown in Figure 285, “Configure PNAC per
node” (p. 451).
2
Select Enabled from the PNAC Enabled drop-down to configure PNAC on each node. Select
Disabled to disable PNAC configuration on each node. The default is Disabled.
3
Click Save to apply the changes.
END OF STEPS
1
Select Security->Administration->PNAC Management (802.1x)-> PNAC per Port. The
Management PNAC per port screen is displayed as shown in Figure 286, “PNAC Management
per port” (p. 452).
2
Select the Board from the List Boards drop-down and click Search/Refresh.
3
The list of ports configured on the board are refreshed. Click on a Port name to modify.
4
The screen is refreshed to display the PAE modification tab as shown in Figure 287, “PAE”
(p. 452).
5
In the Modify PAE, update the PAE settings as required. Modify the parameters as described in
Table 97, “Modify PAE parameters” (p. 453)
Parameter Description
User Label Specifies the port identifier.
Note: This is a non-editable field
Port Capabilities Specifies the Port authentication capability.
Note: This is a non-editable field
Port Initialize Indicates the initialization status.
The supported values are:
• True
• False
The default value is False.
Port Reauthenticate Indicates the port Reauthentication status.
The supported values are:
• True
• False
The default value is False
Port Auth Mode Indicates the Authentication mode for the port.
The supported value is portBased
Port Protocol Version Indicates the protocol version.
Note: This is a non-editable field
Port Supplicant count Indicates the supplicant count as applicable.
Note: This is a non-editable field
Port Status Indicates whether the port is authorized or
unauthorized.
Note: This is a non-editable field
6
Click Save to save any modifications.
7
Click Cancel to return to the previous screen without saving.
8
To view the associated alarm status, click Refresh for Alarms. The alarm details are refreshed.
END OF STEPS
1
Select Security->Administration->PNAC Management (802.1x)-> PNAC per Port ->
Search-> Autheticator PAE tab. The Modify Authenticator PAE screen is displayed shown in
Figure 288, “Authenticator PAE” (p. 453).
2
Modify the Authentication PAE parameters as described in Table 98, “Modify Authentication
PAE parameters” (p. 454).
Parameter Description
User Label Specifies the port identifier.
Note: This is a non-editable field
MaxReq Specifies the MaxReq. value.
Pae State Indicates whether the PAE state is initialized.
Note: This is a non-editable field
Quiet Period (second) Specifies the quite period in seconds.
Backend Authentication State Indicates whether the authentication state is
initialized.
Note: This is a non-editable field
Tx Period (second) Indicates the transmission period in seconds.
Parameter Description
Admin Controlled Directions Indicates the direction.
The supported values are:
• Both
• In
Supp Timeout (second) Indicates the Suppliment Timeout in seconds.
Oper Controlled Directions Indicates the Operational controlled direction.
Server Timeout (second) Specifies the server timeout in seconds.
Controlled Port Status Indicates the port status.
ReAuthenticate Period (second) Indicates the re-authentication period in
seconds.
Controlled Port Control Indicates the controlled port.
The supported values are:
• forceAuthorized
• forceUnauthorized
• auto
Key Tx Enabled Determines whether the Key transmission is
enabled or disabled.
The supported values are:
• True
• False
ReAuthenticate Enabled Indicates whether re-authentication is enabled
or disabled
The supported values are
• True
• False
3
Click Save to save the modifications or click Cancel to return to the previous screen without
saving.
END OF STEPS
1
Select Security->Administration->PNAC Management (802.1x)-> PNAC per Port ->
Search-> Autheticator PAE Statistics tab. The Details Authenticator PAE statistics screen is
displayed shown in Figure 289, “Details of Authenticator PAE Statistics” (p. 455).
2
View the Authentication PAE parameters.
3
Click Cancel to return to the previous screen without saving.
END OF STEPS
1
Select Security->Administration->PNAC Management (802.1x)->Auth Server
Configuration -> Authentication Type. The Authentication Server Configuration screen is
displayed shown in Figure 290, “Authentication Server Configuration ” (p. 457). There are two
types of server mode Local Server and Remote Server.
2
Select the PNAC Authentication Server Type as localserver or remoteserver. The default is
localserver. The following screen is displayed when local server is selected.
3
Click Save to save the configuration.
END OF STEPS
1
Select Security->Administration->PNAC Management (802.1x)->Auth Server
Configuration -> Authentication Configuration. The PNAC Authentication Configuration
screen is displayed shown in Figure 293, “PNAC Authentication Configuration ” (p. 458).
2
Select List for the list of ports. The following screen is displayed:
3
Specify the parameters in the User Configuration section as described in Table 99, “Configure
Authentication” (p. 459)
Parameter Description
User Name Specifies the User name for authentication.
Password Specifies the Password for authentication.
Auth Protocol Specifies the authentication protocol value
Note: This value is non-editable
Parameter Description
Auth Timeout (seconds) Specifies the Authentication timeout in seconds
Status Indicates whether the authentication is active or
disabled.
Note: This value is non-editable
Permission Indicates the permission for the user.
The supported values are:
• Allow
• Deny
List Port Lists the ports that can be authenticated to the
defined user.
4
Select the Port mapping for the authenticated User and click Save to save the authentication or
click Cancel to return to the previous screen without saving.
END OF STEPS
1
To modify a PNAC User Authentication, navigate to the Authentication configuration screen,
select the User to modify and click on the User Name of the authentication details to be
modified as shown in Figure 294, “Modify PNAC User Authentication” (p. 461)
2
Modify the parameters as applicable and click Save to save the modifications. Click Cancel to
return to the previous screen without saving.
3
To Delete an authentication configuration, navigate to the Authentication Configuration screen,
select the User and click Delete.
END OF STEPS
Index
MPLS-TP Ring Protection 294 L2 encapsulation profile 44
A PHB profile 288, 291 LAG
administer queue management 218
management 174
tunnel protection switching 173 queue profile management 303
modify configuration 180
traffic descriptor (data) 215
alarms login, system 97
transit pseudowire 360
condition log 417 transit tunnel 319
management 33 tunnel protection 248
menu 411 M
resynch 416 Create
Manage
ASAP User Account 105
TDM ASAP 403
management 415 create TDM TCA profile 424
Auto DCN 263 VLAN 379
Manage OSPF 268
create TDM 51
Manage port 281
B management
browser D alarm 33
cascading menu 38 DB network element 32
combo-boxes 38 management 119 security 32
dialog boxes 40 software 32
dimensions and layout 35 DCN interface 78 system 32
entry box 39 DFT 166
functional tabs 36 Manager
hyperlinks 36 documentation List 144
menu bars 38 set 27 menu
menus 38 alarm 411
panels 35
window 35 E menu description 40
EFM tool 68 modify
C E-LAN service management 68 maintenance association 229
maintenance domain 226
change Ethernet pseudowire 348
site identifier 104 service XC 52 queue profile 221
user password 103 EVPL service 52 MPLS-TP
Change EVPLAN service 53 MIP discovery 301
UserAccount 107 Ring Association 49
color profile 57
F
configure N
functionalities, ZIC 32
IP address 256 NE
LAN management 258
autodiscovery 81
conventions 26 G configuration 76
create global network 42 network domain 82
color profile 223 group segregation management 59 network element
e-lan service 376
GUI management 32
EVPL service 365
EVPLAN service 372 browser window 35 NTP 162
head/tail pseudowire 358
head/tail tunnel 310 I
IP routing 276 O
L2 encapsulation profile 284 in fiber in band management 78 OAM
LAG 174 in-service upgrade 118 global setting 234
maintenance association 226
maintenance domain 224 OAM management 60
MEP 230 L OSI management 84
P Z
PC shortcuts ZIC functionalities 32
keyboard 33
mouse 34
PM
GlobalFile 149
PNAC
management 451
pseudowire management 346
Q
QoS
OAM PHB profile 46
overview 45
PHB profile 45
traffic descriptor 47
queue management 60
S
search TDM 50
security management 32
service
EVPL 52
EVPLAN 53
software
management 32
static filtering DB 69
synthetic loss measurement 147
system
access 97
change password 103
login 100
logout 101
system management 32
T
TCA profile 414
TDM
create (ETSI) 51
search (ETSI) 50
TMPLS
OAM 49
pseudowire management 49
tunnel management 48
traffic descriptor 55