1646-.pdf

  • Uploaded by: eeeee
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View 1646-.pdf as PDF for free.

More details

  • Words: 33,616
  • Pages: 244
Title page

Alcatel-Lucent 1646 Synchronous Multiplexer (SM) | Release 2.3 User Provisioning Guide 3KC18078ADAATQZZA Issue 1 | June 2013

Legal notice Legal notice

Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright © 2013 Alcatel-Lucent. All rights reserved. Notice

The information in this document is subject to change without notice. Although every effort has been made to make this document as accurate, complete, and clear as possible, Alcatel-Lucent and its predecessors assume no responsibility for any errors that appear in this document. Security Statement

In rare instances, unauthorized individuals make connections to the telecommunications network. In such an event, applicable tariffs require that the customer pay all network charges for traffic. Alcatel-Lucent and its predecessors cannot be responsible for such charges and will not make any allowance or give any credit for charges that result from unauthorized access. Limited warranty

Alcatel-Lucent provides a limited warranty for this product. For more information, consult your local Alcatel-Lucent customer support team. Ordering information

To order more copies of this document or other Alcatel-Lucent documents, please access the Online Customer Support (OLCS) (https://support.lucent.com). Information product support

To comment on this information product, go to the Online Comment Form (http://www.alcatel-lucent-info.com/comments/enus/) or email your comments to the Comments Hotline ([email protected]).

Contents

About this document Purpose

......................................................................................................................................................................................... xxv xxv

Intended audience

..................................................................................................................................................................... xxv xxv

How to use this document ...................................................................................................................................................... xxv xxv Signal words ............................................................................................................................................................................. xxvii xxvii Conventions used

................................................................................................................................................................... xxvii xxvii

Related information Technical support How to order

.................................................................................................................................................................. xxviii xxviii

........................................................................................................................................................................... xxviii xxviii

How to comment 1

............................................................................................................................................................... xxvii xxvii

................................................................................................................................................................... xxviii xxviii

Getting Started Overview ...................................................................................................................................................................................... 1-1 1-1 ZIC Functionality ...................................................................................................................................................................... 1-1 1-1

2

System Management Overview ...................................................................................................................................................................................... 2-1 2-1 ZIC overview .............................................................................................................................................................................. 2-2 2-2 Procedure 2-1: Establish ZIC session ................................................................................................................................ 2-3 2-3 ZIC icons and symbols

........................................................................................................................................................... 2-5 2-5

Menus ............................................................................................................................................................................................ 2-6 2-6 Equipment menu

....................................................................................................................................................................... 2-7 2-7

Provider Bridge menu Connection menu

............................................................................................................................................................. 2-8 2-8

...................................................................................................................................................................... 2-8 2-8

.................................................................................................................................................................................................................................... 1646 SM iii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Contents ....................................................................................................................................................................................................................................

Data menu .................................................................................................................................................................................... 2-9 2-9 Communication menu ........................................................................................................................................................... 2-10 2-10 Alarms menu

............................................................................................................................................................................ 2-11 2-11

Protection menu

...................................................................................................................................................................... 2-11 2-11

Synchronization menu .......................................................................................................................................................... 2-12 2-12 System Management menu ................................................................................................................................................. 2-13 2-13 Security menu .......................................................................................................................................................................... 2-14 2-14 Tools menu ................................................................................................................................................................................ 2-15 2-15 Help menu ................................................................................................................................................................................. 2-15 2-15 3

Equipment management Overview ...................................................................................................................................................................................... 3-1 3-1 Procedure 3-1: Configure a board ....................................................................................................................................... 3-1 3-1 Procedure 3-2: Refresh Tree

................................................................................................................................................. 3-5 3-5

Procedure 3-3: System Information 4

................................................................................................................................... 3-5 3-5

Connection TDM Search ................................................................................................................................................................................ 4-1 4-1 Procedure 4-1: Search VCn cross-connection ................................................................................................................ 4-1 4-1 Procedure 4-2: Create Connection ...................................................................................................................................... 4-4 4-4 Procedure 4-3: Ethernet P2P XC ......................................................................................................................................... 4-9 4-9 Procedure 4-4: Ethernet Flow Based Switching

......................................................................................................... 4-11 4-11

Procedure 4-5: Search OverHead connection .............................................................................................................. 4-13 4-13 Procedure 4-6: Create OverHead Connection 5

............................................................................................................ 4-14 4-14

Ethernet Functions Overview ...................................................................................................................................................................................... 5-1 5-1 Procedure 5-1: Traffic descriptor

........................................................................................................................................ 5-2 5-2

Procedure 5-2: Resource Availability ................................................................................................................................ 5-5 5-5 Procedure 5-3: VLAN Profile

.............................................................................................................................................. 5-7 5-7

Procedure 5-4: Create color profile .................................................................................................................................... 5-9 5-9 .................................................................................................................................................................................................................................... 1646 SM iv 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Contents ....................................................................................................................................................................................................................................

Procedure 5-5: Bridge configuration ............................................................................................................................... 5-10 5-10 Procedure 5-6: IGMP management .................................................................................................................................. 5-11 5-11 Procedure 5-7: Global setting

............................................................................................................................................ 5-13 5-13

Procedure 5-8: Create maintenance domain ................................................................................................................. 5-13 5-13 Procedure 5-9: Create maintenance association .......................................................................................................... 5-15 5-15 Procedure 5-10: Search MEP ............................................................................................................................................. 5-17 5-17 Procedure 5-11: Create MEP .............................................................................................................................................. 5-19 5-19 Procedure 5-12: EFM tool ................................................................................................................................................... 5-21 5-21 Procedure 5-13: Configure EFM tool

............................................................................................................................. 5-22 5-22

Procedure 5-14: Create VLAN .......................................................................................................................................... 5-23 5-23 Procedure 5-15: ConfigureVLAN .................................................................................................................................... 5-24 5-24 Procedure 5-16: Dynamic filtering DB

.......................................................................................................................... 5-26 5-26

Procedure 5-17: Configure static unicast filtering

..................................................................................................... 5-27 5-27

Procedure 5-18: Configure static multicast filtering

................................................................................................. 5-28 5-28

Procedure 5-19: Create ERP topology ............................................................................................................................ 5-29 5-29 Procedure 5-20: Create ELP ............................................................................................................................................... 5-36 5-36 6

Data Communication Overview ...................................................................................................................................................................................... 6-1 6-1 DCC Overview ...................................................................................................................................................................................... 6-2 6-2 Procedure 6-1: Network IF .................................................................................................................................................... 6-2 6-2 Procedure 6-2: XC Overhead

............................................................................................................................................... 6-3 6-3

DCN Phys. If Overview ...................................................................................................................................................................................... 6-6 6-6 Procedure 6-3: IP Address

..................................................................................................................................................... 6-6 6-6

Procedure 6-4: LAN management ...................................................................................................................................... 6-7 6-7 IP tunnel management Overview ...................................................................................................................................................................................... 6-8 6-8 .................................................................................................................................................................................................................................... 1646 SM v 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Contents ....................................................................................................................................................................................................................................

Procedure 6-5: Administer IP tunnel .................................................................................................................................. 6-8 6-8 Procedure 6-6: Configure IP tunnel .................................................................................................................................... 6-9 6-9 Network domain Overview

................................................................................................................................................................................... 6-11 6-11

Procedure 6-7: Configure IP route

................................................................................................................................... 6-11 6-11

Procedure 6-8: OSI management ...................................................................................................................................... 6-14 6-14 Management Access Control Overview

................................................................................................................................................................................... 6-17 6-17

Procedure 6-9: Create MAC Access Control List (ACL) ........................................................................................ 6-17 6-17 7

Alarm Management Overview ...................................................................................................................................................................................... 7-1 7-1 Procedure 7-1: TCA Profiles ................................................................................................................................................. 7-2 7-2 Procedure 7-2: Create ASAP ................................................................................................................................................ 7-3 7-3 Procedure 7-3: Modify or Delete an ASAP profile

...................................................................................................... 7-8 7-8

Procedure 7-4: ALM cutoff ................................................................................................................................................... 7-9 7-9 Procedure 7-5: ALM resynch. ............................................................................................................................................ 7-10 7-10 Procedure 7-6: Condition log ............................................................................................................................................. 7-11 7-11 Procedure 7-7: Housekeeping support ............................................................................................................................ 7-13 7-13 8

Synchronization Overview ...................................................................................................................................................................................... 8-1 8-1 Synchronization menu ............................................................................................................................................................. 8-1 8-1 Procedure 8-1: Modify BITS-0 ............................................................................................................................................ 8-2 8-2 Procedure 8-2: Modify BITS-1 ............................................................................................................................................ 8-4 8-4 Procedure 8-3: Modify BITS-OUT0 .................................................................................................................................. 8-5 8-5 Procedure 8-4: Modify BITS-OUT1 .................................................................................................................................. 8-7 8-7 Procedure 8-5: Administer system timing BITS ............................................................................................................ 8-8 8-8 Synchronization outgoing

................................................................................................................................................... 8-16 8-16

.................................................................................................................................................................................................................................... 1646 SM vi 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Contents ....................................................................................................................................................................................................................................

9

Security Overview ...................................................................................................................................................................................... 9-1 9-1 Procedure 9-1: Change user password

............................................................................................................................. 9-2 9-2

Procedure 9-2: Retrieve user information ........................................................................................................................ 9-3 9-3 Procedure 9-3: Create user account .................................................................................................................................... 9-3 9-3 Procedure 9-4: Change user account

................................................................................................................................. 9-5 9-5

Procedure 9-5: Modify account default settings ............................................................................................................ 9-8 9-8 Procedure 9-6: View current sessions ................................................................................................................................ 9-9 9-9 Procedure 9-7: Modify command privileges ................................................................................................................ 9-10 9-10 Procedure 9-8: Manage audit ............................................................................................................................................. 9-12 9-12 Procedure 9-9: Log settings ................................................................................................................................................ 9-14 9-14 Procedure 9-10: Modify in progress message settings 10

............................................................................................. 9-16 9-16

Provisioning: Detailed level Procedures Overview

................................................................................................................................................................................... 10-1 10-1

Procedure 10-1: Log into the system

.............................................................................................................................. 10-2 10-2

Procedure 10-2: Log out of the system

.......................................................................................................................... 10-3 10-3

Procedure 10-3: Retrieve software version ................................................................................................................... 10-4 10-4 Procedure 10-4: In-Service Upgrade ............................................................................................................................... 10-6 10-6 Procedure 10-5: Initialize and Upgrade with a new release

................................................................................... 10-7 10-7

Procedure 10-6: DB management remote file copy ................................................................................................... 10-7 10-7 Procedure 10-7: DB management cancel remote file copy .................................................................................. 10-10 10-10 Procedure 10-8: Network Element management ...................................................................................................... 10-11 10-11 Procedure 10-9: LAC Management

.............................................................................................................................. 10-12 10-12

Procedure 10-10: MAC File Collection ....................................................................................................................... 10-14 10-14 Procedure 10-11: Administer NTP

................................................................................................................................ 10-15 10-15

Procedure 10-12: Network IF .......................................................................................................................................... 10-18 10-18 Procedure 10-13: OSI ULC Report ............................................................................................................................... 10-20 10-20 Procedure 10-14: Create Overhead XC

....................................................................................................................... 10-21 10-21

Procedure 10-15: Create linear MSP ............................................................................................................................ 10-23 10-23 .................................................................................................................................................................................................................................... 1646 SM vii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Contents ....................................................................................................................................................................................................................................

Procedure 10-16: Create MS-SPRing ........................................................................................................................... 10-25 10-25 Procedure 10-17: Create Provider Bridge Service ................................................................................................... 10-27 10-27 Procedure 10-18: LAG management ............................................................................................................................ 10-29 10-29 Procedure 10-19: IGMP Snooping

................................................................................................................................ 10-34 10-34

Procedure 10-20: Remove LAG member

................................................................................................................... 10-34 10-34

Procedure 10-21: Retrieve system information

........................................................................................................ 10-39 10-39

Procedure 10-22: Create IP route ................................................................................................................................... 10-40 10-40 Procedure 10-23: Create IP tunnel ................................................................................................................................. 10-42 10-42 Procedure 10-24: NE TL1 Parameter ........................................................................................................................... 10-44 10-44 Procedure 10-25: TL1 console ........................................................................................................................................ 10-44 10-44 Procedure 10-26: Create FTP Server Configuration ............................................................................................... 10-48 10-48 Glossary Index

.................................................................................................................................................................................................................................... 1646 SM viii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of tables

1

Signal words for hazard severity

...................................................................................................................... xxvii

3-1

Board xx panel parameters ..................................................................................................................................... 3-2

3-2

Board xx Restart panel parameters

3-3

System Information parameters ............................................................................................................................ 3-5

4-1

Connection panel

4-2

Create Connection panel

4-3

P2P data connection panel parameters

............................................................................................................ 4-10

4-4

P2P data connection panel parameters

............................................................................................................ 4-12

4-5

OverHead Connection parameters

5-1

Traffic descriptor panel parameters ..................................................................................................................... 5-2

5-2

Service type parameters

5-3

Resource Management Pool parameters

5-4

VLAN Protocol Profile panel parameters ......................................................................................................... 5-8

5-5

Color Profile panel parameters

5-6

Maintenance Domain panel parameters .......................................................................................................... 5-14

5-7

Maintenance Domain panel parameters .......................................................................................................... 5-15

5-8

Create Maintenance Association panel parameters

5-9

Maintenance Domain panel parameters .......................................................................................................... 5-18

5-10

Maintenance Domain panel parameters .......................................................................................................... 5-19

5-11

Create MEP panel parameters

5-12

Modify VLAN parameters ................................................................................................................................... 5-25

5-13

Static Unicast Filtering Entry parameters

..................................................................................................................... 3-3

....................................................................................................................................................... 4-3 4-3 ......................................................................................................................................... 4-7 4-7

.................................................................................................................... 4-14

.......................................................................................................................................... 5-3 5-3 ........................................................................................................... 5-6

............................................................................................................................. 5-9

.................................................................................... 5-16

............................................................................................................................ 5-20

...................................................................................................... 5-27

.................................................................................................................................................................................................................................... 1646 SM ix 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of tables ....................................................................................................................................................................................................................................

5-14

Static Multicast Filtering Entry parameters ................................................................................................... 5-28

5-15

ERP topology parameters ..................................................................................................................................... 5-30

5-16

The ERP Protection Group parameters

........................................................................................................... 5-33

5-17

Ethernet Linear Protection parameters

............................................................................................................ 5-37

6-1

Filter by parameters

6-2

IP address of Network Element

6-3

Filter by parameters

6-4

IP tunnel panel parameters

6-5

IP Routing panel parameters

6-6

OSI area panel parameters

6-7

OS Address panel parameters

7-1

Create ASAP parameters ......................................................................................................................................... 7-7 7-7

7-2

Alarm log parameters

7-3

Input points attributes panel parameters

9-1

Create user account panel parameters

9-2

Change User information window

9-3

Current sessions

10-1

Copy remote file panel parameters

10-2

Cancel Copy of Remote File panel parameters .......................................................................................... 10-11

10-3

Lac state panel parameters

10-4

MAC File Collection panel parameters

10-5

NE interface details parameters ....................................................................................................................... 10-19

10-6

NE interface details parameters ....................................................................................................................... 10-24

10-7

NE interface details parameters ....................................................................................................................... 10-26

10-8

Provider Bridge Service

10-9

Link aggregation parameters

.................................................................................................................................................. 6-3 6-3 ............................................................................................................................ 6-4

.................................................................................................................................................. 6-6 6-6 ..................................................................................................................................... 6-8 ............................................................................................................................... 6-12

................................................................................................................................... 6-14 ............................................................................................................................. 6-15

............................................................................................................................................ 7-12 7-12 ......................................................................................................... 7-14

................................................................................................................ 9-4

...................................................................................................................... 9-7

....................................................................................................................................................... 9-10 9-10 ................................................................................................................... 10-9

................................................................................................................................ 10-13 ........................................................................................................ 10-15

..................................................................................................................................... 10-28 ............................................................................................................................ 10-31

10-10 Link Aggregator configuration panel parameters

..................................................................................... 10-33

10-11 System Information panel parameters ........................................................................................................... 10-39 10-12 IP routing parameters

.......................................................................................................................................... 10-41

.................................................................................................................................................................................................................................... 1646 SM x 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of tables ....................................................................................................................................................................................................................................

10-13 NE IP tunnel parameters

.................................................................................................................................... 10-43

10-14 Create FTP server parameters

.......................................................................................................................... 10-49

.................................................................................................................................................................................................................................... 1646 SM xi 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of tables ....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM xii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of figures

2-1

ZIC authentication window

................................................................................................................................... 2-2

2-2

ZIC main window ...................................................................................................................................................... 2-3 2-3

2-3

NE of ZIC Launcher

2-4

ZIC launcher ................................................................................................................................................................ 2-5 2-5

2-5

ZIC icons and symbols

2-6

Equipment menu

2-7

Provider Bridge menu

2-8

Connection menu

2-9

Data menu

2-10

Communication menu

2-11

Alarms menu

2-12

Protection menu

2-13

Synchronization menu ........................................................................................................................................... 2-12

2-14

System Management menu .................................................................................................................................. 2-13

2-15

Security menu ........................................................................................................................................................... 2-14 2-14

2-16

Tools menu

3-1

Rack xx > Shelf xx > Board xx

3-2

Rack xx > Shelf xx > Board xx > Module xx

3-3

System Information

3-4

System Information panel ....................................................................................................................................... 3-6

4-1

TDM search

4-2

TDM create with ENT-CRS

................................................................................................................................................. 2-4 2-4

............................................................................................................................................ 2-6

........................................................................................................................................................ 2-7 2-7 .............................................................................................................................................. 2-8 2-8

....................................................................................................................................................... 2-8 2-8

.................................................................................................................................................................... 2-9 2-9 ........................................................................................................................................... 2-10 2-10

............................................................................................................................................................. 2-11 2-11 ....................................................................................................................................................... 2-11 2-11

................................................................................................................................................................ 2-15 2-15 ............................................................................................................................ 3-2 ................................................................................................. 3-4

.................................................................................................................................................. 3-5 3-5

................................................................................................................................................................. 4-3 4-3 .................................................................................................................................. 4-4

.................................................................................................................................................................................................................................... 1646 SM xiii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of figures ....................................................................................................................................................................................................................................

4-3

TDM create with ENT-CRSPROT ...................................................................................................................... 4-4

4-4

STMnAU4 window

4-5

LOPOOL window

4-6

VC4 list

4-7

Create LOVC12

4-8

Connection Detail ...................................................................................................................................................... 4-7 4-7

4-9

XC mapping ................................................................................................................................................................. 4-8 4-8

4-10

P2P Panel

4-11

P2P data connection panel

4-12

ETS switching

4-13

ETS Switching Service

........................................................................................................................................ 4-12

4-14

OverHead Connection

.......................................................................................................................................... 4-13

4-15

Create OverHead Connection

5-1

Traffic descriptor panel

5-2

Resource Management Pools

5-3

VLAN Profile .............................................................................................................................................................. 5-8 5-8

5-4

Color profile

5-5

Bridge configuration panel

5-6

Create Maintenance Domain panel ................................................................................................................... 5-14

5-7

Maintenance Associations Range panel .......................................................................................................... 5-15

5-8

Create Maintenance Association panel

5-9

MA MEP List Range panel .................................................................................................................................. 5-18

5-10

MEP List Range panel ........................................................................................................................................... 5-19 5-19

5-11

Create MEP panel

5-12

EFM tool

.................................................................................................................................................................... 5-21 5-21

5-13

EFM tool

.................................................................................................................................................................... 5-22 5-22

5-14

VLAN Registration

................................................................................................................................................ 5-23 5-23

5-15

VLAN Registration

................................................................................................................................................ 5-24 5-24

5-16

Modify VLAN .......................................................................................................................................................... 5-25 5-25

.................................................................................................................................................. 4-5

..................................................................................................................................................... 4-6 4-6

......................................................................................................................................................................... 4-6 4-6 ......................................................................................................................................................... 4-7 4-7

...................................................................................................................................................................... 4-9 4-9 ................................................................................................................................... 4-10

.......................................................................................................................................................... 4-11 4-11

............................................................................................................................ 4-14

........................................................................................................................................... 5-2 5-2 ................................................................................................................................ 5-6

................................................................................................................................................................ 5-9 5-9 .................................................................................................................................. 5-11

........................................................................................................... 5-16

................................................................................................................................................... 5-20 5-20

.................................................................................................................................................................................................................................... 1646 SM xiv 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of figures ....................................................................................................................................................................................................................................

5-17

Dynamic filtering database

.................................................................................................................................. 5-26

5-18

Dynamic filter error message .............................................................................................................................. 5-26

5-19

Static Unicast Filtering .......................................................................................................................................... 5-27 5-27

5-20

Static Multicast Filtering

5-21

ERP[ITU-T G.8032]

5-22

Ethernet Ring Protection Topology

5-23

ERP Topology ........................................................................................................................................................... 5-30 5-30

5-24

East/West Ports

5-25

ERP instance

5-26

ERP Protection Group

5-27

ERP topology panel ................................................................................................................................................ 5-33 5-33

5-28

MEPs for East/West ports

5-29

MEP Range ................................................................................................................................................................ 5-35 5-35

5-30

Ethernet Linear Protection

5-31

Ethernet Linear Protection Group

5-32

Create Ethernet Linear Protection Group

5-33

PU interface ............................................................................................................................................................... 5-39 5-39

5-34

VLAN-ID Range

5-35

MD/MA/MEP Range

6-1

DCC Channel

6-2

Overhead Channel Cross Connection

6-3

DCC Channel

6-4

Customer LAN management ................................................................................................................................. 6-7

6-5

Create IP tunnel

6-6

IP route creation ....................................................................................................................................................... 6-12 6-12

6-7

AID Type Selection

6-8

OSI Area

6-9

OS Address

6-10

MAC Access Control List

...................................................................................................................................... 5-28 5-28

............................................................................................................................................. 5-29 .................................................................................................................. 5-29

........................................................................................................................................................ 5-31 5-31

............................................................................................................................................................. 5-32 5-32 ........................................................................................................................................... 5-32

.................................................................................................................................... 5-34

................................................................................................................................... 5-36 ..................................................................................................................... 5-36 ....................................................................................................... 5-37

..................................................................................................................................................... 5-40 5-40 ............................................................................................................................................. 5-41

.............................................................................................................................................................. 6-2 6-2 ................................................................................................................ 6-4

.............................................................................................................................................................. 6-6 6-6

.......................................................................................................................................................... 6-9 6-9

................................................................................................................................................ 6-13 6-13

..................................................................................................................................................................... 6-14 6-14 ................................................................................................................................................................ 6-15 6-15 .................................................................................................................................... 6-17

.................................................................................................................................................................................................................................... 1646 SM xv 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of figures ....................................................................................................................................................................................................................................

6-11

Modify MAC Access Control List

................................................................................................................... 6-18

6-12

Management Access Control Element (ACE)

6-13

Create Access Control Element

6-14

Management Actual Access Control Element (ACE)

7-1

TCA Profile .................................................................................................................................................................. 7-2 7-2

7-2

Search TCA Profiles

7-3

Create TCA Profile .................................................................................................................................................... 7-3 7-3

7-4

ASAP Mng

7-5

ASAP Type ................................................................................................................................................................... 7-4 7-4

7-6

ASAP AID .................................................................................................................................................................... 7-5 7-5

7-7

ASAP AID list

7-8

ASAP AID details ...................................................................................................................................................... 7-6 7-6

7-9

Create ASAP

7-10

Modify ASAP-AID

7-11

Delete ASAP AID

7-12

Alarm cutoff

7-13

Refresh alarms

7-14

Alarm log

7-15

Input Points shelf selection panel ...................................................................................................................... 7-13

7-16

Input points attributes

7-17

Alarms report

7-18

Operate/Release Output Points

8-1

BITS Select shelf panel

8-2

Modify BITS 0

8-3

BITS 1 Select shelf panel

8-4

Modify BITS 1

8-5

Modify BITS OUT Select shelf panel ................................................................................................................ 8-5

8-6

Modify BITS OUT0 panel

8-7

Modify BITS OUT1 Select shelf panel

............................................................................................. 6-19

........................................................................................................................ 6-20 ................................................................................ 6-21

................................................................................................................................................. 7-2 7-2

................................................................................................................................................................... 7-4 7-4

............................................................................................................................................................ 7-5 7-5

.............................................................................................................................................................. 7-6 7-6 ................................................................................................................................................... 7-8

...................................................................................................................................................... 7-9 7-9

.............................................................................................................................................................. 7-10 7-10 .......................................................................................................................................................... 7-11 7-11

................................................................................................................................................................... 7-12 7-12

............................................................................................................................................ 7-14 7-14

............................................................................................................................................................ 7-14 7-14 .......................................................................................................................... 7-15

........................................................................................................................................... 8-2 8-2

........................................................................................................................................................... 8-3 8-3 ....................................................................................................................................... 8-4

........................................................................................................................................................... 8-4 8-4

..................................................................................................................................... 8-6 ............................................................................................................. 8-7

.................................................................................................................................................................................................................................... 1646 SM xvi 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of figures ....................................................................................................................................................................................................................................

8-8

Modify BITS OUT1 panel

..................................................................................................................................... 8-7

8-9

Synchronization panel .............................................................................................................................................. 8-9 8-9

8-10

Retrieve synchronization timing entity

8-11

Modify Synchronization panel

8-12

Operate - Modify synchronization switch ...................................................................................................... 8-12

8-13

Release - Modify synchronization switch

...................................................................................................... 8-13

8-14

Retrieve Synchronization Message panel

...................................................................................................... 8-15

8-15

Search synchronization message results

8-16

Synchronization Outgoing Search

8-17

Modify Synchronization Switch Outgoing Operate

................................................................................... 8-17

8-18

Modify Synchronization Switch Outgoing Release

................................................................................... 8-18

9-1

Change user password

9-2

User information

9-3

Create user account

9-4

Change User information ........................................................................................................................................ 9-6

9-5

Modify account default settings panel

9-6

Current sessions

9-7

Command Access Privileges page

9-8

Modify Command Access Privileges panel ................................................................................................... 9-12

9-9

Retrieve audit log

9-10

Retrieve audit page with results ......................................................................................................................... 9-14

9-11

Modify log attributes

9-12

Modify in progress message settings panel

10-1

ZIC loading

10-2

Logout message screen

10-3

About window

10-4

In-Service Upgrade Status

10-5

Copy remote file panel

10-6

Cancel Copy of Remote File panel

........................................................................................................... 8-10

........................................................................................................................... 8-11

......................................................................................................... 8-15

.................................................................................................................... 8-16

............................................................................................................................................. 9-2

........................................................................................................................................................ 9-3 9-3 ................................................................................................................................................... 9-4 9-4

............................................................................................................... 9-9

......................................................................................................................................................... 9-9 9-9 .................................................................................................................... 9-11

.................................................................................................................................................... 9-13 9-13

............................................................................................................................................. 9-15 9-15 ................................................................................................... 9-17

............................................................................................................................................................... 10-3 10-3 ......................................................................................................................................... 10-4

.......................................................................................................................................................... 10-5 10-5 ................................................................................................................................... 10-6

.......................................................................................................................................... 10-8 10-8 ................................................................................................................ 10-10

.................................................................................................................................................................................................................................... 1646 SM xvii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of figures ....................................................................................................................................................................................................................................

10-7

System configuration ........................................................................................................................................... 10-12

10-8

LAC State Management panel

10-9

MAC File Collection

......................................................................................................................... 10-13

........................................................................................................................................... 10-14 10-14

10-10 NTP Config - with Disabled Server Synchronization

............................................................................. 10-16

10-11 NTP Config - with Enabled Server Synchronization

.............................................................................. 10-17

10-12 NTP Server Address Provision 10-13 DCC Channel

........................................................................................................................ 10-18

......................................................................................................................................................... 10-19 10-19

10-14 DCC channel - filter by

...................................................................................................................................... 10-20

10-15 OSI Routing Configuration

.............................................................................................................................. 10-21

10-16 Overhead channel cross-connection

.............................................................................................................. 10-22

10-17 Overhead channel cross-connection - enter channel ................................................................................ 10-22 10-18 Linear MSP

............................................................................................................................................................. 10-23 10-23

10-19 Linear multiplex section protection provision panel

............................................................................... 10-24

10-20 Multiplex section shared protection provision panel ............................................................................... 10-25 10-21 Provider Bridge Service 10-22 Create Provider Bridge

..................................................................................................................................... 10-27

....................................................................................................................................... 10-28

10-23 Link aggregation management

........................................................................................................................ 10-30

10-24 Link aggregator configuration

......................................................................................................................... 10-32

10-25

..................................................................................................................................................................................... 10-34 10-34

10-26 Two member in one LAG

.................................................................................................................................. 10-35

10-27 Configure LAG selection ................................................................................................................................... 10-36 10-28 Configure LAG ...................................................................................................................................................... 10-37 10-37 10-29 Actor Admin key selection window ............................................................................................................... 10-37 10-30 Configure LAG for 0 Unlink Port

.................................................................................................................. 10-38

10-31 LAG pop up window ........................................................................................................................................... 10-38 10-32 System Information .............................................................................................................................................. 10-39 10-39 10-33 IP Routing Configuration ................................................................................................................................... 10-40 10-34 IP tunnel - network element 10-35 Tools - TL1 console

.............................................................................................................................. 10-43

............................................................................................................................................. 10-45

.................................................................................................................................................................................................................................... 1646 SM xviii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of figures ....................................................................................................................................................................................................................................

10-36 Tools - Accessing TL1 console ........................................................................................................................ 10-46 10-37 Tools - Telnet console

......................................................................................................................................... 10-47

10-38 Tools - TL1 command ......................................................................................................................................... 10-48 10-39 Create FTP server

................................................................................................................................................. 10-49 10-49

.................................................................................................................................................................................................................................... 1646 SM xix 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of figures ....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM xx 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of procedures

2

System Management 2-1

3

4

5

Establish ZIC session

............................................................................................................................................... 2-3 2-3

Equipment management 3-1

Configure a board

3-2

Refresh Tree ................................................................................................................................................................. 3-5 3-5

3-3

System Information

...................................................................................................................................................... 3-1 3-1

.................................................................................................................................................. 3-5 3-5

Connection 4-1

Search VCn cross-connection

4-2

Create Connection

4-3

Ethernet P2P XC

4-4

Ethernet Flow Based Switching ......................................................................................................................... 4-11

4-5

Search OverHead connection

............................................................................................................................. 4-13

4-6

Create OverHead Connection

............................................................................................................................ 4-14

............................................................................................................................... 4-1

..................................................................................................................................................... 4-4 4-4

........................................................................................................................................................ 4-9 4-9

Ethernet Functions 5-1

Traffic descriptor

5-2

Resource Availability

5-3

VLAN Profile .............................................................................................................................................................. 5-7 5-7

5-4

Create color profile

5-5

Bridge configuration

5-6

IGMP management

5-7

Global setting ............................................................................................................................................................ 5-13 5-13

5-8

Create maintenance domain

....................................................................................................................................................... 5-2 5-2 ............................................................................................................................................... 5-5 5-5

................................................................................................................................................... 5-9 5-9 .............................................................................................................................................. 5-10 5-10

................................................................................................................................................. 5-11 5-11

................................................................................................................................ 5-13

.................................................................................................................................................................................................................................... 1646 SM xxi 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of procedures ....................................................................................................................................................................................................................................

6

7

5-9

Create maintenance association

......................................................................................................................... 5-15

5-10

Search MEP ............................................................................................................................................................... 5-17 5-17

5-11

Create MEP

5-12

EFM tool

5-13

Configure EFM tool

5-14

Create VLAN ............................................................................................................................................................ 5-23 5-23

5-15

ConfigureVLAN ...................................................................................................................................................... 5-24 5-24

5-16

Dynamic filtering DB

5-17

Configure static unicast filtering

5-18

Configure static multicast filtering

5-19

Create ERP topology .............................................................................................................................................. 5-29 5-29

5-20

Create ELP ................................................................................................................................................................. 5-36 5-36

............................................................................................................................................................... 5-19 5-19

.................................................................................................................................................................... 5-21 5-21 ............................................................................................................................................... 5-22 5-22

............................................................................................................................................ 5-26 5-26 ....................................................................................................................... 5-27 ................................................................................................................... 5-28

Data Communication 6-1

Network IF

6-2

XC Overhead ............................................................................................................................................................... 6-3 6-3

6-3

IP Address ..................................................................................................................................................................... 6-6 6-6

6-4

LAN management

6-5

Administer IP tunnel ................................................................................................................................................. 6-8 6-8

6-6

Configure IP tunnel

6-7

Configure IP route ................................................................................................................................................... 6-11 6-11

6-8

OSI management

6-9

Create MAC Access Control List (ACL)

................................................................................................................................................................... 6-2 6-2

..................................................................................................................................................... 6-7 6-7

................................................................................................................................................... 6-9 6-9

..................................................................................................................................................... 6-14 6-14 ....................................................................................................... 6-17

Alarm Management 7-1

TCA Profiles ................................................................................................................................................................ 7-2 7-2

7-2

Create ASAP

7-3

Modify or Delete an ASAP profile ...................................................................................................................... 7-8

7-4

ALM cutoff

7-5

ALM resynch. ........................................................................................................................................................... 7-10 7-10

7-6

Condition log

............................................................................................................................................................... 7-3 7-3

.................................................................................................................................................................. 7-9 7-9

............................................................................................................................................................ 7-11 7-11

.................................................................................................................................................................................................................................... 1646 SM xxii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of procedures ....................................................................................................................................................................................................................................

7-7 8

9

10

Housekeeping support

........................................................................................................................................... 7-13

Synchronization 8-1

Modify BITS-0

........................................................................................................................................................... 8-2 8-2

8-2

Modify BITS-1

........................................................................................................................................................... 8-4 8-4

8-3

Modify BITS-OUT0

................................................................................................................................................. 8-5

8-4

Modify BITS-OUT1

................................................................................................................................................. 8-7

8-5

Administer system timing BITS ........................................................................................................................... 8-8

Security 9-1

Change user password

9-2

Retrieve user information

9-3

Create user account

9-4

Change user account ................................................................................................................................................. 9-5 9-5

9-5

Modify account default settings

9-6

View current sessions ............................................................................................................................................... 9-9 9-9

9-7

Modify command privileges

9-8

Manage audit

9-9

Log settings

9-10

Modify in progress message settings

............................................................................................................................................ 9-2 ....................................................................................................................................... 9-3 9-3

................................................................................................................................................... 9-3 9-3

........................................................................................................................... 9-8

............................................................................................................................... 9-10

............................................................................................................................................................ 9-12 9-12

............................................................................................................................................................... 9-14 9-14 ............................................................................................................... 9-16

Provisioning: Detailed level Procedures 10-1

Log into the system

10-2

Log out of the system

10-3

Retrieve software version ..................................................................................................................................... 10-4

10-4

In-Service Upgrade ................................................................................................................................................. 10-6 10-6

10-5

Initialize and Upgrade with a new release

10-6

DB management remote file copy

10-7

DB management cancel remote file copy

10-8

Network Element management ........................................................................................................................ 10-11

10-9

LAC Management

................................................................................................................................................ 10-2 10-2 ............................................................................................................................................ 10-3

..................................................................................................... 10-7

.................................................................................................................... 10-7 .................................................................................................... 10-10

................................................................................................................................................ 10-12 10-12

.................................................................................................................................................................................................................................... 1646 SM xxiii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

List of procedures ....................................................................................................................................................................................................................................

10-10 MAC File Collection 10-11 Administer NTP 10-12 Network IF

........................................................................................................................................... 10-14 10-14

.................................................................................................................................................... 10-15 10-15

.............................................................................................................................................................. 10-18 10-18

10-13 OSI ULC Report

................................................................................................................................................... 10-20 10-20

10-14 Create Overhead XC

........................................................................................................................................... 10-21 10-21

10-15 Create linear MSP

................................................................................................................................................ 10-23 10-23

10-16 Create MS-SPRing

............................................................................................................................................... 10-25 10-25

10-17 Create Provider Bridge Service 10-18 LAG management

....................................................................................................................... 10-27

................................................................................................................................................ 10-29 10-29

10-19 IGMP Snooping ..................................................................................................................................................... 10-34 10-20 Remove LAG member ........................................................................................................................................ 10-34 10-21 Retrieve system information ............................................................................................................................. 10-39 10-22 Create IP route

....................................................................................................................................................... 10-40 10-40

10-23 Create IP tunnel

..................................................................................................................................................... 10-42 10-42

10-24 NE TL1 Parameter 10-25 TL1 console

............................................................................................................................................... 10-44 10-44

............................................................................................................................................................ 10-44 10-44

10-26 Create FTP Server Configuration

................................................................................................................... 10-48

.................................................................................................................................................................................................................................... 1646 SM xxiv 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

About this document About this document

Purpose

This User Provisioning Guide provides the following information about the Alcatel-Lucent 1646 Synchronous Multiplexer, Release 2.3: • • •

Accessing and logging into the Zero Installation Craft (ZIC) terminal Using the Zero Installation Craft (ZIC) terminal. Provisioning, Configuration, Operations and Maintenance, Performance Monitoring, Fault Management.

Intended audience

This User Provisioning Guide is intended primarily for telecommunications technicians and communications network providers. Procedural information in this document is intended primarily for maintenance, operation, and provisioning personnel responsible for operating and maintaining the Alcatel-Lucent 1646 SM. How to use this document

This guide includes descriptive and procedural chapters with supporting information (for example, safety instructions, glossary, and index). See the Contents section to locate specific information. Assumptions This document assumes that users have an understanding of the following: • • •

Basic principles of telecommunication transmission Common telecommunication and system terminology (a glossary is provided in this document to assist you) Test sets and tools used in the telecommunication industry

................................................................................................................................................................................................................................... 1646 SM xxv 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

About this document ....................................................................................................................................................................................................................................

• •

Local operations and functional procedures of the company Personal computer (PC) operation, common PC terminology, and navigational procedures in a windows-style user interface Chapter

“About this document”

Description This chapter •

Describes the guide's purpose, intended audience, and organization



Lists related documentation



Explains how to comment on this document

Chapter 1, “Getting Started”

Contains all the general introduction of the Network Element including its application in the telecommunication network.

Chapter 2, “System Management”

Contains all the description about the menus.

Chapter 3, “Equipment management”

Contains complete provisioning information on the equipment, including the equipment protection, according to the user needs.

Chapter 4, “Connection”

Contains the provisioning procedures for the cross-connection.

Chapter 5, “Ethernet Functions”

Contains procedures necessary to provision Ethernet features.

Chapter 6, “Data Communication”

Contains the procedure related to data communication.

Chapter 7, “Alarm Management”

Contains all information related to alarms.

Chapter 8, “Synchronization”

Contains all the description about synchronization procedures.

Chapter 9, “Security”

Contains all information related to security.

Chapter 10, “Provisioning: Detailed level Procedures”

Contains all other detailed level procedures using the ZIC.

“Glossary”

Defines and explains the following:

Index



Telecommunication terms



Abbreviations



Acronyms

Contains a list of index references

.................................................................................................................................................................................................................................... 1646 SM xxvi 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

About this document ....................................................................................................................................................................................................................................

Signal words

The signal words that identify the hazard severity levels are shown in Table 1, “Signal words for hazard severity” (p. xxvii) Table 1

Signal words for hazard severity

Signal word

Meaning

DANGER

Indicates an extremely hazardous situation which, if not avoided, will result in death or serious injury.

WARNING

Indicates a hazardous situation which, if not avoided, could result in death or serious injury.

CAUTION

Indicates a hazardous situation which, if not avoided, could result in minor or moderate injury.

NOTICE

Indicates a hazardous situation not related to personal injury.

See Alcatel-Lucent 1646 SM Release 2.3 Safety Guide (3KC18083ADAATQZZA) for safety related information. Conventions used

The following conventions are used in this document: • •

This font indicates a document reference. This font indicates buttons, icons, or menu items.

Example: Configuration -> Equipment



This font indicates window names or special emphasis. Example: The Configure Equipment window is displayed.

• •

Blue text indicates hyperlinks (cross-references) to other text in the document or another step in the procedure. Important messages are displayed as follows: Note: This is important information.

Related information

The following table lists the documents included in the Alcatel-Lucent 1646 SM documentation set: Part Number

Title

3KC18077ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Product Information and Planning Guide

Description Provides information on the Product and detailed descriptions of the product specifics.

.................................................................................................................................................................................................................................... 1646 SM xxvii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

About this document ....................................................................................................................................................................................................................................

Part Number

Title

Description

3KC18078ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 User Provisioning Guide

Provides information on provisioning, configuration, operation, performance monitoring and maintenance using the Zero Installation Craft (ZIC) terminal.

3KC18079ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Installation and System Turn-Up Guide

Provides information on product installation and commissioning.

3KC18080ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Maintenance and Trouble-Clearing Guide

Provides information on Fault Management, alarms and clearance procedures.

3KC18082ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 TL1 User Provisioning Guide

Provides information on provisioning, configuration, operation, performance monitoring and maintenance using the TL1 interface in the Zero Installation Craft (ZIC) terminal Interface.

3KC18083ADAATQZZA Alcatel-Lucent 1646 SM Release 2.3 Safety Guide

Provides information on the Safety instructions, precautions, labels and instructions in handling the product.

Technical support

For technical support, contact your local Alcatel-Lucent customer support team. See the Alcatel-Lucent Support web site (http://www.alcatel-lucent.com/support/) for contact information. How to order

To order Alcatel-Lucent documents, contact your local sales representative or use Online Customer Support (OLCS) (http://support.alcatel-lucent.com) How to comment

To comment on this document, go to the Online Comment Form (http://infodoc.alcatellucent.com/comments/) or e-mail your comments to the Comments Hotline ([email protected]).

.................................................................................................................................................................................................................................... 1646 SM xxviii 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

1

Getting Started 1

Overview Purpose

This Chapter introduces the Zero Installation Craft (ZIC) terminal Alcatel-Lucent software and the main functions of the ZIC Menu. The ZIC provides local management of single network element, with an ITU compliant Information Model Interface that manages the Network Element. Contents ZIC Functionality

1-1

ZIC Functionality Purpose

The following is a listing of the functionality of the Zero Installation Craft terminal in managing the NE. System Management

Provides descriptions of the following: • •

System Overview Hierarchical menu



System Functions

Equipment and Board Management

Provides a description of the presentation of the equipment and the hierarchical tree structure. Equipment/Board Management also provides information on: •

Setting, Modifying and Removing Boards



Board Hierarchy

................................................................................................................................................................................................................................... 1646 SM 1-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Getting Started

ZIC Functionality

....................................................................................................................................................................................................................................

• •

Remote Inventory Port Management Port Management permits configuration and viewing of transmission resources at the port level. The following are the Port level configuration menu listing: – Automatic Laser Shutdown – – – – –



MSP protection Loopback management and configuration Single fiber configuration TP Frame Mode Configuration Re-timing

– Ethernet Port Configuration Equipment Protection Management Protection Management comprises of: – Equipment protection switching – Multiple Section Protection

Network Configuration

Provides an overview and description of the Network and an introduction to Provisioning using the ZIC. Data Communication

Provides a description of the Communication ports, functions and a description of traffic. Ethernet functions

Provides descriptions of Ethernet related features and the detailed level provisioning procedures for the same. Synchronization

Provides descriptions of time and alarm Synchronization functions. Fault Management

Provides a description and listing of the Alarms and the alarm management system. Performance Management

Provides a description and procedure on Performance Monitoring and Remote Monitoring functions. Security

Provides descriptions and procedures based on Security Management.

.................................................................................................................................................................................................................................... 1646 SM 1-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Getting Started

ZIC Functionality

....................................................................................................................................................................................................................................

Provisioning

Provides detailed level procedures for the following: •

Accessing the Zero Installation Craft (ZIC) terminal.



Provisioning, Administering and Creation of: – Data Communication – Alarms – – – –

Protection Synchronization System Management Security

.................................................................................................................................................................................................................................... 1646 SM 1-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Getting Started

ZIC Functionality

....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM 1-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

2

System Management 2

Overview Purpose

Provides a description of the Zero Installation Craft (ZIC) terminal system overview and hierarchical menu. Contents ZIC overview

2-2

Procedure 2-1: Establish ZIC session

2-3

ZIC icons and symbols

2-5

Menus

2-6

Equipment menu

2-7

Provider Bridge menu

2-8

Connection menu

2-8

Data menu

2-9

Communication menu

2-10

Alarms menu

2-11

Protection menu

2-11

Synchronization menu

2-12

System Management menu

2-13

Security menu

2-14

Tools menu

2-15

Help menu

2-15

................................................................................................................................................................................................................................... 1646 SM 2-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

ZIC overview

....................................................................................................................................................................................................................................

ZIC overview Overview

The Zero Installation Craft (ZIC) terminal is a project in charge of the local management of single network elements, providing ITU-compliant Information Model Interface to the Network Element. The ZIC can be integrated to products in charge of the management of networks and network elements. The Network Element (NE) provides the web server while the user only needs to start a standard available web browser to access the ZIC application. Figure 2-1 ZIC authentication window

The Authentication dialog window displays the product name and release number. It also contains the following fields: •

User - Specifies a unique user identifier.



Password - Specifies the user login password. According to the specification, it is a

• • •

sequence of case-sensitive alphanumeric characters. Local Time - This check-box allows to select the local PC time. Language - Allows to select the language. Default is English. Login - Allows to login to the home page of the NE.

.................................................................................................................................................................................................................................... 1646 SM 2-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

ZIC overview

....................................................................................................................................................................................................................................

Figure 2-2 ZIC main window

The following are the components of the ZIC: •

Starting from left to right, the Page header contains the company logo, the equipment title, the user ID and the Logout hyperlink.



The Client area is the area in which the user works.



Menu bar is present at the top of a page browser (under the title of the page) and above the client area. They appear automatically along with the page. They contain the titles from which pull down menus and cascading menus are opened. Tree area in the left pane allows the user to select the resources from a list. Click on the NE icon to expand the tree as shown in Figure 2-2, “ZIC main window” (p. 2-3). The Alarms table presents the detailed list of the current alarm.

• •

Procedure 2-1: Establish ZIC session When to use

Use this procedure to establish a Zero Installation Craft (ZIC) terminal session. ...................................................................................................................................................................................................

1

If this is the first usage of ZIC, go to Step 2, otherwise, go to Step 3.

.................................................................................................................................................................................................................................... 1646 SM 2-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Procedure 2-1: Establish ZIC session

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Start the Alcatel-Lucent ZIC Launcher. Click Add from the NE menu and enter the IP address of the NE as shown in the Figure 2-3, “NE of ZIC Launcher” (p. 2-4). Figure 2-3 NE of ZIC Launcher

.................................................................................................................................................................................................................................... 1646 SM 2-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Procedure 2-1: Establish ZIC session

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Start the Alcatel-Lucent ZIC Launcher. From the File menu click Load and the previously saved NE's IP address opens as shown in Figure 2-4, “ZIC launcher” (p. 2-5) and click Open. Figure 2-4 ZIC launcher

...................................................................................................................................................................................................

4

The authentication dialog window opens as shown in Figure 2-1, “ZIC authentication window” (p. 2-2). ...................................................................................................................................................................................................

5

In the authentication dialog box enter the user name and password and click Login or press the Enter key. The ZIC application opens and loads the NE information as shown in Figure 2-2, “ZIC main window” (p. 2-3). E................................................................................................................................................................................................... N D O F S T E P S

ZIC icons and symbols This section displays the icons and symbols as shown in the ZIC application.

.................................................................................................................................................................................................................................... 1646 SM 2-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

ZIC icons and symbols

....................................................................................................................................................................................................................................

Figure 2-5 ZIC icons and symbols

Menus Description

This section describes an important aspect of the user interface. The user constantly has to open Pages, select icons and navigate through the different functionalities of the Zero Installation Craft (ZIC) terminal. A menu consists of a title, that usually identifies the nature of the actions that can be undertaken, and a list of options associated with actions. Menu types can be classified as: •

Menu bars

• • •

Pull-down menus Cascading menus Pop-up menus

.................................................................................................................................................................................................................................... 1646 SM 2-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Menus

....................................................................................................................................................................................................................................

Menu bars

Menu bars present at the top of a page's browser (under the title of the page) and above the client area. They appear automatically along with the page. Pull down menu

A pull-down menu is pulled down from a menu item present in a menu bar. To open a pull-down menu, click on the title of the menu you need to open with the“Select” mouse button. Note: A menu option followed by “...” means that selecting this option opens another view. For example the Open... or Save As... menu options in the File pull-down menu. Cascading menus

Cascading menus are derived from pull-down menus and represent additional options for the pull-down menu item selected. Cascading menus are indicated if the “>” sign follows an option in a pull-down menu. To open a cascading menu, click on the menu option with the “>” sign in the pull-down menu.

Equipment menu This menu allows to manage the equipment configuration. The menu options are shown in the following figure: Figure 2-6 Equipment menu

Refresh Tree - Allows to update the page area tree System Information - Allows to view the system information

.................................................................................................................................................................................................................................... 1646 SM 2-7 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Provider Bridge menu

....................................................................................................................................................................................................................................

Provider Bridge menu This menu allows to manage the Bridge configuration. Figure 2-7 Provider Bridge menu

The menu options are : •

Ethernet Services XC

Connection menu The connection menu allows to manage (provisioning, service type etc.) the client/line traffic. Figure 2-8 Connection menu

The menu options are shown in the following figure : •

TDM Search - Allows to set the SDH service.



TDM Create - Allows to configure the SDH service.



OH XC

- OH Search - Allows to search Overhead Connection. - OH Create - Allows to Create Overhead Connection. •

ETS XC - Allows to set the Point-to-Point cross-connection services.

.................................................................................................................................................................................................................................... 1646 SM 2-8 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Data menu

....................................................................................................................................................................................................................................

Data menu The data menu allows to set the service for Data traffic. The menu options are shown in the following figure: Figure 2-9 Data menu



Traffic descriptor - To set the operation mode.



Resource Avilability - To monitor and to count the amount of dynamic NE resources.



MAC Access Control List - To create access control list.



VLAN Profile - To set the virtual LAN mode.



ASAP list - To show and manage the Alarm Severity Assignment Profile.



Bridge - To create a bridge configuration.



IGMP Management - This displays the details of Board, Router Neighbor Timeouts

and their status • •

Queue Management - This allows management of the queue. OAM Management - This allows operation and maintenance management.

The suboptions are: – • •

OAM Resource Config.

EFM Tool - To manage EFM. Virtual LAN Management - To manage Virtual LAN.



Virtual LAN



DB Filtering

.................................................................................................................................................................................................................................... 1646 SM 2-9 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Communication menu

....................................................................................................................................................................................................................................

Communication menu The communication menu allows to configure and set the external communication for NE management interfaces. The menu options are shown in the following figure: Figure 2-10 Communication menu



DCC - Allows to specifies the reference of DCC Channel (Line or Section).



DCN Physical Interface - Allows to specify the supported Layer 3 (network layer) of

• •

the OSI Data Communication Network (DCN). IP Tunnel - Allows the operator to manage an IP tunnel instance on the NE. Network Domain

– –

Allows the operator to enter (add) a new static IP route in the IP routing table. Allows to instruct the NE to provide routing database information that is supported by network layer of the OSI DCN.



Allows to retrieve a list of all immediate OSC neighbors to the local network element. Allows retrieve the parameters of a configured OSIAREA that the NE is part of.



.................................................................................................................................................................................................................................... 1646 SM 2-10 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Alarms menu

....................................................................................................................................................................................................................................

Alarms menu The alarms menu allows to manage entities yield alarms when they malfunction. The menu options are shown in the following figure: Figure 2-11 Alarms menu

• • • •

TCA Profile - Allows to configure and display of the active threshold crossing alarm

profile (TCA = Threshold Crossing Alarm). ASAP Mng - Allows to configure and display the ASAP (Alarm Severity Assignment Profile). ALM CUTOFF - Allows to silence the office audible alarm indications. ALM Resynch. - Allows to update the alarm database to the current alarm situation.



Condition Log - Allows to collect the alarm history report from the NE.



House Keeping - Allows to manage the input and output points of the shelf.

Protection menu This menu allows the to manage the available protection systems. Figure 2-12 Protection menu

.................................................................................................................................................................................................................................... 1646 SM 2-11 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Protection menu

....................................................................................................................................................................................................................................

The menu options are shown in the following figure: •

Equipment Protection



E1 Equipment Protection



Linear MSP



MS-SPRing



Ethernet Liner Protection

Synchronization menu This menu allows the operator to manage the ports dedicated to BITS (Building Integrated Timing Source) facilities for clock distribution purposes. A BITS output reference is a DS1 signal. Figure 2-13 Synchronization menu

The menu options are : •



Bits



Modify BITS 0



Modify BITS 1



Modify BITS-OUT 0



Modify BITS-OUT 1

Synchornization



Search



Operate



Release



Sync.Message

.................................................................................................................................................................................................................................... 1646 SM 2-12 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Synchronization menu

....................................................................................................................................................................................................................................



Synch.Outgoing

– –

Search



Release

Operate

System Management menu This menu provides options for users and administrators to manage the system. Figure 2-14 System Management menu

The menu options are: •

Initialize and Upgrade



In-Service Upgrade

- Upgrade Status •

DB Management



Data Base

- DB Information •



Remote File



Perform Copy



Cancel Copy

Network Element

.................................................................................................................................................................................................................................... 1646 SM 2-13 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

System Management menu

....................................................................................................................................................................................................................................



Lac

– –

State Default



Manager List



PM Global File



MAC File Collection



Network Time Protocol

Security menu This menu contains the following sub-menu options for user and administrative users. Figure 2-15 Security menu





User Account



Change Password



Information

Administration



Accounts

- Change Account





Current Sessions



Commands Privileges



Audit



Log Settings



IP Message Settings

Logout

.................................................................................................................................................................................................................................... 1646 SM 2-14 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Tools menu

....................................................................................................................................................................................................................................

Tools menu The menu options are shown in the following figure: Figure 2-16 Tools menu

Tools menu allows the operator to open a Telnet console for TL1 commands : • • •

TL1 Console NE TL1 Param FTP Server Configuration

Help menu The menu options are shown in the following figure:

Help menu allows the operator to obtain information about: • •

About (software version) NE TL1 Syntax

.................................................................................................................................................................................................................................... 1646 SM 2-15 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

System Management

Help menu

....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM 2-16 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

3

Equipment management 3

Overview Purpose

Use this chapter to perform equipment provisioning. Contents Procedure 3-1: Configure a board

3-1

Procedure 3-2: Refresh Tree

3-5

Procedure 3-3: System Information

3-5

Procedure 3-1: Configure a board When to use

Use this procedure to configure a board.

................................................................................................................................................................................................................................... 1646 SM 3-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Equipment management

Procedure 3-1: Configure a board

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Rack xx → Shelf xx → Board xx from the tree area. Figure 3-1 Rack xx > Shelf xx > Board xx

...................................................................................................................................................................................................

2

The following table provides description of the Rack xx > Shelf xx > Board xx parameters. Table 3-1

Board xx panel parameters

Parameter

Description

Access Identifier

Specifies the access identifier of the selected board

Current Provisioned Type

Specifies the type of equipment to be provisioned

Alarm Profile

Specifies the alarm profile.

.................................................................................................................................................................................................................................... 1646 SM 3-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Equipment management

Procedure 3-1: Configure a board

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

The following table provides description of the Restart panel parameters. Table 3-2

Board xx Restart panel parameters

Parameter

Description

Access Identifier

Specifies the access identifier of the selected board

Phase

Specifies the reload of dynamic and static data (sw and db if present). Processor is restarted. It is supported by all the Processor-based cards, without affecting the traffic, if the current configuration is in line with the one to be reloaded. For SCC card only COLD reset type is supported in R2.0

...................................................................................................................................................................................................

4

Click Save to save the settings on the page. ...................................................................................................................................................................................................

5

Click View to view the Alarms on the alarms panel. E................................................................................................................................................................................................... N D O F S T E P S

Provision a module ...................................................................................................................................................................................................

1

Click Provision hyperlink to provision the SFP module for the selected board as shown in Figure 3-1, “Rack xx > Shelf xx > Board xx” (p. 3-2).

.................................................................................................................................................................................................................................... 1646 SM 3-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Equipment management

Procedure 3-1: Configure a board

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The following screen appears for the module selected. Figure 3-2 Rack xx > Shelf xx > Board xx > Module xx

...................................................................................................................................................................................................

3

Select the SFP/XFP module from the Provisioned Type drop-down list box. ...................................................................................................................................................................................................

4

Click Save to save the settings, the tree area displays the XFP module provisioned on the selected facility. ...................................................................................................................................................................................................

5

Click Remote Inventory to view the details of the selected module. ...................................................................................................................................................................................................

6

Click Save to save the settings. ...................................................................................................................................................................................................

7

Click View hyperlink displayed under Alarms and Conditions panel to view the alarms/conditions raised by the equipment. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 3-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Equipment management

Procedure 3-2: Refresh Tree

....................................................................................................................................................................................................................................

Procedure 3-2: Refresh Tree When to use

Use this procedure to Refresh the Tree view on the left pane. Procedure ...................................................................................................................................................................................................

1

Select Equipment → Refresh Tree. Result: The tree view on the left is refreshed and any new ports added are displayed. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 3-3: System Information When to use

Use this procedure to view the system information. Procedure ...................................................................................................................................................................................................

1

Select Equipment → System Information. Result: The System Information tab is displayed. Figure 3-3 System Information

Table 3-3

System Information parameters

Parameter

Description

Node Type

Specifies the provisioned Node type.

Software

Specifies the type of equipment to be provisioned

System Type

Specifies the System type.

Release ID

Specifies the Release ID of the software.

Release Date

Specifies the Release date of the software

Matrix Size

Specifies the size of the matrix.

.................................................................................................................................................................................................................................... 1646 SM 3-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Equipment management

Procedure 3-3: System Information

....................................................................................................................................................................................................................................

Table 3-3

System Information parameters

(continued)

Parameter

Description

Status

Specifies the status of software installation.

Region

Specifies the region for which the software is customized.

Provision Mode

Specifies the mode in which the system is provisioned.

User Label

Specifies the user label.

Save

Click to save the settings on the page.

Cancel

Click to undo the changes and return back to previous window.

...................................................................................................................................................................................................

2

Click on the ACTSW link. Result: The System Information panel is displayed. Figure 3-4 System Information panel

E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 3-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

4

Connection 4

TDM Search Purpose

Use this chapter to perform the cross-connection provisioning. Contents Procedure 4-1: Search VCn cross-connection

4-1

Procedure 4-2: Create Connection

4-4

Procedure 4-3: Ethernet P2P XC

4-9

Procedure 4-4: Ethernet Flow Based Switching

4-11

Procedure 4-5: Search OverHead connection

4-13

Procedure 4-6: Create OverHead Connection

4-14

Procedure 4-1: Search VCn cross-connection When to use

Use this procedure to retrieve a VCn cross-connection. Four types of cross connection can be created: • • •

VC44C VC4 VC3



VC12

................................................................................................................................................................................................................................... 1646 SM 4-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-1: Search VCn cross-connection

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Choose specific STM-N optical SFP to configure high order structure.

Note: For VC44C cross-connection, STM-4 and STM-16 are available and for VC4, VC3, and VC12 cross-connection, STM-1, STM-4 and STM-16 are available. ...................................................................................................................................................................................................

2

Select Connection → TDM Search option from the menu bar to view and set the cross-connection parameters for the search criteria

.................................................................................................................................................................................................................................... 1646 SM 4-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-1: Search VCn cross-connection

....................................................................................................................................................................................................................................

The following Connection panel is displayed. Figure 4-1 TDM search

...................................................................................................................................................................................................

3

This panel lists the parameters described in the following table. Table 4-1

Connection panel

Parameters

Description

Retrieve Connection command

The options are:

Filter by Access Identifier Type



(RTRV-CRS) - To retrieve general cross-connections. This removes the VC Type drop-down list box.



(RTRV-CRS-) - To retrieve lower order protected cross-connections.. This option adds the VC Type drop-down list box.



(RTRV-CRSPROT) - To retrieve protected cross-connections. This option removes the VC Type



(RTRV-CRSPROT-) - To retrieve lower order protected cross-connections.. This option adds the VC Type

Allows to filter by Access Identifier Type

...................................................................................................................................................................................................

4

Click Search. The system retrieves the cross-connection details based on the search parameter defined. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 4-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Procedure 4-2: Create Connection Create VCn cross-connection ...................................................................................................................................................................................................

1

Click on the Create hyperlink as shown in Figure 4-1, “TDM search” (p. 4-3) or select Connection → TDM Create from the menu bar. Result: The Create Connection tab is displayed. Figure 4-2 TDM create with ENT-CRS

Figure 4-3 TDM create with ENT-CRSPROT

...................................................................................................................................................................................................

2

Create cross connection between STMnAU4 and LOPOOL.

.................................................................................................................................................................................................................................... 1646 SM 4-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Note: Step 2 to Step 8 is only for LOVC12 and LOVC3. Step 1 is for high order VC4/VC44C. ...................................................................................................................................................................................................

3

To create lower order cross connection (e.g. LOVC12/ LOVC3) set VC4 level cross connection from STMnAU4 XC to Lower Order AID LOPOOL. After VC4 cross connection is set MVC4 AID is returned. Note: For bidirectional service, another VC4 from LOPOOL to STMnAU4 need to be created. The related LOVC12 of this MVC4 channel is used to set LOVC12 to real PDH or VCG port/Channel. ...................................................................................................................................................................................................

4

Select STMnAU4 from From selection button. Result: The From window is displayed. Figure 4-4 STMnAU4 window

...................................................................................................................................................................................................

5

Choose LOPOOL from To selection button.

.................................................................................................................................................................................................................................... 1646 SM 4-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Result: The To window is displayed. Figure 4-5 LOPOOL window

...................................................................................................................................................................................................

6

Click Save to save the configuration. ...................................................................................................................................................................................................

7

Search the Cross connection from ZIC. Result: A new cross connection is found. Figure 4-6 VC4 list

...................................................................................................................................................................................................

8

Create LOVC12 path to PDH/VCG AID.

.................................................................................................................................................................................................................................... 1646 SM 4-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Result: The Create Connection tab is displayed Figure 4-7 Create LOVC12

Figure 4-8 Connection Detail

...................................................................................................................................................................................................

9

This panel lists the parameters described in the following table. Table 4-2

Create Connection panel

Parameters

Description

Enter Command

The options are: •

ENT-CRS



ENT-CRSPROT

VC type is selected using the drop-down list. From

Allows to select the start direction.

To

Allows to select the end point.

Cross Connection Type

Cross Connection Type is 1WAY for ENT-CRS and 1WAYSNCP for ENT-CRSPROT

Revertive

The options are: •

Y- Yes



N - No

Hold Off Time

Values are 0, 100, 300, 500, 700, 1000, 3000, 5000, 10000

Protection Type

The options are: •

SNCN



SNCI

...................................................................................................................................................................................................

10

Click Select hyperlink to select the From and To directions.

.................................................................................................................................................................................................................................... 1646 SM 4-7 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-2: Create Connection

....................................................................................................................................................................................................................................

Result: The following window pops up. Figure 4-9 XC mapping

Solution: Managing a ‘fake’ MVC4 which can be easily mapped to AU4 •

MVC4-1-1-7-1-{1-8} <-> AU4 in slot1

• •

MVC4-1-1-7-1-{9-16} <-> AU4 in slot2 MVC4-1-1-7-1-{17-24} <-> AU4 in slot3

• • •

MVC4-1-1-7-1-{25-32} <-> AU4 in slot4 MVC4-1-1-7-1-{33-40} <-> AU4 in slot5 MVC4-1-1-7-1-{41-48} <-> AU4 in slot6



MVC4-1-1-7-1-{49-64} <-> AU4 in slot7

Impacts: MVC4, MVC4TU3, MVC4TU12 are supported but the AID number is not generated by matrix but fixed with a AU4 number in a slot. ...................................................................................................................................................................................................

11

Click Save to save the settings. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 4-8 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-3: Ethernet P2P XC

....................................................................................................................................................................................................................................

Procedure 4-3: Ethernet P2P XC When to use

Use this procedure to manage the P2P cross-connection. Procedure ...................................................................................................................................................................................................

1

Select Connection → ETS XC → P2P option from the menu bar. Figure 4-10 P2P Panel

...................................................................................................................................................................................................

2

The P2P panel provides the cross-connection search criteria range. ...................................................................................................................................................................................................

3

Click Search to find a service instance defined in the specified range.

.................................................................................................................................................................................................................................... 1646 SM 4-9 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-3: Ethernet P2P XC

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

Click Create to create a new P2P instance. The following screen appears. Figure 4-11 P2P data connection panel

This panel lists the parameters described in the following table: Table 4-3

P2P data connection panel parameters

Parameter

Description

Type

Specifies the type of P2P service

From

Allows to select the source point

To

Allows to select the end point

Service Label

Allows to enter a service label string

...................................................................................................................................................................................................

5

Click Select hyperlink to select the From and To directions. Result: The boards panel is displayed. ...................................................................................................................................................................................................

6

Select the boards that have to be cross-connected by double-clicking on them. Result: The selected boards are displayed in the From and To boxes. ...................................................................................................................................................................................................

7

Click Save & Exit to save the settings and exit from the window. ...................................................................................................................................................................................................

8

Click Save & Continue to save the settings and configure another P2P instance.

.................................................................................................................................................................................................................................... 1646 SM 4-10 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-3: Ethernet P2P XC

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

9

Click Cancel to cancel all the settings and return to the previous window. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 4-4: Ethernet Flow Based Switching When to use

Use this procedure to manage the ETS cross-connection. Procedure ...................................................................................................................................................................................................

1

Select Connection → ETS XC → Flow based Switching option from the menu bar. Result: The ETS switching panel is displayed. Figure 4-12 ETS switching

...................................................................................................................................................................................................

2

Enter the range of XC IDs to be searched and Click Search.

.................................................................................................................................................................................................................................... 1646 SM 4-11 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-4: Ethernet Flow Based Switching

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click Create to create a new ETS Switching Service instance. The following screen appears. Figure 4-13 ETS Switching Service

This panel lists the parameters described in the following table: Table 4-4

P2P data connection panel parameters

Parameter

Description

Type

Specifies the type of switching service

Ingress

Allows to select the source point

Egress

Allows to select the end point

Service Label

Allows to enter a service label string

Traffic descriptor

Allows to select the Traffic Descriptor

Topology Classifier

Allows to select the Topology Classifier

Policing mode

Allows to select the Policing mode

VLAN pop

Allows to select the VLAN pop

VLAN push

Allows to select the VLAN push

...................................................................................................................................................................................................

4

Click Save & Exit to save the settings and exit from the window. ...................................................................................................................................................................................................

5

Click Save & Continue to save the settings and configure another ETS Switching service instance.

.................................................................................................................................................................................................................................... 1646 SM 4-12 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-4: Ethernet Flow Based Switching

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

6

Click Cancel to cancel all the settings and return to the previous window. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 4-5: Search OverHead connection When to use

Use this procedure to retrieve a OverHead connection. ...................................................................................................................................................................................................

1

Select Connection -> OH XC ->OH Search from the menu bar as shown in Figure 4-14, “OverHead Connection ” (p. 4-13). Figure 4-14 OverHead Connection

The following are the parameter description: •

Retrieve Connection command: RTRV-AUX- retrieves the provisioned parameters



for AUX channel functionality. Filter by Access Identifier: Allows to filter by Access Identifier type.

...................................................................................................................................................................................................

2

Click Search. The system retrieves the overhead connection details based on the search parameter defined. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 4-13 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-6: Create OverHead Connection

....................................................................................................................................................................................................................................

Procedure 4-6: Create OverHead Connection Purpose

Use this procedure to configure OverHead connection. ...................................................................................................................................................................................................

1

Select Connection -> OH XC ->OH Create from the menu bar as shown in Figure 4-15, “Create OverHead Connection ” (p. 4-14). Figure 4-15 Create OverHead Connection

Table 4-5, “OverHead Connection parameters” (p. 4-14) provides description of Create OverHead Connection panel parameters: Table 4-5

OverHead Connection parameters

Parameter

Description

Enter Command

ENT-AUX command is used to provision AUX

channel configuration parameters. From

Allows to select the start point.

To

Allows to select the end point.

.................................................................................................................................................................................................................................... 1646 SM 4-14 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-6: Create OverHead Connection

....................................................................................................................................................................................................................................

Table 4-5

OverHead Connection parameters

(continued)

Parameter

Description

Overhead Byte

Correlation Tag, associates input command with its output responses •

S27 - F1 byte, overhead byte postion in

SOH: row=2, col=7. •

S24 - F1 byte, overhead byte postion in

SOH: row=2, col=4. •

S25 - F1 byte, overhead byte postion in

SOH: row=2, col=5. •

S97 - F1 byte, overhead byte postion in

SOH: row=9, col=7. •

S38 - F2 byte, overhead byte postion in

SOH: row=3, col=8. •

S39 - F2 byte, overhead byte postion in

SOH: row=3, col=9. •

S62 - F2 byte, overhead byte postion in

SOH: row=6, col=2. •

S89 - F2 byte, overhead byte postion in

SOH: row=8, col=9.

...................................................................................................................................................................................................

2

Click Select to select the From and To directions. Results: The following window pops up.

.................................................................................................................................................................................................................................... 1646 SM 4-15 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Connection

Procedure 4-6: Create OverHead Connection

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click Save to create a OverHead connection. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 4-16 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

5

Ethernet Functions 5

Overview Purpose

Provides a description of the Ethernet functionality and features supported in the Zero Installation Craft (ZIC) terminal. Contents Procedure 5-1: Traffic descriptor

5-2

Procedure 5-2: Resource Availability

5-5

Procedure 5-3: VLAN Profile

5-7

Procedure 5-4: Create color profile

5-9

Procedure 5-5: Bridge configuration

5-10

Procedure 5-6: IGMP management

5-11

Procedure 5-7: Global setting

5-13

Procedure 5-8: Create maintenance domain

5-13

Procedure 5-9: Create maintenance association

5-15

Procedure 5-10: Search MEP

5-17

Procedure 5-11: Create MEP

5-19

Procedure 5-12: EFM tool

5-21

Procedure 5-13: Configure EFM tool

5-22

Procedure 5-14: Create VLAN

5-23

Procedure 5-15: ConfigureVLAN

5-24

Procedure 5-16: Dynamic filtering DB

5-26

Procedure 5-17: Configure static unicast filtering

5-27

Procedure 5-18: Configure static multicast filtering

5-28

Procedure 5-19: Create ERP topology

5-29

Procedure 5-20: Create ELP

5-36

................................................................................................................................................................................................................................... 1646 SM 5-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................

Procedure 5-1: Traffic descriptor When to use

This procedure is to be used as a guideline for a set of instructions to create, configure, activate and delete a traffic descriptor. A Traffic descriptor is the set of Committed Information Rate (CIR), Committed Burst Size (CBS), Peak Information Rate (PIR), and Peak Burst Size (PBS) parameters used by the System for bandwidth checks related to port bit rate or Virtual Transport bit rate on which tunnels and pseudowires are defined. Main use is metering and policing operations. Create traffic descriptor

Use this procedure to create traffic descriptor: ...................................................................................................................................................................................................

1

From Data menu, Select Traffic descriptor. Result: The traffic Descriptor tab is displayed. ...................................................................................................................................................................................................

2

Click Create hyperlink. Result: The Traffic Descriptor panel is displayed. Figure 5-1 Traffic descriptor panel

Traffic Descriptor panel Table 5-1

Traffic descriptor panel parameters

Parameter

Description

User Label

Indicates the label for Traffic Descriptor.

Service type

Specifies the type of service the traffic. Identifies the used output queue. Queue is specified by specifying the service type.

CIR [Kb/sec]

Committed Information Rate - This is the maximum rate (kb/sec) with high priority guaranteed for the packets delivery.

PIR [Kb/sec]

Peak Information Rate - This is the maximum peak rate allowed (kb/sec).

.................................................................................................................................................................................................................................... 1646 SM 5-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................

Table 5-1

Traffic descriptor panel parameters

(continued)

Parameter

Description

CBS [KBytes]

Committed Burst Size - This is the maximum burst size (byte) with high priority guaranteed for delivery.

PBS [KBytess]

Peak Burst Size - This is the maximum burst rate allowed (byte).

...................................................................................................................................................................................................

3

The Traffic Descriptor tab displays the table that contains different traffic descriptor entries. Table 5-2

Service type parameters

Parameter

Description

Service type

Indicates the Traffic codification, according to international standard conversion: bestEffortService - serves Low priority traffic, which relies on transport

layer protocol to recover from loss and tolerates large delay; for example: E-mail and file transfer applications. Best Effort denotes BW (PIR > CIR = 0 in 100kbps increments), which may or may not be available per network operator’s reservation for Best Effort policy. It may therefore be unavailable under congestion conditions. backGroundService regulatedService - serves Medium priority traffic, which relies on

transport layer protocol to recover from occasional loss and requires moderate delay; for example, client–server applications. Regulated service denotes BW (PIR > CIR >0 in 100 Kbps increments), which may be overbooked per network operator’s overbooking policy. The portion of bandwidth between CIR and PIR (EIR) may therefore be partially available under congestion conditions. Grouped regulatedService1 regulatedService3 regulatedService4 guaranteedService - serves High priority traffic for mission critical

applications that require loss–less delivery and minimal delay. Guaranteed SLA denotes BW (CIR = PIR > 0 in 100 Kbps increments), that is always available regardless of any congestion conditions. Traffic delivered using Guaranteed BW, is policed to the CIR value with a burst window equal to the CBS. guaranteedService2

.................................................................................................................................................................................................................................... 1646 SM 5-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-1: Traffic descriptor

....................................................................................................................................................................................................................................

Table 5-2

Service type parameters

(continued)

Parameter

Description

CIR [Kb/sec]

This is the normal medium rate (expressed in kb/sec) of the data flow (Effective Bandwidth) and it ranges from 0 to PIR value. It can be set only if the RegulatedService has been selected; in BestEffortService case it is set to 0 by the system; in GuaranteedService case it is set equal to PIR value.

PIR [Kb/sec]

This is the maximum rate (expressed in kb/sec) up to which the source can transmit for a short time period and it ranges from 3 to physical-linerate of the relative Port.

CBS [Kbytes]

This is the committed number of bytes for which the source may transmit the PIR; it ranges from 0 to 64 MB. It can be set only if the RegulatedService traffic has been selected; in BestEffortService case it is set to 0 by the system; in GuaranteedService case it is set equal to PBS value. A value greater than MTU (e.g. 2000) is advisable.

PBS [Kbytes]

This is the number of bytes for which are allowed to be sent above PIR or CIR before the colour (drop eligibility) of the packet changes; it ranges from 1 to 64 MB (this max value cannot be greater than the minimum value of 64 MB or 256xCBS. I.e.: if CBS=2000, then PBS<512 kB). A value greater than MTU (e.g. 2000) is advisable.

...................................................................................................................................................................................................

4

TD Policing Mode contains a drop-down list containing the following options:

• • • • •

td_undefined td_colorBlind td_colorAware td_colorAwareNoCoupling td_colorAwareWithCoupling

...................................................................................................................................................................................................

5

Click Cancel to return to the previous page. ...................................................................................................................................................................................................

6

Click Save & Exit to save all the changes and exit from the window. ...................................................................................................................................................................................................

7

Click Save & Continue to save the settings and create another traffic descriptor. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................

Procedure 5-2: Resource Availability When to use

This procedure is used to monitor and to count the amount of dynamic NE resources, where dynamic NE resources (for example, ETS Classifier, ETS Inflow, ETS Outflow and so on..) are mapped inside NE internal resources. This features allows you to perform the following functions: •





to report the “Used” amount of entries and the “Available” amount of entries (associated to each dynamic NE resource) to a Management operator, informing the Management Operator when available resources are exhausted to support Resource management feature to track Resources limitations (“on per-NE basis”) through dedicated Resource Management pools (see Figure 5-2, “Resource Management Pools” (p. 5-6) ). Each Resource Management Pool allows the monitoring of a resource, relying on the following retrieved information (for each resource): – used entries – available entries to keep aligned the values inside Management Pools with Packet processor CAM

Resource Management Pools

Use this procedure to view the resource management pools: ...................................................................................................................................................................................................

1

From Data menu, Select Resource Availability.

.................................................................................................................................................................................................................................... 1646 SM 5-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................

Result: The Resource Management Pools tab is displayed. Figure 5-2 Resource Management Pools

Resource Management Pool Table 5-3

Resource Management Pool parameters

Parameter

Description

ETS Cross-Connections

Used

Specifies the Used number of entries for the NE resource ETS Cross-Connections

Available

Specifies the Available number of entries for the NE resource ETS Cross-Connections.

Unavailable

Specifies the Unavailable number of entries for the NE resource ETS Cross-Connections.

Nominal

Specifies the nominal number of entries for the NE resource ETS Cross-Connections.

Ethernet OAM MEPs

Used

Specifies the Used number of entries for the NE resource Ethernet OAM MEPs.

Available

Specifies the Available number of entries for the NE resource Ethernet OAM MEPs.

Unavailable

Specifies the Unavailable number of entries for the NE resource Ethernet OAM MEPs.

.................................................................................................................................................................................................................................... 1646 SM 5-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-2: Resource Availability

....................................................................................................................................................................................................................................

Table 5-3

Resource Management Pool parameters

Parameter Nominal

(continued)

Description Specifies the nominal number of entries for the NE resource Ethernet OAM MEPs.

Static Vlan Reg. Entry

Used

Specifies the Used number of entries for the NE resource static VLAN.

Available

Specifies the Available number of entries for the NE resource static VLAN.

Unavailable

Specifies the Unavailable number of entries for the NE resource static VLAN.

Nominal

Specifies the nominal number of entries for the NE resource static VLAN.

Static Filtering

Used

Specifies the Used number of entries for the NE resource static filtering.

Available

Specifies the Available number of entries for the NE resource static filtering.

Unavailable

Specifies the Unavailable number of entries for the NE resource static filtering.

Nominal

Specifies the nominal number of entries for the NE resource static filtering.

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-3: VLAN Profile When to use

The virtual LAN (VLAN) management provides reports the registered VLANs associated to the Ethernet interface existing on the each data card and in specific range. VLAN registration is not applicable to MAC Bridge case. User this procedure to view the virtual LAN mode.

.................................................................................................................................................................................................................................... 1646 SM 5-7 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-3: VLAN Profile

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Data → VLAN profile option from the menu bar. Figure 5-3 VLAN Profile

...................................................................................................................................................................................................

2

Table 5-4

VLAN Protocol Profile panel parameters

Parameter

Description

State

Specifies the state of the VLAN.

User label

Specifies the default user label of the VLAN.

Ethernet type (0x)

Specifies the Ethernet type values, which is an hexadecimal value for the provider protocol-type (PT) that is inserted into the 2-bytes field of the Stacked-VLAN shim header; the value identifies the network provider and has to be 2-bytes long in hexadecimal notation; the third non-included byte is forced by default to “0x”. The PT is used to recognize the type of different VLAN frames, that is, if they are “S-Vlan-tagged” or “Q-Vlan tagged”; In 1646, the types of VLAN frames supported are only 88A8 or 8100 for 802.1ad or 802.1Q.

...................................................................................................................................................................................................

3

Click Cancel to cancel the operation and return to the previous page. ...................................................................................................................................................................................................

4

Click Save & continue to apply the changes and continue the configuration process. ...................................................................................................................................................................................................

5

Click Save & Exit to apply the changes and the following page appears. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-8 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-4: Create color profile

....................................................................................................................................................................................................................................

Procedure 5-4: Create color profile When to use

Use this procedure to create a new color profile. Procedure ...................................................................................................................................................................................................

1

Select Data → Color profile option from the menu bar. ...................................................................................................................................................................................................

2

Click Create hyperlink. The following screen appears. Figure 5-4 Color profile

...................................................................................................................................................................................................

3

Table 5-5

Color Profile panel parameters

Parameter

Description

Color Profile Mode

Specifies the color profile mode. The values are

User Label



Priority



Dscp

Specifies the label for the new color profile

.................................................................................................................................................................................................................................... 1646 SM 5-9 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-4: Create color profile

....................................................................................................................................................................................................................................

Table 5-5

Color Profile panel parameters

(continued)

Parameter

Description

Priority Bits 0 to 7

Specifies the priority bits. The valid range is 0-7. The values are •

green



red



yellow

...................................................................................................................................................................................................

4

Select Dscp from the Color Profile Mode drop-down list. The Priority bits increases to 063. ...................................................................................................................................................................................................

5

Click Cancel to unsave the settings and return to the previous page. ...................................................................................................................................................................................................

6

Click Save & Exit to save the settings and return to the previous page. ...................................................................................................................................................................................................

7

Click Save & Continue to save the settings and continue to create another color profile. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-5: Bridge configuration When to use

User this procedure to create a new bridge configuration.

.................................................................................................................................................................................................................................... 1646 SM 5-10 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-5: Bridge configuration

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

1

Select Data → Bridge → Configuration option from the menu bar. Figure 5-5 Bridge configuration panel

...................................................................................................................................................................................................

2

Select the Type of bridge to be configured from the Bridge Type drop-down list box. The values are: • • •

Bridge802.1D Bridge802.1Q Bridge802.1ad

...................................................................................................................................................................................................

3

Select the type of protocol from the Protocol Type drop-down list box. The values are: •

manualDisable

• •

STP RSTP

...................................................................................................................................................................................................

4

Click Save & Continue to save the setting and continue to create another bridge configuration. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-6: IGMP management When to use

Use this procedure to set IGMP management settings.

.................................................................................................................................................................................................................................... 1646 SM 5-11 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-6: IGMP management

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Data → IGMP Management option from the menu bar. Result: The IGMP Management per NE tab is displayed

...................................................................................................................................................................................................

2

The IGMP Management per NE displays the details of Board, Router Neighbor Timeouts and their status. Click Create link to configure IGMP management for a new board. Result: The IGMP Configurations per NE panel is displayed

...................................................................................................................................................................................................

3

Click Select link to choose the board for IGMP configuration is done. Result: A new window is displayed with a list of boards. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-12 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-7: Global setting

....................................................................................................................................................................................................................................

Procedure 5-7: Global setting When to use

Use this procedure to set OAM - Global Configuration. Procedure ...................................................................................................................................................................................................

1

Select Data → OAM management → Global Setting option from the menu bar. ...................................................................................................................................................................................................

2

The NE Global Setting tab displays the OAM Global Configuration panel. This panel contains the following parameters: • •

ETH Type LBM Time Out [sec]

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-8: Create maintenance domain When to use

Use this procedure to configure the maintenance domain. Procedure ...................................................................................................................................................................................................

1

Select Data → OAM Management → OAM Resource config. → MD option from the menu bar. Click Create hyperlink.

.................................................................................................................................................................................................................................... 1646 SM 5-13 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-8: Create maintenance domain

....................................................................................................................................................................................................................................

Result: The Create Maintenance Domain panel is displayed. Figure 5-6 Create Maintenance Domain panel

This panel lists the parameters described in the following table: Table 5-6

Maintenance Domain panel parameters

Parameter

Description

MD Label

Specifies the maintenance domain label. The default values is MD#0

Name

Specifies the name for the maintenance domain

MHFCreation

Indicates the MIP Half Function (MHF) Creation. The values are:

Format



defMHFnone



defMHFdefault

Specifies the MD format. The values are: •

charString



dnsLikeName



none

Level

Specifies the maintenance domain levels. The valid range is from Level0 to Level7

Status

Specifies the maintenance domain status. The values are: •

up



down

...................................................................................................................................................................................................

2

Click Save to save the settings and return to the previous panel.

.................................................................................................................................................................................................................................... 1646 SM 5-14 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-8: Create maintenance domain

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click Cancel to cancel the settings and return to the previous panel. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-9: Create maintenance association When to use

Use this procedure to configure the maintenance association. Procedure ...................................................................................................................................................................................................

1

Select Data → OAM Management → OAM Resource config. → MA option from the menu bar. Result: The Maintenance Associations Range panel is displayed. Figure 5-7 Maintenance Associations Range panel

This panel lists the parameters described in the following table: Table 5-7

Maintenance Domain panel parameters

Parameter

Description

Search Filter

Specifies the search criteria. The values are show all or specify criteria

MD From To

Specifies the MD range from 1-4

MA From To

Specifies the MA range from 1-80

.................................................................................................................................................................................................................................... 1646 SM 5-15 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-9: Create maintenance association

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Click Search/Refresh to filter the Maintenance Association based on the range selected. ...................................................................................................................................................................................................

3

Click Create to configure a new Maintenance Association. Result: The Create Maintenance Association panel is displayed. Figure 5-8 Create Maintenance Association panel

This panel lists the parameters described in the following table: Table 5-8

Create Maintenance Association panel parameters

Parameter

Description

MD

Specifies the MD number.

Status

Specifies the maintenance domain status. The values are: •

up



down

MA Index

Specifies the index for new Maintenance Association.

MHFCreation

The values are: •

defMHFnone



defMHFdefault

MA Name

Specifies the new name for Maintenance Association.

CCM Interval

The values are: •

interval100ms



interval1s



interval10s



interval1min



interval10min

.................................................................................................................................................................................................................................... 1646 SM 5-16 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-9: Create maintenance association

....................................................................................................................................................................................................................................

Table 5-8

Create Maintenance Association panel parameters

(continued)

Parameter

Description

Format

Specifies the format for new Maintenance Association. The values are: •

charString

Type

Type is vid

Vid

Click on Select to choose the Vid.

...................................................................................................................................................................................................

4

Click Cancel to cancel the settings and return to the previous panel. ...................................................................................................................................................................................................

5

Click Save to save the settings and return to the previous panel. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-10: Search MEP When to use

Use this procedure to search for a list of MEPs. Procedure ...................................................................................................................................................................................................

1

Select Data → OAM Management → OAM Resource config. → MA MEP List option from the menu bar.

.................................................................................................................................................................................................................................... 1646 SM 5-17 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-10: Search MEP

....................................................................................................................................................................................................................................

Result: The Maintenance Associations Range panel is displayed. Figure 5-9 MA MEP List Range panel

This panel lists the parameters described in the following table: Table 5-9

Maintenance Domain panel parameters

Parameter

Description

Search Filter

Specifies the search criteria. The values are Show all or Specify Criteria.

MD From To

Specifies the MD range from 1-4

MA From To

Specifies the MA range from 1-80

MEP From To

Specifies the MEP range from 1-8190

...................................................................................................................................................................................................

2

Select the filter criteria from the Search Filter drop-down list box. The values are: Show alland specify criteria. ...................................................................................................................................................................................................

3

If Show all is selected as a search filter the MD From and To and MA From and To range cannot be set by the user. To set the specified range, select specify criteria and click Search that displays the existing MA MEP list. ...................................................................................................................................................................................................

4

Click Search to filter the MEP based on the range selected. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-18 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-11: Create MEP

....................................................................................................................................................................................................................................

Procedure 5-11: Create MEP When to use

Use this procedure to configure a new MEP. Procedure ...................................................................................................................................................................................................

1

Select Data → OAM Management → OAM Resource config. → MEP option from the menu bar. Result: The Maintenance Associations Range panel is displayed. Figure 5-10 MEP List Range panel

This panel lists the parameters described in the following table: Table 5-10

Maintenance Domain panel parameters

Parameter

Description

Search Filter

Specifies the search criteria. The values are Show all or Specify Criteria.

MD From To

Specifies the MD range from 1-4

MA From To

Specifies the MA range from 1-80

MEP From To

Specifies the MEP range from 1-8190

...................................................................................................................................................................................................

2

Select the filter criteria from the Search Filter drop-down list box. The values are: Show alland specify criteria.

.................................................................................................................................................................................................................................... 1646 SM 5-19 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-11: Create MEP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

If Show all is selected as a search filter the MD From and To and MA From and To range cannot be set by the user. To set the specified range, select specify criteria and click Search that displays the existing MA MEP list. ...................................................................................................................................................................................................

4

Click Search to filter the MEP based on the range selected. ...................................................................................................................................................................................................

5

Select Data → OAM Management → OAM Resource config. → MEP option from the menu bar. Click Create hyperlink. Figure 5-11 Create MEP panel

This panel lists the parameters described in the following table: Table 5-11

Create MEP panel parameters

Parameter

Description

MA Label

Specifies the MA label for the MEP

MEP Identifier

Specifies the MEP identifier for the MEP. The ID must come from MA's settings.

If Index

Specifies the If Index value for the MEP

LTM/CCM Priority (0..7)

Specifies the LTM priority. The valid range is 0-7

LBM Priority

Specifies the LBM priority. The default value is 7

CCIEnable

Specifies the CCIEnable as either True or False

Active

Indicates the Activation State. The values are:

Direction



true



false

Indicates the MEP Direction. The values are: •

Up



Down

.................................................................................................................................................................................................................................... 1646 SM 5-20 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-11: Create MEP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

6

Click Select to choose the MA Label, MEP Identifier and If index values and click Save to store the settings. ...................................................................................................................................................................................................

7

Click Cancel to revoke all the settings and return to the previous panel E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-12: EFM tool When to use

Use this procedure to search for the available local ports. Procedure ...................................................................................................................................................................................................

1

Select Data → EFM tool option from the menu bar. Result: The EFM tool tab displays the Search Local Port panel. Figure 5-12 EFM tool

...................................................................................................................................................................................................

2

Click Search link to search for the available ports. Result: The boards panel is displayed. ...................................................................................................................................................................................................

3

Click boards link on the left pane. Result: The list of local ports available are displayed in the right pane. ...................................................................................................................................................................................................

4

Click on any of the available port link to select that port. Result: The selected port name is displayed in the Search Local Port panel. ...................................................................................................................................................................................................

5

Click Show.

.................................................................................................................................................................................................................................... 1646 SM 5-21 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-12: EFM tool

....................................................................................................................................................................................................................................

Result: The EFM Tool panel with Configuration and Link Monitoring tabs is displayed. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-13: Configure EFM tool When to use

Use this procedure to configure the available local ports. Procedure ...................................................................................................................................................................................................

1

Select Data → EFM tool option from the menu bar. Result: The EFM tool panel is displayed with the Configuration and Link Monitoring tabs. By default the Configuration tab is opened. Figure 5-13 EFM tool

.................................................................................................................................................................................................................................... 1646 SM 5-22 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-13: Configure EFM tool

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Selectenabled to enable the Admin State. Result: The boards panel is displayed. ...................................................................................................................................................................................................

3

Click Save on the bottom left pane of the panel to save the changes. ...................................................................................................................................................................................................

4

Click Cancel to undo the changes and return back to the Search Local Port panel. ...................................................................................................................................................................................................

5

Click Show. Result: The EFM Tool panel with Configuration and Link Monitoring tabs is

displayed. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-14: Create VLAN When to use

Use this procedure to search, create and configure VLAN. Procedure ...................................................................................................................................................................................................

1

Select Data → Virtual LAN Management → Virtual LAN option from the menu bar. Result: The VLAN Registration tab is displayed Figure 5-14 VLAN Registration

...................................................................................................................................................................................................

2

Enter the range of ports to be searched in From: and To: boxes and click Search.

.................................................................................................................................................................................................................................... 1646 SM 5-23 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-14: Create VLAN

....................................................................................................................................................................................................................................

Result: The search result is displayed. ...................................................................................................................................................................................................

3

Click Create link on the bottom left pane of the VLAN Registration tab. Result: The Create VLAN panel is displayed. ...................................................................................................................................................................................................

4

Enter a numeric value in the VLAN Id: text box. Then select the port to which you want to assign the VLAN Id from the list of ports in Available Port panel and by clicking . Result: The selected port is displayed in the Selected Port: panel. ...................................................................................................................................................................................................

5

Click Save to save the VLAN created E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-15: ConfigureVLAN When to use

Use this procedure to configure VLAN. Procedure ...................................................................................................................................................................................................

1

Select Data → Virtual LAN Management → Virtual LAN option from the menu bar. Result: The VLAN Registration tab is displayed Figure 5-15 VLAN Registration

...................................................................................................................................................................................................

2

Enter the range of ports to be searched in From: and To: boxes and click Search.

.................................................................................................................................................................................................................................... 1646 SM 5-24 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-15: ConfigureVLAN

....................................................................................................................................................................................................................................

Result: The search result is displayed.

...................................................................................................................................................................................................

3

Select the check box of the VLAN that you want to configure and click Configure link given for the selected VLAN. Result: The Modify VLAN panel is displayed. Figure 5-16 Modify VLAN

This panel lists the parameters described in the following table: Table 5-12

Modify VLAN parameters

Parameter

Description

VLAN

Specifies the VLAN Id assigned.

Limit in learning process

Indicates the status. The values are: •

disabled



enabled

Port#

Specifies the Port#

Value

Specifies the Value

Untagged

Specifies the Untagged ports

...................................................................................................................................................................................................

4

Click Save to save the VLAN modified.

.................................................................................................................................................................................................................................... 1646 SM 5-25 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-15: ConfigureVLAN

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

Click Cancel to undo the changes and return back to VLAN Registration panel. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 5-16: Dynamic filtering DB When to use

Use this procedure to view modify the dynamic filtering parameter. Procedure ...................................................................................................................................................................................................

1

Select Data → Virtual LAN Management → DB Filtering option from the menu bar. Result: The Dynamic Filtering Parameter panel is displayed Figure 5-17 Dynamic filtering database

...................................................................................................................................................................................................

2

Enter the time interval in seconds in Aging Time (seconds): text box and click Save. Note: The value entered for Aging Time (seconds): should be in multiples of 60. If any value other than this is entered, it throws up an error as shown in Figure 5-18, “Dynamic filter error message” (p. 5-26). Figure 5-18 Dynamic filter error message

Result: The Dynamic filtering parameter is saved. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-26 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-17: Configure static unicast filtering

....................................................................................................................................................................................................................................

Procedure 5-17: Configure static unicast filtering When to use

Use this procedure to configure static unicast filtering. Procedure ...................................................................................................................................................................................................

1

Select Data → Virtual LAN Management → DB Filtering option from the menu bar. Result: The Static Unicast Filtering tab is displayed Figure 5-19 Static Unicast Filtering

...................................................................................................................................................................................................

2

Click Create link to configure a new static unicast filtering entry. . Result: The Static Unicast Filtering Entry tab is displayed. Table 5-13

Static Unicast Filtering Entry parameters

Parameters

Description

VLAN ID

Specifies the Virtual LAN ID of the equipment.

MAC Address

Specifies the MAC address of the port.

Outbound port

Specifies the outbound port of the equipment.

...................................................................................................................................................................................................

3

Click on the Select link to choose an existing VLAN ID from the drop-down list. ...................................................................................................................................................................................................

4

Click on the Select link to choose an existing outbound data ports from the drop-down list. ...................................................................................................................................................................................................

5

Click Save & Exit to save the settings and return to the previous window. ...................................................................................................................................................................................................

6

Click Save & Continue to save the setting and configure another unicast entry. ...................................................................................................................................................................................................

7

Click Cancel to cancel the settings and return back to previous window. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-27 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-18: Configure static multicast filtering

....................................................................................................................................................................................................................................

Procedure 5-18: Configure static multicast filtering When to use

Use this procedure to configure static multicast filtering. Procedure ...................................................................................................................................................................................................

1

Select Data → Virtual LAN Management → DB Filtering option from the menu bar. Result: The Static Multicast Filtering tab is displayed Figure 5-20 Static Multicast Filtering

...................................................................................................................................................................................................

2

Click Create link to configure a new static multicast filtering entry. . Result: The Static Multicast Filtering Entry tab is displayed. Table 5-14

Static Multicast Filtering Entry parameters

Parameters

Description

VLAN ID

Specifies the Virtual LAN ID of the equipment.

MAC Address

Specifies the MAC address of the port.

Outbound port

Specifies the outbound port of the equipment.

...................................................................................................................................................................................................

3

Click on the Select link to choose an existing VLAN ID from the drop-down list. ...................................................................................................................................................................................................

4

Click on the Select link to choose an existing outbound data ports from the drop-down list. ...................................................................................................................................................................................................

5

Click Save & Exit to save the settings and return to the previous window. ...................................................................................................................................................................................................

6

Click Save & Continue to save the setting and configure another multicast entry. ...................................................................................................................................................................................................

7

Click Cancel to cancel the settings and return back to previous window. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-28 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Procedure 5-19: Create ERP topology When to use

Use this procedure to create a new Ethernet Ring Protection (ERP). Procedure ...................................................................................................................................................................................................

1

Select Protection → ERP[ITU-T G.8032] option from the menu bar. Figure 5-21 ERP[ITU-T G.8032]

...................................................................................................................................................................................................

2

Select theERP topology for which the user wants to configure an ERP. Figure 5-22 Ethernet Ring Protection Topology

.................................................................................................................................................................................................................................... 1646 SM 5-29 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click Create to configure a new ERP topology. Figure 5-23 ERP Topology

...................................................................................................................................................................................................

4

ERP topology panel parameters are described in the following table. Table 5-15

ERP topology parameters

Parameter

Description

ERP Label

Specifies the ERP label.

Interconnection Node

The values are True or False. Only the value False is supported in R2.2.

East Port

Allows to select the east port.

West Port

Allows to select the west port.

.................................................................................................................................................................................................................................... 1646 SM 5-30 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Figure 5-24 East/West Ports

E................................................................................................................................................................................................... N D O F S T E P S

Create ERP instance ...................................................................................................................................................................................................

1

Select the ERP Topology. ...................................................................................................................................................................................................

2

Click on Activate to activate the ERP topology for which the instance is to be created. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-31 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Create ERP Instance Figure 5-25 ERP instance

Create ERP Protection Group

Use this procedure to create ERP Protection Group. ...................................................................................................................................................................................................

1

Click create from the tree area. The Create ERP Protection Group is displayed. Figure 5-26 ERP Protection Group

.................................................................................................................................................................................................................................... 1646 SM 5-32 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Select the ERP topology for which the ERP instance has to be created. Figure 5-27 ERP topology panel

...................................................................................................................................................................................................

3

The CreateERP Protection Group panel allows changing the settings of the resource by means of the following parameters: Table 5-16

The ERP Protection Group parameters

Parameter

Description

ERP label

Specifies the ERP label.

Scope

Specifies the ERP scope in which the ERP instance operates. The values are Per port and Per_VLAN.

RPL Owner

It is an Ethernet Ring Node adjacent to the RPL that is responsible for blocking its end of the RPL under normal conditions.

Wait-to- restore WTR

This parameter must be in the set { 0, 1, 2, .., 12 minutes}, with default value at 5 minutes. A value “infinite” (corresponding to “non revertive “switching behavior) is not supported

Guard Timer

This parameter must be in the range [10 - 2000 msec] with 10 msec steps. Default value is 500 msec.

.................................................................................................................................................................................................................................... 1646 SM 5-33 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Table 5-16

The ERP Protection Group parameters

(continued)

Parameter

Description

Hold-off Timer

This parameter must be in the range [ 0 - 10 sec], with 0.1 sec. steps. Default value is 0 sec.

Revertive

The values are True or False. Only the value True is supported in R2.2.

ERP Version

Specifies the ERP version.

APS Ring VLAN ID

Specifies the APS Ring VLAN ID.

Maintenance Entity Level

Maintenance Entity Level represents the information to be used to distinguish between OAM signals belonging to different nested MEs, at any point in a network.

VLAN priority

Specifies the VLAN ID priority.

...................................................................................................................................................................................................

4

Select the MEPs associated with the corresponding East and West ports. Note: 1. Create and activate ERP instance so as to create APS ring VLAN which will be used for associating MA. 2. Create MD, MA, MEP list, and then map the MEP with the ERP. Figure 5-28 MEPs for East/West ports

.................................................................................................................................................................................................................................... 1646 SM 5-34 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-19: Create ERP topology

....................................................................................................................................................................................................................................

Parameter

Description

Switch Command

The values are Clear, w-FS and e-FS. •

Clear-This command clears all the externally initiated switch commands.



w-FS- This command locally issues Forced Switch on West.



e-FS- This command locally issues Forced Switch on East.

Figure 5-29 MEP Range

E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-35 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................

Procedure 5-20: Create ELP When to use

Use this procedure to create a new Ethernet Linear Protection (ELP). Procedure ...................................................................................................................................................................................................

1

Select Protection → Ethernet Linear Protection from the menu bar. Figure 5-30 Ethernet Linear Protection

...................................................................................................................................................................................................

2

The Ethernet Linear Protection Group Management screen is displayed: Figure 5-31 Ethernet Linear Protection Group

.................................................................................................................................................................................................................................... 1646 SM 5-36 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click create to configure a new Ethernet Linear Protection Group. The following screen is displayed: Figure 5-32 Create Ethernet Linear Protection Group

...................................................................................................................................................................................................

4

The Ethernet Linear Protection panel allows changing the settings of the resource by means of the following parameters: Table 5-17

Ethernet Linear Protection parameters

Parameter

Description

User Label

Specifies the user label.

Status

Specifies the status. The values are active or Notinservice.

.................................................................................................................................................................................................................................... 1646 SM 5-37 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................

Table 5-17

Ethernet Linear Protection parameters

(continued)

Parameter

Description

Name

Specifies Ethernet Linear Protection Group name.

Wait-to- restore WTR

This parameter must be in the set [0, 1, 2, .., 12 minutes], with default value at 5 minutes. A value “infinite” (corresponding to “non revertive” switching behavior) is not supported

Hold-off Timer

This parameter must be in the range [0 - 10 sec], with 0.1 sec. steps. Default value is 0 sec

Switch Command

The values are Clear, Lockout of Protection, Forced Switch and Manual. •

Clear- This command clears all the externally initiated switch commands



Lockout of Protection- This command fixes the selector position to the working connection. Prevents the selector from switching to the protection connection when it is selecting the working connection. Switches the selector from the protection to the working connection when it is selecting the protection connection.



Forced Switch- This command switches the selector from the working connection to the protection connection, unless a higher priority switch request (that is, LO) is in effect.



Manual- This command switches the selector from the working connection to the protection connection, unless an equal or higher priority switch request (i.e., LO, FS, SF or MS) is in effect.

.................................................................................................................................................................................................................................... 1646 SM 5-38 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

Select the PU interface from the list as shown in the figure. Figure 5-33 PU interface

.................................................................................................................................................................................................................................... 1646 SM 5-39 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

6

Select the PU VLAN-ID value from the list as shown in the figure. Figure 5-34 VLAN-ID Range

.................................................................................................................................................................................................................................... 1646 SM 5-40 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

7

Select the PU MD/MA/MEP values from the list as shown in the figure. Figure 5-35 MD/MA/MEP Range

...................................................................................................................................................................................................

8

Click save to save all the settings. ...................................................................................................................................................................................................

9

Click cancel to revoke all changes and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 5-41 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Ethernet Functions

Procedure 5-20: Create ELP

....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM 5-42 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

6

Data Communication 6

Overview Purpose

Provides an introduction to the data communication ports and features. Contents DCC

6-2

Procedure 6-1: Network IF

6-2

Procedure 6-2: XC Overhead

6-3

DCN Phys. If

6-6

Procedure 6-3: IP Address

6-6

Procedure 6-4: LAN management

6-7

IP tunnel management

6-8

Procedure 6-5: Administer IP tunnel

6-8

Procedure 6-6: Configure IP tunnel

6-9

Network domain

6-11

Procedure 6-7: Configure IP route

6-11

Procedure 6-8: OSI management

6-14

Management Access Control

6-17

Procedure 6-9: Create MAC Access Control List (ACL)

6-17

................................................................................................................................................................................................................................... 1646 SM 6-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication DCC

Overview

....................................................................................................................................................................................................................................

DCC Overview Purpose

The purpose of this procedure is to create SEL for Data Communication Network (DCN). Contents Procedure 6-1: Network IF

6-2

Procedure 6-2: XC Overhead

6-3

Procedure 6-1: Network IF When to use

Use this procedure to create the network interface. Procedure

Follow this procedure to create network interface: ...................................................................................................................................................................................................

1

Select Communication → DCC→ Network IF from the menu bar. Result: The DCC Channel tab is displayed.Figure 6-1, “DCC Channel” (p. 6-2). Figure 6-1 DCC Channel

...................................................................................................................................................................................................

2

Click Create SEL link.

.................................................................................................................................................................................................................................... 1646 SM 6-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication DCC

Procedure 6-1: Network IF

....................................................................................................................................................................................................................................

Result: The Filter by panel is displayed.

Table 6-1

Filter by parameters

Parameter

Description

AID type

Specifies the AID type available •

STM1



STM4



STM16

Cancel

Cancels the AID type selection and returns back to the previous window.

Search

Searches the available DCC channels for the selected AID type.

...................................................................................................................................................................................................

3

Click Search to search for the DCC channel with the selected AID type. Result: The DCC channels available for the selected AID type is displayed. ...................................................................................................................................................................................................

4

Select any one of the DCC channels and click Apply & Exit link. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 6-2: XC Overhead When to use

Use this procedure to create Overhead channel cross-connection. Procedure ...................................................................................................................................................................................................

1

Select Communication → DCC→ XC Overhead from the menu bar.

.................................................................................................................................................................................................................................... 1646 SM 6-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication DCC

Procedure 6-2: XC Overhead

....................................................................................................................................................................................................................................

Result: The Overhead channel Cross connection tab is displayed. Figure 6-2 Overhead Channel Cross Connection

...................................................................................................................................................................................................

2

Click on the Create hyperlink to create a cross-connection. Result: The Enter Channel panel is displayed

Table 6-2

IP address of Network Element

Parameter

Description

DCC Channel

Specifies the type of DCC •

SECTION



LINE

From

From Access identifier determines the entity Access Identifier (AID) of either end of cross-connection for 2WAY cross-connections. The cross-connection is bidirectional

To

To Access identifier determines the entity Access Identifier (AID) of the other end of a cross-connection for 2WAY cross-connections. The cross-connection is bidirectional

Cancel

Allows to cancel the selection and return back to the previous screen.

Save

Allows to save the cross-connect settings.

...................................................................................................................................................................................................

3

Click Select links to choose the source and the destination to configure a cross-connection. ...................................................................................................................................................................................................

4

Click Save to store all the settings and return back to the previous page.

.................................................................................................................................................................................................................................... 1646 SM 6-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication DCC

Procedure 6-2: XC Overhead

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

Click Cancel to revoke all the settings and return back to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 6-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication DCN Phys. If

Overview

....................................................................................................................................................................................................................................

DCN Phys. If Overview Purpose

The purpose of this procedure is to create DCN Physical interface management features. Contents Procedure 6-3: IP Address

6-6

Procedure 6-4: LAN management

6-7

Procedure 6-3: IP Address When to use

Use this procedure to manage the system's IP address. Procedure

Follow this procedure to manage system's IP address ...................................................................................................................................................................................................

1

Select Communication → DCN Phy. If →IP Address from the menu bar. Result: The system IP address panel is displayed. Figure 6-3 DCC Channel

Table 6-3

Filter by parameters

Parameter IP Address:

Description This is the IP Address of the NE. The entry box allows to digit the IP address of the NE (value range [1-99,101-126,128-223]-[0-255]-[0-255]-[0-254]).

.................................................................................................................................................................................................................................... 1646 SM 6-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication DCN Phys. If

Procedure 6-3: IP Address

....................................................................................................................................................................................................................................

Table 6-3

Filter by parameters

(continued)

Parameter Subnet mask:

Description This is the entry box for subnet mask of the network the NE is connected to (value range [128-255]-[0-255]-[0-255]-[0255]). The mask, in binary representation, must contain a contiguous string of 1s (the network portion) and a contiguous string of 0s (the host portion).

...................................................................................................................................................................................................

2

Click Save link to store the settings and return back to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 6-4: LAN management When to use

Use this procedure to manage the customer LAN. Procedure ...................................................................................................................................................................................................

1

Select Communication → DCN Phys. If→LAN manag from the menu bar. Result: The Customer LAN mangement tab is displayed. Figure 6-4 Customer LAN management

...................................................................................................................................................................................................

2

Click Save to store all the settings and return back to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 6-7 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication IP tunnel management

Overview

....................................................................................................................................................................................................................................

IP tunnel management Overview Purpose

The purpose of this procedure is to manage an IP tunnel instance on the NE. The IP tunnel that has to be created is specified by its AID. If the AID specified matches any of the ID for existing IP tunnels, an error message is returned in response. Contents Procedure 6-5: Administer IP tunnel

6-8

Procedure 6-6: Configure IP tunnel

6-9

Procedure 6-5: Administer IP tunnel When to use

Use this procedure to retrieve, create and delete an IP tunnel instance on the NE. Procedure

Follow this procedure to view an IP tunnel: ...................................................................................................................................................................................................

1

Click Communication → IP Tunnel. Result: The Network IP Tunnel Configuration panel is displayed.

This panel lists the parameters described in the table below: Table 6-4

IP tunnel panel parameters

Parameter

Description

Access Identifier IPT-

Specifies the access identifier of the LSP tunnel for the network connection. It is assigned by system at connection creation.

Remote NSAP

Specifies the Network Service Access Point (NSAP) for the IP Tunnel

Encapsulation Type

Specifies the Encapsulation Type required for the Tunnel configuration •

ALU



GRE

.................................................................................................................................................................................................................................... 1646 SM 6-8 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication IP tunnel management

Procedure 6-5: Administer IP tunnel

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The Delete hyperlink allows to remove from the list the selected item by the check box. ...................................................................................................................................................................................................

3

The Create hyperlink allows to configure a new IP Tunnel. For details refer to Procedure 6-6: “Configure IP tunnel” (p. 6-9). E................................................................................................................................................................................................... N D O F S T E P S

Procedure 6-6: Configure IP tunnel When to use

Use this procedure to create an IP tunnel instance on the NE. The IP tunnel that has to be created is specified by its Access Identifier (AID). Procedure ...................................................................................................................................................................................................

1

Select Communication → IP Tunnel. ...................................................................................................................................................................................................

2

Click Create to configure the IP Tunnel as shown in Figure 6-5, “Create IP tunnel” (p. 6-9). Figure 6-5 Create IP tunnel

See Table 6-4, “IP tunnel panel parameters” (p. 6-8) for parameter description. ...................................................................................................................................................................................................

3

Enter the IP tunnel access identifier in the entry box. ...................................................................................................................................................................................................

4

Enter the Remote NSAP value for the IP tunnel.

.................................................................................................................................................................................................................................... 1646 SM 6-9 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication IP tunnel management

Procedure 6-6: Configure IP tunnel

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

Select the encapsulation type from the drop-down list box and click Save to create new IP tunnel. ...................................................................................................................................................................................................

6

Click Close to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 6-10 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Network domain

Overview

....................................................................................................................................................................................................................................

Network domain Overview Purpose

The purpose of this procedure is to manage network domain. Contents Procedure 6-7: Configure IP route

6-11

Procedure 6-8: OSI management

6-14

Procedure 6-7: Configure IP route When to use

Use this procedure to configure the IP Routing and enter (add) a new static IP route in the IP routing table. Procedure

Follow this procedure to configure the IP Routing: ...................................................................................................................................................................................................

1

Click Communication→Network Domain→IP Route from the menu bar. Result: The IP Routing Configuration panel is displayed.

The panel displays the existing IP route entry along with its attributes.

.................................................................................................................................................................................................................................... 1646 SM 6-11 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Network domain

Procedure 6-7: Configure IP route

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Click Create hyperlink to configure a new IP route as displayed in Figure 6-6, “IP route creation” (p. 6-12). Figure 6-6 IP route creation

Table 6-5, “IP Routing panel parameters” (p. 6-12) provides description of the IP route panel parameters. Table 6-5

IP Routing panel parameters

Parameter

Description

Access Identifier

Access Identifier, it specifies the facility carrying the DCC with the next hop network interface or identifies the IP Tunnel or Customer LAN. The select hyperlink allows to open the window shown in Figure 6-7, “AID Type Selection” (p. 6-13) for the selection of the resource. After the selection procedure, the chosen value will be reported

Destination Address

This is the IP address of the destination host or network (in the format nnn-nnn-nnn-nnn). The address 0-0-0-0 is used to specify a default route. If NETMASK is not all '1' (that is, a network route is specified), the host portion of the DESTADDR must be all '0'

Subnet Mask

This is the IP subnet mask of the route (in the format nnn-nnnnnn- nnn). The mask 0-0-0-0 is used to specify a default route

Metric

This is the cost metric of the route. The valid range is 1- 65535

Status

Specifies the status of the configuration.

.................................................................................................................................................................................................................................... 1646 SM 6-12 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Network domain

Procedure 6-7: Configure IP route

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Enter the Access Identifier for the new IP route. Click Select hyperlink to choose the AID type. The values are DCC, NE IPT, and LAN as shown in Figure 6-7, “AID Type Selection” (p. 6-13). Figure 6-7 AID Type Selection

...................................................................................................................................................................................................

4

Select one of the radio button to choose the AID value and click Send hyperlink, the choice are added in the relevant field of the previous page. Close hyperlink allows to leave the window. ...................................................................................................................................................................................................

5

Enter the Destination Address and Subnet mask for the IP route to be configured. ...................................................................................................................................................................................................

6

Enter the Metric value and set the Advertise value to either Y or N. ...................................................................................................................................................................................................

7

Click Save & Exit to save the settings and return to the window. ...................................................................................................................................................................................................

8

Click Save to store the settings and return to the previous panel. ...................................................................................................................................................................................................

9

Click Cancel to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 6-13 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Network domain

Procedure 6-8: OSI management

....................................................................................................................................................................................................................................

Procedure 6-8: OSI management When to use

This option retrieves the parameters of a configured OSI AREA that the NE is part of. It contains the following two sub-menu options: • •

OSI NE Area OSI OS Address

Administer OSI NE area ...................................................................................................................................................................................................

1

Select Communication → Network Domain → OSI Mng → OSI NE Area option from the menu bar. The OSI area panel is displayed as shown in Figure 6-8, “OSI Area” (p. 6-14). Figure 6-8 OSI Area

...................................................................................................................................................................................................

2

Table 6-6, “OSI area panel parameters” (p. 6-14) provides description of OSI NE area parameters. Table 6-6

OSI area panel parameters

Parameter

Description

OSI AREA

Determines an access Identifier for an OSI area

Level 3 Initial Domain Part

Assigns the initial domain part of the manual area address (8 hexadecimal characters)

Level 3 Domain Format Identifier

Assigns the domain format identifier field of the manual area address (2 hexadecimal characters)

Level 3 ORGanization

Assigns the organization field of the manual area address (8 hexadecimal characters)

.................................................................................................................................................................................................................................... 1646 SM 6-14 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Network domain

Procedure 6-8: OSI management

....................................................................................................................................................................................................................................

Table 6-6

OSI area panel parameters

(continued)

Parameter

Description

Level 3 Reserved

Assigns the reserved field of the manual area address (4 hexadecimal characters)

Level 3 Routing

Assigns the routing domain and routing area within the routing domain of the manual area address (8 hexadecimal characters)

Level 3 System Identifier

This is the system identifier assigned to the card (12 hexadecimal characters)

...................................................................................................................................................................................................

3

The Save hyperlink closes the page and return back to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

Administer OSI OS address ...................................................................................................................................................................................................

1

Select Communication → Network Domain → OSI Mng → OSI OS Address option from the menu bar. The OS Address panel is displayed as shown in Figure 6-9, “OS Address” (p. 6-15). Figure 6-9 OS Address

...................................................................................................................................................................................................

2

Table 6-7, “OS Address panel parameters” (p. 6-15) provides description of the OS address parameters. Table 6-7

OS Address panel parameters

Parameter

Description

Operating System

Specifies the operating system for the open system interconnection management. The values are: OSI and IP.

Main Address

Specifies the main address for the OSI management

Spare Address

Specifies the spare address for the OSI management

.................................................................................................................................................................................................................................... 1646 SM 6-15 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Network domain

Procedure 6-8: OSI management

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

The Save hyperlink closes the page and returns back to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 6-16 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Management Access Control

Overview

....................................................................................................................................................................................................................................

Management Access Control Overview Purpose

The purpose of this procedure is to create and manage MAC ACL and ACE Contents Procedure 6-9: Create MAC Access Control List (ACL)

6-17

Procedure 6-9: Create MAC Access Control List (ACL) Purpose

Use this procedure to create a MAC Access Control List. ...................................................................................................................................................................................................

1

Select Data -> MAC Access Control List from the menu bar. Figure 6-10 MAC Access Control List

.................................................................................................................................................................................................................................... 1646 SM 6-17 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Management Access Control

Procedure 6-9: Create MAC Access Control List (ACL)

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Click ACL hyperlink the Modify MAC Access Control panel is displayed. Figure 6-11 Modify MAC Access Control List

The Modify MAC Access Control panel that contains the following parameters. Parameter

Description

ACL Identifier

Identifies the entity for which the output data are retrieved.

ACL Name

Name of the MAC Access Control

Apply Change

The supported values are

Status



true - Managment Actual Access Control Element (ACE) panel is displayed.



false - Managment Access Control Element (ACE) and Managment Actual Access Control Element (ACE) panel is displayed

Specifies the state of the MAC Access Control

...................................................................................................................................................................................................

3

Click Save. The MAC Access Control is created. E................................................................................................................................................................................................... N D O F S T E P S

Search and Create MAC Access Control Element (ACE) ...................................................................................................................................................................................................

1

Select Data -> MAC Access Control List from the menu bar. Click ACL hyperlink.

.................................................................................................................................................................................................................................... 1646 SM 6-18 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Management Access Control

Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................

Result: The Modify MAC Access Control panel is displayed. ...................................................................................................................................................................................................

2

Click View to view the Management Access Control Element (ACE) as shown in menu bar.

Result: Management Access Control Element (ACE) panel is displayed. Figure 6-12 Management Access Control Element (ACE)

...................................................................................................................................................................................................

3

Enter the values in From and To search range. Click Search. Result: The existing list of the MAC ACE is displayed. ...................................................................................................................................................................................................

4

Click Create to create a new Access Control Element.

.................................................................................................................................................................................................................................... 1646 SM 6-19 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Management Access Control

Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................

Result: The following screen appears. Figure 6-13 Create Access Control Element

This panel lists the parameters described in the following table: Parameter

Description

Order

Specifies the order range from 0 to 65535.

MAC Source

Specifies the Valid 48 bit MAC address.

MAC Destination

Specifies the Valid 48 bit MAC address.

VID

Indicates the VLAN Id of the ACE . The valid range from 0 to 4097.

Action

Indicates the state of the ACE. The supported values are

Status



Permit



Deny

Indicates if the ACE is in service. The supported values are •

active : indicates that the MAC ACE is active.



notInService : indicates that the MAC ACE is not

active. The default value is notInService. ...................................................................................................................................................................................................

5

Click Save to save the ACE or click Cancel to return to the previous screen without saving.

.................................................................................................................................................................................................................................... 1646 SM 6-20 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication Management Access Control

Procedure 6-9: Create MAC Access Control List (ACL)

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

6

Click View to view the Management Actual Access Control Element (ACE) as shown in menu bar.

Management Actual Access Control Element (ACE) panel is displayed. Figure 6-14 Management Actual Access Control Element (ACE)

...................................................................................................................................................................................................

7

Enter the management actual access control element From and To values and click Search. ...................................................................................................................................................................................................

8

Click Cancel to return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 6-21 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Data Communication

Procedure 6-9: Create MAC Access Control List (ACL)

....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM 6-22 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

7

Alarm Management 7

Overview Purpose

Alcatel-Lucent 1646 SM supports different types of alarms and events in various scenarios related to the equipment and transmission. This section defines the alarms or events supported on the Alcatel-Lucent 1646 SM network element. The probable cause, raise/clear criteria, object against which alarm is raised, alarm domain, and consequent actions for each of the supported alarms are defined in the following table. Contents Procedure 7-1: TCA Profiles

7-2

Procedure 7-2: Create ASAP

7-3

Procedure 7-3: Modify or Delete an ASAP profile

7-8

Procedure 7-4: ALM cutoff

7-9

Procedure 7-5: ALM resynch.

7-10

Procedure 7-6: Condition log

7-11

Procedure 7-7: Housekeeping support

7-13

................................................................................................................................................................................................................................... 1646 SM 7-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-1: TCA Profiles

....................................................................................................................................................................................................................................

Procedure 7-1: TCA Profiles When to use

Use this procedure to create and search and retrieve Threshold profiles. Procedure ...................................................................................................................................................................................................

1

Select Alarms → TCA Profile from the menu bar. Figure 7-1 TCA Profile

...................................................................................................................................................................................................

2

Select the Profile type and click on Search. The corresponding TCA profiles are displayed. Figure 7-2 Search TCA Profiles

.................................................................................................................................................................................................................................... 1646 SM 7-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-1: TCA Profiles

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click Create to create a new TCA Profile. Figure 7-3 Create TCA Profile

...................................................................................................................................................................................................

4

TCA Profile panel parameters are described in the following table. Parameter

Description

Profile Type

Specifies the Threshold profile type.

User Label

Specifies the User Label.

Default

The values are Y or N.

...................................................................................................................................................................................................

5

Click Save to save all settings. ...................................................................................................................................................................................................

6

Click Cancel to revoke all changes and return to previous page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 7-2: Create ASAP When to use

This procedure allows to create an Alarm Severity Assigned Profile (ASAP) Management instance for a given profile type.

.................................................................................................................................................................................................................................... 1646 SM 7-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-2: Create ASAP

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Alarms →ASAP Mng option from the menu bar. Figure 7-4 ASAP Mng

...................................................................................................................................................................................................

2

Select the ASAP Type from the drop-down list as shown in the figure. Figure 7-5 ASAP Type

.................................................................................................................................................................................................................................... 1646 SM 7-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-2: Create ASAP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Select the ASAP AID from the drop-down list as shown in the figure. Figure 7-6 ASAP AID

...................................................................................................................................................................................................

4

Enter the User Label. ...................................................................................................................................................................................................

5

Click search to view the list of ASAP AID. Figure 7-7 ASAP AID list

...................................................................................................................................................................................................

6

Select the ASAP AID.

.................................................................................................................................................................................................................................... 1646 SM 7-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-2: Create ASAP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

7

Click on view to view the details of the selected ASAP AID Figure 7-8 ASAP AID details

...................................................................................................................................................................................................

8

Click cancel to return back to the previous page. ...................................................................................................................................................................................................

9

Click create to configure new ASAP profile. The following screen is displayed. Figure 7-9 Create ASAP

.................................................................................................................................................................................................................................... 1646 SM 7-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-2: Create ASAP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

10

The create ASAP panel parameters are described in the following table. Table 7-1

Create ASAP parameters

Parameter

Description

ASAP type

Specifies the ASAP type for which the ASAP profile can be created. The values are EQPT, BITS, TIMING, SECU, GBE, STM1, STM4, STM16, VC4, VC44C, LOVC3, LOVC12,E1,E3,T3,VCG,T1

User Label

Specifies the User Label. System assigned values for User Label are in the format LBL-ASAP-
Default

The values are Y of N.

Clone From

Specifies the following ASAP-AID parameters using the index number greater than equal to 5: •

NULL ASAP Proflie (0)- is used for the NULL ASAP which contains NR( Not Reported) notification code for all the conditions in the ASAP type.



FACTORY DEFAULT ASAP(1) - is used for the factory default ASAP



NOT PRIMARY COND.(2) - is used for the primary conditions which are not disabled.



ASAP Prof. FERF-AIS CONDITION Disabled (3)- is used for FERF and AIS conditions disabled.



ALL CONDITION ASAP Profile(4)- is used for all conditions enabled.

...................................................................................................................................................................................................

11

Click save to save all the settings ...................................................................................................................................................................................................

12

Click cancel to revoke all changes and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 7-7 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-3: Modify or Delete an ASAP profile

....................................................................................................................................................................................................................................

Procedure 7-3: Modify or Delete an ASAP profile When to use

This procedure allows to modify or delete an Alarm Severity Assigned Profile (ASAP)Management instance for a given profile type. Procedure ...................................................................................................................................................................................................

1

Select the ASAP-AID to be modified as shown in the figure Figure 7-10 Modify ASAP-AID

...................................................................................................................................................................................................

2

Modify the settings and click on save. ...................................................................................................................................................................................................

3

Click cancel to revoke all changes and return to the previous page.

.................................................................................................................................................................................................................................... 1646 SM 7-8 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-3: Modify or Delete an ASAP profile

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

To delete an ASAP profile select the ASAP AID to be deleted and click delete as shown in the figure. Figure 7-11 Delete ASAP AID

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 7-4: ALM cutoff When to use

Use this procedure to stop the office audible alarm indications.

.................................................................................................................................................................................................................................... 1646 SM 7-9 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-4: ALM cutoff

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Alarms → ALM CUTOFF option from the menu bar. Figure 7-12 Alarm cutoff

...................................................................................................................................................................................................

2

Click on SEND functional button a command cuts off the office audible alarm indications without changing the local alarm reporting. ...................................................................................................................................................................................................

3

OPERATION COMPLETED or OPERATION FAILED message is displayed.

The currently active audible alarm indications will be silenced. The visual alarm indications are not affected. Future alarm reporting is not be affected and new audible alarm indications will be provided for any new alarms. The ACO LED turns on and a new alarm arrives, it is presented to the audible closures and the ACO LED switches off. Alarms silenced is not presented to the Audible closures even if they are still present (only new alarms). E................................................................................................................................................................................................... N D O F S T E P S

Procedure 7-5: ALM resynch. When to use

Use this procedure to update the alarm database to the current alarm situation.

.................................................................................................................................................................................................................................... 1646 SM 7-10 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-5: ALM resynch.

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Alarms → Resynch. option from the menu bar. Figure 7-13 Refresh alarms

...................................................................................................................................................................................................

2

Click Resynchronize, a command refreshes the alarms and the relevant information is referred. ...................................................................................................................................................................................................

3

OPERATION COMPLETED or OPERATION FAILED message is displayed. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 7-6: Condition log When to use

Use this procedure to collect the alarm history report from the NE.

.................................................................................................................................................................................................................................... 1646 SM 7-11 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-6: Condition log

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Alarms → Condition Log option from the menu bar. Figure 7-14 Alarm log

...................................................................................................................................................................................................

2

The Alarm Log tab displays the Filter by panel that contains the following parameters. Table 7-2

Alarm log parameters

Parameter

Description

Domain

Specifies the domain for filtering the alarm. The values are ALL, TDM, and DATA. Note1: If the selected Domain value is DATA, the widow displays Severity drop down, the values are: CRITICAL, MAJOR, MINOR, WARNING, and CLEARED. Note2: If the selected Domain value is ALL, the Event Type and Aid Type parameters are not available.

Event Type

Specifies the event type that triggers alarm. The values is ALM.

Aid Type

Specifies the Access Identifier type.

From Date & Time

Specifies From date & time to apply filter to the alarm.

To Date & Time

Specifies To data & time to apply filter to the alarm.

...................................................................................................................................................................................................

3

The Search link allows to filter the alarm details based on the selection criteria. ...................................................................................................................................................................................................

4

The Reset Criteria link allows to reset the new criteria to apply the filter. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 7-12 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

Procedure 7-7: Housekeeping support When to use

The NE will be able to receive and process three separate customer-defined inputs for fault conditions arising externally to the NE. The fault conditions will be processed and reported as for internally detected fault conditions. It will be possible to disable the reporting from any input if not used. The inputs will be capable of interfacing to a dry relay contact, that is, an input will comprise two wire interfaces capable of detecting an open or closed circuit condition between the two connections. Each user alarm input is separately configured to accept either a closed circuit or open circuit state as the active alarm condition. The inputs from the dry contacts are normally used for site specific alarms such as open door, high temperature, high water level, and so on. The polarity of an external input control determines the relationship between the declaration of an environmental condition and the physical signal. The NE shall drive one separate output station controls for customer defined, site specific facilities external to the NE, such as air conditioning, generators, and so on. Operating an external control means that a relay is activated to control some external device. Releasing an external control means deactivating the relay. The polarity of an external output control determines the relationship between the control state (CONTSTATE) value and the physical signal. Provisioning of housekeeping alarms and controls is persistent Customer access to the Housekeeping (HKP) connections is through 25 pin D-Sub connector on the NE user access panel. Input Points ...................................................................................................................................................................................................

1

From the Alarms menu, Select Housekeeping → Input Points. Figure 7-15 Input Points shelf selection panel

...................................................................................................................................................................................................

2

Select the Shelf Access Identifier from the drop-down list. ...................................................................................................................................................................................................

3

Click Continue.

.................................................................................................................................................................................................................................... 1646 SM 7-13 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

Result: The following screen appears. Figure 7-16 Input points attributes

...................................................................................................................................................................................................

4

The Input points attributes panel contains the following parameters. Table 7-3

Input points attributes panel parameters

Parameter

Description

Alarm Access Identifier

Specifies the Alarm Access Identifier.

Notification Code

Specifies the Notification Code.

Alarm Type

Specifies the type of alarm.

Alarm Message

Specifies the alarm message.

Polarity

Specifies the type of polarity. The polarity of an external input control determines the relationship between the declaration of an environmental condition and the physical signal.

...................................................................................................................................................................................................

5

Select View under the Alarm Access Identifier column. Result: The following screen appears Figure 7-17 Alarms report

E................................................................................................................................................................................................... N D O F S T E P S .................................................................................................................................................................................................................................... 1646 SM 7-14 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

Output Points ...................................................................................................................................................................................................

1

From the Alarms menu, Select Housekeeping → Output Points. Result: The Select Shelf panel appears. ...................................................................................................................................................................................................

2

Select the Shelf Access Identifier from the drop-down list. ...................................................................................................................................................................................................

3

Click Continue. Result: The following screen appears. Figure 7-18 Operate/Release Output Points

...................................................................................................................................................................................................

4

Select the Access Identifier that requires the Action. ...................................................................................................................................................................................................

5

Click Release to release (deactivate) the External Control Output Points. Note: Releasing an external control means deactivating the relay. ...................................................................................................................................................................................................

6

Click Operate to operate (activate) the External Control Output Points. Note: Operating an external control means that a relay is activated to control some external device. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 7-15 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Alarm Management

Procedure 7-7: Housekeeping support

....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM 7-16 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

8

Synchronization 8

Overview Purpose

Provides an overview of the chapter contents and an introduction to Time and Alarm Synchronization. Contents Synchronization menu

8-1

Procedure 8-1: Modify BITS-0

8-2

Procedure 8-2: Modify BITS-1

8-4

Procedure 8-3: Modify BITS-OUT0

8-5

Procedure 8-4: Modify BITS-OUT1

8-7

Procedure 8-5: Administer system timing BITS

8-8

Synchronization outgoing

8-16

Synchronization menu This menu allows the operator to manage the ports dedicated to BITS (Building Integrated Timing Source) facilities for clock distribution purposes. A BITS output reference is a DS1 signal. The menu options are: •

BITS - Allows to modify the characteristics (BITS-0 as Primary and BITS-1 as

• •

Secondary) and the outgoing port of reference clock. Synchronization - Allows to modify the parameters of the synchronization system. Synch. Outgoing - Allows to modify the parameters of the synchronization outgoing.

................................................................................................................................................................................................................................... 1646 SM 8-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-1: Modify BITS-0

....................................................................................................................................................................................................................................

Procedure 8-1: Modify BITS-0 When to use

Use this procedure to edit bit 0 related to a given shelf. Procedure ...................................................................................................................................................................................................

1

Select Synchronization → Bits → Modify BITS 0. The following panel appears. Figure 8-1 BITS Select shelf panel

...................................................................................................................................................................................................

2

Select the Shelf Access Identifier from the drop-down list. ...................................................................................................................................................................................................

3

Click Continue to continue with the operation.

.................................................................................................................................................................................................................................... 1646 SM 8-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-1: Modify BITS-0

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

The following screen appears. Figure 8-2 Modify BITS 0

The Modify BITS panel contains the following fields: •

Access Identifier - Specifies the access identifier for the selected BITS



Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-NOSSM,

or 2MBIT-SSM •



SA Bit Location - Specifies the SA bit location used to carry the SSM information. The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the previous existing value. If the existing value is empty. The default existing value is SA4. SSM Supported - Specifies whether the timing input port supports SSM or not. The values are Y and N.

...................................................................................................................................................................................................

5

The Save link is used to send the related command to the Network Element. Automatically the Modify BITS page is loaded to show updated data. ...................................................................................................................................................................................................

6

A further panel Alarms allows to display the alarms relevant to the BITS. Click View hyperlink to view the alarms. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 8-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-2: Modify BITS-1

....................................................................................................................................................................................................................................

Procedure 8-2: Modify BITS-1 When to use

Use this procedure to edit bit 1 related to a given shelf. Procedure ...................................................................................................................................................................................................

1

Select Synchronization → Bits → Modify BITS 1. The following panel appears. Figure 8-3 BITS 1 Select shelf panel

...................................................................................................................................................................................................

2

Select the Shelf Access Identifier from the drop-down list. ...................................................................................................................................................................................................

3

Click Continue to continue with the operation. ...................................................................................................................................................................................................

4

The following screen appears. Figure 8-4 Modify BITS 1

The Modify BITS panel contains the following fields: •

Access Identifier - Specifies the access identifier for the selected BITS



Signal Format - Specifies the signal format. The values are 2MHZ, and 2MBIT-SSM

.................................................................................................................................................................................................................................... 1646 SM 8-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-2: Modify BITS-1

....................................................................................................................................................................................................................................





SA Bit Location - Specifies the SA bit location used to carry the SSM information. The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the previous existing value. If the existing value is empty. The default existing value is SA4. SSM Supported - Specifies whether the timing input port supports SSM or not. The values are Y and N.

...................................................................................................................................................................................................

5

The Save link is used to send the related command to the Network Element. Automatically the Modify BITS page is loaded to show updated data. ...................................................................................................................................................................................................

6

A further panel Alarms allows to display the alarms relevant to the BITS. Click View hyperlink to view the alarms. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 8-3: Modify BITS-OUT0 When to use

Use this procedure to edit to search and edit bit out related to a given shelf Procedure ...................................................................................................................................................................................................

1

Select Synchronization → Bits → Modify BITS OUT0. The following panel appears. Figure 8-5 Modify BITS OUT Select shelf panel

...................................................................................................................................................................................................

2

Select the Shelf Access Identifier from the drop-down list. ...................................................................................................................................................................................................

3

Click Continue to continue with the operation.

.................................................................................................................................................................................................................................... 1646 SM 8-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-3: Modify BITS-OUT0

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

The following screen appears. Figure 8-6 Modify BITS OUT0 panel

...................................................................................................................................................................................................

5

The Modify BITS panel contains the following fields: •

Access Identifier - Specifies the access identifier for the selected BITS



Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-NOSSM,

or 2MBIT-SSM •



• •

• •



SA Bit Location - Specifies the SA bit location used to carry the SSM information.

The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the previous existing value. If the existing value is empty. The default existing value is SA4. Transmitted ESF - Specifies if the output signal is the DUS message or is the actual SSM value. The values are DUS and ACT. The default value is the previous existing value. If the existing value is empty. The default existing value is DUS. Enable Output - Specifies the output mode to which the facility is set. The values are Y and N. The default value is N. AIS Mode - Specifies which signal is inserted for the timing output port if the output signal is squelched. The values are AISMODE and QLMODE. The default values is the previous value. If the existing value is empty, the default factory value is QLMODE. Outgoing Signal Quality - Specifies the quality value level for the out-going signal at the timing output port. The values are PRC, SSUL, SSUT, SEC, and DUS. SA Bit Location - Specifies the SA bit location used to carry the SSM information. The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the previous existing value. If the existing value is empty. The default existing value is SA4. SSM Supported - Specifies whether the timing input port supports SSM or not. The values are Y and N.

.................................................................................................................................................................................................................................... 1646 SM 8-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-3: Modify BITS-OUT0

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

6

Click Save that is used to send the related command to the Network Element. Automatically the Modify BITS OUT page is loaded to show updated data. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 8-4: Modify BITS-OUT1 When to use

Use this procedure to edit to search and edit bit out related to a given shelf Procedure ...................................................................................................................................................................................................

1

Select Synchronization → Bits → Modify BITS OUT1. The following panel appears. Figure 8-7 Modify BITS OUT1 Select shelf panel

...................................................................................................................................................................................................

2

Select the Shelf Access Identifier from the drop-down list. ...................................................................................................................................................................................................

3

Click Continue to continue with the operation. ...................................................................................................................................................................................................

4

The following screen appears. Figure 8-8 Modify BITS OUT1 panel

.................................................................................................................................................................................................................................... 1646 SM 8-7 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-4: Modify BITS-OUT1

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

The Modify BITS panel contains the following fields: •

Access Identifier - Specifies the access identifier for the selected BITS



Signal Format - Specifies the signal format. The values are 2MHZ, 2MBIT-SSM



SA Bit Location - Specifies the SA bit location used to carry the SSM information. The values are SA4, SA5, SA6, SA7, and SA8. The default menu value is the previous existing value. If the existing value is empty. The default existing value is SA4. Transmitted ESF - Specifies if the output signal is the DUS message or is the actual SSM value. The values are DUS and ACT. The default value is the previous existing value. If the existing value is empty. The default existing value is DUS. Enable Output - Specifies the output mode to which the facility is set. The values are Y and N. The default value is N. AIS Mode - Specifies which signal is inserted for the timing output port if the output signal is squelched. The values are AISMODE and QLMODE. The default values is the previous value. If the existing value is empty, the default factory value is QLMODE. Outgoing Signal Quality - Specifies the quality value level for the out-going signal at the timing output port. The values are PRC, SSUL, SSUT, SEC, and DUS. SSM Supported - Specifies whether the timing input port supports SSM or not. The values are Y and N.



• •

• •

...................................................................................................................................................................................................

6

Click Save that is used to send the related command to the Network Element. Automatically the Modify BITS OUT page is loaded to show updated data. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 8-5: Administer system timing BITS When to use

Use this procedure to retrieve, edit, remove, and restore Building Integrated Timing Source (BITS) timing and to switch system clock synchronization from one reference to the other. General

Time Division Multiplexing (TDM) ports provides external synchronization from a network timing source to the system. Under normal conditions, all terminating and outgoing STMn’s have identical average frequency derived from the network timing source.

.................................................................................................................................................................................................................................... 1646 SM 8-8 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

The Network Element (NE) utilizes external Building Integrated Timing Supply (BITS) timing to synchronize the system. BITS timing signal enters the system either directly via the backplane (Rear Access Shelf) or via dedicated front plane integral, a panel just below the fan. The following clock modes are supported: •





Locked mode (normal mode) - Steady state, the SETG generated clock signal is controlled by the selected external timing reference determined by the T0 selection process Holdover mode - Steady state. The operating condition of a clock that has lost its references and is using data previously acquired (when it was operating in the normal mode) to control its output signal. Free-running mode - Temporary operating mode. The operating condition when the output signal is totally internally controlled with no influence of a present or previous reference.

Procedure ...................................................................................................................................................................................................

1

Select Synchronization → Synchronization → Search. The following panel appears. Figure 8-9 Synchronization panel

...................................................................................................................................................................................................

2

Select the access identifier from the Access Identifier drop-down list. The values are: • • • •

ALL SYNC EXTREF LINEREFSYS

.................................................................................................................................................................................................................................... 1646 SM 8-9 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click Search to retrieve the synchronization timing BITS. Figure 8-10 Retrieve synchronization timing entity

...................................................................................................................................................................................................

4

The Retrieve Synchronization displays the following SHELF timing entities: • •

System timing entity Reference timing entity

...................................................................................................................................................................................................

5

Click the radio button under Select column to set the access identifier.

.................................................................................................................................................................................................................................... 1646 SM 8-10 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

6

Click Modify hyperlink to edit the system timing entity parameters as shown in the following figure. Figure 8-11 Modify Synchronization panel

...................................................................................................................................................................................................

7

The Access Identifier displays the system timing entity selected. ...................................................................................................................................................................................................

8

Set the Sync Messaging to either Y or N. Click Default to choose the default setting. ...................................................................................................................................................................................................

9

Click View to view the alarm profile for the selected timing entity from the Alarms panel. ...................................................................................................................................................................................................

10

Click Save to set the synchronization settings for the system timing entity and return to the Synchronization window. ...................................................................................................................................................................................................

11

Click Operate or Release hyperlinks to perform the operate and release functions on either system timing or references timing entities. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 8-11 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

Operate ...................................................................................................................................................................................................

1

Select Synchronization → Synchronization → Operate. The following panel appears. Figure 8-12 Operate - Modify synchronization switch

...................................................................................................................................................................................................

2

The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch panel that contains the following parameters: Parameter Switch Command

Description Specifies the switch command that is requested by the user. The values are:

Shelf Access Identifier



LOCKOUT



FRCD



MAN



INT

This is used to change the content of Switch To Reference parameter according to the selected shelf access identifier

.................................................................................................................................................................................................................................... 1646 SM 8-12 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

Parameter Switch To Reference

Description Specifies the access identifier of the synchronization facility The values are: •

EXTREF-1–1–0



EXTREF-1–1–1



LINEREFSYS-1–1–0



LINEREFSYS-1–1–1



SYNC-1–1–0

...................................................................................................................................................................................................

3

Click Operate to send the command to the agent. E................................................................................................................................................................................................... N D O F S T E P S

Release ...................................................................................................................................................................................................

1

Select Synchronization → Synchronization → Release. The following panel appears. Figure 8-13 Release - Modify synchronization switch

...................................................................................................................................................................................................

2

The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch panel that contains the following parameters: •

Switch Command - Specifies the switch command that is requested by the user. The



values are CLOCKSWITCH and REFSWITCH Shelf Access Identifier - This is used to change the content of Switch To Reference parameter according to the selected shelf access identifier



Access Identifier

.................................................................................................................................................................................................................................... 1646 SM 8-13 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

The values are: – SYNC – –

EXTREF LINEREFSYS Parameter

Switch Command

Description Specifies the switch command that is requested by the user. The values are: •

CLOCKSWITCH



REFSWITCH

Shelf Access Identifier

This is used to change the content of Switch To Reference parameter according to the selected shelf access identifier

Switch To Reference

Specifies the access identifier of the synchronization facility The values are: •

EXTREF-1–1–0



EXTREF-1–1–1



LINEREFSYS-1–1–0



LINEREFSYS-1–1–1



SYNC-1–1–0

...................................................................................................................................................................................................

3

Click Release to send the TL1 command to the agent. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 8-14 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

....................................................................................................................................................................................................................................

Retrieve Synchronization Message ...................................................................................................................................................................................................

1

Select Synchronization → Synchronization → Sync. message. The following panel appears. Figure 8-14 Retrieve Synchronization Message panel

...................................................................................................................................................................................................

2

The Synchronization Message tab displays the Retrieve Synchronization Message panel that displays the following parameters: •

Shelf Access Identifier - This is used to change the access identifier according to the



selected shelf identifier Access Identifier - Specifies the access identifier of the synchronization facility

...................................................................................................................................................................................................

3

The Search link sends the TL1 command to the agent and results are displayed in the following Synchronization Message Search page. Figure 8-15 Search synchronization message results

.................................................................................................................................................................................................................................... 1646 SM 8-15 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Procedure 8-5: Administer system timing BITS

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

The Retrieve Synchronization Message table contains the following columns: •

Access Identifier - Specifies the timing entity facility



Incoming SSM Message - Specifies the actual quality value for the incoming SSM

derived from corresponding OH byte value of a timing reference. E................................................................................................................................................................................................... N D O F S T E P S

Synchronization outgoing This option contains the following sub-menu options: •

Search - To retrieve and edit outgoing synchronization resources related to a given

shelf •

Operate - To operate switching outgoing synchronization resources related to a given

shelf •

Release - To release switching outgoing synchronization resources related to a given

shelf Search ...................................................................................................................................................................................................

1

Select Synchronization → Synch. Outgoing → Search. The following panel appears. Figure 8-16 Synchronization Outgoing Search

...................................................................................................................................................................................................

2

The Synchronization Outgoing tab displays the Synchronization Outgoing panel that contains the following parameters: •

Shelf Access Identifier - This is used to change the content of Access Identifier



parameter according to the selected shelf Access Identifier - Specifies the access identifier of the synchronization facility

...................................................................................................................................................................................................

3

Click Search to retrieve the shelf information based on the selection. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 8-16 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Synchronization outgoing

....................................................................................................................................................................................................................................

Operate ...................................................................................................................................................................................................

1

Select Synchronization → Synch. Outgoing → Operate. The following panel appears. Figure 8-17 Modify Synchronization Switch Outgoing Operate

...................................................................................................................................................................................................

2

The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch Outgoing panel that contains the following parameters: • • •

Switch Command - Specifies the switch command that is requested by the user. The

values are LOCKOUT, FRCD, and MAN Shelf Access Identifier - This is used to change the content of Switch To Reference parameter according to the selected shelf access identifier Switch To Reference - Specifies the access identifier of the synchronization facility

...................................................................................................................................................................................................

3

The Operate link sends the TL1 command to the agent. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 8-17 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Synchronization

Synchronization outgoing

....................................................................................................................................................................................................................................

Release ...................................................................................................................................................................................................

1

Select Synchronization → Synch. Outgoing → Release. The following panel appears. Figure 8-18 Modify Synchronization Switch Outgoing Release

...................................................................................................................................................................................................

2

The Synchronization Switch Outgoing tab displays the Modify Synchronization Switch Outgoing panel that contains the following parameters: •

Shelf Access Identifier - This is used to change the content of the Access Identifier



parameter according to the selected shelf access identifier Access Identifier - Specifies the access identifier of the synchronization facility

...................................................................................................................................................................................................

3

The Release link sends the TL1 command to the agent. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 8-18 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

9

Security 9

Overview Purpose

This section is related to security within the Zero Installation Craft (ZIC) terminal. The functions of configuration and installation are accessible only to the administrator. Provides an overview of the Security menu and features. Contents Procedure 9-1: Change user password

9-2

Procedure 9-2: Retrieve user information

9-3

Procedure 9-3: Create user account

9-3

Procedure 9-4: Change user account

9-5

Procedure 9-5: Modify account default settings

9-8

Procedure 9-6: View current sessions

9-9

Procedure 9-7: Modify command privileges

9-10

Procedure 9-8: Manage audit

9-12

Procedure 9-9: Log settings

9-14

Procedure 9-10: Modify in progress message settings

9-16

................................................................................................................................................................................................................................... 1646 SM 9-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-1: Change user password

....................................................................................................................................................................................................................................

Procedure 9-1: Change user password When to use

Use this procedure to change or configure the password used when logging into a Network Element (NE). Procedure ...................................................................................................................................................................................................

1

Select Security → User Account → Change Password option from the menu bar. Figure 9-1 Change user password

...................................................................................................................................................................................................

2

The User Identifier and Old Password ID entry boxes display the user name and password with which the user has logged in. ...................................................................................................................................................................................................

3

Enter the new password in the New Password ID entry box. Enter the same password in Confirm New Password ID entry box. ...................................................................................................................................................................................................

4

Click Save to set the newly entered password. ...................................................................................................................................................................................................

5

The system generates an error message if the newly entered password is violating the password naming convention. Go to Step 3 to re-enter the correct string. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 9-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-2: Retrieve user information

....................................................................................................................................................................................................................................

Procedure 9-2: Retrieve user information When to use

Use this procedure to retrieve user information. Procedure ...................................................................................................................................................................................................

1

Select Security → User Account → Information. ...................................................................................................................................................................................................

2

The following screen appears. Figure 9-2 User information

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 9-3: Create user account When to use

Use this procedure to create a user account.

.................................................................................................................................................................................................................................... 1646 SM 9-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-3: Create user account

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Security → Administration → Accounts → Create Account. Figure 9-3 Create user account

...................................................................................................................................................................................................

2

This panel lists the parameters described in the following table: Table 9-1

Create user account panel parameters

Parameter

Description

User Identifier

Allows to enter the user id

Password Identifier

Allows to enter the user password

Confirm Password Identifier

Allows the re-enter the user password to confirm

Password Duration [day]

Allows to enter the validity of the password. Default is 30 days.

Warning on Password Duration [day]

Allows to enter the warning period of the password. Default is 7 days.

Access after Password Duration

Default is 3 days.

Password Obsolescence Interval [day]

Default is 180 days.

User ID Duration [day]

Default is 60 days.

.................................................................................................................................................................................................................................... 1646 SM 9-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-3: Create user account

....................................................................................................................................................................................................................................

Table 9-1

Create user account panel parameters

(continued)

Parameter

Description

Available User Access Privileges

This table lists the Available User Access Privileges.

User Access Privileges

This table lists the current User Access Privileges

SNMPv3 Privacy Protocol

Default is NOPRIV.

SNMPv3 Authorization Protocol

Default is NOAUTH.

...................................................................................................................................................................................................

3

Click Save to save the settings. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 9-4: Change user account When to use

Use this procedure to change user account details. Procedure ...................................................................................................................................................................................................

1

Select Security → Administration → Accounts → Change Account.

.................................................................................................................................................................................................................................... 1646 SM 9-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-4: Change user account

....................................................................................................................................................................................................................................

The following screen is displayed. Figure 9-4 Change User information

.................................................................................................................................................................................................................................... 1646 SM 9-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-4: Change user account

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The panel displays the following parameters. Table 9-2

Change User information window

Parameter

Description

ACTION

This allows to take the following actions: •

Modify Account



Inhibit User



Allow User



Delete Account

User Identifier

Specifies a unique user ID

User Access Privileges

Specifies the User access privileges granted to the user. Values are: •

Read-only (READ)



Provision (PROV)



Configure (CONF)



Network Administrator (NETADMIN)



Security Administrator (SEC)



Test (DEBUG)



No link timeout (NOTMOUT)

User State

This shows the new user's login password. The values that can be displayed are Active and Suspended

Password Duration [day]

Specifies the number of days of validity for the password.

Warning on Password Duration [day]

This shows the number of days after the expiration date, that is allowed for the user to change the password.

Access after Password Duration

This shows the number of times that a user can log in after Password expiration.

0 (zero) means that Password aging is disabled

0 (zero) means that grace period after password expiration is disabled.

0 (zero) means that the grace extra log-in after password expiration is disabled. Password Obsolescence Interval [day]

This shows the minimum time interval that is required if the User wishes to use a password that was already used.

Password Expiration date and time

Specifies the expiry date and time for the password.

User ID Duration [day]

This shows the aging or expiry interval of a particular User Id.

0 (zero) means that reuse of old passwords is disabled.

0 (zero) means that User ID aging is disabled.

.................................................................................................................................................................................................................................... 1646 SM 9-7 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-4: Change user account

....................................................................................................................................................................................................................................

Table 9-2

Change User information window

(continued)

Parameter

Description

Login Fails Number

Specifies the number of unsuccessful authentication (login) attempts since the last authenticated session.

Last Login TimeStamp

This shows the last recorded Login time of a user.

Keep Alive Message Interval [min]

This shows the time interval, in minutes, after which the NE shall send a KEEP ALIVE MESSAGE on a TCP connection inactivity. The value range is 0 - 240. 0 (zero) means that KEEP ALIVE MESSAGE sending is disabled.

Minimum Interval between invalid attempts [sec]

This shows the minimum interval, in seconds, between invalid login attempts before an NE shall logout a user and lockout the user channel. The value range is 0 - 60. 0 (zero) means no minimum interval between consecutive invalid login attempts.

Maximum Invalid Attempts

This shows the maximum number of invalid login attempts before an NE shall logout a user and lockout the user channel. The value range is 0 15. 0 (zero) means that no limit to the invalid login attempts.

User Session Inactivity Timeout [min]

This shows User Session Activity Link TimeOut, specifies the amount of time (in minutes) that the User Session link is inactive with regards to user TL1 input before a user session link time-out occurs. 0 (zero) means that no user session link time–out will occur (disabled).

SNMPv3 Privacy Protocol

This parameter allows enabling/disabling of the configuration of the SNMPv3 privacy protocol. NOPRIV means that privacy is disabled for this user.

SNMPv3 Authorization Protocol

This parameter allows enabling/disabling of the configuration of the SNMPv3 authorization protocol. NOAUTH means that authorization is disabled for this user.

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 9-5: Modify account default settings When to use

Use this procedure to modify account default settings. Procedure ...................................................................................................................................................................................................

1

Select Security → Administration → Accounts → Default settings.

.................................................................................................................................................................................................................................... 1646 SM 9-8 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-5: Modify account default settings

....................................................................................................................................................................................................................................

The following screen is displayed. Figure 9-5 Modify account default settings panel

...................................................................................................................................................................................................

2

See Table 9-2, “Change User information window” (p. 9-7) for parameter description. ...................................................................................................................................................................................................

3

Click Default hyperlink next to each parameter to enter the default settings. ...................................................................................................................................................................................................

4

Click Save to save the settings entered on the page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 9-6: View current sessions When to use

Use this procedure to view current sessions. ...................................................................................................................................................................................................

1

Select Security → Administration → Current Sessions. Figure 9-6 Current sessions

.................................................................................................................................................................................................................................... 1646 SM 9-9 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-6: View current sessions

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

This panel lists the parameters described in the following table. Table 9-3

Current sessions

Parameters

Description

Action

Contains the Log Off User hyperlink which allows to close the session

User Identifier

Specifies a unique user ID (e.g. ALCATEL)

Session

Specifies by a unique identifier allocated to a client connection that distinguishes that connection from other connections in the system

Address

Specifies the address where the user is connecting from. It is the port/IP address that is being used for access. If a non IP port is used to connect to the NE, the values DCC, LAN, USB, RS232 are used

Last login timestamp

Specifies by a quoted string the last recorded Login time of a user. This time is displayed every time a user logs in

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 9-7: Modify command privileges When to use

Use this procedure to modify command privileges.

.................................................................................................................................................................................................................................... 1646 SM 9-10 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-7: Modify command privileges

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Security → Administration → Command Privileges. Figure 9-7 Command Access Privileges page

.................................................................................................................................................................................................................................... 1646 SM 9-11 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-7: Modify command privileges

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The page the command security privileges assigned to the specified TL1 command. The columns of the table are: •

Action - Contains the hyperlinks in order to modify the security privilege. The

manager actions related to these hyperlinks are: – The Modify hyperlink activates the following Modify Command Access Privileges page. Figure 9-8 Modify Command Access Privileges panel



Command Identifier - Specifies the TL1 command code. The value for the parameter



can be any one of the TL1 command codes, in upper or lower case. Command Access Privilege - Allows to choose the User access privileges granted to the user.

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 9-8: Manage audit When to use

Use this procedure to activate the Audit Security Log page and retrieve audit log.

.................................................................................................................................................................................................................................... 1646 SM 9-12 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-8: Manage audit

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Security → Administration → Audit. Figure 9-9 Retrieve audit log

...................................................................................................................................................................................................

2

The Audit Log tab contains the Retrieve Audit Log panel with the following parameters: • • •

From - Specifies the beginning date and time used to filter the response messages. By

means the combo-boxes it is possible to change data and time. To - Specifies the beginning date and time used to filter the response messages. By means the combo-boxes it is possible to change data and time. Set User Identifier - The combo-box allows to select the user identifier.

.................................................................................................................................................................................................................................... 1646 SM 9-13 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-8: Manage audit

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

The Retrieve hyperlink send the command to the agent, then the Retrieve Audit Log page is reloaded and the table with Security log is displayed Figure 9-10 Retrieve audit page with results

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 9-9: Log settings When to use

Use this procedure to manage the log sessions.

.................................................................................................................................................................................................................................... 1646 SM 9-14 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-9: Log settings

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Security → Administration → Log Settings. Figure 9-11 Modify log attributes

...................................................................................................................................................................................................

2

The Modify Log Attributes page is made up of description of the TL1 command and the Modify Log Attributes panel that contains: • •

• •



Current Log File Max Size [Mbyte] - Specifies the size, in 1 Megabyte blocks, of the

Security Log File system's disk buffer. New Log File Max Size [Mbyte] - Allows to change the size, in 1 Megabyte blocks, of the Security Log File system's disk buffer. When the SECULOG has reached its max size, the SECULOG wraps reducing its size to the 70% of its max size discarding the oldest events (30%). The Default hyperlink allows to set the relevant value automatically. Current Warning Message - This is the provisioned user-logon warning message is shown New Warning Message - Allows to provision a new user-logon warning message. The Default hyperlink allows to set the relevant warning message automatically. The Set Empty hyperlink allows to deplete the entry field. Current Log Events - Specifies the current log event.

.................................................................................................................................................................................................................................... 1646 SM 9-15 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-9: Log settings

....................................................................................................................................................................................................................................





Available Log Events - Specifies the list of events that, upon their occurrence, are

included in the security log (i.e., events that are specified for logging, if they occur). The values are: – Authentication Event (EIUA) - It logins, logoffs, invalid user authentication attempts and the alarms/alerts generated due to the invalid authentication attempts – Changes to the User's Security Accounts (EUSP) - Specifies the details of the changes made in a user's security profiles and attributes – Changes to the NE/NS Security Configuration (ESCC) - Specifies the details of changes made in the NE/NS security configuration – Changes to NE/NS resources (ECMR) - Specifies the creation and modification of NE/NS resources performed via standard operations and maintenance procedures. This does not address creations and modifications carried offline. Commands creating log events of this type are all the commands not mentioned in the lists above, having Y in the security field of the command security table – All Events (ALL) - All events New Log Events - This shows the log events for the command. The entry box has the Default hyperlink in order to set the User access privileges forecast for the account.

They can be copied or removed from one of the entry box using the left or right arrow buttons available between the two entry boxes. ...................................................................................................................................................................................................

3

Click Save hyperlink to send the command to the agent; the main page is reloaded. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 9-10: Modify in progress message settings When to use

Use this procedure to modify in progress message settings.

.................................................................................................................................................................................................................................... 1646 SM 9-16 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-10: Modify in progress message settings

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Security → Administration → IP Message Settings. Figure 9-12 Modify in progress message settings panel

...................................................................................................................................................................................................

2

The Modify In Progress Message Settings panel is displayed that contains the following parameters: •

IP Message Interval Time [sec] - Allows to enter IP Message Interval Time in

seconds. •

IP Message Interval Time - Specifies the IP Message Interval Time.

...................................................................................................................................................................................................

3

Click Save to save the settings. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 9-17 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Security

Procedure 9-10: Modify in progress message settings

....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM 9-18 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

10

10 Provisioning: Detailed level Procedures

Overview Purpose

Provides an overview of the detailed level procedures documented in this chapter. Contents Procedure 10-1: Log into the system

10-2

Procedure 10-2: Log out of the system

10-3

Procedure 10-3: Retrieve software version

10-4

Procedure 10-4: In-Service Upgrade

10-6

Procedure 10-5: Initialize and Upgrade with a new release

10-7

Procedure 10-6: DB management remote file copy

10-7

Procedure 10-7: DB management cancel remote file copy

10-10

Procedure 10-8: Network Element management

10-11

Procedure 10-9: LAC Management

10-12

Procedure 10-10: MAC File Collection

10-14

Procedure 10-11: Administer NTP

10-15

Procedure 10-12: Network IF

10-18

Procedure 10-13: OSI ULC Report

10-20

Procedure 10-14: Create Overhead XC

10-21

Procedure 10-15: Create linear MSP

10-23

Procedure 10-16: Create MS-SPRing

10-25

Procedure 10-17: Create Provider Bridge Service

10-27

Procedure 10-18: LAG management

10-29

Procedure 10-19: IGMP Snooping

10-34

Procedure 10-20: Remove LAG member

10-34

Procedure 10-21: Retrieve system information

10-39

................................................................................................................................................................................................................................... 1646 SM 10-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Overview

....................................................................................................................................................................................................................................

Procedure 10-22: Create IP route

10-40

Procedure 10-23: Create IP tunnel

10-42

Procedure 10-24: NE TL1 Parameter

10-44

Procedure 10-25: TL1 console

10-44

Procedure 10-26: Create FTP Server Configuration

10-48

Procedure 10-1: Log into the system When to use

Use this procedure to log into the Zero Installation Craft (ZIC) terminal. Procedure ...................................................................................................................................................................................................

1

See Procedure 2-1: “Establish ZIC session” (p. 2-3) for the initial steps to launch the ZIC session. ...................................................................................................................................................................................................

2

Enter the User Identifier and Password in the respective entry boxes, set the Language from the drop-down list box. The default is English. The default User is ALCATEL and password is Alcatel_1. ...................................................................................................................................................................................................

3

Enable the Local Time check box for the network element to display the local time.

.................................................................................................................................................................................................................................... 1646 SM 10-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-1: Log into the system

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

Click Login to log into the system, the browser starts loading the ZIC. Figure 10-1 ZIC loading

Note: After the maximum number of attempts the user is disabled. Check parameters for spelling and case-sensitive characters. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-2: Log out of the system When to use

Use this procedure to log out from the ZIC application. Procedure ...................................................................................................................................................................................................

1

To log out from the Zero Installation Craft (ZIC) terminal, click the Logout hyperlink displayed in the top right corner of the ZIC application. OR Select Security → Logout.

.................................................................................................................................................................................................................................... 1646 SM 10-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-2: Log out of the system

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The following window appears. Figure 10-2 Logout message screen

...................................................................................................................................................................................................

3

Click Yes to log out of ZIC terminal. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-3: Retrieve software version When to use

Use this procedure to obtain information about the software version. Procedure ...................................................................................................................................................................................................

1

From the menu bar, select Help → About option.

.................................................................................................................................................................................................................................... 1646 SM 10-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-3: Retrieve software version

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The following window message is displayed. Figure 10-3 About window

E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 10-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-4: In-Service Upgrade

....................................................................................................................................................................................................................................

Procedure 10-4: In-Service Upgrade When to use

Use this procedure for a software refresh. ...................................................................................................................................................................................................

1

Select System Management - rel="nofollow"> Initialize and Upgrade -> In-Service Upgrade -> Upgrade Status menu as shown in Figure 10-4, “In-Service Upgrade Status” (p. 10-6) Figure 10-4 In-Service Upgrade Status

...................................................................................................................................................................................................

2

The In-Service Upgrade Status tab displays status of the in-service upgrade. The status are: •

Download In Progress (DLIP) - Indicates that a COPY-RFILE command for software

package transfer is ongoing. • • •

Initialize New In Progress (INITNIP) - Indicates the INIT-SYS-NEW system

initialization process is in progress. No Status In Progress (NOSTAIP) - Indicates that no generic in-service upgrade procedure is in progress or has been attempted. Status Completed (STAC) - Indicates that the STA-ISU command completed successfully and is awaiting the issuance of the INIT-SYS-NEW command.

E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 10-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-5: Initialize and Upgrade with a new release

....................................................................................................................................................................................................................................

Procedure 10-5: Initialize and Upgrade with a new release When to use

This option starts the background activity on the NE to perform the actual switch over from the current release to the new release. This option returns a completion message to the user when the background activity is successfully started. A copy of the primary database is generated during its execution and used for database conversion in the upgrade processing. This backup is also used to revert to the old release database when the Initialize System With Old Release option is issued after the system is upgraded to the new release. Procedure ...................................................................................................................................................................................................

1

Select System Management → Initialize and Upgrade → Initialize System → With New Release. ...................................................................................................................................................................................................

2

The panel contains the Apply hyperlink that is used to start the new release downloading procedure. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-6: DB management remote file copy When to use

Use this procedure to perform remote file copy.

.................................................................................................................................................................................................................................... 1646 SM 10-7 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-6: DB management remote file copy

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select System Management → DB Management → Remote File → Perform Copy. Figure 10-5 Copy remote file panel

.................................................................................................................................................................................................................................... 1646 SM 10-8 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-6: DB management remote file copy

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

This panel lists the parameters described in the following table. Table 10-1

Copy remote file panel parameters

Parameters

Description

From

Determines the location from which the DB remote file is to be copied. The supported values are:

To



Database backup on a Remote File Server (RFSDB) - Represents a database on a Remote File Server. Multiple instances of RFSDB can exist in different locations on an RFS. A specific instance is always addressed with this AID, with the addition of information in the LOCATION parameter in the command.



Software Generic on a Remote File Server (RFSSW) - Represents a software generic on a Remote File Server. Multiple instances of RFSSW can exist in different locations on an RFS. A specific instance is always addressed with this AID, with the addition of information in the LOCATION parameter in the command.



Local NE PM Global File collection (LOCPMGLB) - Represents the PM Global File Collection in the local NE. There is a maximum of one instance of LOCPMGLB in the NE.



LOCMACGLB (LOCMACGLB) - Represents the MAC File Collection in the local NE. There is a maximum of one instance of LOCMACGLB in the NE.



System's primary backup database (ACTDSKDB) - Represents the active database in the local NE .

Determines the location to which the DB remote file is to be copied. The supported values are: •

Database Backup on a Remote File Server (RFSDB)



Remote File Server PM Global File Collection (RFSPMGLB) Represents the PM Global File Collection on a Remote File Server. Multiple instances of RFSPMGLB can exist in different locations on an RFS.A specific instance is always addressed with this AID, with the addition of information in the LOCATION parameter in the command.



Remote File Server MAC File Collection (RFSMACGLB) Represents the MAC File Collection on a Remote File Server. Multiple instances of RFSMACGLB can exist in different locations on an RFS. A specific instance is always addressed with this AID, with the addition of information in the LOCATION parameter in the command.



System's primary backup database (ACTDSKDB)



Active software generic on the NE (ACTSW)

User

The user identifier used for the ftp connection on the RFS.

Password

The user password used for the ftp connection on the RFS

Host

The IP address of the host (the Remote File Server)

.................................................................................................................................................................................................................................... 1646 SM 10-9 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-6: DB management remote file copy

....................................................................................................................................................................................................................................

Table 10-1

Copy remote file panel parameters

(continued)

Parameters

Description

Port

The port number to connect to. Most schemes designate protocols that have a default port number.

URL Path

The details of how the specified resource (i.e. the directory where the file(s) reside) can be accessed.

...................................................................................................................................................................................................

3

Click Apply to apply the configuration settings. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-7: DB management cancel remote file copy When to use

Use this procedure to cancel the copy of remote file. Procedure ...................................................................................................................................................................................................

1

Select System Management → DB Management → Remote File → Cancel Copy. Figure 10-6 Cancel Copy of Remote File panel

.................................................................................................................................................................................................................................... 1646 SM 10-10 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-7: DB management cancel remote file copy

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The Remote file tab displays the Cancel Copy of Remote File panel that contains the following parameters. Table 10-2

Cancel Copy of Remote File panel parameters

Parameters

Description

From

Determines the location from which the DB remote file copy is to be cancelled. The supported values are:

To



Database backup on a Remote File Server (RFSDB)



Software Generic on a Remote File Server (RFSSW)



Local NE PM Global File collection (LOCPMGLB)



LOCMACGLB (LOCMACGLB)



System's primary backup database (ACTDSKDB)

Determines the location to which the DB remote file copy is to be cancelled. The supported values are: •

Database Backup on a Remote File Server (RFSDB)



Remote File Server PM Global File Collection (RFSPMGLB)



Remote File Server MAC File Collection (RFSMACGLB)



System's primary backup database (ACTDSKDB)



Active software generic on the NE (ACTSW)

...................................................................................................................................................................................................

3

Click Apply to apply the configuration settings. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-8: Network Element management When to use

Use this procedure to retrieve general system level configuration information consisting of: • • •

system type software release identifier software release date

• •

matrix size system restart status

.................................................................................................................................................................................................................................... 1646 SM 10-11 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-8: Network Element management

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select System Management → DB Management → Network Element. Figure 10-7 System configuration

...................................................................................................................................................................................................

2

The System Configuration tab displays the following general system level configuration information. • •

Access Identifier Matrix Size

• • • • •

Node Type Provision Mode Region Release Date Release Identification

• • •

System Restart Process Status System Type USER LABEL

E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-9: LAC Management When to use

Local Access Control (LAC) is used to manage the ZIC. This option displays the current and default status of the DB management.

.................................................................................................................................................................................................................................... 1646 SM 10-12 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-9: LAC Management

....................................................................................................................................................................................................................................

LAC state management ...................................................................................................................................................................................................

1

Select System Management → DB Management → Lac → State. Figure 10-8 LAC State Management panel

...................................................................................................................................................................................................

2

The LAC state tab displays the Lac State Management panel that contains the following parameters. Table 10-3

Lac state panel parameters

Parameters

Description

LAC current state

Specifies the current LAC state. The default value is Granted.

LAC state

Specifies the LAC state. The values are Requested or Denied. •

Requested - Indicates that the local CRAFT is waiting to get access the NE to send provisioning data.



Denied - Indicates that the local CRAFT is denied to access the NE to send provisioning data.

...................................................................................................................................................................................................

3

Click Save hyperlink to save the settings. E................................................................................................................................................................................................... N D O F S T E P S

LAC default management ...................................................................................................................................................................................................

1

Select System Management → DB Management → Lac → Default.

.................................................................................................................................................................................................................................... 1646 SM 10-13 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-9: LAC Management

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Click Save hyperlink to save the settings. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-10: MAC File Collection When to use

The mechanism of MAC File Collection is an efficient way of collecting MAC addresses of the entire NE in a single file. The collection of MAC data will be done on the basis of the input filtering, where the input filters consists of MAC address, slot AIDs and FDB IDs. The MAC File Collection then generated will contain one line (record) for every retrieved MAC address in the NE according to the input filtering. Procedure ...................................................................................................................................................................................................

1

Select System Management → MAC File Collection. Figure 10-9 MAC File Collection

.................................................................................................................................................................................................................................... 1646 SM 10-14 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-10: MAC File Collection

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The MAC File Collection tab displays the following panels. •

MAC File Collection Status



MAC File Collection

...................................................................................................................................................................................................

3

The MAC File Collection Status panel displays the Collection State and contains the following hyperlinks: • •

Refresh File View

...................................................................................................................................................................................................

4

The MAC File Collection panel displays the following parameters. Table 10-4

MAC File Collection panel parameters

Parameters

Description

MAC Address

Allows to enter the MAC Address

Board

Allows to select the board

VLAN

Specifies the input filtering VLAN for the collection preparation.

MAC Learning Type

Specifies the type of MAC learning. Dynamically Learned MAC and Static MAC

...................................................................................................................................................................................................

5

Click Set Empty to make the entries empty. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-11: Administer NTP When to use

This procedure provides the instructions to retrieve the Network Time Protocol (NTP) server IP address, provision NTP servers, and delete NTP servers. It also provides instructions to enable and disable the NTP synchronization. NTP servers are used for time-of-day synchronization when the NTP protocol is enabled. If no NTP server is entered and the NTP protocol is enabled, the time-of-day clock synchronizes with the last known internal clock frequency. When NTP is enabled, the NE internal time-of-day clock uses the calculated Coordinated Universal Time (UTC) from the selected NTP server, which is modified by the user-provisioned offset. All messages, event reports, logs, and events that carry time stamps use the following time of day: NTP UTC time + provisioned offset. .................................................................................................................................................................................................................................... 1646 SM 10-15 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-11: Administer NTP

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select System Management → Network Time Protocol option from the menu bar. Figure 10-10 NTP Config - with Disabled Server Synchronization

The NTP config tab contains the Time and Date and Network Time Protocol panels. ...................................................................................................................................................................................................

2

The Time and Date panel allows to manually set the system date and time by means of six combo-boxes Year, Month, Day, Hour, Minute and Sec. This command is not allowed if NTP is enabled as shown in Figure 10-11, “NTP Config - with Enabled Server Synchronization” (p. 10-17). ...................................................................................................................................................................................................

3

Click Save to save the settings and Refresh to refresh the page.

.................................................................................................................................................................................................................................... 1646 SM 10-16 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-11: Administer NTP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

The Network Time Protocol panel shows the following information. • • •

• •

Current NTP Server Synchronization - The time synchronization from the NTP

server; The value are Enabled or Disabled. Factory default is Disabled Current Offset - The time offset to apply to NTP server UTC time, +/- HH-MM, for all events and time stamps reported by this NE. Factory default is +08-00 Current Operating Mode - The current operating mode of the NTP service. The values are: NTPSYNC - NTP is enabled, and the NE is using the NTP protocol to synchronize to an NTP server. NTP Server Synchronization New Offset

Figure 10-11 NTP Config - with Enabled Server Synchronization

.................................................................................................................................................................................................................................... 1646 SM 10-17 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-11: Administer NTP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

Click Create hyperlink and the following window appears. Figure 10-12 NTP Server Address Provision

The NTP Server Address Provision window contains: –Server IP Address - Four entry boxes whose allow to digit the IP address of an NTP server. the address in the [0-126,128-223]-[0-255]-[0-255]-[0-255] format. The window has the following hyperlinks: •

Cancel allows to leave the page without applying the previously selections.



Save allows to apply the previously selections.

...................................................................................................................................................................................................

6

Click Delete hyperlink to delete the selected IP address. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-12: Network IF When to use

Use this procedure to modify the various network interface parameters on a specified DCC channel on an optical port for data communication purposes. The network interface must be first provisioned on the line or section DCC of the specific STMn facility. The DCC is identified as STMn and the DCCCHNL parameter.

.................................................................................................................................................................................................................................... 1646 SM 10-18 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-12: Network IF

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Communication → DCC → Network IF option from the menu bar. Figure 10-13 DCC Channel

...................................................................................................................................................................................................

2

Click the radio button to select the previously created DCC Channel entries from the table. Table 10-5

NE interface details parameters

Parameters

Description

Access Identifier

Specifies the Access Identifier of a resource for the selected port

DCC Channel

Specifies the reference of DCC Channel. The values are:

Layer 2

OSI Protocol



LINE



SECTION

The values are: •

USER



NETWORK

Specifies if the OSI protocol runs on the addressed DCC or not. The values are: •

ENABLE



DISABLE

.................................................................................................................................................................................................................................... 1646 SM 10-19 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-12: Network IF

....................................................................................................................................................................................................................................

Table 10-5

NE interface details parameters

(continued)

Parameters

Description

OSI Area

Specifies which OSI Area the addressed DCC belongs to. The default value is 1

...................................................................................................................................................................................................

3

Click Save to store all the settings and click Create to configure a new DCC Channel as shown in the following figure. Figure 10-14 DCC channel - filter by

...................................................................................................................................................................................................

4

Select the AID type from the combo-box to filter DCC Channel that the user wants to configure. ...................................................................................................................................................................................................

5

Click Search to filter the DCC Channel. ...................................................................................................................................................................................................

6

The available resources are displayed, else No configurable resources found message is displayed. ...................................................................................................................................................................................................

7

Click Cancel to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-13: OSI ULC Report When to use

Allows to modify OSI upper layers stack parameters that are common to all the stack interfaces of the NE.

.................................................................................................................................................................................................................................... 1646 SM 10-20 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-13: OSI ULC Report

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Communication → DCC → OSI USL Report option from the menu bar. Figure 10-15 OSI Routing Configuration

...................................................................................................................................................................................................

2

The OSI Routing Configuration tab displays the OSI upper layers common parameters panel that contains the following parameters: Layer 3 IS Level: This is the IS level provisioning. Check for the option from the drop down list. The Values are: • •

1 - It is a Level 1 IS 2 - It is a Level 2 IS

...................................................................................................................................................................................................

3

Click Save to close the page and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-14: Create Overhead XC When to use

Use this procedure to create overhead channel cross-connection.

.................................................................................................................................................................................................................................... 1646 SM 10-21 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-14: Create Overhead XC

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select Communication → DCC → XC Overhead from the menu bar. Figure 10-16 Overhead channel cross-connection

...................................................................................................................................................................................................

2

Click Create to configure a new Overhead Channel Cross-Connection. The following screen is displayed. Figure 10-17 Overhead channel cross-connection - enter channel

...................................................................................................................................................................................................

3

The Enter Channel panel contains the following parameters. •

DCC Channel - Specifies the reference of the DCC Channel.

The values are: – LINE –

SECTION



From - Specifies the source for the cross-connection



To - Specifies the destination for the cross-connection

.................................................................................................................................................................................................................................... 1646 SM 10-22 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-14: Create Overhead XC

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

Click Select to choose source and the destination to configure a cross-connection. ...................................................................................................................................................................................................

5

Click Save to store all the settings and return to the previous page. ...................................................................................................................................................................................................

6

Click Cancel to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-15: Create linear MSP When to use

Use this procedure to create a new Linear MSP. Procedure ...................................................................................................................................................................................................

1

Select Protection → Linear MSP from the menu bar. Figure 10-18 Linear MSP

...................................................................................................................................................................................................

2

Select the available STMn Signal from the combo-box for which the user wants to configure a Linear MSP.

.................................................................................................................................................................................................................................... 1646 SM 10-23 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-15: Create linear MSP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click Create to configure a new Linear MSP. Figure 10-19 Linear multiplex section protection provision panel

...................................................................................................................................................................................................

4

Linear Multiplex Section Protection Provision panel parameters are described in the

following table. Table 10-6

NE interface details parameters

Parameters

Description

FFP Access Identifier

Specifies the Access Identifier for Fast Facility Protection

Protection Type

Specifies the type of protection. The default values is Linear

Revertive Mode

The values are Y or N

Revertive Delay Time (min)

The valid range is from 0-15

Hold Off Time (msec)

Indicates the Hold off time in milliseconds. The valid range is 0–10000.

Protected Access Identifier

Specifies the Access Identifier for the protected resource

Protecting Access Identifier

Specifies the Access Identifier for the protecting resource

Protection Switching Direction

Specifies the switching direction. The values are UNI or BI

...................................................................................................................................................................................................

5

Click Select to choose the Protected Access Identifier and Protecting Access Identifier.

.................................................................................................................................................................................................................................... 1646 SM 10-24 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-15: Create linear MSP

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

6

Click Save to store all the settings and return to the previous page. ...................................................................................................................................................................................................

7

Click Cancel to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-16: Create MS-SPRing When to use

Use this procedure to create a new MS-SPRing. Procedure ...................................................................................................................................................................................................

1

Select Protection → MS-SPRing from the menu bar. Result: The MS-SPRing panel is displayed. ...................................................................................................................................................................................................

2

Select the available STMn Signal from the drop-down list for which the user wants to configure a MS-SP. ...................................................................................................................................................................................................

3

Click Search to view the provisioned MS-SPRing. Result: The available list of provisioned MS-SPRings is displayed. ...................................................................................................................................................................................................

4

Click Create to configure a new MS-SPRing. Figure 10-20 Multiplex section shared protection provision panel

.................................................................................................................................................................................................................................... 1646 SM 10-25 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-16: Create MS-SPRing

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

Multiplex Section Shared Protection RingProvision panel parameters are described in

the following table. Table 10-7

NE interface details parameters

Parameters

Description

FFP Access Identifier

Specifies the Access Identifier for Fast Facility Protection

Protection Type

Specifies the type of protection. The default values is MSSPRING2F

Revertive Mode

The values are Y or N

Revertive Delay Time (min)

The valid range is from 0-15

Hold Off Time (msec)

Indicates the Hold off time in milliseconds. The valid range is 0–10000.

East Access Identifier

Specifies the east side for the MS-SPRing is created. Important:

The East and West Access identifiers should have the same data rates. West Access Identifier

Specifies the west side for the MS-SPRing is created. Important:

The East and West Access identifiers should have the same data rates. Node Identifier

Indicates the node identifier connected to MS-SPRing. The valid range is 0–15.

Node Descriptor

Indicates the MS-SPRing node descriptor. The valid range is 0–255 ASCII characters.

...................................................................................................................................................................................................

6

Click Save to store all the settings and return to the previous page. ...................................................................................................................................................................................................

7

Click Cancel to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 10-26 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-17: Create Provider Bridge Service

....................................................................................................................................................................................................................................

Procedure 10-17: Create Provider Bridge Service Purpose

Use this procedure to create the Provider Bridge service. ...................................................................................................................................................................................................

1

Select Provider Bridge -> Ethernet Services XC from the menu bar as shown in Figure 10-21, “Provider Bridge Service” (p. 10-27). Figure 10-21 Provider Bridge Service

This panel lists the Range filter parameters: From XC ID - the minimum value to implement the range visualization. To XC ID - the maximum value to implement the range visualization.

.................................................................................................................................................................................................................................... 1646 SM 10-27 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-17: Create Provider Bridge Service

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Click Create to configure a new Provider Bridge service as shown in Figure 10-22, “Create Provider Bridge” (p. 10-28). Figure 10-22 Create Provider Bridge

Table 10-8, “Provider Bridge Service” (p. 10-28) provides the description of Create Provider Bridge service parameters. Table 10-8

Provider Bridge Service

Parameters

Description

Topology

Specifies the topology to establish the service. The values are : •

UNI-NNI



NNI-UNI

Ingress

Specifies the input port

S-VID

Specifies the static VLAN. Enter the from and to range to search a specific VLAN

Service Label

Specifies the name or label for the new service

Traffic Descriptor

Specifies the operation mode

Topology Classifier

Specifies the classifier for the selected topology

.................................................................................................................................................................................................................................... 1646 SM 10-28 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-17: Create Provider Bridge Service

....................................................................................................................................................................................................................................

Table 10-8

Provider Bridge Service

(continued)

Parameters

Description

Policing mode

Refers to the policing of the incoming ETS tarffic. The values are : •

disabled



color blind

...................................................................................................................................................................................................

3

Click Save & continue to save the changes and create a new service. ...................................................................................................................................................................................................

4

Click Cancel to return to the previous window without saving the changes. ...................................................................................................................................................................................................

5

Click Save & exit to save the changes and return to the previous window. ...................................................................................................................................................................................................

6

Click Search. The system retrieves the ethernet cross connection details based on the search parameter defined. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-18: LAG management When to use

The Link Aggregation function is an extension of the MAC layer which allows grouping of a set of physical Ethernet interfaces into one logical interface with greater capacity and reliability. The Link Aggregation Group (LAG) is valid only as a link between two systems (called the Partners). Grouping of more interfaces linking one system with two or more Partners is not allowed. Permitted port rates to be aggregated are 1 Gbps and 10 Gbps (10 Mbps and 100 Mbps are for future release). The max number of ports (LAG-size) to be aggregated is 16; (LAG stands for Link Aggregation Group). Links may be anytime added or removed to/from the bundle. Ports to be aggregated can be either located on the same board and also on different boards. Its management in the network is based upon the communication, between the aggregate partner pieces of equipment, of LACP messages (Link Aggregation Control Protocol). The LACP packets transport information about set-up, aggregation capability, links failures, automatic reconfiguration after failure, etc. .................................................................................................................................................................................................................................... 1646 SM 10-29 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-18: LAG management

....................................................................................................................................................................................................................................

The benefits of Link Aggregation feature are: • • •

Bandwidth limitation overcoming Load balancing (the traffic is distributed over the constituting links) Reliability increasing (in case that a link of the aggregate fails, its traffic is automatically distributed over the other links of the aggregate).

The conditions for Link Aggregation option are the following: •

All involved ports must work at the same rate.

• • •

All involved ports must have the same configurations, regarding AutoNegotiation and Flow Control. All aggregated links must be point-to-point (multicast is not allowed). All involved interfaces must work in full-duplex modality.

• •

All involved ports must be Local (remote ports are not allowed). Actor and Partner ports (local and far sides) must be of the same type.

Create LAG

Use this procedure to create LAG. ...................................................................................................................................................................................................

1

Click LAG Group from the Tree area. The Link Aggregation Mng window is displayed. Figure 10-23 Link aggregation management

.................................................................................................................................................................................................................................... 1646 SM 10-30 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-18: LAG management

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

The Link Aggregator Creation panel parameters are described in the following table. Table 10-9

Link aggregation parameters

Parameter

Description

Name

Allows to set the name of the LAG; the only suffix after # can be set by the user, with an integer in the 1 to 123 range

Admin State

This item can be set only after creation, in Configure Aggregator option. The values are: •

enable: the LAG is in-service



disable: the LAG is out-of-service

User Label

Allows to indicate the LAG by means of a name defined by the user.

Size

Allows to set the size of the LAG, i.e. number of Aggregated Ports; possible values are integers in the 1 to 16 range.

Actor Admin Key

Allows to indicate the LAG Key, the parameter identifying this LAG; integer in the 1 to 65535 range.

EthClient Type

Indicates the LAG client layer. The values are: •

ets: for Ethernet Transparent System



etb: for Ethernet Bridge System

Actor System Priority

Allows to indicate the LAG Priority. This parameter, together with the LAG Mac-Address, forms the System Identifier. The lowest System Identifier value is elected as the Master of the link, i.e. the one that will drive the actions in case of events such as failures, switches, etc. The valid range is 0 to 65535.

Type

Default value is ieee802.3adLag.

Maximum MRU

Specifies the maximum MRU value.

LACP Enabled

Link Aggregation Control Protocol (LACP).

...................................................................................................................................................................................................

3

Click Save hyperlink that applies the user’s operation in this page. ...................................................................................................................................................................................................

4

Select the LAG# from the LAG table to select any previously created LAG and Select Configuration to configure the existing LAG. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 10-31 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-18: LAG management

....................................................................................................................................................................................................................................

Configure LAG ...................................................................................................................................................................................................

1

Click on LAG# from the tree area or select the LAG and select the Configuration hyperlink. Figure 10-24 Link aggregator configuration

...................................................................................................................................................................................................

2

See Table 10-9, “Link aggregation parameters” (p. 10-31) for Link Aggregator Configuration panel parameters description. ...................................................................................................................................................................................................

3

Client Type Management panel contains the EthClient Type parameter that indicates the

LAG client layer. The default value is ets (Ethernet Transparent System).

.................................................................................................................................................................................................................................... 1646 SM 10-32 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-18: LAG management

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

The Link Aggregator Configuration panel parameters are described in the following table. Table 10-10

Link Aggregator configuration panel parameters

Parameter

Description

Mac Address

A 6-octet MAC address value (NE MAC Address) consisting of the unique identifier for Partner System.

Partner System Id

A 6-octet System Id value consisting of the unique identifier for Partner System.

Partner Admin Key

Indicates the current administrative value of the Key for Link Aggregation Group (in Partner System).

Partner Operator Key

Indicates the current operational value of the Key for LAG (in Partner System); in case of Active LAG, Partner Admin key = Partner Oper key.

Partner System Priority

A 2-octet value (NE System Priority) indicating priority value inside Partner’s NE SystemId.

N. Selected Ports

Indicates the number of ports currently selected for aggregation inside Link Aggregation Group.

N. Attached Ports

Indicates the number of ports currently attached to the same Link Aggregation Group.

Primary Port

It is the index of the primary port in Link Aggregation Group used to send BPDUs and flooding frames; Zero indicates no primary port is available

Primary Port Position

It is the port index number in the Link Aggregation Group used to send BPDUs and flooding frames

...................................................................................................................................................................................................

5

Access Control List (ACL) Management panel contains ACL Index parameter that

indicates the ACL Management type. The default value is 1. ...................................................................................................................................................................................................

6

Click Save & Continue to save the settings and configure another LAG. ...................................................................................................................................................................................................

7

Click Save & Exit to save the settings and exit from the window. ...................................................................................................................................................................................................

8

Click Cancel to cancel all the settings and return to the previous window. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 10-33 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-19: IGMP Snooping

....................................................................................................................................................................................................................................

Procedure 10-19: IGMP Snooping Purpose

Use this procedure to retrieve a VLAN connection. ...................................................................................................................................................................................................

1

Click on LAG# from the tree area or select the LAG and select the Configuration hyperlink. Click on IGMP Snooping the following panel is shown. Figure 10-25

This panel lists the parameters described below: From (VLAN) - the minimum value to implement the range of VLAN. To (VLAN) - the maximum value to implement the range of VLAN. ...................................................................................................................................................................................................

2

Click Search. The system retrieves the VLAN connection details based on the search parameter defined. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-20: Remove LAG member When to use

Use this procedure to remove LAG member.

.................................................................................................................................................................................................................................... 1646 SM 10-34 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-20: Remove LAG member

....................................................................................................................................................................................................................................

Procedure ...................................................................................................................................................................................................

1

Select the board from the tree area. Figure 10-26 Two member in one LAG

.................................................................................................................................................................................................................................... 1646 SM 10-35 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-20: Remove LAG member

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Select one VCG and click Configure LAG. Figure 10-27 Configure LAG selection

.................................................................................................................................................................................................................................... 1646 SM 10-36 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-20: Remove LAG member

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

The following screen appears. Figure 10-28 Configure LAG

...................................................................................................................................................................................................

4

Click Select hyperlink to select the Actor Admin key and the following window pops up. Figure 10-29 Actor Admin key selection window

.................................................................................................................................................................................................................................... 1646 SM 10-37 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-20: Remove LAG member

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

Click 0 Unlink Port. The following screen appears. Figure 10-30 Configure LAG for 0 Unlink Port

...................................................................................................................................................................................................

6

Click Save & exit to save all the changes and exit from the window. Note: If the member is not the first one, the saved settings are fine. If the member which is removed is the first one, the following window pops up. Figure 10-31 LAG pop up window

The user needs to change the remove sequence. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 10-38 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-21: Retrieve system information

....................................................................................................................................................................................................................................

Procedure 10-21: Retrieve system information When to use

Use this procedure to retrieve general system level and global system configuration information. Procedure ...................................................................................................................................................................................................

1

Select Equipment → System Information option from the menu bar. The Zero Installation Craft (ZIC) terminal displays the system level information. The System Information panel is displayed. Figure 10-32 System Information

...................................................................................................................................................................................................

2

This panel lists the parameters described in the following table. Table 10-11

System Information panel parameters

Parameter

Description

Node Type

Specifies the type of NE.

Software

Specifies the active or standby state of the software

System Type

Specifies the type of NE.

Release ID

Specifies the release identifier

Release Date

Specifies the date of release

Matrix Size

Specifies the bandwidth supported.

Status

Specifies the download state of the software

Region

Specifies the region of the NE

Provision Mode

Specifies the provisioning mode

User Label

Specifies the user label

E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 10-39 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-22: Create IP route

....................................................................................................................................................................................................................................

Procedure 10-22: Create IP route When to use

Use this procedure to configure the IP Routing. Procedure ...................................................................................................................................................................................................

1

Select Communication → Network Domain → IP Routing option from the menu bar. The following table displays the existing IP route entry along with its attributes. Figure 10-33 IP Routing Configuration

.................................................................................................................................................................................................................................... 1646 SM 10-40 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-22: Create IP route

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Click Create hyperlink to configure a new IP route.

...................................................................................................................................................................................................

3

Parameters of the screen are described in the following table. Table 10-12

IP routing parameters

Parameter

Description

Access Identifier

Specifies the STMn facility carrying the DCC with the next hop network interface or identifies the IP Tunnel or Customer LAN. The select hyperlink allows to open the window shown in following figure for the selection of the resource. After the selection procedure, the chosen value will be reported.

Destination Address

This is the IP address of the destination host or network (in the format nnn-nnn-nnn-nnn). The address 0-0-0-0 is used to specify a default route. If NETMASK is not all '1' (i.e., a network route is specified), the host portion of the DESTADDR must be all '0'.

.................................................................................................................................................................................................................................... 1646 SM 10-41 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-22: Create IP route

....................................................................................................................................................................................................................................

Table 10-12

IP routing parameters

(continued)

Parameter

Description

Subnet Mask

This is the IP subnet mask of the route (in the format nnn-nnnnnn- nnn). The mask 0-0-0-0 is used to specify a default route.

...................................................................................................................................................................................................

4

Enter the Access Identifier for the new IP route. Click Select hyperlink to choose the AID type. The values are DCC, NE IPT, and LAN. ...................................................................................................................................................................................................

5

Enter the Destination Address and Subnet mask for the IP route to be configured. ...................................................................................................................................................................................................

6

Click Save & Exit to save the settings and return to the window. ...................................................................................................................................................................................................

7

Click Save to store the settings and return to the previous panel. ...................................................................................................................................................................................................

8

Click Cancel to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-23: Create IP tunnel When to use

Use this procedure to create an IP tunnel instance on the NE. The IP tunnel that has to be created is specified by its AID. Procedure ...................................................................................................................................................................................................

1

Select Communication → IP Tunnel option from the menu bar.

.................................................................................................................................................................................................................................... 1646 SM 10-42 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-23: Create IP tunnel

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

Click Create to configure the IP Tunnel. Figure 10-34 IP tunnel - network element

...................................................................................................................................................................................................

3

Parameters of the screen are described in the following table. Table 10-13

NE IP tunnel parameters

Parameter

Description

AID

(IP Tunnel Identifier), it is the identifier of the specific IP tunnel to create. Allowable values are in the 1 - 128 range

REMOTE NSAP

(TL1 SID of the IP Tunnel target NE.) The Target NE must be reachable via OSI over DCC and the NSAP address corresponding to this TID must be able to be retrievable from the TARP cache. The values are: <1-20 VALID TID CHARACTERS> or “<1-20 VALID TID CHARACTERS>”. If the value contains non-alphanumeric characters, it has to be enclosed in double quotes

Encapsulation Type

Specifies the encapsulation type for the NE. The values are: ALU or GRE.

...................................................................................................................................................................................................

4

Enter the IP tunnel access identifier in the entry box. ...................................................................................................................................................................................................

5

Enter the Remote NSAP value for the IP tunnel. ...................................................................................................................................................................................................

6

Select the encapsulation type from the drop-down list box and click Save to create new IP tunnel.

.................................................................................................................................................................................................................................... 1646 SM 10-43 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-23: Create IP tunnel

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

7

Click Close to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-24: NE TL1 Parameter When to use

Use this procedure to modify the NE TL1 parameters. Procedure ...................................................................................................................................................................................................

1

Select Tools→ NE TL1 Param option from the menu bar. Result: The NE TL1 parameters configuration details if any, are displayed.

...................................................................................................................................................................................................

2

Enter the Prompt information. ...................................................................................................................................................................................................

3

Click Save to store the settings and return to the previous panel. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-25: TL1 console When to use

Use this procedure to view the TL1 console parameters. ...................................................................................................................................................................................................

1

Select Tools → TL1 console option from the menu bar.

.................................................................................................................................................................................................................................... 1646 SM 10-44 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-25: TL1 console

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

2

In order to use this facility it is necessary to access the Telnet console. Enter User and Password fields with the log accessing data. Figure 10-35 Tools - TL1 console

.................................................................................................................................................................................................................................... 1646 SM 10-45 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-25: TL1 console

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

3

Click Connect. Figure 10-36 Tools - Accessing TL1 console

Lower part used to digit the TL1 command. Upper part used to answer the TL1 Telnet command.

.................................................................................................................................................................................................................................... 1646 SM 10-46 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-25: TL1 console

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

4

Client area is shown in Figure 10-37, “Tools - Telnet console” (p. 10-47). Figure 10-37 Tools - Telnet console

.................................................................................................................................................................................................................................... 1646 SM 10-47 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-25: TL1 console

.................................................................................................................................................................................................................................... ...................................................................................................................................................................................................

5

Click the TL1 command RTRV-EQPT::ALL, press enter the following is shown. Figure 10-38 Tools - TL1 command

...................................................................................................................................................................................................

6

Click QUIT or CANC-USER to close the Telnet session. E................................................................................................................................................................................................... N D O F S T E P S

Procedure 10-26: Create FTP Server Configuration When to use

Use this procedure to create an FTP Server configuration. Procedure ...................................................................................................................................................................................................

1

Select Tools→ FTP Server Configuration option from the menu bar.

.................................................................................................................................................................................................................................... 1646 SM 10-48 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-26: Create FTP Server Configuration

....................................................................................................................................................................................................................................

Result: The available FTP server configuration details if any, are displayed.

...................................................................................................................................................................................................

2

Click Create to configure the FTP server. Figure 10-39 Create FTP server

Table 10-14

Create FTP server parameters

Parameter

Description

Host

Specifies the IP address of the Host machine.

Port

Specifies the Port number.

Path

Specifies the complete path of the host machine.

...................................................................................................................................................................................................

3

Enter the IP address of the Host machine in text box. ...................................................................................................................................................................................................

4

Enter the Port number. ...................................................................................................................................................................................................

5

Enter the complete path of the host machine. ...................................................................................................................................................................................................

6

Click Save to store the settings and return to the previous panel. ...................................................................................................................................................................................................

7

Click Cancel to revoke all the settings and return to the previous page. E................................................................................................................................................................................................... N D O F S T E P S

.................................................................................................................................................................................................................................... 1646 SM 10-49 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Provisioning: Detailed level Procedures

Procedure 10-26: Create FTP Server Configuration

....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM 10-50 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Glossary

...................................................................................................................................................................................................................................

A

AIS

Alarm Indication Signal failure (Condition Type) Alarm

Visible or audible signal indicating that an equipment failure or significant event/condition has occurred. Alarm Severity

An attribute that defines the priority of the alarm message. The way in which alarms are processed depends on the severity. APS

Automatic Protection Switching ...................................................................................................................................................................................................................................

B

Backup

The backup and restoration features provide the capability to recover from loss of network element data because of such factors as human error, power failure, and network element design flaws. BITS

Building Integrated Timing Supply ...................................................................................................................................................................................................................................

C

CBS

Committed Burst Size is the maximum burst size (byte) with high priority guaranteed for the Tunnel/Pseudowire packets deliver. CFM

Connectivity Fault Management CIF

Customer Interface CIR

Committed Information Rate is the maximum rate (kb/sec) with high priority guaranteed for the Tunnel/Pseudowire packets delivery. .................................................................................................................................................................................................................................... 1646 SM GL-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Glossary ....................................................................................................................................................................................................................................

Circuit

A combination of two transmission channels that permits bidirectional transmission of signals between two points to support a single communication. ...................................................................................................................................................................................................................................

D

DCC

Data Communication Channel DCN

Data Communication Network. DDM

Digital Diagnostic Monitoring. DEI

Dropping Eligibility Indicator ...................................................................................................................................................................................................................................

E

ESD

Electro Static Discharge. Static electrical energy potentially harmful to circuit packs and humans. ...................................................................................................................................................................................................................................

F

FDB

Filtering Database. The filtering database maintains a dynamic list of paths to which packets are routed based on the destination address. The database entries are created, updated, and removed by the learning process. FLC

First Level Controller ...................................................................................................................................................................................................................................

G

GB

Gigabytes. GUI

Graphical User Interface. This interface supports applications that consist of a series of rectangular presentation regions called windows. Each window displays another application. ...................................................................................................................................................................................................................................

H

HKP

HouseKeeping ...................................................................................................................................................................................................................................

I

ID

Identifier ISID

Backbone Service Identifier .................................................................................................................................................................................................................................... 1646 SM GL-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Glossary ....................................................................................................................................................................................................................................

ITU

International Telecommunications Union ...................................................................................................................................................................................................................................

L

LAC

Local Access Control LACP

Link Aggregation Control Protocol LAG

Link Aggregation Group. LAN

Local Area Network. Link Aggregation

A method of combining a group of IEEE 802.3 Ethernet links into a single logical link of up to the aggregate rate. ...................................................................................................................................................................................................................................

M

MA

Maintenance Association. MAC

Media Access Control. MD

Maintenance Domain. MEG

Maintenance Entity Group. MEP

Maintenance association End Point. MHF

MIP Half Function MIP

MEG Intermediate Point. MP

Maintenance Point. MTU

Maximum Transmission Unit.

.................................................................................................................................................................................................................................... 1646 SM GL-3 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Glossary .................................................................................................................................................................................................................................... ...................................................................................................................................................................................................................................

N

NE

Network Element. A node in a telecommunication network that supports network transport services and is directly manageable by a management system. NIF

Network Interface. Node

A node or network element is defined as all equipment that is controlled by one-system controller. NTP

Network Time Protocol. ...................................................................................................................................................................................................................................

O

OSS

Operational Support System. OSTYPE

Operations System Type. ...................................................................................................................................................................................................................................

P

Path

A logical connection between the point at which a standard frame format for the signal at the given rate is assembled, and the point at which the standard frame format for the signal is disassembled. PBS

Peak Burst Size is the maximum burst rate allowed (byte) for the Tunnel/Pseudowire. PDU

Power Distribution Unit. PIP

Provider Instance Port. The set of Virtual Instance ports that are supported by a single instance of the Internal sub-layer service. PIR

Peak Information Rate. PRC

Primary Reference Clock. ...................................................................................................................................................................................................................................

R

Ring

A configuration of nodes comprised of network elements connected in a circular fashion. Under normal conditions, each node is interconnected with its neighbor and includes capacity for transmission in either direction between adjacent nodes.

.................................................................................................................................................................................................................................... 1646 SM GL-4 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Glossary .................................................................................................................................................................................................................................... ...................................................................................................................................................................................................................................

S

S-VID

Service VLAN Identifier. SFP

Small Form Factor Pluggable. Shelf

Basic rack assembly unit; contains subassemblies (usually circuit packs, also referred to as modules). SNCP

Sub-Network Connection Protection. SSM

Synchronization Status Message. ...................................................................................................................................................................................................................................

T

TDM

Time Domain Multiplexing. ...................................................................................................................................................................................................................................

U

UNI

User-Network Interface. ...................................................................................................................................................................................................................................

V

VCG

Virtual Concatenation Group. VID

Virtual LAN Identifier VLAN

Virtual Local Area Network. ...................................................................................................................................................................................................................................

X

XFP

Extended Form-factor Pluggable. ...................................................................................................................................................................................................................................

Z

ZIC

Zero Installation Craft Terminal. A NE-embedded graphical user interface application for local operation and maintenance.

.................................................................................................................................................................................................................................... 1646 SM GL-5 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Glossary ....................................................................................................................................................................................................................................

.................................................................................................................................................................................................................................... 1646 SM GL-6 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Index

A alarm, 7-1

condition log, 7-11 cutoff, 7-9

............................................................. I

IGMP snooping, 10-34

OH create, 4-14 search, 4-13

In-Service upgrade, 10-6

.............................................................

ASAP, 7-3

IP routing, 6-11

S security, 9-1

audit, 9-12

IP tunnel, 6-8

resynch., 7-10

.............................................................

.............................................................

B bridge

L LAC, 10-12

configure, 5-10

LAG, 10-29

.............................................................

configure, 10-32

C color profile, 5-9

create, 10-30

software version, 10-4 synchronization, 8-1 BITS-0, 8-2, 8-4 BITS-OUT, 8-5, 8-7 outgoing, 8-16 system

conventions, xxvii

linear MSP, 10-23, 10-25

log in, 10-2

Create

log settings, 9-14

log out, 10-3

provider bridge service, 10-27 Create MAC Access Control List, 6-17

.............................................................

.............................................................

M MAC, 10-14

T TCA Profile, 7-2

MAC Access Control Element (ACE), 6-18

TL1

............................................................. D DB management

Modify ASAP, 7-8

traffic descriptor, 5-2, 5-5

console, 10-44

cancel remote file copy, 10-10

.............................................................

.............................................................

remote file copy, 10-7

N NTP, 10-15

U user

documentation set, xxvii ............................................................. E ELP, 5-36

ERP instance, 5-29 ethernet P2P XC, 4-9, 4-11

.............................................................

change account, 9-5

O OAM

change password, 9-2

global setting, 5-11, 5-13, 5-21, 5-22, 5-23, 5-24, 5-26, 5-27, 5-28 MA, 5-15 MD, 5-13 MEP, 5-17, 5-19

create account, 9-3 information, 9-3 modify settings, 9-8 ............................................................. V VCn cross-connection, 4-1

.................................................................................................................................................................................................................................... 1646 SM IN-1 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

Index ....................................................................................................................................................................................................................................

VLAN profile, 5-7

.................................................................................................................................................................................................................................... 1646 SM IN-2 3KC18078ADAATQZZA Release 2.3 Issue 1 June 2013

More Documents from "eeeee"

1646-.pdf
November 2019 6