TejNES User Interface Guide-TJ100CPr

May 25, 2018 | Author: sudheerarja | Category: Computer Network, Menu (Computing), Microsoft Windows, Internet Explorer, Technology


Comments



Description

VolumeB User Interface Guide 104-DOC000027-E TJ100CPr4 Version 1.0 Revision history Revision Date Comments 1.0 11/03/2008 Standard Release © 2000-2008 Tejas Networks India Ltd., All Rights Reserved. To the best of Tejas Networks's knowledge, at the time of its preparation, the information in this document is accurate. However, Tejas Networks makes no warranty or representation with respect to its accuracy and disclaims all liability which may result from inaccuracies, or third-party use, or third-party reliance. This information is subject to change without notice. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy, or otherwise, without the prior written consent of Tejas Networks. Tejas Networks assumes no responsibility for its use, nor for infringements of patents or other rights of third parties. This document implies no license under patents or copyrights. Trademarks in this document belong to their respective companies. Table of contents iii Table of contents 0 About this Document 1 1.1 Audience 1 1.2 References 1 1.3 Software Support 1 Technical Support Information 3 Browser Based User Interface 5 3.1 Introduction 5 3.2 System Requirements 5 3.3 User Interface Layout 6 3.3.1 Title area 8 3.3.2 Alarm Banner 8 3.3.3 Navigation menu 9 3.3.4 Input/Output area 9 3.4 Working with the Network Element User Interface 9 3.5 Logging In 10 3.6 Logging Out 12 NE Information 13 4.1 Introduction 13 4.2 Network Element Information 14 4.2.1 Configuring the network element 14 Node Slot View 17 5.1 Viewing card parameters 18 System Time 21 6.1 Introduction 21 6.2 Managing Date and Time 21 6.2.1 Setting date and time on a network element 21 6.2.2 Setting time zone on a network element 22 6.2.3 Setting network time server 25 Inventory 29 7.1 Introduction 29 7.2 Node Inventory 29 7.2.1 Deleting pluggable modules 30 7.3 Shelf 32 Protection 33 8.1 Introduction 33 User Interface Guide Version 1.0 iv Table of contents 8.2 Connections 33 8.3 Timing Manager 38 8.3.1 Viewing timing manager protection request 39 8.3.2 Giving external commands to synchronization sources 40 Configuration 41 9.1 Introduction 41 9.2 Cross-connects 41 9.2.1 Filtering cross-connects 42 9.2.2 Adding cross-connects 44 9.2.3 Editing Cross-connects 47 9.2.4 Deleting Cross-connects 48 9.3 Overhead Tunnel 48 9.3.1 Viewing Overhead tunnel 49 9.3.2 Provisioning overhead tunnel 50 9.3.3 Deleting overhead tunnel 51 9.4 Environmental Alarm Inputs 51 9.4.1 Provisioning environmental alarms 51 9.5 SNMP traps 52 9.5.1 Configuring network element to send SNMP traps 52 9.5.2 Deleting SNMP traps 53 9.6 Facilities 53 9.6.1 Provisioning STM ports 56 9.6.2 Setting TCA for 15-min interval/1-day duration 59 9.6.3 Provisioning AUG 61 9.6.4 Provisioning AU4 62 9.6.5 Editing AU4 performance monitoring parameters 66 9.6.6 Provisioning TU 67 9.6.7 Configuring TU performance monitoring parameters 72 9.7 PDH Ports 74 9.7.1 Configuring E1/E3 ports 75 9.7.2 Viewing TCA profiles for PDH ports 76 9.7.3 Provisioning a new TCA profile for PDH ports 78 9.7.4 Deleting TCA profile of a PDH port 81 9.8 Ethernet 81 9.8.1 Configuring Ethernet ports 84 9.8.2 Viewing the TCA settings for Ethernet ports 86 9.8.3 Configuring TCA profiles for Ethernet ports 86 9.9 VCG 87 9.9.1 Provisioning the VCG interface 87 9.9.2 Viewing VC group 90 9.9.3 Provisioning LCAS 91 9.9.4 Adding a VC to VCG 93 9.9.5 Deleting a VC from VCG 95 9.10 Network (NE) Adjacency 95 9.10.1 Enabling auto-discovery for an STM port 96 TJ100CPr4 16.5 Event History 132 10.4.4.2 Editing network interfaces 101 9.6 Alarm Severity 133 10.11.1 Viewing the network interfaces 100 9.1 Viewing and editing the synchronization status 117 9.3 Deleting a proxy ARP neighbour 113 9.5 Nominating a timing reference 124 Faults 127 10.4 Alarm Filters 130 10.13.16.3 Provisioning a Embedded Communication Channel 103 9.2 Adding a Proxy ARP neighbour 112 9.11.1 Configuring OSPF area 107 9.1 Setting alarm severity 133 Profiles 135 11.1 Viewing Proxy ARP neighbours configuration 111 9.2.13.12.14.4 Provisioning Management Channel 104 9.10.2 Adding static routes 109 9.3 Editing selected timing reference 122 9.3 Provisioning trunks manually 97 9.11 DCN 98 9.2 Provisioning a new alarm filter 130 10.2 Viewing the selected timing references 120 9.12.3.12 OSPF 106 9.15.4.6.13.1 Viewing static routes 108 9.1 Introduction 135 User Interface Guide Version 1.1 Viewing event history 132 10.16 Synchronization 117 9.14 Proxy ARP Neighbour 111 9.11.5.2 Disabling OSPF area 107 9.10.14.3 Deleting a static route 110 9.3 Suppressed Alarms 129 10. Table of contents v 9.2 Viewing neighbour information 96 9.2 Editing serial port 115 9.15.3 Deleting an alarm filter 131 10.4 Deleting a nominated timing reference 123 9.0 .1 Introduction 127 10.1 Viewing active alarms 128 10.16.1 Viewing serial port information 114 9.14.16.13 Static Route 108 9.11.2 Active Alarms 127 10.1 Viewing suppressed alarms 129 10.1 Viewing alarm filters 130 10.15 Serial Port 114 9.16. 2 Upgrading software 172 14.2.vi Table of contents 11.2 Provisioning path alarm profile 141 11.2 Editing STM port profiles 137 11.3.4 Viewing the performance statistics of the transceiver 153 12.1 Introduction 163 13.1 Viewing path alarm profiles 139 11.4 Deleting user account 168 Maintenance Operations 169 14.5.1 Creating a new user account 165 13.2 System Settings 169 14.7.4.3 PDH Performance Statistics 155 12.1 Performing loopback on STM ports 176 14.3 Deleting a path alarm profile 143 Performance 145 12.2.2.1 Viewing Regenerator Section .2 STM Port Profiles 136 11.5 Loop-Backs 174 14.2.3 Rebooting cards 170 14.2.Multiplex section performance statistics 147 12.4.2.1 Viewing PDH performance statistics 155 12.2 Managing User Accounts 165 13.1 Viewing and editing the system settings 170 14.1 Warm/Cold restarting the network element 171 14.3 Modifying password of a logged in user 167 13.1 Introduction 169 14.2 Viewing performance statistics of path 150 12.7 Diagnostics 179 14.4 Restart and download software 171 14.1 Accessing OSPF diagnostics 179 14.2 STM Performance Statistics 147 12.2 Modifying an existing user account 166 13.2.3 Downgrading software 173 14.3 Viewing performance statistics of the tributary unit 152 12.1 Viewing the performance statistics of ethernet interface 158 12.6 Database Changes 178 14.2.3 Path Alarm Profiles 139 11.5 VCG Interface 160 12.4 Ethernet-Performance Statistics 158 12.3.1 Viewing the performance statistics of a VCG interface 160 Security 163 13.4.2 Accessing System diagnostics data 187 TJ100CPr4 .2.1 Viewing STM port profiles 136 11.3.3.1 Introduction 145 12.4.7.2.2.5. 1 Taking backup of configuration data 189 14.8.3 Restoring factory default settings 192 Acronyms 193 Appendix A 195 16.1 Installing 3Com server 205 18.8 Configuration Management 188 14.1 Cross Connect Support 195 Appendix B 197 17.1 List of Alarms 197 Appendix C 205 18.8.2 Configuring user in the 3Com server 209 Index 213 User Interface Guide Version 1.2 Restoring configuration 190 14.0 .8. Table of contents vii 14. viii Table of contents TJ100CPr4 . 0 . 1 About this Document 1- This document provides general information on features provided by the craft application which is a web user interface for Tejas products. • Terminal Server User Interface Guide Version 1. The topics covered are: • Accessing the user interface • Screen layout of the user interface • user interface menus 1. Note : Some of the features are licensed. please contact your sales co-ordinator.1 Audience This document is intended for the following personnels: • Planners • Provisioners • Network Administrators • Maintenance Personnels 1.3 Software Support This document conforms to the software release 4_6.2 References This document has references to the following documents: • Installation Procedure for TJ100CPr4—104-DOC000026-E • Hardware Description for TJ100CPr4—104-DOC000025-E 1. If you do not find the following options in the navigation menu. 2 About this Document TJ100CPr4 . 0 .com For queries regarding the document. mail to docs@india. 2 Technical Support Information 1- Table 2-1 Technical Assistance Center For problems that affect service 91-99019-71880 For 24 hours emergency recover or software upgrade 91-93438.tejasnetworks.31565 support.com User Interface Guide Version 1.tejasnetworks. that is for: Restoration of service for equipment that has been carrying traffic Issues that prevent traffic protection switching Issues that prevent completion of software upgrades For problems that affect and do not affect the service 91-80-4179-4700 For assistance on technical support and upgrade notification You can also mail to tac@india. 4 Technical Support Information TJ100CPr4 . 0 .1 Introduction This chapter describes the procedures for logging in and logging out of the Tejas Network Element (NE).0 on Red Hat Linux 7. v1. • FireFox 1.6 The browsers that can be used for accessing the WUI are: • Mozilla v1.4. the caching mechanism in the user’s web browser should to be set to search for a newer versions of alarm monitoring page. It also provides the structure and functionality of the craft application or Web User Interface (WUI) for the Tejas Network Element Software (TejNES).7 on Red Hat Linux and HP-UX. 2. 3.Browser Based User Interface 3 1- 3.x • IE 6. User Interface Guide Version 1.2 System Requirements The system used as the craft application should have a minimum of 256 Mb RAM. The operating systems that can run the craft application are: • Windows XP • Windows 2000 • Windows NT • Linux 2.x on WinXp or Win2K To ensure proper operation of the alarm monitoring pages.6. 2 In the drop-down menu click Internet Options. select Automatically for “Check for newer versions of stored pages” and click OK.3 User Interface Layout The WUI provides access to the following functionality: • System Operation • System Configuration • Diagnostics • Maintenance Operations • Software and Configuration Management • User Administration TJ100CPr4 . The Settings dialog box is closed. 5 Click OK in the Internet Options dialog box to close it. click Settings. The Internet Options dialog box is displayed. the browser is now set to display the latest versions of all the web pages. Step Action 1 Click Tools on the menu bar of Internet Explorer. 4 In the Settings dialog box. 3. 3 In the Temporary Internet files section of the Internet Options dialog box.6 Browser Based User Interface The following procedure describes the steps to set the caching mechanism to search for newer pages in Internet Explorer. The Settings dialog box is displayed. Figure 3-1 Sample User Interface Layout .0 . The four areas are as follows: • Alarm Banner • Title area • Navigation menu • Input/Output area Figure 3-1 shows the default view of the TejNES web user interface. Browser Based User Interface 7 The default view of the WUI is divided into four separate areas.Page 1 User Interface Guide Version 1. Auto-refresh is disabled on selecting the check box. It displays the following: • IP address of the NMS port of the network element • Logout option • Tejas logo • Name of the network element Figure 3-2 shows the elements of the Title area. The auto-refresh is enabled by default. The Alarm banner also displays the last refresh time of the network element.3. the counters are not updated and count change due to declaration of new alarms or clearing of existing alarms are not reflected on the banner. Alarm Banner displays a check box.2 Alarm Banner The Alarm Banner displays the active alarms on the network element along with their severity levels. Disabling the automatic refresh will affect only the current WUI and will not affect the refresh functionality for other users or alarm notification to NMS applications.8 Browser Based User Interface 3. TJ100CPr4 .1 Title area The Title area occupies the top frame in the WUI.3. which provides the option to enable/disable auto refresh. When automatic refresh is disabled. Figure 3-2 Title area 3. On confirming a change.4 Input/Output area The Input/Output area displays the respective pages when the menu items in the navigation menu is clicked. Connectivity to the network element software is lost while rebooting. Reboot is necessary when the IP address or the Router ID of the network element is changed. when clicked. the Cancel button is selected by default to avoid inadvertent submission of changes as some web browsers automatically submit the form when Enter key is pressed on the key board.0 .4 Working with the Network Element User Interface The main menu in the navigation tree can be expanded to access the submenus. The pages displayed in the Input/Output area displays the parameters to configure the network element as desired.3. Each application provides access to different operations depending on the access privileges of the user. 3. 3. Warning 3.3 Navigation menu The Navigation menu displays the menu items for accessing the various network element WUI applications. User Interface Guide Version 1. Browser Based User Interface 9 The question mark above the alarm banner indicates the order in which the alarms are displayed (Critical Major Minor Deferred Warning) when mouse is brought over it. you will be indicated about initiating a reboot and traffic disruption. The submenus launch a specific application.Minor • Yellow . The WUI prompts for a confirmation when a user deletes. The color code for the alarms are as follows: • Red .Critical.Deferred. Major • Orange . The software reboots without affecting the commissioned traffic (warm reboot). modifies or provisions any feature. The changes are applied only after a confirmation from the user.3. During confirmation. TJ100CPr4 .254 is the default factory setting. open a web browser session and enter the following Universal Resource Locator (URL): http://192.5 Logging In The craft application or the WUI of a network element can be accessed remotely using DCC.1. which when clicked. To log into the network element. Cross-connect.168. After the system is commissioned the network element is assigned the element specific URL. restores the original values for the modified parameters. you need to add the IP address of the gateway network element in the network as route in your system. Aggregate and Tributary card (PXAT).168. Note 1: An Ethernet cross cable is used for direct connectivity between the Ethernet interface of the PC and the NMS port on the PXAT card of the network element.254:20080/ Note 3: The URL http://192. 3. connect an Ethernet interface of the craft PC/terminal to the Network Management System (NMS) port on the Processor. when connected through an Ethernet hub/switch. To access the WUI.1.10 Browser Based User Interface A Reset button is provided in each provisioning and editing page. Note 2: An Ethernet straight cable is used to connect the network element and the PC terminal. To access a network element in a network remotely. • Route to the subnet IP.0 . version 5.1.75 onwards or Internet Explorer. Figure 3-3 TejNES user login screen User Interface Guide Version 1. http://192. • Malfunction of the network element software. If the URL is accessible. version 4. On successful log in. the following can be a possible reason: • Ethernet connectivity to the network element is improper. • Ethernet interface on the PC/terminal is not provisioned. • Type of cable used is different (straight/cross). Note 5: Ensure that the computer has Netscape Navigator.0 onwards for setting up the network element software. login to the WUI with the User Name as tejas and Password as j72e#05t. is not present on the terminal. the NE Information page is displayed. • Incorrect URL entered to access the network element.254:20080. Browser Based User Interface 11 Note 4: If the URL is not accessible. The user authentication screen is shown in Figure 3-3.168. Also after finishing the work. To login as a different user. Note 7: The performance of the craft application is reduced with the increase in the number of sessions. The command implementations are on first-come-first-serve basis. click the Change User button and retype the user name and password. CAUTION Multiple administrative and diagnostic logins During multiple administrative and diagnostic logins. TJ100CPr4 . To login again. 3. ensure that actions performed do not affect the work of other users. On clicking LOGOUT. the user exits from the application and a logout page is displayed. the user should logout of the application and close the browser. the user has to enter the password and login.6 Logging Out A LOGOUT link is provided on the right side of the Title Area (refer to Figure 3-1). Note 8: The “Save this password in your password list” should not be checked if the craft application is used from a shared PC.12 Browser Based User Interface Note 6: Change the initial password of the default user account on the network element. The default user accounts and passwords are widely known. Terminal Multiplexer (TM) etc. Router ID Enter the IP address of the network element for in-band communication. Node Product Code Displays the product type. User Interface Guide Version 1. Contact Enter the contact details and contact number of the person maintaining the network element. 4 NE Information 1- 4. MAC Address Displays the MAC (Media Access Control) address of the network element. The basic configuration information of a network element can be accessed and managed in this page.0 . Table 4-1 Parameters on the NE information page Field Description Name Enter the identification label for the network element. AU Mode Displays the operating granularity of the network element. The NE information page is the default page displayed after logging into the network element. Node Configuration Displays the configuration of the network element as either Add-Drop Multiplexer (ADM). The Router ID is unique in a network and is used by the Network Management System (NMS) to identify the network element Ethernet IP Enter the IP address and the subnet mask for the network element for LAN port communication.1 Introduction This chapter explains the Network Element (NE) information page. Table 4-1 describes the fields displayed on the NE Information page. 2 Network Element Information In the NE Information page displays the basic information such as the node name. operating mode and granularity. Software Version Displays the version of the software installed on the network element. node configuration. The software reboots without affecting the commissioned traffic (warm reset) when Router ID or Ethernet IP are changed. The network element does not reboot for any changes made in name. location. Ethernet IP. The NE information page is displayed.1 Configuring the network element The following are the steps to view and set up the network element. 4. A confirmation page is displayed. contact and location fields are configurable. Name.14 NE Information Table 4-1 (continued) Parameters on the NE information page Field Description Location Enter the location or site information where the network element is physically installed. (For details regarding the parameters. Connectivity to the Network element software is lost while rebooting.2. 2 Enter values referring to Table 4-2 and click Submit. A “Successfully Modified” message is displayed. Step Action 1 Log into the network element. TJ100CPr4 . etc. Router ID. location of the node and the name of the person maintaining the node. Note : Editing the fields on the NE information page is service non-disruptive. SDH/SONET Mode Displays the mode in which the network element has been configured. 4. refer Table 4-1) 3 Click Accept Valid Modifications. 168.0 .254.0.254/24 0. 8. The mask can take a value of 0.0.254 Ethernet IP 192. 0 . or 24 Contact .254.0.168.255 character string (see Note) Location . NE Information 15 Table 4-2 gives the default and acceptable values for the configurable network element parameters. 16.255 character string (see Note) Note: This field supports all alphanumeric and special characters. Table 4-2 Default and acceptable values for configurable network element parameters Parameter Default value Acceptable value Name Default 0 .0 . User Interface Guide Version 1.254.254.0 .254.20 character string (see Note) Router ID 192.254.1.254.0. 0 .1.254 0. 16 NE Information TJ100CPr4 . Three visual indicators are present on the card representing the status. User Interface Guide Version 1. Clicking the Stop Refresh button again will resume the automatic refresh of the page. 5 Node Slot View 1- This chapter describes the Node slot view menu. alarm and active conditions respectively. The Stop Refresh button.0 . Clicking the graphical image of the card displays the details of the card in a new page. The Node slot view application displays graphical representation of the cards present in allotted slots of the chassis. The color of the Status Light Emitting Diode (LED) indicates the status of the module or card. when clicked stops the automatic refresh of the page. The Node slot view page is refreshed for every two seconds. The lower portion of the page displays the status of active alarms present on the card. The Node slot view page is displayed. 2 Click the card to view its parameters. Step Action 1 Click Node Slot View in the main menu. The card page is displayed.1 Viewing card parameters The following are the steps to view card parameters. Table 5-1 Visual Indicators on the Node Slot View page Status of the LED Indication Status Red Card failure Green Normal working Amber • Power cycle • Mismatch Alarm Red Major/Critical alarms present on the network element Green Normal working Amber Minor alarms present on the network element Blue Deferred alarms present on the network element Active Red Card failure Green Normal working Amber • Power cycle • Mismatch 5. TJ100CPr4 .18 Node Slot View Table 5-1 lists the visual indicators on the Node Slot View page. 0 . DPSU01 Slot Displays the slot number in which the card is • PXAT present. DPSU01 Software Displays the version of the software installed in PXAT Version the node. DPSU01 Equipment • Present indicates that the card is present in the • PXAT node • TETH02EX • NotPresent indicates that the card is not present • APSU01. Node Slot View 19 Table 5-2 gives general information about the card parameters. Redundancy Displays the Redundancy Status of the card as PXAT Status primary or secondary. • TETH02EX • APSU01. • TETH02EX • APSU01. The view of the cards may or may not match with the physical orientation of the cards. • PXAT • TETH02EX • APSU01. • APSU01. DPSU01 Serial Number Displays the unique serial number of a specific • PXAT module. Note : The slot view shows all the cards physically present in the network element. User Interface Guide Version 1. The value is always 1 in this • TETH02EX release. Table 5-2 Card parameters Field Description Applicable to Shelf Displays the shelf number in which the network • PXAT element is present. DPSU01 in the node Product Code Displays the product code. 20 Node Slot View TJ100CPr4 . 1 Introduction This chapter describes the System Time menu in the WUI. The time is displayed in the Input/Output area of the WUI.2. year. But for changes to take place in the OS and logs. minutes and seconds for the network element.2 Managing Date and Time 6.1 Setting date and time on a network element The Set Time menu enables you to set the date. hour.0 . month. Note : You can change the network element time settings by editing values in the WUI. In the System Time menu you can. • Set the date and time of the network element • Set the required time zone • Set a time server for the network element 6. a service non-disruptive reset has to be applied. User Interface Guide Version 1. 6 System Time 1- 6. you can set the time zone relevant to the location of the network element. You can also set Day Light Saving. 3 Select month. 4 Click Submit. hour. year. The Other Time Zone option for Zone allows you to set time zone other than the listed time zones. TJ100CPr4 . if applicable for a particular time zone. • Year—2001 to 2036 • Hour—00 to 23 • Minutes—00 to 59 • Seconds—00 to 59 6.22 System Time The following are the steps to set the system date and time: Step Action 1 Click System Time in the navigation menu. date. The Set Node Time page is displayed. 2 Click Set time. • Month—January to December relevant to the configured • Date—1 to 31 time zone.2 Setting time zone on a network element In the Set time zone menu. Table 6-1 gives the acceptable values for the date and time settings for the network element. minute and seconds from the respective drop-down menu. Table 6-1 Default and acceptable values for the configurable date and time parameters Parameter Default value Acceptable value Date and Time Current date and time.2. Note : The network element must be warm rebooted for the changes made for time zone to take effect. The sub menu items are listed. A “Successfully Modified” message is displayed. If the desired time zone is not listed in the Zone drop-down menu. 4 Click Submit. 6 Click Submit to submit the entered values. 2 Click Set time zone. The sub menu items are listed. The Other time zone page is displayed. User Interface Guide Version 1. A confirmation page is displayed. Step Action 1 Click System Time in the navigation menu.0 . A message indicating the successful setting of the time zone is displayed. The Set Time Zone page is displayed. System Time 23 The following are the steps to set time zone on a network element. 5 Enter/Select values in the Other time zone page referring to Table 6-2. click Other Time Zones. 7 Click Yes. 8 Warm reboot the network element. 3 Select the desired time zone from the Zone drop-down menu. The identifier can be a set of alphanumeric characters. Enter an identifier for the DST period. • Month—January to December (Month: Week: Day: Hour: • Week—1st Week to 4rth Week.59 Daylight saving Disable • Enable • Disable DST String . DST Start and DST Stop parameters can be provisioned only if Daylight savings is enabled.(see Note) DST Start .24 System Time Table 6-2 lists the configurable parameters for setting other time zones with default and acceptable values. • Month—January to December (Month: Week: Day: Hour: • Week—1st Week to 4th Week. TJ100CPr4 . Last week Minute) • Day—Sunday to Saturday • Hour—0 to 23 • Minutes—0 to 59 (see Note) DST Stop . Table 6-2 Default and acceptable values for configurable Other time zone parameters Parameter Default value Acceptable value Zone IST Any time zone available in the time zones list Offset Hours -5 -12 to 11 Offset Minutes 30 0 . Last week Minute) • Day—Sunday to Saturday • Hour—0 to 23 • Minutes—0 to 59 (see Note) Note: The DST String. In case a network element has to be synchronized with a NTP server for date and time. Non-synchronous NTP servers may result in frequent reset of internal clock in the network elements. Note 2: Timing server nominated must be of stratum level of 14 or less than 14.2. which may lead to incorrect performance bining. the NTP server address and synchronization interval for the network element should be set. Table 6-3 Fields on the Set Time Server page Field Description NTP Client Enable Enable Allows an NTP server to be nominated as synchronization source for date and time.3 Setting network time server The Set time server menu enables you to set a server or network element as master clock source in order to have a uniform clock in the network. CAUTION In case the network elements in a network are synchronized to more than one NTP server. User Interface Guide Version 1. the NMS server is nominated as the NTP server. All the network elements connected to the same server in a network function synchronously. The network element periodically synchronizes itself with the server to avoid an asynchronous state. Disable Nomination of an NTP server as synchronization source for date and time is not allowed. Usually.0 . Note 1: Upto 5 NTP servers can be nominated on the network element. System Time 25 6. NTP Server-0 Enter the IP Address of the first time server. Table 6-3 describes the fields on the Set Time Server page. ensure that the NTP servers are synchronized to a common wall clock. The network element will not synchronize to the server if the stratum level is not within the range. NTP Server-1 Enter the IP Address of the second time server. Note : The IP address referenced must be reachable by the Network Element. 2 Click Set time server. 3 Enter the IP address of the network element or the timing server to which the network element is to be referenced. NTP Server-3 Enter the IP Address of the fourth server. Once the node synchronizes with the time server. 4 Select Enable or Disable in the NTP Client Enable drop down menu. NTP Server-4 Enter the IP Address of the fifth server. Step Action 1 Click System Time in the navigation menu. A “Successfully Modified” message is displayed. Current NTP Server Displays the current NTP server. TJ100CPr4 . The sub menu items are listed.26 System Time Table 6-3 (continued) Fields on the Set Time Server page Field Description NTP Server-2 Enter the IP Address of the third time server. 6 Click Submit. 5 Select a Synchronization interval from the drop down menu. The Set Time Server page is displayed. Current Time Offset Displays the current time offset. Last Update Time Displays the last time when the network element was synchronized to the time server. the synchronization interval specifies (in seconds) how often the network element should poll the time server. Synchronization Interval Select the synchronization interval. The following are the steps to set the network time server. Note: There is no check for IP addresses entered for NTP servers. So enter only correct IP addresses for the NTP servers. 0.255.0.0. 0.0 .255. 0.255.255.255.255.0 .255.0 .0. System Time 27 Table 6-4 gives the default and acceptable values for the configurable time server parameters.255.0.255 NTP Server-4 .255 NTP Server-3 .255.0 . 0.255 NTP Server-1 .255. 0.0.255.255. 0.0 .255.255 Synchronization interval 1024 • 16 (seconds) • 32 • 64 • 128 • 256 • 512 • 1024 • 2048 • 4096 • 8192 • 16384 User Interface Guide Version 1.0.0 .255.0. Table 6-4 Default and acceptable values for configurable time server settings Parameter Default value Acceptable value NTP client Enable Disable • Enable • Disable NTP Server-0 .255 NTP Server-2 .0.255.0. 28 System Time TJ100CPr4 . circuit packs and SFPs in the network element and its details such as physical presence. For example–PSM. Operational Status Displays the operating status of the card. User Interface Guide Version 1. you can: • view details of the network element • view details about the individual card present in the network element • delete cards • view SFP details • delete SFPs . 7. DOWN.0 . Card Type Displays the type of the card. 7 Inventory 1- 7. Table 7-1 describes the fields on the Node Inventory page Table 7-1 Fields on the Node Inventory page Field Description Slot Displays the slot number in which the card is present.2 Node Inventory In the Node inventory menu.1 Introduction The Inventory menu in the WUI provides the inventory of the modules. the attributes such as shelf. etc of the card present in the slot are displayed. product code. etc. On clicking the slot hyperlink. serial number. product code and serial number. For example–UP. operation status. MFC. 30 Inventory Table 7-1 (continued) Fields on the Node Inventory page (continued) Field Description Equipment Displays whether card is currently jacked in or not. 7. TJ100CPr4 . You need to manually refresh the page or the pane to view any change made to the inventory of the node. Laser type Displays the laser type. Table 7-2 describes the SFP parameters. The SFPs are associated with the STM ports on the cross-connect card. Operational Status Indicates the operational status of the SFP.2. Is present Present Indicates the SFP is present. Table 7-2 SFP parameters Field Description Name Displays the name of the SFP. Serial number Displays the Serial number of the SFP. The SFP will autoprovision with the slotted SFP values.1 Deleting pluggable modules Pluggable Modules describes the SFP parameters. Port Displays the STM port of the SFP in the network element. Serial Number Displays the identification number of a specific card. The SFPs can be deleted without having to actually remove the SFP. Product Code Displays the Product code of the card. Not Present Indicates the SFP is not present. Note : The Node inventory does not refresh automatically. Product Code Displays the product equipment code of the SFP. Also specifies the capacity and range of the laser used in the particular interface. The Node inventory page displays modules pluggable status along with the chassis information. The ranges that a Laser can have are Long Reach. 4 Click Confirm Delete. Step Action 1 Click Inventory in the navigation menu. User Interface Guide Version 1. The following are the steps to delete the configuration of pluggable modules from the network element.0 . The sub menu items are listed. The Node inventory page is displayed. For example. A “Successfully Deleted” message is displayed. Note 2: The Delete button allows you to delete the SFP. Inventory 31 Note 1: Lasers are specific to the interfaces. A confirmation page is displayed. You do not require to physically remove the SFP before deleting. a STM laser can be inserted only into an STM interface. Short Reach and Intermediate Reach. 3 Click the Delete button in the Name column in the SFP section. The SFP will autoprovision with the slotted SFP values. 2 Click Node Inventory. DPSU01 Software Displays the version of the software installed in PXAT Version the node Redundancy Displays the Redundancy Status of the card as PXAT Status primary or secondary. DPSU01 Serial Number Displays the unique serial number of a specific • PXAT module • TETH02EX • APSU01. Table 7-3 Physical attributes of the cards present in the network element Attribute Description Applicable to Shelf Displays the shelf number in which the network • PXAT element is present. when clicked. Table 7-3 gives the general information about the physical attributes of the cards present in the network element. displays the physical parameters of the card. • APSU01. DPSU01 Slot Displays the slot number in which the card is • PXAT present • TETH02EX • APSU01. DPSU01 Equipment • Present indicates that the card is present in the • PXAT node • TETH02EX • NotPresent indicates that the card is not present • APSU01.3 Shelf The shelf submenu lists all the cards present in the network element. TJ100CPr4 . Each individual card link. This value is always 1 in this • TETH02EX release. DPSU01 in the node Product Code Displays the product code of the module • PXAT • TETH02EX • APSU01.32 Inventory 7. you can view information on the following: • Connections • Timing Manager 8. Protection switching comes into effect in case of: • Signal failure • Signal degradation • User initiated request In the Protection menu.2 Connections Sub-Network Connection Protection (SNCP) is path protection switching that is initiated in the path terminating equipment when the network element is in SDH mode.1 Introduction This chapter describes the protection feature for a network element. so that the destination network element selects the best of the signals from the working or protection paths. User Interface Guide Version 1. 8 Protection 1- 8. It is required to create two paths for each circuit—one work and one protection.0 . Traffic in the source network element is bridged on both the working and the protection paths. The linear protection switching mechanism is coordinated by the K1 and K2 bytes in the Line Overhead. In SNCP. protection is initiated on a failure in the path. Table 8-1 lists the maximum number of connections supported in the SNCP configuration for STM-1 interfaces. there should be at least one TU12 available on the working and protection ports. TJ100CPr4 . The entry and the exit network elements are designated at connection provisioning time. to provision SNCP for add/drop E1 cross-connect. all intermediate nodes have pass-through connections.34 Protection SNCP is a dedicated protection mechanism and operates in a unidirectional protection switching manner. In non-revertive mode. SNCP can be provisioned only if there is availability of minimum bandwidth on both the working and protection port. See “Cross-connects” on page 41 for information on creating/editing cross-connects. SNCP can be provisioned in revertive and non-revertive mode. For example. A network element can be both entry and exit network element in case of bidirectional SNCP ring connection. after the fault is cleared. When SNCP ring connections are provisioned on these facilities. traffic switches back to the work path once the fault condition has cleared. SNCP is a protection scheme. after the WTR period has elapsed. traffic remains on the protect path until switched back to the work path manually. SNCP is provisioned while configuring protection for cross-connects. which can be applied on an individual basis to VC-n (both HOVC and LOVC) signals. In revertive mode. Table 8-1 Maximum number of connections supported in SNCP configuration Capacity Maximum number of connections for STM-1 VC12 63 VC3 3 VC4 1 Note : In Tejas systems. SNCP ring groups are formed from unprotected facilities. SNCP configuration is supported on STM-1 interfaces. Figure 8-1 SNCP configuration Normal Operation A B C D Switching in case of single fiber cut A B C D Switching in case of dual fiber cut A B C D Working Path Protection Path Bridging Bolder line indicates the currently active path (the path carrying traffic ) User Interface Guide Version 1.0 . Protection 35 Figure 8-1 shows switching in the case of single and dual fiber cuts. Source Switch Status fields are not applicable for VCG port. In the Connection menu. Note 3: The manual switch command is successfully executed only if the working or the protection path to which the traffic is being switched is error or alarm free. Source Revertive. • prevent the traffic from switching to the protection port (Lockout Protection) • force switch the traffic to the protection path • force switch the traffic to the working path • manual switch the traffic to the protection path • manual switch the traffic to the working path • clear active switch requests on the protection path Note 1: When there is a signal fail on the protect path. Note 4: The Source Protection. Note 2: You cannot perform a protection switch if a higher-priority switch is already active on the protection path. In the Connection Protection Requests page.36 Protection The Connections menu allows you to execute external commands on SNCP provisioned cross-connections. you can. you can • view protected connections • access external commands TJ100CPr4 . Source Protection Status. then a manual switch to the protect path will fail. Provisioned Source External Command. Note 5: SNCP protection for card failure can be provided by provisioning work and protect port/time slot on different card packs in the network element. Source Revertive Displays the reversion mode of the source channel as • Revertive • Non Revertive Source WTR Time For revertive mode. Connection Displays the name of the connection. Table 8-3 Fields on the Protection Request page Field Description Source Source Channel name Destination Destination Channel name Protection Source Protection If source protection is enabled. Select all Select the check box to select all the listed connections. it displays the Source protection channel name. Working path Displays the work port. Select the port for which you need to view the protected connections. Table 8-3 describes the fields on the Protection Request page. Protection status Displays the protection status. request Switch status Displays the switch status. By default ‘All’ is selected. Protection 37 Table 8-2 describes the fields on the Connections protection requests page. Provisioned protection Displays any protection request provisioned on the connection.0 . displays the wait to restore time in minutes. Table 8-2 Fields on the Connections protection requests page Field Description Working port Lists all the ports having protected cross-connects. User Interface Guide Version 1. after which the traffic must revert to the work path after failure clears. Protection path Displays the protect port. End Displays the end type. Table 8-4 External Commands Field Description Release Clears previously set commands. etc. Manual Switch to Protect Switches traffic to protect path only when it does not have signal fail/degrade condition existing. you can view the synchronization source details such as the synchronization source. Source Switch Status Displays the status of the protection switch in a source channel. Forced Switch to Working Forces traffic to switch to the work path regardless of signal fail/degrade condition existing. Lockout Protection Prevents traffic from switching to protect path. 8. this field may be applicable. priority. protection request. TJ100CPr4 . Table 8-4 describes the external commands executable on SNCP provisioned cross-connections. Provisioned Source Displays the external command provisioned for both source and Protection request destination. Note: The details for the destination protection are displayed if the destination protection is enabled in the Edit Cross-Connect page. Forced Switch to Protect Forces traffic to switch to the protect path regardless of signal fail/degrade condition existing on protect path.on it.3 Timing Manager In the Timing manager menu. Depending on whether source or destination protection is provisioned. Manual Switch to working is applicable in the case of non-revertive connections only. Manual Switch to working Switches traffic to protect path when it does not have signal fail/ degrade condition existing on it. You can also give external commands to the synchronization sources.38 Protection Table 8-3 (continued) Fields on the Protection Request page Source Protection Status Displays the status of the source channel either as work or protect. Lockout Request Displays the lockout request. Clock Source Displays the name of the clock source. User Interface Guide Version 1. The Timing manager protection request page is displayed. Step Action 1 Click Protection in the navigation menu. By default. Table 8-5 Fields on the Timing manager protection request page Field Description Select Select the check box for the clock source on which external commands are to be executed.3. Clock status Displays the status of the clock source. Quality Level Defines quality of the timing reference to which the node is locked to.0 . 2 Click Timing Manager. Protection 39 8. The sub menu items are listed. Protection request Displays the protection request.1 Viewing timing manager protection request The following are the steps to view timing manager protection request. Quality Level is set to INVALID. Table 8-5 describes the fields on the Timing manager protection request page. Priority Displays the priority set for the clock source. Table 8-6 Commands on the Timing manager protection request page Field Description Release Clears the previous external requests. The following are the steps to give external commands to synchronization sources. TJ100CPr4 . 3 Click the command you wish to execute after selecting the clock source. 2 Click Timing Manger. Lockout source Locks the clock source so that the network element is not synchronized to the clock source. Step Action 1 Click Protection in the navigation menu.3.2 Giving external commands to synchronization sources Table 8-6 describes the commands on the Timing manager protection request page. Clear Lockout Clears the lock on the clock source so that the network element can be synchronized to the clock source. Forced Switch The network element switches to the selected clock source on an external request for forced switch. The network element cannot be switched to other clock sources unless the external request is cleared. The sub menu items are listed. Forced switch has a higher priority over manual switch. Refer to Table 8-6 for information on the executable commands. Manual Switch The network element switches to the selected clock source on an external manual switch request.40 Protection 8. The Timing manager protection request page is displayed. VC12(M).TUG2(L) .TU-Group. drop. In the Configuration menu. add-drop. User Interface Guide Version 1. protected or unprotected cross-connects of different capacities. 9 Configuration 1- 9.TU#. TU capacity Chassis-Slot-Port-AU # . The cross-connect can be 1WAY or 2WAY. These can be created on E1. E3/DS3.0 . pass-through and hairpin. The different type of cross-connects that can be configured are—add.1 Introduction This chapter describes the Configuration menu in the WUI. you can configure the following: • Cross-connect • Overhead Tunnel • Environmental Alarm Input • SNMP Traps • Facilities • NE Adjacency • DCN • Synchronization 9. 2WAY.2 Cross-connects The Cross-connect menu enables you to create cross-connects in a network element. You can provision 1WAY. The numbering scheme used is VC capacity-Chassis-Slot-Port-TUG3 (K) . Ethernet and STM-1 interfaces. 42 Configuration In the Cross-connect menu. filters cross-connect based on the selected criteria for capacity. 2 Click Cross-connect.1 Filtering cross-connects The Filter button when clicked. TJ100CPr4 .of the Configure Cross-connects page. The sub menu items are listed. The Select all button when clicked selects all the filtered cross-connects. port number. filter and delete cross-connects.2. In this page you can view. card. The Configure Cross-connects page is displayed. you can: • filter cross-connects • add cross-connects • edit a cross-connect • delete a cross-connect • edit VCG 9. The following are the steps to filter cross-connects. The filtered results are displayed in the Cross-connects section. etc. The Deselect all button when clicked deselects all the selected cross-connects. Step Action 1 Click Configuration in the navigation menu. Active Destination Displays if the destination path is functioning in work mode or protect mode.0 . Source protection Displays the protection Channel to which the source switches on failure. Capacity Displays the capacity of the cross-connect. Configuration 43 Table 9-1 describes the fields on the Configure Cross-Connects page. Table 9-1 Fields on the Configure Cross-connects page Field Description Filter Cross-connects Capacity Select the capacity of the cross-connect. K# Select the TUG3 number. Destination Displays the Destination channel. STM # Select the AU4 number. Destination Protection Displays the Protection Channel to which the destination switches on failure. Dir Displays the directionality of the cross-connect. Port Number Select the interface number. Connection ID Displays the name of the cross-connect or of the corresponding VCG. User Interface Guide Version 1. Traffic status Displays the status of the traffic on cross-connect. Card Lists all the cross-connect card in the network element. Source Displays the Source channel. Select the card for which you want to see the provisioned cross-connects. L (Group) # TUG2 number M (VC number)# TU number (Filtered) Cross-connects Delete All Select the check boxes in the rows you want to delete. Active Source Displays if the source path is functioning in work mode or protect mode. 44 Configuration 9. The WTR time indicates the time duration in minutes after which the traffic reverts to the work path after fault is rectified.2. STM # Select STM number for Source and Destination. L (TUG2)-group • K specifies TUG3 M (VC number) • L specifies TUG2 • M specifies VC number of the crossconnect Source Protection Select Enable or Disable to enable or disable the protection path for source. Port select the interface number for Source and Destination. L (TUG2)-group • K specifies TUG3 M (VC number) • L specifies TUG2 • M specifies VC number of the crossconnect Reversion Mode Parameters Source Port Revertive Select the protection mode for the source. Source WTR Time If Revertive mode is selected for the source.2 Adding cross-connects Table 9-2 describes the fields on the Add Cross-connects page. Circuit Identifier Enter the Identity of the cross-connect. Destination Protection Select Enable or Disable to enable or disable the protection path for destination. Port Select the port number of the cross-connect for Working Source and Working Destination. Cross-connect Parameters Capacity Select the capacity of the cross-connect. Directionality Set the direction of data flow in cross-connect. K (TUG3) Select the STMn time slot for the cross-connect. TJ100CPr4 . Table 9-2 Fields on the Add Cross-connects page Field Description Number of Connections Enter the number of cross-connects that you want to create. STM # Select the STM number. select the wait to restore time from the drop down box. K (TUG3) Select the STMn time slot for the cross-connect. Note: The Source and Destination protection ports and TUG values are configurable only when the Source Protection and Destination Protection are enabled. 3 Click Add Cross-connect link.0 . The Add Cross-connects page is displayed. Step Action 1 Click Configuration in the navigation menu. The following are the steps to add cross-connects to the network element. A confirmation page is displayed. 2 Click Cross-connect. Destination WTR Time If revertive mode is selected for the destination. A “Successfully Created” message is displayed. 5 Click Yes. The Configure Cross-connects page is displayed. The sub menu items are listed. Configuration 45 Table 9-2 (continued) Fields on the Add Cross-connects page Field Description Destination Port Revertive Select protection mode for the destination. select the wait to restore time from the drop down box. The WTR time indicates the time duration in minutes after which the traffic reverts to the work path after fault is rectified. User Interface Guide Version 1. Enter/Select values referring to Table 9-3. 4 Click Submit. 46 Configuration Table 9-3 gives the default and acceptable values for configurable cross-connect parameters. 1 1 . Table 9-3 Default and acceptable values for the configurable cross-connect parameters Parameter Default value Acceptable value Number of connections 1 The number of cross-connects is limited by the uplink bandwidth of the cross-connect card.16 K 1 1-3 L 1 1-7 M 1 1 . Capacity VC12 • VC12 • VC3 • VC4 Circuit Identifier Tejas Networks Any alphanumeric character string (see Note 1) Directionality 2WAY • 1WAY • 2WAY Working Source and .3 in case of VC12 Source Protection Disable • Enable • Disable Destination Protection Disable • Enable • Disable Reversion mode parameters Source Port Revertive Non-revertive • Non-revertive • Revertive Source WTR Time 5 1 to 12 minutes (see Note 2) TJ100CPr4 . Valid Source and Destination port from Destination port the drop down menu STM No. space and special characters such as ‘-’ or ‘_’). 9. Step Action 1 Click Configuration in the navigation menu.3 Editing Cross-connects The following are the steps to edit a cross-connect in the network element. This page gives details of the existing cross-connects (if any). The Configure Cross-connects page is displayed.(alphabetical. Destination WTR Time and for fields under protection to be available for editing.2. Note 2: Source Protection and Destination Protection must be enabled in the Edit CrossConnect page for Source WTR Time.0 . The Edit CrossConnect page is displayed. Configuration 47 Table 9-3 (continued) Default and acceptable values for the configurable cross-connect parameters Parameter Default value Acceptable value Destination Port Non-revertive • Non-revertive Revertive • Revertive Destination WTR Time 5 1 to 12 minutes (see Note 2) Note 1: The Circuit Identifier can take 0 to 40 characters. 3 Click Edit link below the cross-connect that has to be edited. The sub menu items are listed. In case of Non-revertive mode. 2 Click Cross-connect. traffic remains in protect path even when the conditions that diverted it to the protect path are set right. Note 1: Traffic reverts back to work path when the conditions that diverted it to the protect path are set right in case of revertive mode. numeric. Note 2: WTR time can only be provisioned in revertive mode. User Interface Guide Version 1. 3 Select the check box in the Delete all field for cross-connect that is to be deleted.Tejas Nodes using DCC_R/DCC_M bytes. The sub menu items are listed.2. A confirmation page is displayed. 5 Click Confirm Delete.4 Deleting Cross-connects Note : A maximum of 63 cross-connections can be deleted at once.Tejas Nodes) can be created to bypass the management information carried between those non. 4 Click Delete Selected Connection(s).3 Overhead Tunnel Overhead Tunnel is a feature to pass through overhead bytes transparently between east and west fibers. without processing these bytes. Overhead tunneling between two STM ports of a Tejas Node (sandwiched between two non. The following are the steps to delete a cross-connect provisioned on a network element.48 Configuration 4 Edit fields referring to Table 9-3. Step Action 1 Click Configuration in the navigation menu. A “Successfully Modified” message is displayed. 6 Click Accept Valid Modifications. 9. 5 Click Submit. 9. The Configure Cross-connects page is displayed. This page gives details of the existing Cross- Connects. A “Successfully Deleted” message is displayed. TJ100CPr4 . 2 Click Cross-connect. A confirmation page is displayed. 1 Viewing Overhead tunnel The following are the steps to view an overhead tunnel. Table 9-4 describes the fields on the Configure Overhead Tunnels page. The sub menu items are listed. Note : The user can provision a maximum of 30 overhead bytes for overhead tunneling. Source Port Displays the Source STM port. 2 Click Overhead Tunnel. User Interface Guide Version 1. Configuration 49 In the Overhead tunnel menu.0 . delete Select the check box for the overhead tunnel to be deleted. Table 9-4 Fields on the Configure Overhead Tunnels page Field Description Tunnel Name Displays the Tunnel name. Overhead Byte Displays the overhead byte that is tunneled. you can • view configured overhead tunnels • create new overhead tunnel • delete overhead tunnels 9. Destination Port Displays the Destination STM port.3. This page gives details of the existing Overhead tunnels. The Configure overhead tunnels page is displayed. Step Action 1 Click Configuration in the navigation menu. The Tunnel name is a combination of the source and destination ports. 3 Click Create Overhead tunnel link. 6 Click Accept Valid Modifications. Step Action 1 Click Configuration in the navigation menu. A “Successfully Modified” message is displayed. A confirmation page is displayed. The sub menu items are listed. Table 9-5 Default and acceptable values for overhead tunnel parameters Parameter Default value Acceptable value Source Port Name STM1-1-5-1 • STM1-1-5-1 • STM1-1-5-2 Destination Port Name STM1-1-5-1 • STM1-1-5-1 • STM1-1-5-2 Overhead Byte E1 • E1 • E2 • F1 • DCC_R • DCC_M TJ100CPr4 . Table 9-5 gives the default and acceptable values for the configurable overhead tunnel parameters.2 Provisioning overhead tunnel The following are the steps for provisioning an overhead tunnel. 2 Click Overhead Tunnel.3. This page gives details of the existing Overhead tunnels. The Configure overhead tunnels page is displayed. 5 Click Submit. The Add Overhead Tunnel page is displayed.50 Configuration 9. 4 Enter values referring to Table 9-5. Step Action 1 Click Configuration in the navigation menu.1 Provisioning environmental alarms The following are the steps to provision environmental alarms. 2 Click Overhead Tunnel.4 Environmental Alarm Inputs The network element can be configured for customized environmental conditions such as power/air conditioning failure. 9. equipment room door open and so on. A maximum of two external alarms can be configured on a TJ100CPr4 network element. Configuration 51 9. The strings entered in the Environmental Alarm field defines the alarm.3. The Configure overhead tunnels page is displayed.3 Deleting overhead tunnel The following are the steps to delete an overhead tunnel. The sub menu items are listed. The Configure environmental alarms page is displayed. Step Action 1 Click Configuration in the navigation menu. 4 Click Submit. A “Successfully Deleted” message is displayed. User Interface Guide Version 1. The sub menu items are listed. This page displays details of the existing Overhead tunnels. 3 Enter the string with which the alarms have to be identified in the Environmental Alarm fields. 5 Click Confirm Delete. 9.4. 2 Click Environmental alarm input. A confirmation page is displayed. The alarm is reported when the defined environmental condition is detected. 3 Select the check box(s) in the Delete column for the overhead tunnel(s) to be deleted.0 . SNMP is an application-layer protocol that allows network devices to exchange management information. 4 Click Submit. The SNMP trap destination IP addresses page is displayed. A confirmation page is displayed.52 Configuration Note : The Environmental alarm can be a set of alphanumeric characters. SNMP allows network administrator to find and interpret network problems and plan network growth. 3 Enter values referring to Table 9-6. 9. 2 Click SNMP traps.1 Configuring network element to send SNMP traps The following are the steps to configure a network element to send SNMP traps. Step Action 1 Click Configuration in the navigation menu.5 SNMP traps Simple Network Management Protocol (SNMP) is a set of protocols for managing complex networks. 5 Click Yes. Traps are sent when errors or specific events occur on the network. 4 Click Submit. TJ100CPr4 . The TejNES SNMP is designed to provide asynchronous event notification to a Network Management System (NMS). A “Successfully Created” message is displayed.5. SNMP trap is an SNMP application that uses the SNMP trap operation to send information to a network manager. A “Successfully Created” message is displayed. The sub menu items are listed. 9. The maximum number of characters allowed is 40. Configuration 53 Table 9-6 gives the default and acceptable values for SNMP trap parameters. viewing or editing the attributes of optical ports. PDH ports. 2 Click SNMP traps. Table 9-6 Default and acceptable values for the SNMP trap parameters Parameter Default values Acceptable values IP Address .5.2 Deleting SNMP traps The following are the steps to delete SNMP traps. The sub menu items are listed.6 Facilities The Facilities menu should be used for checking. The SNMP trap destination IP addresses page is displayed. 3 Select the check box under the Delete column for the SNMP traps to be deleted. 0.225.0 . Ethernet and VCG ports. Step Action 1 Click Configuration in the navigation menu.0 . 9.225.225. A “Successfully Deleted” message is displayed. User Interface Guide Version 1.254 Port 162 - SNMP Version SNMP_V1 SNMP_V1 SNMP_V2 9.0. 4 Click Submit.0. Line Coding Displays the type of line coding being used—NRZ coding Laser Displays as a link. Expected J0 Enter the expected received section trace value. Down Sets the interfaces out of service. Maximum length is as specified by Transmit J0 Length. TIM Action settings control handling of mismatches between received and expected trace messages. Expected J0 Length Allows you to select the length of expected received section trace. STM Port Profile Select an STM port profile. Click the link to view the Laser provisioning page. Table 9-7 Field on the Provision interface page for STM port Field Description Admin Status Up Sets the interfaces in service. the Laser being used. Transmit J0 Length Select the length of the section trace to be transmitted. ECC Byte Selection Displays the established Embedded Communication Channel: • ecc_DCC_M • ecc_DCC_R • ecc_F1 • ecc_F2 • ecc_F3 • ecc_F2F3 Transmit J0 Enter the section trace message to be transmitted. No-Report Disables reporting of alarms on STM port. TJ100CPr4 .54 Configuration Table 9-7 describes the fields on the Provision interface page for STM ports. Received J0 Displays the received Section trace message. Alarm Reporting Status Report Enables reporting of alarms on STM port. padded with spaces for strings less than specified length. Configuration 55 Table 9-7 (continued) Field on the Provision interface page for STM port Field Description TIM Action Tim_report Reports alarm traffic affecting, on trace identifier mismatch. Tim_ignore No action on trace identifier mismatch. Tim_downstream Sends alarm indication signal (AIS) _ais downstream (traffic affecting), on trace identifier mismatch. Signal Fail BER Threshold Enable Allows you to select the threshold, on crossing (B1) which Signal Fail alarm is raised for errors detected by B1. Threshold range is 10e-3 to 10e-5. Disable Signal Fail BER Thresholds are disabled. Signal Degrade BER Enable Threshold on crossing which Signal Degrade Threshold (B1) alarm is raised for errors detected by B1. Threshold can be set in the range 10e-5 to 10e-9. Disable Signal Degrade BER Thresholds are disabled. Note: Alarms are not reported by enabling B1 thresholds. Signal Fail BER Threshold Enable Threshold on crossing which Signal Fail alarm (B2) is raised for errors detected by B2. Threshold range is 10e-3 to 10e-5. Disable Signal Fail BER Thresholds are disabled. Signal Degrade BER Enable Threshold on crossing which Signal Degrade Threshold (B2) alarm is raised for errors detected B2. Threshold can be set in the range 10e-5 to 10e-9. Disable Signal Degrade BER Thresholds are disabled. User Interface Guide Version 1.0 56 Configuration Table 9-7 (continued) Field on the Provision interface page for STM port Field Description Threshold (for TCA-15 Enable Threshold Crossing Alerts (TCA) can be user min) configured for 15 minutes interval. If this field is enabled, an alert/event is raised on Performance Monitoring counts crossing the threshold value. The thresholds can be changed from the TCA Settings link on the same page. Disable Threshold Crossing Alerts (TCA) are disabled. Default Default values for the thresholds are used. Threshold (for TCA-1 day) Enable Threshold Crossing Alerts (TCA) can be user configured for 1 day interval. If this field is enabled, an alert/event is raised on Performance Monitoring counts crossing the threshold value. The thresholds can be changed from the TCA Settings link on the same page. Disable Threshold Crossing Alerts (TCA) are disabled. Default Default values for the thresholds are used. Identifier Enter a name for the STM port. The name can be a set of alphanumeric characters. 9.6.1 Provisioning STM ports The following are the steps to provision a STM port. Step Action 1 Click Configuration in the navigation menu. The sub menu items are listed. 2 Click Facilities. The STM Port interface configuration page is displayed. 3 Click the desired STM port. The Provision interface page for that STM port is displayed. TJ100CPr4 Configuration 57 4 Select/Enter values referring to Table 9-8 . 5 Click Submit. A confirmation page is displayed. 6 Click Accept Valid Modification. A “Successfully Modified” message is displayed. Table 9-8 gives the default and acceptable values for the parameters on the Provision interface page for STM ports. Table 9-8 Default and acceptable values for provisioning the STM interface parameters Parameter Default value Acceptable values Admin Status Up • Up • Down Alarm Reporting Status Report • Report • No-Report STM Port Profile Internal-NNI • Internal-NNI • External-NNI Transmit J0 - Enter the section trace message to be transmitted. Maximum length is as specified by Transmit J0 Length, padded with spaces for strings less than specified length. Transmit J0 Length 16 •1 • 16 Expected J0 - Enter the expected section trace value to be received. Expected J0 Length 16 Select the length of expected received section trace. Received J0 Displays the received Section trace message. TIM Action settings control handling of mismatches between received and expected trace messages. TIM Action tim_ignore • tim_report • tim_ignore • tim_downstream_ais User Interface Guide Version 1.0 58 Configuration Table 9-8 (continued) Default and acceptable values for provisioning the STM interface parameters Parameter Default value Acceptable values Signal Fail BER Threshold Disable • 10e-3 (B1) • 10e-4 • 10e-5 • Disable Signal Degrade BER Disable • 10e-5 Threshold (B1) • 10e-6 • 10e-7 • 10e-8 • 10e-9 • Disable Note: Alarms are not reported by enabling B1 thresholds. Signal Fail BER Threshold Disable • 10e-3 (B2) • 10e-4 • 10e-5 • Disable Signal Degrade BER Disable • 10e-5 Threshold (B2) • 10e-6 • 10e-7 • 10e-8 • 10e-9 • Disable Threshold (for TCA-15 min) Disable • Enable • Default • Disable Threshold (for TCA-1 day) Disable • Enable • Default • Disable Identifier - Enter a name for the STM port. The name should be a set of alphanumeric characters. TJ100CPr4 The sub menu items are listed.6. the Threshold Crossing Alert (TCA) settings are not editable.0 . The Provisioning interface page for that STM port is displayed. Click STM in the sub menu. User Interface Guide Version 1. 2 Click Facilities. To edit them. Table 9-9 TCA Settings for 15-min and 1-Day duration Field Description Threshold RS-ES Threshold for Errored Seconds-Regenerator Section Threshold RS-SES Threshold for Severely Errored Seconds-Regenerator Section Threshold RS-BBE/RS-CV Threshold for Background Block Errors/Code Violations-Regenerator Section Threshold MS-ES Threshold for Errored Seconds-Multiplex Section Threshold MS-SES Threshold for Severely Errored Seconds-Multiplex Section Threshold Threshold for Background Block Errors/Code MS-BBE/MS-CV Violations-Multiplex Section Enabling TCA settings The following are the steps to enable the TCA settings for 15 minute interval or 1 day duration Step Action 1 Click Configuration in the navigation menu. The STM Port interface configuration page is displayed.2 Setting TCA for 15-min interval/1-day duration By default. 3 Click the desired STM port. you should enable the TCA settings. Table 9-9 describes the fields on the TCA Settings for 15-min/1-Day duration page for an STM port . Configuration 59 9. TJ100CPr4 . The Provisioning interface page for that STM port is displayed. Click STM in the sub menu. A “Successfully Modified” message is displayed. duration The TCA Settings for 1-day duration page is displayed. A confirmation page is displayed. The STM Port interface configuration page is displayed. The sub menu items are listed. 4 If you want to Then click Set TCA for TCA Settings for 15-min duration link. Step Action 1 Click Configuration in the navigation menu. 3 Click the desired STM port. Setting TCA profiles The following are the steps to set the TCA settings for 15 minute interval or 1 day duration. 2 Click Facilities. 15-min duration The TCA Settings for 15-minute duration page is displayed. Set TCA for 1-day TCA Settings for 1-day duration link.60 Configuration 4 If you want to Then enable Threshold for select Enable for Threshold (for TCA-15min) 15-min Threshold for select Enable for Threshold (for TCA-1Day) 1-day 5 Click Submit. 6 Click Accept Valid Modifications. 86400 Threshold SES-L 10 960 0 . Refer to Table 9-10 for acceptable values.86400 Threshold 27000 2592000 0 .16777215 0 . 6 Click Submit.6.900 0 .900 0 .900 0 . A “Successfully Modified” displayed.3 Provisioning AUG Note 1: The signal label field is provisionable.86400 Threshold SES-S 10 960 0 . but should not be edited as it will be automatically assigned a value depending on the type of cross-connect provisioned. Configuration 61 5 Enter the threshold values in the respective text fields. Note 2: AU can be provisioned only if all the cross-connects associated with that AUG are unprovisioned or deleted.86400 Threshold 27000 2592000 0 . 7 Click Accept Valid Modifications. Table 9-10 gives the default and acceptable value for 15 minutes and 1 day TCA threshold parameters.16777215 0 . A confirmation page is displayed.1610612640 BBE-L/CV-L 9. User Interface Guide Version 1.1610612640 BBE-S/CV-S Threshold ES-L 114 10944 0 .900 0 .0 . Table 9-10 Default and acceptable values for TCA threshold parameters Parameter Default value Acceptable value 15 min 1 day 15 min 1 day Threshold ES-S 114 10944 0 . Refer to the Installation and Commissioning Procedures manual. 9. The sub menu items are listed. The Provision AUG page is displayed. A “Successfully Modified” message is displayed. Selecting Disable for Mapping structure will disable mapping on the AUG. Table 9-11 Fields on the Provision AU4 page Field Description Signal Label Select a payload signal label from the drop-down menu. The length can be 16 or 64. TJ100CPr4 . 5 Click Submit. Expected Trace Enter the path trace that is expected to be received on AU path. 3 Click the desired AUG link.62 Configuration The following are the steps to provision AUG: Step Action 1 Click Configuration in the navigation menu. For example. tug_structure. 4 Select the Mapping Structure for the AUG from the drop down menu.4 Provisioning AU4 Table 9-11 describes the fields displayed on the Provision AU4 page. Click STM in the sub menu. The STM Port interface configuration page is displayed. Note : Options available in the Mapping structure depend on the mapping selected while initializing the network element. asynchronous_container3. unequipped and so on Transmit Trace Enter the path transmitted in the AU on J1 byte Transmit Trace Length Select the length of the section path trace to be sent. 2 Click Facilities. 104-DOC000026-E for more information. Received Signal Label Displays the payload type or the Signal label received on the AU path.6. 2 Click Facilities. exceeding which signal fail alarm is raised for errors. Disable Signal Degrade BER Thresholds are disabled. 6 Click Accept Valid Modification. A confirmation page is displayed. Click STM in the sub menu. User Interface Guide Version 1. 4 Select/Enter values referring to Table 9-12.0 . The following are the steps to provision AU4 Step Action 1 Click Configuration in the navigation menu. The sub menu items are listed. Disable Signal Fail BER Thresholds are disabled Signal Degrade BER Enable Allows you to select the threshold. The length can be 16 or 64. Threshold range is 1e-5 to 1e-9. exceeding Threshold which signal fail alarm is raised for errors. Alarm reporting status Select Report or No-Report to enable or disable the alarm reporting status Connection Type Select the connection that can be created in the cross-connects. Threshold range is 1e-3 to 1e-5. Note : Only the first AU4 can be configured as VC-4. The STM Port interface configuration page is displayed. Path alarm profile Select the alarm path profile for the particular port. Configuration 63 Table 9-11 (continued) Fields on the Provision AU4 page Expected Trace Length Select the length of the section path trace that is expected to be received. A “Successfully Modified” message is displayed. 5 Click Submit. 3 Click the desired AU4 link The corresponding Provision page is displayed. Received Trace Displays the AU path trace that is received Signal Fail BER Threshold Enable Allows you to select the threshold. VC-12) is AU4 • locked_tu_n mapped • asynchronous_container3 • Asynchronous_container4 if the higher order path (VC-4) is AU4 • asynchronous_container4 mapped • atm_mapping • Asynchronous_container3 if the • dqdb_mapping higher order path (VC-3) is AU4 • fddi_mapping mapped • hdlc_ppp • sdl_sss • hdlc_laps • sdl_srs • eth_10g • gfp • test_O181 • vc_ais (see Note 1) Transmit Trace Tx_Unallocated Trace message of 16 or 64 characters Transmit Trace 16 16 or 64 Length (see Note 2) Expected Trace Rx_Unallocated Trace message of 16 or 64 characters Expected Trace 16 16 or 64 Length (see Note 2) TJ100CPr4 . Table 9-12 Default and acceptable values for configurable AU4/AU3 parameters Parameter Default value Acceptable value Signal Label • Unequipped if there are no • unequipped cross-connects provisioned • equipped_non_specific • Tug_structure if the lower order • tug_structure path (VC-3.64 Configuration Table 9-12 gives the default and acceptable values for the configurable AU4 parameters when the network element is configured in SDH mode. 0 . User Interface Guide Version 1. Configuration 65 Table 9-12 (continued) Default and acceptable values for configurable AU4/AU3 parameters Parameter Default value Acceptable value Signal Fail BER 1e-3 • Disable Threshold • 1e-3 • 1e-4 • 1e-5 Signal Degrade BER 1e-6 • Disable Threshold • 1e-3 • 1e-4 • 1e-5 • 1e-6 • 1e-7 • 1e-8 • 1e-9 Alarm Reporting Report • No-Report Status • Report Connection Type Allow both lower order and • Allow Both Lower Order And higher order connection Higher Order Connection • Allow Only Lower Order Connections • In Use Higher Order Connection Path Alarm Profile Mask TIM • mask TIM • suppress TIM • mask all except LOP • mask all Note 1: The signal Label field will be automatically assigned a value depending on the type of cross-connect provisioned. Note 2: The Transmit Trace Length and Expected Trace Length must be the same. Step Action 1 Click Configuration in the navigation menu. TJ100CPr4 . 6 Click Accept Valid Modifications. A confirmation page is displayed. You can configure the following performance monitoring parameters: • Errored Seconds • Severely Errored Seconds • Background Block Errors The following are the steps to configure the AU-4 performance monitoring parameters for 15-min duration and 1-day duration. The Provision AU4 page is displayed. 2 Click Facilities and click the desired AU link. The TCA Settings for 1-day duration page is displayed.6. Click the TCA Settings for 1-day duration link to edit TCA settings for 1-day duration. 5 Click Submit.66 Configuration 9. 3 Click the TCA Settings for 15-min duration link.5 Editing AU4 performance monitoring parameters Note : To edit the Performance monitoring thresholds. The sub menu items are listed. A “Successfully Modified” message is displayed. The TCA Settings for 15-minute duration page is displayed. set the corresponding Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM port page. 4 Enter values referring to Table 9-13. Configuration 67 Table 9-13 gives the default and acceptable values for 15 min and 1-day duration performance monitoring threshold parameters.900 0 . Received Signal label Displays the payload type or signal label received on the TU path.6291360 9.6 Provisioning TU Table 9-14 describes the fields on the Provision TU page. tug structured.86400 Threshold SES 15 1440 0 . Extended Signal Label Select the signal label for type of Ethernet traffic from the drop down menu. asynchronous_container3. Expected Trace Length Select the length of the expected section path trace. Table 9-14 Fields on the Provision TU page Field Description Signal Label Select a label for the payload content from the drop down menu. User Interface Guide Version 1. Transmit Trace Enter the path transmitted in the AU on J1 byte. exceeding which signal fail alarm is raised for errors.6. The length can be 16 or 64. Signal Fail BER Threshold Enable Allows you to select the threshold.0 .86400 Threshold BBE/CV 1100 105600 0 . The Length can be 16 or 64. Table 9-13 Default and acceptable values for 15 min and 1 day performance monitoring threshold parameters Parameter Default value Acceptable value 15 min 1 day 15 min 1 day Threshold ES 180 17280 0 . Expected trace Enter the path trace that is expected on the TU path. Threshold range is 1e-3 to 1e-5. For example. Transmit Trace Length Select the length of the section path trace to be sent. Disable Signal Fail BER Thresholds are disabled.900 0 .65535 0 . Received Trace Displays the TU path trace that is received. Disable Alarms are not reported. Disable Signal Fail BER Thresholds are disabled. Note 3: The Transmit Trace and Expected Trace field are editable only for add/drop cross-connects. • mask TIM • suppress TIM • mask all except LOP • mask all Note 1: Tributary Units (TU) can be provisioned only after TU cross-connects are created. The Expected trace field is not editable for pass through cross-connects. Note 2: It is possible to retrieve or view the TU parameters only when TU is acting as a protecting member for a connection. Threshold range is 1e-3 to 1e-9. TJ100CPr4 . exceeding Threshold which signal degrade alarm is raised for errors. Path Alarm Profile Select the alarm path profile for the AU. Alarm Reporting Status Enable Alarms are reported.68 Configuration Table 9-14 (continued) Fields on the Provision TU page Field Description Signal Degrade BER Enable Allows you to select the threshold. The sub menu items are listed. 6 Click Submit. The alarm raised due to the above consequence is Loss of VCAT multiframe on TU User Interface Guide Version 1. 2 Click Facilities. 5 Select/Enter referring to Table 9-15. 3 Click the desired AU4. A “Successfully Modified” message is displayed. and click STM.0 . The STM Port interface configuration page is displayed. 4 Click on the desired TU link. Note : Presence of unprovisioned TU on the far end network element leads to no VCAT overhead transmission. Configuration 69 The following are the steps for provisioning TU. The Provision AU4 page is displayed. The Provision TU page is displayed. 7 Click Accept Valid Modifications. A confirmation page is displayed. Step Action 1 Click Configuration in the navigation menu. Table 9-15 Default and acceptable values for provisioning TU Parameter Default value Acceptable value Signal Label Unequipped when there are no • unequipped (See Note 1 and Note 2) cross-connects provisioned • equipped_non_specific • asynchronous • bit_synchronous • byte_synchronous • test_O181 • vc_ais • extended Extended Signal Label GFP for add drop Ethernet • ATM (See Note 1 and Note 3) cross-connects • HDLC_PPP • HDLC_LAPS • VCAT_TEST • GFP Received Signal Label Read-only Transmit Trace TX_Unallocated Trace message of 16 or 64 characters Transmit Trace Length 16 16 or 64 Expected Trace RX_Unallocated Trace message of 16 or 64 characters Expected Trace Length 16 16 or 64 Received Trace Read-only Signal Fail BER Threshold 1e-3 • Disable • 1e-3 • 1e-4 • 1e-5 TJ100CPr4 .70 Configuration Table 9-15 gives the default and acceptable values for provisioning TU. User Interface Guide Version 1. Configuration 71 Table 9-15 (continued) Default and acceptable values for provisioning TU Parameter Default value Acceptable value Signal Degrade BER 1e-6 • Disable Threshold • 1e-3 • 1e-4 • 1e-5 • 1e-6 • 1e-7 • 1e-8 • 1e-9 Alarm Reporting Status Report • No-Report • Report Path Alarm Profile Mask TIM • Mask TIM • Suppress TIM • Mask all except LOP • Mask all Note 1: The Signal Label.0 . Note 2: The Signal Label field is made user provisionable to avoid the Signal Label Mismatch in case of connectivity between network elements of multi vendor networks. Note 3: The Extended Signal Label option is ignored for TU-3 and TU-12 pass through cross-connects. Extended Signal Label and Signal Label Mismatch action fields will be assigned a value depending on the type of cross-connect provisioned. then TCA is raised. Step Action 1 Click Configuration in the navigation menu. The following TU Performance Monitoring thresholds can be edited: • Errored Seconds • Severely Errored Seconds • Background Blocked Errors The following are the steps to edit the TU performance monitoring thresholds for 15-minutes and 1-day duration. 4 Click on the desired TU link.72 Configuration 9. Note : To configure the TU Performance monitoring thresholds.6. Threshold BBE/CV If the BBE/CV count crosses the set value. then TCA is raised. The STM Port interface configuration page is displayed. 3 Click the desired AU4. 2 Click Facilities and click STM. then TCA is raised.The Provision TU page is displayed. set the corresponding Threshold (for 15-min and 1-Day) enabled in the Provision Interface STM port page. Threshold SES If the Severely Errored Seconds (SES) count crosses the set value. The sub menu items are listed. TJ100CPr4 . The corresponding provisioning page is displayed.7 Configuring TU performance monitoring parameters Table 9-16 describes the fields of TCA settings of Lower Order Path for TU Table 9-16 TCA Settings of Lower Order Path for V5 Field Description Threshold ES If the Errored Seconds (ES) count crosses the set value. A confirmation page is displayed. 8 Click Accept Valid Modifications. A “Successfully Modified” message is displayed.900 0 .86400 Threshold SES 15 1440 0 .6291360 User Interface Guide Version 1.0 . 7 Click Submit.65536 0 . Table 9-17 gives the default and acceptable values for 15 minute and 1 day duration.86400 Threshold BBE/CV 300 28800 0 . duration The TCA Settings for 15-minute duration page is displayed. 6 Enter values referring to Table 9-17.900 0 . for 1-day duration The TCA Settings for 1-day duration page is displayed. Set TCA settings Click TCA Settings for 1-day duration link. Table 9-17 Default and acceptable values for 15 min and 1 day duration TCA thresholds for TU Parameter Default value Acceptable value 15 min 1 day 15 min 1 day Threshold ES 120 11520 0 . Configuration 73 5 If you want to Then Set TCA settings Click TCA Settings for 15-min duration for 15-minute link. Line build out type Displays the line build out type. Disable Disables threshold level for TCA-15 min / 1-day. Identifier Displays the traffic source. Alarm Reporting Status Report Reports alarms raised at the port. (see Note 1) Line coding Select the Line code to be used for clock recovery and error (see Note 1) detection .74 Configuration 9. Disable The E1 signal is not reconstituted to the primary reference source performance specifications and hence the synchronization information is lost. Note 2: Retiming is applicable for E1 ports only. Table 9-18 Fields on the E1/E3 ports page Field Description Admin Status Up Sets the port in service.7 PDH Ports Table 9-18 describes the fields on the E1/E3 ports page. Note 1: Line Build Out Type and Line coding is applicable for DS3 ports only. TJ100CPr4 . Threshold (for Enable Enables threshold level (for TCA-15min / TCA-15min/24-hour) 1-day). No-Report Alarms raised at the port are not reported. Retiming Enable The E1 signal is reconstituted to the primary (see Note 2) reference source performance specifications. Down Sets the port out of service. 1 Configuring E1/E3 ports The following are the steps to configure E1/E3 ports. 4 Select/Enter values referring to Table 9-19. The corresponding Provision interface page is displayed. A “Successfully Modified” message is displayed. 3 Click the desired E1/E3 port. Step Action 1 Click Configuration in the navigation menu. 2 Click Facilities. Framing Type Unframed • Unframed • Framed User Interface Guide Version 1. A confirmation page is displayed.0 . This string can be used to search on list of port. Click E1/E3 in the sub menu. Table 9-19 Default and acceptable values for the configurable E1/E3 parameters Parameter Default value Acceptable value Admin Status Down • Up • Down Alarm Reporting Status Report • No-Report • Report Threshold Disable • Disable (for TCA-15min/24-hour) • Default TCA Profile Identifier . The E1/E3 Interface configuration page is displayed. The sub menu items are listed. Configuration 75 9. Any alphanumeric string identifier that the user may like to associate with a E1/E3/DS3 port. 5 Click Submit. 6 Click Accept Valid Modifications. Table 9-19 gives the default and acceptable values for the configurable E1/E3 parameters.7. 3 Click the desired E1/E3 port. The sub menu items are listed. 9. Note 2: Retiming is applicable for E1 ports only. The View TCA Profile page is displayed. 2 Click Facilities. Step Action 1 Click Configuration in the navigation menu.7. The E1/E3 Interface configuration page is displayed.76 Configuration Table 9-19 (continued) Default and acceptable values for the configurable E1/E3 parameters Parameter Default value Acceptable value Line Build Out Type DS3_0_225ft For DS3: (see Note 1) (for DS3) • DS3_0_225ft • DS3_225_450ft Line coding B8ZS • B8ZS (see Note 1) Retiming Disable • Enable (see Note 2) • Disable Note 1: Line Build Out Type is not applicable for DS3 ports only. Click E1/E3 in the sub menu. TJ100CPr4 . The Provision interface page for E1/E3 port is displayed.2 Viewing TCA profiles for PDH ports The following are the steps to view TCA profiles for PDH ports. 4 Click the View TCA Profiles link. then TCA is raised.0 . If the Severely Errored Seconds-line (SES) count crosses the set value. then TCA is raised. Threshold SES-L(15 mins) Displays the threshold value of the SES-Line. Configuration 77 Table 9-20 describes the fields on the View TCA Profile page. then TCA is raised. Threshold ES-L(24 hr) Displays the threshold value of the ES-Line. Threshold CV-L(24 hr) Displays the threshold value of the CV-Line. Threshold CV-P(15 mins) Displays the threshold value of the CV-Path. then TCA is raised. Threshold CV-L(15 mins) Displays the threshold value of the CV-L. If the Errored Seconds-Path (ES-P) count crosses the set value. Threshold SES-P(15 mins) Displays the threshold value of the SES-Path. User Interface Guide Version 1. If the background Coding Violation (CV) count crosses the set value. Threshold ES-L(15 mins) Displays the threshold value of the ES-Line. Threshold UAS-P(15 mins) Displays the unavailable seconds in the regenerator section. If the background Coding Violation (CV) count crosses the set value. then TCA is raised. then TCA is raised. If the Severely Errored Seconds-Line (SES) count crosses the set value. Threshold ES-P(15 mins) Displays the threshold value of the ES-Path. If the Severely Errored Seconds-line (SES) count crosses the set value. Table 9-20 Fields on the View TCA Profile page Field Description Profile Name Displays the profile name. If the Errored Seconds-Line (ES-L) count crosses the set value. then TCA is raised. If the background Coding Violation (CV) count crosses the set value. If the Errored Seconds-Line (ES-L) count crosses the set value. then TCA is raised. Threshold SES-L(24 hr) Displays the threshold value of the SES-Line. then TCA is raised. 3 Click the desired E1/E3 port. Delete Select the check box in a row(s) to delete the row(s). The Provision New TCA Profile page is displayed. 2 Click Facilities. 6 Enter values referring to Table 9-22. Threshold SES-P(24 hr) Displays the threshold value of the SES-Path. The View TCA Profile page is displayed. The Provision interface page for E1/E3 port is displayed. Step Action 1 Click Configuration in the navigation menu.7. then TCA is raised. 9. 7 Click Create. If the Errored Seconds-Path (ES-P) count crosses the set value.78 Configuration Table 9-20 (continued) Fields on the View TCA Profile page Field Description Threshold ES-P(24 hr) Displays the threshold value of the ES-Path. A confirmation page is displayed. The E1/E3 Interface configuration page is displayed. 5 Click the Provision a new TCA Profile link. 8 Click Yes. If the Severely Errored Seconds-Path (SES) count crosses the set value. Threshold UAS-P(24 hr) Displays the unavailable seconds in the regenerator section. 4 Click the View TCA Profiles link.3 Provisioning a new TCA profile for PDH ports The following are the steps to provision a new TCA profile for PDH ports. Threshold CV-P(24 hr) Displays the threshold value of the CV-Path. The sub menu items are listed. then TCA is raised. then TCA is raised. A “Successfully Created” message is displayed. If the background Coding Violation (CV) count crosses the set value. Click E1/E3 in the sub menu. TJ100CPr4 . 65535 Threshold CV-P(24 hr) 691 0 .900 Threshold SES-L(15 mins) 10 0 .900 Threshold CV-L(15 mins) 13340 0 . The name can be a set of alphanumeric characters. Threshold ES-L(15 mins) 65 0 .900 Threshold ES-L(24 hr) 648 0 .133315200 Threshold ES-P(24 hr) 648 0 .65535 Threshold CV-L(24 hr) 133400 0 .27561600 Threshold UAS-P(24 hr) 10 0 .65535 User Interface Guide Version 1.16383 Threshold UAS-P(15 mins) 10 0 . Table 9-21 Default and acceptable values for the configurable E1/E3 TCA profile parameters Field Default value Acceptable values Profile Name .0 .65535 Threshold SES-P(24 hr) 100 0 . Enter a name for the profile.900 Threshold SES-P(15 mins) 10 0 . Configuration 79 Table 9-21 gives the default and acceptable values for the configurable TCA profile parameters.900 Threshold CV-P(15 mins) 72 0 .65535 Threshold SES-L(24 hr) 100 0 .16383 Threshold ES-P(15 mins) 65 0 . Enter a name for the profile. The name can be a set of alphanumeric characters.27561600 Threshold UAS-P(24 hr) 10 0 .65535 Threshold CV-L(24 hr) 133400 0 .80 Configuration Table 9-22 gives the default and acceptable values for the configurable TCA profile parameters.900 Threshold CV-P(15 mins) 72 0 . Threshold ES-L(15 mins) 65 0 .65535 Threshold CV-P(24 hr) 691 0 .900 Threshold CV-L(15 mins) 13340 0 .65535 TJ100CPr4 .16383 Threshold ES-P(15 mins) 65 0 .16383 Threshold UAS-P(15 mins) 10 0 .133315200 Threshold ES-P(24 hr) 648 0 .65535 Threshold SES-L(24 hr) 100 0 .900 Threshold SES-P(15 mins) 10 0 .900 Threshold SES-L(15 mins) 10 0 .65535 Threshold SES-P(24 hr) 100 0 .900 Threshold ES-L(24 hr) 648 0 . Table 9-22 Default and acceptable values for the configurable E1/E3 TCA profile parameters Field Default value Acceptable values Profile Name . 6 Click Delete. The Provision interface page for E1/E3 is displayed. Note : If Ethernet port is ETH-x-y-z then the corresponding VCG mapping is VCG-x-y-10z. 5 Select the check box in the Delete column for the TCA Profile to be deleted. Click E1/E3 in the sub menu. 3 Click the desired E1/E3 port. Step Action 1 Click Configuration in the navigation menu. The sub menu items are listed. The E1/E3 Interface configuration port page is displayed.0 . User Interface Guide Version 1.7. 2 Click Facilities. Configuration 81 9. 4 Click the View TCA Profiles link. The Ethernet ports can be accessed by clicking the corresponding card links in the slot view area. The capacity (Operating Granularity) of the container can be selected in Ethernet Card Configuration page. A confirmation page is displayed. A “Successfully Deleted” message is displayed. 7 Click Confirm Delete.8 Ethernet Ethernet ports/process carry Ethernet traffic on configuring corresponding VCG.4 Deleting TCA profile of a PDH port The following are the steps to delete TCA profiles of a PDH port. 9. The View TCA Profile page is displayed. Table 9-23 Fields on the Provision ethernet interface port page Field Description Admin Status Up Indicates the interface is in service. Link Status Displays the link status of the Ethernet interface. Hence. MTU Enter the Maximum Transmission Unit (MTU) size for Ethernet frame in bytes. Down Indicates the interface is out of service. AutoNegotiation Enable The connected network elements exchange information on their speed and duplex capabilities and automatically configure themselves to take maximum advantage of their abilities Disable The connected network elements do not exchange information on their speed and duplex capabilities. Link Integrity Enable Enables the ethernet port to be forced down on the occurrence of alarms on VCG side. TJ100CPr4 . Disable Disables the Ethernet port to be forced down on occurrence of alarms. the network elements do not operate to their maximum ability and the connection is slow.82 Configuration Table 9-23 describes the fields on the Provision ethernet interface port page. Alarm Reporting Report Reports alarms raised at the port Status No Report Alarms raised at the port are not reported. Advertize Both The port advertizes both sym and asym capabilities. Advertize None The port advertizes that it will neither transmit pause frame nor act on received pause frames.1 standard. Status Link Partner Displays the speed and duplex mode of the link partner (see Note). Manual Tx-Rx The port acts on flow control frames received and also transmits flow control frames. Manual Tx-only The port does not act on the pause frames received.1 standard.0 . Configuration 83 Table 9-23 (continued) Fields on the Provision ethernet interface port page Field Description Flow Control Manual Disable The port does not act on the pause frames received and also does not transmit any pause frames. User Interface Guide Version 1. else it will be Off. Manual Rx-only The port acts on the pause frames received. Advertize Asym The port advertizes that it can only transmit pause frames but not act on received pause frames based on IEEE 802. If the local Ethernet is forced down then Link Integrity status will be displayed as On. AutoNegotiation Displays the Auto Negotiation status of the Ethernet port (see Note). Capabilities Link Partner Flow Displays the flow control capability of the link partner (see Note). Control Link Integrity Status Displays the state of the link whether it is forced down due to alarms on the STM interfaces on near end network element or an Ethernet port on the far end network element. but transmits pause frames. but does not transmit any pause frames. Advertize Sym The port advertizes that it will transmit pause frames and act on received pause frames based on IEEE 802. Click Ethernet in the sub menu. Step Action 1 Click Configuration in the navigation menu. 4 Select/Enter values referring to Table 9-24. Medium Type Displays the type of ethernet medium i.8. The Ethernet interface configuration page is displayed. The thresholds can be edited.84 Configuration Table 9-23 (continued) Fields on the Provision ethernet interface port page Field Description Threshold Enable for Enable Threshold Crossing Alerts (TCA) can be user 15 min interval configured for 15 minutes interval. Link Partner Capabilities and Link Partner Flow Control parameters are available only if AutoNegotiation is set to enable. The corresponding Provisioning ethernet interface port page is displayed. The sub menu items are listed. 9. A “Successfully Modified” message is displayed. LAN Circuit Identifier Displays the name of the Ethernet port. 6 Click Yes. 10/100 Tx or 10/100 Fx. 5 Click Submit.1 Configuring Ethernet ports The following are the steps to configure Ethernet ports. TJ100CPr4 . 3 Click the desired port. If this field is enabled. Disable The thresholds for the TCA cannot be edited. 2 Click Facilities.e. A confirmation page is displayed. Note: AutoNegotiation Status. TCA alarm is raised on performance monitoring counts crossing the threshold value. 9600 AutoNegotiation Enable Disable or Enable Flow Control Manual Tx-Rx • Manual Disable • Manual Tx-Rx • Manual Tx-only • Manual Rx-only • Advertize None • Advertize Both • Advertize Sym • Advertize Asym (see Note 1) Threshold Enable for Disable • Enable 15-min interval • Disable LAN Circuit Identifier Ethernet 1-32 characters string Supports space character also.0 . Speed and Mode settings are applicable only to 10/100 Mbps ports. User Interface Guide Version 1.9600 bytes can be set only when the software supports jumbo frames over 1518 bytes. Note 2: The speed and duplex mode of the ethernet port can be manually provisioned only if autonegotiation is set to disable. Configuration 85 Table 9-24 gives the default and acceptable values for the configurable Ethernet port parameters. Note 1: The Advertise None. Advertize Both. MTU size of 64 . Advertize Asym values for the Flow Control field are available only when autonegotiation is enabled. Table 9-24 Default and acceptable value for the configurable Ethernet port parameters Parameter Default value Acceptable value Admin Status Down • Up • Down Alarm Reporting Status Report • No-Report • Report Link Integrity Enable Disable or Enable MTU 9600 64 . Advertize Sym. Note 3: The MTU size may differ for different cards across different software versions. Note : The default value for Threshold for CRC Errors is 73146 and the acceptable value ranges between 0 . 6 Click Submit. The sub menu items are listed. TJ100CPr4 . The TCA Settings page is displayed. 9.3 Configuring TCA profiles for Ethernet ports The following are the steps to configure TCA profiles for Ethernet ports. 4 Click TCA Settings. 2 Click Facilities. The corresponding Provisioning ethernet interface port page is displayed. 5 Enter a value for the Threshold for CRC Errors parameter. The Ethernet interface configuration page is displayed. 3 Click the desired port. The Ethernet interface configuration page is displayed. Step Action 1 Click Configuration in the navigation menu. The TCA settings of the Ethernet port is displayed. The sub menu items are listed. Step Action 1 Click Configuration in the navigation menu.133928568.2 Viewing the TCA settings for Ethernet ports The following are the steps to view TCA setting for an Ethernet port. 4 Click TCA Settings link. Click Ethernet in the sub menu. The corresponding Provisioning ethernet interface port page is displayed.8. 3 Click the desired port. 2 Click Facilities.8.86 Configuration 9. A confirmation page is displayed. Click Ethernet in the sub menu. Operating Granularity Select the granularity of the signals as chosen while configuring the ETH card.1 Provisioning the VCG interface Table 9-25 describes the fields on the Provisioning VCG interface page. 9. LCAS Support Enable Traffic is not disrupted when a cross-connect in one of the node is not functional. Configuration 87 7 Click Accept Valid Modifications.9.0 . Each Ethernet card has eight Ethernet ports and eight VCG ports. VCAT Displays if the VC Group is provisioned to enable or disable VCAT. Down Indicates ports are out of service. Alarm Reporting Status Report Reports alarms raised at the port No Report Alarms raised at the port are not reported. CRC Type CRC-32 Configures VCG for CRC-32 type.9 VCG The Virtual Concatenation Group (VCG) is a logical entity/group of Virtual Containers (VCs). 9. Max Diff Delay allowed Displays the maximum diff delay allowed. User Interface Guide Version 1. such that each VCG logically corresponds to one Ethernet port. Framing Type Displays the framing standards for Ethernet over SDH as chosen while configuring the ETH card. Table 9-25 Fields on the Provisioning VCG interface page Field Description Admin Status Up Indicates ports are in service. The number of Ethernet and VCG port is dependent on the card configuration. A “Successfully Modified” message is displayed. Disable The entire VCG port goes down when a single cross-connect in the port is not functional. 88 Configuration Table 9-25 (continued) Fields on the Provisioning VCG interface page Field Description Payload FCS Enable Allows the addition of the payload FCS as specified in GFP. The sub menu items are listed. A “Successfully Created” message is displayed. Disable Does not allow the addition of payload FCS as specified in GFP. A confirmation page is displayed. 2 Click Facilities. The corresponding Provisioning VCG interface page is displayed. TJ100CPr4 . No of Channels Indicates the number of channels configured for the group. Step Action 1 Click Configuration in the navigation menu. 3 Click the desired port. 6 Click Yes. 4 Select/Enter values referring to Table 9-26. 5 Click Submit. VCG Circuit Identifier Enter the name (Identity) for the VCG port. The VCG interface configuration page is displayed. Disable Channels are not removed from a VCAT group when there is a signal degrade on any of the TUs related to the channels. The name can be a set of alphanumeric characters of maximum 40 characters including space. Remove channels with SD Enable Channels are removed from a VCAT group when there is a signal degrade on any of the TUs related to the channels. Click VCG in the sub menu. The following are the steps to provision VCGinterfaces. 0 . Space is allowed. User Interface Guide Version 1. Configuration 89 Table 9-26 gives the default and acceptable values for the configurable VCG parameters. Note 1: It is recommended to keep the Payload FCS enabled. Table 9-26 Default and acceptable values for the configurable VCG parameters Parameter Default value Acceptable value Admin Status Up • Up • Down Alarm Reporting Status Report • Report • No-Report LCAS Support Enable • Enable • Disable VCAT Enable • Disable • Enable Operating Granularity VC-12 • VC-12 • VC-3 • VC-4 Payload FCS Enable • Disable • Enable (see Note 1) VCG Circuit Identifier Tejas Networks An alphanumeric string of maximum 32 characters. VCG. Only provisionable in revertive mode. VCG. The sub menu items are listed. Click VCG in the sub menu. TU values selected for the STM port) selected as the destination. WTR Displays the WTR value for the channel.9. 4 Click View VC Group. 3 Click the desired VCG The corresponding Provisioning VCG interface page is displayed..e..2 Viewing VC group The following are the steps to view VC group in a VCG Step Action 1 Click Configuration in the navigation menu. TU values selected for the STM port) to which the destination switches on failure. Table 9-27 Fields on the View VC Group page Field Description Circuit Identifier Displays the name of the VCG Source Displays the VCG port selected as the source.90 Configuration 9.e. Destination Protection Displays the STM channel (i.e. Table 9-27 describes the fields on the View VC Group page. TJ100CPr4 . Revertive Displays the reversion mode for the channel (revertive or Non-revertive). Destination Protection Displays the STM channel (i. TU values selected for the Status STM port) to which the destination switches on failure. Capacity Displays the rate of the VCG association. 2 Click Facilities. VCG. Directionality Displays the direction (2WAY or 1WAY) of data flow in the VCG association. Operational Status Displays the operating status (working/down) of the channel.. The View VC Group page is displayed. The VCG interface configuration page is displayed. Destination Displays the STM channel (i. Load Balancing and Fault recovery mechanism.0 . Tx Channel MST Displays the transmitting member channel status. Delete Select the check box to delete VCG association. Rx Channel MST Displays the receiving member channel status.3 Provisioning LCAS LCAS is a technology that allows the adjustment of data capacity in real time without loss of data. Bandwidth on demand. Edit LCAS Launches new page to edit LCAS related parameters. It can be defined as an adjustment scheme that hitlessly increases or decreases the capacity of a container that is transported SDH network using VC. Rx Seq Displays the receiving member sequence number. Configuration 91 Table 9-27 (continued) Fields on the View VC Group page Field Description Tx Control Displays transmitted LCAS control value on the associated Tx channel. LCAS offers the ability to automatically fine tune the bandwidth based on Quality of Service (QoS). User Interface Guide Version 1.9. Edit Protection Click the link to add. edit or remove protection for a channel. Tx Seq Displays the transmitting member sequence number. 9. Rx Control Displays received LCAS control value on the associated Rx channel. Note : LCAS support needs to be enabled or disabled at both the transmitter and receiver. Click VCG in the sub menu. 2 Click Facilities. The VCG interface configuration page is displayed. 8 Click Accept Valid Modifications. A confirmation page is displayed. TJ100CPr4 . A “Successfully Modified” message is displayed.92 Configuration The following are the steps to provision LCAS. 4 Click View VC Group link. The Provisioning VCG interface page is displayed. Select Remove for Transmit LCAS provision to disable LCAS support. The sub menu items are listed. Step Action 1 Click Configuration in the navigation menu. 6 Select Add for Transmit LCAS provision to enable the LCAS support. The View VC Group page is displayed. 5 Click the lcas link in the edit LCAS column for the VC you want to edit. The corresponding Provisioning VCG Association page is displayed. 7 Click Submit. 3 Click the desired VCG port. Table 9-28 Fields on the Provision VCG Association page Field Description VCG Displays the name of the VC Group to which the channel is associated.4 Adding a VC to VCG The following are the steps to add a VC to a VCG. Rx CTRL (Rx Channel) Displays the Received LCAS control value on the associated Rx (minutes) channel. The Add VC to VCG page is displayed. 6 Click Submit. The sub menu items are listed. 4 Click Add new VC link. Configuration 93 Table 9-28 describes the fields displayed on the Provision VCG Association page. Direction (100ms) Displays the direction of VC on VCG. Transmit LCAS Provision Add Allows sending the data on a particular (Milliseconds) channel which is already part of the VCG Remove Disables sending the data on a particular channel which is already part of the VCG. 9.0 . User Interface Guide Version 1. 3 Click the desired VCG. The corresponding Provisioning VCG Interface page is displayed. Step Action 1 Click Configuration in the navigation menu. Tx CTRL (Tx Channel) Displays the Transmitted LCAS control value on the associated Tx channel. A confirmation page is displayed. Status Displays the status of the channel as either up or down. The VCG interface configuration page is displayed. 5 Select values as described in Table 9-29. 2 Click Facilities. Click VCG in the sub menu.9. traffic is carried on protect path. Note: K. Value of K specifies L (TUG 2) TUG3. Working Port Select the work port Protection Port Select the protect port STM # Select the Work and Protection STM number. to enable reversion of traffic from the protect fiber to the working fiber. Table 9-29 Fields on the Add VC to VCG page Field Description Number of Connections Enter the number of VCs to be added to the VCG. WTR Displays the WTR value for the channel. This happens after a specified time (wait to restore time). Until traffic is manually switched back to work path. switching from Protect to work path does not occur automatically. TJ100CPr4 .94 Configuration 7 Click Yes. K (TUG 3) Specify the STM time slot of cross connect. A “Successfully Created” message is displayed. M (VC number) Reversion Mode Revertive This mode enables switching back to work path from protect path once the fault on work path is fixed. Non-Revertive In this mode. Provisionable in revertive mode only. The number of VCs are created in the VCG. Note : The protection feature can be configured to function in the revertive mode. CrossConnect Parameters Circuit Identifier Displays the name given for the circuit identifier. M values are not applicable for VC4 cross-connects. L. L specifies TUG2 and M specifies VC number of the cross-connect (see Note). Table 9-29 describes the fields on the Add VC to VCG page. Note : The NE Adjacency feature is available only when the Autodiscovery and PNCP_Enable parameters are enabled in the license file. 4 Click View VC Group. 5 Select the check box in the Delete column. for the VCG to be deleted.10 Network (NE) Adjacency The NE Adjacency feature gives the information of neighbours immediate to the network element. 2 Click Facilities. 6 Click Submit.0 .9. The VCG interface configuration page is displayed. The Neighbour information provides the name of the physical device. 9. Click VCG in the sub menu. The corresponding Provisioning VCG interface page is displayed. Auto-discovery when enabled on a port of a network element. User Interface Guide Version 1. A “Successfully Deleted” message is displayed. This feature eliminates the need to manually create trunks on the nodes. Step Action 1 Click Configuration in the navigation menu. address. Configuration 95 9. 7 Click Confirm Delete. The View VC Group page is displayed. helps to discover the next hop neighbors. The sub menu items are listed. 3 Click the desired VCG.5 Deleting a VC from VCG The following are the steps to delete a VC from a VCG. A confirmation page is displayed. router ID and the state of the neighboring network elements. 2 Viewing neighbour information The following are the steps to view neighbour information. 2 Click NE Adjacency.96 Configuration 9. Select to enable or disable the Auto Discovery Status for the port and its containers. Click Auto-Discovery in the sub menu. 3 Click on the desired STM port. Step Action 1 Click Configuration in the navigation menu. Click Neighbour information in the sub menu. The Neighbor Information page is displayed. A “Successfully Modified” message is displayed. 4 Click Submit. The sub menu items are listed. Operational Status Displays the operational status of the trunk. The sub menu items are listed. 9. Table 9-30 Fields on the Neighbour information page Field Description Trunk Name Displays the trunk name. Local IP Address Displays the IP address of the neighbouring network element. AUG-AU Enter values for the Aggregate units at the STM level.10. TJ100CPr4 . A confirmation page is displayed.10. 2 Click NE Adjacency. Step Action 1 Click Configuration in the navigation menu. Local Endpoint Enter a STM port number on the network element.1 Enabling auto-discovery for an STM port The following are the steps to access the auto-discovery feature. 5 Click Accept Valid Modifications. Table 9-30 describes the fields listed on the Neighbour information page. The Auto-Discovery configuration page is displayed. A confirmation page is displayed. The following are the steps to create a trunk manually. Command Select to add or delete a trunk. 3 Enter values referring to Table 9-31. 9. Click Neighbour Information in the sub menu. 2 Click NE Adjacency. The sub menu items are listed. The Neighbour information page is displayed. A “Successfully Modified” message is displayed. Configuration 97 Table 9-30 (continued) Fields on the Neighbour information page Field Description Remote IP Address Enter the IP address of the remote network element. Trunks can be created manually in the Neighbour information page.3 Provisioning trunks manually Trunks are automatically created when Auto-Discovery is enabled on the port. 5 Click Accept Valid Modifications. 4 Click Submit.10.0 . Step Action 1 Click Configuration in the navigation menu. Remote Endpoint Enter the STM port number on the remote network element AUG-AU Enter values for the Aggregate units at the STM level at the remote network element. Capacity Displays the trunk capacity. User Interface Guide Version 1. The network element processes the router information on the NMS port.255. TJ100CPr4 .0.255.254 Remote End point .0 . The TejNES can be provisioned to act as an OSPF router for ECC in remote management.. Delete is displayed when there is atleast one trunk provisioned in the network element. Command . Using overhead tunneling you can transfer transparently the overhead data belonging to a different network element across the STM-1 ports.11 DCN DCN is an ECC (Embedded Communication Channel) on the Tejas network element. 0. the routing information on the Data Communication channel is processed. Any STM port at the remote end. Similarly. AUG-AU 0-0 Values of Aggregate units at the STM level.0. It can exchange and maintain the routing information on both the ECC and LAN to which it is connected using the NMS port. Note 2: It is not advisable to change the Remote IP address as the trunk automatically discovers the neighbours. if the OSPF Ethernet parameter is enabled. AUG-AU 0-0 Values of Aggregate units at the STM level.98 Configuration Table 9-31 gives the default and acceptable values for configuring trunks. Table 9-31 Default and acceptable values for configurable Trunk parameters Parameter Default value Acceptable value General Local End point . Any STM port at the network element. DCN also supports overhead tunneling. -- Add Trunk/Delete Note 1: Add Trunk is displayed in the Command drop down menu when no trunks are created.255. The network element has the capability to use either IP or OSI as Layer 3 protocol for routing the data communication packets from the element management system. 9. Remote IP Address . The Network interface feature gives a list of all the active Network Interfaces with their attributes. Note : If the ECC_bytes are enabled on the STM-1 port. TejNES supports provisioning of ECC over the following bytes/sets of bytes: • DCC-R/SDCC • DCC-M/LDCC • F1 • F2 • F3 • F2F3 Each SDH frame includes two Embedded Communication Channels (ECC) called Regenerator Section and Multiplex Section ECC for transporting management messages between network elements and management systems. User Interface Guide Version 1. E1/VC12 management channel can be used to transport management communications between network elements and management systems. These in-band data communication channels enable service providers Operation Support Systems (OSS) to manage SDH network elements without the need for an expensive out-of-band data communication network. then the corresponding bytes cannot be used for tunneling. These management channels enable service providers to manage SDH network elements without the need of expensive out-of-band data communications network. Configuration 99 The network elements also support the remote management using the embedded communication channel (ECC) to allow the remote EMS/NMS to communicate to the network element for OAM&P applications.0 . The interface is available to carry traffic only when the Admin status is Up. Routing protocol Displays the routing protocol used for the interface. Click Network interface. TJ100CPr4 . Table 9-32 describes the fields displayed on the Network interface configuration page. Admin status Displays the admin status of the network interface. Table 9-32 Fields on the Network interface configuration page Field Description Edit Click the link to edit the network interface configuration. Layer2 protocol Displays the type of interface distinguished according to the physical link protocol immediately below the network layer in the protocol suite. you can • view network interface configuration • edit network interface configuration • provision ECC • delete network interface configuration 9. Layer3 protocol Displays the network layer protocol used for this interface.11. Step Action 1 Click Configuration in the navigation menu. Association Displays the label of the interface. This page gives details of the existing network interfaces. 2 Click DCN.1 Viewing the network interfaces The following are the steps to view the network interface. The Network interface configuration page is displayed. The sub menu items are listed.100 Configuration In the Network interface menu. Network interface short Displays the network interface name in short as used by the name operating system. 2 Click DCN.2 Editing network interfaces The following are the steps to edit network interfaces. 3 Click the Edit link for the interface you want to edit. Step Action 1 Click Configuration in the navigation menu. The Edit Network interface provisioning page is displayed. Click Network Interface. User Interface Guide Version 1. 9. Note: The LAN interface cannot be deleted. The sub menu items are listed. MTU Displays the maximum size of the packet that can be sent through the interface.11. Configuration 101 Table 9-32 (continued) Fields on the Network interface configuration page Field Description IP Address Displays the IP address of the network interface. 6 Click Accept Valid Modifications. A confirmation page is displayed. 5 Click Submit. Delete Click the button to delete the interface. 4 Edit the fields referring to Table 9-33.0 . This page gives details of the existing Network Interfaces. A “Successfully Modified” message is displayed. The Network interface configuration page is displayed. 65535 sec (see Note 4) TJ100CPr4 .65535 sec (see Note 4) Router Dead Interval 40 1 . HDLC Framing (see Note 2) Magic number Enable • Enable • Disable (see Note 1) Proxy ARP Proxy ARP Disable • Enable • Disable OSPF OSPF Disable • Disable • Enable Hello Interval 10 1 . RFC 1661 RFC 1661 • PPP.102 Configuration Table 9-33 gives the default and acceptable values for the configurable parameters on the Edit Network Interface Provisioning page. Table 9-33 Default and acceptable values for the network interface parameters Parameter Default value Acceptable value Admin Status Up • Up • Down Layer 3 MTU 1518 248 . • Standard PPP.1518 Layer 2 Layer 2 protocol Standard PPP. A “Successfully Modified” message is displayed.3 Provisioning a Embedded Communication Channel The following are the steps to provision an ECC. A confirmation page is displayed. Magic number is not applicable for LAN. RFC 1661 is selected for Layer 2 Protocol. Applicable only when Simple password is Password/key selected for OSPF Authentication mode. Note 2: For a LAN. Click Network Interface. The Provision ECC page is displayed. The Network Interface Configuration page is displayed. Configuration 103 Table 9-33 (continued) Default and acceptable values for the network interface parameters Parameter Default value Acceptable value OSPF Authentication Disable • Disable Authentication Mode Authentication: • Simple Password OSPF Authentication . Note : Only two DCN/Management channel can be provisioned at a time User Interface Guide Version 1. Note 3: The password entered by user will be visible.0 . Step Action 1 Click Configuration in the navigation menu. Note 4: The Router Dead Interval should be an integral multiple of Hello Interval. the Layer 2 Protocol is MAC and is not editable. The sub menu items are listed. 2 Click DCN. 3 Click Provision ECC link. The password can be a set of alphanumeric characters having a maximum length of 8 characters. 5 Click Submit.11. 9. 6 Click Accept Valid Modifications. 4 Select values referring to Table 9-34. (see Note 3) Note 1: Magic number is editable only when Standard PPP. 104 Configuration Table 9-34 gives the default and acceptable values for the configurable ECC parameters. Step Action 1 Click Configuration in the navigation menu. The Management channel configuration page is displayed. TJ100CPr4 . 6 Click Accept Valid Modifications. 3 Click Provision Management Channel-1 or Provision Management Channel-2. Table 9-34 Default and acceptable values for configurable ECC parameters Parameter Default Value Acceptable Value Port STM1-1-5-1 • STM1-1-5-1 • STM1-1-5-2 ECC Byte Selection ecc_disable • ecc_disable • ecc_F1 • ecc_F2 • ecc_F3 • ecc_F2F3 • ecc_DCC_R • ecc_DCC_M ECC Path . Click Network Interface. 9. 2 Click DCN. 4 Select values referring to Table 9-35. The Network Interface Configuration page is displayed. A “Successfully Modified” message is displayed. A confirmation page is displayed. The sub menu items are listed.11. 5 Click Submit.4 Provisioning Management Channel The following are the steps to provision a management channel. AU-n over which ECC is carried. E1 port is the only configurable parameter. User Interface Guide Version 1. Port STM1-1-5-1 • STM1-1-5-1 • STM1-1-5-2 STM No 1 1 K 1 1-3 L 1 1-7 M 1 1-3 Note: When E1 is selected for Management Channel Type. The SDH Path parameters are configurable when VC12 is selected for Management Channel Type. Table 9-35 Default and acceptable values for Management Channel parameters Parameter Default value Acceptable value Management Channel E1 • E1 Type • VC12 • Unprovisioned E1 Port E1-1-N-1 E1-1-5-M where M is the E1 port number (see Note). Configuration 105 Table 9-35 gives the default and acceptable values for the Management Channel parameters.0 . and the complete routing structure (topography). as router only possess information about network topology that is within the area. For this to happen. An area is a group of OSPF networks. TJ100CPr4 .12 OSPF The Open Shortest Path First (OSPF) is an interior gateway routing protocol based on the shortest path first or link-state algorithm. Any valid IP address is an acceptable area parameter.0. thus preventing problems like routing loops and count-to-infinity (when routers continuously increment the hop count to a particular network) which results in a stable network. routers and links that have the same area identification. OSPF as a routing algorithm is used to route IP packets through the shortest path. The OSPF parameters can be configured for all embedded control channel interfaces and for the LAN port to enable routing between these interfaces. the routers need to properly establish the adjacency and then exchange their routing database with each other. The converge is quick. The advantage of shortest path first algorithms is that it results in smaller and more frequent updates everywhere.1. The password configured in OSPF authentication mode is sent in OSPF packets. Routers use link-state algorithms to send routing information to all nodes in an internetwork by calculating the shortest path to each node based on a topography of the internet constructed by each node. The OSPF feature enables monitoring neighbors of a network element and debugging the routing information for In Band Communication (IBC). It helps in reducing the size of the router database. Each router sends that portion of the routing table (keeps track of routes to particular network destinations) that describes the state of its own links. thereby avoiding any malicious intentions of knowing routing database of a network.106 Configuration 9. This is used to establish adjacency where the same password needs to be configured on both interfaces connected to each other. OSPF network can be divided into sub-sections called areas. OSPF authentication is used to avoid any malicious intentions of establishing adjacency.0. The default area parameter is 0. 1 is the area address of the backbone. 5 Click Yes. Step Action 1 Click Configuration in the navigation menu. The Network interface configuration page is displayed. The OSPF parameters configuration page is displayed.0 .1 Configuring OSPF area The following are the steps to configure OSPF area in the network element. 3 Click the Edit link for the interface you want to edit. 3 Enter the relevant value in the Area text field. Step Action 1 Click Configuration in the navigation menu. The sub menu items are listed. 2 Click DCN. 2 Click DCN. Configuration 107 9. Click Network Interface. 4 Click Submit. A confirmation page is displayed.0. Click OSPF.2 Disabling OSPF area The following are the steps to disable OSPF area for a port on the network element. A “Successfully Created” message is displayed. User Interface Guide Version 1.12. The sub menu items are listed. The Edit Network interface provisioning page is displayed. This page gives details of the existing network interfaces. . The default OSPF area 0.0.12. 9. CAUTION Loss of communication Changing the OSPF area may cause a loss of communication to the network element. TJ100CPr4 . The sub menu items are listed. 6 Click Accept Valid Modification. 5 Click Submit. In the Static Route menu. meaning the routes do not change automatically unlike routing protocols. Step Action 1 Click Configuration in the navigation menu.108 Configuration 4 Select Disable for OSPF. 2 Click DCN. Thus a user can establish a link. 9. you can • view all the configured static routes • add a new static route • delete static routes 9. The Static routes configuration page is displayed. Static routes are used to provide static connectivity between routers.13 Static Route Static route is an entry in network element routing table that specifies how to reach an IP address through a particular gateway (network element or Interface). Click Static Route. The user can do this by adding a destination network IP address and the IP address of next hop network element.13. A “Successfully Modified” message is displayed. A static route allows the user to access a network element in any network. A confirmation page is displayed.1 Viewing static routes The following are the steps to view static routes in a network element. Operational Status Displays the operational status of the route. The Creating Static Route page is displayed. delete Select the check box in a row(s) to delete the row(s).0 . The Static routes configuration page is displayed. The sub menu items are listed. 5 Click Submit. Next hop Displays the IP address of the next hop element. 2 Click DCN. Step Action 1 Click Configuration in the navigation menu. NetworkInterface Ref Displays the name of the network interface for which the static route is added. 9. address Destination network Displays the Netmask (in number of bits) to be applied to address Mask Length Destination Network IP Address to determine the network for which this route is added. 4 Enter values referring to Table 9-37. 3 Click Add a new Static Route link. Advertise route Displays the advertise route is enabled or disabled. Configuration 109 Table 9-36 describes the fields on the Static routes configuration page.2 Adding static routes The following are the steps to add a static route in a network element.13. User Interface Guide Version 1. Click Static Route. Table 9-36 Fields on the Static route configuration page Field Description Destination network IP Displays the IP Address of the destination. A “Successfully Created” message is displayed. 13.32 Mask Length Next hop IP Address . 0. A confirmation page is displayed. the Next Hop IP Address need not be specified. TJ100CPr4 . Note 4: If the address is not specified or is invalid for eth0 interface. Table 9-37 Default and acceptable values for the configurable static route parameters Parameter Default value Acceptable value Destination Network IP .0. an error message is displayed on submit.255.0. Step Action 1 Click Configuration in the navigation menu.0 .0.255.255.0 .3 Deleting a static route The following are the steps to delete a static route. 3 Select the check box in the Delete field for the static route to be deleted. 4 Click Submit.255.254 Advertise Route Disable • Disable • Enable Network Interface LAN-1-6 (eth0) • LAN-1-6 (eth0) • STM1-1-5-1 • STM1-1-5-2 Note 1: Any invalid static route added on a point to point interface is added in the WUI but is not added in the Kernel routing table.254 Address Destination Network Address . Click Static Route.110 Configuration Table 9-37 gives the configurable static route parameters with their default and acceptable values.255.255. The sub menu items are listed.0. 9. Note 2: Any invalid static route added on a broadcast interface (eth) is blocked. If it is ecc interface. 0. The Static routes configuration page is displayed. Note 3: The Next Hop IP Address has to be specified only when the static route is provisioned on eth0. 2 Click DCN. 0 . A “Successfully Deleted” message is displayed.1 Viewing Proxy ARP neighbours configuration The following are the steps to view Proxy ARP neighbour configuration information. Step Action 1 Click Configuration in the navigation menu. User Interface Guide Version 1. Click Proxy ARP Neighbour. The network element software supports viewing and adding of proxy ARP neighbours. The proxy ARP feature removes the need for customers to provision static routes on their routers and routing protocols (OSPF) between the gateway network elements and the customer DCN. The Proxy ARP Neighbours configuration page is displayed. 9. Configuration 111 5 Click Confirm Delete.14. you can • view all the proxy ARP neighbours • add a new proxy ARP neighbour • delete proxy ARP neighbours 9.14 Proxy ARP Neighbour The Proxy ARP allows a gateway network element to respond to Address Resolution Protocol (ARP) requests for sub tending network elements that are within the same subnetwork as the customer DCN address range.0 . In the Proxy ARP Neighbours menu. 2 Click DCN. The sub menu items are listed. 14.112 Configuration Table 9-38 describes the fields on the Proxy ARP Neighbours configuration page. The sub menu items are listed. delete Select the check box to delete the Proxy ARP neighbour. The Creating Proxy ARP Neighbour page is displayed. Table 9-38 Fields on Proxy ARP Neighbours configuration page Field Description Proxy ARP Neighbours Neighbour network IP Displays the IP address of the neighbouring network element.2 Adding a Proxy ARP neighbour Note 1: The maximum number of Proxy Address Resolution Protocol (ARP) neighbours in a Tejas network element is 14. 9. 3 Enter values referring to Table 9-39. Click Add a new Proxy ARP Neighbour link. 2 Click DCN. TJ100CPr4 . A “Successfully Created” message is displayed. Step Action 1 Click Configuration in the navigation menu. The following are the steps to add a Proxy ARP neighbour. Note 2: Ensure that the router ARP timers are set to less than 10 minutes to limit the DCN outage to 10 minutes. address NetInterfaceRef Displays the type of interface—LAN-1-6 (eth0). 4 Click Submit. in the absence of static route. Any valid IP address of a network element Address in the same subnet that is reachable from the gateway network element. Configuration 113 Table 9-39 gives the default and acceptable values for the Proxy ARP neighbour parameters page. Step Action 1 Click Configuration in the navigation menu. The sub menu items are listed. Currently it supports only LAN-1-6 (eth0). A “Successfully Deleted” message is displayed. 3 Select the check box in the Delete field for the Proxy ARP neighbours to be deleted.14. 4 Click Submit. The Proxy ARP Neighbours configuration page is displayed.3 Deleting a proxy ARP neighbour Note : Deleting Proxy Address Resolution Protocol (ARP) Neighbours will result in loss of communication to the remote network elements. Click Proxy ARP neighbour. Table 9-39 Default and acceptable values for the Proxy ARP Neighbour parameters Field Default value Acceptable value Destination Network IP . 9. A confirmation page is displayed. 5 Click Confirm Delete. Network Interface Select the network interface.0 . User Interface Guide Version 1. 2 Click DCN. The following are the steps to delete a proxy ARP neigbhbour. or Terminal Server network. Click Serial Port. TJ100CPr4 . There are three applications for the serial port on the Tejas network element—User Data Channel (UDC). Once the serial port has been properly configured. overhead byte F1 is used for data communication purpose. Serial communication requires that you specify the transmission baud rate and application. The Serial port configuration page is displayed.114 Configuration 9.1 Viewing serial port information The following are the steps to view serial port information. Step Action 1 Click Configuration in the navigation menu. The sub menu items are listed. Terminal server helps in connecting to a remote node using telnet in the absence of Diaguser provision in the network element.15 Serial Port Serial communication between two network elements is possible due to the serial port. 2 Click DCN. In the Serial port menu. you can • view serial port configuration • edit serial port configuration 9. the serial port can be used to send and receive data. For UDC application.15. The Serial port configuration page is displayed. 2 Click DCN. Note 2: If F1-UDC needs to be used for serial port application. then F1 byte cannot be used for ECC byte communication. User Interface Guide Version 1. A confirmation page is displayed. Click Serial Port. the admin status of the serial port must be set to up. 9. 3 Click edit link in the edit column for the serial port to be edited. the Application and the Admin status fields cannot be changed simultaneously. Application Displays the type of application that runs on the serial interface. Baud Rate Displays the operating rate of serial interface. For the application to come into effect.2 Editing serial port Note 1: In the serial port provisioning. The sub menu items are listed.0 . The following are the steps to edit a serial port. Step Action 1 Click Configuration in the navigation menu. The Serial port configuration page is displayed. Enter values referring to Table 9-41. 4 Click Submit. Configuration 115 Table 9-40 describes the fields on the View Serial Port page. edit Click the link to edit the serial port information. Admin Status Displays the status of the serial interface as up or down. First application and the corresponding parameter has to be selected. Table 9-40 Fields on the View Serial Port page Field Description Port Displays the Serial port name.15. the telnet connection is timed out.600. TJ100CPr4 . Table 9-41 Default and acceptable values for configuring serial port parameters Parameter Default value Acceptable value Application Unprovision • udc Application • terminal server • Unprovision Application Admin Status Down • Up • Down UDC Application Overhead byte F1 • F1 • F2 STM Port STM1-1-5-1 • STM1-1-5-1 • STM1-1-5-2 AUG AUG-1-5-1-1 • AUG-1-5-1-1 AU AUG-1-5-1-1-1 • AUG-1-5-1-1-1 Terminal Server TCP Port 20090 20090 . Table 9-41 gives the default and acceptable values for configuring the serial port parameters.116 Configuration 5 Click Accept Valid Modifications. A “Successfully Modified” message is displayed.20099 Timeout (sec. Beyond 600 seconds. Note: The AUG and AU fields are editable only if the F2 byte is selected for the Overhead byte.) 0 0 . The timing Synchronization sources depends on: • user or automatic timing protection switch requests in the network element • validity of the nominated sources (synchronization status values) • priorities assigned to the source (user provisionable) • quality of the available signal on the nominated source (ppm offset less than or equal to 17ppm) 9. The BITS clock input/output is at 2. Configuration 117 9. The SSM timing alarms are displayed in the lower portion of the Synchronization status page.16 Synchronization The Synchronization feature provides the timing and synchronization management functionality for the network element.048MHz and can be nominated as a reference for node synchronization. All the SDH network elements in a network are synchronized to the same highly accurate clock called the Primary Reference Clock (PRC).0 .1 Viewing and editing the synchronization status The Synchronization state page displays the synchronization state of the network element. Loss-of-Signal (LOS) is detected on the clock input and this alarm is used as a trigger to change over to the next synchronization reference.16. User Interface Guide Version 1. PDH signals can be transported on an SDH frame. The frequency of the primary reference clock is passed on to the network elements through the traffic signal or through any external means like Global Positioning System (GPS) or via the Building Integrated Timing System (BITS). but they are multiplexed independently of the SDH timing. The SSM timing alarms are automatically refreshed for every two seconds. External Request on Displays external requests (forced switch. provided QL Mode is enabled. Node output quality level Set the quality of clock output if the Output QL mode is set to Manual. then the BITS clock output will be squelched. Selected Clock Source Displays the clock source being used. Reversion Mode Auto The switching of the clock happens automatically. WTRTime (minutes) Select the time the clock takes to switch to previously locked clock when it is restored. Output QL Mode Auto The output clock is the same as the source clock that is locked. Enabled The clock is selected based on its quality and priority. WTR Time can be set only if the revertive mode is selected.118 Configuration Table 9-42 describes the fields on the Synchronization state page. if any. Manual Quality of output clock can be set manually (see Note). TJ100CPr4 . manual switch). If the clock does not have the QL as expected. Output quality level Displays the actual value for the Quality of clock output. Node Minimum quality Select the minimum quality level expected by the network element level to lock to a particular clock. Selected source Note: Manual should be selected for Output QL mode when QL Mode is disabled. SETG Status Displays the status of the PLL within the network elements synchronization module. Squelching is not done at the STM interfaces. Manual The switching of the clock has to be selected manually. Table 9-42 Fields on the Synchronization state page Field Description QL Mode Disabled The clock is selected based on the priority assigned. The lower part of the Synchronization state page displays the status of the timing reference. Click Synchronization Status. Table 9-43 Default and acceptable values for the configurable synchronization status parameters Parameter Default Value Acceptable value QL Mode Disabled • Enabled • Disabled Output QL Mode Manual • Manual • Auto Reversion Mode Manual • Manual • Auto User Interface Guide Version 1. 4 Click Submit. A confirmation page is displayed.0 . The sub menu items are listed. Step Action 1 Click Configuration in the navigation menu. A “Successfully Modified” message is displayed. The Synchronization state page is displayed. Configuration 119 The following are the steps to view and edit synchronization. 3 Enter/Select values referring to Table 9-43. Table 9-43 gives the default and acceptable values for the configurable synchronization status parameters. 5 Click Accept Valid Modifications. 2 Click Synchronization. 2 Viewing the selected timing references The following are the steps to view selected timing references.12 Node Output Quality Level DNU • PRC • SSU_A • SSU_B • SEC • DNU • INVALID Node Minimum Quality Level Invalid • PRC • SSU_A • SSU_B • SEC • DNU • INVALID 9. TJ100CPr4 . 2 Click Synchronization. Step Action 1 Click Configuration in the navigation menu. The sub menu items are listed.120 Configuration Table 9-43 (continued) Default and acceptable values for the configurable synchronization status parameters Parameter Default Value Acceptable value WTR Time (minutes) 5 0 . The View nominated timing references page is displayed.16. Click View Nominated timing reference. When the QL mode is disabled. User Interface Guide Version 1. Note : The Quality Level is visible only when the QL mode is enabled in Synchronization state page. Priority 0 indicates the clock source is not used for selection. Configuration 121 Table 9-44 describes the fields on the View nominated timing references page. Quality Level Defines quality of the timing reference to which the node is locked to. Clock Source Displays the clock source. Click the clock source link to view the Edit Clock Sel page. Off The clock source is available for selection. Table 9-44 Fields on the View nominated timing references page Field Description Current Source Indicates whether the clock source is the current source. Note: 1 has the highest priority and 8 the least. Manual should be selected for the Output QL Mode in the Synchronization state page. The clock source tagged with an asterisk is the current active source. Clock Status Displays the availability status of the clock source as one of the following: • Normal • Signal Fail • Admin down • Oper down Lockout Request On Excludes the clock source from selection. delete Select the check box to delete the nominated timing references.0 . Priority Displays the priority assigned to the clock source. TJ100CPr4 . Priority 0 indicates the clock source is not used for selection). Note: Quality Level is displayed when the user has nominated E1 ports. Step Action 1 Click Configuration in the navigation menu. Quality Level & Input Defines quality of the timing reference to which the node is locked Quality Mode to. Click View Nominated timing reference. 3 Click the Clock Source link to edit the Clock Source information. Input Quality Mode & Quality Level is displayed when the user has nominated BITS. LockOut Request Select LockOut request as On to exclude the clock source from selection. The Edit ClockSel page is displayed. A “Successfully Modified” message is displayed. The sub menu items are listed.16. A confirmation page is displayed. The View nominated timing references page is displayed.122 Configuration 9. Table 9-45 Fields on the Edit ClockSel page Field Description Priority Select a priority for the clock source (1 has the highest priority and 8 the least. 2 Click Synchronization. The following are the steps to edit a selected timing reference. 4 Make changes referring to Table 9-46 and click Submit. 5 Click Accept Valid Modifications.3 Editing selected timing reference Table 9-45 describes the fields on the Edit ClockSel page. 16. 9. A confirmation page is displayed. Step Action 1 Click Configuration in the navigation menu.0 . User Interface Guide Version 1. Configuration 123 Table 9-46 gives the default and acceptable values for the configurable timing reference parameters. Table 9-46 Default and acceptable values for configurable timing reference parameters Parameter Default value Acceptable value Priority 0 0-8 LockOut Request Off • On • Off Input Quality Mode Manual • Manual • Auto Quality Level Invalid • PRC • SSU A • SSU B • SEC • DNU • Invalid Note 1: Quality Level is displayed when the user has nominated E1 ports. 4 Click Submit. The View nominated timing references page is displayed. 2 Click Synchronization.4 Deleting a nominated timing reference The following are the steps to delete a nominated timing reference from the network element. Note 2: Input Quality Mode and Quality Level are displayed when the user has nominated BITS. for the clock source to be deleted. Click View Nominated timing reference. The sub menu items are listed. 3 Select the check box in the delete field. 124 Configuration 5 Click Confirm Delete. Note : If the network element is locked to a clock source that needs to be deleted. TJ100CPr4 . then lockout the network element from the clock source before deleting the clock. 0 priority indicates the clock reference is not used for selection. A “Successfully Deleted” message is displayed. The clock reference is given as BITSIN_n_1.5 Nominating a timing reference Table 9-47 describes fields on the Nominate timing references page. Note : A maximum of eight clocks can be nominated for a network element. Note 2: The Clock Reference Port is valid for BITS and ports timing references only. then select the desired bits.16. then select the desired STM clock reference port. Note 3: BITSIN_n_1 is a 2MHz signal where as BITSIN_n_2 is a 2Mbps signal. Table 9-47 Fields on the Nominate timing references page Field Description Clock Reference Three types of references are available: • Port • Bits • Internal Clock Reference Port If Port is selected for Clock Reference. If Bits is selected for Clock Reference. (n is slot number of the card from which BITS clock inputs are driving) Priority Select the priority for the clock source. BITSIN_n_2. Note 1: 1 has the highest priority and 8 has the least. 9. 0 . 3 Select values referring to Table 9-48. Configuration 125 The following are the steps to nominate a timing reference for the network element. Table 9-48 Default and acceptable values of parameters for nominating timing references Parameter Default values Acceptable values Clock Reference Internal Internal Port Bits Clock Reference port E1-1-5-1 when Port is selected For Ports—all PDH and STM for clock reference ports For Bits— BITSIN-1-5-1 and BITSIN-1-5-1 when Bits is BITSIN-1-5-2 selected for clock reference where N is the slot number in which the base card is placed. The Nominate timing references page is displayed. Table 9-48 gives the default and acceptable values of parameters for nominating timing references. Step Action 1 Click Configuration in the navigation menu. The sub menu items are listed. 2 Click Synchronization. A “Successfully Created” message is displayed. Click Nominate timing reference. 4 Click Submit. Priority 0 0-8 User Interface Guide Version 1. 126 Configuration TJ100CPr4 . Alarms are raised to alert the user about fault conditions.1 Introduction Fault management deals with detection and reporting of faults by the network element. 10 Faults 1- 10. you can view information on active alarms raised on objects. User Interface Guide Version 1.2 Active Alarms In the Active alarms sub menu.0 . A Stop Refresh button is provided in the Active Alarms page to stop the automatic refreshing of the page. The alarms can be categorized into the following types based on their severity: • Critical • Major • Minor • Deferred • Warnings This chapter provides information on the following: • Active alarms • Suppressed alarms • Alarm filters • Event history and • Alarm severity 10. Time Displays the date and time when the alarm was raised. The Active alarms page is displayed on the right pane. TJ100CPr4 . The sub menu items are listed. Table 10-1 describes the fields on the Active alarms page. Table 10-1 Field on the Active alarms page Field Description # Displays the serial number of the alarm. Step Action 1 Click Faults in the navigation menu. Information Provides information on the fault due to which the alarm was raised Severity Displays severity of the Alarm – critical. Object Displays source of the fault. deferred or warning. major. minor.1 Viewing active alarms The following are the steps to view active alarms.128 Faults 10. 2 Click Active alarms. Acknowledgement Status Displays whether alarm has been acknowledged or not.2. The Suppressed alarms page is displayed.3 Suppressed Alarms In the Suppressed alarms sub menu. major. Alarm Information Displays information on the fault due to which the alarm was raised. 2 Click Suppressed alarms.1 Viewing suppressed alarms The following are the steps to view suppressed alarms. User Interface Guide Version 1. Table 10-2 describes the fields on the Suppressed alarms page. Severity Displays the severity of the alarm—Critical. Step Action 1 Click Faults in the navigation menu. Table 10-2 Fields on the Suppressed alarms page Field Description # Displays the serial number of the alarm. The sub menu items are listed.0 . Time Displays the date and time at which the alarm was raised. Object Displays the object on which the alarm is suppressed. minor. Faults 129 10. 10. deferred or warning.3. you can view the alarms that are suppressed by the network element alarm reporting control or by any provisioned user alarm filter. Alarm Suppressor Displays the technique used to suppress the alarms. The sub menu items are listed. 3 Click Provision a new alarm filter.1 Viewing alarm filters The following are the steps to view alarm filters. A confirmation page is displayed. Step Action 1 Click Faults in the navigation menu. Step Action 1 Click Faults in the navigation menu. The View Alarm Filter page is displayed. 10. Table 10-3 describes the fields on the View Alarm Filter page. The Provision New Alarm Filter page is displayed. The sub menu items are listed.4. Managed object Displays the object to which the filter is applied. TJ100CPr4 . Alarm Displays the alarm that is being suppressed.130 Faults 10. 5 Click Create. 4 Enter/Select values as described in Table 10-4. 2 Click Alarm filters.4.2 Provisioning a new alarm filter The following are the steps to provision a new alarm filter. 10. Table 10-3 Fields on the View Alarm Filter page Field Description Alarm Filter Displays the alarm filter. The View Alarm Filters page is displayed.4 Alarm Filters Alarm filters are generally used for suppressing equipment level alarms. 2 Click Alarm filters. 4 Click Delete. Table 10-4 describes the fields on the Provision New Alarm Filter page. 3 Select the check box in the Delete column for the alarm filter to be deleted. Table 10-4 Fields on the Provision New Alarm Filter page Field Description Alarm Class Select the object on which the alarm is to be suppressed from the drop down menu. Type Select an instances of the object class in the network element from the drop down menu. A “Successfully Created” message is displayed. Step Action 1 Click Faults in the navigation menu.4. 2 Click Alarm filters. Name Enter a name for the alarm filter. A “Successfully Deleted” message is displayed. The name should be a set of alphanumeric characters.0 . A confirmation page is displayed. User Interface Guide Version 1. Alarm Select an alarm that should be suppressed from the drop down menu.3 Deleting an alarm filter The following are the steps to delete an alarm filter. The View Alarm Filters page is displayed. Faults 131 6 Click Yes. The sub menu items are listed. 5 Click Confirm Delete. 10. stops automatic refresh of the Event History page. to view a list of 20 latest events.132 Faults 10. Click Next. in which all the events are listed. The Show All Events link opens a new window.5. you can view the event history. 2 Click Event history. click Show All Events link. 3 Click Latest. Click Previous.1 Viewing event history The following are the steps to view events that occurred in the network element. 10. The Next and Previous buttons show the page immediate to the current displayed page. TJ100CPr4 . In the Event History page. to view the next 20 events. This opens a separate window listing all the events. to view the previous 20 events. when clicked. The Event history page is displayed. The Stop Refresh button. 4 To view all the events. Step Action 1 Click Faults in the navigation menu. The Back to Node View link takes you to NE information page.5 Event History The Event history provides information on the fault management event log. The sub menu items are listed. 2 Click Alarm severity. The Restore Defaults button when clicked. Step Action 1 Click Faults in the navigation menu. Object Displays the object on which the event occurred. The Alarm severity page is displayed. 10. (*) in the Alarm column.6. The Back to Node View link takes you to the NE information page. for the alarm whose severity is to be changed. Table 10-5 Fields on Event history page Field Description # Displays the serial number of an event. 10. deferred and warning based on their severity. Faults 133 Table 10-5 describes the fields on the Event history page.0 . User Interface Guide Version 1.6 Alarm Severity The alarms are categorized as critical. minor. In the Alarm severity page. restores the default severity for the modified alarms. 3 Select the desired severity level from the drop down menu in the Severity field. The sub menu items are listed.1 Setting alarm severity The following are the steps to set alarm severity. Additional information Displays additional information. Time Displays the date and time at which the recorded event occurred. you can set the severity of alarms. major. The alarms for which severity is changed is marked with an asterisk. Information Displays which event occurred at that instant. minor. deferred and warning. Table 10-6 describes the fields on the Alarm Severity page.134 Faults 4 Click Submit to set the severity of the alarm. major. Table 10-6 Fields on the Alarm Severity page Field Description Trap ID Displays the Unique number for an alarm. The field modified is indicated by an asterisk (*). Alarm Displays the nature of alarm that has occurred. Object Displays the object on which the alarm is raised. Click Reset to reject the changes. Severity Select the severity of the alarm – critical. The page refreshes with the changes made. TJ100CPr4 . Click Restore Defaults to bring back the alarm severity levels to default values. Profiles 11 1- 11.0 . • Path Alarm Profiles . In the Profiles menu.The STM profiles defines the path profiles to be applied for all Higher order/Lower order terminating/non-terminating cross-connects. you can • view STM profiles • edit STM profiles • view path alarm profiles • configure path alarm profiles • edit path alarm profiles • delete path alarm profiles User Interface Guide Version 1.1 Introduction This chapter describes the Profiles menu in the WUI. In the Profiles menu.The path alarm profiles enable the alarm reporting control on all alarms available in the AU and TU objects. the following two profiles are available: Profiles define the behavior of the ports in the event of an alarm. • STM Port Profiles . The View STM Port Profile page is displayed with a table listing all the profiles. The existing connections will remain unchanged. Internal NNI – The Internal NNI profile indicates preferences within EMS domains. TJ100CPr4 . but can be customized to point to different path profiles. The changes made will be applicable only for new connections. you can • view STM port profiles • edit STM port profiles 11. 2 Click STM Port Profile. The sub menu items are listed.1 Viewing STM port profiles The following are the steps to view STM profiles. 3 Click the profile name link in the View column to view its details.136 Profiles 11. The corresponding port profile page is displayed. STM port profile is not provisionable.2.2 STM Port Profiles There are two STM port profiles provided by default—Internal NNI and External NNI. External NNI – The External NNI profile indicates preferences between different management domains. In the STM port profile menu. Step Action 1 Click Profiles in the navigation menu. User Interface Guide Version 1. 11.2 Editing STM port profiles The following are the steps to edit STM port profiles. Profiles 137 Table 11-1 describes the fields on the View STM Port Profile page. Edit Click to edit the STM Port profile. 6 Click Accept Valid Modifications. Table 11-1 Fields on the View STM Port Profile page Field Description View Click the profile name link to view the profile details. 5 Click Submit. The View STM Port Profile page is displayed. 3 Click edit link in the Edit column for the profile to be edited. Step Action 1 Click Profiles in the navigation menu. A confirmation page is displayed.2.0 . Profile name Displays the profile name. The corresponding Edit port profile page is displayed. The sub menu items are listed. 4 Make changes referring to Table 11-2. A “Successfully Modified” message is displayed. 2 Click STM Port Profile. 138 Profiles Table 11-2 gives the default and acceptable values for the configurable STM profile parameters. Internal NNI is selected External-NNI when External NNI is selected Terminating and Mask TIM • Mask TIM UnProtected TU Alarm • Suppress TIM Profile • Mask all except LOP • Mask all Terminating and Protected Mask TIM • Mask TIM TU Alarm Profile • Suppress TIM • Mask all except LOP • Mask all Passthrough and Mask all except LOP • Mask TIM UnProtected TU Alarm • Suppress TIM Profile • Mask all except LOP • Mask all Passthrough and Protected Mask all except LOP • Mask TIM TU Alarm Profile • Suppress TIM • Mask all except LOP • Mask all Terminating and Mask TIM • Mask TIM UnProtected AU Alarm • Suppress TIM Profile • Mask all except LOP • Mask all TJ100CPr4 . Table 11-2 Default and acceptable values for the configurable STM profile parameters Parameter Default value Accepted values Profile Name Internal-NNI when Enter a profile name. User Interface Guide Version 1. 2 Click Path Alarm Profiles. The sub menu items are listed.1 Viewing path alarm profiles The following are the steps to view path alarm profiles. The View Path Alarm Profile page is displayed with a table listing all the profiles. you can • view path alarm profiles • provision a new path alarm profile • delete path alarm profiles 11. Profiles 139 Table 11-2 (continued) Default and acceptable values for the configurable STM profile parameters Parameter Default value Accepted values Terminating and Protected Mask TIM • Mask TIM AU Alarm Profile • Suppress TIM • Mask all except LOP • Mask all Passthrough and Mask TIM • Select a Mask TIM UnProtected AU Alarm • Suppress TIM Profile • Mask all except LOP • Mask all Passthrough and Protected Mask TIM • Mask TIM AU Alarm Profile • Suppress TIM • Mask all except LOP • Mask all 11.3.0 .3 Path Alarm Profiles In the Path Alarm Profiles menu. Step Action 1 Click Profiles in the navigation menu. Delete Select the check box(s) to delete the path alarm profile(s). Masked Alarms List Displays a list of masked alarms.140 Profiles Table 11-3 describes the fields on the View Path Alarm Profile page. no On Signal Label Mismatch (SLM). Reports the UNEQ alarm and also transmits a Downstream AIS downstream AIS. TJ100CPr4 . Report TIM. Supress SLM The SLM alarm is reported in the supressed alarm page. but no downstream AIS is sent. Ignore SLM No action is taken on SLM. Table 11-3 Fields on the View Path Alarm Profile page Field Description Profile Name Displays the profile name. Supress TIM Reports the TIM alarm. Traffic is affected. Downstream AIS Reports PLM alarm and sends AIS downstream (traffic affecting) on SLM. Report UNEQ. UNEQ Signal Label Report UNEQ. Reports the TIM alarm and also transmits a Downstream AIS downstream AIS so that traffic transmission is affected. Downstream AIS Ignore TIM No alarm is reported or traffic affecting action is taken on TIM. TIM Action Report TIM. Reports the UNEQ alarm without affecting traffic. There are no traffic affecting alarms. PLM alarm is Mismatch Action downstream AIS reported. Signal Label Report SLM. but in the suppressed alarm page. Supress UNEQ Reports the UNEQ alarm in the suppressed alarm page. and there are no traffic affecting alarms. no Reports the TIM alarm without affecting traffic. Action no Downstream AIS Ignore UNEQ No alarm is reported or traffic affecting action is taken on an UNEQ. 5 Click Create. 4 Enter values referring to Table 11-4. Profiles 141 11. TIM Action Suppress TIM • Suppress TIM • Ignore TIM • Report TIM. 2 Click Path Alarm Profiles. The profile name can be a set of alpha. 6 Click Yes. Enter a profile name. No downstream AIS • Downstream AIS on TIM User Interface Guide Version 1. 3 Click Provision a new Path Alarm Profile link.0 . numeric or alphanumeric characters. Table 11-4 lists the default and acceptable values for the configurable path alarm profiles.3.2 Provisioning path alarm profile The following are the steps to provision a new path alarm profile. Table 11-4 Default and acceptable values for the configurable path alarm profile parameters Parameter Default value Accepted values Profile Name . The sub menu items are listed. The View Path Alarm Profiles page is displayed with a table listing all the profiles. A “Successfully Created” message is displayed. The Provision New Path Alarm Profile page is displayed. Step Action 1 Click Profiles in the navigation menu. A confirmation page is displayed. • Alarm Indication Signal • Remote Defect Indication • Loss Of Pointer • Signal Degrade • Signal Fail TJ100CPr4 . No • Suppress UNEQ downstream AIS • Ignore UNEQ • Report UNEQ. No downstream AIS • Downstream AIS on UNEQ Select Alarms for Masking . No • Suppress SLM Action downstream AIS • Ignore SLM • Report SLM.142 Profiles Table 11-4 (continued) Default and acceptable values for the configurable path alarm profile parameters Parameter Default value Accepted values Signal Label Mismatch Report SLM. No downstream AIS • Downstream AIS on SLM UNEQ Signal Label Action Report UNEQ. Select one or more alarms for masking by selecting the check boxes. Default path alarm profiles cannot be deleted.3 Deleting a path alarm profile The following are the steps to delete path alarm profiles. Note 1: Default path alarm profiles are indicated with an asterisk. Note 2: A path alarm assigned to a AU. 2 Click Path Alarm Profiles. for the path alarm profiles to be deleted. User Interface Guide Version 1. The View Path Alarm Profiles page is displayed with a table listing all the profiles. Step Action 1 Click Profiles in the navigation menu.3. The sub menu items are listed. TU or STM cannot be deleted. 4 Click Delete. 5 Click Confirm Delete. A confirmation page is displayed. Profiles 143 11. A “Successfully Deleted” message is displayed.0 . 3 Select the check box in the Delete column. 144 Profiles TJ100CPr4 . 12 Performance 1- 12. If one or more of the parity bits indicate a parity error when the BIP. BIP-8/BIP24xN or BIP-2 byte is checked. Performance Monitoring (PM) is the process that monitors the performance of a facility through performance data collection and analysis without interruptions to service. then only one block error is counted. The functions of performance monitoring include: • collection of PM counts • reporting of PM counts • storage of PM counts • threshold crossing alerts when PM counts exceed their threshold settings The network element monitors performance parameters for working and protection facilities separately. SDH performance monitoring is based on block error measurement. non-intrusive monitoring of transmission quality. User Interface Guide Version 1.1 Introduction Performance Monitoring (PM) refers to the in-service.0 . You can use performance monitoring to section and isolate intermittent faults without interrupting service. • PDH performance monitoring parameters . etc. • 15min intervals – The Interval statistics displays the performance statistics for 32 previous 15-minute intervals.You can monitor the E1/E3 line and path performance attributes • Ethernet performance monitoring parameters • VCG performance monitoring parameters The Reset options are provided to reset the performance counter at the near and far end network elements. facility administered down. • Previous day – The Previous day’s history displays the performance statistics for previous day. reset. Tributary unit and Transceiver performance attributes.You can monitor the performance of Regenerator section-Multiplex section.146 Performance The network element monitors the performance parameters and records the data for • Current Interval – The Current interval statistics displays the performance statistics for the current time interval. The performance monitoring parameters are categorized as follows: • STM performance monitoring parameters . TJ100CPr4 . A value of 0 indicates that there has been an interruption in the performance counter such as a the network element software restarting. previous 15 minutes. current day and the previous day. card being jacked out. path. A value of 1 in the Interval Valid column indicates that there has been no interruption in the performance counter during the 15 minutes. current day or 24 hours interval. The performance statistics of the Regenerator section and the Multiplex section are displayed.2. 12.2 STM Performance Statistics The STM performance statistics gives the statistics on a Regenerator section-Multiplex section. The STM-Interval statistics page is displayed. 3 Click Regenerator Section . Step Action 1 Click Performance in the navigation menu. Tributary unit and Transceiver. Reset Regeneration Section Current Day Statistics. Click STM. 2 Click Current Interval. Click STM. Performance 147 12. path.Multiplex section performance statistics The following are the steps to view performance statistics of the Regenerator-Multiplex section for current interval. User Interface Guide Version 1. 15mins interval. Reset Multiplex Section Current Day (Far End). and previous day. Reset options available under STM-Regenerator Section are—Reset Regeneration Section Current 15 Min Statistics.1 Viewing Regenerator Section . The STM-Current interval statistics page is displayed. Click Previous day. Click STM. Reset Multiplex Section Current Day Statistics. The sub menu items are listed. The STM-Previous day’s history page is displayed. Reset options available under Multiplex section are—Reset Multiplex Section Current 15 Min Statistics. Reset Multiplex Section Current 15 Min (Far End).Multiplex section. Click 15min intervals.0 . 148 Performance Table 12-1 describes the Regenerator Section performance parameters when the network element is configured in SDH mode. BBER Displays the background block error ratio in the regenerator section. while 0 indicates the data is not valid. EB Displays the errored blocks in the regenerator section. 1 indicates the data displayed during that interval is valid. Table 12-1 Regenerator section performance parameters Parameter Description ES Displays the errored second in the regenerator section. SEP Displays the severely errored period in the regenerator section. ESR Displays the errored seconds ratio in the regenerator section. UAS Displays the unavailable second in the regenerator section. SESR Displays the severely errored seconds ratio in the regenerator section. SES Displays the severely errored second in the multiplex section. SES Displays the severely errored second in the regenerator section. TJ100CPr4 . Interval Valid Interval Valid is the validity of the interval and the validity of data during that interval in the regenerator section. UAS Displays the unavailable second in the multiplex section. Table 12-2 describes the Multiplex section performance parameters when the network element is configured in SDH mode. BBE Displays the background block errors in the regenerator section. SEPI Displays the severely errored period intensity in the regenerator section. Table 12-2 Multiplex section performance parameters Parameter Description ES Displays the errored second in the multiplex section. Interval Valid Interval Valid is the validity of the interval and the validity of data during that interval in the multiplex section. while 0 indicates the data is not valid. Far End Interval Valid Displays the validity of data during that interval at far end in the multiplex section.0 . while 0 indicates the data is not valid. SEP-FE Displays the severely errored period at far end in the multiplex section. ESR Displays the errored seconds ratio in the multiplex section. SES-FE Displays the severely errored seconds at far end in the multiplex section. Performance 149 Table 12-2 (continued) Multiplex section performance parameters Parameter Description SEP Displays the severely errored period in the multiplex section. SESR Displays the severely errored seconds ratio in the multiplex section. 1 indicates the data displayed during that interval is valid. EB Displays the errored blocks in the multiplex section. BBE-FE Displays the background blocked errors at far end in the multiplex section. 1 indicates the data displayed during that interval is valid. BBER Displays the background block error ratio in the multiplex section. ES-FE Displays the errored seconds at far end in the multiplex section. UAS-FE Displays the unavailable seconds at far end in the multiplex section. BBE Displays the background block errors in the multiplex section. User Interface Guide Version 1. SEPI Displays the severely errored period intensity in the multiplex section. previous 15 minutes. 3 Click STM. Reset All Current Day Statistics. The STM-Current interval statistics page is displayed. Click STM. The STM-Current interval statistics page is displayed. 4 Click Path. Click Previous day. Reset All Current Day (Far End). Reset AU/STS Current 15 Min (Far End).2 Viewing performance statistics of path The following are the steps to view the performance statistics of path. current day and the previous day. The sub menu items are listed.150 Performance 12. Reset All Current 15 Min (Far End). The STM-Previous day’s history page is displayed. Reset AU/STS Current 15 Min Statistics. The STM-Interval statistics page is displayed.2. Step Action 1 Click Performance in the navigation menu. Reset AU/STS Current Day (Far End) The current interval statistics of the Path is available for the current time interval. The performance statistics of all the AU in the path are listed. Reset AU Current Day Statistics. Click STM. Reset options available for each port are—Reset All Current 15 Min Statistics. Click 15min intervals. Click STM. Note : The AU hyperlink takes you to the corresponding performance statistics. 2 Click Current Interval. TJ100CPr4 . PPJE Displays the positive pointer justification events. 1 indicates the data displayed during that interval is valid. Table 12-3 Path performance parameters Parameter Description ES Displays the errored second. SESR Displays the severely errored seconds ratio. User Interface Guide Version 1. SES Displays the severely errored second. SEPI Displays the severely errored period intensity in the path. Far End Interval Valid Displays the validity of data during that interval at far end. SES-FE Displays the severely errored seconds at far end. ES-FE Displays the errored seconds at far end. NPJE Displays the negative pointer justification events.0 . SEP Displays the severely errored period in the path. Performance 151 Table 12-3 describes the Path performance parameters when the network element is configured in SDH mode. EB Displays the errored blocks. UAS Displays the unavailable second. Interval Valid Interval Valid is the validity of the interval and the validity of data during that interval. while 0 indicates the data is not valid. UAS-FE Displays the unavailable seconds at far end. BBE-FE Displays the background blocked errors at far end. BBE Displays the background block errors. 1 indicates the data displayed during that interval is valid. BBER Displays the background block error ratio. SEP-FE Displays the severely errored period at far end in the path. while 0 indicates the data is not valid. ESR Displays the errored seconds ratio. 152 Performance 12. 2 Click Current Interval. Click Previous day. Click STM. Click STM. Click STM. Click 15min intervals. The STM-Current interval statistics page is displayed. SES Displays the severely errored second. The performance statistics of the Tributary Unit is displayed.3 Viewing performance statistics of the tributary unit The following are the steps to view performance statistics of tributary unit. Note : The current interval statistics of the Tributary Unit is available for the current time interval. TJ100CPr4 . SEP Displays the severely errored period. Reset options available for each TU are—Reset All Current 15 Min Statistics.2. Click the desired TU. UAS Displays the unavailable second. Reset All Current 15 Min (Far End). Table 12-4 Tributary Unit performance parameters Parameter Description ES Displays the errored second. previous 15 minutes. Table 12-4 describes the parameters on the Tributary Unit performance parameters. The sub menu items are listed. The STM-Previous day’s history page is displayed. 3 Click Tributary unit. Reset All Current Day (Far End). Step Action 1 Click Performance in the navigation menu. The STM-Interval statistics page is displayed. Reset All Current Day Statistics. current day and the previous day. Performance 153 Table 12-4 (continued) Tributary Unit performance parameters Parameter Description EB Displays the errored blocks. BBE Displays the background blocked error. ESR Displays the error seconds ratio. SESR Displays the severely error seconds ratio. BBER Displays the background blocked error ratio. SEPI Displays the severely errored period intensity Interval Valid Displays the lower order path interval valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. ES-FE Displays the error seconds at far end. SES-FE Displays the severely error seconds at far end. BBE-FE Displays the background blocked errors at far end. UAS-FE Displays the unavailable seconds at far end. SEP-FE Displays the severely errored period at far end. Far End Interval Valid Displays the validity of data during that interval at far end. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. 12.2.4 Viewing the performance statistics of the transceiver The following are the steps to view the performance statistics of transceiver. Step Action 1 Click Performance in the navigation menu. The sub menu items are listed. 2 Click Current Interval. Click STM. The STM-Current interval statistics page is displayed. User Interface Guide Version 1.0 154 Performance Click 15min intervals. Click STM. The STM-Interval statistics page is displayed. Click Previous day. Click STM. The STM-Previous day’s history page is displayed. 3 Click Transceiver. The performance statistics of the transceiver is displayed. Table 12-5 describes the transceiver performance statistics parameters. Table 12-5 Transceiver performance statistics parameters Parameter Description Received Power (dBm) Displays the value of the received power. Transmit Power (dBm) Displays the value of the transmitted power. Laser Bias (mA) Displays the Laser Bias value as received from the device. Laser Voltage (Volts) Displays the Laser Voltage as received from the device. Laser Temperature (degrees Displays the Laser Temperature as received from the device. C) Interval Valid Indicates the validity of the interval. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. Note: ‘Port Admin Status is Down’ message is displayed when the Admin status of the port is down. TJ100CPr4 Performance 155 12.3 PDH Performance Statistics The PDH performance statistics gives the line and path performance statistics. 12.3.1 Viewing PDH performance statistics The following are the steps to view PDH performance statistics. Step Action 1 Click Performance in the navigation menu. The sub menu items are listed. 2 Click Current Interval. Click E1 or E3. The E1 or E3-Current interval statistics page is displayed. Click 15min intervals. Click E1 or E3 to view 15min interval for E1/E3. The E1 or E3-interval statistics page is displayed. Click Previous day. Click E1 or E3 to view performance history of the previous day. The E1 or E3-Previous day’s history page is displayed. 3 Click the desired PDH port. The performance statistics of the PDH port chosen is displayed. Reset options available for each PDH interfaces are—Reset Current 15 Min Statistics at Line Level, Reset Current Day Statistics at Line Level, Reset Current 15 Min at Path Level, Reset Current Day at Path Level. Clicking the Reset All E1/E3/DS3 Current 15 Min Statistics and Reset All E1/E3/DS3 Current Day Statistics link will reset the Current 15 minute statistics and Current day statistics for all the E1/E3/DS3 ports respectively. Note : The frame status of the port is displayed on the performance statistics page. User Interface Guide Version 1.0 156 Performance Table 12-6 describes the E1 Line performance parameters in SDH mode. Table 12-6 E1 line performance parameters Parameter Description CV-L Displays the coding violations occurring on the line. ES-L Errored Seconds Line (ES-L) is a count of the seconds containing one or more anomalies and/or defects on the line. SES-L Displays the severely error seconds. Line Interval Valid Indicates the validity of the interval. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. Table 12-7 describes the E1 path performance parameters, when the network element is configured in SDH mode. Table 12-7 E1 path performance parameters Parameter Description EB-P Displays the errored blocks on the path. BBE-P Displays the background blocked error on the path. ES-P Errored Seconds Path (ES-P) is a count of the seconds containing one or more anomalies and/or defects on the path. SES-P Displays the severely errored seconds on the path. UAS-P Displays the unavailable seconds on the path. Path Interval Valid Indicates if the interval is valid. 1 indicates the data displayed during that interval is valid, while 0 indicates the data is not valid. TJ100CPr4 Line Interval Valid Indicates if interval is valid. when the network element is configured in SDH mode. User Interface Guide Version 1.0 . while 0 indicates the data is not valid. 1 indicates the data displayed during that interval is valid. Table 12-8 E3 line performance parameters Parameter Description CV-L Displays the coding violations occurring on the line. Performance 157 Table 12-8 describes the E3 Line performance parameters. SES-L Displays the severely errored seconds in the line. Path Interval Valid Indicates if the interval is valid. while 0 indicates the data is not valid. 1 indicates the data displayed during that interval is valid. SES-P Displays the severely errored second on the path. Table 12-9 describes the E3 path performance parameters. UAS-P Displays the unavailable second on the path. ES-L Errored Seconds Line (ES-L) is a count of the seconds containing one or more anomalies and/or defects on the line. Table 12-9 E3 path performance parameters Parameter Description ES-P Errored Seconds Path(ES-P) is a count of the seconds containing one or more anomalies and/or defects on the path. 4. Step Action 1 Click Performance in the navigation menu. Click Ethernet.4 Ethernet-Performance Statistics 12. Table 12-10 describes the Ethernet performance statistics parameters. Click 15min intervals. Octets Transmitted Displays the count of octets including padding octets successfully transmitted. 2 Click Current Interval. Click to view 15min interval for Ethernet. TJ100CPr4 . The Ethernet-Previous day’s history page is displayed. ES Displays the Errored Seconds count. Table 12-10 Ethernet performance statistics parameters Parameter Description Frames Transmitted Displays the count of frames successfully transmitted. UAS Displays the Un Available Seconds count.1 Viewing the performance statistics of ethernet interface The following are the steps to view the performance statistics of an ethernet interface. The performance statistics of the selected Ethernet port is displayed. The Ethernet-Interval statistics page is displayed Click Ethernet under Previous day to view performance history of the previous day. 3 Click the desired Ethernet port. The Ethernet-Current interval statistics page is displayed.158 Performance 12. Octets Received Displays the count of octets including padding octets successfully received. SES Displays the Severely Errored Seconds count. Frames Received Displays the count of frames successfully received.The sub menu items are listed. This counter will be incremented in a non-ES/non_SES/non_UAS second. An Idle second is a second in which (frames received+Errored Frames received)=0. 1 indicates the data displayed during that interval is valid. Performance 159 Table 12-10 (continued) Ethernet performance statistics parameters Parameter Description Idle Seconds Displays the idle second in Ethernet client traffic. Ethernet Interval Valid Indicates if the interval is valid. Pause Frames Received Displays the count of the PAUSE control frames passed by the MAC sublayer to the upper layers. User Interface Guide Version 1.0 . FCS Error Bytes Displays the number of bytes whose FCS sequence is not correct. while 0 indicates the data is not valid. Frame Too Long Errors Displays the count of frames received with frame size above the maximum permitted value. FCS Error Frames Displays the count of frames whose FCS sequence is not correct. Frames Received Displays the count of frames successfully received. Frames Dropped Tx Displays the count of frames dropped at the transmitting port. Frames Dropped Rx Displays the count of frames dropped at the receiving port. Frame Too Short Errors Displays the count of frames received with frame size below the minimum permitted value. Pause Frames Transmitted Displays the count of the PAUSE frames passed to the MAC sublayer. 160 Performance 12. while 0 indicates the data is not valid. Click VCG. 1 indicates the data displayed during that interval is valid.5. UAS Displays the count of Un Available Seconds. Table 12-11 describes the parameters on the VCG Interface page. Idle Seconds Displays the count of idle second in VCG traffic. 3 Click the desired VCG. TJ100CPr4 . Click VCG. An idle second is a second in which no data frames or errored frames are received. The VCG-Previous day’s history page is displayed. Click 15min intervals. The performance statistics for of the selected VCG is displayed. Table 12-11 VCG performance statistics parameters Parameter Description VCG Interval valid Indicates whether the interval is valid. SES Displays the count of Severely Error Seconds. ES Displays the count of Errored Seconds. Valid Frames Transmitted Displays the count of valid frames transmitted count. The sub menu items are listed.5 VCG Interface 12. Step Action 1 Click Performance in the navigation menu. 2 Click Current Interval. This counter will be incremented in a non-ES/non-SES/non-UAS second. Click Previous day. The VCG-Current interval statistics page is displayed. Click VCG. The VCG-Interval statistics page is displayed.1 Viewing the performance statistics of a VCG interface The following are the steps to view the performance statistics of a VCG interface. User Interface Guide Version 1. Type Header CRC Errors Displays the GFP type header CRC error count. Valid bytes Received Displays the count of valid bytes Received count. Type Header Single Error Displays the GFP type header single error correction count. Performance 161 Table 12-11 (continued) VCG performance statistics parameters Valid Frames Received Displays the count of valid frames received count.7041) core Corrections header single errors correction count. Corrections Core Header CRC Errors Displays the GFP core header CRC error count. Valid bytes Transmitted Displays the count of valid bytes transmitted count.0 . Core Header Single Error Displays the GFP (Generic Framing Procedure as in G. Payload FCS Errors Displays the payload FCS incorrect count. 162 Performance TJ100CPr4 . USER). Note : Only an ADMIN can add users. Table 13-1 Access groups and corresponding privileges Access Group Privileges USER Has Read-only access to all the management information including configuration. OSPF parameters. User Interface Guide Version 1. All the other users can only change their passwords. configure Router ID and Ethernet IP. resetting performance statistics. OPERATOR Can preform all configuration operations such as port and cross-connect configurations. as well as management parameters such as Ethernet/Router IP Address/Masks. faults and performance. Location.0 . etc. Can configure network element parameters such as network element mode. 13 Security 1- 13. ADMIN Can create and delete logins on the network element. Contact. OPERATOR. etc. delete users or modify user access field.1 Introduction The user interface provides four different user access group (ADMIN. Table 13-1 lists the user access classes with their privileges. loopbacks and all other operations similar to operator. OPERATOR2. perform maintenance operations such as software or configuration backup and restore. acknowledgement of faults. OPERATOR2 Can configure node name. • can be alphabetic/numeric/alphanumeric. • can be alphabetic/numeric/alphanumeric. • is case sensitive. • must be exactly eight characters long. you can • create a new user account • modify an existing user account • modify password of a logged in user • delete an existing user account TJ100CPr4 . • is case sensitive.164 Security Table 13-2 lists the user name and password details for user accounts on the network element. In the Security menu. Table 13-2 User name and password details User name • is unique. • supports special characters except # and space. • cannot be identical to user name CAUTION Risk of Unauthorized access Change the initial password of the default user account on the network element. The default user accounts and passwords are widely known. Password • is unique. • supports up to 32 characters. Password The password (exactly 8 characters long) required for accessing the network element.2 Managing User Accounts 13. User Interface Guide Version 1.2. Step Action 1 Click Security in the navigation menu. Note: Password must be assigned before a user can login to the network element. Security 165 13. 3 Click the Add User button. Table 13-3 Configurable fields for provisioning a new user Field Description User Name Enter the user name. A confirmation page is displayed. The sub menu items are listed. ADMIN. 6 Click Yes. The following are the steps to create a new user account. User lockout Select to allow or deny user lockout access to the user being created. Access Select access type for the user—USER. 5 Click Submit. 4 Enter/Select values referring to Table 13-4.0 . The Manage Users page is displayed. Operator2. The page lists the existing users and the group to which they belong to. 2 Click Manage users. Confirm Password Re-enter the password for confirmation. OPERATOR.1 Creating a new user account Table 13-3 describes the configurable fields for provisioning a new user. The New User page is displayed. A “Successfully Created” message is displayed. The Manage Users page is displayed.166 Security Table 13-4 gives the default and acceptable values for configuring the parameters on the New User page.2. Confirm Password . Same as password. Table 13-4 Default and acceptable values for configuring new user Parameter Default value Acceptable values User Name . Can be a set of alphanumeric characters. Access USER USER OPERATOR OPERATOR2 ADMIN User lockout Allow access Allow access Deny access Password . 2 Click Manage Users. The Modify User page is displayed. Maximum of 32 characters is allowed. 3 Click the hyperlink of the User Name to be modified.2 Modifying an existing user account While modifying a user account. 13. TJ100CPr4 . The sub menu items are listed. you can modify only the following: • user access group • user lockout • password The following are the steps to modify an existing user account. Step Action 1 Click Security in the navigation menu. The page lists existing users and their access group. Can be a set of alphanumeric characters and should be exactly 8 characters long. 0 . Note : For an ADMIN. 3 Enter the new password in the Password field. A “Successfully Modified” message is displayed. Security 167 4 Edit values referring to Table 13-4.2. the ADMIN should click the link in the user name field to change the password. The sub menu items are listed. Re-enter the password in the Confirm Password field.3 Modifying password of a logged in user A user with USER access privilege can only view his account in the Manage users page and is permitted to only change the password of his account. Step Action 1 Click Security in the navigation menu. 13. 2 Click Manage Users. 5 Click Submit. The following are the steps to change the password of a currently logged in user. A “Successfully Modified” message is displayed. The Manage Users page is displayed. 6 Click Accept Valid Modification. 4 Click Submit. The page lists existing users and their access group. User Interface Guide Version 1. A confirmation message is displayed. 2. A confirmation message is displayed.4 Deleting user account Only an administrator has the privilege to delete existing user accounts and his own account. The following are the steps to delete a user account. TJ100CPr4 . The sub menu items are listed. 3 Select the check box in the delete column for the users to be deleted.168 Security 13. The page lists the existing users and the group to which they belong. The Manage Users page is displayed. 4 Click Submit. 2 Click Manage Users. 5 Click Confirm Delete. A “Successfully Deleted” message is displayed. Step Action 1 Click Security in the navigation menu. The maintenance procedures that can be performed are—warm and cold reboot of cards. backup and restore the network element configuration.30 hrs). Note: If Local is set to IST (ahead of GMT by 5. provision loopbacks. 14 Maintenance Operations 1- 14. Performance Day Bin GMT Enables Performance Day Bin Rollover as per GMT rollover timezone Time zone.2 System Settings The System settings menu helps you to set the alarm buzzer and the crash recovery option for the network element. etc. If GMT is selected for day bin rollover. It also allows you to set the time zone for the performance day bin rollover. Performance Day Bin Rollover happens at 05:30:00 IST. Disable Disables the hooter alarm.0 . User Interface Guide Version 1. Table 14-1 describes the fields on the System settings page. restore default settings. 14. Performance Day Bin Rollover happens at 00:00:00 IST. Table 14-1 Fields on the System Settings page Field Description Alarm Buzzer Enable Enables the hooter alarm.1 Introduction This chapter describes the maintenance procedures that can be performed on the network element. Local Enables Performance Day Bin Rollover as per Local Time zone. Step Action 1 Click Maintenance in the navigation menu. 4 Click Submit. the Performance Day Bin Rollover happens at 05:30:00 IST. The System Settings page is displayed.Cold reboot disrupts traffic on the card for the period while the card is rebooting. The sub menu items are listed. Cards can be rebooted in the following two ways: • Warm reboot .170 Maintenance Operations 14. Performance Day Bin Rollover happens at 00:00:00 IST.2.30 hrs). If GMT is selected for day bin rollover. A “Successfully Modified” message is displayed.Warm reboot does not affect traffic on the card. 3 Select values referring to Table 14-2. 14. Table 14-2 Default and acceptable values for the system setting parameters Parameter Default value Acceptable Values Alarm Buzzer Disable • Disable • Enable Performance Day Bin Local • Local rollover timezone • GMT Note: If Local is set to IST (ahead of GMT by 5. 2 Click System Settings.3 Rebooting cards Cards need to be rebooted in case of FPGA upgradation or when alarms are not reported properly on the card.1 Viewing and editing the system settings The following are the steps to view and edit system settings. • Cold reboot . Table 14-2 gives the default and acceptable values for system setting parameters. TJ100CPr4 . Cold reboot is applicable only for the tributary card (TETH02EX). The cold restart mode is a disruptive process in which the traffic is affected during the restart period. The warm restart is a service non-disruptive process in which the traffic is not affected during the restart period. The sub menu items are listed. The sub menu items are listed 2 Click Warm Reboot cards/Cold Reboot cards.4 Restart and download software The Restart and download software menu enables you to restart the network system in two modes—Warm restart and Cold restart and also enables you to upgrade or downgrade software.4. 2 Click Restart and download software.1 Warm/Cold restarting the network element The following are the steps to warm restart a network element. User Interface Guide Version 1. Step Action 1 Click Maintenance in the navigation menu. 4 Click Submit. A “Successfully Modified” message is displayed. The following are the steps to reboot cards. 3 Select the cards to be rebooted in the Warm Reboot/Cold Reboot column. The Reset and load management page is displayed. PXAT21E1 and PXATDS3 cards. 14. The corresponding reboot cards page is displayed.0 . 14. Step Action 1 Click Maintenance in the navigation menu. Maintenance Operations 171 Note : : Warm reboot is applicable only for the PXAT8E1. Directory Enter the name of the directory in which the software binary is stored in the selected machine. The sub menu items are listed.4. 2 Click Restart and download software. Note : A linux system has an inbuilt FTP server.h tm Table 14-3 describes the fields on the Load management page. Table 14-3 Fields on the Load Management page Field Description IP Address Enter the IP address of the Linux PC/Workstation where the software binary is present. The Load management page is displayed. On windows. 3 Click Upgrade load button. TJ100CPr4 .3com. 4 Enter values referring to Table 14-3.com/software/utilities_for_windows_32_bit. 5 Click Submit. The network element is restarted.2 Upgrading software The following are the steps to upgrade software. Filename Enter the filename of the software binary stored in the selected directory that has to be downloaded. A message indicating the progress of upgradation is displayed. Step Action 1 Click Maintenance in the navigation menu. the IIS server available with Windows can be used or any third party server such as 3Com server available at the following URL can be used: http://support. The Reset and load management page is displayed.172 Maintenance Operations 3 Click Warm restart/Cold restart button. 14. A confirmation message to revert to the previous software version is displayed. The sub menu items are listed. Step Action 1 Click Maintenance in the navigation menu. 2 Click Restart and download software. The Reset and load Management page is displayed. Password Enter the password for logging to the system. 14.3 Downgrading software The following are the steps to carry out software downgrade of the network element.0 . The older version of the network element software is uploaded on the network element.4. 3 Click Software load downgrade button. Maintenance Operations 173 Table 14-3 (continued) Fields on the Load Management page Field Description Type Select Software for the load in the drop down menu. User Name Enter the username for the system from where software is to be restored or downloaded. 4 Click Yes. User Interface Guide Version 1. AIS is sent downstream. When a facility loopback is operated on E1 and optical ports. The ports can be configured for facility loopback and terminal loopback. TJ100CPr4 . You can perform facility and terminal loopbacks to test the electrical (E1/E3) and optical (STM-1) connectivity of the network element.174 Maintenance Operations 14.5 Loop-Backs Loopbacks are performed to check the continuity on SDH. Terminal loopback is supported on the Ethernet interfaces. Figure 14-1 Facility Loopback Network element Network element 1 2 Test set 1 Test Set 2 E1 STM-1/OC-3 STM-1/OC-3 E1 Interface E1 Interface E1 Terminal loopback tests the E1/E3 and STM-1 connections. but AIS is not sent downstream. PDH or Ethernet ports. Facility loopback tests traffic connections to and from E1/E3/DS3 port connections on the network element and are generally performed on site. Figure 14-1 shows a facility loopback for testing the E1/E3 port connections at network elements 1 and 2. The exact location of failure can be detected using loopbacks. User Interface Guide Version 1. Figure 14-3 shows the connectivity of the nodes to the NMS server. Application of facility or terminal loopback on the near end port (with respect to NMS server) of a remotely managed node will result in loss of connectivity with the node and the downstream network. while applying loopbacks. But. Maintenance Operations 175 Figure 14-2 shows a terminal loopback for testing E1/E3 connections. the node should be provided with IBC protection or should have a personal placed at the site of the node to avoid loss of connectivity.0 . provisioning loopbacks at the near end and far end ports of Node B and Node C will lead to loss of connectivity to the downstream network. Figure 14-2 Terminal Loopback Network element Network 1 element 2 Test Set E1 E1 Interface STM-1/OC-3 STM-1/OC-3 E1 Interface E1 CAUTION Traffic affecting process Facility loopback and terminal loopback are traffic affecting. Hence. Facility or terminal loopbacks can be created at the near end ports of Node A without loss of connectivity due to presence of Ethernet connectivity. Step Action 1 Click Maintenance in the navigation menu.176 Maintenance Operations Figure 14-3 Terminal Loopback Node A Node B Node C NMS Near Far Near Far Near Far end end Server Ethernet end end end end Connectivity Remotely Downstream Network Managed Nodes Table 14-4 lists the various loopback modes. 4 Click the required STM port. The sub menu items are listed. The corresponding Port maintenance page is displayed. 14. 5 Select the loopback to be provisioned from the Loopback Mode drop down menu. Table 14-4 Loopback modes Loopback modes Description Normal Operation Normal connection is configured. Terminal Loopback Loopback is configured at the egress. 2 Click Loop-Backs. Provisioning loopback for STM ports 3 Click STM. The STM Port loopback page is displayed.5. TJ100CPr4 .1 Performing loopback on STM ports The following are the steps to perform loopback on STM ports. Facility Loopback Loopback is configured at the ingress. A confirmation page is displayed. A confirmation page is displayed. 10 Select the loopback to be provisioned from the Loopback Mode drop down menu. 16 Click Accept Valid Modifications. 11 Click Submit.0 . 7 Click Accept Valid Modifications. A confirmation page is displayed. Performing loopback on Ethernet ports 13 Click Ethernet. 15 Click Submit. A “Successfully Modified” message is displayed. 14 Select the loopback to be provisioned from the Loopback Mode drop down menu. The Ethernet Port loopback page is displayed. 12 Click Accept Valid Modifications. User Interface Guide Version 1. A “Successfully Modified” message is displayed. The corresponding Port maintenance page is displayed. A “Successfully Modified” message is displayed Performing loopback on PDH ports 8 Click PDH. 9 Click the required PDH port. Maintenance Operations 177 6 Click Submit. The PDH Port loopback page is displayed. Table 14-5 describes the fields displayed on the DataBase Changes page. Indicates the nth change in the database.178 Maintenance Operations 14. Click the Next button to view the more recent alarms. The DataBase Changes page is refreshed for every few seconds. Table 14-5 Fields on the DataBase Changes page Field Description Db No. To view the previous changes. The Show all DB Changes link displays all the changes made in a new window. To refresh the page again. click the Previous button. Click the Latest button to view the latest changes made to the database.6 Database Changes The Database Changes menu tracks the changes made to the network element configuration by different users. deletion Object Indicates the object on which the change was effected. modification. To stop the referees. User Information Indicates the user who made the change. Time Indicates the time at which the change was made. click Stop Refresh button. click Start Refresh button (the Start Refresh button is displayed only when the page is not refreshed). By default the DataBase Changes page indicates the most recent changes made. Information Indicates the type of change—Addition. TJ100CPr4 . User Interface Guide Version 1. 14. 2 Click Database Changes. The OSPF monitor enables monitoring the neighbors of a particular node and debugging the routing information for the IBC (In Band Communication). The sub menu items are listed.0 . Maintenance Operations 179 The following are the steps to view changes made to the database. The diagnostic data can be used for analyzing problems arising in any network element. 3 Click OSPF monitor.7.1 Accessing OSPF diagnostics The following are the steps to access the OSPF diagnostics. The DataBase Changes page is displayed. The OSPF parameters can be configured for all the embedded control channel interfaces and for the NMS port to enable routing between these interfaces. The Areas member page of the OSPF protocol is displayed on the right pane. Step Action 1 Click Maintenance in the navigation menu. System diagnostics data comprises log files and dump files which provide information on faults. 2 Click Diagnostics.7 Diagnostics The Diagnostics menu enables the user to view the system diagnostics and the OSPF related information. Refer to Table 14-5 for information on the fields displayed on the page 14. The sub menu items are listed. Step Action 1 Click Maintenance in the navigation menu. which is a 32-bit number identifying the area. Advertisement) Xsum Displays the checksum on the area database maintained by the node. and a router interface connects to a single area. #Ifcs Displays the number of ECC interfaces which are part of the area. TJ100CPr4 . #LSAs (Link State Displays the total LSAs in the network pertaining to this area. Table 14-6 OSPF area parameters Parameter Description Area Displays the area ID.180 Maintenance Operations The following OSPF protocol members can be accessed in the Diagnostics menu: • Areas • Database • Interfaces • Neighbors • Statistics • LSA expansion • AS externals • Routing table • Opaque-LSAs Area The Area indicates the Open Shortest Path First area to which an attached network belongs. Comments Displays the description of the area capability—transit/stub/demand-capable/no-import. A network belongs to a single area. Each router adjacency also belongs to a single area. The area data structure contains all the information used to run the basic OSPF routing algorithm. Each area maintains its own link-state database. #Routers Displays the number of reachable routers in the area. Table 14-6 describes the OSPF area parameters. Age Displays the age of the LSA in seconds. Different interfaces are eth. Type Indicates the type of the link. Xsum Displays the checksum of the complete contents of the LSA. except the LS age field. hdlcppp. Rtr Displays the OSPF Router ID of the Router originating the LSA. Different interfaces are eth. ecc. User Interface Guide Version 1. Length Displays the size in bytes of the LSA. hdlcppp or ecc. LS ID Displays LS ID. Interfaces The Interfaces member displays the type of physical network interface.0 . Maintenance Operations 181 Database The Database member displays the format and function of the LSA. Table 14-8 OSPF interfaces parameters Parameter Description Phy Displays the name of physical network interface. Adv. Table 14-7 OSPF database parameters Parameter Description LSA Type Displays the format and function of the LSA. Table 14-8 describes the OSPF interfaces parameters. LS Seqno Displays the signed 32-bit integer used to detect old and duplicate LSAs. Addr Displays the address of the interface available. Area Displays the area of the OSPF network to which interface belongs. Table 14-7 describes the OSPF database parameters. Types of links can be • BCast (Broadcast) • P-P (Point-to-Point) State Displays the state of the OSPF process. TJ100CPr4 . ID Displays the OSPF router Id of the neighboring network element. Neighbors The Neighbors member displays the name of the physical network interface. address.182 Maintenance Operations Table 14-8 (continued) OSPF interfaces parameters Parameter Description #Nbr Displays the number of neighbors on the link. router ID and state of the neighbors. Table 14-9 describes the OSPF neighbors parameters. Table 14-9 OSPF-Neighbors parameters Parameter Description Phy Displays the name of Physical network interface. The different interfaces present are: • eth • hdlcppp • ecc Addr Displays the address of the neighboring network element. Cost Displays the metric used to quantify links which the network element has with other network elements. #Adj Displays the number of adjacencies maintained by the network element’s OSPF database. #Req Displays the number of requests received by the network element for a database description over that interface. User Interface Guide Version 1. #DD Displays the number of database descriptor packets being received by the network element. Exchange Indicates that information exchange between the neighbors is underway. 1-Way Indicates traffic transmission is possible only from the network element to its neighbour and not vice versa. #Rxmt Displays the number of retransmissions of database descriptions requested by the neighbors due to errors/defects in the previous transmission.0 . due to some error/defect. 2-Way Indicates that traffic transmission is possible from network element as well as from its neighbour. Full Indicates completion of the OSPF process. Statistics The Statistics member displays the checksum of number of external LSAs received by the network element and also the checksum of the Autonomous System (AS) externals. where the routing information has been completely exchanged with the neighbour. Maintenance Operations 183 Table 14-9 (continued) OSPF-Neighbors parameters Parameter Description State State indicates the state of the OSPF process. MOSPF enabled Displays if the multicast OSPF is enabled or not. Inter-AS multicast Not supported. Table 14-10 OSPF statistics parameters Parameter Description Router ID Displays the 32-bit number assigned to each router running the OSPF protocol. LSA Expansion The LSA Expansion member allows to select the format and function of the LSA. # AS-external-LSAs Displays the number of external LSAs received by the network element. Inter-area multicast Displays if Inter-area multicast is supported or not. In overflow state Displays if the number of external LSAs has exceeded the upper limit. ASEs(Autonomous System Displays the maximum number of AS-external-LSAs in the external) allowed database. #ASEs originated Displays the number of external LSAs originated by the network element.184 Maintenance Operations Table 14-10 describes the OSPF statistics parameters. ASE checksum Displays the checksum of the AS externals. # Areas Displays the number of areas the network element is a part of. #Dijkstras Displays the number of times the dijkstra algorithm run on the LSA database. Ospfd version Displays the version of the OSPF software running in the network element. TJ100CPr4 . # Nbrs in Exchange Displays the number of #Nbrs undergoing a database exchange. LS ID Displays the routing domain that is being described by the LSA. Rtr Displays the OSPF Router ID of the router originating the LSA. User Interface Guide Version 1.0 . Maintenance Operations 185 Table 14-11 describes the parameters on the LSA expansion page. Table 14-11 Parameters on the OSPF-LSA Expansion page Parameter Description Area ID Select the identity of set of networks grouped together by the OSPF. The following formats are available: router-LSA network-LSA summary-LSA ASBR-summary-LSA AS-external-LSA group-membership-LSA LS ID Enter the routing domain that is being described by the LSA. Adv. Xsum Displays the checksum of the complete contents of the LSA. Table 14-12 OSPF-AS-externals parameters Parameter Description LSA Type Displays the format and function of the LSA. LS Type Select the format and function of the LSA. Table 14-12 describes the AS-externals parameters. Adv Rtr Enter the OSPF Router ID of the router originating the LSA. Age Displays the age of the LSA in seconds. AS externals The AS externals member displays the number of LSAs in the database of the Autonomous system. Length Displays the size in bytes of the LSA. LS Seqno Displays the signed 32-bit integer used to detect old and duplicate LSAs. excepting the LS age field. 186 Maintenance Operations Routing Table The Routing Table member displays all the neighboring network element information indicating the number of hops to reach any node. Table 14-13 describes the Routing table parameters. Table 14-13 OSPF-Routing table Parameters Parameter Description Prefix Displays the Prefix for the address. Type Indicates the protocol using which the IP of the neighboring network element is discovered (SPF – Shortest Path First). Cost Displays the metric used to quantify links which the network element has with other network elements. Ifc Displays the Interface. Next-hop Displays the IP address of the next network element through the link. #Paths Displays the number of paths available to the destination network element/network from the source network element. Opaque-LSAs The Opaque-LSA member displays the checksum of the complete contents of the Opaque LSAs. TJ100CPr4 Maintenance Operations 187 Table 14-14 describes the Opaque-LSAs parameters. Table 14-14 OSPF-Opaque-LSAs Parameters Parameter Description Phyint Displays the name of physical network interface. If Address Displays the set of networks grouped together by the OSPF. Area Displays the set of networks grouped together by the Area. LS type Displays the piece of routing domain that is being described by the LSA. LS ID Displays the OSPF Router ID of the router originating the LSA. Adv. Rtr Displays the signed 32-bit integer used to detect old and duplicate LSAs. LS Seqno Displays the checksum of the complete contents of the LSA, except the LS age field. Xsum Displays the size in bytes of the LSA. Length Displays the length of the LSA in seconds. Age Displays the age of the LSA in seconds. 14.7.2 Accessing System diagnostics data System diagnostics data comprises log files and dump files which provide information on faults. The diagnostic data can be used for analyzing problems arising in any network element. The following are the steps to access the system diagnostics data. Step Action 1 Click Maintenance in the navigation menu. The sub menu item are listed. 2 Click Diagnostics. 3 Click System diagnostics. The Collect Debug Data page is displayed. User Interface Guide Version 1.0 188 Maintenance Operations 4 Select the card for which the debug data is to be collected from the Card Name drop down menu. Click the Collect Data. The data is stored as a tar file in the temp folder of your system. Download Debug Data link for downloading the debug data is displayed. 5 Click the Download Debug Data link and select the location where you want to save the data. The debug data is saved as a tar file. Click Clean up data to clear the debug data from the temporary folder. 14.8 Configuration Management The user interface provides options for configuration backup and storing it on a selected server. Backup configuration is used for saving the network element configuration. This command copies the existing snapshot of the configuration and stores it to the server mentioned using the FTP protocol. In case of backup failure, a backup operation failure alarm is raised. Restore configuration is used for restoring the configuration to the network element when the configuration data gets corrupted. This command obtains the configuration, using the FTP protocol from a remote server, performs checks and accepts the configuration if applicable to the network element. In case of failure, a restore failure alarm is raised. Restoring the configuration can be done by either restoring from remote machine via FTP or from the local machine using HTTP. The network element gives an error message for the cause of the failure. The messages may be due to one of the following reasons: • Username, password authentication failure • Unable to reach the server IP address. • Incorrect permissions to transfer file. TJ100CPr4 Maintenance Operations 189 The network element can recover from restoration operation failures due to network unavailability by using FTP timeout of 15 seconds. The network element verifies the validity of the restored configuration. The activation of restored configuration shall be non-service affecting for the unaffected configuration. If the verification fails, the restored configuration is rejected and configuration restore failure alarm is raised. The network element raises an alarm on detecting configuration corruption or version mismatch without affecting traffic. Note : It is recommended to perform a network element database backup on a daily basis. 14.8.1 Taking backup of configuration data The following are the steps to backup the network element configuration data. Step Action 1 Click Maintenance in the navigation menu. The sub menu items are listed. 2 Click Configuration management. 3 Click Backup Configuration. The Backup Configuration page is displayed. 4 Enter values as described in Table 14-15. 5 Click Submit. You are connected to the PC to which you want to back up the configuration data. Create a backup file. Note : The Node Configuration state is displayed at the bottom of the page and is refreshed for every 2 seconds. The Configuration state displayed is the last operation performed with the configuration management. User Interface Guide Version 1.0 3 Click Restore Configuration. Step Action 1 Click Maintenance in the navigation menu. Click Submit.2 Restoring configuration The following are the steps to restore configuration data from a remote server. FTP server is inbuilt.8. The sub menu items are listed. For a Linux system. Table 14-15 Fields on the Backup Configuration page Field Description User Name Enter the username of the system which has the configuration backup. The Restore Configuration page is displayed. 2 Click Configuration management. You are connected to the PC from which you want to restore configuration. 4 Select/Enter values as described in Table 14-16. Password Enter the password of the system which has the configuration backup. (It is an optional field) Directory Enter the directory into which the data has to be copied 14. 5 Click the configuration file.190 Maintenance Operations Table 14-15 describes the fields on the Backup configuration page. a IIS server provided along with windows or any third party server such as 3com server needs to be installed. FTP port (optional) Enter FTP port number. TJ100CPr4 . Note : The remote server should have an FTP server installed on it to carry out the Restore configuration data command. IP Address Enter the IP address of the system where the backup should be created. For a windows system. The configuration is restored on the network element. IP Address Enter the IP address of the PC to be accessed. Table 14-16 describes the fields on the Restore/Backup configuration data page. FTP port (optional) Enter the FTP port number for accessing the remote server. CAUTION Restoration of Configuration Data The restoration of configuration data of a network element is service disruptive. Restoration could be done from a system which has an FTP server. Table 14-16 Fields on the Restore/Backup Configuration Data page Field Description Configuration operation Restore The configuration is restored from local configuration from machine or remote machine.(It is an optional field) Directory Enter the directory where the configuration data file is located. The new configuration data requires backup. User Interface Guide Version 1. local machine Restore The configuration is restored from remote configuration from machine remote machine Username Enter the username of the PC to be accessed. Note 2: The Node Configuration state is displayed at the bottom of the page. Maintenance Operations 191 6 Click Commit for the restored configuration to take effect.0 . Password Enter the password of the PC to be accessed. Note 1: Cold reboot the shelf after committing the configuration. Note 3: A power cycle is necessary after the operation. The factory defaults can be restored only by the ADMIN user. Note 2: The Restore factory default operation brings down existing traffic. The following are the steps to restore factory default settings for the network element. Please attempt the action only if the network element needs to be re-initialized. While restoring the factory defaults. The Restore factory defaults page is displayed. 2 Click Configuration management. event history and performance data are deleted. Step Action 1 Click Maintenance in the navigation menu. TJ100CPr4 . 4 Click Restore factory defaults button. 3 Click Restore factory defaults.8. The sub menu items are listed.192 Maintenance Operations 14. event history and performance data will be deleted on restoring factory default settings. Note 1: All configuration information. all configuration information. The network element is re-initialized.3 Restoring factory default settings The Restore factory defaults command should be used when all configuration data of a node is to be deleted or when the node has to be brought down with the factory default settings. 0 . 15 Acronyms 1- Table 15-1 lists the acronyms used in this chapter. Table 15-1 Acronyms list Acronym Expansion AIS Alarm Indication Signal ALS Automatic Laser Shutdown AU Administrative Unit APS Automatic Protection Switching BBE Background Blocked Error BER Bit Error Rate DCC Data Communication Channel ECC Embedded Channel Communication EMS Element Management System ES Errored Seconds ETC Ethernet Tributary Card GMT Greenwich Mean Time WUI Web User Interface IBC In-Band Communication IP Internet Protocol MAC Medium Access Control MFC Multi-Function Card MSP Multiplex Section Protection User Interface Guide Version 1. 194 Acronyms Table 15-1 (continued) Acronyms list MTU Maximum Transmission Unit NTP Network Time Protocol NMS Network Management System NOC Network Operations Center OSPF Open Shortest Path First PCM Pulse Code Modulation PDH Plesiochronous Digital Hierarchy PSS Processor Sub-System SES Severely Errored Seconds SETG Synchronization Equipment Timing Generator SLM Signal Label Mismatch SNMP Simple Network Management Protocol SQL Structured Query Language SSM Synchronization Status Message STS Synchronous Transport Signals TCA Threshold Crossing Alert TIM Trace Identifier Mismatch TU Tributary Unit TUG Tributary Unit Group VC Virtual Container VCG Virtual Container Group WAN Wide Area Network UDP User Data Protocol UPSR Unidirectional Path Switched Ring URL Universal Resource Locator TJ100CPr4 . 0 .1 Cross Connect Support The following table lists the cross-connect support of the TJ100CPr4. STM-n 4o. 16 Appendix A 1- 16. Table 16-1 Cross Connect support Feature Type Type of Cross-connects AU4 Mapping AU4 (STM-n o. STM-n1e) VC-3 (E3 ADD/DROP) VC12 (E1 ADD/DROP) User Interface Guide Version 1. 196 Appendix A TJ100CPr4 17 Appendix B 1- 17.1 List of Alarms Table 17-1 lists the alarms supported by the TejNES. Table 17-1 List of Alarms Name STM port level alarms Loss of Signal on <STM port> Loss of Frame on <STM port> Out of Frame on <STM port> Alarm Indication signal-Line Remote Defect Indication-Line Trace Identifier Mismatch <STM port> BER Threshold exceeded for Signal Failure <STM port> BER Threshold exceeded for Signal Degrade <STM port> BER Threshold exceeded on Section for Signal Failure <STM port> BER Threshold exceeded on Section for Signal Degrade <STM port> BER Threshold exceeded on Far End line for Signal Failure <STM port> BER Threshold exceeded on Far End Line for Signal Degrade <STM port> Revert to the work port <STM port> SFP Alarms SFP Mismatch SFP Auto Provision Mismatch User Interface Guide Version 1.0 198 Appendix B Table 17-1 (continued) List of Alarms Name SFP missing or removed SFP Failure SFP Unknown STM 1 Alarms – Higher Order Alarms (AU) Loss of VCAT Multiframe Sequence Number Mismatch Differential Delay Exceeded Alarm Indication Signal Remote Defect Indication Loss of Pointer Signal Label Unequipped Trace Identifier Mismatch Path Label Mismatch Signal Degrade Excessive Error Tandem Connection - Remote Error Indication Far End Signal Degrade Far End Excessive Error Tx Loss of Capacity - LCAS Rx Loss of Capacity - LCAS Lockout of protection Forced switch to channel Manual switch to channel Member Not Deskewable-LCAS Persistent CRC errors - LCAS Persistent Unexpected MST-LCAS Revert to the work channel after WTR TimeOut or SF/SD on protect channel Alarms – Lower Order Path (TU) Loss of VCAT Multiframe TJ100CPr4 Appendix B 199 Table 17-1 (continued) List of Alarms Name Sequence Number Mismatch Differential Delay Exceeded Alarm Indication Signal Remote Defect Indication Loss of Pointer Signal Label Unequipped Trace Identifier Mismatch Path Label Mismatch Signal Degrade Excessive Error Far End Signal Degrade Far End Excessive Error Alarm Indication Signal (Terminating) Remote Defect Indication (Terminating) Tx Loss of Capacity - LCAS Rx Loss of Capacity - LCAS Lockout of protection Forced switch to channel Manual switch to channel Member Not Deskewable-LCAS Persistent CRC errors – LCAS Persistent Unexpected MST Revert to the work channel PDH Port Level Alarms Loss of Signal <PDH port> Alarm Indication Signal on Port <PDH port> Loss Of Frame on Port Lockout of protection Forced switch to channel User Interface Guide Version 1.0 LCAS<VCAT Group> Signal Degrade<Ethernet port> Card related alarms Temperature too high<Card> System Reboot<Card> Bad checksum on configuration file<Card> Bad log file<Card> Card missing or removed<Card> Hardware Failure<Card> Program Fault.LCAS<VCAT Group> Inconsistent Sequence Number-LCAS<VCAT Group> Signal Degrade<VCAT Group> Tx Partial Loss of Capacity . Software Failure<Card> EEPROM Failure<Card> TJ100CPr4 .Link Integrity<Ethernet port> Excessive Error Ratio<Ethernet port> LCAS Mode Mismatch<VCAT Group> Rx Partial Loss of Capacity .200 Appendix B Table 17-1 (continued) List of Alarms Name Manual switch to channel Revert to the work channel Ethernet related Alarms Link Down<Ethernet port> Loss of Alignment<VCAT Group> Link Integrity on<Ethernet port> Differential Delay exceeded<VCAT Group> Tx Total Loss of Capacity .LCAS<VCAT Group> Rx Total Loss of Capacity<VCAT Group> Excessive Error Ratio<VCAT Group> Extended Header Mismatch<VCAT Group> Auto Negotiation Failed<Ethernet port> Forced Down . 0 . Appendix B 201 Table 17-1 (continued) List of Alarms Name Card jacked out<Shelf> System clock in holdover mode<Shelf> Derived Voltage Underload<Power supply Card> Input Voltage Overload on PSU Card< Power supply Card > Input Voltage Underload on PSU Card< Power supply Card > Switched off/No Input Voltage< Power supply Card> Onboard voltage generation lower threshold crossed<Card> Onboard voltage generation upper threshold crossed<Card> Input Voltage Overload on PSU Card <Card Voltage Monitor> Input Voltage Underload on PSU Card<Card Voltage Monitor> File system almost full <Card> Software Downloading<Card> SW version mismatch<Card> Config out of sync<Card> Redundant pair communication failure<Card> Bus Error<Card> Config Downloading<Card> Software Committing<Card> Software Download Failed<Card> Memory Usage exceeded threshold<Card> Inter Card Communication failure<Card> Configuration File Not Found<Card> Uploading Config<Card> Timing Generation Entry to FreeRun<Shelf> Timing Synchronization Related Alarms System clock in holdover mode System clock in internal mode system primary timing reference failed system secondary timing reference failed User Interface Guide Version 1. 202 Appendix B Table 17-1 (continued) List of Alarms Name Timing reference failed Secondary reference out of range <Synchronization> Primary reference clock PPM out of range Start of Unavailability Period<Port> End of Unavailability Period<Port> Start of Unavailability Period<Channel> End of Unavailability Period<Channel> TU Sequence Indicator Mismatch<Connection> Loss of Multiframe Alignment Signal<Connection> Loss of Capacity<Connection> LAN Port Down<Network Interface> DCN Failure<Network Interface> Transmitted Power lower threshold crossed<Port> Transmitted Power upper threshold crossed<Port> Laser Bias voltage lower threshold crossed<Port> Laser Bias voltage upper threshold crossed<Port> Received Power lower threshold crossed<Port> Received Power upper threshold crossed<Port> Laser temperature high threshold crossed<Port> Laser temperature low threshold crossed<Port> Laser supply voltage high threshold crossed<Port> Laser supply voltage low threshold crossed<Port> Amplifier Loss of Input Power Amplifier Output Failure Pump bias current reached maximum value Pump temperature out of range Amplifier Output Failure Pump bias current reached maximum value Pump temperature out of range TJ100CPr4 . 0 . Appendix B 203 Table 17-1 (continued) List of Alarms Name Circuit Related Alarms Traffic on circuit is down<Circuit> Provisioning in progress<Circuit> Unprovisioning in progress<Circuit> Traffic on circuit is degraded<Circuit> User Interface Guide Version 1. 204 Appendix B TJ100CPr4 . Step Action 1 Download a suitable server from the following location: http://support.zip format. The 3com server is needed for upgrading or downgrading the software version on the network element. 18 Appendix C 1- This chapter describes the procedure for installing and configuring the 3com server.0 .htm The downloaded file is in .1 Installing 3Com server The following are the steps to install the 3Com server. 18.1. 2 Extract the file. Note : The procedures and the screenshots in this appendix are for Version 1.007 of the 3Com server. User Interface Guide Version 1.com/software/utilities_for_windows_3 2_bit.3com. 4 Click Next in the Welcome dialog box.206 Appendix C 3 Click the SETUP application file to install the server. The Software License Agreement is displayed. TJ100CPr4 . The installation wizard is displayed. 6 Click Browse to change the default location of the installation files.0 . User Interface Guide Version 1. Appendix C 207 5 Click Yes. The Choose Destination Location dialog box is displayed. 8 Click Finish. The Setup Complete dialog box is displayed.208 Appendix C Click Next to proceed with the installation. The Select Program Folder dialog box is displayed. TJ100CPr4 . 7 Click Next. The 3Com server is installed in your system. click the FTP icon .0 . Step Action 1 From the Program menu. To turn ON/OFF the FTP server. User Interface Guide Version 1. The ON/OFF status of the FTP server is indicated in the status bar. The 3CServer application window is opened. Appendix C 209 18. click 3CServer.2 Configuring user in the 3Com server The following are the steps to configure users on the 3Com server. Note : To upload or download software. the FTP server should be turned ON. TJ100CPr4 . The 3CServer Configuration dialog box is displayed. 3 Click the FTP Configuration tab.210 Appendix C 2 Click the SETUP icon . 4 Click Browse to define the location for downloading and uploading files. The User List dialog box is displayed. Appendix C 211 5 Click Edit User Profile/Security List. User Interface Guide Version 1.0 . 6 Enter the name of the user in the User Name text box. 8 Enter password in the User Password text box. TJ100CPr4 . The User List dialog box is displayed. 10 Select the operations the user can perform from the “This user can” section. 9 Re-enter the password in Repeat: password to verify(6-8 chars) text box and select a location for the user to upload/download files.11 to add more users. 13 Repeat steps 3 .212 Appendix C 7 Click Add User. The User Information dialog box is displayed. 12 Click Done. 11 Click OK. 0 . 43 cross connections F 1WAY 72 2WAY 72 Facilities 55. 138–156 Alarm filters 170–171 Alarm severity 173–174 ECC 143–144 Critical 173. 199 UAS 198. 174 Serial port 154–156 Event history 172–173 PPP 154 Suppressed alarms 169 Terminal Server 154 UDC 154 Static route 148–151 I destination address 150 Input/Output area 14 Inventory 31–35 User Interface Guide Version 1. 199 SES 198. 174 Management channel 144–145 Deferred 173. 174 OSPF 146–148 Minor 173. 92–134 numbering scheme 72 E1/DS1/E3/DS3 ports 113–119 protected 72 Ethernet ports 119 unprotected 72 EFM 252–253 Cross-connect 55 STM ports 92–111 VCG 119. 199 C Environmental Alarm Input 55. 174 Proxy ARP 151–154 Warning 173. 213 Index 1- A E advertise route 150 E1 performance Alarm area 14 interval Valid 198. 125–134 cross-connections 72–79 LCAS 130–132 Faults 167–173 D Active alarms 167–168 DCN 55. 88–89 Connections (SNCP) 39. 174 Network interface 139–141 Major 173. 193 TJ100CPr4 .214 Index M Trunks 137–138 next hop 150 Maintenance 211–236 Backup configuration 232 NMS 10 Cold reboot 212 Node Configuration 15 Cold restart 217 Diagnostics 223 OSPF diagnostics 224 O Area 224 offset 27 AS externals 229 Other Time Zone 24–27 Database 225 Overhead Tunnel 55. 193 Neighbour information 135–137 ES-FE 192. 191 N path 193 BBE 192 Navigation Menu 14 BBE-FE 193 Network Adjacency 135–137 EB 192 Auto-discovery 135 ES 192. 190 UAS-FE 190. 193 software downgrade 219 ES 189. 191 multiplex section SESR 189 SES 189. 190 Maintenance Operations 211 SES-FE 190. 191 Upgrade software 217 ESR 189 Warm reboot 212 far end Interval valid 191 Warm restart 217 interval Valid 190 SES 189. 231 Loopbacks 219–223 performance Facility loopback 219–221 multiplex section Terminal loopback 219–221 BBE 189 Restart Options 217 BBE-FE 190 Restore configuration 232 BBER 189 Restore factory defaults 236 EB 189. 190 System settings 211–212 ES-FE 190. 193 NPJE 192. 190 UAS 189. 193 Trunks 136–137 ESR 192 network interface 150 far end interval valid 193 Network Adjacency interval Valid 192. 190. 80–82 Interfaces 225 LSA Expansion 228 Neighbors 226 P Opaque-LSA 230 Performance Routing Table 230 Path 192 Statistics 227 Tributary unit 194 System diagnostics 223. 193 Timing reference 162–166 Regenerator section 188 Section performance 189 Transceiver 195 T Tributary unit 194 Technical Assistance Center 7 STM performance statistics Multiplex section 189 Terminal Server 6 VCG 203 Time 23–29 Pluggable modules 34 time zone 24–26 Profiles 175–183 Timing Manager 39 Path Alarm Profiles 175. 193 STM port profiles 175–177 SES 192. 158–166 Path performance 192. 189 ESR 195 UAS 188 Far End Interval Valid 195 interval Valid 195 SES 194 S SES-FE 195 Security 206 SESR 195 User access group 205 UAS 194 Administrator 205 UAS-FE 195 Operator 205 Performance Monitoring 185–186 Operator2 205 Ethernet 201 User 205 PDH performance 197 User account 206–210 DS1 path performance 199 SFP 34 DS3 path performance 200 shelf 36 E1 path performance 198 Signal degradation 39 E1/DS1 Line performance 198 E3 path performance 199 Signal failure 39 E3/DS3 Line performance 199 SNCP 43–46 STM performance statistics 187 SNMP Traps 55. 193 regenerator section UAS-FE 193 BBE 188 tributary unit BBER 188 BBE 195 EB 188 BBE-FE 195 ES 188. 189 ES 194 SES 188. 189 BBER 195 ESR 188 EB 195 interval valid 188. 193 SESR 192 R UAS 192. Index 215 PPJE 192. 189 ES-FE 195 SESR 188. 89–91 Line performance 190 Synchronization 55. 193 SES-FE 192.0 . 179–183 Title area 13 User Interface Guide Version 1. 216 Index Trib Protection 6 U UPSR 43–46 W WUI 9–14 TJ100CPr4 .
Copyright © 2024 DOKUMEN.SITE Inc.