Ceragon FibeAir IP-20 All OutDoor User Guide PDF
Ceragon FibeAir IP-20 All OutDoor User Guide PDF
Ceragon FibeAir IP-20 All OutDoor User Guide PDF
September 2020
Rev AA.01 | CeraOS 11.3
© Copyright 2020 by Ceragon Networks Ltd. All rights reserved.
User Guide for FibeAir® IP-20 All-Outdoor Products, CeraOS 11.3
Notice
This document contains information that is proprietary to Ceragon Networks Ltd. No part of this
publication may be reproduced, modified, or distributed without prior written authorization of
Ceragon Networks Ltd. This document is provided as is, without warranty of any kind.
Trademarks
Ceragon Networks®, FibeAir® and CeraView® are trademarks of Ceragon Networks Ltd., registered in
the United States and other countries.
Ceragon® is a trademark of Ceragon Networks Ltd., registered in various countries.
CeraMap™, PolyView™, EncryptAir™, ConfigAir™, CeraMon™, EtherAir™, CeraBuild™, CeraWeb™,
and QuickAir™, are trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice. Ceragon Networks
Ltd. shall not be liable for errors contained herein or for damage in connection with the furnishing,
performance, or use of this document or equipment supplied with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer could void
the user’s authority to operate the equipment and the warranty for such equipment.
Intended Use/Limitation
Fixed point-to-point radio links for private networks.
Authorized to Use
Only entities with individual authorization from the National Regulator to operate the mentioned
radio equipment.
The equipment can be used in the following EU countries:
Austria (AT) - Belgium (BE) - Bulgaria (BG) - Switzerland/Liechtenstein (CH) - Cyprus (CY) - Czech
Republic (CZ) - Germany (DE) – Denmark (DK) - Estonia (EE) - Finland (FI) - France (FR) -Greece (GR) -
Hungary (HU) - Ireland (IE) – Iceland (IS) – Italy (IT) – Lithuania (LT) - Luxembourg (LU) – Latvia (LV) -
Malta (MT) - Netherlands (NL) - Norway (NO) - Portugal (PT) - Romania (RO) - Sweden (SE) - Slovenia
(SI) - Slovak Republic (SK) – United Kingdom (UK) – Spain (SP) – Poland (PL)
Page 2 of 1094
Table of Contents
Section I: Introduction .................................................................................................. 48
1. Introduction............................................................................................................ 49
1.1 Configuration Tips ...................................................................................................................... 50
1.2 IP-20C Overview ......................................................................................................................... 52
1.3 IP-20C-HP Overview ................................................................................................................... 52
1.4 IP-20S Overview ......................................................................................................................... 53
1.5 IP-20E Overview ......................................................................................................................... 53
1.6 IP-20V Overview......................................................................................................................... 54
1.7 PoE Injector Overview ................................................................................................................ 54
1.8 FibeAir IP-20 Assured Platform .................................................................................................. 55
1.9 The Web-Based Element Management System......................................................................... 56
1.9.1 Introduction to the Web EMS .................................................................................................... 56
1.9.2 Web EMS Page Layout ............................................................................................................... 57
1.9.3 The Unit Summary Page ............................................................................................................. 61
1.9.4 The Radio Summary Page .......................................................................................................... 62
1.9.5 The Security Summary Page ...................................................................................................... 64
1.10 Reference Guide to Web EMS Menu Structure ......................................................................... 67
Page 3 of 1094
Page 4 of 1094
Page 5 of 1094
Page 6 of 1094
Page 7 of 1094
Page 8 of 1094
Page 9 of 1094
Page 10 of 1094
Page 11 of 1094
Page 12 of 1094
Page 13 of 1094
17.1.5 Defining the MAC Address Forwarding Table for a Service (CLI) .............................................772
17.2 Setting the MRU Size and the S-VLAN Ethertype (CLI) .............................................................779
17.2.1 Configuring the S-VLAN Ethertype (CLI) ...................................................................................780
17.2.2 Configuring the C-VLAN Ethertype (CLI) ..................................................................................780
17.2.3 Configuring the MRU (CLI) .......................................................................................................780
17.3 Configuring Ethernet Interfaces (CLI) .......................................................................................781
17.3.1 Entering Interface View (CLI) ...................................................................................................781
17.3.2 Displaying the Operational State of the Interfaces in the Unit (CLI) ........................................783
17.3.3 Viewing Interface Attributes (CLI) ............................................................................................784
17.3.4 Configuring an Interface’s Media Type (CLI) ............................................................................784
17.3.5 Configuring an Interface’s Speed and Duplex State (CLI) .........................................................785
17.3.6 Configuring an Interface’s Auto Negotiation State (CLI) ..........................................................786
17.3.7 Configuring an Interface’s IFG (CLI) .........................................................................................786
17.3.8 Configuring an Interface’s Preamble (CLI) ...............................................................................786
17.3.9 Adding a Description for the Interface (CLI) ............................................................................787
17.3.10 Displaying Interface Statistics (RMON) (CLI) ..........................................................787
17.4 Configuring Automatic State Propagation and Link Loss Forwarding (CLI) ..............................789
17.4.1 Configuring Receipt of CSF PDUs (CLI) .....................................................................................793
17.5 Viewing Ethernet PMs and Statistics (CLI) ...............................................................................794
17.5.1 Displaying RMON Statistics (CLI) ..............................................................................................794
17.5.2 Configuring Ethernet Port PMs and PM Thresholds (CLI) ........................................................795
17.5.3 Displaying Ethernet Port PMs (CLI) ..........................................................................................795
17.5.4 Clearing Ethernet Port PMs (CLI) .............................................................................................798
Page 14 of 1094
Page 15 of 1094
Page 16 of 1094
Page 17 of 1094
Page 18 of 1094
Page 19 of 1094
List of Figures
Figure 1: Main Web EMS Page ...............................................................................................................57
Figure 2: Displaying a Representation of the Front Panel ......................................................................58
Figure 3: Main Web EMS Page with Representation of Front Panel – IP-20C and IP-20S......................58
Figure 4: Main Web EMS Page with Representation of Front Panel – IP-20C-HP ..................................58
Figure 5: Main Web EMS Page with Representation of Front Panel – IP-20E ........................................59
Figure 6: Main Web EMS Page with Representation of Front Panel – IP-20V .......................................59
Figure 7: Main Web EMS Page with Active and Standby Tabs ...............................................................60
Figure 8: Related Pages Drop-Down List ................................................................................................61
Figure 9: Unit Radio Summary Page .......................................................................................................61
Figure 10: Unit Summary Page – Customizing Columns ........................................................................62
Figure 11: Radio Summary Page.............................................................................................................62
Figure 12: Radio Summary Page – Customizing Columns ......................................................................63
Figure 13: Security Summary Page .........................................................................................................64
Figure 14: Security Summary Page – FIPS Security Warnings ................................................................65
Figure 15: Security Summary Page – Customizing Columns ..................................................................66
Figure 16: Internet Protocol Properties Window ...................................................................................76
Figure 17: Login Page .............................................................................................................................77
Figure 18: Change User Password Page .................................................................................................80
Figure 19: Quick Configuration – From File Page ...................................................................................82
Figure 20: Quick Configuration – From File Page – Configuration File Loaded ......................................82
Figure 21: Quick Configuration – Platform Setup Page ..........................................................................83
Figure 22: Quick Configuration – Platform Setup Summary Page..........................................................85
Figure 23: Local Networking Configuration Page ...................................................................................87
Figure 24: Activation Key Configuration Page ........................................................................................89
Figure 25: Activation Key Overview Page ...............................................................................................92
Figure 26: Time Services Page ................................................................................................................96
Figure 27: Interface Manager Page ........................................................................................................99
Figure 28: Interface Manager – Edit Page ............................................................................................100
Figure 29: Multiple Selection Operation Section (Interface Manager Page) .......................................100
Figure 30: Traffic over Management Page ...........................................................................................102
Figure 31: MRMC Symmetrical Scripts Page (IP-20C) (ETSI).................................................................103
Figure 32: MRMC Symmetrical Scripts Page (IP-20E) (ETSI) .................................................................104
Figure 33: MRMC Symmetrical Scripts Page (IP-20C) (FCC) .................................................................104
Figure 34: MRMC Symmetrical Scripts Page – Configuration (IP-20C/IP-20C-HP) ...............................105
Figure 35: MRMC Symmetrical Scripts Page - Configuration (IP-20E) ..................................................106
Figure 36: MRMC Symmetrical Scripts Page – Configuration – Adaptive Mode (IP-20C/IP-20C-HP) ..107
Page 20 of 1094
Figure 37: MRMC Symmetrical Scripts Page – Configuration – Adaptive Mode (IP-20E) ....................107
Figure 38: Frequency Scanner Page – IP-20V – Continuous Mode ......................................................111
Figure 39: Frequency Scanner Page – IP-20E – Single Mode ...............................................................112
Figure 40: Frequency Scanner Results – Graph Format (IP-20V – Continuous Mode) .........................114
Figure 41: Frequency Scanner Results – Graph Format (IP-20E – Single Mode) ..................................114
Figure 42: Radio Parameters Page – IP-20C/IP-20C-HP .......................................................................115
Figure 43: Radio Parameters Page Per Carrier – IP-20C/IP-20C-HP .....................................................116
Figure 44: Radio Parameters Page Per Carrier – IP-20C .......................................................................121
Figure 45: Security General Configuration Page ..................................................................................123
Figure 46: Unit Redundancy Page ........................................................................................................125
Figure 47: 1+0 Quick Configuration Wizard – Page 1 ...........................................................................130
Figure 48: 1+0 Quick Configuration Wizard – Page 2 ...........................................................................131
Figure 49: 1+0 Quick Configuration Wizard – Page 3 ...........................................................................131
Figure 50: 1+0 Quick Configuration Wizard – Page 4 ...........................................................................132
Figure 51: 1+0 Quick Configuration Wizard – Page 5 ...........................................................................133
Figure 52: 1+0 Quick Configuration Wizard – Page 6 (Summary Page)................................................134
Figure 53: 1+0 Repeater Quick Configuration Wizard – Page 1 ...........................................................134
Figure 54: 1+0 Repeater Quick Configuration Wizard – Page 2 ...........................................................135
Figure 55: 1+0 Repeater Quick Configuration Wizard – Page 3 ...........................................................135
Figure 56: 1+0 Repeater Quick Configuration Wizard – Page 4 ...........................................................136
Figure 57: 1+0 Repeater Quick Configuration Wizard – Page 5 ...........................................................137
Figure 58: 1+0 Repeater Quick Configuration Wizard – Page 6 (Summary Page) ................................138
Figure 59: 2 X (1 + 0) Quick Configuration Wizard – Page 1 .................................................................138
Figure 60: 2 X (1 + 0) Quick Configuration Wizard – Page 2 .................................................................139
Figure 61: 2 X (1 + 0) Quick Configuration Wizard – Page 3 .................................................................140
Figure 62: 2 X (1 + 0) Quick Configuration Wizard – Page 4 .................................................................141
Figure 63: 2 X (1 + 0) Quick Configuration Wizard – Page 5 .................................................................141
Figure 64: 2 X (1 + 0) Quick Configuration Wizard – Page 6 (XPIC) ......................................................142
Figure 65: 2 X (1 + 0) Quick Configuration Wizard – Page 6 (Non-XPIC) ..............................................142
Figure 66: 2 X (1 + 0) Quick Configuration Wizard – Page 7 (XPIC) ......................................................143
Figure 67: 2 X (1 + 0) Quick Configuration Wizard – Page 7 (Non-XPIC) ..............................................143
Figure 68: 2 X (1 + 0) Quick Configuration Wizard – Page 8 .................................................................144
Figure 69: 2 X (1 + 0) Quick Configuration Wizard – Page 9 .................................................................145
Figure 70: 2 X (1 + 0) Quick Configuration Wizard –Summary Page (XPIC) ..........................................146
Figure 71: 2 X (1 + 0) Quick Configuration Wizard –Summary Page (No XPIC) ....................................146
Figure 72: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Page 1 ............................................147
Figure 73: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio #2 Selection Page ................147
Page 21 of 1094
Figure 74: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio XPIC Configuration Page ......148
Figure 75: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio Parameters Configuration Page
..............................................................................................................................................................148
Figure 76: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio Parameters Configuration Page
(XPIC) ....................................................................................................................................................149
Figure 77: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio MRMC Script Configuration
Page ......................................................................................................................................................150
Figure 78: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio MRMC Script Configuration
Page – XPIC ...........................................................................................................................................150
Figure 79: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Management Configuration Page .151
Figure 80: 2 + 0 Multi Carrier ABC Quick Configuration Wizard –Summary Page ................................152
Figure 81: Multiband Quick Configuration Wizard – Page 1 ................................................................153
Figure 82: Multiband Quick Configuration Wizard – Page 2 ................................................................154
Figure 83: Multiband Quick Configuration Wizard – Page 3 ................................................................155
Figure 84: Multiband Quick Configuration Wizard – Page 4 ................................................................155
Figure 85: Multiband Quick Configuration Wizard – Page 5 ................................................................156
Figure 86: Multiband Quick Configuration Wizard – Summary Page ...................................................157
Figure 87: Bandwidth Notification Page (Empty) .................................................................................158
Figure 88: Bandwidth Notification – Add Page ....................................................................................158
Figure 89: Bandwidth Notification Page (Populated with Radio BNM) ................................................159
Figure 90: Multi-Carrier ABC Group Page (Empty) ...............................................................................160
Figure 91: Create ABC Group Wizard – First Page ................................................................................161
Figure 92: Create ABC Group Wizard – Second Page ...........................................................................161
Figure 93: Create ABC Group Wizard – Finish Page .............................................................................162
Figure 94: Multi-Carrier ABC Group – Edit Group Page .......................................................................163
Figure 95: Multi Carrier ABC Group - Add/Remove Members Page ....................................................164
Figure 96: Multiband Operation – IP-20E and IP-20C/IP-20C-HP.........................................................167
Figure 97: Multiband Operation – IP-20E and IP-20N or IP-20A ..........................................................168
Figure 98: Multiband Operation – IP-20E and Third-Party Unit ...........................................................169
Figure 99: Multi Carrier ABC Groups Page (Empty) ..............................................................................170
Figure 100: Create ABC Group Wizard – Page 1 ...................................................................................170
Figure 101: Create ABC Group Wizard – Page 2 ...................................................................................171
Figure 102: Create ABC Group Wizard – Page 3 ...................................................................................171
Figure 103: Create ABC Group Wizard – Page 3 ...................................................................................172
Figure 104: Multi Carrier ABC Groups Page (Populated with Multiband Group) .................................172
Figure 105: Bandwidth Notification Page (Empty) ...............................................................................173
Figure 106: Bandwidth Notification – Add Page ..................................................................................174
Figure 107: Bandwidth Notification Page (Populated with Radio BNM) ..............................................175
Figure 108: Multiband Cable for Use with CSFP Port ...........................................................................176
Page 22 of 1094
Figure 109: Multiband Configuration with Inband Management and/or SyncE via the IP-20E ...........177
Figure 110: Multiband Configuration with Direct Inband Management to the Paired Unit ................178
Figure 111: Multiband Configuration with Direct Inband Management to the IP-20C, IP-20C-HP, or IP-
20S ........................................................................................................................................................179
Figure 112: Create LAG Group – Page 1 ...............................................................................................183
Figure 113: Create LAG Group – Page 2 ...............................................................................................183
Figure 114: Create LAG Group – Final Page .........................................................................................184
Figure 115: Link Aggregation - Edit Page ..............................................................................................185
Figure 116: LAG Distribution Function (DF) Page .................................................................................187
Figure 117: LACP Aggregation Page .....................................................................................................189
Figure 118: LACP Port Status Page .......................................................................................................190
Figure 119: LACP Port Status – View Page ...........................................................................................191
Figure 120: LACP Port Statistics Page ...................................................................................................193
Figure 121: LACP Port Debug Page .......................................................................................................194
Figure 122: XPIC Configuration Page ....................................................................................................196
Figure 123: Logical Interfaces – Edit Page ............................................................................................200
Figure 124: Unit Redundancy Page ......................................................................................................201
Figure 125: Unit Redundancy Page when Redundancy Enabled ..........................................................202
Figure 126: Interface Manager Page – Both Radio Carriers Enabled ...................................................203
Figure 127: Standby Tab of Radio Parameters Page ............................................................................204
Figure 128: Unit Redundancy Page ......................................................................................................205
Figure 129: Create Diversity Group – Page 1 .......................................................................................207
Figure 130: Create Space Diversity Group – Selection Summary .........................................................208
Figure 131: Diversity - Edit Page (Space Diversity Group) ....................................................................208
Figure 132: Advanced Multi Carrier Configuration Page......................................................................212
Figure 133: 4x4 MIMO Group – Select Group Parameters Page ..........................................................213
Figure 134: 4x4 MIMO Group – Select Members Parameters Page ....................................................213
Figure 135: 4x4 MIMO Group – Select MRMC Parameters Page .........................................................214
Figure 136: 4x4 MIMO Group – Select Members Parameters Page ....................................................215
Figure 137: Advanced Multi Carrier Configuration Page (Populated – 4x4 MIMO Group) ..................216
Figure 138: 4x4 MIMO Configuration...................................................................................................216
Figure 139: Create Diversity Group Page – 2x2 MIMO – Page 1 ..........................................................217
Figure 140: Create Diversity Group Page – 2x2 MIMO – Page 2 ..........................................................217
Figure 141: Diversity Groups – 2x2 MIMO - Edit Page .........................................................................218
Figure 142: Create Diversity Group – Page 1 .......................................................................................219
Figure 143: Create Diversity Group – Page 2 .......................................................................................219
Figure 144: Diversity - Edit Page...........................................................................................................220
Figure 145: 4x4 MIMO - Edit Members Page .......................................................................................221
Page 23 of 1094
Page 24 of 1094
Page 25 of 1094
Page 26 of 1094
Page 27 of 1094
Figure 294: Logical Interfaces – Egress Service Bundle Shaper Configuration – Add Page ..................406
Figure 295: Scheduler Priority Profile Page ..........................................................................................409
Figure 296: Scheduler Priority Profile – Add Page ...............................................................................410
Figure 297: Scheduler WFQ Profile Page..............................................................................................414
Figure 298: Scheduler WFQ Profile – Add Page ...................................................................................414
Figure 299: Logical Interfaces – Scheduler – Egress Port Scheduling Priority ......................................417
Figure 300: Logical Interfaces – Scheduler – Egress Port Scheduling WFQ ..........................................418
Figure 301: Egress CoS PM Configuration Page ...................................................................................420
Figure 302: Egress CoS PM Configuration – Add Page .........................................................................421
Figure 303: Egress CoS PM Page ..........................................................................................................422
Figure 304: G.8032 General Attribute Page .........................................................................................424
Figure 305: G.8032 ERPI Attribute Page ...............................................................................................425
Figure 306: G.8032 ERPI Attribute Wizard – Page 1 .............................................................................425
Figure 307: G.8032 ERPI Attribute Wizard – Page 2 .............................................................................426
Figure 308: G.8032 ERPI Attribute Wizard – Page 3 .............................................................................427
Figure 309: G.8032 ERPI Attribute Wizard – Page 4 .............................................................................427
Figure 310: G.8032 ERPI Attribute Wizard – Submit ............................................................................428
Figure 311: G.8032 ERPI Attribute – Edit Page .....................................................................................429
Figure 312: G.8032 ERPI Attribute – State Page...................................................................................432
Figure 313: G.8032 ERPI Attribute – Statistics Page.............................................................................433
Figure 314: Instance Per Service Mapping – Edit Page ........................................................................436
Figure 315: MSTP Bridge General Attributes Page ...............................................................................438
Figure 316: MSTP Bridge Configuration ID Page ..................................................................................440
Figure 317: MSTP Bridge Spanning Tree Page......................................................................................441
Figure 318: MSTP Bridge CIST Page ......................................................................................................444
Figure 319: MSTP Bridge MSTI Page ....................................................................................................445
Figure 320: MSTP Bridge MSTI – Edit Page ..........................................................................................445
Figure 321: MSTP Bridge VLAN Page ....................................................................................................447
Figure 322: MSTP Port Spanning Tree Page (IP-20C) ...........................................................................449
Figure 323: MSTP Port Spanning Tree – Edit Page ...............................................................................449
Figure 324: MSTP Port CIST Page (IP-20C) ...........................................................................................451
Figure 325: MSTP Port CIST – Edit Page ...............................................................................................451
Figure 326: MSTP Port MSTI Page ........................................................................................................454
Figure 327: MSTP Port MSTI – Edit Page ..............................................................................................455
Figure 328: MSTP Port BDPU Counters Page .......................................................................................457
Figure 329: Bandwidth Notification Page.............................................................................................458
Figure 330: Bandwidth Notification – Add Page ..................................................................................459
Page 28 of 1094
Page 29 of 1094
Page 30 of 1094
Page 31 of 1094
Page 32 of 1094
List of Tables
Table 1: Electronic Information Products Declaration of Hazardous/Toxic Substances ........................46
Table 2: IP-20 Web EMS Menu Hierarchy – Platform Menu ..................................................................67
Table 3: IP-20 Web EMS Menu Hierarchy – Faults Menu ......................................................................68
Table 4: IP-20 Web EMS Menu Hierarchy – Radio Menu .......................................................................69
Table 5: IP-20 Web EMS Menu Hierarchy – Ethernet Menu ..................................................................70
Table 6: IP-20 Web EMS Menu Hierarchy – Sync Menu.........................................................................72
Table 7: IP-20 Web EMS Menu Hierarchy – Quick Configuration Menu ................................................73
Table 8: IP-20 Web EMS Menu Hierarchy – Utilities Menu....................................................................73
Table 9: Cables for Direct CPU Connection ............................................................................................77
Table 10: Activation Key Status Parameters ..........................................................................................89
Table 11: Activation Key-Enabled-Features Table Parameters ..............................................................92
Table 12: Activation Key-Enabled-Features Description ........................................................................93
Table 13: Time Services Parameters ......................................................................................................97
Table 14: Ethernet Splitter Cable and Gland for Dual Ethernet Port .....................................................98
Table 15: MRMC Symmetrical Scripts Page Parameters ......................................................................108
Table 16: Available Radio Profiles – IP-20C, IP-20C-HP, and IP-20S .....................................................109
Table 17: Available Radio Profiles – IP-20E ..........................................................................................109
Table 18: Available Radio Profiles – IP-20V ..........................................................................................110
Table 19: System Configurations ..........................................................................................................128
Table 20: Multiband Cable for Use with CSFP Port ..............................................................................176
Table 21: LACP Aggregation Status Parameters ...................................................................................189
Table 22: LACP Port Status Parameters................................................................................................191
Table 23: LACP Port Statistics ...............................................................................................................193
Table 24: LACP Port Debug Statistics ...................................................................................................194
Table 25: SNMP V3 Authentication Parameters ..................................................................................245
Table 26: Trap Manager Parameters ....................................................................................................247
Table 27: Software Versions Table Columns ........................................................................................252
Table 28: Download & Install Status Parameters .................................................................................259
Table 29: Backup Files Page Columns ..................................................................................................263
Table 30: Unit Parameters ...................................................................................................................273
Table 31: NTP Status Parameters .........................................................................................................276
Table 32: SFP Inventory Parameters ....................................................................................................280
Table 33: SFP Digital Diagnostic Monitoring (DDM) Parameters .........................................................280
Table 34: DDM PMs ..............................................................................................................................281
Table 35: Radio Status Parameters ......................................................................................................287
Table 36: Remote Radio Parameters ....................................................................................................289
Page 33 of 1094
Page 34 of 1094
Page 35 of 1094
Page 36 of 1094
Page 37 of 1094
Page 38 of 1094
Page 39 of 1094
Page 40 of 1094
Page 41 of 1094
When working with a FibeAir IDU, note the following risk of electric shock and
energy hazard: Disconnecting one power supply disconnects only one power
! supply module. To isolate the unit completely, disconnect all power sources.
Machine noise information order - 3. GPSGV, the highest sound pressure level
! amounts to 70 dB (A) or less, in accordance with ISO EN 7779.
Static electricity may cause body harm, as well as harm to electronic components
inside the device.
To prevent damage, before touching components inside the device, all
electrostatic charge must be discharged from both personnel and tools.
Page 42 of 1094
ESD
This equipment contains components which are sensitive to “ESD” (Electro Static
Discharge). Therefore, ESD protection measures must be observed when touching
the IDU.
Anyone responsible for the installation or maintenance of the FibeAir IDU must
use an ESD Wrist Strap.
Additional precautions include personnel grounding, grounding of work benches,
grounding of tools and instruments, as well as transport and storage in special
antistatic bags and boxes.
Laser
Use of controls or adjustments or performance of procedures other than those
specified herein may result in hazardous radiation exposure.
The optical interface must only be serviced by qualified personnel, who are aware
of the hazards involved to repair laser products.
When handling laser products, the following precautions must be taken:
• Never look directly into an open connector or optical cable.
• Before disconnecting an optical cable from the optical transmitter, the
power should be switched off. If this is not possible, the cable must be
disconnected from the transmitter before it is disconnected from the
receiver.
• When the cable is reconnected it must be connected to the receiver before
it is connected to the transmitter.
Page 43 of 1094
with the US National Electrical Code, Articles 110-16, 110-17 and 110-18, and the
Canadian Electrical Code, Section 12.
Overcurrent Protection: A readily accessible listed branch circuit overcurrent
protective device, rated 15 A, must be incorporated in the building wiring.
Grounded Supply System: The equipment shall be connected to a properly
grounded supply system. All equipment in the immediate vicinity shall be
grounded the same way, and shall not be grounded elsewhere.
Local Supply System: The DC supply system is to be local, i.e. within the same
premises as the equipment.
Disconnect Device: A disconnect device is not allowed in the grounded circuit
between the DC supply source and the frame/grounded circuit connection.
Page 44 of 1094
Beachten Sie beim Arbeiten mit FibeAir IDU das folgende Stromschlag- und
Gefahrenrisiko: Durch Abtrennen einer Stromquelle wird nur ein
! Stromversorgungsmodul abgetrennt. Um die Einheit vollständig zu isolieren,
trennen Sie alle Stromversorgungen ab.
Page 45 of 1094
Page 46 of 1094
Target Audience
This manual is intended for use by individuals responsible for configuration and
administration of an IP-20 system or network.
Related Documents
• FibeAir IP-20C Technical Description
• FibeAir IP-20C Installation Guide
• FibeAir IP-20C-HP Technical Description
• FibeAir IP-20C-HP Installation Guide
• FibeAir IP-20S Technical Description
• FibeAir IP-20S Installation Guide
• FibeAir IP-20E Technical Description
• FibeAir IP-20E Installation Guide
• FibeAir IP-20V Technical Description
• FibeAir IP-20V Installation Guide
• FibeAir IP-20 Series MIB Reference
• Release Notes for FibeAir IP-20 All-Outdoor Products, CeraOS 11.3
Page 47 of 1094
Section I:
Introduction
Page 48 of 1094
1. Introduction
This section includes:
• Configuration Tips
• IP-20C Overview
• IP-20C-HP Overview
• IP-20S Overview
• IP-20E Overview
• IP-20V Overview
• PoE Injector Overview
• FibeAir IP-20 Assured Platform
• The Web-Based Element Management System
This user manual provides instructions for configuring and operating the following
products:
• IP-20C
• IP-20C-HP
• IP-20S
• IP-20E
• IP-20V
Each of these products except IP-20C-HP can be used with a Ceragon-approved
PoE Injector.
Wherever applicable, the manual notes the specific distinctions between these
products. The manual also notes when specific features are only applicable to
certain products and not others.
Page 49 of 1094
Page 50 of 1094
Page 51 of 1094
Page 52 of 1094
The use of separate generic radio units and diplexer units also enables operators
to achieve a quicker system deployment time. In the planning stage, when the
frequency bands have been determined but the exact sub-band layout is still
under consideration, operators can already order all the radio units required for
the frequency bands that have been determined, and can begin ordering diplexer
units for the approximate sub-bands that are anticipated, while still determining
the exact network parameters. This enables faster delivery and deployment of the
network.
Page 53 of 1094
Page 54 of 1094
Page 55 of 1094
Page 56 of 1094
Page 57 of 1094
Figure 3: Main Web EMS Page with Representation of Front Panel – IP-20C and IP-20S
Figure 4: Main Web EMS Page with Representation of Front Panel – IP-20C-HP
Page 58 of 1094
Figure 5: Main Web EMS Page with Representation of Front Panel – IP-20E
Figure 6: Main Web EMS Page with Representation of Front Panel – IP-20V
Page 59 of 1094
Figure 7: Main Web EMS Page with Active and Standby Tabs
Page 60 of 1094
Page 61 of 1094
Note: When one or more columns are hidden, the icon turns white ( ).
Page 62 of 1094
Page 63 of 1094
Page 64 of 1094
If FIPS mode is enabled, a yellow Warning icon may appear next to certain items.
These items indicate fields for which the current security settings are not
appropriate for FIPS mode. Hover over an item to display a tooltip explaining the
warning.
For radio interfaces on which AES-256 payload encryption is enabled, you can
display the master key by hovering the mouse over the icon to the right of the
Master Key field.
Page 65 of 1094
The Security Summary page can be customized to include only specific columns
and tables. This enables you to hide information you do not need in order to focus
on the information that is most relevant.
To hide a specific section of the Radio Summary page, click the section title. To
display a section that has been hidden, click the section title again.
To customize which columns appear in a section, click next to the section title. A list
of columns is displayed. Select only the columns you want to display and click again.
Note: When one or more columns are hidden, the icon turns white ( ).
Page 66 of 1094
Page 67 of 1094
Page 68 of 1094
Page 69 of 1094
General Configuration Setting the MRU Size and the S-VLAN Ethertype
Mapping Ethernet Services to MSTP instances
(MSTIs)
Services Configuring Ethernet Service(s)
Interfaces > Physical Interfaces Configuring Ethernet Interfaces
Interfaces > Logical Interfaces Configuring Ingress Path Classification on a
Logical Interface
Assigning Policers to Interfaces
Configuring the Ingress and Egress Byte
Compensation
Assigning WRED Profiles to Queues
Assigning a Queue Shaper Profile to a Queue
Assigning a Service Bundle Shaper Profile to a
Service Bundle
Assigning a Priority Profile to an Interface
Assigning a WFQ Profile to an Interface
Performing Ethernet Loopback
Interfaces > ASP & LLF Configuring Automatic State Propagation and
Link Loss Forwarding
PM & Statistics > RMON RMON Statistics
PM & Statistics > Port TX Port TX Statistics
PM & Statistics > Port RX Port RX Statistics
PM & Statistics > Egress CoS Statistics Egress CoS Statistics
PM & Statistics > Egress CoS PM > Configuration Configuring and Displaying Queue-Level PMs
PM & Statistics > Egress CoS PM > Egress CoS PM Configuring and Displaying Queue-Level PMs
QoS > Classification > 802.1Q Modifying the C-VLAN 802.1Q UP and CFI Bit
Classification Table
QoS > Classification > 802.1AD Modifying the S-VLAN 802.1 UP and DEI Bit
Classification Table
QoS > Classification > DSCP Modifying the DSCP Classification Table
QoS > Classification > MPLS Modifying the MPLS EXP Bit Classification Table
QoS > Classification > MAC DA Modifying the MAC DA Classification Table
QoS > Policer > Policer Profile Configuring Policer Profiles
Page 70 of 1094
Page 71 of 1094
Protocols > LACP > Port > Status Displaying LACP Port Status Parameters
Protocols > LACP > Port > Statistics Displaying LACP Port Statistics
Protocols > LACP > Port > Debug Displaying LACP Port Debug Statistics
Interfaces > Groups > LAG Configuring Link Aggregation (LAG) and LACP
Page 72 of 1094
Page 73 of 1094
Section II:
Web EMS Configuration
Page 74 of 1094
2. Getting Started
This section includes:
• Assigning IP Addresses in the Network
• Establishing a Connection
• Logging on
• Changing Your Password
• Applying a Pre-Defined Configuration File
• Performing Quick Platform Setup
• Mate Management Access (IP Forwarding)
• Configuring In-Band Management
• Changing the Management IP Address
• Configuring the Activation Key
• Setting the Time and Date (Optional)
• Enabling the Interfaces (Interface Manager)
• Configuring the Radio (MRMC) Script(s)
• Running the Frequency Scanner (IP-20E and IP-20V)
• Configuring the Radio Parameters
• Enabling ACM with Adaptive Transmit Power
• Operating in FIPS Mode
• Configuring Grouping (Optional)
• Creating Service(s) for Traffic
Page 75 of 1094
2.2.1 PC Setup
To obtain contact between the PC and the IP-20 unit, it is necessary to configure
an IP address on the PC within the same subnet as the IP-20 unit. The default IP-
20 IP address is 192.168.1.1. Set the PC address to e.g. 192.168.1.10 and subnet
mask to 255.255.255.0. Note the initial settings before changing.
Note: The IP-20 IP address, as well as the password, should be changed
before operating the system. See Changing the Management IP
Address and Changing Your Password.
1 Select Control Panel > All Control Panel Items > Network and Sharing Center.
2 Click Change the adapter settings.
3 Select Local Area Connection > Properties > Internet Protocol Version 4
(TCP/IP), and set the following parameters:
◦ IP address: 192.168.1.10
◦ Subnet mask 255.255.255.0
◦ No default gateway
4 Click OK to apply the settings.
Page 76 of 1094
2.3 Logging on
1 Open an Internet browser (Internet Explorer or Mozilla Firefox).
2 Enter the default IP address “192.168.1.1” in the Address Bar. The Login page
opens.
Page 77 of 1094
For IP-20E R2H, as an alternative to the proprietary cable described above, you
can use a cable with the following pinouts:
P1 WIRE P2
2 3
TWISTED PAIR 1
8 6
14 1
TWISTED PAIR 2
20 2
For IP-20E ESP and IP-20V, as an alternative to the proprietary cable described
above, you can use a cable with the following pinouts:
P1 WIRE P2
14 3
TWISTED PAIR 1
16 6
18 1
TWISTED PAIR 2
20 2
Page 78 of 1094
Page 79 of 1094
Page 80 of 1094
Page 81 of 1094
Figure 20: Quick Configuration – From File Page – Configuration File Loaded
3 In the Device List field, select the IP-20 unit you are configuring.
Note: Although the configuration file may contain parameters for multiple
types of devices, only devices of the same product type as the unit you
are configuring are displayed in this field.
4 Optionally, click View file to display the configuration file (read-only).
5 To initiate the configuration, click Submit. Progress is updated in the Quick
Configuration – From File page.
When the configuration is complete, the unit reboots.
Note: If the pre-defined configuration file included a new IP address for the unit,
make sure to configure an IP address on the PC or laptop you are using to
perform the configuration within the same subnet as the IP-20 unit’s new
IP address.
Page 82 of 1094
Page 83 of 1094
2 The Unit Parameters section is optional. For details on each field, see
Configuring Unit Parameters.
3 In the IPv4 Address section, configure the unit’s management IP address,
subnet mask, and, optionally, a default gateway. If you want to use an IPv6
address, see Changing the Management IP Address.
4 In the Date & Time section, you can enable Network Time Protocol (NTP). NTP
distributes Coordinated Universal Time (UTC) throughout the system, using a
jitter buffer to neutralize the effects of variable latency.
If you select Enable, the NTP version and NTP server IP address fields are also
displayed, enabling you to configure the NTP parameters. For details on these
fields, see Configuring NTP.
Note: You can configure additional NTP servers, up to four, in the NTP
Configuration page. See Configuring NTP.
5 In the Activation Key section, you can enable or disable Demo mode in the
Demo admin field. Demo mode enables all features for 60 days. When demo
mode expires, the most recent valid activation key goes into effect. The 60-
day period is only counted when the system is powered up. 10 days before
demo mode expires, an alarm is raised indicating that demo mode is about to
expire.
If you set Demo admin to Disable, the Activation Key field is displayed. Enter a
valid activation key in this field. For a full explanation of activation keys, see
Configuring the Activation Key.
Page 84 of 1094
6 In the SNMP Parameters section, you can set whether to enable or disable
SNMP monitoring in the Admin field, and set the SNMP Read Community and
SNMP Write Community. For a full explanation of SNMP parameters, see
Configuring SNMP.
7 Click Finish. The Selection Summary page opens. To go back and change any of
the parameters, click Back. To implement the new parameters, click Submit.
Page 85 of 1094
Page 86 of 1094
Page 87 of 1094
Page 88 of 1094
Page 89 of 1094
Parameter Definition
Sanction state If an Activation Key Violation alarm has occurred, and
the 48-hour activation key violation grace period has
expired without the system having been brought into
conformance with the activation-key-enabled capacity
and feature set, Yes appears in this field to indicate
that the system is in an Activation Key Violation
sanction state. All other alarms are hidden until the
capacity and features in use are brought within the
activation-key-enabled capacity and feature set.
Page 90 of 1094
For instructions on how to reclaim an activation key, refer to the User Guide for
the Ceragon Activation Key Management System, Rev A.15 or later, Chapter 7,
Reclaiming an Activation Key.
Page 91 of 1094
Page 92 of 1094
Page 93 of 1094
Page 94 of 1094
Page 95 of 1094
Page 96 of 1094
3 Click Apply.
Page 97 of 1094
Table 14: Ethernet Splitter Cable and Gland for Dual Ethernet Port
Marketing Model Item Description
Page 98 of 1094
• One end of the cable is labelled GbE1/PoE. This is used for the RJ-45
connection to Eth 1 (traffic/PoE).
• The other end of the cable is labelled GbE2. This is used for the RJ-45
connection to Eth 2 (traffic).
Page 99 of 1094
Figure 36: MRMC Symmetrical Scripts Page – Configuration – Adaptive Mode (IP-20C/IP-20C-HP)
Figure 37: MRMC Symmetrical Scripts Page – Configuration – Adaptive Mode (IP-20E)
Parameter Definition
MRMC Script minimum profile Adaptive ACM mode only: The minimum profile for the script. For
example, if you select a minimum profile of 3, the system will not go
below profile 3 regardless of the channel fading conditions. The
minimum profile cannot be greater than the maximum profile, but it can
be equal to it.
Profile 0 QPSK
Profile 1 8 QAM
Profile 2 16 QAM
Profile 3 32 QAM
Profile 4 64 QAM
Profile 5 128 QAM
Profile 6 256 QAM
Profile 7 512 QAM
Profile 8 1024 QAM (Strong FEC)
Profile 9 1024 QAM (Light FEC)
Profile 10 2048 QAM
Profile 0 BPSK
Profile 1 QPSK
Profile 2 8 QAM
Profile 3 16 QAM
Profile 4 32 QAM
Profile 5 64 QAM
Profile 6 128 QAM
Profile 7 256 QAM
Profile 0 BPSK
Profile 1 QPSK
Profile 2 8 QAM
Profile 3 16 QAM
Profile 4 32 QAM
Profile 5 64 QAM
Profile 6 128 QAM
Profile 7 256 QAM
◦ The Scan Progress field displays the scan’s progress, in percentage of the
defined spectrum that has been scanned. In Continuous Mode, the Scan
Progress field rises to 100 when the defined spectrum has been scanned,
returns to 0, and continues to advance from 0 to 100 for each scan until
you click Stop. In Single Mode, the Scan Progress field rises to 100 and
stays at 100 once the defined spectrum has been scanned.
◦ The Frequency Scanner Band field displays the frequency channel
configured in the current MRMC script. See Configuring the Radio (MRMC)
Script(s).
◦ The Last Scan Date and Time field displays the date and time of the most
recently completed frequency scan.
Scan results are displayed are displayed in table format, and can also be displayed
in graph format. In Single Mode, results are displayed after the scan is completed.
In Continuous Mode, results are displayed after the scan has completed one cycle
over the defined spectrum, and are automatically updated as the scan proceeds.
Figure 38 shows the results of a Continuous Mode scan on an IP-20V in table
format. Figure 39 shows the results of a Single Mode scan on an IP-20E in table
format. For each RX channel in the defined frequency range, the table displays the
following columns:
• Frequency (MHz) – The starting frequency in the scanned channel.
• RSL Sample Value (dBm) – In Single Mode, the RSL value measured for the
scanned channel. In Continuous Mode, the latest RSL value measured for the
scanned channel.
• Minimum RSL (dBm) – In Continuous Mode, the lowest RSL value measured
for the scanned channel. In Single Mode, the same as the RSL Sample Value.
• Maximum RSL (dBm) – In Continuous Mode, the highest RSL value measured
for the scanned channel. In Single Mode, the same as the RSL Sample Value.
You can also display the scan results in graph format by clicking Graph. The Graph
page presents the scan results in graphical format, with the frequency on the
horizontal axis and the RSL on the vertical axis.
The Graph page has the following tabs:
• RSL Sample Value (dBm) – In Single Mode, the RSL value measured for the
scanned channel. In Continuous Mode, the latest RSL value measured for the
scanned channel.
• Minimum RSL (dBm) – In Continuous Mode, the lowest RSL value measured
for the scanned channel. In Single Mode, the same as the RSL Sample Value.
• Maximum RSL (dBm) – In Continuous Mode, the highest RSL value measured
for the scanned channel. In Single Mode, the same as the RSL Sample Value.
Figure 40: Frequency Scanner Results – Graph Format (IP-20V – Continuous Mode)
Figure 41: Frequency Scanner Results – Graph Format (IP-20E – Single Mode)
2 For multi-carrier units, select the carrier in the Radio table (see Figure 42) and
click Edit. A separate Radio Parameters page opens. The page is essentially
identical to the IP-20S, IP-20E, and IP-20V page, except for the addition of a
Radio location parameter.
iii To mute the TX output of the radio carrier, select Unmute in the TX Mute
field. To unmute the TX output of the radio carrier, select Off. To configure
a timed mute, select Mute with Timer.
If you select Mute with Timer, an additional field appears: Mute timeout
(minutes). This field defines a timer for the mute, in minutes (1-1440).
When the timer expires, the mute automatically ends. This provides a fail-
safe mechanism for maintenance operations that eliminates the possibility
of accidently leaving the radio muted after the maintenance has been
completed. By default, the timer is 10 minutes.
To disable Link ID Mismatch Security, enter the following command in root view:
root> platform security link-id mismatch security set admin
disable
To display the current Link ID Mismatch Security setting, enter the following
command in root view:
root> platform security link-id mismatch security show admin
3. Configuration Guide
This section includes:
• System Configurations
• Configuring a Link Using the Quick Configuration Wizard
• Configuring Multi-Carrier ABC
• Configuring Link Aggregation (LAG) and LACP
• Configuring XPIC
• Configuring Unit Protection with HSB Radio Protection (External Protection)
• Configuring MIMO and Space Diversity
• Operating an IP-20C or IP-20C-HP in Single Radio Carrier Mode
Note: Multi-Carrier ABC, XPIC, MIMO, and Space Diversity are only
supported with IP-20C. HSB radio protection is only supported with IP-
20C and IP-20S.
You can also use this wizard to configure XPIC between the radios within the
Multi-Carrier ABC group. For a detailed explanation of XPIC and its
requirements, see Configuring XPIC.
Note: 1+0 Repeater links and Multi-Carrier ABC are only available for IP-20C
and IP-20C-HP dual-carrier units.
• Multiband – Configures a link that bundles E-Band and microwave radios in a
single group that is shared with an Ethernet interface. A Multiband link uses
an IP-20E and an IP-20C, IP-20C-HP, IP-20S, IP-20N, IP-20A, or third-party
microwave unit. The Multiband group is only configured on the IP-20E unit.
See Configuring a Multiband (Enhanced Multi-Carrier ABC) Link Using the
Quick Configuration Wizard.
Because the Quick Configuration wizard creates Pipe links, you cannot add an
interface to a link using the Quick Configuration wizard if any service points are
attached to the interface prior to configuring the link. See Deleting a Service Point.
Note: If the carrier belongs to a 4x4 MIMO group, an ASD group, an AFR
group, or an XPIC group, you must disable the group before changing
the TX or RX frequency.
◦
Minimum profile – Enter the minimum profile for the script. See
Configuring the Radio (MRMC) Script(s).
15 Click Next. Page 5 of the 1+0 Quick Configuration wizard opens.
19 Click Finish. Page 6 of the 1+0 Quick Configuration wizard opens. This page
displays the parameters you have selected for the link.
3.2.2 Configuring a 1+0 (Repeater) Link Using the Quick Configuration Wizard
To configure a 1+0 repeater (radio-to-radio) link using the Quick Configuration
wizard:
1 Select Quick Configuration > PIPE > Single Carrier > 1+0 (Repeater). Page 1 of
the 1+0 Repeater Quick Configuration wizard opens.
◦ If you selected Adaptive in the Operational Mode field, the following two
fields are displayed:
◦ Maximum profile – Enter the maximum profile for the script. See
Configuring the Radio (MRMC) Script(s).
◦
Minimum profile – Enter the minimum profile for the script. See
Configuring the Radio (MRMC) Script(s).
13 Click Next. Page 5 of the 1+0 Repeater Quick Configuration wizard opens.
16 Click Finish. Page 6 of the 1+0 Repeater Quick Configuration wizard opens.
This page displays the parameters you have selected for the link.
Figure 58: 1+0 Repeater Quick Configuration Wizard – Page 6 (Summary Page)
17 To complete configuration of the link, click Submit. If you want to go back and
change any of the parameters, click Back. After you click Submit, the unit is
reset.
2 In the First PIPE Type field, select the Attached Interface type for the service
that will connect the first Ethernet interface and the first radio interface.
Options are:
◦ s-tag – All S-VLANs and untagged frames are classified into the service.
◦ dot1q – All C-VLANs and untagged frames are classified into the service.
Note: For a full explanation of Ethernet Services, service types, and attached
interface types, see Configuring Ethernet Service(s).
3 In the Ethernet Interface field, select the Ethernet interface or a LAG that will
send and receive traffic to and from the first radio interface.
Note: To create a LAG, click Create LAG. The Create LAG Group page opens.
For instructions on creating LAG groups, see Configuring Link
Aggregation (LAG) and LACP.
4 Click Next. Page 2 of the 2 X (1 + 0) Quick Configuration wizard opens.
5 In the First Radio Interface field, select the radio interface for the first link.
6 Click Next. Page 3 of the 2 X (1 + 0) Quick Configuration wizard opens.
14 You can configure the basic radio parameters for each interface. If you
selected XPIC in the Radio XPIC Configuration page, configure the parameters
for the group rather than the individual interfaces.
15 For each radio interface or XPIC group, configure the following radio
parameters.
i In the TX Frequency (MHz) field, set the transmission radio frequency in
MHz.
ii In the RX Frequency (MHz) field, set the received radio frequency in MHz.
iii In the TX Level (dBm) field, enter the desired TX signal level (TSL). The
range of values depends on the frequency and RFU type.
iv To mute the TX output of the radio, select Mute in the TX mute field. To
unmute the TX output of the radio, select Unmute.
16 Click Next. Page 7 of the 2 X (1 + 0) Quick Configuration wizard opens.
17 You can configure the MRMC script parameters for each interface. For an XPIC
group, configure the parameters for the group rather than the individual
interfaces.
18 For each interface or XPIC group, configure the following MRMC script
parameters.
i In the Script ID field, select the MRMC script you want to assign to the
radio or XPIC group. For a full explanation of choosing an MRMC script, see
Configuring the Radio (MRMC) Script(s).
ii In the Operational Mode field, select the ACM mode: Fixed or Adaptive.
◦ Fixed ACM mode applies constant TX and RX rates. However, unlike regular
scripts, with a Fixed ACM script you can specify a maximum profile to
inhibit inefficient transmission levels.
◦ In Adaptive ACM mode, TX and RX rates are dynamic. An ACM-enabled
radio system automatically chooses which profile to use according to the
channel fading conditions.
iii Do one of the following:
◦ If you selected Fixed in the Operational Mode field, the next field is
Profile. Select the ACM profile in the Profile field.
◦ If you selected Adaptive in the Operational Mode field, the following two
fields are displayed:
◦ Maximum profile – Enter the maximum profile for the script. See
Configuring the Radio (MRMC) Script(s).
◦
Minimum profile – Enter the minimum profile for the script. See
Configuring the Radio (MRMC) Script(s).
19 Click Next. Page 8 of the 2 X (1 + 0) Quick Configuration wizard opens.
21 If you selected Yes in the In Band Management field, select the management
VLAN in the Management VLAN field.
Note: You can only select Untagged if you are not using IP Forwarding. If you
select Untagged and you want to configure IP Forwarding later, you
will first have to change Untagged to a specific VLAN. See Mate
Management Access (IP Forwarding) (CLI).
22 If you want to use the Ethernet interface as well as the radio interface for in-
band management, select In Band includes Ethernet interface.
23 Click Next. Page 9 of the 2 X (1 + 0) Quick Configuration wizard opens.
3.2.4 Configuring a 2+0 Multi-Carrier ABC Link Using the Quick Configuration
Wizard
To configure a 2+0 Multi-Carrier ABC link using the Quick Configuration wizard:
1 Select Quick Configuration > PIPE > Multi Carrier ABC > 2+0. Page 1 of the 2 +
0 Multi Carrier ABC Quick Configuration wizard opens.
Figure 73: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio #2 Selection Page
6 In the Radio #2 Interface field, select the second radio interface for the group.
7 Click Next. The Radio XPIC Configuration page opens. If you want to set up an
XPIC configuration, select the radio pair. For full instructions on configuring
XPIC, including antenna alignment instructions, see Configuring XPIC.
Figure 74: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio XPIC Configuration
Page
8 Click Next. The Radio Parameters Configuration page opens. You can configure
the basic radio parameters for each interface. If you selected XPIC in the Radio
XPIC Configuration page, you configure the parameters for the group rather
than the individual interfaces.
Figure 75: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio Parameters
Configuration Page
Figure 76: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio Parameters
Configuration Page (XPIC)
9 For each interface or XPIC group, configure the following radio parameters.
i In the TX Frequency (MHz) field, set the transmission radio frequency in
MHz.
ii In the RX Frequency (MHz) field, set the received radio frequency in MHz.
Note: For IP-20E and IP-20V, a frequency scanner is available to scan the
frequency range covered by the currently configured MRMC script and
determine the current interference level for each channel. This
enables you to select the best channel in accordance with current
interference levels. See Running the Frequency Scanner (IP-20E and IP-
20V).
iii In the TX Level (dBm) field, enter the desired TX signal level (TSL). The
range of values depends on the frequency and RFU type.
iv To mute the TX output of the radio, select Mute in the TX mute field. To
unmute the TX output of the radio, select Unmute.
10 Click Next. The Radio MRMC Script Configuration page opens. You can
configure the MRMC script parameters for each interface. For an XPIC group,
you configure the parameters for the group rather than the individual
interfaces.
Figure 77: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio MRMC Script
Configuration Page
Figure 78: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio MRMC Script
Configuration Page – XPIC
11 For each interface or XPIC group, configure the following MRMC script
parameters.
12 In the Script ID field, select the MRMC script you want to assign to the radio or
XPIC group. For a full explanation of choosing an MRMC script, see Configuring
the Radio (MRMC) Script(s).
13 In the Operational Mode field, select the ACM mode: Fixed or Adaptive.
◦ Fixed ACM mode applies constant TX and RX rates. However, unlike regular
scripts, with a Fixed ACM script you can specify a maximum profile to
inhibit inefficient transmission levels.
◦ In Adaptive ACM mode, TX and RX rates are dynamic. An ACM-enabled
radio system automatically chooses which profile to use according to the
channel fading conditions.
14 Do one of the following:
◦ If you selected Fixed in the Operational Mode field, the next field is
Profile. Select the ACM profile in the Profile field.
◦ If you selected Adaptive in the Operational Mode field, the following two
fields are displayed:
◦ Maximum profile – Enter the maximum profile for the script. See
Configuring the Radio (MRMC) Script(s).
◦
Minimum profile – Enter the minimum profile for the script. See
Configuring the Radio (MRMC) Script(s).
15 Click Next. The Management Configuration page opens.
Figure 79: 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Management Configuration
Page
16 In the In Band Management field, select Yes to configure in-band
management, or No if you do not need in-band management. If you select
Yes, the Management VLAN field appears.
17 If you selected Yes in the In Band Management field, select the management
VLAN in the Management VLAN field.
Note: You can only select Untagged if you are not using IP Forwarding. If you
select Untagged and you want to configure IP Forwarding later, you
will first have to change Untagged to a specific VLAN. See Mate
Management Access (IP Forwarding) (CLI).
18 If you want to use the Ethernet interface as well as the radio interface for in-
band management, select In Band includes Ethernet interface.
19 Click Finish. The Summary page opens. This page displays the parameters you
have selected for the group.
Figure 80: 2 + 0 Multi Carrier ABC Quick Configuration Wizard –Summary Page
20 To complete configuration of the Multi-Carrier ABC group, click Submit. If you
want to go back and change any of the parameters, click Back. After you click
Submit, the unit is reset.
15 In the Operational Mode field, select the ACM mode: Fixed or Adaptive.
◦ Fixed ACM mode applies constant TX and RX rates. However, unlike regular
scripts, with a Fixed ACM script you can specify a maximum profile to
inhibit inefficient transmission levels.
◦ In Adaptive ACM mode, TX and RX rates are dynamic. An ACM-enabled
radio system automatically chooses which profile to use according to the
channel fading conditions.
16 Do one of the following:
◦ If you selected Fixed in the Operational Mode field, the next field is
Profile. Select the ACM profile in the Profile field.
◦ If you selected Adaptive in the Operational Mode field, the following two
fields are displayed:
◦ Maximum profile – Enter the maximum profile for the script. See
Configuring the Radio (MRMC) Script(s).
◦
Minimum profile – Enter the minimum profile for the script. See
Configuring the Radio (MRMC) Script(s).
17 Click Next. Page 5 of the Multiband Quick Configuration wizard opens.
Note: If you want to manage the paired unit via the IP-20E, refer to the
instructions in Inband Management via the IP-20E.
21 Click Finish. The Summary page opens. This page displays the parameters you
have selected for the group.
• Enable an ASP group on the IP-20C or IP-20C-HP unit, where the Monitored
Interface is the Multi-Carrier ABC group and the Controlled Interface is the
Ethernet interface that faces the upstream IP-20 unit. See Configuring Automatic
State Propagation.
• Enable the LAG group shutdown in case of degradation event option on the
upstream IP-20 unit.
Notes: When using in-band management, management is lost in the event of
radio failure and returns when the radio link is restored.
The minimum bandwidth threshold is based on the capacity of the
Multi-Carrier ABC group, not the combined capacities of the group’s
members. The group’s aggregated capacity is displayed in the Multi-
Carrier ABC Group – Edit Group page (Figure 94).
You can configure Multi-Carrier ABC Minimum Bandwidth Override when creating
the group. See Configuring a Multi-Carrier ABC Group.
To configure Multi-Carrier ABC Minimum Bandwidth Override after the group has
been created:
1 Select the group in the Multi-Carrier ABC table and click Edit Group. The Edit
Group page opens.
Multiband with CeraOS version 10.5 is not compatible over the link
with Multiband using earlier versions, and Multiband with CeraOS
version 10.7 and higher is not compatible over the link with Multiband
using earlier versions. Therefore, when upgrading the software on a
Multiband link to CeraOS 10.5 or to CeraOS 10.7 or higher from an
earlier version, make sure to upgrade the remote unit first when using
inband management to avoid loss of management.
Eth1
(10GE)
External Multiband
GbE Port
Eth2 Carrier
Switch Group
Eth3
Traffic
IP-20E
Eth1
Carrier 1
Management Eth2
Pipe Carrier 2
(Optional) and/or
Synchronization
(Optional) Multi-Carrier
Eth 3
ABC Group
IP-20C/IP-20C-HP
Eth1
(10GE)
External Multiband
GbE Port Eth2 Carrier
Switch Traffic Group
Eth3
Management (Optional)
and/or Synchronization IP-20E
(Optional)
Carrier 1
Multi-
Eth (1G)
Carrier
ABC Group
IP-20N/IP-20A RFU-D/RFU-D-HP
Eth1
(10GE)
External Multiband
GbE Port
Eth2 Carrier
Switch Group
Eth3
Traffic
IP-20E
Eth
Management Pipe
(Optional) and/or Carrier
Synchronization
(Optional) Eth
Third-Party Unit
5 On the IP-20E, configure a Multiband group that includes Eth2 and the radio:
i Select Radio > Groups > Multi-Carrier ABC. The Multi Carrier ABC Groups
page opens.
Figure 104: Multi Carrier ABC Groups Page (Populated with Multiband Group)
xii Reset the IP-20E. See Performing a Hard (Cold) Reset.
Note: After adding Eth2 to the Multiband group, an alarm is raised (Alarm
1794). This alarm is cleared when the unit is reset.
6 On the paired unit, configure a service between the port receiving traffic from
the IP-20E and the radio or Multi-Carrier ABC group. See Configuring Ethernet
Service(s).
Note: If the paired unit is an IP-20C, IP-20C-HP, IP-20S, or third-party
microwave radio, the service must be a Pipe service. If the paired unit
is an IP-20N or IP-20A, any service type can be used. However, this
service must be given higher priority than any other service attached
to the interfaces used for Multiband.
7 On the paired unit, configure Automatic State Propagation with ASP trigger by
remote fault enabled. See Configuring Automatic State Propagation and Link
Loss Forwarding.
8 If the paired unit is an IP-20 microwave unit, configure Radio BNM:
Note: If the paired unit is a third-party radio, enable 802.3X Flow Control.
i Select Ethernet > Protocols > Bandwidth Notification. The Bandwidth
Notification page opens.
Eth2 Eth2
Port 2
(CSFP)
Eth3 Eth3
On the IP-20E, a CSFP module must be used for Port 2 in order to utilize both Eth2
and Eth3.
When the paired unit is an IP-20C, IP-20C-HP, or IP-20S, Eth2 and Eth3 on the IP-
20C, IP-20C-HP, or IP-20S must use BiDi SFP modules.
Management and
Power (PoE) Port 1
(MGT/PoE)
IP-20E (ESP)
Multiband
Cable
PWR
Power
Eth1/PoE
Traffic
BiDi
Eth2
Power SFP
MGT/PROT
IP-20C, IP-20C-HP, or
IP-20S (ESS)
Figure 109: Multiband Configuration with Inband Management and/or SyncE via
the IP-20E
A management service must be defined between the management port of the
IP-20E and Eth3 on the IP-20E. This transmits management to the paired unit. See
Configuring In-Band Management.
Note: To avoid loops, in-band management must not be configured on the
slave unit.
Management and
Power (PoE) Port 1
IP-20E (MGT/PoE)
GbE Port
Traffic IP-20E (ESP)
PWR
Power
Eth1/PoE
SFP Eth2
Power Management
(IP-20C)
Source Eth 3
MGT/PROT
IP-20C, IP-20C-HP, or
IP-20S (ESS)
Figure 110: Multiband Configuration with Direct Inband Management to the Paired
Unit
Management and
Management Power (PoE)
(IP-20E) PoE IP-20E Port 1
(MGT/PoE)
Injector
Port 2
SFP (Eth2/Eth3)
External
Switch Traffic IP-20E (ESP)
Power PWR
Eth1/PoE
Power
Source SFP Eth2
Eth 3
Management
(IP-20C/IP-20S)
MGT/PROT
IP-20C, IP-20C-HP, or
IP-20S (ESS)
Figure 111: Multiband Configuration with Direct Inband Management to the IP-
20C, IP-20C-HP, or IP-20S
IP-20 supports LACP, which expands the capabilities of static LAG and provides
interoperability with third-party equipment that uses LACP. LACP improves the
communication between LAG members. This improves error detection capabilities
in situations such as improper LAG configuration or improper cabling. It also
enables the LAG to detect uni-directional failure and remove the link from the
LAG, preventing packet loss.
LACP is enabled as part of the LAG configuration process. It should only be used if
the LAG is in a link with another LACP-enabled LAG.
Note: LACP is not supported with unit protection. For unit protection, a
special, limited implementation is configured on the logical interface
level. See Configuring Line Protection Mode.
LACP cannot be used with Enhanced LAG Distribution or with the LAG
Group Shutdown in Case of Degradation Event feature.
3.5.3 Enabling and Disabling LAG Group Shutdown in Case of Degradation Event
Note: LAG Group Shutdown in Case of Degradation Event cannot be used
with LACP.
A LAG group can be configured to be automatically closed in the event of LAG
degradation. This option is used if you want traffic from the switch to be re-routed
during such time as the link is providing less than a certain capacity.
By default, the LAG group shutdown in case of degradation event option is
disabled. When enabled, the LAG is automatically closed in the event that any one
or more ports in the LAG fail. When all ports in the LAG are again operational, the
LAG is automatically re-opened.
Note: Failure of a port in the LAG also triggers a lag-degraded alarm, Alarm
ID 100.
To enable or disable the LAG group shutdown in case of degradation event option:
1 Select Ethernet > Groups > LAG to open the LAG page.
2 Select the LAG group in the Link Aggregation table.
3 Click Edit underneath the Link Aggregation table. The Link Aggregation - Edit
page opens (Figure 115).
4 In the LAG degrade field, select Enable to enable the LAG group shutdown in
case of degradation event option or Disable to disable the LAG group
shutdown in case of degradation event option.
5 Click Apply.
2 The LACP Port Status page displays the major port status parameters, per
port. To display all the available LACP port status parameters, select a port
and click View. The LACP Port Status – View page is displayed.
Parameter Definition
Actor System Priority The priority value associated with the Actor’s System ID.
Actor Port The port number locally assigned to the Aggregation Port.
Actor Port Priority The priority value assigned to this Aggregation Port.
Actor Administrative Key The current administrative value of the Key for the Aggregation Port.
Actor Administrative The administrative values of the Actor’s state as transmitted by the Actor
State via LACPDUs.
Actor Operational Key The current operational value of the Key for the Aggregation Port.
Actor Operational State The current operational values of the Actor’s state as transmitted by the
Actor via LACPDUs.
Partner Operational Key The current operational value of the Key for the protocol Partner.
Partner Operational The current values of Actor State in the most recently received LACPDU
State transmitted by the protocol Partner.
Partner Operational The MAC Address value representing the current value of the
System ID Aggregation Port’s protocol Partner’s System ID.
Partner Operational The operational value of priority associated with the Partner’s System ID.
System Priority
Partner Operational Port The operational port number assigned to this Aggregation port by the
Aggregation port’s port Partner.
Partner Operational Port The Priority value assigned to this Aggregation port by the Partner.
Priority
Partner Administrative The current administrative value of the Key for the protocol Partner.
Key
Partner Administrative The current administrative value of Actor state for the protocol Partner.
State
Partner Administrative The MAC Address value representing the administrative value of the
System ID Aggregation Port’s Protocol partner’s System ID.
Partner Administrative The administrative priority value associated with the Partner’s System ID.
System Priority
Partner Administrative The current administrative value of the port number for the protocol
Port partner.
Partner Administrative The current administrative value of the port priority for the protocol
Port Priority partner.
6 Unmute all the carriers and check the RSL levels of all the carriers on both
sides of the link. The RSL of the horizontal carrier of the local unit should
match the RSL of the vertical carrier of the remote unit, within ±2dB. The RSL
of the vertical carrier of the local unit should match the RSL of the horizontal
carrier of the remote unit, within ±2dB.
7 For a 2x2 configuration, repeat Steps 1 through 6 for the lower IP-20C or IP-
20C-HP units.
8 Check the XPI levels of all the carriers on both sides of the link. All the carriers
should have approximately the same XPI value. Do not adjust the XPI at the
remote side of the link, as this may cause the XPI at the local side of the link to
deteriorate.
Note: In some cases, the XPI might not exceed the required 25dB minimum
due to adverse atmospheric conditions. If you believe this to be the
case, you can leave the configuration at the lower values, but be sure
to monitor the XPI to make sure it subsequently exceeds 25dB. A
normal XPI level in clear sky conditions is between 25 and 30dB.
2+2 HSB Space Diversity utilizes two IP-20C units operating in dual core mode. In
each IP-20C unit, both radio carriers are connected to a single antenna. One
optical GbE port on each IP-20C is connected to an optical splitter. Traffic must be
routed to an optical GbE port on each IP-20C unit.
In effect, a 2+2 HSB configuration is a protected 2+0 Space Diversity configuration.
Each IP-20C monitors both of its cores. If the active IP-20C detects a radio failure
in either of its cores, it initiates a switchover to the standby IP-20C.
Notes: Only one MIMO or Space Diversity group can be created per IP-20C or
IP-20C-HP unit. All MRMC scripts that support MIMO also support
Space Diversity.
For 4x4 MIMO links, CeraOS versions 10.5 and higher are not
interoperable with earlier CeraOS versions. If you are upgrading from
an earlier version with an existing 4x4 MIMO link, you must follow the
procedure in Upgrading a 4x4 MIMO Link from an Earlier Version to
CeraOS 10.5 or Higher.
3.9.2 Upgrading a 4x4 MIMO Link from an Earlier Version to CeraOS 10.5 or
Higher
For 4x4 MIMO links, CeraOS versions 10.5 and higher are not interoperable with
earlier CeraOS versions. When upgrading from a CeraOS version prior to CeraOS
10.5 to CeraOS 10.5 or higher, if there is an existing 4x4 MIMO link, you must
perform either of the following procedures to properly upgrade the link. Option 1
is the preferred option.
Important Note: You must download the new CeraOS software package to all
four units before beginning the upgrade process. All four units in
the 4x4 MIMO link must use the same CeraOS build and version.
Upgrade Procedure – Option 1
1. Upgrade the remote Slave unit.
2. Upgrade the remote Master unit.
3. Upgrade the local Slave unit.
4. Upgrade the local Master unit.
Upgrade Procedure – Option 2
1. Upgrade the remote Master unit.
2. Upgrade the local Slave unit.
3. Upgrade the local Master unit.
4. Wait for the link to be restored between the Master units.
5. Mute both radio carriers on the remote Slave unit.
6. Upgrade the remote Slave unit.
7. Unmute both radio carriers on the remote Slave unit.
ii Click Create Group. The AMCC Group – Select Group Parameters page
opens.
viii Click Next. The AMCC Group – Select MRMC Parameters page opens.
x Click Finish. The AMCC Group – Selection Summary page opens. Note that
the second radio carrier is automatically added to the group, with the
same Member Role and MRMC script as you defined for the first radio
carrier you added to the group.
Figure 137: Advanced Multi Carrier Configuration Page (Populated – 4x4 MIMO
Group)
5 Verify that the MMI levels are appropriate. See Viewing MMI Levels.
6 Configure LAG on the two Ethernet ports of the external switches connected
to the IP-20 units on both sides of the link.
7 Configure Automatic State Propagation with ASP trigger by remote fault
enabled on the MIMO group in all four IP-20 units that make up the link. See
Configuring Automatic State Propagation and Link Loss Forwarding.
Note: The last two steps are crucial to ensure that the link continues to
function via the MIMO resiliency mechanism in the event of a
hardware failure scenario.
Figure 138 shows one side of a 4x4 MIMO link.
EXT REF
Eth1
Carrier 1
GbE Port
Source Eth3/
Carrier 2
OMT
EXT
Sharing Cable
MIMO
MGT/
Group ASP – Remote
PROT
Fault Trigger
MIMO Sharing Enabled
External Cable
Master IP-20
LAG
Switch
ASP – Remote
Eth1 Fault Trigger
Enabled
Carrier 1
Eth3/
GbE Port EXT
Carrier 2
OMT
MIMO Signaling
Cable MGT/ MIMO
PROT
Group
EXT REF
Slave IP-20
6 After creating the group, you must enable the group in the MIMO - Edit page:
i From the MIMO page, select the group from the table and click Edit
Group. The MIMO - Edit page opens
6 After creating the group, you must enable the group and, for 2+0 groups, set
the unit’s role (Master or Slave) in the Diversity - Edit page.
i From the Diversity page, select the group from the table and click Edit
Group. The Diversity - Edit page opens.
The Edit Members page provides the following information for each radio carrier
in the MIMO group:
• MMI – MIMO Mate Interference. MMI represents the difference between the
RSL1 and the RSL2 of the remote Master and Slave transmitters with the same
polarization. The nominal range is 0. The range should be from -3 dB to +3 dB.
This parameter is not relevant for 1+0 Space Diversity (as indicated by a value
of -99).
Master Master
Network RF Network
Switch Eth Port
Processor
Modem 1
Chain V +6dB V RF Chain Modem 1
Processor Eth Port Switch
OMT f1 f1 OMT
Modem 2 RF Chain H H RF Chain Modem 2
+3dB
Communications
Source Sharing
Data Sharing
Protection
Network
Processor
Modem 1 RF Chain V
OMT f1
Modem 2 RF Chain H
Slave
Figure 148 shows the data paths between Site 1, with two IP-20C or IP-20C-HP
units and two antennas, and Site 2, with one IP-20C or IP-20C-HP unit and one
antenna.
Site 1 Site 2
+3dB +6dB
f1 f1
f1
Note: After you select one of the ASD options in the Group Type field, ASD
2+0 will be displayed in the Group Subtype field.
iv In the Group Admin Status field, select Enable.
v Click Next. The next page of the AMCC Group – Select Members
Parameters page opens.
vii Click Next. The AMCC Group – Select MRMC Parameters page opens.
Figure 153: Advanced Multi Carrier Configuration Page – Populated with ASD
Group
Note: No unit reset takes place when the group is created.
The Combined Status field indicates the status of the ASD group’s received radio
signal:
• Combined – Only relevant for the Master unit at the dual-unit side of the link.
ASD is functioning to produce a combined radio signal.
• Main Only – Only relevant for Master units. Only the main path signal is being
received.
• Diversity Only – Only relevant for Slave units and the Master unit at the
single-unit side of the link. Only the diversity path is providing a usable signal.
• N/A – No adequate signal is being received, either because of an LOF
condition or misconfiguration of the link.
Tail Site 1
IP-20C or
f1 IP-20S
Low angular
separation Tail Site 2
IP-20C or
Hub Site
IP-20S
Dual-Modem IP-20C f1
f1 f2 f3 f4
1 frequency spot
Tail-1
(IP-20C or IP-20S)
Agg-2
(IP-20C)
Link B
Tail-2
(IP-20C or IP-20S)
1 Select Radio > Groups > AMCC. The Advanced Multi Carrier Configuration
page opens.
Figure 160: AMCC Group – Select Members Parameters Page (Hub Site)
Figure 161: AMCC Group – Select Members Parameters Page (Tail Site)
6 In the Member #1 field, select a radio interface.
7 In the Member role field, select the role of the interface in the AFR 1+0
configuration:
◦ If you are configuring the Hub site, select Aggregate #1 or Aggregate #2.
◦ If you are configuring the Tail site, select Tail #1 or Tail #2.
Make sure the interface you configure as Aggregate #1 is part of the link with
Tail #1 and that the interface you configure as Aggregate #2 is part of the link
with Tail #2.
8 Select Set MRMC Script (1801).
Note: Script 1801 is a 28/30 MHz script, with a maximum ACM profile of 10
(2048 QAM). For additional details, refer to the relevant Release Notes
or product Technical Description.
9 In the MRMC Script maximum profile field, select the maximum ACM profile
for the links.
10 Click Finish. This page displays the parameters you have selected for the link.
4. Unit Management
This section includes:
• Defining the IP Protocol Version for Initiating Communications
• Configuring the Remote Unit’s IP Address
• Configuring SNMP
• Configuring Trap Managers
• Installing and Configuring an FTP or SFTP Server
• Figure 175: FileZilla Server Shared Folder Setup
• Configuring the Internal Ports for FTP or SFTP
• Upgrading the Software
• Backing Up and Restoring Configurations
• Setting the Unit to the Factory Default Configuration
• Performing a Hard (Cold) Reset
• Configuring Unit Parameters
• Configuring NTP
• Displaying Unit Inventory
• Displaying SFP DDM and Inventory Information
• Defining a Login Banner
Related topics:
• Setting the Time and Date (Optional)
• Enabling the Interfaces (Interface Manager)
• Uploading Unit Info
• Changing the Management IP Address
Figure 167: Remote Networking Configuration Page – IP-20S, IP-20E, and IP-20V
2 For multi-carrier units, select the carrier in the Radio table (see Figure 166)
and click Edit. A separate Remote IP Configuration page opens. The page is
identical to the single-carrier page.
3 In the Remote IP address field, enter an IP address for the remote unit. You
can enter the address in IPv4 format in this field, and/or in IPv6 format in the
IPv6 Address field. The remote unit will receive communications whether they
are sent to its IPv4 address or its IPv6 address.
4 In the Remote Subnet mask field, enter the subnet mask of the remote radio.
5 Optionally, in the Remote default gateway field, enter the default gateway
address for the remote radio.
6 Optionally, in the Remote IPv6 Address field, enter an IPv6 address for the
remote unit. You can enter the address in IPv6 format in this field, and/or in
IPv4 format in the IP Address field. The unit will receive communications
whether they are sent to its IPv4 address or its IPv6 address.
7 If you entered an IPv6 address, enter the IPv6 prefix length in the Remote
IPv6 Prefix-Length field.
8 Optionally, if you entered an IPv6 address, enter the default gateway in IPv6
format in the Remote default Gateway IPv6 field.
9 Click Apply.
3 In the SNMP Read Community field, enter the community string for the SNMP
read community.
4 In the SNMP Write Community field, enter the community string for the
SNMP write community
5 In the SNMP Trap Version field, select V1, V2, or V3 to specify the SNMP
version.
Note: The SNMP MIB Version field displays the current SNMP MIB version
the unit is using.
6 In the V1V2 Blocked field, select Yes if you want to block SNMPv1 and
SNMPv2 access so that only SNMPv3 access will be enabled.
Note: Additional security parameters can be configured in the Quick
Configuration Security Protocols page. See Quick Security
Configuration – Protocols Page, Step 4.
7 Click Apply.
If you are using SNMPv3, you must also configure SNMPv3 users. SNMPv3 security
parameters are configured per SNMPv3 user.
To add an SNMP user:
1 Select Platform > Management SNMP > V3 Users. The V3 Users page opens.
IPv4 Address If the IP address family is configured to be IPv4, enter the destination
IPv4 address. Traps will be sent to this IP address. See Defining the IP
Protocol Version for Initiating Communications.
IPv6 Address If the IP address family is configured to be IPv6, enter the destination
IPv6 address. Traps will be sent to this IP address. See Defining the IP
Protocol Version for Initiating Communications.
Description Enter a description of the trap manager (optional).
Admin Select Enable or Disable to enable or disable the selected trap
manager.
Community Enter the community string for the SNMP read community.
Port Enter the number of the port through which traps will be sent.
Heartbeat Period Enter the interval, in minutes, between each heartbeat trap.
CLLI Enter a Common Language Location Identifier (CLLI). The CLLI is free
text that will be sent with the trap. You can enter up to 100
characters.
V3 User Name If the SNMP Trap version selected in SNMP Parameters page is V3,
enter the name of a V3 user defined in the system.
To view or define a V3 user, use the V3 Users page.
Note: Make sure that an identical V3 user is also defined on the
manager's side.
2 Create a shared FTP/SFTP folder on the PC or laptop you are using to perform
the FTP/SFTP operation (for example, C:\FTPServer).
3 In the FTP/SFTP server, set up the permissions for the shared FTP/SFTP folder.
For example, in FileZilla Server:
i From the Edit menu, select Users.
ii In the Users window, select Shared folders.
iii Underneath the Shared folders section, click Add and browse for your
shared FTP folder.
iv Select the folder and click OK.
v In the Shared folders section, select your shared FTP folder.
vi In the Files and Directories sections, select all of the permissions.
vii Click Set as home directory to make the Shared folder the root directory
for your FTP server.
viii Click OK to close the Users window.
components, so that only files that need to be updated are actually downloaded.
A message is displayed for each file that is actually downloaded.
Note: When downloading an older version, all files in the bundle may be
downloaded, including files that are already installed.
Software bundles can be downloaded via HTTP, HTTPS, FTP, or SFTP. After the
software download is complete, you can initiate the installation.
Notes: Before performing a software upgrade, it is important to verify that
the system date and time are correct. See Setting the Time and Date
(Optional).
Figure 179: Download & Install Page – HTTP/HTTPS Download – No File Selected
3 Select HTTP.
4 Click Choose File. A browse window opens.
5 Navigate to the directory in which the software file is located and select the
file. The selected file must be a ZIP file.
6 Click Open. The file name of the selected file appears in the File Name field.
Figure 180: Download & Install Page – HTTP/HTTPS Download –File Selected
7 Click Download. The download begins. You can view the status of the
download in the Download Status field. See Table 28.
Note: To discontinue the download process, click Abort.
8 Once the download has been completed, verify that the version you want to
install has been downloaded. You can check the downloaded version for each
component by viewing the Downloaded Version column in the Versions page.
See Viewing Current Software Versions.
Download status The status of any pending software download. Possible values are:
• Ready – The default value, which appears when no download
is in progress.
• Verifying download files – The system is verifying the files to
be downloaded.
• Download in progress – The download files have been
verified, and the download is in progress.
If an error occurs during the download, an appropriate error message
is displayed in this field.
When the download is complete, one of the following status
indications appears:
• Download Success
• Download Failure
• All components already found in the system
When the system is reset, the Download Status returns to Ready.
Download progress Displays the progress of the current software download.
Parameter Definition
Install status The status of any pending software installation. Possible values are:
• Ready – The default value, which appears when no
installation is in progress.
• Verifying installation files – The system is verifying the files to
be installed.
• Installation in progress – The installation files have been
verified, and the installation is in progress.
If an error occurs during the installation, an appropriate error
message is displayed in this field.
When the installation is complete, one of the following status
indications appears:
• Installation Success
• Installation Partial Success
• Installation Failure
• incomplete-sw-version
When the system is reset, the Installation Status returns to Ready.
Install progress Displays the progress of the current software installation.
To display the configuration files currently saved at the system restore points:
1 Select Platform > Configuration > Backup Files. The Backup Files page opens.
For a description of the information provided in the Backup Files page, see
Table 29: Backup Files Page Columns.
The next time the system is reset, the File Transfer status field returns to
Ready.
5 To abort the export, click Abort Export.
Parameter Definition
Name A name for the unit (optional, up to 128 characters). This name appears at the
top of every Web EMS page.
Description Descriptive information about the unit. This information is used for
debugging, and should include information such as the unit type.
System up time The time since the system was last reinitialized.
Contact person The name of the person to be contacted if and when a problem with the
system occurs (optional).
Location The actual physical location of the node or agent (optional).
Longitude The unit's longitude coordinates.
Latitude The unit's latitude coordinates.
Measurement format The type of measurement you want the system to use: Metric or Imperial.
Unit Temperature The current temperature of the unit. For further information, see
Temperature Ranges.
Voltage input (Volt) The voltage input of the unit.
Parameter Definition
User Comment A free text field for any information you want to record (up to 500
characters).
2 Select a row in the NTP Configuration table and click Edit. The NTP
Configuration Edit page opens.
7 Click Apply. Once you click Apply, the NTP Status Parameters appear. Table 31
describes the NTP Status Parameters.
Lock status Indicates the NTP status of the unit. Possible values are:
• LOCK – The NTP client is locked on a remote server.
• LOCAL – The NTP client is locked on the local system clock
(free running clock).
• CANDIDATE – The server is next in line to be selected if the
currently locked server is discarded.
• N/A – The NTP client is not locked on any clock or NTP is
disabled.
IPv4 address The IPv4 address of the NTP server (if configured).
IPv6 address The IPv6 address of the NTP server (if configured).
Refid The NTP client time server.
Stratum The NTP client statum..
Parameter Definition
Peer type The server peer type.
Reach The result of the last 8 polls in octal form.
Delay The round trip delay to peer in milliseconds.
Offset Offset to the client in milliseconds.
Jitter Variance in latency on the network.
If there is no signal on the interface, a Loss of Carrier alarm (LOC) is raised, and
this alarm masks the DDM alarms.
Optical Diagnostics Supported Displays whether the SFP module supports DDM monitoring. For
modules that do not support DDM monitoring, the parameters
below are not available.
RX Power Level (dBm) The SFP module’s current RX power signal strength (in dBm).
TX Power Level (dBm) The SFP module’s current TX power signal strength (in dBm).
Bias Current (mA) The laser bias current of the SFP module (in mA)
Temperature The current temperature of the SFP module (displayed in both C°
and F°).
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Min RX Power (dBm) The minimum RX power during the interval (dBm).
Max RX Power (dBm) The maximum RX power during the interval (dBm).
Avg RX Power (dBm) The average RX power during the interval (dBm).
Min TX Power (dBm) The minimum TX power during the interval (dBm).
Max TX Power (dBm) The maximum TX power during the interval (dBm).
Parameter Definition
Avg TX Power (dBm) The average TX power during the interval (dBm).
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable. Possible causes are (i) an LOC alarm, (ii) changing the Admin status of
the interface, or (iii) unit reset.
5. Radio Configuration
This section includes:
• Viewing the Radio Status and Settings
• Configuring the Remote Radio Parameters
• Configuring ATPC and ATPC Override Timer
• Configuring Header De-Duplication and Frame Cut-Through
• Configuring AES-256 Payload Encryption
• Configuring and Viewing Radio PMs and Statistics
Related topics:
• Configuring the Radio Parameters
• Configuring the Radio (MRMC) Script(s)
• System Configurations
• Configuring Multi-Carrier ABC
• Configuring XPIC
• Configuring Unit Protection with HSB Radio Protection (External Protection)
• Configuring MIMO and Space Diversity
• Operating an IP-20C or IP-20C-HP in Single Radio Carrier Mode
• Performing Radio Loopback
Table 35 lists and describes the parameters in the Radio table of the IP-20C or
IP-20C-HP Radio Parameters page and the Status parameters section of the Radio
Parameters configuration page.
Note: For IP-20E and IP-20V, a frequency scanner is available to scan the
frequency range covered by the currently configured MRMC script and
determine the current interference level for each channel. This
enables you to select the best channel in accordance with current
interference levels. See Running the Frequency Scanner (IP-20E and IP-
20V).
Figure 202: Remote Radio Parameters Page – IP-20S, IP-20E, and IP-20V
2 For multi-carrier units, select the carrier in the Remote Radio table (see
Figure 201) and click Edit. A separate Remote Radio Parameters page opens.
The page is identical to the single-carrier page.
Parameter Definition
Remote Radio Mute To mute the TX output of the remote radio, select On. To unmute the
TX output of the remote radio, select Off.
Remote IP Address The IPv4 IP address of the remote unit.
Remote IPv6 Address The IPv6 IP address of the remote unit.
Note: Make sure to set an appropriate value in the Override Timeout field
before enabling ATPC override. Failure to do so can lead to
unexpected reduction of the TX power with corresponding loss of
capacity if TX override is enabled with the timer set to a lower-than-
desired value.
7 Click Apply. If you selected ATPC Override Admin – Enable, the ATPC
Override State, Override TX Level, and ATPC Override Admin fields are now
displayed.
8 In the Override TX Level field, select the TX power, in dBm, to be used when
the unit is in an ATPC override state. The range of values depends on the
frequency, MRMC script, and RFU type.
9 In the Override Timeout field, select the amount of time, in seconds, the timer
counts from the moment the radio reaches its maximum configured TX power
until ATPC override goes into effect. You can select from 0 to 1800 seconds.
10 In the Remote ATPC Admin field, select Enable to enable ATPC or Disable to
disable ATPC on the remote radio carrier.
11 Click Apply. If you selected Remote ATPC Admin – Enable, the Remote
Reference RX Level (dBm) field is now displayed.
12 In the Remote Reference RX Level (dBm) field, enter a number between -70
and -30 as the reference value for the ATPC mechanism on the remote radio
carrier.
13 Click Apply.
To cancel an ATPC override state on the local unit, click Cancel Override.
Note: The Header Deduplication type column in the Main page and the
Header Deduplication type field in the Edit page are not operational.
To monitor the Header De-Duplication setting and status, use the
Header Deduplication mode and Header Deduplication operational
state columns and fields.
2 For multi-carrier units, select the carrier in the Radio Ethernet and
Compression table (see Figure 206) and click Edit. A separate Radio Ethernet
Interface Configuration page opens. The page is essentially identical to the
single-carrier page.
3 Click Edit. The Radio Ethernet Interface Configuration – Edit page opens.
Figure 207: Radio Ethernet Interface Configuration – Edit Page Per Carrier – IP-20C/IP-20C-HP
4 In the Cut through mode field, select Yes to enable Frame Cut-Through or No
to disable Frame Cut-Through.
5 In the Header Compression mode field, select from the following options:
◦ Disabled – Header De-Duplication is disabled.
◦ Layer2 – Header De-Duplication operates on the Ethernet level.
◦ MPLS – Header De-Duplication operates on the Ethernet and MPLS levels.
◦ Layer3 – Header De-Duplication operates on the Ethernet and IP levels.
◦ Layer4 – Header De-Duplication operates on all supported layers up to
Layer 4.
◦ Tunnel – Header De-Duplication operates on Layer 2, Layer 3, and on the
Tunnel layer for packets carrying GTP or GRE frames.
◦ Tunnel-Layer3 – Header De-Duplication operates on Layer 2, Layer 3, and
on the Tunnel and T-3 layers for packets carrying GTP or GRE frames.
◦ Tunnel-Layer4 – Header De-Duplication operates on Layer 2, Layer 3, and
on the Tunnel, T-3, and T-4 layers for packets carrying GTP or GRE frames.
6 Click Apply, then Close
Note: The Utilization threshold field is not applicable.
Figure 210: Radio Ethernet Interface Counters Page Per Carrier – IP-20C/IP-20C-HP
Table 37 lists and describes the fields in the Radio Ethernet Interface Counters
page.
Parameter Description
TX learning frames The number of frames that have been used to learn unique data flows. Once
a particular flow type has been learned, subsequent frames with that flow
type are compressed by Header De-Duplication.
TX frames not Frames on the TX side that were not compressed due to exclusion rules.
compressed due to Note: The use of exclusion rules for Header De-Duplication is planned for
excluding rule future release.
TX frames not Frames on the TX side that were not compressed for reasons other than the
compressed due to use of exclusion rules.
other reasons
TX number of active The number of Header De-Duplication flows that are active on the TX side.
flows
Number of active Not supported.
flows of user
selected flow type
Ethernet Port Counters
Port RX good bytes The number of good bytes received on the port since the last time the Radio
Ethernet Interface counters were cleared.
Port RX good frames The number of good frames received on the port since the last time the
Radio Ethernet Interface counters were cleared.
Port TX total bytes The number of bytes transmitted since the last time the Radio Ethernet
Interface counters were cleared.
Port TX frames The number of frames transmitted since the last time the Radio Ethernet
Interface counters were cleared.
Port TX idle bytes The number of idle bytes transmitted since the last time the Radio Ethernet
Interface counters were cleared.
Cut Through
Counters
TX frames The number of frames that have been transmitted via Frame Cut-Through
since the last time the Radio Ethernet Interface counters were cleared.
You must use the same master key on both sides of the link. This means that if
you generate a master key automatically on one side of the link, you must copy
that key and for use on the other side of the link. Once payload encryption has
been enabled on both sides of the link, the Key Exchange Protocol periodically
verifies that both ends of the link have the same master key. If a mismatch is
detected, an alarm is raised and traffic transmission is stopped for the
mismatched carrier at both sides of the link. The link becomes non-valid and
traffic stops being forwarded.
When you enter a master key, or when the master key is automatically generated,
the key is hidden behind dots. To copy the master key, you must display the key.
To display the master key, click Show Key. A new Master key field appears,
displaying the master key. You can copy the key to the clipboard from this field.
Figure 213: Payload Encryption – Edit Page with Master Key Displayed
7 Record and save the master key generated in Step 6.
8 On the local unit, follow Steps 4 through 6 to configure the same master key
configured on the remote unit also on the local unit.
9 Enable payload encryption on the remote unit:
i In the Admin Mode field, select AES-256 to enable payload encryption.
ii In the Session Key Period field, configure a time interval in hours and
minutes (HH:MM). This is the interval at which the session key is
automatically regenerated. The Session Key Period can be from 3 minutes
(00:03) to 12 hours (12:00).
iii When you are finished, click Apply.
This step will cause the link status to be Down until payload encryption is
successfully enabled on the local unit. However, the RSL measured on the
link should remain at an acceptable level.
Note: The Crypto Validation State field indicates whether the interface is
functioning properly, with AES-256 encryption. In order for this field to
display Valid, both the interface itself and AES-256 encryption must be
enabled, the hardware must be in place and functioning properly,
initialization must be finished, and AES-256 encryption must be
functioning properly, with no loopback on the interface.
10 Enable payload encryption on the local unit by following the procedure
described in Step 9. Verify that on both the local and remote active units, the
link status returns to Up and user traffic is restored. In links using in-band
management, verify also that in-band management returns.
11 In a protected link, perform copy-to-mate, first on the remote and then on the
local unit. See Step 5 in Configuring HSB Radio Protection. After the copy-to-
mate operation, wait for both standby units to re-boot and verify that there
are no alarms.
Note: The standby unit may have a payload encryption failure alarm for up to
about one minute after the unit is up and running.
12 In a protected link, remove the protection lockout, first on the remote and
then on the local unit. See Disabling Automatic Switchover to the Standby
Unit.
13 Verify that there are no alarms on the link.
Note: Any time payload encryption fails, the Operational status of the link is
Down until payload encryption is successfully restored.
Radio Location Identifies the carrier (Slot 2, port 1 or Slot 2, port 2).
Note: Only relevant for IP-20C and IP-20C-HP units.
Configured MRMC Script The current MRMC script.
TX profile The current TX profile.
TX QAM The current TX modulation.
TX bit-rate The current TX bit-rate.
RX profile The current RX profile.
RX QAM The current RX modulation.
RX bit-rate The current RX bit-rate.
Interval For 24-hour intervals, displays the date of the interval. For 15-minute intervals,
displays the date and ending time of the interval.
Min profile Displays the minimum ACM profile that was measured during the interval.
Max profile Displays the maximum ACM profile that was measured during the interval.
Min bitrate Displays the minimum total radio throughput (Mbps) delivered during the
interval.
Max bitrate Displays the maximum total radio throughput (Mbps) delivered during the
interval.
Seconds above Displays the number of seconds the radio was above both ACM profile
Threshold 1 thresholds during the interval.
Seconds below Displays the number of seconds the radio was below ACM profile threshold 1
Threshold 1 during the interval.
Seconds below Displays the number of seconds the radio was below ACM profile threshold 2
Threshold 2 during the interval.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not reliable
due to a possible power surge or power failure that occurred at that time.
5.6.5 Displaying Signal Level PMs and Configuring Signal Level PM Thresholds
To display signal level PMs per radio:
1 Select Radio > PM & Statistics > Signal Level. The Signal Level PM report page
opens.
Interval For 24-hour intervals, displays the date of the interval. For 15-
minute intervals, displays the date and ending time of the interval.
Max TSL (dBm) The maximum TSL (Transmit Signal Level) that was measured
during the interval.
Min TSL (dBm) The minimum TSL (Transmit Signal Level) that was measured
during the interval.
Max RSL (dBm) The maximum RSL (Received Signal Level) that was measured
during the interval.
Min RSL (dBm) The minimum RSL (Received Signal Level) that was measured
during the interval.
TSL exceed threshold The number of seconds the measured TSL exceeded the threshold
seconds during the interval. TSL thresholds are configured in the Radio
Thresholds page. See Configuring BER Thresholds and Displaying
Current BER.
Parameter Definition
RSL exceed threshold1 The number of seconds the measured RSL exceeded RSL threshold
seconds 1 during the interval. RSL thresholds are configured in the Radio
Thresholds page. See Configuring BER Thresholds and Displaying
Current BER.
RSL exceed threshold2 The number of seconds the measured RSL exceeded RSL threshold
seconds 2 during the interval. RSL thresholds are configured in the Radio
Thresholds page. See Configuring BER Thresholds and Displaying
Current BER.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that
the values are not reliable due to a possible power surge or power
failure that occurred at that time.
To set the Signal Level PM thresholds, click Thresholds. The Signal Level
Thresholds Configuration – Edit Page opens. Set the thresholds, described in
Table 41, and click Apply.
RX Level Threshold 1 (dBm) Specify the threshold for counting exceeded seconds if the RSL is
below this level.
RX Level Threshold 2 (dBm) Specify a second threshold for counting exceeded seconds if the
RSL is below this level.
TX Level Threshold (dBm) Specify the threshold for counting exceeded seconds if the TSL is
below this level.
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
ES Displays the number of seconds in the measuring interval during which
errors occurred.
SES Displays the number of severe error seconds in the measuring interval.
UAS Displays the Unavailable Seconds value of the measured interval. The value
can be between 0 and 900 seconds (15 minutes).
BBE Displays the number of background block errors during the measured
interval.
Parameter Definition
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
Interval For 24-hour intervals, displays the date of the interval. For 15-
minute intervals, displays the date and ending time of the interval.
Parameter Definition
Min MSE (dB) Displays the minimum MSE in dB, measured during the interval. A
0 in this field and an X in the Integrity field may also indicate that
the modem was unlocked during the entire interval.
Max MSE (dB) Displays the maximum MSE in dB, measured during the interval. A
0 in this field and an X in the Integrity field may also indicate that
the modem was unlocked.
Exceed threshold seconds Displays the number of seconds the MSE exceeded the MSE PM
threshold during the interval. The MSE PM is configured in the
Radio Thresholds page. See Configuring BER Thresholds and
Displaying Current BER.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An X in the column indicates that
the values are not reliable due to a possible power surge or power
failure that occurred at that time. An X and a 0 value in the Max
MSE field may also indicate that the modem was unlocked.
To set the Modem MSE PM thresholds, click Thresholds. The Modem MSE
Thresholds Configuration– Edit Page opens. For each radio, specify the modem
MSE (Mean Square Error) threshold for calculating MSE Exceed Threshold
seconds, and click Apply.
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Min XPI (dB) The minimum XPI level that was measured during the interval.
Max XPI (dB) The maximum XPI level that was measured during the interval.
Parameter Definition
XPI below threshold The number of seconds the measured XPI level was below the threshold
seconds during the interval.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure
that occurred at that time.
To set the XPI PM thresholds, click Thresholds. The XPI Thresholds Configuration–
Edit Page opens. For each radio, specify the modem XPI threshold for calculating
XPI Exceed Threshold seconds, and click Apply.
2 For the IP-20C and IP-20C-HP, in the Port field, select the port that holds the
radio for which you want to display PMs.
3 In the Interval Type field:
◦ To display reports in 15-minute intervals, select 15 minutes.
◦ To display reports in daily intervals, select 24 hours.
To set the thresholds for capacity and throughput PMs:
1 Select Threshold. The Ethernet Radio Capacity & Throughput Threshold page
opens.
2 Enter the capacity and throughput thresholds you want, in Mbps. The range of
values is 0 to 4294967295. The default value for is 1000.
3 Click Apply, then Close.
Table 45 describes the capacity and throughput PMs.
Note: To display the same parameters for a specific interval in a separate
page, select the interval in the PM table and click View.
Time interval index For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak capacity (Mbps) Displays the highest L1 bandwidth, in Mbps, sent through the selected
radio during the measured time interval.
Average capacity Displays the average L1 bandwidth, in Mbps, during the measured time
(Mbps) interval.
Seconds exceeding Displays the number of seconds during the measured time interval
Threshold during which the L1 bandwidth exceeded the configured capacity
threshold.
Peak throughput Displays the highest throughput, in Mbps, that occurred for the selected
(Mbps) radio during the measured time interval.
Parameter Definition
Average throughput Displays the average throughput, in Mbps, for the selected radio during
(Mbps) the measured time interval.
Seconds exceeding Displays the number of seconds during the measured time interval
Threshold during which the throughput exceeded the configured throughput
threshold.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure
that occurred at that time.
Time interval index For 24-hour intervals, displays the date of the interval. For 15-
minute intervals, displays the date and ending time of the
interval.
Peak utilization (%) Indicates the highest utilization of the radio capacity that
occurred for the selected radio or group during the measured
time interval.
Average utilization (%) Indicates the average utilization of the radio capacity for the
selected radio or group during the measured time interval.
Seconds exceeding Threshold 1 Displays the number of seconds during the measured time
interval during which the L1 bandwidth exceeded Threshold 1
(the highest threshold).
Seconds exceeding Threshold 2 Displays the number of seconds during the measured time
interval during which the L1 bandwidth exceeded Threshold 2.
Seconds exceeding Threshold 3 Displays the number of seconds during the measured time
interval during which the L1 bandwidth exceeded Threshold 3
(the lowest threshold).
Seconds below Threshold 3 Displays the number of seconds during the measured time
interval during which the L1 bandwidth was less than Threshold 3
(the lowest threshold).
Integrity Indicates whether the values received at time and date of the
measured interval are reliable. An x in the column indicates that
the values are not reliable due to a possible power surge or
power failure that occurred at that time.
Time interval For 24-hour intervals, displays the date of the interval. For 15-minute intervals,
index displays the date and ending time of the interval.
FER Displays the frame error rate (%) during the measured time interval.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not reliable
due to a possible power surge or power failure that occurred at that time.
8 In the MAC table size field, enter the maximum MAC address table size for the
service. The MAC address table is a source MAC address learning table used to
forward frames from one service point to another. You can select a value from
16 to 131,072, in multiples of 16. This maximum only applies to dynamic, not
static, MAC address table entries.
Note: Additional configuration of the MAC address table can be performed
via the CLI. See Defining the MAC Address Forwarding Table for a
Service.
9 In the Default CoS field, enter a default Class of Service (CoS) value (0-7). This
value is assigned to frames at the service level if CoS Mode is set to Default-
CoS. Otherwise, this value is not used, and frames retain whatever CoS value
they were assigned at the service point or logical interface level.
10 In the CoS Mode field, select one of the following options. This parameter
determines whether or not frames passing through the service have their CoS
modified at the service level. The CoS determines the priority queue to which
frames are assigned.
◦ Default CoS – Frames passing through the service are assigned the default
CoS defined above. This CoS value overrides whatever CoS may have been
assigned at the service point or interface level.
◦ Preserve-SP-COS-Decision – The CoS of frames passing through the service
is not modified by the service's default CoS.
11 Click Apply, then Close to close the Ethernet Services - Add page.
12 Add service points. You must add service points to the service in order for the
service to carry traffic. See Configuring Service Points.
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint
services, the range of values is 1-32. For Management services, the range
of values is 1-30.
When adding a service point, you can select a service point ID from the
available options in the Service point ID drop-down list in the Ethernet
Service Points – Add page. Once you have added the service point, you
cannot change the service point ID.
Service point name A descriptive name for the service point (optional). The Service Point
Name can be up to 20 characters.
Service point type The service point type. Options are:
• SAP – Service Access Point.
• SNP – Service Network Point.
• MNG – Management service point.
• PIPE – Pipe service point.
The following rules apply to the mixing of different types of service points
on a single logical interface:
• You cannot configure both SAPs and SNPs on the same logical
interface.
• You can configure both SAPs or SNPs on the same logical interface
as a MNG service point.
• If you configure a Pipe service point on an interface, you cannot
configure an SAP, SNP, or another Pipe service point on the same
interface. You can, however, configure an MNG service point on
the same interface.
• You cannot configure more than one MNG service point on a
single logical interface.
Once you have added the service point, you cannot change this
parameter.
Interface location The physical or logical interface on which the service point is located. Once
you have added the service point, you cannot change this parameter.
Parameter Definition
Attached interface The encapsulation type (Ethertype) for frames entering the service point.
type Once you have added the service point, you cannot change this
parameter.
The Attached Interface Type determines which frames enter the service
via this service point, based on the frame’s VLAN tagging. Since more than
one service point may be associated with a single interface, frames are
assigned to the earliest defined service point in case of conflict.
For a list of available Attached Interface Types, the types of frames to
which each one applies, and the service point types for which each one is
available, see Table 50.
C-Vlan encapsulation The C-VLAN classified into the service point. Options are 1-4094,
Untagged, or N.A. (Not Applicable). Note that N.A. can only be used with
Bundle-C.
If you selected Bundle-C in the Attached Interface Type field, select
Untagged or N.A. You can then add multiple C-VLANs via the Attach VLAN
option. See Attaching VLANs.
S-Vlan encapsulation The S-VLAN classified into the service point. Options are 1-4094 and
Untagged (Not Applicable).
If you selected Bundle-S in the Attached Interface Type field, select the S-
VLAN value to classify into the service point (1-4094), or select Untagged.
You can then add multiple C-VLANs via the Attach VLAN option. See
Attaching VLANs.
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint
services, the range of values is 1-32. For Management services, the range
of values is 1-30.
Service point name A descriptive name for the service point (optional). The Service Point
Name can be up to 20 characters.
Service point type The service point type. Options are:
• SAP – Service Access Point.
• SNP – Service Network Point.
• MNG – Management service point.
• PIPE – Pipe service point.
Learning admin Determines whether MAC address learning for incoming frames is enabled
(Enable) or disabled (Disable). When enabled, the service point learns the
source MAC addresses of incoming frames and adds them to a MAC
address forwarding table.
Allow flooding Determines whether incoming frames with unknown MAC addresses are
forwarded to other service points via flooding. Select Allow to allow
flooding or Disable to disable flooding.
Allow broadcast Indicates whether frames with a broadcast destination MAC address are
allowed to ingress the service via this service point. Select Allow to allow
broadcast or Disable to disable broadcast.
Parameter Definition
CoS Mode Indicates how the service point handles the CoS of frames that pass
through the service point. Options are:
• Default CoS – The service point re-defines the CoS of frames that
pass through the service point, according to the Default CoS
(below). This decision can be overwritten on the service level.
• Interface-Decision – The service point preserves the CoS decision
made at the interface level. The decision can still be overwritten at
the service level.
• MAC DA - The service point checks each frame against a list of
user-defined MAC DAs. If there is a match, the service point
applies to the frame the CoS and Color defined for that MAC DA. If
there is no match, the service point preserves the CoS decision
made at the interface level. See Classification Overview.
Note: For Bundle-S and Bundle-C service points, if Cos Overwrite Valid is
set to True, the CoS and Color defined in the Attached VLAN page has
priority over the interface decision, but not over a MAC DA match.
Default CoS The default CoS. If the CoS Mode is sp-def-cos, this is the CoS assigned to
frames that pass through the service point. This decision can be
overwritten at the service level. Possible values are 0 to 7.
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint
services, the range of values is 1-32. For Management services, the range of
values is 1-30.
Service point name A descriptive name for the service point (optional). The Service Point Name
can be up to 20 characters.
Service point type The service point type. Options are:
• SAP – Service Access Point.
• SNP – Service Network Point.
• MNG – Management service point.
• PIPE – Pipe service point.
C-Vlan CoS preservation Determines whether the original C-VLAN CoS value is preserved or restored
for frames egressing from the service point.
• If C-VLAN CoS preservation is enabled, the C-VLAN CoS value of
frames egressing the service point is the same as the value when the
frame entered the service.
• If C-VLAN CoS preservation is disabled, the C-VLAN CoS value of
frames egressing the service point is set at whatever value might have
been re-assigned by the interface, service point, or service, or
whatever value results from marking (see Marking admin, below).
Parameter Definition
C-Vlan preservation Determines whether the original C-VLAN ID is preserved or restored for
frames egressing from the service point.
• If C-VLAN preservation is enabled, the C-VLAN ID of frames egressing
the service point is the same as the C-VLAN ID when the frame
entered the service.
• If C-VLAN preservation is disabled, the C-VLAN ID of frames egressing
the service point is set at whatever value might have been re-assigned
by the interface, service point, or service, or whatever value results
from marking (see Marking admin, below).
S-Vlan CoS preservation Determines whether the original S-VLAN CoS value is preserved or restored
for frames egressing from the service point.
• If S-VLAN CoS preservation is enabled, the S-VLAN CoS value of frames
egressing the service point is the same as the value when the frame
entered the service.
• If S-VLAN CoS preservation is disabled, the C-VLAN CoS value of
frames egressing the service point is set at whatever value might have
been re-assigned by the interface, service point, or service, or
whatever value results from marking (see Marking admin, below).
S-Vlan preservation Read-only. Indicates whether the original S-VLAN ID is preserved or restored
for frames egressing from the service point.
• If S-VLAN preservation is enabled, the S-VLAN ID of frames egressing
the service point is the same as the S-VLAN ID when the frame
entered the service.
• If S-VLAN preservation is disabled, the S-VLAN ID of frames egressing
the service point is set at whatever value might have been re-assigned
by the interface, service point, or service, or whatever value results
from marking (see Marking admin, below).
Marking admin Determines whether re-marking of the outer VLAN (C-VLAN or S-VLAN) of
tagged frames that pass through the service point is enabled.
• If Marking admin is set to Enable, and CoS preservation for the
relevant outer VLAN is set to Disable, the SAP re-marks the C-VLAN or
S-VLAN 802.1p UP bits of egress frames according to the calculated
CoS and Color, and the user-configurable 802.1Q and 802.1AD
marking tables. You can configure these tables by selecting Ethernet >
QoS > Marking from the menu on the left side of the Web EMS.
• If Marking admin and CoS preservation for the relevant outer VLAN
are both set to Enable, re-marking is not performed.
• If Marking admin and CoS preservation for the relevant outer VLAN
are both set to Disable, re-marking is applied, but only according to
the values defined for Green frames in the 802.1Q and 802.1AD
marking tables.
Service Bundle ID 1 is the only supported value.
6 Configure the service point attributes, as described in Table 49, Table 51, and
Table 52.
Note: Optionally, you can select from a list of pre-defined service point
options in the Pre defined options field at the top of the Ethernet
Service Points - Add page. The system automatically populates the
remaining service point parameters according to the system-defined
parameters. However, you can manually change these parameter
values. The pre-defined options are customized to the type of service
to which you are adding the service point.
7 Click Apply, then Close.
Interface Location Read-only. The physical or logical interface on which the service point is
located.
Service ID Read-only. The ID of the service to which the service point belongs.
Service Point ID Read-only. The ID of the service point.
C-Vlan Encapsulation Select the C-VLAN you want to add to the service point.
S-Vlan Encapsulation Read-only.
If the Attached Interface Type for the service point is Bundle-S, this field
displays the S-VLAN encapsulation selected when the service point was
created.
If the Attached Interface Type for the service point is Bundle-C, this field
is inactive.
CoS Overwrite Valid If you want to assign a specific CoS and Color to frames with the C-VLAN
or S-VLAN defined in the C-VLAN Encapsulation field, select true. This
CoS and Color values defined below override the CoS and Color decisions
made at the interface level. However, if the service point or service are
configured to apply their own CoS and Color decisions, those decisions
override the decision made here.
Parameter Definition
CoS Value If CoS Overwrite Valid is set to true, the CoS value defined in this field is
applied to frames with the C-VLAN defined in the C-VLAN Encapsulation
field. This CoS overrides the CoS decision made at the interface level.
However, if the service point or service are configured to apply their
own CoS, that decision overrides the decision made here.
If CoS Overwrite Valid is set to false, this parameter has no effect.
Color If CoS Overwrite Valid is set to true, the Color value defined in this field
is applied to frames with the C-VLAN defined in the C-VLAN
Encapsulation field. This Color overrides the Color decision made at the
interface level. However, if the service point or service are configured to
apply their own Color, that decision overrides the decision made here.
If CoS Overwrite Valid is set to false, this parameter has no effect.
To edit a VLAN Classification table entry, select the entry in the VLAN
Classification table and click Edit. You can edit all the fields that can be configured
in the Attached VLAN List – Add page.
To delete a VLAN Classification table entry, select the entry in the VLAN
Classification table and click Delete.
2 Select the interface you want to configure and click Edit. The Physical
Interfaces - Edit page opens.
Notes: To use an SFP+ interface in 10G mode, the third-party switch must be
running Pause Frame Flow Control, as defined in IEEE 802.3x. It is also
recommended to configure shapers on the third-party switch so as to
limit the packet flow from the switch to the IP-20E unit to 2.5 Gbps.
After changing the speed of an SFP+ interface, you must reset the unit
in order for the change to take effect.
When an SFP interface is configured for 100 Mbps, the link must be
symmetric, i.e., the same interface speed must be configured on both
sides of the link.
7 In the Duplex field, select the interface's duplex setting (Full Duplex or Half
Duplex). Only Full-Duplex is available in this release.
8 Click Apply, then Close.
Table 54 describes the status parameters that appear in the Physical Interfaces
page.
A trigger delay time can be configured, so that when a triggering event takes
place, the ASP mechanism does not propagate the event until this delay time has
elapsed. A trigger delay from 0 to 10,000 ms can be set per LLD ID. The delay time
must be configured via CLI. See Configuring Automatic State Propagation and Link
Loss Forwarding (CLI).
It is recommended to configure both ends of the link to the same Automatic State
Propagation configuration.
To configure an Automatic State Propagation interface pair:
1 Select Ethernet > Interfaces > Automatic State Propagation. The ASP & LLF
page opens.
5 In the ASP admin field, select Enable to enable Automatic State Propagation
on the interface pair, or Disable to disable Automatic State Propagation on
the pair.
6 Optionally, in the ASP trigger by remote fault field, select Enable if you want
to configure the system to disable the Controlled Ethernet Interface upon a
radio failure at the remote side of the link from the Monitored Radio
Interface. ASP events will only be propagated to Controlled Interfaces with LLF
IDs that match LLF IDs of affected Controlled Interfaces at the other side of
the link.
7 Optionally, in the ASP Management Safe mode admin field, select Enable or
Disable to enable or disable ASP Management Safe mode (CSF mode). In ASP
Management Safe mode, the ASP mechanism does not physically shut down
the Controlled Interface when ASP is triggered. Instead, the ASP mechanism
sends a failure indication message(CSF PDU). This message is used to
propagate the failure indication to external equipment.
Note: CSF mode must be enabled when ASP is configured on the
management port of an IP-20E or IP-20V.
When ASP Management Safe mode (CSF) is configured, the peer unit must be
configured to receive CSF PDUs. CSF receive must be enabled in order for
G.8032 ERPI topology changes to be initiated upon receipt of a CSF PDU. This
must be configured via the CLI. For details, see Configuring Receipt of CSF
PDUs (CLI).
8 In the ASP LLF ID field, select an ID for Link Loss Forwarding (LLF). When ASP
trigger by remote fault is set to Enable, ASP events at the other side of the
link are propagated to Controlled Interfaces with LLF IDs that match the LLF
IDs of affected Controlled Interfaces at the other side of the link. LLF IDs are
unique per Monitored Interface. That is, if LLF ID 1 has been used for a
Controlled Interface that is grouped with radio interface 1, that ID cannot be
used again for another Controlled Interface grouped fixed radio interface 1.
However, it can be used for Controlled Interface grouped with radio
interface 2. You can select an LLF ID between 1 and 30.
9 Repeat this procedure to assign additional Controlled Interfaces to the
Monitored Interface, or to set up additional ASP pair with other interfaces.
Controlled Interfaces can only be assigned to one ASP pair. Monitored
Interfaces can be assigned to multiple ASP pairs.
To edit an Automatic State Propagation interface pair:
1 Select the interface pair in the Automatic state propagation configuration
table.
2 Click Edit. The Automatic State Propagation – Edit page opens. The Edit page is
similar to the Add page (Figure 247), but the Controlled Ethernet Interface
and Monitored Radio Interface parameters are read-only.
To delete an Automatic State Propagation interface pair:
1 Select the interface pair in the Automatic state propagation configuration
table.
2 Click Delete. The interface pair is removed from the Automatic state
propagation configuration table.
To delete multiple interface pairs:
By default, the egress CoS statistics are cumulative. That is, they are not
automatically cleared. You can set each individual CoS number to be cleared
whenever the Egress CoS Statistics page is opened by changing the Clear on read
value to Yes.
1 To change the clear on read value, select the CoS number in the CoS queue
index column and click Edit. The Egress CoS Statistics – Edit page opens.
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak... Average... bytes... Various peak transmission rates (per second) and average transmission
Packets... rates (per second), both in bytes and in packets, for each measured
time interval.
TX bytes Layer 1 exceed The number of seconds the TX bytes exceeded the specified threshold
threshold (sec) during the interval. For instructions on setting the threshold, see
Setting the Ethernet Port TX Threshold.
Invalid data flag Indicates whether the values received during the measured interval
are valid. An x in the column indicates that the values are not valid (for
example, because of a power surge or power failure that occurred
during the interval).
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak... Average... Various peak transmission rates (per second) and average RX rates (per
bytes... Packets... second), both in bytes and in packets, for each measured time interval.
RX bytes Layer 1 The number of seconds the RX bytes exceeded the specified threshold
exceed threshold during the interval. For instructions on setting the threshold, see Setting
(sec) the Ethernet Port RX Threshold.
Invalid data flag Indicates whether the values received during the measured interval are
valid. An x in the column indicates that the values are not valid (for
example, because of a power surge or power failure that occurred during
the interval).
Egress
Ingress
Marker
Rate Limit (Optional)
GE/Radio Port Classifier
(Policing) Queue Scheduler/
Manager Shaper
Port GE/Radio
(Optional)
Standard QoS/ H-QoS
Egress
Ingress CET/Pipe Marker
Rate Limit Services (Optional)
GE/Radio Port Classifier
(Policing) Queue Scheduler/
Manager Shaper
Port GE/Radio
(Optional)
Standard QoS/ H-QoS
For example, if the frame is an untagged IP Ethernet frame, a match will not be
found until the DSCP priority level. The CoS and Color values defined for the
frame’s DSCP value will be applied to the frame.
You can disable some of these classification methods by configuring them as un-
trusted. For example, if 802.1p classification is configured as un-trusted for a
specific interface, the classification mechanism does not perform classification by
UP bits. This is useful, for example, if classification is based on DSCP priority bits.
If no match is found at the logical interface level, the default CoS is applied to
incoming frames at this level. In this case, the Color of the frame is assumed to be
Green.
Classification may also be performed by Destination MAC Address (MAC DA) at
the service point level. When MAC DA classification is enabled on a service point,
the classification mechanism checks each frame ingressing the interface on which
the service point is defined against a list of user-defined MAC DAs. If there is a
match, the mechanism applies to the frame the CoS and Color defined for that
MAC DA. Classification by MAC DA overrides the other classification criteria at the
service point level.
Up to 64 MAC addresses can be defined per device, including four predefined
MAC addresses. You can assign each of these MAC addresses a CoS value and a
Color.
The following MAC addresses are predefined, with a high priority (CoS=7,
Color=Green). You can edit or delete these MAC addresses:
• 09:00:2B:00:00:04
• 09:00:2B:00:00:05
• 01:80:C2:00:00:14
• 01:80:C2:00:00:15
These are protocol MAC addresses used to transport IS-IS frames as defined in ISO
9542 and ISO/IEC 10589.
Trust VLAN UP bits Select the interface's trust mode for user priority (UP) bits:
• Trust – The interface performs QoS and color
classification according to UP and CFI/DEI bits
according to user-configurable tables for 802.1q UP
bits (C-VLAN frames) or 802.1AD UP bits (S-VLAN
frames). VLAN UP bit classification has priority over
DSCP and MPLS classification, so that if a match is
found with the UP bit of the ingressing frame, DSCP
values and MPLS bits are not considered.
• Un-Trust – The interface does not consider 802.1
UP bits during classification.
Trust DSCP Select the interface's trust mode for DSCP:
• Trust – The interface performs QoS and color
classification according to a user-configurable table
for DSCP to CoS and color classification. DSCP
classification has priority over MPLS classification,
so that if a match is found with the DSCP value of
the ingressing frame, MPLS bits are not considered.
• Un-Trust – The interface does not consider DSCP
during classification.
Trust MPLS Select the interface's trust mode for MPLS bits:
• Trust – The interface performs QoS and color
classification according to a user-configurable table
for MPLS EXP to CoS and color classification.
• Un-Trust – The interface does not consider MPLS
bits during classification.
Default port CoS Select the default CoS value for frames passing through the
interface (0 to 7). This value can be overwritten on the
service point and service level.
7.2.3 Modifying the C-VLAN 802.1Q UP and CFI Bit Classification Table
To modify the classification criteria for 802.1Q User Priority (UP) bits:
1 Select Ethernet > QoS > Classification > 802.1Q. The 802.1Q Classification
page opens.
7.2.4 Modifying the S-VLAN 802.1 UP and DEI Bit Classification Table
To modify the classification criteria for 802.1AD User Priority (UP) bits:
1 Select Ethernet > QoS > Classification > 802.1AD. The 802.1AD Classification
page opens.
Profile ID A unique ID for the policer profile. You can choose any unused value from 1
to 250. Once you have added the profile, you cannot change the Profile ID.
Description A description of the policer profile.
Policer type Read-only. The type of policer. Always set to MEF-TRTCM.
CIR Enter the Committed Information Rate (CIR) for the policer, in bits per
second. Permitted values are 0, or 64,000 through 1,000,000,000 bps. If the
value is 0, all incoming CIR traffic is dropped.
CBS Enter the Committed Burst Rate (CBR) for the policer, in Kbytes. Permitted
values are 0 through 8192 Kbytes.
EIR Enter the Excess Information Rate (EIR) for the policer, in bits per second.
Permitted values are 0, or 64,000 through 1,000,000,000 bps. If the value is
0, all incoming EIR traffic is dropped.
EBS Enter the Excess Burst Rate (EBR) for the policer, in Kbytes. Permitted values
are 0 through 8192 Kbytes.
Color mode Select how the policer treats packets that ingress with a CFI or DEI field set
to 1 (yellow). Options are:
• Color Aware – All packets that ingress with a CFI/DEI field set to 1
(yellow) are treated as EIR packets, even if credits remain in the CIR
bucket.
• Color Blind – All ingress packets are treated as green regardless of
their CFI/DEI value. A color-blind policer discards any former color
decisions.
Coupling flag Select Enable or Disable. When enabled, frames that ingress as yellow may
be converted to green when there are no available yellow credits in the EIR
bucket. Coupling Flag is only relevant in Color Aware mode.
only according to the values defined for Green frames in the 802.1Q and 802.1AD
marking tables.
When marking is performed, the C-VLAN or S-VLAN 802.1p UP bits are re-marked
according to the calculated CoS and color, and the mapping table for C-VLAN or S-
VLAN.
2 Select the row you want to modify and click Edit. The 802.1AD Marking - Edit
page opens.
6 In the Green curve max drop ratio field, enter the maximum percentage (1-
100) of dropped green packets for queues with this profile.
7 In the Yellow curve min point field, enter the minimum throughput of yellow
packets for queues with this profile, in Kbytes (0-8192). When this value is
reached, the system begins dropping yellow packets in the queue.
8 In the Yellow curve max point field, enter the maximum throughput of yellow
packets for queues with this profile, in Kbytes (0-8192). After this value is
reached, all yellow packets in the queue are dropped.
9 In the Yellow curve max drop ratio field, enter the maximum percentage (1-
100) of dropped yellow packets for queues with this profile.
10 Click Apply, then Close.
6 In the PIR field, enter the Peak Information Rate (PIR) assigned to the profile,
in bits per second. Permitted values are:
◦ 16,000 – 32,000,000 bps, with granularity of 16,000.
◦ 32,000,000 – 1,000,000,000 bps, with granularity of 64,000.
7 Click Apply, then Close.
Figure 292: Logical Interfaces – Egress Queue Shaper Configuration – Add Page
Note: Only one service bundle (Service Bundle ID 1) is supported.
4 In the CoS queue ID field, select the CoS queue ID of the queue to which you
want to assign the shaper. Queues are numbered according to CoS value, from
0 to 7.
5 In the Profile ID field, select from a list of configured queue shaper profiles.
See Configuring Queue Shaper Profiles.
6 In the Shaper Admin field, select Enable to enable egress queue shaping for
the selected queue, or Disable to disable egress queue shaping for the
selected queue.
7 Click Apply, then Close.
To assign a different queue shaper profile to a queue:
1 Select Ethernet > Interfaces > Logical Interfaces. The Logical Interfaces page
opens (Figure 259).
2 Select an interface in the Ethernet Logical Port Configuration table and click
Shaper. The Logical Interfaces – Shaper page opens, with the Egress Queue
Shaper Configuration table open by default (Figure 291).
3 Select an interface in the Ethernet Logical Port Configuration table and click
Shaper. The Logical Interfaces – Shaper page opens, with the Egress Queue
Shaper Configuration table open by default (Figure 291).
4 Select the row you want to edit and click Edit. The Egress Queue Shaper
Configuration – Edit page opens. This page is similar to the Egress Queue
Shaper Configuration – Add page (Figure 292).
5 To assign a different egress queue shaper profile, select the profile in the
Profile ID field.
6 To enable or disable egress queue shaping for the selected queue, select
Enable to enable egress queue shaping for the queue, or Disable to disable
egress queue shaping for the queue.
7 Click Apply, then Close.
Figure 294: Logical Interfaces – Egress Service Bundle Shaper Configuration – Add
Page
Note: Only one service bundle (Service Bundle ID 1) is supported.
5 In the Profile ID field, select from a list of configured service bundle shaper
profiles. See Configuring Service Bundle Shaper Profiles.
6 In the Shaper Admin field, select Enable to enable egress service bundle
shaping, or Disable to disable egress service bundle shaping.
7 Click Apply, then Close.
To assign a different service bundle shaper profile:
1 Select Ethernet > Interfaces > Logical Interfaces. The Logical Interfaces page
opens (Figure 259).
2 Select an interface in the Ethernet Logical Port Configuration table and click
Shaper. The Logical Interfaces – Shaper page opens, with the Egress Queue
Shaper Configuration table open by default (Figure 291).
3 Select Egress Service Bundle Shaper. The Egress Service Bundle Shaper
Configuration table appears (Figure 293). All service bundle shaper profiles
defined in the system are listed in the table.
4 Select the row you want to edit and click Edit. The Egress Service Bundle
Shaper Configuration – Edit page opens. This page is similar to the Egress
Service Bundle Shaper Configuration – Add page (Figure 294).
5 To assign a different egress queue shaper profile, select the profile in the
Profile ID field.
6 To enable or disable egress service bundle shaping, select Enable or Disable.
7 Click Apply, then Close.
4 For each CoS value, enter the Green priority, from 4 (highest) to 1 (lowest) (1-
4). This priority is applied to Green frames with that CoS egressing a queue to
which the profile is assigned.
5 Optionally, you can enter a description of up to 20 characters in the field to
the right of each CoS value.
6 Click Apply, then Close.
Note: The Yellow priority values are assigned automatically by the system.
3 Select Egress Port Scheduling WFQ. The Egress Port Scheduling WFQ
Configuration – Edit page opens.
3 In the Interface Location field, select the interface for which you want to
configure the collection rule.
4 In the Service Bundle field, select a service bundle (1-6).
5 In the Admin field, select Enable to enable the collection rule.
6 Enter the Green and Yellow thresholds for each CoS, in bytes (0-4294967295).
7 Click Apply.
8 Repeat these steps to configure collection rules for additional interfaces.
To display queue-level PMs:
1 Select Ethernet > PM & Statistics > Egress CoS PM > Egress CoS PM. The
Egress CoS PM page opens.
8. Ethernet Protocols
This section includes:
• Configuring G.8032
• Configuring MSTP
• Configuring Adaptive Bandwidth Notification (ABN)
• Configuring Ethernet Bandwidth Notification (ETH-BN)
• Configuring LLDP
Related Topics:
• Configuring Service OAM (SOAM) Fault Management (FM)
For a more detailed description of G.8032 in the IP-20C and IP-20V, refer to the
Technical Description for the product you are using.
3 In the ERPI ID field, select an available ID. The ERPI ID is a unique ID that
identifies the ERPI.
4 Optionally, in the ERPI Name field, enter a descriptive name for the ERPI.
5 In the Type field, select the type of ERPI, based on the type of ring:
◦ Ring: A Ring is an Ethernet ring that is connected on two ports (East and
West service points) to an interconnection node.
◦ Sub-ring: A Sub-Ring is an Ethernet ring which is connected to another ring
or network through the use of interconnection nodes (East and West
service points). On their own, the Sub-Ring links do not form a closed
physical loop. A closed loop may be formed by the sub-ring links and the
link between interconnection nodes that is controlled by other ring or
network.
◦ Ring with sub-ring: The ERPI includes both a ring, with East and West
service points, and a connection to a sub-ring using a Sub-Ring service
point.
6 In the Service ID field, select the ID of the Ethernet service to which the ERPI
belongs.
7 Optionally, in the MEG Level field, select the Maintenance Entity Group (MEG)
level used for R-APS messages sent in the ERPI (0-7).
8 Click Next. The second page of the Add G.8032 ERPI Attribute wizard opens.
10 Click Next. The third page of the Add G.8032 ERPI Attribute wizard opens.
13 In the Sub Ring port (SP) field, select the service point that connects the Ring
with the Sub-Ring. This can be any service point that has been configured for
the service.
14 Click Next. The Submit page opens.
3 In the RPL Owner field, select the service point you want to configure as RPL
Owner.
4 Click Apply, then Close.
ERPI State Indicates the current ERPI state. Possible values are:
• Initializing
• Idle
• Pending
• Protecting
• FS (Forced Switch)
• MS (Manual Switch)
MEG Level The Maintenance Entity Group (MEG) level used for R-APS
messages sent in the ERPI.
Last Local State Describes the current local state input to the ERPI state machine.
Last Remote State Indicates the last event received from the other end of the link.
Last HP Request Indicates the last high-priority event.
Last Change Timestamp Indicates the time of the last ring state transition.
ERPI Port Identifies whether the row is for the West endpoint, the East
endpoint, or a Sub-Ring connection point.
ERPI Port Active State Indicates whether or not the service point is active for traffic
forwarding.
R-APS Channel Forwarding Indicates whether the service point is forwarding R-APS messages.
State
ERPI Data Forwarding State Indicates whether the service point is in unblocked (forwarding)
state.
RPL Blocking State Only relevant if the ERPI to which the service point belongs is the
RPL owner. Indicates whether the service point is in blocked state.
ERPI Port Defect State Indicates whether the service point is in Signal Fail (SF) or Signal Defect
(SD) state.
Note: Support for Signal Defect state is planned for future
release.
8.1.8 Initiating a Manual or Forced Switch and Clearing the Switch or Initiating
Reversion
You can initiate a manual or forced switch, clear the switch, and initiate reversion,
from the G.8032 ERPI Attribute – State page:
1 Select Ethernet > Protocols > G.8032 > ERPI Attribute. The G.8032 ERPI
Attribute page opens (Figure 305).
2 Select the ERPI and click State. The ERPI Attribute – State page opens (Figure
312).
3 Select the service point on which you want to perform the operation.
◦ To initiate a forced switch, click Force Switch.
◦ To initiate a manual switch, click Manual Switch.
◦ To clear a forced or manual switch, click Clear. You can also click Clear to
trigger convergence prior to the expiration of the relevant timer.
Table 62 lists and describes the statistics shown in the ERPI Attribute – Statistics
page.
ERPI Port Identifies whether the row is for the West endpoint, the East
endpoint, or a Sub-Ring connection point.
Transmitted Total R-APS The number of R-APS frames that have been transmitted via the
Frames service point.
Transmitted SF PDU The number of R-APS Signal Fail (SF) frames that have been
transmitted via the service point.
Transmitted NR PDU The number of R-APS No Request (NR) frames that have been
transmitted via the service point.
Transmitted RB PDU The number of R-APS RPL Blocked (RB) frames that have been
transmitted via the service point.
Transmitted FS PDU The number of R-APS Force Switched (FS) frames that have been
transmitted via the service point.
Transmitted MS PDU The number of R-APS Manual Switched (MS) frames that have
been transmitted via the service point.
Transmitted R-APS Events Reserved for future use.
Received R-APS Frames The number of R-APS frames that have been received via the
service point.
Received Invalid R-APS The number of R-APS frames with an invalid format that have been
Frames received via the service point.
Received SF PDU The number of R-APS Signal Fail (SF) frames that have been
received via the service point.
Received NR PDU The number of R-APS No Request (NR) frames that have been
received via the service point.
Received RB PDU The number of R-APS RPL Blocked (RB) frames that have been
received via the service point.
Received SD PDU The number of R-APS Signal Degrade (SD) frames that have been
received via the service point.
Received FS PDU The number of R-APS Forced Switch (FS) frames that have been
received via the service point.
Received MS PDU The number of R-APS Manual Switch (MS) frames that have been
received via the service point.
Received R-APS Events Reserved for future use.
8.2.3.1 Enabling MSTP and Configuring the MSTP Bridge General Attributes
To configure the MSTP bridge general attributes:
1 Select Ethernet > Protocols > MSTP > Bridge > General Attributes. The MSTP
Bridge General Attributes page opens.
5 In the MSTP SD Handling field, select how MSTP handles Signal Degrade (SD)
failures. Options are:
◦ Ignored – Signal Degrade (SD) failures are ignored in MSTP.
◦ Same as SF – SD failures trigger a topology change.
Note: SD handling is planned for future release.
6 Click Apply.
To reset the MSTP stack, click Reset Protocol.
STP Time Since Last TC The time that has elapsed (in cs) since the last time the bridge
entity detected a topology change.
STP Number of Topology The total number of topology changes that have been detected by
Changes this bridge since the management entity was last reset or
initialized.
Note: Discontinuities in the value of this counter can occur upon
reinitialization of the management system.
STP Designated Root The Bridge ID of the spanning tree root, as determined by MSTP in
this node. This value is used as the Root ID in all configuration
BPDUs originated by this node.
STP Root Cost The cost of the path to the root as seen from this bridge.
STP Root Port The port number of the port that offers the lowest cost path from
this bridge to the external root bridge
STP Max Age The maximum age (in cs) of MSTP information learned from the
network on any port before the information is discarded.
Note: This field displays the value actually being used by the
bridge, in contrast to the STP Bridge Max Age parameter
described below, which is user-configurable and which represents
the value that this and all other bridges use if and when this
bridge becomes the root.
STP Forward Delay The speed at which ports change their spanning state when
moving towards the Forwarding state. This value determines how
long the port stays in Listening state and Learning state. This value
is also used when a topology change has been detected and is
underway for purposes of aging all dynamic entries in the filtering
database.
Note: This field displays the value actually being used by the
bridge, in contrast to the STP Bridge Forward Delay parameter
described below, which is user-configurable and which represents
the value that this and all other bridges use if and when this
bridge becomes the root.
STP Version The STP version the bridge is currently running (MSTP).
Parameter Definition
STP Priority Select a value as the writeable portion of the Bridge ID. This value
constitutes the first two octets of the Bridge ID. Possible values are
0-61440, in steps of 4096
STP Hold Time Select a value (in cs) as the interval length during which no more
than two configuration bridge PDUs will be transmitted by this
node. Possible values are 10-100.
STP Bridge Max Age Select a value (in cs) that all bridges will use, when this bridge is
the root, as the maximum age of MSTP information learned from
the network on any port before the information is discarded.
Options are 600-4000 cs.
STP Bridge Forward Delay Select a value (in cs) that all bridges will use, when this bridge is
the root, as the speed at which ports change their spanning state
when moving towards the Forwarding state. This value determines
how long the port stays in Listening state and Learning state. This
value is also used when a topology change has been detected and
is underway for purposes of aging all dynamic entries in the
filtering database. Options are 400-3000 cs.
STP Bridge Hello Time Select the value (in cs) that all bridges will use, when this bridge is
the root, as the Hello Time. The Hello Time determines how often
the switch broadcasts its hello message to other switches, and is
the same for all MSTIs. Options are 100-1000 cs.
4 In the MSTI Bridge Priority field, enter the MSTI writeable portion of the
Bridge ID. Possible values are 0-61440, in steps of 4096.
5 Click Apply, then Close.
Table 67 lists and describes the status parameters in the MSTP Bridge MSTI page.
STP Interface Location The slot number and port number of the port.
STP Port State The port's current state, as defined by application of STP. The port's
state controls the action the port takes upon receipt of a frame.
Possible values are:
• Forwarding – The port sends and receives traffic normally.
• Blocking – The port does not send or receive traffic, but does
receive BPDUs.
• Learning – The port receives traffic but does not forward the
traffic. The port learns the source MAC addresses of incoming
frames.
• Listening – The port monitors BPDUs, but does not forward
traffic and does not learn the source MAC addresses of
incoming frames.
• Disabled – The port is disabled (not by MSTP).
STP Port Designated The CIST Path Cost of the segment connected to this port. This value is
Cost compared to the root path cost in received BPDUs.
STP Port Designated The CIST Bridge ID of the bridge that this port considers to be the
Bridge designated bridge for this port's segment.
3 In the CIST Port Admin Path Cost field, enter an assigned value for the
contribution of this port to the path cost of paths towards the spanning tree
root.
Note: Changing the value of this parameter is considered to be a topology
change by the MSTP mechanism.
4 In the CIST Port Edge Admin field, select the port's administrative edge port
parameter, for the CIST.
5 In the CIST MAC enabled field, select the port's MAC Enabled parameter. A
value of True indicates that administratively, the MAC is set as if it were
connected to a point-to-point LAN. Options are:
◦ Force True – The MAC is treated as if it is connected to a point-to-point
LAN, regardless of any indications to the contrary that are generated by
the MAC entity.
◦ Force False –The MAC is treated as if it is connected to a non-point-to-
point LAN, regardless of any indications to the contrary that are generated
by the MAC entity.
◦ Automatic – The MAC Enabled parameter is set to True if the MAC is
connected to a point-to-point or full-duplex LAN. The MAC Enabled
parameter is set to False if the MAC is connected to a non-point-to-point
and half-duplex LAN.
6 Click Apply, then Close.
Table 69 lists and describes the status parameters in the MSTP Port Spanning Tree
page.
CIST Port Interface The slot number and port number of the port.
Location
CIST Port Designated The CIST Regional Root ID component of the port's Port Priority vector
Root for the CIST
CIST Port Edge Oper Indicates whether or not the port is operating as an Edge port. Possible
State values are:
• True – The port is operating as an Edge port, which means it
does not process the BPDUs that it receives.
• False – The port is operating as a non-Edge port, which means it
processes the BPDUs that it receives.
If CIST Port Edge Admin is set to True, the system automatically
determines its operational Edge port state.
CIST Port Role The port's current role in the CIST.
Transient port roles may be:
• Blocking – The port does not send or receive traffic, but does
receive BPDUs.
Parameter Definition
• Learning – The port receives traffic but does not forward the
traffic. The port learns the source MAC addresses of incoming
frames.
• Listening – The port monitors BPDUs, but does not forward
traffic and does not learn the source MAC addresses of
incoming frames.
Final port roles may be:
• Disabled – The port is in Operational - Down state and is not
included in the MSTP calculation.
• Designated – The port is in Operational - Up state and has been
designated to forward traffic.
• Root – The port is forwarding traffic towards the root bridge.
• Alternate – The port is not forwarding traffic (blocked) but can
become a Designated port after MSTP calculation.
CIST Port CIST Regional The Bridge ID of the current CIST Regional Root.
Route ID
CIST Port CIST Path Cost The CIST path cost from the transmitting bridge to the CIST regional
root. If the transmitting bridge is the CIST regional root, the value of this
parameter will be 0.
CIST Port Hello Time The port's Hello Time timer parameter value, for the CIST (in cs).
CIST Port Protocol The current value of the mcheck variable for the port.
Migration Note: Migration support is planned for future release.
CIST Port MAC Oper The current state of the port's MAC operational parameter. True
State indicates the MAC is operational.
CIST Port Uptime The number of seconds that have elapsed since the port was last reset
or initialized.
Parameter Definition
• Forwarding – The port sends and receives traffic normally.
• Blocking – The port does not send or receive traffic, but does
receive BPDUs.
• Learning – The port receives traffic but does not forward the
traffic. The port learns the source MAC addresses of incoming
frames.
• Listening – The port monitors BPDUs, but does not forward traffic
and does not learn the source MAC addresses of incoming
frames.
• Disabled – The port is disabled (not by MSTP).
MSTI Port Designated The Regional Root ID component of the port's Port Priority vector for the
Root MSTI.
MSTI Port Designated The Internal Root Path Cost component of the port's MSTI port priority
Cost vector, for the MSTI.
MSTI Port Designated The Designated Bridge ID component of the port's MSTI port priority
Bridge vector.
MSTI Port Role The port's current role in the MSTI.
Transient port roles may be:
• Blocking – The port does not send or receive traffic, but does
receive BPDUs.
• Learning – The port receives traffic but does not forward the
traffic. The port learns the source MAC addresses of incoming
frames.
• Listening – The port monitors BPDUs, but does not forward traffic
and does not learn the source MAC addresses of incoming
frames.
Final port roles may be:
• Disabled – The port is in Operational - Down state and is not
included in the MSTP calculation.
• Designated – The port is in Operational - Up state and has been
designated to forward traffic.
• Root – The port is forwarding traffic towards the root bridge.
• Alternate – The port is not forwarding traffic (blocked) but can
become a Designated port after MSTP calculation.
• Master – The port is forwarding traffic towards the CIST root
bridge.
MSTI Port Uptime The port's uptime parameter value for the MSTI. This is the number of
seconds that have elapsed since the port was last reset or initialized.
Parameter Definition
Interface Location The location of the port.
Received TCN The number of Topology Change Notifications (TCNs) received since the last counter
reset.
Received Configuration BPDU The number of configuration BPDUs received since the last counter reset.
Received RST BPDU The number of Rapid Spanning Tree (RST) BPDUs received since the last counter reset.
Received MST BPDU The number of Multiple Spanning Tree (MST) BPDUs received since the last counter
reset.
Transmitted TCN BPDU The number of Topology Change Notifications (TCNs) transmitted since the last
counter reset.
Transmitted Configuration The number of configuration BPDUs transmitted since the last counter reset.
BPDU
Transmitted RST BPDU The number of Rapid Spanning Tree (RST) BPDUs transmitted since the last counter
reset.
Transmitted MST BPDU The number of Multiple Spanning Tree (MST) BPDUs transmitted since the last counter
reset.
12 In the Monitoring Interval field, select the interval for which a weighted
average of the bandwidth readings is calculated.
13 Click Apply, then Close.
Table 72 describes the status (read-only) fields in the ABN Configuration and
Status table.
Parameter Definition
Nominal BW The nominal bandwidth of the link.
Current BW The weighted average of the bandwidth readings taken during the last Monitoring Interval.
Version The ABN version used.
When the Control Interface is a LAG, EBN messages are only sent to
the first active member of the LAG.
When used with IP-20C, IP-20S, and IP-20C-HP unit redundancy, the
reported bandwidth may be inaccurate when switchover is in effect.
The same radio interface can be configured as a Monitored Interface for multiple
EBN instances. However, an Ethernet interface can only be configured as a Control
Interface for a single EBN instance.
7 In the Control Interface field, select the Control Interface. This is the interface
to which messages are transmitted when bandwidth in the monitored
interface degrades below the nominal value. It can be an individual Ethernet
interface or a LAG group.
8 In the MEL field, select the CFM Maintenance Level in the messages (0-7).
Note: If CFM MEPs are being used, the MEL must be set to a value greater
than the MEG level of the MEP. Otherwise, the BNM frames will be
dropped.
If CFM MEPs are not being used, the MEL for ETH-BN must be set to a
value greater than 0. Otherwise, the BNM frames will be dropped.
9 In the Tx VLAN field, specify the VLAN on which messages are transmitted.
Options are:
◦ Untagged.
◦ 1 – 4090.
Note: The CoS of the VLAN is automatically set to 7.
10 In the Is Always Sent field, specify whether periodic BNM frames should be
sent even when there is no bandwidth degradation in the monitored
interface:
◦ True – BNM frames are always sent, even when the bandwidth is at its
nominal value.
◦ False – BNM frames are only sent when the current bandwidth is lower
than the nominal bandwidth (default value).
11 In the Tx Period field, specify how often messages are transmitted when Is
Always Sent is set to True or, if not, when bandwidth is below the nominal
value. Options are:
◦ One second
◦ Ten seconds (default)
◦ Sixty seconds
12 In the Holdoff Time field, specify the amount of time (in seconds) the system
waits when bandwidth degradation occurs, before transmitting a message. If
the bandwidth is below the nominal value when the holdoff period ends, the
system starts transmitting messages. Options are 0-10. The default value is 10.
Note: If the bandwidth fluctuates before the Holdoff Time expires, and is
lower than the nominal bandwidth when the Holdoff Time expires, the
first BNM frame sent when the timer expires gives the lowest
bandwidth that was recorded while the timer was running.
Subsequent BNM frames are sent with the actual current bandwidth.
13 Click Apply, then Close.
Table 74 describes the status (read-only) fields in the ABN Configuration and
Status table.
Parameter Definition
Nominal BW The maximum radio TX bitrate achievable with the current radio configuration.
Current BW The current radio TX bitrate.
Max TX Credit Displays the maximum number of consecutive LLDPDUs that can be
transmitted at any one time. In this release, the Max TX Credit is set at 5.
Fast TX Interval Displays, in seconds, the interval at which LLDP frames are transmitted
(Seconds) during fast transmission periods, such as when the unit detects a new
peer. In this release, the Fast TX Interval is set at 1.
Fast TX The initial value used to initialize the variable which determines the
number of transmissions that are made during fast transmission periods.
In this release, the Fast TX No. is set at 4.
Reinit Delay Defines the minimum time, in seconds, the system waits after the LLDP
(Seconds) Admin status becomes Disabled until it will process a request to reinitialize
LLDP. For instructions on disabling or enabling LLDP on a port, see
Configuring the LLDP Port Parameters.
In this release, the Reinit Delay is set at 2.
TX Interval (Seconds) Defines the interval, in seconds, at which LLDP frames are
transmitted. You can select a value from 5 to 32768. The default
value is 30.
Notification Interval (Seconds) Defines the interval, in seconds, between transmission of LLDP
notifications during normal transmission periods. You can select
a value from 5 to 3600. The default value is 10.
Hold Multiplier Defines the time-to-live (TTL) multiplier. The TTL determines the
length of time LLDP frames are retained by the receiving device.
The TTL is determined by multiplying the TX Interval by the Hold
Multiplier.
You can select a value from 2 to 10. The default value is 4.
To display unit parameter information received via LLDP from the unit's nearest
neighbor (peer):
1 Select Ethernet > Protocols > LLDP > Advanced > Remote System > Remote
Table. The LLDP Remote System Table page opens.
System Name The system name included in TLVs transmitted by the LLDP agent, as
defined in the Name field of the Unit Parameters page. See Configuring
Unit Parameters.
System Description The system description included in TLVs transmitted by the LLDP agent, as
defined in the Description field of the Unit Parameters page. See
Configuring Unit Parameters.
Chassis ID The MAC Address of the local unit.
Chassis ID SubType The type of encoding used to identify the local unit. In this release, this
parameter is always set to MAC Address.
Parameter Definition
Capabilities A bitmap value used to identify which system capabilities are supported
Supported on the local system, as included in TLVs transmitted by the LLDP agent.
The bitmap is defined by the following parameters:
0 – other
1 – repeater
2 – bridge
3 – wlanAccessPoint
4 – router
5 – telephone
6 – docsisCableDevice
7 – stationOnly
8 – cVLANComponent
9 – sVLANComponent
10 – twoPortMACRelay
Capabilities Enabled A bitmap value used to identify which system capabilities are enabled on
the local system, as included in TLVs transmitted by the LLDP agent.
The bitmap is defined by the following parameters:
0 – other
1 – repeater
2 – bridge
3 – wlanAccessPoint
4 – router
5 – telephone
6 – docsisCableDevice
7 – stationOnly
8 – cVLANComponent
9 – sVLANComponent
10 – twoPortMACRelay
Last Change Time The time of the most recent change in the remote unit, as reported via
LLDP.
Inserts The number of times the information from the remote system has
changed.
Deletes The number of times the information from the remote system has
been deleted.
Drops Reserved for future use.
Ageouts The number of times the information from the remote system has
been deleted from the local unit's database because the information's
TTL has expired.
The RX Ageouts counter in the Port RX page is similar to this counter,
but is for specific ports rather than the entire unit.
Interface Location The index value used to identify the port in LLDP transmissions.
Destination Address The LLDP MAC address associated with this entry.
Total Frames The number of LLDP frames transmitted by the LLDP agent on this port
to the destination MAC address.
Errored Length Frames The number of LLDPDU Length Errors recorded for this port and
destination MAC address.
If the set of TLVs that is selected in the LLDP local system MIB by
network management would result in an LLDPDU that violates LLDPDU
length restrictions, then the No. of Length Error statistic is incremented
by 1, and an LLDPDU is sent containing the mandatory TLVs plus as many
of the optional TLVs in the set as will fit in the remaining LLDPDU length.
Interface Location The index value used to identify the port in LLDP transmissions.
Destination Address The LLDP MAC address associated with this entry.
Parameter Definition
Total Discarded The number of LLDP frames received by the LLDP agent on this port, and
then discarded for any reason. This counter can provide an indication
that LLDP header formatting problems may exist with the local LLDP
agent in the sending system or that LLDPDU validation problems may
exist with the local LLDP agent in the receiving system.
Invalid Frames The number of invalid LLDP frames received by the LLDP agent on this
port while the agent is enabled.
Valid Frames The number of valid LLDP frames received by the LLDP agent on this
port.
Discarded TLVs The number of LLDP TLVs discarded for any reason by the LLDP agent on
this port.
Unrecognized TLVs The number of LLDP TLVs received on the given port that are not
recognized by LLDP agent.
Ageouts The number of age-outs that occurred on the port. An age-out is the
number of times the complete set of information advertised by the
remote system has been deleted from the unit's database because the
information timeliness interval has expired.
This counter is similar to the LLDP No. of Ageouts counter in the LLDP
Statistic page, except that it is per port rather than for the entire unit.
This counter is set to zero during agent initialization. This counter is
incremented only once when the complete set of information is
invalidated (aged out) from all related tables on a particular port. Partial
ageing is not allowed.
9. Synchronization
This section includes:
• Configuring SyncE Regenerator
• Configuring the Sync Source
• Configuring the Outgoing Clock and SSM Messages
• Configuring 1588 Transparent Clock
Note: By default, the Sync mode is set to Automatic. To display the current
Sync mode, enter the following command in root view:
3 Click Add underneath the Pipe Configurations Table. The Pipe Configuration -
Add window opens.
If the Sync mode is set to pipe, you must set it to automatic by entering the
following CLI command in root view:
root> platform sync mode set automatic
When configuring an Ethernet interface as a Sync source, the Media Type of the
interface must be RJ45 or SFP, not Auto-Type. To view and configure the Media
Type of an Ethernet interface, see Configuring Ethernet Interfaces.
When configuring the outgoing clock and SSM administration, the Sync mode
must be set to its default setting of automatic. To display the current Sync mode,
enter the following CLI command in root view:
root> platform sync mode show
If the Sync mode is set to pipe, you must set it to automatic by entering the
following CLI command in root view:
root> platform sync mode set automatic
To configure the outgoing clock on an Ethernet interface, the Media Type of the
interface must be RJ45 or SFP, not Auto-Type. To view and configure the Media
Type of an Ethernet interface, see Configuring Ethernet Interfaces.
To view and configure the synchronization parameters of the unit’s interfaces:
1 Select Sync > Outgoing Clock. The Outgoing Clock page opens.
◦ System Clock – Default value. The interface uses the system clock as its
synchronization source.
◦ Source Interface – Reserved for future use.
◦ Time Loop – Reserved for future use.
4 In Sync Radio Channel field, use the default value of 0.
5 In the SSM Admin field, select On or Off to enable or disable SSM for the
interface. By default, SSM is disabled on all interfaces.
6 Select Sync > 1588 > General Configuration. The 1588 – General Configuration
page opens.
10 Select a radio interface or Multi-Carrier ABC group and click Edit. The 1588
Transparent Clock – Edit page opens.
You can terminate all active sessions via a CLI command. See
Terminating all Active Sessions (CLI).
Related topics:
• Changing Your Password
• Operating in FIPS Mode
• Configuring AES-256 Payload Encryption
6 In the Radio Payload Encryption area, select an interface and click Edit to
define AES-256 payload encryption. For details, see Configuring AES-256
Payload Encryption.
Figure 362: Quick Configuration Security RSA Key & Certificate Page
2 In the RSA Key Download Status area, you can download and install an RSA
key. For details, see Downloading and Installing an RSA Key.
3 In the Download Certification Status area, you can download and install a CSR
file. For details, see Configuring X.509 CSR Certificates .
1 Select Platform > Security > Access Control > User Accounts. The Access
Control User Accounts page opens (Figure 369).
2 Select the user and click Edit. The Access Control User Accounts - Edit page
opens.
4 In the Profile field, select a User Profile. The User Profile defines the user’s
access levels for functionality groups in the system. See Configuring User
Profiles.
5 In the Password field, enter a password for the user. If Enforce Password
Strength is activated (see Configuring the Password Security Parameters), the
password must meet the following criteria:
◦ Password length must be at least eight characters.
◦ Password must include characters of at least three of the following
character types: lower case letters, upper case letters, digits, and special
characters. For purposes of meeting this requirement, upper case letters at
the beginning of the password and digits at the end of the password are
not counted.
◦ The last five passwords you used cannot be reused.
6 In the Blocked field, you can block or unblock the user. Selecting Yes blocks
the user. You can use this option to block a user temporarily, without deleting
the user from the system. If you set this option to Yes while the user is logged
into the system, the user will be automatically logged out of the system within
30 seconds.
Note: Users can also be blocked by the system automatically. You can
unblock the user by selecting No in the Blocked field. See Configuring
the General Access Control Parameters.
7 Optionally, in the Expiration date field, you can configure the user to remain
active only until a defined date. After that date, the user automatically
becomes inactive. To set an expiration date, click the calendar icon and select
a date, or enter a date in the format dd-mm-yyyy. The latest date that can be
configured is 30-12-2037.
Note: If no expiration date is configured, the user account will expire five
years after the date configured on the unit.
In addition to the configurable parameters described above, the Access Control
User Accounts page displays the following information for each user:
• Login Status – Indicates whether the user is currently logged into the system.
• Last Logout – The date and time the user most recently logged out of the
system.
To edit a user’s account details, select the user and click Edit. You can edit all of
the user account parameters except the User name and password.
To add a user, click Add.
To delete a user, select the user and click Delete.
3 In the Device Properties – General tab, make sure to select Password never
expires. If you leave the default setting (User must change password at next
logon), authentication may fail.
Figure 377: Create Network Policy – Specify Name and Connection Type
4 Click Next.
5 In the Specify Conditions window, click Add.
6 In the Select Condition window that appears, select the User Groups condition
and click Add.
Figure 379: Create Network Policy – User Group added to Policy’s Conditions
11 Click OK to save settings.
12 Click Next.
13 In the Specify Access Permission window that appears, select the Access
Granted option.
23 Click OK.
The following figure shows the Attributes table for the Radius_Advanced group,
where access to the device is allowed from all channels.
security-ro = advanced,
security-wo = advanced,
mng-ro = advanced,
mng-wo = advanced,
radio-ro = advanced,
radio-wo = advanced,
tdm-ro = advanced,
tdm-wo = advanced,
eth-ro = advanced,
eth-wo = advanced,
sync-ro = advanced,
sync-wo = advanced,
access_channel = u1accesschannel,
fall-through = yes
security-ro = regular,
security-wo = regular,
mng-ro = regular,
mng-wo = regular,
radio-ro = regular,
radio-wo = regular,
tdm-ro = regular,
tdm-wo = regular,
eth-ro = regular,
eth-wo = regular,
sync-ro = regular,
sync-wo = regular,
access_channel = u2accesschannel,
fall-through = yes
security-ro = none,
security-wo = none,
mng-ro = none,
mng-wo = none,
radio-ro = none,
radio-wo = none,
tdm-ro = none,
tdm-wo = none,
eth-ro = none,
eth-wo = none,
sync-ro = none,
sync-wo = none,
access_channel = u3accesschannel,
fall-through = yes
2 Save the changes in the /etc/raddb/users file.
### serial 1
### telnet 2
### ssh 4
### web 8
### nms 16
### snmp 32
### snmpV3 64
For example:
• The value 127 denotes permission to access the device from all channels:
Serial + Telnet + SSH + Web + NMS + SNMP +SNMPv3
• The value 24 indicates permission to access the device only from the Web +
NMS channels.
To define each user’s access channels:
1 In the usr/share/freeradius/dictionary.ceragon file, configure the
values of the access channels according to the following example:
### access channel for u1
user:serial+telnet+ssh+web+nms+snmp+snmpV4
client 192.168.1.118 {
secret = default_not_applicable
shortname = ceragon-ip-20C
}
◦ Keep in mind:
◦ The secret must be between 22 and 128 characters long. Note down
the secret because you will need to enter the same value in the Secret
field of the Radius Configuration – Edit page (Figure 372).
◦The shortname is not mandatory, but should be added, and should be
different for each RADIUS client.
2 Save the changes to the /etc/raddb/clients.conf file.
Note: To check the logs each time a user connects to the server, enter:
radius –X &
from the server, the device attempts to contact the second user-defined TACACS+
server. If no response is received from any of the servers, the device performs
user authentication locally.
To view the user’s authorized access levels, select the user and click View. The
Remote Access Users Table – View page opens.
3 In the Organization field, enter the exact legal name of your organization. Do
not abbreviate.
4 In the Organization Unit field, enter the division of the organization that
handles the certificate.
5 In the Locality field, enter the city in which the organization is legally located.
6 In the State field, enter the state, province, or region in which the
organization is located. Do not abbreviate.
7 In the Country field, enter the two-letter ISO abbreviation for your country
(e.g., US).
8 In the Email field, enter an e-mail address that can be used to contact your
organization.
9 In the File Format field, select PEM or DER to determine the file format.
Note: In this version, only PEM is supported.
10 Click Apply to save your settings.
11 Click FTP Parameters to display the FTP Parameters page.
16 If the IP address family is configured to be IPv4, enter the IPv4 address of the
PC or laptop you are using as the SFTP server in the Server IP address field.
See Defining the IP Protocol Version for Initiating Communications.
17 If the IP address family is configured to be IPv6, enter the IPv6 address of the
PC or laptop you are using as the SFTP server in the Server IPv6 address field.
See Defining the IP Protocol Version for Initiating Communications.
18 Click Apply, then Close, to save the FTP parameters and return to the Security
Log Upload page.
19 Click Generate & Upload. The file is generated and uploaded.
The Creation/Upload status field displays the status of any pending CSR
generation and upload. Possible values are:
• Ready – The default value, which appears when CSR generation and upload is
in progress.
• File-in-transfer – The upload operation is in progress.
• Success – The file has been successfully uploaded.
• Failure – The file was not successfully uploaded.
The Creation/Upload progress field displays the progress of any current CSR
upload operation.
Figure 398: FTP Parameters Page (Security Certification Download & Install)
3 In the Username field, enter the user name you configured in the SFTP server.
4 In the Password field, enter the password you configured in the SFTP server. If
you did not configure a password for your SFTP user, simply leave this field
blank.
5 In the Path field, enter the directory path from which you are uploading the
certificate. Enter the path relative to the SFTP user’s home directory, not the
absolute path. If the location is the home directory, it should be left empty. If
the location is a sub-folder under the home directory, specify the folder name.
If the shared folder is "C:\", this parameter can be left empty or populated
with "//".
6 In the File Name field, enter the certificate’s file name in the SFTP server.
7 If the IP address family is configured to be IPv4, enter the IPv4 address of the
PC or laptop you are using as the SFTP server in the Server IPV4 address field.
See Defining the IP Protocol Version for Initiating Communications.
8 If the IP address family is configured to be IPv6, enter the IPv6 address of the
PC or laptop you are using as the SFTP server in the Server IPv6 address field.
See Defining the IP Protocol Version for Initiating Communications.
9 Click Apply, then Close, to save the FTP parameters and return to the Security
Log Upload page.
10 Click Download. The certificate is downloaded.
11 Click Install. The certificate is installed on the IP-20.
Figure 399: RSA Key Download & Install Page (HTTP Selected)
2 Select HTTP to download the file via HTTP/HTTPS or FTP to download the file
via SFTP.
Note: It is strongly recommended not to use HTTP to download RSA key files.
Figure 400: RSA Key Download & Install Page (FTP Selected)
3 Click FTP Parameters to display the FTP Parameters page.
5 In the Username field, enter the user name you configured in the SFTP server.
6 In the Password field, enter the password you configured in the SFTP server. If
you did not configure a password for your SFTP user, simply leave this field
blank.
7 In the Path field, enter the directory path from which you are downloading
the file. Enter the path relative to the SFTP user's home directory, not the
absolute path. If the location is the home directory, it should be left empty. If
the location is a sub-folder under the home directory, specify the folder name.
If the shared folder is "C:\", this parameter can be left empty or populated
with "//"..
8 If the IP address family is configured to be IPv4, enter the IPv4 address of the
PC or laptop you are using as the SFTP server in the Server IPv4 address field.
9 If the IP address family is configured to be IPv6, enter the IPv6 address of the
PC or laptop you are using as the SFTP server in the Server IPv6 address field.
10 Click Apply to save your settings.
11 In the RSA Key Download & Install page, click Download. The download
begins. You can view the status of the download in the Download Status field.
See Table 90.
12 Once the download has been completed, click Install to install the RSA key file.
You can view the status of the installation in the Install Status field. See
Table 90.
Note: To discontinue the download process, click Abort.
Download Status The status of any pending RSA file download. Possible values are:
• Ready – The default value, which appears when no download is in progress.
• In Progress – The download is in progress.
• Aborted – The download was aborted by user command.
If an error occurs during the download, an appropriate error message is displayed
in this field.
When the download is complete, one of the following status indications appears:
• Success – File downloaded and verified successfully.
• Failed – File download failed or verification failed.
When the system is reset, the Download Status returns to Ready.
Download Progress Displays the progress of the current download.
Install Status The status of any pending installation. Possible values are:
• Success
• Failed
5 In the Password field, enter the password you configured in the FTP server. If
you did not configure a password for your FTP user, simply leave this field
blank.
6 If the IP address family is configured to be IPv4, enter the IPv4 address of the
PC or laptop you are using as the FTP server in the Server IP address field. See
Defining the IP Protocol Version for Initiating Communications.
7 If the IP address family is configured to be IPv6, enter the IPv6 address of the
PC or laptop you are using as the FTP server in the Server IPv6 address field.
See Defining the IP Protocol Version for Initiating Communications.
8 In the Path field, enter the directory path to which you are uploading the files.
Enter the path relative to the FTP user's home directory, not the absolute
path. If the location is the home directory, it should be left empty. If the
location is a sub-folder under the home directory, specify the folder name. If
the shared folder is "C:\", this parameter can be left empty or populated with
"//".
9 In the File name field, enter the name you want to give to the exported
security log.
10 Click Apply, then Close, to save the FTP parameters and return to the Security
Log Upload page.
11 Click Upload. The upload begins.
The File transfer status field displays the status of any pending security log
upload. Possible values are:
• Ready – The default value, which appears when no file transfer is in progress.
• File-in-transfer – The upload operation is in progress.
• Success – The file has been successfully uploaded.
• Failure – The file was not successfully uploaded.
The File transfer progress field displays the progress of any current security log
upload operation.
5 In the Password field, enter the password you configured in the FTP server. If
you did not configure a password for your FTP user, simply leave this field
blank.
6 If the IP address family is configured to be IPv4, enter the IPv4 address of the
PC or laptop you are using as the FTP server in the Server IP address field. See
Defining the IP Protocol Version for Initiating Communications.
7 If the IP address family is configured to be IPv6, enter the IPv6 address of the
PC or laptop you are using as the FTP server in the Server IPv6 address field.
See Defining the IP Protocol Version for Initiating Communications.
8 In the Path field, enter the directory path to which you are uploading the files.
Enter the path relative to the FTP user's home directory, not the absolute
path. If the location is the home directory, it should be left empty. If the
location is a sub-folder under the home directory, specify the folder name. If
the shared folder is "C:\", this parameter can be left empty or populated with
"//".
9 In the File Name field, enter the name you want to give to the exported
configuration log.
Note: The directory path and fie name, together, cannot be more
than:
If the IP address family is configured to be IPv4: 236
characters
If the IP address family is configured to be IPv6: 220
characters
10 Click Apply, then Close, to save the FTP parameters and return to the
Configuration Log Upload page.
11 Click Upload. The upload begins.
The File transfer status field displays the status of any pending configuration log
upload. Possible values are:
• Ready – The default value, which appears when no file transfer is in progress.
• File-in-transfer – The upload operation is in progress.
• Success – The file has been successfully uploaded.
• Failure – The file was not successfully uploaded.
The File transfer progress field displays the progress of any current configuration
log upload operation.
Sequence Number (#) A unique sequence number assigned to the alarm by the system.
Time The date and time the alarm was triggered.
Severity The severity of the alarm. In the Current Alarms table, the
severity is indicated by a symbol. You can display a textual
description of the severity by holding the cursor over the symbol.
Note: You can edit the severity of alarm types in the Alarm
Configuration page. See Editing Alarm Text and Severity and
Disabling Alarms and Events.
Description A system-defined description of the alarm.
User Text Additional text that has been added to the system-defined
description of the alarm by users.
Note: You can add user text to alarms in the Alarm
Configuration page. See Editing Alarm Text and Severity and
Disabling Alarms and Events
Origin The module that generated the alarm.
Probable Cause This field only appears in the Current Alarms - View page. One or
more possible causes of the alarm, to be used for
troubleshooting.
Corrective Actions This field only appears in the Current Alarms - View page. One or
more possible corrective actions to be taken in troubleshooting
the alarm.
Alarm ID A unique ID that identifies the alarm type.
11.4 Editing Alarm Text and Severity and Disabling Alarms and
Events
You can view a list of alarm types, edit the severity level assigned to individual
alarm types, disable alarms and events, and add additional descriptive text to
individual alarm types.
This section includes:
• Displaying Alarm Information
• Viewing the Probable Cause and Corrective Actions for an Alarm Type
• Editing an Alarm Type and Disabling Alarms and Events
• Setting Alarms to their Default Values
Sequence Number (#) A unique sequence number assigned to the row by the system.
Alarm ID A unique ID that identifies the alarm type.
Severity The severity assigned to the alarm type. You can edit the severity in
the Alarm Configuration – Edit page. See Editing an Alarm Type and
Disabling Alarms and Events.
Description A system-defined description of the alarm.
Parameter Definition
Additional Text Additional text that has been added to the system-defined description
of the alarm by users. You can edit the text in the Alarm Configuration
– Edit page. See Editing an Alarm Type and Disabling Alarms and
Events.
Service Affecting Indicates whether the alarm is considered by the system to be service-
affecting (on) or not (off).
Alarm Admin Indicates whether the alarm is enabled or disabled. By default, all
alarms are enabled. See Editing an Alarm Type and Disabling Alarms
and Events.
11.4.2 Viewing the Probable Cause and Corrective Actions for an Alarm Type
Most alarm types include a system-defined probable cause and suggested
corrective actions. To view an alarm type's probable cause and corrective actions,
click + on the left side of the alarm type's row in the Alarm Configuration page.
The Probable Cause and Corrective Actions appear underneath the alarm type's
row, as shown below. If there is no +, that means no Probable Cause and
Corrective Actions are defined for the alarm type.
To change the severity of an alarm type, add additional text to the alarm type's
description, and disable and enable alarms and events:
1 Select the alarm type in the Alarm Configuration page (Figure 411).
2 Click Edit. The Alarm Configuration - Edit page opens.
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Minimum Voltage (V) The lowest voltage during the measured period.
Maximum Voltage (V) The highest voltage during the measured period.
Undervoltage Seconds The number of seconds the unit was in an undervoltage state during the
measured period.
Overvoltage Seconds The number of seconds the unit was in an overvoltage state during the
measured period.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred during
the interval.
For IP-20C, IP-20C-HP, and IP-20S units with Unit Redundancy, you
must use FTP or SFTP to upload the User Information file.
iv In the Password field, enter the password you configured in the FTP
server. If you did not configure a password for your FTP user, simply leave
this field blank.
v If the IP address family is configured to be IPv4, enter the IPv4 address of
the PC or laptop you are using as the FTP server in the Server IPv4 address
field. See Defining the IP Protocol Version for Initiating Communications.
vi If the IP address family is configured to be IPv6, enter the IPv6 address of
the PC or laptop you are using as the FTP server in the Server IPv6 address
field. See Defining the IP Protocol Version for Initiating Communications.
vii In the Path field, enter the directory path to which you are uploading the
file. Enter the path relative to the FTP user's home directory, not the
absolute path. If the location is the home directory, it should be left
empty. If the location is a sub-folder under the home directory, specify the
folder name. If the shared folder is "C:\", this parameter can be left empty
or populated with "//".
viii In the File Name field, enter the name you want to give to the exported
Unit Information file.
ix Click Apply to save your settings.
5 Click Create to create the Unit Information file. The following fields display the
status of the file creation process:
◦ File creation status – Displays the file creation status. You must wait until
the status is Success to upload the file. Possible values are:
◦ Ready – The default value, which appears when no file is being
created.
◦ Generating File – The file is being generated.
◦ Success – The file has been successfully created. You may now upload
the file.
◦ Failure – The file was not successfully created.
◦ File creation progress – Displays the progress of the current Unit
Information file creation operation.
6 Click Export. The upload begins. The following fields display the status of the
upload process:
◦ File transfer status – Displays the status of any pending Unit Information
file upload. Possible values are:
◦ Ready – The default value, which appears when no file transfer is in
progress.
◦ File-in-transfer – The upload operation is in progress.
◦ Success – The file has been successfully uploaded.
◦ Failure – The file was not successfully uploaded.
◦ If you try to export the file before it has been created, the following
error message appears: Error #3-Invalid set value. If this occurs, wait
about two minutes then click Export again.
◦ File transfer progress – Displays the progress of the current Unit
Information file upload operation.
Note: Support for MDs with the MD format Character String is planned for
future release. In this release, the software enables you to configure
such MDs, but they have no functionality.
5 In the MD Level field, select the maintenance level of the MD (0-7). The
maintenance level ensures that the CFM frames for each domain do not
interfere with each other. Where domains are nested, the encompassing
domain must have a higher level than the domain it encloses. The
maintenance level is carried in all CFM frames that relate to that domain. The
MD Level must be the same on both sides of the link.
Note: In the current release, the MD level is not relevant to the SOAM
functionality.
6 Click Apply, then Close.
The MHF (MIP) Creation field displays the type of MHF format included in the
CCMs sent in this MD (in the current release, this is MHF none and MHF default).
The Sender TLV Content field displays the type of TLVs included in the CCMs sent
in this MD (in the current release, this is only Send ID Chassis).
MD (ID, Name) Select the MD to which you are assigning the MEP.
MA/MEG short name Enter a name for the MEG (up to 44 alphanumeric characters).
MEG Level Select a MEG level (0-7). The MEG level must be the same for MEGs
on both sides of the link. Higher levels take priority over lower levels.
If MEGs are nested, the OAM flow of each MEG must be clearly
identifiable and separable from the OAM flows of the other MEGs. In
cases where the OAM flows are not distinguishable by the Ethernet
layer encapsulation itself, the MEG level in the OAM frame
distinguishes between the OAM flows of nested MEGs.
Eight MEG levels are available to accommodate different network
deployment scenarios. When customer, provider, and operator data
path flows are not distinguishable based on means of the Ethernet
layer encapsulations, the eight MEG levels can be shared among them
to distinguish between OAM frames belonging to nested MEGs of
customers, providers and operators. The default MEG level
assignment among customer, provider, and operator roles is:
• The customer role is assigned MEG levels 6 and 7.
Parameter Definition
• The provider role is assigned MEG levels 3 through 5.
• The operator role is assigned MEG levels: 0 through 2.
The default MEG level assignment can be changed via a mutual
agreement among customer, provider, and/or operator roles.
The number of MEG levels used depends on the number of nested
MEs for which the OAM flows are not distinguishable based on the
Ethernet layer encapsulation.
CCM Interval The interval at which CCM messages are sent within the MEG. Options
are:
• 1 second (default)
• 10 seconds
• 1 minute
• 10 minutes
It takes a MEP 3.5 times the CCM interval to determine a change in
the status of its peer MEP. For example, if the CCM interval is 1
second, a MEP will detect failure of the peer 3.5 seconds after it
receives the first CCM failure message. If the CCM interval is 10
minutes, the MEP will detect failure of the peer 35 minutes after it
receives the first CCM failure message.
Service ID Select an Ethernet service to which the MEG belongs. You must define
the service before you configure the MEG.
MIP Creation Determines whether MIPs are created on the MEG. Options are:
• MHF none – No MIPs are created.
• MHF default – MIPs are created automatically on any service
point in the MEG’s Ethernet service.
• MHF explicit – MIPs are created on the service points of the
MEG when a lower-level MEP exists on the service point. This
option is usually used when the operator’s domain is
encompassed by another domain.
• MHF defer – No MIPs are created. Not used in the current
release.
MA/MEG ID Automatically generated by the system. You can change this value.
MA/MEG Name Format Reserved for future use. In the current release, this is Char String only.
Tx Sender ID TLV content Sender ID TLV is transmitted.
Port Status TLV TX Reserved for future use. No Port Status TLV is transmitted in the CCM
frame.
Interface Status TLV TX An Interface Status TLV is transmitted in the CCM frame, indicating
the operational status of the interface on which the transmitting MEP
is configured (Up or Down).
Parameter Definition
MEP List Lists all local and remote MEPs that have been defined for the MEG.
MD (ID, Name) The MD ID and name are automatically generated by the system.
MA/MEG (ID, Name) The MA/MEG ID and name are automatically generated by the
system.
MEP ID The MEP ID.
Interface Location The interface on which the service point associated with the MEP is
located.
SP ID The service point ID.
MEP Direction Up or Down.
MEP Fault Notification Indicates the status of the defect SOAM state machine. Possible
State values are:
• Fng Reset – Initial state.
• Fng Defect – Transient state when a defect is detected.
• Fng Defect Reported – The defect state is steady (stable).
• Fng Defect Clearing – Transient state when a defect is in the
process of being cleared.
• Fng Defect Cleared – The defect has been cleared (state =
transient).
Connectivity Status Indicates whether a MEP can exchange PDU (CCM, Loopback, LTR)
with its remote MEP. A MEP with some defect or an inactive MEP
cannot exchange PDUs.
Possible values are:
• inactive – At least one of the remote MEPs is in rMEPFailed
status (not discovered).
active – All remote MEPs are discovered correctly and have an
rMEPOk status.
MEP Active Indicates whether the MEP is enabled (True) or disabled (False).
MEP CCM TX Enable Indicates whether the MEP is sending CCMs (True/False).
CCM and LTM Priority The p-bit included in CCMs and/or LTM frames sent by this MEP (0 to
7).
MEP Defects Indicates if a defect has been detected by the MEP level.
RMEP List Once you have configured at least one local MEP, all other MEPs that
you have added but not configured as local MEPs are displayed here
and are considered to be remote MEPs.
Parameter Definition
RMEP Last rx CCM Chassis Displays the format of the remote chassis (always the MAC address).
ID Format
RMEP Last rx CCM Chassis Displays the MAC address of the remote chassis.
ID
Section III:
CLI Configuration
Password:
IP20C
root>
Some of these are complete commands, such as quit and exit. Others constitute
the first word or phrase for a series of commands, such as ethernet and radio.
Similarly, if you enter the word “platform” and press <TAB> twice, the first word
or phrase of every command that follows platform is displayed:
root> platform
activation-key configuration if-manager management
security software status
sync unit-info unit-info-file
root> platform
The optional count parameter determines how many packets are sent. This
parameter can be an integer from 1 to 1000. The default value is 4.
The optional packet-size parameter determines the size of each packet, in
bytes. This parameter can be an integer from 64 to 1480. The default value is 64.
The ping command is available from all views (e.g., root, interface views, group
views).
The system will prompt you to enter your existing password. The system will then
prompt you to enter the new password.
If Enforce Password Strength is activated, the password must meet the following
criteria:
• Password length must be at least eight characters.
• Password must include characters of at least three of the following character
types: lower case letters, upper case letters, digits, and special characters. For
purposes of meeting this requirement, upper case letters at the beginning of
the password and digits at the end of the password are not counted.
• The last five passwords you used cannot be reused.
See Configuring the Password Security Parameters (CLI).
Note: When you enable or disable Mate Management Access, the unit is
reset.
To disable Mate Management Access, enter the following command:
root> platform management mate-access admin disable
ipv4-address Dotted decimal format. Any valid IPv4 address. The IP address for the unit.
subnet Dotted decimal format. Any valid subnet mask. The subnet mask for the
unit.
gateway Dotted decimal format. Any valid IPv4 address. The default gateway for
the unit (optional).
name Text String. Enter a name (optional).
To set the unit's IP address in IPv6 format, enter the following command in root
view to configure the IP address, subnet mask, and default gateway:
root> platform management ip set ipv6-address <ipv6-address>
prefix-length <prefix-length> gateway <gateway>
ipv6-address Eight groups of four Any valid IPv6 The IP address for the
hexadecimal digits address. unit.
separated by colons.
prefix-length Number. 1-128 The prefix-length for
the unit.
gateway Eight groups of four Any valid IPv6 The default gateway for
hexadecimal digits address. the unit (optional).
separated by colons.
If the activation key is not legal (e.g., a typing mistake or an invalid serial number),
an Activation Key Loading Failure event is sent to the Event Log. When a legal
activation key is entered, an Activation Key Loaded Successfully event is sent to
the Event Log.
To set the default activation key, enter the following command in root view:
root> platform activation-key set key string “Default
Activation Key”
Note: Make sure to enter the command using the exact syntax above,
including the spaces and quotation marks, or an error will be returned.
To display the current status of demo mode, enter the following command in root
view:
root> platform activation-key show demo status
To display a list of the radio capacities that your current activation key supports
and their usage information, enter the following command in root view:
root> platform activation-key show usage radio
To set the local time offset relative to UTC, enter the following command in root
view:
root> platform management time-services utc set offset hours-
offset <hours-offset> minutes-offset <minutes-offset>
To display the local time configurations, enter the following command in root
view:
root> platform management time-services show status
The following command sets the GMT date and time to January 30, 2014, 3:07 pm
and 58 seconds:
root> platform management time-services utc set date-and-time
30-01-2014,15:07:58
The following command sets the GMT offset to 13 hours and 32 minutes:
root> platform management time-services utc set offset hours-
offset 13 minutes-offset 32
To display the status of all the interfaces in the unit, enter the following command
in root view:
root> platform if-manager show interfaces
If at some point you stop using the management port for traffic and use it instead
exclusively for management, enter the following command in port view to disable
the LOC alarm:
eth type mng [1/1]> loc-alarm-supported set no
To display the current LOC alarm status for the management port, enter the
following command in port view:
eth type mng [1/1]> loc-alarm-supported show
The following command displays available symmetrical (normal) scripts with ACM
support for radio carrier 2 in a multi-carrier unit:
radio[2/2]>mrmc script show script-type normal acm-support yes
The following command displays available symmetrical (normal) scripts for radio
carrier 1:
radio[2/1]>mrmc script show script-type normal acm-support yes
To assign a script without ACM enabled, enter the following command in radio
view:
radio[x/x]> mrmc set acm-support script-id <script-id>
modulation fixed profile <profile>
To display the current MRMC script configuration, enter the following command
in radio view:
radio[x/x]>mrmc show script-configuration
The following command assigns MRMC script ID 1503, with ACM enabled, a
minimum profile of 3, and a maximum profile of 9, to radio carrier 1 in an IP-20C
or IP-20S unit:
radio[2/1]>mrmc set acm-support script-id 13 modulation
adaptive max-profile 9 min-profile 3
The following command assigns MRMC script ID 1502, with ACM disabled and a
profile of 5, to radio carrier 2 in an IP-20C or IP-20C-HP unit:
radio[2/2]>mrmc set acm-support script-id 13 modulation fixed
profile 5
The following command assigns MRMC script ID 4702, with ACM disabled and a
profile of 5, to the radio carrier in an IP-20E or IP-20V unit:
radio[2/1]>mrmc set acm-support script-id 4702 modulation fixed
profile 5
The following command assigns MRMC script ID 4701, with ACM enabled, and
both a minimum and a maximum profile of 5, to the radio carrier in an IP-20E unit.
This is the functional equivalent of assigning a fixed profile.
radio[2/1]>mrmc set acm-support script-id 4701 modulation max-
profile 5 min-profile 5
slot Number 2
port Number Radio Carrier 1: 1 The specific radio carrier
Radio Carrier 2 (IP-20C you want to access.
and IP-20C-HP only): 2
When the timer expires, the radio is automatically unmuted. A timed mute
provides a fail-safe mechanism for maintenance operations that eliminates the
possibility of accidently leaving the radio muted after the maintenance has been
completed. By default, the timer is 10 minutes.
Note: In contrast to an ordinary mute, a timed mute is not persistent. This
means that if the unit is reset, the radio is not muted when the unit
comes back online, even if the timer had not expired. Also, in unit and
radio protection configurations, a timed mute is not copied to the
mate unit or radio, and no mismatch alarm is raised if a timed mute is
configured on only one radio in the protection pair.
To display the mute status of a radio, enter the following command in radio view:
radio[x/x]>rf mute show status
The following command configures a timed mute on radio carrier 1. This mute will
automatically expire in 30 minutes.
radio[2/1]> rf mute set admin on-with-timer timeout-value 30
Notes: If the carrier belongs to a 4x4 MIMO group, an ASD group, an AFR
group, or an XPIC group, you must disable the group before changing
the TX or RX frequency.
The following command sets the TX frequency of the radio in an IP-20E unit to
71000000 KHz, and sets the RX frequency of the remote unit to the same value.
radio[2/1]> rf set tx-frequency 71000000 local-remote enable
The following command sets the TX frequency of the radio in an IP-20E unit to
71000000 KHz, but does not set the RX frequency of the remote unit.
radio[2/1]> rf set rx-frequency 71000000 local-remote disable
To display the maximum transmit (TX) level of a radio, enter the following
command in radio view:
radio[x/x]>rf show max-tx-level
To disable Adaptive TX Power for a radio, enter the following command in radio
view:
radio[x/x]>rf adaptive-power admin disable
To disable the RSL threshold alarm, enter the following command in radio view:
radio[x/x]> rf rsl-degradation set admin disable
To set the threshold of the RSL threshold alarm, enter the following command in
radio view:
radio[x/x]> rf rsl-degradation set threshold <-99-0>
The following commands enable the RSL threshold alarm for radio carrier 1 and
set the threshold to -55 dBm.
root> radio slot 2 port 1
radio [2/1]>rf rsl-degradation set admin enable
radio [2/1]>rf rsl-degradation set threshold -55
radio [2/1]>rf rsl-degradation show status
radio [2/1]>
The alarm is cleared when the RSL goes above the configured threshold. The
alarm is masked if the radio interface is disabled, the radio does not exist, or a
communication-failure alarm (Alarm ID #1703) is raised.
To display the protection pre-shared key, enter the following command in root
view:
root> platform management protection show pre-shared-key
To set the Multi-Carrier ABC Minimum Bandwidth Override threshold (in Mbps),
enter the following command in root view:
root> platform if-manager set group-type abc group-number <1-4>
minimum-bw-threshold <0-20000>
To view the status and the threshold use the following command:
root> platform if-manager show interfaces
Note: The channel-id parameter must be set to 1 for the radio interface
and 2 for the Ethernet interface.
v In Multi-Carrier ABC Group view, use the following command to set the
maximum traffic that the IP-20E will pass to the paired unit
◦ When using Fixed ACM mode, set this parameter to the actual rate
you want the paired unit to broadcast.
◦ When using Adaptive ACM mode, set this parameter to the maximum
of the paired unit’s capacity.
The default value is 1000 Mbps.
multi-carrier-abc enhanced-group-id [1] slot [1]>abc-set-eth-
max-bandwidth slot 1 port 2 max-bandwidth <1-1000>
For example, the following command sets the maximum traffic to 900
Mbps:
multi-carrier-abc enhanced-group-id [1] slot [1]>abc-set-eth-
max-bandwidth slot 1 port 2 max-bandwidth 900
Note: The Maximum Bandwidth represents the L1 capacity of the radio link
connected to the Ethernet member. The actual bandwidth that will be
available for traffic is less due to overhead.
After removing the members, enter the following command in root view:
root> multi-carrier-abc delete group group_id 1 slot 1 type Enhanced
LACP cannot be used with Enhanced LAG Distribution or with the LAG
Group Shutdown in Case of Degradation Event feature.
To disable LACP on a LAG group, go to interface view for the LAG and enter the
following command:
eth group [lagx]> lacp admin set disable
To display whether or not LACP is enabled on a LAG group, go to interface view for
the LAG and enter the following command:
eth group [lagx]>lacp admin show
To enter interface view for a LAG, enter the following command in root view:
root> ethernet interfaces group <lagid>
To display details about a LAG, go to interface view for the LAG and enter the
following command:
eth group [lagx]> summary show
To display a LAG's operational state, go to interface view for the LAG and enter
the following command:
eth group [lagx]> operational state show
To display a list of interfaces that belong to a LAG, go to interface view for the LAG
and enter the following command:
eth group [lagx]> port static-lag show members
To remove a member radio interface from a LAG, go to interface view for the LAG
and enter the following command:
eth group [lagx]> port static-lag remove member interface radio
slot <slot> port <port>
To delete a LAG, go to interface view for the LAG and simply remove all the
members, as described above.
Table 113: LAG Group CLI Parameters
Parameter Input Type Permitted Values Description
The following commands create a LAG with the ID lag2. The LAG includes the
Ethernet interfaces 1 and 2 and radio interface 1:
root> platform if-manager set interface-type ethernet slot 1
port 1 admin down
root>
The following command displays the name of the LAG to which Ethernet port 1
belongs:
eth type eth [1/1]> static-lag show name
Static-lag members
-------------------
Eth#[1/1]
Eth#[1/2]
Radio#[2/1]
14.4.6 Enabling and Disabling the LAG Group Shutdown in Case of Degradation
Event Option (CLI)
Note: LAG Group Shutdown in Case of Degradation Event cannot be used
with LACP.
A LAG group can be configured to be automatically closed in the event of LAG
degradation. This option is used if you want traffic from the switch to be re-routed
during such time as the link is providing less than a certain capacity.
By default, the LAG group shutdown in case of degradation event option is
disabled. When enabled, the LAG is automatically closed in the event that any one
or more ports in the LAG fail. When all ports in the LAG are again operational, the
LAG is automatically re-opened.
Note: Failure of a port in the LAG also triggers a lag-degraded alarm, Alarm
ID 100.
To enable the LAG group shutdown in case of degradation event option, go to
interface view for the LAG and enter the following command:
eth group [lagx]> static-lag set lag-degrade-admin admin enable
To display the current LAG group shutdown in case of degradation event option
setting, go to interface view for the LAG and enter the following command:
eth group [lagx]> static-lag show lag-degrade-admin
The following commands enable the LAG group shutdown in case of degradation
event option for LAG group 1:
root> ethernet interfaces group lag1
eth group [lag1]>static-lag set lag-degrade-admin admin enable
eth group [lag1]>
The following commands set the LAG distribution scheme for LAG group 1 as
distribution pattern 3.
root> ethernet interfaces group lag1
eth group [lag1]>static-lag set df-pattern df 3
Admin Key The current administrative value of the key for the Aggregator.
System ID The MAC address value used as a unique identifier for the system that
contains this Aggregator.
System Priority The priority value associated with the Actor’s System ID.
Aggregate or Individual Indicates whether the Aggregator represents an aggregate or an
individual link.
Actor Oper Key The current operational value of the Key for the Aggregator.
Agg MAC Address The individual MAC address assigned to the Aggregator.
Partner System ID The MAC address value consisting of the unique identifier for the current
protocol Partner of this Aggregator.
Partner System Priority The priority value associated with the Partner’s System ID.
Partner Oper Key The current operational value of the Key for the Aggregator’s current
Protocol partner.
Collector Max Delay The maximum delay, in tens of microseconds.
System Priority The priority value associated with the Actor’s System ID.
Admin Key The current administrative value of the Key for the Aggregation Port.
System ID The MAC Address value that defines the value of the System ID for the
system that contains this Aggregation Port.
Port Priority The priority value assigned to this Aggregation Port.
Parameter Definition
Actor State The current operational values of the Actor’s state as transmitted by the
Actor via LACPDUs.
Partner State The current values of Actor State in the most recently received LACPDU
transmitted by the protocol Partner.
Last RX Time The value of a TimeSinceSystemReset (F.2.1) when the last LACPDU was
received by this Aggregation port.
RX State The state of the receive state machine for the Aggregation port. Possible
values are:
• Current – An LACPDU was received before expiration of the most
recent timeout period.
• Expired – No LACPDU was received before expiration of the most
recent timeout period.
• Defaulted – No LACPDU was received during the two most recent
timeout periods.
Mux State The state of the Mux state machine for the Aggregation port. Possible
values are Collecting, Distributing, Attached, and Detached.
Mux Reason A text string indicating the reason for the most reason change in the state
of the Mux machine.
Partner Oper Port The operational port number assigned to this Aggregation port by the
Aggregation port’s port Partner.
Partner Oper System The operational value of priority associated with the Partner’s System ID.
Priority
Partner Oper Key The current operational value of the Key for the protocol Partner.
Partner Oper System ID The MAC Address value representing the current value of the
Aggregation Port’s protocol Partner’s System ID.
Partner Oper Port The Priority value assigned to this Aggregation port by the Partner.
Priority
radio-groups>
To disable LACP mode, enter the following command in Ethernet interface view:
eth type eth [1/x]>interface-mode-set interface-mode NONE
iii Enter the following command in root view to copy the configuration of the
Active unit to the Standby unit:
root> platform management protection copy-to-mate
• Clearing the Radio and RMON counters. Refer to the description of modem
clear counters in Displaying General Modem Status and Defective Block
PMs (CLI).
• Setting the activation key configuration. Refer to Configuring the Activation
Key (CLI) and Activating Demo Mode (CLI).
• Defining user accounts. Refer to Configuring User Accounts (CLI).
• Setting synchronization settings. Refer to Configuring SyncE Regenerator (CLI).
To configure these settings in the standby unit, first enter the mate/root context,
as described in Performing CLI operations on the Standby unit (CLI), then run the
relevant commands, and then switch back to the active unit.
mate/root>
2 Enter the specific CLI command you want to run in mate/root context.
3 To switch back to the active unit, enter the following command:
mate/root> switch-back
root>
To manually switchover to the Standby unit enter the following in root view:
root> platform management protection set manual-switch
the link until the other unit is restored to service and Space Diversity operation
resumes.
2+2 HSB Space Diversity utilizes two IP-20C units operating in dual core mode. In
each IP-20C unit, both radio carriers are connected to a single antenna. One
optical GbE port on each IP-20C is connected to an optical splitter. Traffic must be
routed to an optical GbE port on each IP-20C unit.
In effect, a 2+2 HSB configuration is a protected 2+0 Space Diversity configuration.
Each IP-20C monitors both of its cores. If the active IP-20C detects a radio failure
in either of its cores, it initiates a switchover to the standby IP-20C.
Notes: Only one MIMO or Space Diversity group can be created per IP-20C or
IP-20C-HP unit. All MRMC scripts that support MIMO also support
Space Diversity.
For 4x4 MIMO links, CeraOS 10.5 is not interoperable with earlier
CeraOS versions. If you are upgrading from an earlier version with an
existing 4x4 MIMO link, you must follow the procedure in Upgrading a
4x4 MIMO Link from an Earlier Version to CeraOS 10.5 or Higher (CLI).
14.8.2 Upgrading a 4x4 MIMO Link from an Earlier Version to CeraOS 10.5 or
Higher (CLI)
For 4x4 MIMO links, CeraOS versions 10.5 and higher are not interoperable with
earlier CeraOS versions. When upgrading from a CeraOS version prior to CeraOS
10.5 to CeraOS 10.5 or higher, if there is an existing 4x4 MIMO link, you must
perform either of the following procedures to properly upgrade the link. Option 1
is the preferred option.
Note: You must download the new CeraOS software package to all four units
before beginning the upgrade process. All four units in the 4x4 MIMO
link must use the same CeraOS build and version.
Upgrade Procedure – Option 1
1. Upgrade the remote Slave unit.
2. Upgrade the remote Master unit.
3. Upgrade the local Slave unit.
4. Upgrade the local Master unit.
Upgrade Procedure – Option 2
1. Upgrade the remote Master unit.
2. Upgrade the local Slave unit.
3. Upgrade the local Master unit.
4. Wait for the link to be restored between the Master units.
5. Mute both radio carriers on the remote Slave unit.
6. Upgrade the remote Slave unit.
7. Unmute both radio carriers on the remote Slave unit.
mimo-4X4-group[x]:
iii In group view, enter the following commands to add the unit’s two
carriers to the group:
mimo-4X4-group[x]> amcc attach slot 2 port 1 role
<mimo-master|mimo-slave>
mimo-4X4-group[x]> amcc attach slot 2 port 2 role
<mimo-master|mimo-slave>
iv In group view, enter the following command to enable the group:
mimo-4X4-group[x]> set admin enable
Note: To display details about the group, enter the following command in
root view:
Unit 1
root> amcc create group group_id 1 group_type mimo_4x4
group_sub_type external
mimo-4X4-group[x]:
2 In group view, enter the following commands to remove the unit’s two
carriers from the group:
mimo-4X4-group[x]> amcc detach slot 2 port 1
mimo-4X4-group[x]> amcc detach slot 2 port 2
3 In group view, enter the following command to disable the group:
To display details about the group at Site 1 enter the following command in root
view:
root>amcc show group_id 1 group_type dual-asd
To display details about the group at Site 2 enter the following command in root
view:
root>amcc show group_id 1 group_type single-asd
dual-asd-group[1]>
Site 1, Unit 2
root>amcc create group group_id 1 group_type dual-asd group_sub_type
asd-2+0
group_id 1, group_type dual-asd created
dual-asd-group[1]>
Site 2 (Master)
root>amcc create group group_id 1 group_type single-asd group_sub_type
asd-2+0
group_id 1, group_type single-asd created
single-asd-group[1]>
For each member of the group, the command displays the member’s role (master
or slave) and state:
• Idle – All units are operational.
• Master Only – The Slave unit is not operational.
• ASD Configuration not supported – The link has been misconfigured. Make
sure that each radio carrier is configured with the same radio parameters and
MRMC scripts and parameters.
For master units only, the command also displays the status of the ASD group’s
received radio signal:
• Combined – Only relevant for the Master unit at the dual-unit side of the link.
ASD is functioning to produce a combined radio signal.
• Main Only – Only relevant for Master units. Only the main path signal is being
received.
• Diversity Only – Only relevant for Slave units and the Master unit at the
single-unit side of the link. Only the diversity path is providing a usable signal.
• N/A – No adequate signal is being received, either because of an LOF
condition or misconfiguration of the link.
For example:
Dual-asd-group[1]>show members
slot 2 port 1 role master state Idle Combined Combined
slot 2 port 2 role master state Idle Combined Combined
You can also display the status of the ASD group’s received radio signal, but you
must do so via the Web EMS. See Viewing ASD Status.
The following sequence of commands disables the ASD group at one of the units
at Site 1:
root>amcc group group_id 1 group_type dual-asd
dual-asd-group[1]>
dual-asd-group[1]>
dual-asd-group[1]>exit
root>
root>
Once AFR has been configured on the Hub site and both Tail sites, the
configuration is complete.
To display the current AFR configuration, enter the following command in root
view:
root> amcc show
Once you have performed this procedure for the Hub site and both Tail sites, you
can reconfigure the links according to the new network plan.
The following sequence of commands disables AFR at the Hub site:
root> amcc group group_id 1
group[1]> amcc set disable
group[1]> amcc detach slot 2 port 1
slot 2 port 1 detached from group_id 1
group[1]> amcc detach slot 2 port 2
slot 2 port 2 detached from group_id 1
group[1]> exit
root> amcc delete group group_id 1
group_id 1 deleted
To show the IP protocol version the unit will use when initiating communications,
enter the following command in root view:
root> platform management ip show ip-address-family
To display the remote radio’s IP Address, enter the following command in radio
view:
radio[x/x]>remote-unit show ip-address
To set the remote radio’s subnet mask, enter the following command in radio
view:
radio[x/x]>remote-unit set subnet-mask IP <subnet-mask>
To display the remote radio’s subnet mask, enter the following command in radio
view:
radio[x/x]>remote-unit show subnet-mask
To set the remote radio’s default gateway, enter the following command in radio
view:
radio[x/x]>remote-unit set default-gateway IP <ipv4-address>
To display the remote radio’s default gateway, enter the following command in
radio view:
radio[x/x]>remote-unit show default-gateway
ipv4-address Dotted decimal Any valid IPv4 Sets the default gateway
format. address. or IP address of the
remote radio.
subnet-mask Dotted decimal Any valid subnet Sets the subnet mask of
format. mask. the remote radio.
The following command sets the default gateway of the remote radio as
192.168.1.20:
radio[2/1]>remote-unit set default-gateway IP 192.168.1.20
The following commands set the IP address of the remote radio as 192.168.1.1,
with a subnet mask of 255.255.255.255.
radio[2/1]>remote-unit set ip-address 192.168.1.1
To display the remote radio’s IP Address, enter the following command in radio
view:
radio[x/x]>remote-unit show ip-address-ipv6
To set the remote radio’s prefix length, enter the following command in radio
view:
radio[x/x]>remote-unit set prefix-length <prefix-length >
To display the remote radio’s prefix-length, enter the following command in radio
view:
radio[x/x]>remote-unit show prefix-length
To set the remote radio’s default gateway, enter the following command in radio
view:
radio[x/x]>remote-unit set default-gateway-ipv6 IPv6 <ipv6-
address>
To display the remote radio’s default gateway, enter the following command in
radio view:
radio[x/x]>remote-unit show default-gateway-ipv6
ipv6-address Eight groups of four Any valid IPv6 Sets the default
hexadecimal digits address. gateway or IP address
separated by colons. of the remote radio.
prefix-length Number 1-128 Sets the prefix length
of the remote radio.
should be different for
each RADIUS client
The following command sets the default gateway of the remote radio as
FE80:0000:0000:0000:0202:B3FF:FE1E:8329:
radio[2/1]>remote-unit set default-gateway-ipv6 IPv6
FE80:0000:0000:0000:0202:B3FF:FE1E:8329
To specify the SNMP version, enter the following command in root view:
root> platform security protocols-control snmp version set
<version>
To specify the SNMP read and write communities, enter the following command
in root view:
root> platform security protocols-control snmpv1v2 set read-
community <read-community> write-community <write-community>
The following commands enable SNMP v2 on the unit, and set the read
community to “public” and the write community to “private”:
root> platform security protocols-control snmp admin set enable
To display all SNMP v3 users and their authentication parameters, enter the
following command in root view:
root> platform security protocols-control snmp v3-
authentication show
The following commands enable SNMP v2 on the unit, and set the read
community to “public” and the write community to “private”:
root> platform security protocols-control snmp admin set enable
The following commands enable SNMP v3 on the unit, block SNMP v1 and SNMP
v2 access, and define an SNMPv3 user with User Name=Geno,
Password=abcdefgh, security mode authPriv, encryption mode DES,
authentication algorithm SHA, and read-write access:
root> platform security protocols-control snmp admin set enable
To display all SNMP v3 users and their authentication parameters, enter the
following command in root view:
root> platform security protocols-control snmp v3-
authentication show
To display the current MIB version used in the system, enter the following
command in root view:
root> platform security protocols-control snmp show-mib-version
To display details about the current MIB version used in the system, enter the
following command in root view:
root> platform security protocols-control snmp show-mib-
version-table
To display the SNMP read and write communities, enter the following command
in root view:
root> platform security protocols-control snmpv1v2 show
To modify the settings of an SNMP trap manger, enter the following command in
root view:
root> platform security protocols-control snmp trap-manager set
manager-id <manager-id> manager-admin <manager-admin> manager-
ipv4 <manager-ipv4> manager-ipv6<manager-ipv6> manager-port
<manager-port> manager-community <manager-community> manager-
v3-user <manager-v3-user> manager-description <manager-
description>
To enable an SNMP trap manger without modifying its parameters, enter the
following command in root view:
root> platform security protocols-control snmp trap-manager
admin manager-id <manager-id> manager-admin <manager-admin>
To specify the number of minutes between heartbeat traps, enter the following
command in root view:
root> platform security protocols-control snmp trap-manager
heartbeat manager-id <manager-id> manager-heartbeat <manager-
heartbeat>
manager-ipv4 Dotted decimal Any valid IPv4 If the IP protocol selected in platform
format. address. management ip set ip-address-
family is IPv4, enter the destination
IPv4 address. Traps will be sent to
this IP address.
manager-ipv6 Eight groups of Any valid IPv6 If the IP protocol selected in platform
four hexadecimal address. management ip set ip-address-
digits separated family is IPv6, enter the destination
by colons. IPv6 address. Traps will be sent to
this IP address.
manager-port Number. 70 – 65535 Enter the number of the port
through which traps will be sent.
manager- Text String. Any valid SNMP Enter the community string for the
community read community. SNMP read community.
manager-v3- Text String. The name of a V3 If the SNMP Trap version selected in
user user defined in platform security protocols-
the system. control snmp version set is V3, enter
the name of a V3 user defined in the
system.
Note: Make sure that an identical V3
user is also defined on the
manager's side
To display the ports that are currently configured for FTP and SFTP, enter the
following command in root view:
root> platform management file-transfer port-show
These ports are configured globally, rather than per specific operation.
The following sequence of commands displays the current (default) FTP and SFTP
port settings, changes the FTP port to 125 and the SFTP port to 126, and shows
the new FTP and SFTP port settings.
root>platform management file-transfer port-show
protocol number
=====================================
ftp 21
sftp 22
protocol number
=====================================
ftp 125
sftp 126
root>
server-ipv4 Dotted decimal format. Any valid IPv4 The IPv4 address of the PC or
address. laptop you are using as the
FTP server.
server-ipv6 Eight groups of four Any valid IPv6 The IPv6 address of the PC or
hexadecimal digits address. laptop you are using as the
separated by colons. FTP server.
directory Text String. The directory path from
which you are downloading
the files. Enter the path
relative to the FTP user's
home directory, not the
absolute path. If the location
is the home directory, it
should be left empty. If the
location is a sub-folder under
the home directory, specify
the folder name. If the shared
folder is "C:\", this parameter
can be left empty or
populated with "//".
server-username Text String. The user name you
configured in the FTP server.
server-password Text String. The password you configured
in the FTP server. If you did
not configure a password for
your FTP user, simply omit
this parameter.
Enter Yes at the prompt. When the prompt appears again, enter the following
command to check the download status:
root> platform software download status show
If the software version on the FTP or SFTP server has already been downloaded to
the unit, the following message appears:
DOWNLOAD VERSION status: all components exist, process
percentage: 0
If you wish to delay the start of installation, enter instead the following command.
The time you enter in HH:MM format is the amount of time to delay until the start
of the installation process:
root> platform software install version timer-countdown <hh:mm>
Important Notes:
• When you back up the current configuration, the backup configuration file is
saved to the selected restore point, and overwrites whichever file was
previously held in that restore point.
• When you restore a configuration, the configuration file in the selected
restore point is the file that is restored.
To set the file transfer protocol you want to use (FTP or SFTP), enter the following
command:
root>platform configuration channel set protocol <ftp|sftp>
To display the FTP channel parameters for importing and exporting configuration
files, enter one of the following commands in root view:
root> platform configuration channel server show
server-ipv4 Dotted decimal Any valid IPv4 The IPv4 address of the PC or
format. address. laptop you are using as the FTP
server.
server-ipv6 Eight groups of four Any valid IPv6 The IPv6 address of the PC or
hexadecimal digits address. laptop you are using as the FTP
separated by colons. server.
directory Text String. The location of the file you are
downloading or uploading. If the
location is the root shared folder,
The following command configures the FTP channel for configuration file import
and export to IP address 192.168.1.99, in the directory “current”, with file name
“version_8_backup.zip”, user name “anonymous”, and password “12345.”
root> platform configuration channel server set server-ip
192.168.1.99 directory \current filename version_8_backup.zip
username anonymous password 12345
5 Save and close the cli_script.txt file, and add it back into
the Configuration_files.zip file.
6 Import the updated Configuration_files.zip file back into the unit.
See Importing and Restoring a Configuration File (CLI).
7 Restore the imported configuration file. See Importing and Restoring a
Configuration File (CLI). The unit is automatically reset. During initialization,
the CLI script is executed, line by line.
Note: If any specific command in the CLI script requires reset, the unit is
reset when that command is executed. During initialization following
the reset, execution of the CLI script continues from the following
command.
To define a location for the unit, enter the following command in root view:
root> platform management system-location set name <name>
To define a contact person for questions pertaining to the unit, enter the
following command in root view:
root> platform management system-contact set name <name>
To define the unit's latitude coordinates, enter the following command in root
view:
root> platform management system-latitude set <latitude>
To define the unit's longitude coordinates, enter the following command in root
view:
root> platform management system-longitude set <longitude>
To define the type of measurement unit you want the system to use, enter the
following command in root view:
root> platform management set unit_measure_format
<unit_measure_format>
To display the type of measurement unit used by the system, enter the following
command in root view:
root> platform management show unit_measure_format
To display the current configuration of all the defined NTP servers, enter the
following command in root view:
root> platform management ntp show status
To display the current configuration and status of all the defined NTP servers,
including details that can be used for debugging, enter the following command in
root view:
root> platform management ntp show status all
The following commands configure NTP server 3, enable the server using NTP v4,
and set the IP address of the NTP server as 62.90.139.210.
root> platform management ntp set admin index 3 admin enable
For example:
root> platform management inventory show info
System information:
card-name : IP-20
Subtype : 350
root>
For example:
Parameter Description
Laser Wavelength (nm) Display’s the SFP module’s laser wavelength. For CSFP modules, two
wavelengths are displayed. This parameters is not relevant for copper SFPs.
Link Length SM Fiber (km) The maximum length of the cable (in km) for single mode fiber cables.
Link Length OM1 Fiber (m) The maximum length of the cable (in meters) for OM1 multi-mode fiber
cables.
Link Length OM2 Fiber (m) The maximum length of the cable (in meters) for OM2 multi-mode fiber
cables.
Link Length OM3 Fiber (m) The maximum length of the cable (in meters) for OM3 multi-mode fiber
cables.
Optical Diagnostics Supported Displays whether the SFP module supports DDM monitoring. For modules
that do not support DDM monitoring, the parameters described in Table
130 are not available.
For example:
For example:
To display the mute status of the remote radio, enter the following command in
radio view:
radio[x/x]>remote-unit mute show status
To display the transmit (TX) level of the remote radio, enter the following
command in radio view:
radio[x/x]>remote-unit show tx-level
The following command sets the TX level of the remote radio to 10 dBm:
radio[2/1]>remote-unit set tx-level 10
To display the RX reference level for ATPC on the remote radio, enter the
following command in radio view:
radio[x/x]>remote-unit atpc show ref-level
The following command sets the ATPC RX reference level of the remote radio to -
55:
radio[2/1]>remote-unit atpc set ref-level -55
To display whether or not ATPC is enabled, enter the following command in radio
view:
radio[x/x]>atpc show admin
To set the RX reference level for ATPC, enter the following command in radio view
radio[x/x]>atpc set rx-level atpc_ref_rx_level <rx-level>
To display the RX reference level for ATPC, enter the following command in radio
view:
radio[x/x]>atpc show rx-level
To set an ATPC override timer, enter the following command in radio view:
radio[x/x]>atpc set override timeout <timeout>
To display whether or not ATPC override is enabled, enter the following command
in radio view:
radio[x/x]>atpc override show admin
To display the ATPC override timeout, enter the following command in radio view:
radio[x/x]>atpc show override timeout
To set the TX power to be used when the unit is in an ATPC override state, enter
the following command in radio view:
radio[x/x]>atpc set override-tx-level <override-tx-level>
To display the ATPC override TX power, enter the following command in radio
view:
radio[x/x]>atpc show override tx-level
To display the current ATPC override state, enter the following command in radio
view:
radio[x/x]>atpc show override
The following commands enable ATPC mode and ATPC override for radio carrier 1,
with an RSL reference level of -55, an ATPC override timeout of 15 minutes, and
an override TX level of 18 dBm:
Note: In this release, if two radio carriers in an IP-20C or IP-20C-HP unit are
activated, the Header De-Duplication configuration for radio carrier 1
are applied to both carriers. You must enter radio view for radio
interface 1.
To clear Ethernet port counters, including both Frame Cut-Through and Header
De-Duplication counters, enter the following command in radio view:
radio[x/x]>clear-ethernet-port-counters
To display the number of frames and bytes that have been transmitted via Frame
Cut-Through, enter the following command in radio view:
radio[2/1]> cut-through show-counters
Note: The Crypto Validation State field indicates whether the interface is
functioning properly, with AES-256 encryption. In order for this field to
display Valid, both the interface itself and AES-256 encryption must be
enabled, the hardware must be in place and functioning properly,
initialization must be finished, and AES-256 encryption must be
functioning properly, with no loopback on the interface.
To configure payload encryption:
1 Verify that both the local and remote units are running with no alarms. If any
alarm is present, take corrective actions to clear the alarms before
proceeding.
2 If the link is using in-band management, identify which unit is local and which
unit is remote from the management point of view.
3 In a protected link, enable protection lockout, first on the remote and then on
the local unit. See Disabling Automatic Switchover to the Standby Unit (CLI).
4 To configure AES on a radio carrier, you must first enter traffic encryption
view for the specific radio. To enter Payload Encryption view, enter the
following command in root view:
root> payload encryption slot 2 port <port>
For example, to configure AES on radio interface 1, enter the following command
in root view:
root> payload encryption slot 2 port 1
Payload Encryption [1/1]>
To display the payload encryption mode of the radio interface, enter the following
command in Payload Encryption view:
Payload Encryption [2/x]> payload encryption mode show
5 Configure the master key on the remote unit by doing one of the following:
◦ Enter a master key manually.
◦ Generate the master key automatically.
You must use the same master key on both sides of the link. This means that if
you generate a master key automatically on one side of the link, you must copy
that key and for use on the other side of the link. Once payload encryption has
been enabled on both sides of the link, the Key Exchange Protocol periodically
verifies that both ends of the link have the same master key. If a mismatch is
detected, an alarm is raised and traffic transmission is stopped for the
mismatched carrier at both sides of the link. The link becomes non-valid and
traffic stops being forwarded.
To define the master key manually, enter the following command in Payload
Encryption view:
Payload Encryption [2/x]> payload encryption mkey
Enter the master key and press <Enter>. The master key must be between 8 and
32 ASCII characters. The characters do not appear as you type them. To display
the master key and verify that you typed it correctly, enter the payload
encryption status show command described above. You can copy the master
key from the output of this command.
To generate the master key automatically, enter the following command in
Payload Encryption view:
Payload Encryption [2/x]> master key generate
A random master key is generated. You must copy and paste this key to the other
end of the link to ensure that both sides of the link have the same master key. To
display and copy the master key, enter the traffic encryption status show
command described above. You can copy the master key from the output of this
command.
6 On the local unit, follow the procedure described in Step 5 to configure the
same master key configured on the remote unit also on the local unit.
7 Enable payload encryption on the remote unit:
i Enter the following command in Payload Encryption view:
Payload Encryption [2/x]> payload encryption mode admin AES-256
This step will cause the link status to be Down until payload encryption is
successfully enabled on the local unit. However, the RSL measured on the link
should remain at an acceptable level.
Warning! Executing this command on a FIPS-enabled unit formats the unit’s disk,
and renders the unit non-operational. If it is necessary to use this
command, contact Ceragon Technical Support for instructions how to
re-configure the unit.
This command has no effect on units that are not enabled for FIPS.
Note: Any time payload encryption fails, the Operational status of the link is
Down until payload encryption is successfully restored.
16.6.1 Displaying General Modem Status and Defective Block PMs (CLI)
To display the general status of the modem, enter the following command in radio
view:
radio[x/x]>modem show status
Current Tx profile: 0
Current Tx QAM: 4
Current Tx rate(Kbps): 43389
Current Rx profile: 0
Current Rx QAM: 4
Current Rx rate(Kbps): 43389
A value of 0 in the MSE (dB) field means that the modem is not locked.
To clear all radio PMs in the system, enter the following command in root view:
root> radio pm clear all
To clear defective blocks counters for a radio, enter the following command in
radio view:
radio[x/x]>modem clear counters
radio [2/1]>
To display modem BER PMs in daily intervals, enter the following command in
radio view:
radio [x/x]>framer pm-aggregate show interval 24hr
radio [2/1]>
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute
PM reports.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. "1" in the column indicates that the values are not reliable
due to a possible power surge or power failure that occurred at that time.
ES Indicates the number of seconds in the measuring interval during which errors
occurred.
SES Indicates the number of severe error seconds in the measuring interval.
UAS Indicates the Unavailable Seconds value of the measured interval. The value can
be between 0 and 900 seconds (15 minutes).
BBE Indicates the number of background block errors during the measured interval.
To display the current setting for excessive-ber, enter the following command in
root view:
root> radio excessive-ber show admin
To set the level above which an excessive BER alarm is issued for errors detected
over the radio link, enter the following command in radio view:
radio [x/x]>modem excessive-ber set threshold <threshold>
To display the excessive BER threshold, enter the following command in radio
view:
radio [x/x]>modem excessive-ber show threshold
The following command sets the RSL thresholds to -30 dBm and -60 dBm,
respectively.
radio [2/1]>rf pm-rsl set threshold1 -30 threshold2 -60
To display RSL and TSL PMs in daily intervals, enter the following command in
radio view:
radio [x/x]>rf pm-rsl-tsl show interval 24hr
To display the Signal Degrade BER threshold, enter the following command in
radio view:
radio [x/x]>modem signal-degrade show threshold
16.6.8 Configuring the MSE Thresholds and Displaying the MSE PMs (CLI)
To configure the MSE (Mean Square Error) threshold, enter the following
command in radio view:
radio [x/x]>modem set mse-exceed threshold <threshold>
To display the currently configured MSE threshold, enter the following command
in radio view:
radio [x/x]>modem show threshold-mse-exceed
To display MSE (Mean Square Error) PMs in 15-minute intervals, enter the
following command in radio view:
radio [x/x]>modem pm-mse show interval 15min
The following is a partial sample output of the modem pm-mse show interval
15min command:
Interval Integrity
Min MSE (dB) Max MSE (dB) Exceed
threshold
seconds
===============================================================
0 1 0.00 0.00 708
1 1 0.00 0.00 900
2 1 0.00 0.00 900
3 1 0.00 0.00 900
4 1 0.00 0.00 900
5 1 0.00 0.00 900
6 1 0.00 0.00 900
7 1 0.00 0.00 900
8 1 0.00 0.00 900
9 1 0.00 0.00 900
10 1 0.00 0.00 900
radio [2/1]>
To display MSE (Mean Square Error) PMs in daily intervals, enter the following
command in radio view:
radio [x/x]>modem pm-mse show interval 24hr
Interval Integrity
Min MSE (dB) Max MSE (dB) Exceed
threshold
seconds
===============================================================
0 1 0.00 0.00 63745
4 1 0.00 0.00 37062
5 1 0.00 0.00 3495
6 1 0.00 0.00 85976
8 1 0.00 0.00 46173
11 1 0.00 0.00 24185
15 1 0.00 0.00 85988
17 1 0.00 0.00 54981
radio [2/1]>modem
16.6.9 Configuring the XPI Thresholds and Displaying the XPI PMs (CLI)
To configure the modem XPI threshold for calculating XPI Exceed Threshold
seconds, enter the following command in radio view:
radio[x/x]>modem set threshold-xpi-exceed threshold <threshold>
To display the currently configured XPI threshold, enter the following command in
radio view:
radio[x/x]>modem show threshold-xpi-below
To display XPI PMs in 15-minute intervals, enter the following command in radio
view:
radio[x/x]>modem pm-xpi show interval 15min
The following is a partial sample output of the modem pm-xpi show interval
15min command:
Interval Integrity
Min XPI (dB) Max XPI (dB) XPI below
threshold
seconds
===============================================================
1 1 55.00 0.00 0
2 1 55.00 0.00 0
3 1 55.00 0.00 0
4 1 55.00 0.00 0
5 1 55.00 0.00 0
6 1 55.00 0.00 0
7 1 55.00 0.00 0
8 1 55.00 0.00 0
9 1 55.00 0.00 0
10 1 55.00 0.00 0
11 1 55.00 0.00 0
12 1 55.00 0.00 0
13 1 55.00 0.00 0
14 1 55.00 0.00 0
15 1 55.00 0.00 0
16 1 55.00 0.00 0
17 1 55.00 0.00 0
18 1 55.00 0.00 0
19 1 55.00 0.00 0
20 1 55.00 0.00 0
radio [2/1]>
To display XPI PMs in daily intervals, enter the following command in radio view:
radio[x/x]>modem pm-xpi show interval 24hr
The following is a partial sample output of the modem pm-xpi show interval
24hr command:
Interval Integrity
Min XPI (dB) Max XPI (dB) XPI below
threshold
seconds
===============================================================
1 1 55.00 0.00 0
2 1 55.00 0.00 0
3 1 55.00 0.00 0
4 1 55.00 0.00 0
5 1 55.00 0.00 0
6 1 55.00 0.00 0
7 1 55.00 0.00 0
8 1 55.00 0.00 0
9 1 55.00 0.00 0
10 1 55.00 0.00 0
11 1 55.00 0.00 0
12 1 55.00 0.00 0
13 1 55.00 0.00 0
14 1 55.00 0.00 0
15 1 55.00 0.00 0
16 1 55.00 0.00 0
17 1 55.00 0.00 0
18 1 55.00 0.00 0
19 1 55.00 0.00 0
20 1 55.00 0.00 0
radio [2/1]>
Interval The number of the interval: 1-30 for daily PM reports, and 1-
96 for 15 minute PM reports.
Integrity Indicates whether the values received at the time and date of
the measured interval are reliable. "1" in the column
indicates that the values are not reliable due to a possible
power surge or power failure that occurred at that time.
Min XPI (dB) Indicates the lowest XPI value in dB, measured during the
interval.
Max XPI (dB) Indicates the highest XPI value in dB, measured during the
interval.
XPI Below Threshold Seconds Indicates the number of seconds the XPI value was lower
than the XPI threshold during the interval.
The following command sets the XPI threshold for radio carrier 2 to 15:
radio[2/1]>modem set threshold-xpi-below threshold 15
16.6.10 Displaying ACM PMs and Configuring ACM Profile Thresholds (CLI)
For each radio carrier, you can display the minimum and maximum ACM profile
and the minimum and maximum bitrate (throughput) per 15-minute or daily
intervals.
You can also define two ACM profile thresholds for each radio carrier, and display
the number of seconds per interval that the radio’s ACM profile was below each
of these thresholds. These thresholds trigger the following alarms:
• Threshold 1 – When the ACM profile goes beneath this threshold, Alarm ID
1313 (Major) is raised. The alarm is cleared when the ACM profile is at or
above this threshold.
• Threshold 2 – When the ACM profile goes beneath this threshold, Alarm ID
1314 (Critical) is raised. The alarm is cleared when the ACM profile is at or
above this threshold.
To define the ACM thresholds, enter the following command in radio view:
radio [x/x]>mrmc pm-acm set threshold1 <threshold1> threshold2
<threshold2>
To display the ACM thresholds, enter the following command in radio view:
radio [x/x]>mrmc pm-acm get thresholds
To display ACM PMs in 15-minute intervals, enter the following command in radio
view:
radio [x/x]>mrmc pm-acm show interval 15min
The following is a partial sample output of the modem pm-acm show interval
15min command:
To display ACM PMs in daily intervals, enter the following command in radio view:
radio [x/x]>mrmc pm-acm show interval 24hr
threshold1 The higher ACM profile threshold (0-15). The default value is 0.
threshold2 The lower ACM profile threshold (0-15). The default value is 0.
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15
minute PM reports.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. "1" in the column indicates that the
values are not reliable due to a possible power surge or power failure
that occurred at that time.
Min profile Indicates the minimum ACM profile that was measured during the
interval.
Max profile Indicates the maximum ACM profile that was measured during the
interval.
Min bitrate Indicates the minimum total radio throughput (Mbps), delivered during
the interval.
Max bitrate Indicates the maximum total radio throughput (Mbps), delivered
during the interval.
These services are immediately enabled, although service points must be added
to the services in order for the services to carry traffic.
The following command enters service view for the service with Service ID 10:
root> ethernet service sid 10
For example:
service[1]>service info show
service info:
service id: 1
service type: p2p
service admin: operational
Maximal MAC address learning entries: 131072
default cos: 0
cos mode: preserve-sp-cos-decision
EVC id: N.A.
EVC description: N.A.
split horizon group: disable
configured multicast grouping: no
service[1]>
To display the attributes of a service and its service points, go to service view for
the service and enter the following command:
service[SID]>service detailed-info show
For example:
To display a list of service points and their attributes, enter the following
command in root view:
root>ethernet service show info sid <sid>
For example:
To display a service’s admin mode, go to service view for the service and enter the
following command:
Service[SID]> service admin show state
If the CoS mode is set to default-cos, you must define the Default CoS. Use the
following command to define the Default CoS:
service[SID]>service default-cos set cos <cos>
The following command configures Service 10 to preserve the CoS decision made
at the interface or service point level for frames traveling through the service:
service[10]>service cos-mode set cos-mode preserve-sp-cos-
decision
To display a service’s EVC ID, go to service view for the service and enter the
following command:
service[SID]>service evcid show
To add or change the EVC description of a service, go to service view for the
service and enter the following command:
service[SID]>service description set <evc description>
To display a service’s EVC description, go to service view for the service and enter
the following command:
service[SID]>service description show
The following commands add the EVC ID "East_West" and the EVC description
"Line_to_Radio" to Service 10:
service[10]>service evcid set East_West
service[10]>service description set Line_to_Radio
Table 155 shows which service point types can co-exist on the same interface.
Table 156: Legal Service Point – Interface Type Combinations per Interface – SAP and
SNP
Table 157: Legal Service Point – Interface Type Combinations per Interface – Pipe and
MNG
Q in Q No No No Yes No
SNP 802.1q No No Yes No No
S-Tag No No No No Yes
Pipe 802.1q Only one No Yes No No
Pipe SP
Allowed
S-Tag No Only one No No Yes
Pipe SP
Allowed
MNG 802.1q Yes No Only 1 MNG No No
SP Allowed
Q in Q No No No Only 1 MNG No
SP Allowed
S-Tag No Yes No No Only 1 MNG
SP Allowed
To add a service point with a Dot1q interface type, go to service view for the
service and enter the following command:
service[SID]>sp add sp-type <sp-type> int-type dot1q spid <sp-
id> [interface|group] <interface|group> slot <slot> port
<port> vlan <vlan> sp-name <sp-name>
To add a service point with an S-Tag interface type, go to service view for the
service and enter the following command:
service[SID]>sp add sp-type <sp-type> int-type s-tag spid <sp-
id> [interface|group] <interface|group> slot <slot> port
<port> vlan <vlan> sp-name <sp-name>
To add a service point with a Bundle-C interface type, go to service view for the
service and enter the following command:
service[SID]>sp add sp-type <sp-type> int-type bundle-
c spid <sp-id> [interface|group] <interface|group> slot <slot>
port <port> sp-name <sp-name>
To add a service point with a Bundle-S interface type, go to service view for the
service and enter the following command:
service[SID]>sp add sp-type <sp-type> int-type bundle-
s spid <sp-id> [interface|group] <interface|group> slot <slot>
port <port> [outer-vlan <outer-vlan>|vlan <vlan>] sp-name <sp-
name>
To add a Pipe service point, go to service view for the service and enter the
following command:
service[SID]>sp add sp-type pipe int-type <int-type> spid <sp-
id> [interface|group] <interface|group> slot <slot> port <port>
sp-name <sp-name>
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type dot1q. This service point is located on radio carrier
1. VLAN ID 100 is classified to this service point.
service[37]>sp add sp-type sap int-type dot1q spid 10 interface
radio slot 2 port 1 vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type bundle-c-tag. This service point is located on radio
carrier 1.
service[37]>sp add sp-type sap int-type bundle-c-tag spid 10
interface radio slot 2 port 1 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type bundle-s-tag. This service point is located on radio
carrier 2 in an IP-20C or IP-20C-HP unit. S-VLAN 100 is classified to the service
point.
service[37]>sp add sp-type sap int-type bundle-s-tag spid 10
interface radio slot 2 port 2 outer-vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type qinq. This service point is located on radio carrier 2
in an IP-20C or IP-20C-HP unit. S-VLAN 100 and C-VLAN 200 are classified to the
service point.
service[37]>sp add sp-type sap int-type qinq spid 10 interface
radio slot 2 port 2 outer-vlan 100 inner-vlan 200 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to
Service 37, with interface type all-to-one. This service point is located on radio
carrier 1. All traffic entering the system from that port is classified to the service
point.
service[37]>sp add sp-type sap int-type all-to-one spid 10
interface radio slot 2 port 1 sp-name "all-to-one"
The following command adds an SNP service point with Service Point ID 10 to
Service 37, with interface type dot1q. This service point is located on radio carrier
1. VLAN ID 100 is classified to this service point.
service[37]>sp add sp-type snp int-type dot1q spid 10 interface
radio slot 2 port 1 vlan 100 sp-name Radio
The following command adds an SNP service point with Service Point ID 10 to
Service 37, with interface type s-tag. This service point is located on radio carrier
1. S-VLAN 100 is classified to the service point.
service[37]>sp add sp-type snp int-type s-tag spid 10 interface
radio slot 2 port 1 vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 7 to
Service 36, with interface type dot1q. This service point is connected to HSB group
1 (rp1). VLAN ID 100 is classified to the service point.
service[36]>sp add sp-type sap int-type dot1q spid 7 group
rp1 vlan 100 sp-name test1
The following command adds a Pipe service point with Service Point ID 1 to
Service 1, with interface type dot1q. This service point is connected to Eth1.
The following command adds a Pipe service point with Service Point ID 2 to
Service 1, with interface type dot1q. This service point is located on radio carrier
1.
service[1]>sp add sp-type pipe int-type dot1q spid 2 interface
radio slot 2 port 1 sp-name pipe_dot1q_radio
The following commands create a Smart Pipe service between Eth1 and radio
carrier 1. This service carries S-VLANs and untagged frames between the two
interfaces:
root> ethernet service add type p2p sid 10 admin
operational evc-id test description east_west
root>
root> ethernet service sid 10
service[10]>
service[10]>sp add sp-type pipe int-type s-tag spid 1 interface
eth slot 1 port 1 sp-name test1
service[10]>
service[10]>sp add sp-type pipe int-type s-tag spid 2 interface
radio slot 2 port 1 sp-name test2
service[10]>
sp-id Number 1-32 for P2P and MP The Service Point ID.
services.
1-30 for MNG
services.
state Variable Allow Determines whether
disable frames with a broadcast
destination MAC
address are allowed to
ingress the service via
this service point.
The following command allows frames with a broadcast destination MAC address
to ingress Service 37 via Service Point 1.
service[37]>sp broadcast set spid 1 state allow
If you set cos-mode to sp-def-cos, you must then configure a default CoS. This
CoS is applied to frames that ingress the service point, but can be overwritten at
the service level.
To configure the default CoS, go to service view for the service and enter the
following command:
service[SID]>sp sp-def-cos set spid <sp-id> cos <cos>
sp-id Number 1-32 for P2P and MP The Service Point ID.
services.
1-30 for MNG services.
cos mode Variable sp-def-cos • sp-def-cos - The service point re-defines
interface-decision the CoS of frames that pass through the
service point, according to the Default CoS
(below). This decision can be overwritten on
the service level.
• interface-decision - The service point
preserves the CoS decision made at the
interface level. This decision can still be
overwritten at the service level.
• mac-da – The service point checks each
frame against a list of user-defined MAC
DAs. If there is a match, the service point
applies to the frame the CoS and Color
defined for that MAC DA. If there is no
match, the service point preserves the CoS
decision made at the interface level. See
Classification Overview.
Note: For Bundle-S and Bundle-C service
points, if Cos Overwrite Valid is set to True, the
CoS and Color defined in the Attached VLAN
page has priority over the interface decision,
but not over a MAC DA match.
cos Number 0–7 If cos-mode is sp-def-cos, this is the CoS
assigned to frames that pass through the
sp-id Number 1-32 for P2P and MP The Service Point ID.
services.
1-30 for MNG
services.
state Variable allow Determines whether
disable incoming frames with
unknown MAC
addresses are forwarded
to other service points
via flooding.
The following command enables C-VLAN CoS preservation for Service Point 1 on
Service 37:
service[37]>sp cvlan-cos-preservation-mode set spid 1 mode
enable
The following command disables C-VLAN CoS preservation for Service Point 1 on
Service 37:
service[37]>sp cvlan-cos-preservation-mode set spid 1 mode
disable
sp-id Number 1-32 for P2P and MP The Service Point ID.
services.
1-30 for MNG
services.
c-vlan preservation mode Variable enable Determines whether the original
disable C-VLAN ID is preserved or
restored for frames egressing
from the service point.
• enable - The C-VLAN ID
of frames egressing the
service point is the same
as the C-VLAN ID when
the frame entered the
service.
• disable - The C-VLAN ID
of frames egressing the
service point is set at
whatever value might
have been re-assigned
by the interface, service
point, or service, or
whatever value results
from marking (see
Configuring Marking
(CLI)).
The following command enables S-VLAN CoS preservation for Service Point 1 on
Service 37:
service[37]>sp svlan-cos-preservation-mode set spid 1 mode
enable
The following command disables S-VLAN CoS preservation for Service Point 1 on
Service 37:
service[37]>sp svlan-cos-preservation-mode set spid 1 mode
disable
sp-id Number 1-32 for P2P and MP The Service Point ID.
services.
1-30 for MNG
services.
service-bundle-id Number 1 The service bundle
assigned to the service
point.
The following command assigns Service Bundle 1 to Service Point 1 in Service 37.
service[37]>sp egress-service-bundle set spid 1 service-bundle-
id 1
sp-id Number 1-32 for P2P and MP The Service Point ID.
services.
1-30 for MNG services.
vlan Number 1-4094 (except 4092, which The C-VLAN at the beginning
is reserved for the default of the range of the VLAN
management service) Bundle.
to-vlan Number 1-4094 (except 4092, which The C-VLAN at the end of the
is reserved for the default range of the VLAN Bundle.
management service)
The following command classifies C-VLANs 100 through 200 to Service Point 1 in
Service 37:
service[37]>sp bundle cvlan attach spid 1 vlan 100 to-vlan 200
The following command removes C-VLANs 100 through 200 from Service Point 1
in Service 37:
service[37]>sp bundle cvlan remove spid 1 vlan 100 to-vlan 200
sp-id Number 1-32 for P2P and MP The Service Point ID.
services.
1-30 for MNG
services.
The following command displays the attributes of Service Point 1 in Service 37:
service[37]>sp service-point-info show spid 1
sp-id Number 1-32 for P2P and MP services. The Service Point ID.
1-30 for MNG services.
17.1.5 Defining the MAC Address Forwarding Table for a Service (CLI)
This section includes:
• MAC Address Forwarding Table Overview (CLI)
• Setting the Maximum Size of the MAC Address Forwarding Table (CLI)
• Setting the MAC Address Forwarding Table Aging Time (CLI)
• Adding a Static MAC Address to the Forwarding Table (CLI)
• Displaying the MAC Address Forwarding Table (CLI)
• Flushing the MAC Address Forwarding Table (CLI)
• Enabling MAC Address Learning on a Service Point (CLI)
17.1.5.2 Setting the Maximum Size of the MAC Address Forwarding Table (CLI)
To limit the size of the MAC address forwarding table for a specific service, go to
service view for the service and enter the following command:
service[SID]>service mac-limit-value set <mac limit>
Table 169: MAC Address Forwarding Table Maximum Size CLI Parameters
Parameter Input Type Permitted Values Description
The following command limits the number of dynamic MAC address forwarding
table entries for Service 10 to 128:
service[10]>service mac-limit-value set 128
17.1.5.3 Setting the MAC Address Forwarding Table Aging Time (CLI)
You can configure a global aging time for dynamic entries in the MAC address
forwarding table. Once this aging time expires for a specific table entry, the entry
is erased from the table.
To set the global aging time for the MAC address forwarding table, enter the
following command:
root> ethernet service learning-ageing-time set time <time>
To display the global aging time for the MAC address forwarding table, enter the
following command:
root> ethernet service learning-ageing-time show
Table 170: MAC Address Forwarding Table Aging Time CLI Parameters
Parameter Input Type Permitted Values Description
The following command sets the global aging time to 2500 seconds:
root> ethernet service learning-ageing-time set time 2500
To delete a static MAC address from the MAC address forwarding table, go to
service view for the service from which you want to delete the MAC address and
enter the following command:
service[SID]>service mac-learning-table del-static-
mac <static mac> spid <sp-id>
Table 171: Adding Static Address to MAC Address Forwarding Table CLI Parameters
Parameter Input Type Permitted Values Description
The following command adds MAC address 00:11:22:33:44:55 to the MAC address
forwarding table for Service 10, and associates the MAC address with Service
Point ID 1 on Service 10:
service[10]>service mac-learning-table set-static-
mac 00:11:22:33:44:55 spid 1
To display the MAC address forwarding table for an interface, go to interface view
for the interface and enter the following command:
eth type xxx[x/x]>mac-learning-table show
To display the MAC address forwarding table for the entire unit, enter the
following command:
root> ethernet generalcfg mac-learning-table show
To display the MAC address forwarding table for GbE 1, enter the following
commands:
root> ethernet interfaces eth slot 1 port 1
The following command enables MAC address learning for Service Point 1 on
Service 37:
service[37]>sp learning-state set spid 1 learning enable
The following command disables MAC address learning for Service Point 1 on
Service 37:
service[37]>sp learning-state set spid 1 learning disable
17.2 Setting the MRU Size and the S-VLAN Ethertype (CLI)
The following parameters are configured globally for the IP-20 switch:
• S- VLAN Ethertype – Defines the ethertype recognized by the system as the S-
VLAN ethertype.
• C-VLAN Ethertype – Defines the ethertype recognized by the system as the C-
VLAN ethertype. IP-20 supports 0x8100 as the C-VLAN ethertype.
• MRU – The maximum segment size defines the maximum receive unit (MRU)
capability and the maximum transmit capability (MTU) of the system. You can
configure a global MRU for the system.
Note: The MTU is determined by the receiving frame and editing operation
on the frame.
This section includes:
• Configuring the S-VLAN Ethertype (CLI)
• Configuring the C-VLAN Ethertype (CLI)
• Configuring the MRU (CLI)
To display the system S-VLAN ethertype, enter the following command in root
view:
root> ethernet generalcfg ethertype show svlan
For example, the following command sets the system S-VLAN ethertype to
0x88a8:
root> ethernet generalcfg ethertype set svlan-value 0x88a8
To display the system MRU, enter the following command in root view:
root> ethernet generalcfg mru show
For example, the following command sets the system MRU to 9612:
root> ethernet generalcfg mru set size 9612
Use the following command to enter view level of the Management/Traffic port
on an IP-20E or IP-20V:
root> ethernet interfaces mng slot 1 port 1
Use the following command to enter the radio interface’s view level:
root> ethernet interfaces radio slot <slot> port <port>
Use the following command to enter the view level of a group, such as a Multi-
Carrier ABC group, an HSB protection group, or a LAG:
root> ethernet interfaces group <group>
The following command enters interface view for radio interface 2 in an IP-20C or
IP-20C-HP unit:
root> ethernet interfaces radio slot 2 port 2
Note: For simplicity, the examples in the following sections show the prompt
for an Ethernet interface.
17.3.2 Displaying the Operational State of the Interfaces in the Unit (CLI)
To display a list of all interfaces in the unit and their operational states, enter the
following command:
root> platform if-manager show interfaces
Notes: To use an SFP+ interface in 10G mode, the third-party switch must be
running Pause Frame Flow Control, as defined in IEEE 802.3x. It is also
recommended to configure shapers on the third-party switch so as to
limit the packet flow from the switch to the IP-20E unit to 2.5 Gbps.
Note: Before performing this command, you must verify that the media-type
attribute is set to rj45.
The following command sets GbE 1 to 1 Gbps, full duplex:
eth type eth [1/1]>speed-and-duplex state set '1000fd'
To delete a description, go to interface view for the interface and enter the
following command:
eth type eth [x/x]>description delete
clear-on-read Boolean yes If you enter yes, the statistics are cleared
no once you display them.
The following commands enter interface view for GbE 1, and clear the statistics
after displaying them.
root> ethernet interfaces eth slot 1 port 1
The following commands enter interface view for radio carrier 1 in an IP-20C,
IP-20C-HP, or IP-20S unit, and display statistics for the interface, without clearing
the statistics.
root> ethernet interfaces radio slot 2 port 1
In addition, when a local triggering event takes place, the ASP mechanism sends
an indication to the remote side of the link. Even when no triggering event has
taken place, the ASP mechanism sends periodic update messages indicating that
no triggering event has taken place.
A trigger delay time can be configured, so that when a triggering event takes
place, the ASP mechanism does not propagate the event until this delay time has
elapsed. A trigger delay from 0 to 10,000 ms can be set per LLD ID.
Note: It is recommended to configure both ends of the link to the same
Automatic State Propagation configuration.
To configure propagation of a radio interface failure to an Ethernet port, use the
following command:
root> auto-state-propagation add eth-port-to-radio eth-slot
<eth-slot> eth-port <eth-port> radio-slot <radio-slot> radio-
port <radio-port> llf-id <llf-id>
Notes: In this command, the llf-id command is used optionally to change the
LLF ID of the Ethernet port.
To delete automatic state propagation on an Ethernet port, use the following
command:
root> auto-state-propagation delete eth-port eth-slot <eth-
slot> eth-port <eth-port>
To display all automatic state propagation configurations on the unit, use the
following command:
root> auto-state-propagation show-config all
CSF receive must be enabled in order for G.8032 ERPI topology changes to be
initiated upon receipt of a CSF PDU.
To disable this setting, enter the following command
root> ethernet soam csf receive set admin disable
The ifc-down parameter should usually be set to Yes. This means that all network
protocols, LAG, and other unit modules will treat the interface on which the CSF
PDU was received as Operation Status = Down. Also, a soam-csf-rdi-alarm will be
raised to indicate that that relevant port is set to Operational Status = Down due
to ASP triggered by the remote unit.
To display the current setting of this parameter, enter the following command:
root> ethernet soam csf receive show
clear-on-read Boolean yes If you enter yes, the statistics are cleared
no once you display them.
The following commands bring you to interface view for Ethernet port 1, and
clears the statistics after displaying them.
root> ethernet interfaces eth slot 1 port 1
The following commands bring you to interface view for radio interface 2, without
clearing the statistics.
root> ethernet interfaces radio slot 2 port 1
You can configure thresholds and display the number of seconds these thresholds
were exceeded during a specified interval.
To configure interface PM thresholds, go to interface view for the interface and
enter the following command:
eth type eth [x/x]> pm set thresholds rx-layer1-rate-threshold
<0-4294967295> tx-layer1-rate-threshold <0-4294967295>
The following commands bring you to interface view for Ethernet port 1, enable
PM gathering, and set the thresholds for RX and TX PMs at 850,000,000 bytes per
second:
root> ethernet interfaces eth slot 1 port 1
Parameter Definition
Peak RX Bytes in Layer1 The peak RX rate, in bytes per second, for the measured
time interval (including preamble and IFG).
Average RX Bytes in Layer1 The average RX rate, in bytes per second, for the
measured time interval (including preamble and IFG).
RX Bytes Layer1 Exceed Threshold The number of seconds during the measured time
(sec) interval that the RX rate exceeded the configured
threshold.
Peak RX Bytes in Layer2 The peak RX rate, in bytes per second, for the measured
time interval (excluding preamble and IFG).
Average RX Bytes in Layer2 The average RX rate, in bytes per second, for the
measured time interval (excluding preamble and IFG).
Peak TX Packets The peak rate of TX packets per second for the measured
time interval.
Average TX Packets The average rate of TX packets per second for the
measured time interval.
Peak TX Broadcast Packets The peak rate of TX broadcast packets per second for the
measured time interval.
Average TX Broadcast Packets The average rate of TX broadcast packets per second for
the measured time interval.
Peak TX Multicast Packets The peak rate of TX multicast packets per second for the
measured time interval.
Average TX Multicast Packets The average rate of TX multicast packets per second for
the measured time interval.
Peak TX Bytes in Layer1 The peak TX rate, in bytes per second, for the measured
time interval (including preamble and IFG).
Average TX Bytes in Layer1 The average TX rate, in bytes per second, for the
measured time interval (including preamble and IFG).
TX Bytes Layer1 Exceed Threshold The number of seconds during the measured time
(sec) interval that the TX rate exceeded the configured
threshold.
Peak TX Bytes in Layer2 The peak TX rate, in bytes per second, for the measured
time interval (excluding preamble and IFG).
Average TX Bytes in Layer2 The average TX rate, in bytes per second, for the
measured time interval (excluding preamble and IFG).
To delete a set of VLAN-based CoS and Color override values, go to interface view
for the interface and enter the following command:
eth type eth [x/x]>vlan-cos-override delete outer-vlan-id
<outer-vlan-id> inner-vlan-id <inner-vlan-id>
The following command displays the CoS and Color override values for frames
that ingress on GbE 1, with S-VLAN ID 10 and C-VLAN ID 20:
eth type eth [1/1]>vlan-cos-override show outer-vlan-id 10
inner-vlan-id 20
The following command displays all CoS and Color override values for frames that
ingress on GbE 2:
eth type eth [1/2]>vlan-cos-override show all
The following command deletes the VLAN to CoS and Color override mapping for
frames that ingress on GbE 1, with S-VLAN ID 10 and C-VLAN ID 20:
eth type eth [1/1]>vlan-cos-override delete outer-vlan-id 10
inner-vlan-id 20
To display the trust mode for 802.1p classification, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>classification show 802.1p state
802.1p Variable trust Enter the interface's trust mode for user
un-trust priority (UP) bits:
• trust – The interface performs QoS
and color classification according to
UP and CFI/DEI bits according to user-
configurable tables for 802.1q UP bits
(C-VLAN frames) or 802.1AD UP bits
(S-VLAN frames). VLAN UP bit
classification has priority over DSCP
and MPLS classification, so that if a
match is found with the UP bit of the
ingressing frame, DSCP values and
MPLS bits are not considered.
• un-trust – The interface does not
consider 802.1 UP bits during
classification.
18.1.4.2 Modifying the C-VLAN 802.1 UP and CFI Bit Classification Table (CLI)
The following table shows the default values for the C-VLAN 802.1 UP and CFI bit
classification table.
Table 189: C-VLAN 802.1 UP and CFI Bit Classification Table Default Values
802.1 UP CFI CoS (configurable) Color (configurable)
0 0 0 Green
0 1 0 Yellow
1 0 1 Green
1 1 1 Yellow
2 0 2 Green
2 1 2 Yellow
3 0 3 Green
3 1 3 Yellow
4 0 4 Green
4 1 4 Yellow
5 0 5 Green
5 1 5 Yellow
6 0 6 Green
6 1 6 Yellow
7 0 7 Green
7 1 7 Yellow
To modify the C-VLAN 802.1 UP and CFI bit classification table, enter the following
command:
root> ethernet qos 802.1q-up-bits-mapping-tbl set 802.1p
<802.1p> cfi <cfi> cos <cos> color <color>
To display the C-VLAN 802.1 UP and CFI bit classification table, enter the following
command:
root> ethernet qos 802.1q-up-bits-mapping-tbl show
Table 190: C-VLAN 802.1 UP and CFI Bit Classification Table CLI Parameters
Parameter Input Type Permitted Values Description
The following command maps frames with an 802.1p UP bit value of 1 and a CFI
bit value of 0 to CoS 1 and Green color:
root> ethernet qos 802.1q-up-bits-mapping-tbl set 802.1p
1 cfi 0 cos 1 color green
18.1.4.3 Modifying the S-VLAN 802.1 UP and DEI Bit Classification Table (CLI)
The following table shows the default values for the S-VLAN 802.1 UP and DEI bit
classification table.
Table 191: S-VLAN 802.1 UP and DEI Bit Classification Table Default Values
802.1 UP DEI CoS (Configurable) Color (Configurable)
0 0 0 Green
0 1 0 Yellow
1 0 1 Green
1 1 1 Yellow
2 0 2 Green
2 1 2 Yellow
3 0 3 Green
3 1 3 Yellow
4 0 4 Green
4 1 4 Yellow
5 0 5 Green
5 1 5 Yellow
6 0 6 Green
6 1 6 Yellow
7 0 7 Green
7 1 7 Yellow
To modify the S-VLAN 802.1 UP and DEI bit classification table, enter the following
command:
root> ethernet qos 802.1ad-up-bits-mapping-tbl set 802.1p
<802.1p> dei <dei> cos <cos> color <color>
To display the S-VLAN 802.1 UP and CFI bit classification table, enter the following
command:
root> ethernet qos 802.1ad-up-bits-mapping-tbl show
Table 192: S-VLAN 802.1 UP and DEI Bit Classification Table CLI Parameters
Parameter Input Type Permitted Values Description
The following command maps frames with an 802.1ad UP bit value of 7 and a DEI
bit value of 0 to CoS 7 and Green color:
root> ethernet qos 802.1ad-up-bits-mapping-tbl set 802.1p 7 dei
0 cos 7 color green
To display the trust mode for DSCP classification, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>classification show 802.1p state
To add an entry to the DSCP classification table, enter the following command:
root> ethernet qos dscp-mapping-tbl add dscp <dscp> cos <cos>
color <color> dscp description <description>
To delete an entry from the DSCP classification table, enter the following
command:
root> ethernet qos dscp-mapping-tbl delete dscp <dscp>
The following command maps frames with DSCP value of 10 to CoS 1 and Green
color, and changes the description of the table entry to AFC11:
root> ethernet qos dscp-mapping-tbl set dscp 10 cos 1 color
green dscp description AFC11
To display the trust mode for MPLS classification, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>classification show mpls state
mpls Variable Trust Select the interface's trust mode for MPLS
un-trust bits:
• trust – The interface performs
QoS and color classification
according to a user-configurable
table for MPLS EXP to CoS and
color classification.
• un-trust – The interface does
not consider MPLS bits during
classification.
0 0 Yellow
1 1 Green
2 2 Yellow
3 3 Green
4 4 Yellow
5 5 Green
6 6 Green
7 7 Green
To modify the MPLS EXP bit classification table, enter the following command:
root> ethernet qos mpls-exp-bits-mapping-tbl set mpls-exp
<mpls-exp> cos <cos> color <color>
To display the MPLS EXP bit classification table, enter the following command:
root> ethernet qos mpls-mapping-tbl show
Table 198: MPLS EXP Bit Classification Table Modification CLI Parameters
Parameter Input Type Permitted Values Description
The following command maps frames with MPLS EXP bit value of 4 to CoS 4 and
Yellow color:
root> ethernet qos mpls-exp-bits-mapping-tbl set mpls-exp 4
cos 4 color yellow
To edit an entry to the MAC DA classification table, enter the following command
in root view:
root>ethernet generalcfg mac-da edit mac <MAC address> color
<green|yellow>
The following command changes the CoS assigned to this MAC address to 6.
root>ethernet generalcfg mac-da edit mac 00:11:22:33:44:55 cos
6 color green
To display the default CoS value for an interface, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>classification show default-cos
default- Number 0–7 Enter the default CoS value for frames passing
cos through the interface. This value can be
overwritten on the service point and service level.
To edit an existing rate meter (policer) profile, enter the following command:
root> ethernet qos rate-meter edit profile-id <profile-id> cir
<cir> cbs <cbs> eir <eir> ebs <ebs> color-mode <color-mode>
coupling-flag <coupling-flag> rate-meter-profile-name <rate-
meter-profile-name>
The following command creates a rate meter (policer) profile with Profile ID 50,
named “64k.”
root> ethernet qos rate-meter add profile-id 50 cir 64000 cbs 5
eir 64000 ebs 5 color-mode color-blind coupling-flag disable
rate-meter-profile-name 64k
The following command edits the rate meter (policer) profile with Profile ID 50,
and changes its name to “256 kBytes.”
root> ethernet qos rate-meter edit profile-id 50 cir 128000 cbs
5 eir 128000 ebs 5 color-mode color-aware coupling-flag enable
rate-meter-profile-name 256 kBytes
The following command displays the parameters of Rate Meter Profile 50:
root> ethernet qos rate-meter show profile-id 50
To change the rate meter (policer) profile for unicast traffic, go to interface view
for the interface and enter the following command:
eth type eth [x/x]>rate-meter unicast edit admin-state <admin-
state> profile-id <profile-id>
To display the current unicast rate meter (policer) profile for an interface, go to
interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter unicast show configuration
To delete the rate meter (policer) profile for unicast traffic, go to interface view
for the interface and enter the following command:
eth type eth [x/x]>rate-meter unicast delete
Table 201: Assigning Rate Meter for Unicast Traffic CLI Parameters
Parameter Input Type Permitted Values Description
profile-id Number 1 – 250 Select from the rate meter profiles defined in the
system.
The following command assigns Rate Meter Profile 1 to unicast traffic on GbE 1,
and enables rate metering on the port:
eth type eth [1/1]>rate-meter unicast add capability admin-
state enable profile-id 1
The following command changes the rate meter (policer) profile for unicast traffic
on GbE 1 to 4:
eth type eth [1/1]>rate-meter unicast edit admin-state enable
profile-id 4
To change the rate meter (policer) profile for multicast traffic, go to interface view
for the interface and enter the following command:
eth type eth [x/x]>rate-meter multicast edit admin-state
<admin-state> profile-id <profile-id>
To display the current multicast rate meter (policer) profile for an interface, go to
interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter multicast show configuration
To delete the rate meter (policer) profile for multicast traffic, go to interface view
for the interface and enter the following command:
eth type eth [x/x]>rate-meter multicast delete
Table 202: Assigning Rate Meter for Multicast Traffic CLI Parameters
Parameter Input Type Permitted Values Description
The following command assigns Rate Meter Profile 1 to multicast traffic on GbE 1,
and enables rate metering on the port.
eth type eth [1/1]>rate-meter multicast add capability admin-
state enable profile-id 1
The following command changes the rate meter (policer) profile for multicast
traffic on GbE 1 to 4:
eth type eth [1/1]>rate-meter multicast edit admin-state enable
profile-id 4
To change the rate meter (policer) profile for broadcast traffic, go to interface
view for the interface and enter the following command:
eth type eth [x/x]>rate-meter broadcast edit admin-state
<admin-state> profile-id <profile-id>
To display the current broadcast rate meter (policer) settings for an interface, go
to interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter broadcast show configuration
To delete the rate meter (policer) profile for broadcast traffic, go to interface view
for the interface and enter the following command:
eth type eth [x/x]>rate-meter broadcast delete
Table 203: Assigning Rate Meter for Broadcast Traffic CLI Parameters
Parameter Input Type Permitted Values Description
profile-id Number 1 – 250 Select from the rate meter profiles defined in the
system.
The following command changes the rate meter (policer) profile for broadcast
traffic on GbE 1 to 4:
eth type eth [1/1]>rate-meter broadcast edit admin-state enable
profile-id 4
To change the rate meter (policer) profile for a specific Ethertype, go to interface
view for the interface and enter the following command:
eth type eth [x/x]>rate-meter <ethertype#> edit ethertype-value
<ethertype-value> admin-state <admin-state> profile-id
<profile-id>
To display the current Ethertype rate meter (policer) settings for an interface, go
to interface view for the interface and enter the following commands:
eth type eth [x/x]>rate-meter ethertype1 show configuration
eth type eth [x/x]>rate-meter ethertype2 show configuration
eth type eth [x/x]>rate-meter ethertype3 show configuration
To delete the rate meter (policer) profile for an Ethertype, go to interface view for
the interface and enter one or more of the following commands:
eth type eth [x/x]>rate-meter ethertype1 delete
eth type eth [x/x]>rate-meter ethertype2 delete
eth type eth [x/x]>rate-meter ethertype3 delete
profile-id Number 1 – 250 Select from the policer profiles defined in the
system. For instructions on defining rate meter
(policer) profiles, refer to Configuring Rate Meter
(Policer) Profiles (CLI).
The following commands change the rate meter (policer) profiles assigned in the
examples above to 4, 5, and 6, respectively.
eth type eth [1/1]>rate-meter ethertype1 edit ethertype-value
0x8000 admin-state enable profile-id 4
18.2.6 Attaching a Rate Meter (Policer) to a Service Point and CoS (CLI)
To assign a rate meter (policer) profile to a service point, go to service view for the
service and enter the following commands:
service[x]>sp rate-meter add capability spid <spid>
To change the rate meter (policer) profile for a service point, go to service view
for the service and enter the following command:
service[x]>sp rate-meter edit spid <spid> admin-state <admin-
state> profile-id <profile-id>
To display the current rate meter (policer) profile for a service point, go to service
view for the service and enter the following command:
service[x]>sp rate-meter show configuration spid <spid>
To assign a rate meter (policer) profile to a service point and CoS, go to service
view for the service and enter the following commands:
service[x]>sp rate-meter add capability spid <spid>
To change the rate meter (policer) profile for a service point and CoS, go to
service view for the service and enter the following command:
service[x]>sp rate-meter edit spid <spid> cos <cos> admin-state
<admin-state> profile-id <profile-id>
To display the current rate meter (policer) profile for a service point and CoS, go
to service view for the service and enter the following command:
service[x]>sp rate-meter show configuration spid <spid> cos
<cos>
To delete the rate meter (policer) profile for a service point or service point/CoS
combination, go to service view for the service and enter the following command:
Table 205: Assigning Rate Meter for Service Point and Service Point/CoS CLI Parameters
Parameter Input Type Permitted Values Description
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
admin-state Variable enable Enables or disables rate metering on unicast
disable traffic flows from the logical interface.
profile-id Number 1 – 250 Select from the rate meter profiles defined in the
system.
cos Number 0–7 The CoS value to which you are assigning the rate
meter.
The following commands assign Rate Meter Profile 4 to service point 10 and CoS 6
on service 5:
root> ethernet service sid 5
18.2.7 Configuring the Line Compensation Value for a Rate Meter (Policer) (CLI)
A rate meter can measure CIR and EIR at Layer 1 or Layer 2 rates. Layer 1 capacity
is equal to Layer 2 capacity plus 20 additional bytes for each frame due to the
preamble and Inter Frame Gap (IFG). In most cases, the preamble and IFG equals
20 bytes, but other values are also possible. Line compensation defines the
number of bytes to be added to each frame for purposes of CIR and EIR
calculation. When Line Compensation is 20, the rate meter operates as Layer 1.
When Line Compensation is 0, the rate meter operates as Layer 2. This parameter
is very important to users that want to distinguish between Layer 1 and Layer 2
traffic.
To configure the rate meter (policer) line compensation value for an interface, go
to interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter-compensation-value set <value>
To display the rate meter (policer) line compensation value for an interface, go to
interface view for the interface and enter the following command:
eth type eth [x/x]>rate-meter-compensation-value get
Table 206: Assigning Line Compensation Value for Rate Meter CLI Parameters
Parameter Input Type Permitted Values Description
The following command sets the line compensation value for policers attached to
GbE 1 to 20:
eth type eth [1/1]>rate-meter-compensation-value set 20
clear-on-read Boolean yes If you enter yes, the statistics are cleared
no once you display them.
The following commands display rate meter counters for GbE 1, for each of the
available frame types and Ethertypes. These commands clear the counters after
displaying them.
eth type eth [1/1]>rate-meter unicast show statistics clear-on-
read yes layer-1 no
If marking and CoS preservation for the relevant outer VLAN are both disabled,
special marking is applied. Special marking means that marking is performed, but
only according to the values defined for Green frames in the 802.1Q and 802.1AD
marking tables.
When marking is performed, the C-VLAN or S-VLAN 802.1p UP bits are re-marked
according to the calculated CoS and Color.
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
mode Variable enable Determines whether re-marking of the outer
disable VLAN (C-VLAN or S-VLAN) of tagged frames
that pass through the service point is
enabled.
• If mode is set to enable, and CoS
preservation for the relevant outer
VLAN is set to disable, the service
point re-marks the C-VLAN or S-
VLAN 802.1p UP bits of egress
frames according to the calculated
CoS and Color, and the user-
configurable 802.1Q and 802.1AD
marking tables.
• If mode is set to enable and CoS
preservation for the relevant outer
VLAN is also set to enable, re-
marking is not performed.
• If mode is set to disable and CoS
preservation for the relevant outer
VLAN is also set to disable, re-
marking is applied, but only
according to the values defined for
Green frames in the 802.1Q and
802.1AD marking tables.
For information about configuring CoS
Preservation, refer to CoS Preservation and
Modification on a Service Point (CLI).
0 Green 0 0
0 Yellow 0 1
1 Green 1 0
1 Yellow 1 1
2 Green 2 0
2 Yellow 2 1
3 Green 3 0
3 Yellow 3 1
4 Green 4 0
4 Yellow 4 1
5 Green 5 0
5 Yellow 5 1
6 Green 6 0
6 Yellow 6 1
7 Green 7 0
7 Yellow 7 1
To modify the 802.1q CoS and Color to UP and CFI bit mapping table, enter the
following command in root view:
root> ethernet qos 802.1q-up-bits-marking-tbl set cos <cos>
color <color> 802.1p <802.1p> cfi <cfi>
To display the 802.1q CoS and Color to UP and CFI bit mapping table, enter the
following command in root view:
root> ethernet qos 802.1q-up-bits-marking-tbl show
Table 210: 802.1q CoS and Color to UP and CFI Bit Mapping Table CLI Parameters
Parameter Input Type Permitted Values Description
The following command maps CoS 0, Green, to 802.1p UP bit 0, and CFI bit 0:
root> ethernet qos 802.1q-up-bits-marking-tbl set cos 0 color
green 802.1p 0 cfi 0
0 Green 0 0
0 Yellow 0 1
1 Green 1 0
1 Yellow 1 1
2 Green 2 0
2 Yellow 2 1
3 Green 3 0
3 Yellow 3 1
4 Green 4 0
4 Yellow 4 1
5 Green 5 0
5 Yellow 5 1
6 Green 6 0
6 Yellow 6 1
7 Green 7 0
7 Yellow 7 1
To modify the 802.1ad CoS and Color to UP and DEI bit mapping table, enter the
following command in root view:
root> ethernet qos 802.1ad-up-bits-marking-tbl set cos <cos>
color <color> 802.1p <802.1p> dei <dei>
To display the 802.1q CoS and Color to UP and CFI bit mapping table, enter the
following command in root view:
The following command marks CoS 5, Yellow, to 802.1p UP bit 5, and DEI bit 1:
root> ethernet qos 802.1ad-up-bits-marking-tbl set cos 5 color
yellow 802.1p 5 dei 1
To edit an existing WRED profile, enter the following command in root view:
root> ethernet qos wred-profile-tbl edit profile-id <profile-
id> green-min-threshold <green-min-threshold> green-max-
threshold <green-max-threshold> green-max-drop <green-max-drop>
yellow-min-threshold <yellow-min-threshold> yellow-max-
threshold <yellow-max-threshold> yellow-max-drop <yellow-max-
drop>
You cannot delete a WRED profile that is assigned to a queue. You must first
remove the WRED profile from the queue by replacing it with a different WRED
profile. You can then delete the WRED profile.
Note: Each queue always has a WRED profile assigned to it. By default,
WRED Profile 31 is assigned to every queue until a different profile is
assigned.
To display the WRED profile assigned to a queue, go to interface view for the
interface and enter the following command:
eth type eth [x/x]> wred show profile-id service-bundle-id
<service-bundle-id> cos <cos>
The following command assigns WRED Profile 2 to the CoS 0 queue in Service
Bundle 1, on GbE 1:
eth type eth [1/1]> wred set service-bundle-id 1 cos 0 profile-
id 2
The following command displays the WRED profile assigned to the CoS 0 queue in
Service Bundle 1, on GbE 1:
eth type eth [1/1]> wred show profile-id service-bundle-id
1 cos 0
To edit the parameters of an existing queue shaper profile, enter the following
command in root view:
root> ethernet qos queue-shaper-profile-tbl edit profile-id
<profile-id> cir <cir> shaper-profile-name <shaper-profile-
name> burst-type short
Note: The burst-type parameter is reserved for future use. However, you
must enter this parameter in order for the command to execute.
To display the parameters of a queue shaper profile, enter the following
command in root view:
root> ethernet qos queue-shaper-profile-tbl show profile-id
<profile-id>
To delete a queue shaper profile, enter the following command in root view:
root> ethernet qos queue-shaper-profile-tbl delete profile-id
<profile id>
You cannot delete a queue shaper profile if it is attached to a queue. You must
first remove the profile from the queue. You can then delete the profile.
The following command creates Queue Shaper 1, named “p1”, with a CIR value of
16000 bps:
root> ethernet qos queue-shaper-profile-tbl add profile-id 1
cir 16000 shaper-profile-name p1
The following command changes the CIR value of the profile created above from
16000 to 32000, and changes the profile name to p3:
root> ethernet qos queue-shaper-profile-tbl edit profile-id 1
cir 32000 shaper-profile-name p3 burst-type short
To change the queue shaper profile attached to a queue, go to interface view for
the interface and enter the following command:
eth type eth [x/x]> queue-shaper edit service-bundle-id
<service-bundle-id> cos <cos> admin-state <admin-state>
profile-id <profile-id>
To display the queue shaper profile attached to a queue, go to interface view for
the interface and enter the following command:
eth type eth [x/x]> queue-shaper show configuration service-
bundle-id <service-bundle-id> cos <cos>
To remove a queue shaper profile from a queue, go to interface view for the
interface and enter the following command:
eth type eth [x/x]> queue-shaper delete service-bundle-id
<service-bundle-id> cos <cos>
The following command adds Queue Shaper Profile 5 to queues with CoS 0, on
Service Bundle 1, on GbE 1, and enables shaping on these queues:
eth type eth [1/1]> queue-shaper add capability service-bundle-
id 1 cos 0 admin-state enable profile-id 5
The following command changes the Queue Shaper Profile assigned in the
previous command to Queue Shaper Profile 2:
eth type eth [1/1]> queue-shaper edit service-bundle-id 1 cos 0
admin-state enable profile-id 2
To edit the parameters of an existing service bundle shaper profile, enter the
following command in root view:
root> ethernet qos service-bundle-shaper-profile-tbl edit
profile-id <profile-id> cir <cir> pir <pir> shaper-profile-name
<shaper-profile-name>
To display the parameters of a service bundle shaper profile, enter the following
command in root view:
root> ethernet qos service-bundle-shaper-profile-tbl show
profile-id <profile-id>
To display the parameters of all configured service bundle shaper profiles, enter
the following command in root view:
root> ethernet qos service-bundle-shaper-profile-tbl show
profile-id all
To delete a service bundle shaper profile, enter the following command in root
view:
root> ethernet qos service-bundle-shaper-profile-tbl delete
profile-id <profile-id>
The following command creates Service Bundle Shaper 1, named “p1”, with a CIR
value of 100000000 bps and a PIR value of 200000000 bps:
root> ethernet qos service-bundle-shaper-profile-tbl add
profile-id 1 cir 100000000 pir 200000000 shaper-profile-name p1
The following command changes the CIR value in the Service Bundle Shaper
created above from 100000000 bps to 110000000 bps:
The following command adds Service Bundle Shaper Profile 5 to Service Bundle 1,
on GbE 1, and enables shaping on this service bundle:
eth type eth [1/1]> service-bundle-shaper add capability
service-bundle-id 1 admin-state enable profile-id 5
The following command changes the Service Bundle Shaper Profile assigned in the
previous command to Service Bundle 1, from 5 to 4:
eth type eth [1/1]> service-bundle-shaper edit service-bundle-
id 1 admin-state enable profile-id 4
To display the egress line compensation value, go to interface view for the
interface and enter the following command:
eth type eth [x/x]>shaping-compensation-value get
The following command sets the egress line compensation value to 0 on GbE 1:
eth type eth [1/1]>shaping-compensation-value set 0
0 1 1 Best Effort
1 2 1 Data Service 4
2 2 1 Data Service 3
3 2 1 Data Service 2
4 2 1 Data Service 1
5 3 1 Real Time 2 (Video with large buffer)
6 3 1 Real Time 1 (Video with small buffer)
7 4 4 Management (Sync, PDUs, etc.)
When the service bundle state is Green (committed state), the service bundle
priorities are as defined in the Green Priority column. When the service bundle
state is Yellow (best effort state), the service bundle priorities are system-defined
priorities shown in the Yellow Priority column.
Note: CoS 7 is always marked with the highest priority and cannot be
changed or edited, no matter what the service bundle state is, since it
is assumed that only high priority traffic will be tunneled via CoS 7.
The system supports up to nine interface priority profiles. Profiles 1 to 8 are
defined by the user, while profile 9 is the pre-defined read-only default interface
priority profile.
To edit an existing interface priority profile, enter the following command in root
view:
root> ethernet qos port-priority-profile-tbl edit profile-id
<profile-id> cos0-priority <cos0-priority> description
<description> cos1-priority <cos1-priority> description
<description> cos2-priority <cos2-priority> description
<description> cos3-priority <cos3-priority> description
<description> cos4-priority <cos4-priority> description
<description> cos5-priority <cos5-priority> description
<description> cos6-priority <cos6-priority> description
<description> cos7-priority <cos7-priority> description
<description>
To delete an interface priority profile, enter the following command in root view:
root> ethernet qos port-priority-profile-tbl delete profile-id
<profile-id>
You can only delete an interface priority profile if the profile is not attached to any
interface.
0 1 1 c0_p1
1 1 1 c1_p1
2 1 1 c2_p1
CoS Green Priority (user defined) Yellow Priority (read only) Description
3 2 1 c3_p2
4 2 1 c4_p2
5 3 1 c5_p3
6 4 1 c6_p4
7 4 4 c7_p4
The following command edits the profile you created in the previous command so
that CoS 6 queues have a Green priority of 3 instead of 4, and a description of
“c6_p3”.
root> ethernet qos port-priority-profile-tbl edit profile-id 1
cos0-priority 1 description c0_p1 cos1-priority 1 description
c1_p1 cos2-priority 1 description c2_p1 cos3-priority 2
description c3_p2 cos4-priority 2 description c4_p2 cos5-
priority 3 description c5_p3 cos6-priority 3 description c6_p3
cos7-priority 4 description c7_p4
Profile ID: 9
0 1 1 best effort
1 2 1 data service
2 2 1 data service
3 2 1 data service
4 2 1 data service
5 3 1 real time
6 3 1 real time
7 4 4 management
0 20 20
1 20 20
2
3 20 20
4
5 20 20
6
7 20 20
You can attach one of the configured interface WFQ profiles to each interface. By
default, the interface is assigned Profile ID 1, the pre-defined system profile.
To edit an existing WFQ profile, enter the following command in root view:
root> ethernet qos wfq-weight-profile-tbl edit profile-id
<profile.id> cos0-weight <cos0-weight> cos1-weight <cos1-
weight> cos2-weight <cos2-weight> cos3-weight <cos3-weight>
cos4-weight <cos4-weight> cos5-weight <cos5-weight> cos6-weight
<cos6-weight> cos7-weight <cos7-weight>
To display the parameters of a WFQ profile, enter the following command in root
view:
root> ethernet qos wfq-weight-profile-tbl show profile-id
<profile-id>
You can only delete a WFQ profile if the profile is not attached to any interface.
This profile has the parameters listed in the following table. Note that the yellow
queue weight is constant and cannot be changed. This means that all best effort
traffic (yellow) will always have the same weight, regardless of CoS.
0 15 20
1 20 20
2 20 20
3 20 20
4 20 20
5 20 20
6 20 20
7 20 20
The following command edits the profile you created in the previous command so
that CoS 6 queues have a weight of 20 instead of 15:
root> ethernet qos wfq-weight-profile-tbl edit profile-id 2
cos0-weight 15 cos1-weight 15 cos2-weight 15 cos3-weight 15
cos4-weight 15 cos5-weight 15 cos6-weight 20 cos7-weight 20
The following is a sample display for the port-wfq show profile-id command:
eth type eth [1/1]>port-wfq show profile-id
Profile ID: 1
0 20
1 20
2 20
3 20
4 20
5 20
6 20
7 20
To clear queue-level PMs for a specific service bundle, enter interface view for the
interface and enter the following command:
eth type eth [x/x]> tm-queue clear statistics service-bundle-id
<service-bundle-id>
The following command displays PMs for the CoS 0 queue in Service Bundle 1, on
GbE 2. The PMs are cleared after they are displayed:
eth type eth [1/2]> tm-queue show statistics service-bundle-id
1 cos 0 clear-on-read yes layer-1 yes
The following command clears PMs for all queues in Service Bundle 1, on GbE 2:
eth type eth [1/2]> tm-queue clear statistics service-bundle-id 1
If a service bundle has been configured and enabled, the following output is
displayed:
eth type eth [x/x]>pm tm-queue show configuration all
Service bundle: 1 Admin: enable
Num entries: 1
If a service bundle has been configured but it’s Admin status is disabled, the
following output is displayed:
eth type eth [x/x]>pm tm-queue show configuration all
Service bundle: 1 Admin: disable
Num entries: 1
To change the Admin state of a service bundle, enter the following command in
interface view:
eth type eth [x/x]> pm tm-queue set service-bundle-id <1-6> admin-
state <enable|disable>
For example:
eth type eth [1/1]>pm tm-queue remove service-bundle-id 1
WARNING: All PM history for that service bundle will be deleted.
Are you sure? (yes/no):yes
eth type eth [1/1]>
To display the threshold settings for a service bundle, enter the following
command in interface view:
eth type eth [x/x]> pm tm-queue show configuration service-bundle-id
<1-6>
For example:
eth type eth [1/1]>pm tm-queue show configuration service-
bundle-id 1
Admin: enable
cos0 green bytes passed threshold: 675000 bytes
cos1 green bytes passed threshold: 675000 bytes
cos2 green bytes passed threshold: 675000 bytes
cos3 green bytes passed threshold: 675000 bytes
cos4 green bytes passed threshold: 675000 bytes
cos5 green bytes passed threshold: 675000 bytes
cos6 green bytes passed threshold: 675000 bytes
cos7 green bytes passed threshold: 675000 bytes
cos0 yellow bytes passed threshold: 675000 bytes
cos1 yellow bytes passed threshold: 675000 bytes
cos2 yellow bytes passed threshold: 100000 bytes
cos3 yellow bytes passed threshold: 675000 bytes
cos4 yellow bytes passed threshold: 675000 bytes
cos5 yellow bytes passed threshold: 675000 bytes
cos6 yellow bytes passed threshold: 675000 bytes
cos7 yellow bytes passed threshold: 675000 bytes
To set thresholds for green bytes, enter the following command in interface view:
eth type eth [x/x]> pm tm-queue set service-bundle-id <1-6> cos <0-7>
green-bytes-passed-threshold <0-4294967295>
To set thresholds for yellow bytes, enter the following command in interface view:
eth type eth [x/x]> pm tm-queue set service-bundle-id <1-6> cos <0-7>
yellow-bytes-passed-threshold <0-4294967295>
To display PMs for green bytes passed, enter the following command in interface
view:
eth type eth [x/x]> pm tm-queue show counter green_bytes_passed
service-bundle-id 1 cos <0-7> interval <15min|24hr>
For example:
To display PMs for green packets passed, enter the following command in
interface view:
eth type eth [x/x]> pm tm-queue show counter green_packets_passed
service-bundle-id 1 cos <0-7> interval <15min|24hr>
For example:
To display PMs for green bytes dropped, enter the following command in
interface view:
eth type eth [x/x]> pm tm-queue show counter green_bytes_dropped
service-bundle-id 1 cos <0-7> interval <15min|24hr>
For example:
To display PMs for green packets dropped, enter the following command in
interface view:
eth type eth [x/x]> pm tm-queue show counter green_packets_dropped
service-bundle-id 1 cos <0-7> interval <15min|24hr>
For example:
To display PMs for yellow bytes passed, enter the following command in interface
view:
eth type eth [x/x]> pm tm-queue show counter yellow_bytes_passed
service-bundle-id 1 cos <0-7> interval <15min|24hr>
For example:
To display PMs for yellow packets passed, enter the following command in
interface view:
eth type eth [x/x]> pm tm-queue show counter yellow_packets_passed
service-bundle-id 1 cos <0-7> interval <15min|24hr>
For example:
To display PMs for yellow bytes dropped, enter the following command in
interface view:
eth type eth [x/x]> pm tm-queue show counter yellow_bytes_dropped
service-bundle-id 1 cos <0-7> interval <15min|24hr>
For example:
To display PMs for yellow packets dropped, enter the following command in
interface view:
eth type eth [x/x]> pm tm-queue show counter yellow_packets_dropped
service-bundle-id 1 cos <0-7> interval <15min|24hr>
For example:
To clear service bundle-level PMs for all service bundles on an interface, enter
interface view for the interface and enter the following command:
eth type eth [x/x]> tm-service-bundle clear statistics
The following command displays service bundle PMs for Service Bundle 1, on GbE
1. The PMs are cleared after they are displayed.
eth type eth [1/1]> tm-service-bundle show statistics service-
bundle-id 1 clear-on-read yes layer-1 yes
To display the destination MAC address, enter the following command in root
view:
root> ethernet generalcfg g8032-dest-mac-address show
To display the destination MAC address and the node ID, enter the following
command in root view:
root> ethernet g8032 show-node-attributes
MAC Six groups of two 01:19:a7:00:00:x where x can The destination MAC address
address hexadecimal digits be any number between 0 for PDUs generated by the
and 16. node.
To add a Ring with Sub-Ring ERPI, enter the following command in root view:
root> ethernet g8032 create-erpi erp-type ring-with-sub-ring
erpi-id <erpi-id> erpi-service-id <erpi-service-id> west-sp
<west-sp> east-sp <east-sp> sub-ring-sp <sub-ring-sp> level
<level> version <version>
The following commands create a Ring ERPI with ID 1, and name the ERPI
"service_x". This ERPI is associated with Ethernet Service 1. The end points of the
ERPI are Service Point 1 and Service Point 2. The ERPI is configured with MEG
level 2:
root> ethernet g8032 create-erpi erp-type ring erpi-id 1 erpi-
service-id 1 west-sp 1 east-sp 2 level 2
root> ethernet g8032 set-erpi-name erpi-id 1 erpi-name
service_x
The following commands create a Sub-Ring ERPI with ID 10, and name the ERPI
"Sub_ring". This ERPI is associated with Ethernet Service 20. The end points of the
ERPI are Service Point 1 and Service Point 2. The ERPI is configured with MEG
level 4:
root> ethernet g8032 create-erpi erp-type sub-ring erpi-id 10
erpi-service-id 20 west-sp 1 east-sp 2 level 4
root> ethernet g8032 set-erpi-name erpi-id 1 erpi-name Sub_ring
The following commands create a Ring with Sub-Ring ERPI with ID 20, and name
the ERPI "RSRi". This ERPI is associated with Ethernet Service 30. The end points of
the ERPI are Service Point 1 and Service Point 2, and the point of connection
between the Ring and the Sub-Ring is Service Point 3. The ERPI is configured with
MEG level 5:
root> ethernet g8032 create-erpi erp-type ring-with-sub-ring
erpi-id 20 erpi-service-id 30 west-sp 1 east-sp 2 sub-ring-sp 3
level 5
root> ethernet g8032 set-erpi-name erpi-id 1 erpi-name RSRi
To remove the RPL Owner Node, enter the following command in root view:
root> ethernet g8032 remove-rpl-owner erpi-id <erpi-id>
erpi-id Number 1-64 The ID of the ERPI for which you want to set
or delete the RPL owner.
SP Number or east Specifies the service point you want to
Variable west designate as the RPL owner.
sub-ring
The following command sets the East service point as the RPL owner for ERPI 1:
root> ethernet g8032 set-rpl-owner erpi-id 1 SP east
The following command sets the Sub-Ring service point as the RPL owner for
ERPI 20:
root> ethernet g8032 set-rpl-owner erpi-id 20 SP sub-ring
To configure the guard time, enter the following command in root view:
root> ethernet g8032 set-guard-time erpi-id <erpi-id> guard-
time <guard-time>
erpi-id Number 1-64 The ID of the ERPI for which you want to set a timer.
wtr Number 1-12 The minimum time (in minutes) the system waits
after signal failure is recovered before reverting to
idle state.
guard- Number 10-2000, in The minimum time (in msec) the system waits after
time multiples of 10 recovery from a signal failure before accepting new
R-APS messages.
holdoff- Number 0-10000, in The minimum time (in msec) the system waits before
time multiples of 100 reacting to a signal failure.
The following command sets the WTR timer for ERPI 1 to 2 minutes:
root> ethernet g8032 set-wtr erpi-id 1 wtr 2
The following command sets the guard time for ERPI 1 to 20 msecs:
root> ethernet g8032 set-guard-time erpi-id 1 guard-time 20
The following command sets the hold-off time for ERPI 1 to 1000 msecs:
root> ethernet g8032 set-holdoff-time erpi-id 1 holdoff-time
1000
19.1.5 Initiating a Manual or Forced Switch and Clearing the Switch or Initiating
Reversion (CLI)
To initiate a forced switch, enter the following command in root view:
root> ethernet g8032 fs-erpi erpi-id <erpi-id> SP <SP>
You can use a "clear" command to clear a forced or manual switch. You can also
use a "clear" command to trigger convergence prior to the expiration of the
relevant timer. To issue a "clear" command, enter the following command in root
view:
root> ethernet g8032 clear-erpi erpi-id <erpi-id> SP <SP>
The following command initiates a forced switch in the East service point of
ERPI 1:
root> ethernet g8032 fs-erpi erpi-id 1 SP east
The following command initiates a manual switch in the Sub-Ring service point of
ERPI 20:
root> ethernet g8032 ms-erpi erpi-id 20 SP sub-ring
The following command initiates convergence in the East service point of ERPI 1:
root> ethernet g8032 clear-erpi erpi-id 1 SP east
To display all ERPIs that include a service point on a specific port, enter the
following command in root view:
root> ethernet g8032 show-all-port-erpi interface <interface>
slot <slot> port <port>
To display all ERPIs that include a service point on a specific group, enter the
following command in root view:
root> ethernet g8032 show-all-port-erpi group <group>
The following command displays all ERPIs with a service point on LAG group 1:
root> ethernet g8032 show-all-port-erpi group lag1
The following command displays all ERPIs with a service point on HSB protection
group 2:
root> ethernet g8032 show-all-port-erpi group rp2
The following command displays all ERPIs with a service point on Multi-Carrier
ABC group 1:
root> ethernet g8032 show-all-port-erpi group mc-abc1
To display state information about a specific ERPI, enter the following command
in root view:
root> ethernet g8032 show-erpi-dynamic erpi-id <erpi-id>
Parameter Description
ERPI Name A descriptive name for the ERPI.
Service The ID of the Ethernet service to which the ERPI belongs.
User Instance The MSTI to which the Ethernet service is mapped.
Ring State Indicates the current ERPI state. Possible values are:
Initializing
Idle
Pending
Protecting
FS (Forced Switch)
MS (Manual Switch)
West SP The interface to which the west ERPI service point belongs.
East SP The interface to which the east ERPI service point belongs.
Sub-Ring SP The interface to which the ERPI service point that connects the
Ring to the Sub-Ring belongs.
ERPI Type The ERPI type (Ring, Sub-Ring, or Ring with Sub-Ring).
MEG Level The Maintenance Entity Group (MEG) level used for R-APS
messages sent in the ERPI.
Version The ERPI (G.8032) protocol version currently being used in the
unit.
Virtual Channel Reserved for future use.
RPL Owner Indicates whether the ERPI is currently an RPL owner, and if it is,
which ERPI port is the owner.
Revertive Indicates whether the ERPI is currently in revertive mode.
WTR The Wait to Restore (WTR) timer. This timer sets the minimum
time (in minutes) the system waits after signal failure before
entering revertive mode.
Guard Time The minimum time (in msec) the system waits after recovery
from a signal failure before accepting new R-APS messages. The
purpose of this timer is to prevent unnecessary state changes
that might be caused by outdated messages.
Hold-Off Time The minimum time (in msec) the system waits before reacting to
a signal failure.
SD Handling Reserved for future use.
West SP SD Capacity Threshold Reserved for future use.
East SP SD Capacity Threshold Reserved for future use.
Sub-Ring SP SD Capacity Reserved for future use.
Threshold
Local State The current local state input to the ERPI state machine.
Remote State The last event received from the other end of the link.
Parameter Description
Last HP Request The last high priority request.
Last Change Time The time of the last ring state transition.
To display the state of a specific service point, enter the following command in
root view:
root> ethernet g8032 show-erpi-sp-state erpi-id <erpi-id> SP
<SP>
The following command displays the current state of the East service point for
ERPI 1:
root> ethernet g8032 show-erpi-sp-state erpi-id 1 SP east
Parameter Description
TX R-APS RB The number of R-APS RPL Blocked (RB) frames that have been
transmitted via the service point.
TX R-APS SD The number of R-APS Signal Degrade (SD) frames that have been
transmitted via the service point.
TX R-APS FS The number of R-APS Forced Switch (FS) frames that have been
transmitted via the service point.
TX R-APS MS The number of R-APS Manual Switch (MS) frames that have been
transmitted via the service point.
TX R-APS Event Reserved for future use.
RX R-APS Frames The number of R-APS frames that have been received by the
service point.
RX Invalid R-APS Frames The number of R-APS frames with an invalid format that have been
received by the service point.
RX R-APS SF The number of R-APS Signal Fail (SF) frames that have been
received by the service point.
RX R-APS NR The number of R-APS No Request (NR) frames that have been
received by the service point.
TX R-APS RB The number of R-APS RPL Blocked (RB) frames that have been
transmitted by the service point.
TX R-APS SD The number of R-APS Signal Degrade (SD) frames that have been
transmitted by the service point.
TX R-APS FS The number of R-APS Forced Switch (FS) frames that have been
transmitted by the service point.
TX R-APS MS The number of R-APS Manual Switch (MS) frames that have been
transmitted by the service point.
TX R-APS Event Reserved for future use.
Disabling MSTP stops the MSTP protocol from running and sets all ports in all
MSTP instances to Forwarding state.
To disable MSTP on the unit, enter the following command in root view:
root> ethernet mstp mstp-disable
To display whether MSTP is currently enabled or disabled on the unit, enter the
following command in root view:
root> ethernet mstp show-mstp-enabled
Note: Changing the number of MSTIs causes the MSTP stack to reset.
To display the number of MSTIs on the unit, enter the following command in root
view:
root> ethernet mstp show-number-of-instances
MSTI Number 2-16 The number of MSTIs on the unit. This number
does not include the Common and Internal
Spanning Tree (CIST).
To display whether MSTP is or is not currently frozen in the unit, enter the
following command in root view:
root> ethernet mstp show-mstp-frozen
sd- Variable ignored ignored – Signal Degrade (SD) failures are ignored in
handling same-as-SF MSTP.
same-as-SF – MSTP handles SD failures the same as
Signal Failure, i.e., an SD failure triggers a topology
change.
To display the service to MSTI mapping for a specific service, enter the following
command in root view:
root> ethernet generalcfg instance-to-service-mapping show
service sid <sid>
To display the service to MSTI mapping for a range of services, enter the following
command in root view:
root> ethernet generalcfg instance-to-service-mapping show
service sid <sid> to <sid>
The following command displays the service to MSTI mapping for services 1
through 1000:
root> ethernet generalcfg instance-to-service-mapping show
service sid 1 to 1000
To set the CIST hold time, enter the following command in root view:
root> ethernet mstp set cist-bridge-hold-time <cist-bridge-
hold-time>
To set the CIST maximum age, enter the following command in root view:
root> ethernet mstp set cist-bridge-max-age <cist-bridge-max-
age>
To set the CIST forward delay, enter the following command in root view:
root> ethernet mstp set cist-bridge-forward-delay <cist-bridge-
forward-delay>
To set the CIST Hello Time, enter the following command in root view:
root> ethernet mstp set cist-bridge-hello-time <cist-bridge-
hello-time>
To set the CIST maximum number of hops, enter the following command in root
view:
root> ethernet mstp set cist-bridge-max-hops <cist-bridge-max-
hops>
To display the bridge parameters of an MSTI, enter the following command in root
view:
root> ethernet mstp show-msti-attributes instance <msti-id>
instance Number 1-16 Enter the MSTI ID of the MSTI you want to
configure.
msti- Number 0-61440, in steps of The MSTI writeable portion of the Bridge ID.
bridge- 4096.
priority
interface Variable eth Enter the type of interface:
radio eth – Ethernet
pwe
radio – Radio
pwe – TDM
The following command sets the bridge priority for MSTI 15 to 28672:
root> ethernet mstp set instance 15 msti-bridge-priority 28672
To set the CIST port priority of an interface group, enter the following command in
root view:
root> ethernet mstp set group <group> cist-port-priority <cist-
port-priority>
To set the CIST path cost of a port, enter the following command in root view:
root> ethernet mstp set interface <interface> slot <slot> port
<port> cist-port-path-cost <cist-port-path-cost>
To set the CIST path cost of an interface group, enter the following command in
root view:
root> ethernet mstp set group <group> cist-port-path-cost
<cist-port-path-cost>
To set a port's administrative edge port parameter for the CIST, enter the
following command in root view:
root> ethernet mstp set interface <interface> slot <slot> port
<port> cist-port-edge-port <cist-port-edge-port>
To set an interface group's administrative edge port parameter for the CIST, enter
the following command in root view:
root> ethernet mstp set group <group> cist-port-edge-port
<cist-port-edge-port>
To set a port's MAC Enabled parameter for the CIST, enter the following command
in root view:
root> ethernet mstp set interface <interface> slot <slot> port
<port> cist-port-mac-enabled <cist-port-mac-enabled>
To set an interface group's MAC Enabled parameter for the CIST, enter the
following command in root view:
root> ethernet mstp set group <group> cist-port-mac-enabled
<cist-port-mac-enabled
To display a port's CIST parameters, enter the following command in root view:
root> ethernet mstp show-cist-port-attributes interface
<interface> slot <slot> port <port>
The following command sets the CIST port priority for Ethernet port 2 to 192:
root> ethernet mstp set interface eth slot 1 port 2 cist-port-
priority 192
The following command sets the CIST port priority for HSB protection group 1 to
192:
root> ethernet mstp set group rp1 cist-port-priority 192
The following command sets the CIST path cost for Ethernet port 1 to 20,000:
root> ethernet mstp set interface eth slot 1 port 1 cist-path-
cost 20000
The following command sets the CIST path cost for LAG 1 to 20,000:
root> ethernet mstp set group lag1 cist-path-cost 20000
The following command sets fixed radio interface 1 to be an Edge port in the CIST:
root> ethernet mstp set interface radio slot 3 port 1 cist-
port-admin-edge true
The following command sets HSB protection group 1 to be an Edge port in the
CIST:
root> ethernet mstp set group rp1 cist-port-admin-edge true
The following command displays the CIST parameters of fixed radio interface 2:
root> ethernet mstp show-cist-port-attributes interface radio
slot 2 port 2
To set the port priority for an MSTI and an interface group, enter the following
command in root view:
root> ethernet mstp set instance <instance> group <group> msti-
port-priority <msti-port-priority>
To set the path cost for a port in a specific MSTI, enter the following command in
root view:
root> ethernet mstp set instance <instance> interface
<interface> slot <slot> port <port> msti-port-path-cost <msti-
port-path-cost>
To set the path cost for an interface group in a specific MSTI, enter the following
command in root view:
root> ethernet mstp set instance <instance> group <group> msti-
port-path-cost <msti-port-path-cost>
To display the MSTI parameters for a specific MSTI and port, enter the following
command in root view:
root> ethernet mstp show-msti-port-attributes instance
<instance> interface <interface> slot <slot> port <port>
To display the MSTI parameters for a specific MSTI and interface group, enter the
following command in root view:
root> ethernet mstp show-msti-port-attributes instance
<instance> group <group>
instance Number 1-16 Enter the MSTI ID of the MSTI you want to
configure.
interface Variable eth Enter the type of interface:
radio eth – Ethernet
radio – Radio
The following command sets the MSTI port priority for MSTI 14 on Ethernet port 2
to 192:
root> ethernet mstp set instance 14 interface eth slot 1 port 2
msti-port-priority 192
The following command sets the MSTI port priority for MSTI 14 on LAG 1 to 192:
root> ethernet mstp set instance 14 group lag1 msti-port-
priority 192
The following command sets the MSTI path cost for MSTI 12 on Ethernet port 3 to
20000:
root> ethernet mstp set instance 12 interface eth slot 1 port 3
msti-port-path-cost 20000
The following command sets the MSTI path cost for MSTI 12 on HSB protection
group 1 to 20000:
root> ethernet mstp set instance 12 group rp1 msti-port-path-
cost 20000
The following command displays the MSTI parameters for MSTI 10 and radio
interface 1:
root> ethernet mstp show-msti-port-attributes instance 10
interface radio slot 2 port 1
The following command displays the MSTI parameters for MSTI 10 and LAG 1:
root> ethernet mstp show-msti-port-attributes instance 10 group
lag1
To view the BPDU counters for an interface group, enter the following command
in root view:
root> ethernet mstp show-port-counters group <group>
To reset the BPDU counters, enter the following command in root view:
root> ethernet mstp reset-counters
To set the Admin status of an ABN entity, enter the following command in root
view:
root> ethernet abn abn-admin-set abn-name <abn-name> admin
<admin-state>
To show a summary of all ABN entities defined, enter the following command in
root view:
root> ethernet abn abn-entities-summary-show
To show a summary of the configuration and status of a specific ABN entity, enter
the following command in root view:
root> ethernet abn abn-entity-show abn-name <abn-name>
To set the monitoring interval for which a weighted average of the bandwidth
readings is calculated, enter the following command in root view:
root> ethernet abn abn-monitoring-interval-set abn-name <abn-
name> period <monitoring-interval>
To set how often messages are transmitted when bandwidth is below the nominal
value, enter the following command in root view:
root> ethernet abn abn-period-set abn-name <abn-name> period
<message-frequency>
To set the holdoff time, enter the following command in root view. Holdoff time is
the amount of time the system waits when bandwidth degradation occurs, before
transmitting a message. If the bandwidth is below the nominal value when the
holdoff period ends, the system starts transmitting messages:
root> ethernet abn abn-holdoff-set abn-name <abn-name> holdoff
<holdoff-time>
To clear the messages counter, enter the following command in root view:
root> ethernet abn abn-entity-counter-reset abn-name <abn-name>
The following command creates an ABN entity with radio interface 1 as the
monitored interface and Ethernet port 1 as the control interface. It also specifies
to transmit bandwidth messages on VLAN 1:
root> ethernet abn abn-entity-create abn-name ABN-1 monitored-
interface radio monitored-slot 1 monitored-port 1 control-
interface ethernet control-slot 1 control-port 1 vlan 1
The following command creates an ABN entity in an IP-20C or IP-20C-HP unit with
radio interface 2 as the monitored interface and LAG group lag1 as the control
interface. It also specifies to transmit bandwidth messages on VLAN 55:
root> ethernet abn abn-entity-create abn-name ABN-3 monitored-
interface radio monitored-slot 1 monitored-port 2 control-group
lag1 vlan 55
The following command creates an ABN entity in an IP-20C or IP-20C-HP unit with
HSB protection group rp1 as the monitored interface and Ethernet port 2 as the
control interface. It also specifies to transmit bandwidth messages on VLAN 200:
root> ethernet abn abn-entity-create abn-name ABN-4 monitored-
group rp1 control-interface ethernet control-slot 1 control-
port 2 vlan 200
The following command creates an ABN entity in an IP-20C or IP-20C-HP unit with
HSB protection group rp1 as the monitored interface and LAG group lag1 as the
control interface. It also specifies to transmit bandwidth messages on VLAN 300:
To change the name of an ETH-BN entity, enter the following command in root
view:
root> ethernet ebn ebn-name-set ebn-name <ebn-name> new-ebn-
name <ebn-name>
To set the Admin status of an ETH-BN entity, enter the following command in root
view:
root> ethernet ebn ebn-admin-set ebn-name <ebn-name> admin
<admin-state>
To set the Maintenance Level of messages sent by the ETH-BN entity, enter the
following command in root view:
root> ethernet ebn ebn-mel-set ebn-name <ebn-name> mel <mel>
Note: If CFM MEPs are being used, the MEL must be set to a value greater
than the MEG level of the MEP. Otherwise, the BNM frames will be
dropped.
If CFM MEPs are not being used, the MEL for ETH-BN must be set to a
value greater than 0. Otherwise, the BNM frames will be dropped.
To set the VLAN with which messages sent by the ETH-BN entity are transmitted,
enter the following command in root view:
root> ethernet ebn ebn-vlan-set ebn-name <ebn-name> vlan <vlan>
To determine whether periodic BNM frames should be sent even when there is no
bandwidth degradation in the monitored interface, enter the following command
in root view:
root> ethernet ebn ebn-is-always-send ebn-name <string> is-
always-send <is-always-send>
To show a summary of all ETH-BN entities defined, enter the following command
in root view:
root> ethernet ebn ebn-entities-summary-show
To show a summary of the configuration and status of a specific ABN entity, enter
the following command in root view:
root> ethernet ebn ebn-entity-show ebn-name <ebn-name>
To set how often messages are transmitted when bandwidth is below the nominal
value, enter the following command in root view:
root> ethernet ebn ebn-period-set ebn-name <ebn-name> period
<period>
To set the holdoff time, enter the following command in root view. Holdoff time is
the amount of time the system waits when bandwidth degradation occurs, before
transmitting a message. If the bandwidth is below the nominal value when the
holdoff period ends, the system starts transmitting messages:
root> ethernet ebn ebn-holdoff-set ebn-name <ebn-name> holdoff
<holdoff-time>
To clear the messages counter, enter the following command in root view:
root> ethernet ebn ebn-entity-counter-reset ebn-name <ebn-name>
The following command creates an EBN entity with the following attributes:
• The name of the EBN entity is Test.
• The monitored radio interface is interface 1
• The Ethernet control interface is Ethernet port 1
• The MEL is set to 7.
• BNM frames are only sent when the current bandwidth is lower than the
nominal bandwidth.
• When the current bandwidth is below the nominal value, BNM frames are
sent every 60 seconds, after a holdoff time of 10 seconds.
• BNM frames are untagged
root>ethernet ebn ebn-entity-create ebn-name Test monitored-
interface radio monitored-slot 1 monitored-port 1 control-
interface eth control-slot 1 control-port 7 vlan untag
root>
The time-to-live (TTL) determines the length of time LLDP frames are retained by
the receiving device. The TTL is determined by multiplying the Transmit Interval by
the TTL Multiplier.
To define the TTL Multiplier, enter the following command in root view:
root> ethernet lldp tx-hold-multiplier-set hold-multiplier
<hold-multiplier>
The following commands set the Transmit Interval to 50 seconds with a TTL
Multiplier of 5. This produces a TTL of 4 minutes and 10 seconds.
root> ethernet lldp tx-interval-set tx-interval 50
root> ethernet lldp tx-hold-multiplier-set hold-multiplier 50
• Message Fast Init - The initial value used to initialize the variable which
determines the number of transmissions that are made during fast
transmission periods. In this release, this parameter is set at 4.
To enable or disable LLDP notifications to the NMS on a specific port, enter the
following command in root view:
root> ethernet lldp agent-notif-enable interface eth slot
<slot> port <port> agent-notif-enable <agent-notif-enable>
The following commands configure Ethernet port 2 to transmit and receive LLDP
frames and to send a Topology Change trap to the NMS whenever the system
information of its peer changes:
◦ 5 - telephone
◦ 6 - docsisCableDevice
◦ 7 - stationOnly
◦ 8 - cVLANComponent
◦ 9 - sVLANComponent
◦ 10 - twoPortMACRelay
• Rem System Cap Enabled - The bitmap value used to identify which system
capabilities are enabled on the peer. The bitmap is defined by the following
parameters:
◦ 0 - other
◦ 1 - repeater
◦ 2 - bridge
◦ 3 - wlanAccessPoint
◦ 4 - router
◦ 5 - telephone
◦ 6 - docsisCableDevice
◦ 7 - stationOnly
◦ 8 - cVLANComponent
◦ 9 - sVLANComponent
◦ 10 - twoPortMACRelay
• Remote Changes - Indicates whether there are changes in the peer's MIB, as
determined by the variable remoteChanges. Possible values are:
◦ True - Changes have taken place in the peer's MIB since the defined agent-
start-time.
◦ False - No changes have taken place in the peer's MIB since the
defined agent-start-time.
19.5.6.2 Displaying the LLDP Remote Management Data per Port (CLI)
To display remote LLDP management data from a specific port, starting from a
specific time, enter the following command in root view. If no time is specified, all
data is displayed.
root> ethernet lldp agent-remote-mng-show agent-start-time
<agent-start-time> interface eth slot <slot> port <port>
Table 254: LLDP Remote Management Data Per Port CLI Parameters
Parameter Input Type Permitted Values Description
slot Number 1
port Number 1-3 The port for which you want to
configure LLDP.
agent-start-time Date Use the format: The sys-up-time of the entry
dd-mm- creation.
yyyy,hh:mm:ss
By default, the Sync mode is set to Automatic. To display the current Sync mode,
enter the following command in root view:
root> platform sync mode show
To change the first interface in a SyncE pipe, enter the following command in root
view:
root> platform sync pipe edit interface-1 pipe-id <pipe-id>
interface-1-type <interface-1-type> slot <slot> port <port>
To change the second interface in a SyncE pipe, enter the following command in
root view:
root> platform sync pipe edit interface-1 pipe-id <pipe-id>
interface-2-type <interface-2-type> slot <slot> port <port>
To remove all SyncE Regenerators (pipes), enter the following command in root
view:
root> platform sync pipe remove all
To view the configured SyncE pipes, enter the following command in root view:
root> platform sync pipe show
The following command configures a SyncE pipe between Ethernet port 1 and
radio interface 1:
root> platform sync pipe add pipe-id 1 interface-1-type
ethernet slot 1 port 1 interface-2-type radio slot 2 port 1
The following command changes the first interface in the pipe from ethernet port
1 to Ethernet port 2:
root> platform sync pipe edit interface-1 pipe-id 1 interface-
1-type ethernet slot 1 port 2
The following command changes the second interface in the pipe from radio
interface 1 to radio interface 2:
root> platform sync pipe edit interface-2 pipe-id 1 interface-
2-type radio slot 2 port 2
The following command changes the ETSI/ANSI mode from the default value of
ETSI to ANSI mode:
root> platform management set interfaces-standard ansi
To display the current ETSI/ANSI mode, enter the following command in root
view:
root> platform management show interfaces-standard
If the Sync mode is set to pipe, you must set it to automatic by entering the
following CLI command in root view:
root> platform sync mode set automatic
When configuring an Ethernet interface as a Sync source, the Media Type of the
interface must be rj45 or sfp, not auto-type. To view and configure the Media
Type of an Ethernet interface, see Configuring an Interface’s Media Type (CLI).
This section includes:
• Configuring an Ethernet Interface as a Synchronization Source (CLI)
• Configuring a Radio Interface as a Synchronization Source (CLI)
• Clearing All Sync Sources (CLI)
slot Number 1
port Number 1-3 (IP-20E only) The interface to be configured as a
synchronization source.
priority Number 1 – 16 The priority of this synchronization source
relative to other synchronization sources
configured in the unit.
slot Number 2
port Number 1-2
radio-channel Number 0 – 85 Must be set to 0.
priority Number 1 – 16 The priority of this synchronization source
relative to other synchronization sources
configured in the unit.
quality Variable For ETSI systems: The quality level applied to the selected
• automatic synchronization source. This enables the
system to select the source with the
• prc highest quality as the current
• ssu-a synchronization source.
• ssu-b If the quality is set to automatic, then the
quality is determined by the received
• g813.8262
SSMs. If no valid SSM messages are
For ANSI (FCC) received or in case of interface failure (such
systems: as LOS, LOC, LOF), the quality becomes
• automatic "failure."
• prs SSM must be enabled on the remote
• stratum-2 interface in order for the interface to
• transit- receive SSM messages.
node
• stratum-3e
• stratum-3
• smc
• unknown
The following command changes the priority of this synchronization source to 14:
root> platform sync source edit radio-interface slot 2 port 1
radio-channel 0 priority 14
If the Sync mode is set to pipe, you must set it to automatic by entering the
following command in root view:
root> platform sync mode set automatic
To set the interface clock for a radio interface, enter the following command in
root view:
root> platform sync interface-clock set radio-interface slot
<slot> port <port> radio-channel <radio-channel> source
<source>
To set the interface clock for an Ethernet interface, enter the following command
in root view:
root> platform sync interface-clock set eth-interface slot
<slot> port <port> source <source>
The following command sets the clock source for radio interface 2 to its internal
clock:
root> platform sync interface-clock set radio-interface slot 2
port 2 radio-channel 0 source local-clock
The following command sets the clock source for Ethernet port 2 to the system
clock:
root> platform sync interface-clock set eth-interface slot 1
port 2 source system-clock
If the Sync mode is set to pipe, you must set it to automatic by entering the
following command in root view:
root> platform sync mode set automatic
To enable SSM on a radio interface, enter the following command in root view:
root> platform sync ssm admin radio-interface slot <slot> port
<port> admin on
To disable SSM on a radio interface, enter the following command in root view:
root> platform sync ssm admin radio-interface slot <slot> port
<port> admin off
To display the synchronization source status, enter the following command in root
view:
root> platform sync source status show
To display the current system reference clock quality, enter the following
command in root view:
root> platform sync source show-reference-clock-quality
|=============================================================|
| Slot | Port | Type | Trail Radio | Source-Type | SSM-Admin |
|=============================================================|
| 1 | 1 | Ethernet | | System Clock | Off |
| 1 | 2 | Ethernet | | System Clock | Off |
| 1 | 3 | Ethernet | | System Clock | Off |
| 2 | 1 | Radio | | System Clock | On |
| 2 | 2 | Radio | | System Clock | On |
|=============================================================|
To display the current system clock status, enter the following command in root
view:
root> platform sync clu-state show
The direction parameter must be set to different values on the two sides of the
link, so that if you set the local side to upstream, you must set the remote side to
downstream, and vice versa. Otherwise than that, it does not matter how you set
this parameter.
To display the Transparent Clock settings, enter the following command in root
view:
root> platform sync ptp-tc show status
The following commands enable Transparent Clock on Multi-Carrier ABC group 1 and
configure the radio to send PTP packets upstream:
root> platform sync ptp-tc set group id mc-abc1 direction upstream
slot Number 2
port Number 1-2
group Variable mc-abc1
8 1588 packets should be mapped to CoS 7. By default, 1588 packets are not
mapped to any CoS. To map 1588 packets to CoS 7, you must disable CoS
preservation for 1588 packets. This must be performed via CLI, using the
following command:
root> ethernet generalcfg ptp-tc cos-preserve set admin disable
9 To map 1588 packets to CoS 7, enter the following command:
root> ethernet generalcfg ptp-tc cos-preserve cos value 7
After you enter these commands, 1588 packets will automatically be mapped
to CoS 7.
Note: If necessary, you can use the ethernet generalcfg ptp-tc cos-
preserve cos value command to map a different CoS value (0-7) to
1588 packets, but it is recommended to map 1588 packets to CoS 7.
To display the currently configured session timeout period, enter the following
command in root view:
root> platform security protocols-control session inactivity-
timeout show
The following command sets the session inactivity timeout period to 30 minutes:
root> platform security protocols-control session inactivity-
timeout set 30
To define the period (in minutes) for which a user is blocked after the configured
number of failed login attempts, enter the following command in root view:
root> platform security access-control block-failure-login
period set <period>
To display the current failed login attempt blocking parameters, enter the
following command in root view:
root> platform security access-control block-failure-login show
The following commands configure a blocking period of 45 minutes for users that
perform 5 consecutive failed login attempts:
root> platform security access-control block-failure-login
attempt set 5
Once the user is blocked, you can use the following command to unblock the user:
root> platform security access-control user-account block user-
name <user-name> block no
To manually block a specific user, enter the following command in root view:
root> platform security access-control user-account block user-
name <user-name> block yes
To display the currently configured blocking of unused account period, enter the
following command in root view:
root> platform security access-control block-unused-account
show
The following command configures the system to block any user that does not log
into the system for 50 days:
root> platform security access-control block-unused-account
period set 50
The following commands block, then unblock, a user with the user name
John_Smith:
root> platform security access-control user-account block user-
name John_Smith block yes
To require users to change their password the first time they log in, enter the
following command in root view:
root> platform security access-control password first-login set
yes
Table 265: Force Password Change on First Time Login CLI Parameters
Parameter Input Type Permitted Values Description
To create a new user profile with default settings, enter the following command:
root> platform security access-control profile add name
<profile-name>
The following commands create a user profile called “operator” and give users to
whom this profile is assigned normal write privileges for all system functionality
and advanced read privileges for all functionality except security features.
root> platform security access-control profile add name
operator
The following command prevents users with the user profile “operator” from
accessing the system via NMS:
root> platform security access-control profile edit mng-channel
name operator channel-type NMS allowed no
When you create a new user account, the system will prompt you to enter a
default password. If Enforce Password Strength is activated (refer to Configuring
Password Strength Enforcement (CLI)), the password must meet the following
criteria:
• Password length must be at least eight characters.
• Password must include characters of at least three of the following character
types: lower case letters, upper case letters, digits, and special characters. For
purposes of meeting this requirement, upper case letters at the beginning of
the password and digits at the end of the password are not counted.
• The last five passwords you used cannot be reused.
To block or unblock a user account, enter the following command:
root> platform security access-control user-account block user-
name <user-name> block <block>
To display all user accounts configured on the unit and their settings, including
whether the user is currently logged in and the time of the user's last logout,
enter the following command:
root> platform security access-control user-account show
To display the settings of a specific user account, enter the following command:
root> platform security access-control user-account show user-
name <user-name>
The following command creates a user account named Tom_Jones, with user
profile “operator”. This user’s account expires on February 1, 2024.
root> platform security access-control user-account add user-
name Tom_Jones profile-name operator expired-date 2024-02-01
The following command configures Radius server attributes for the primary Radius
server:
root> platform security radius-server-communication-ipv4 set
server-id 1 ip-address 192.168.1.99 port 1812 retries 5 timeout
10 secret U8glp3KJ6FKGksdgase4IQ9FMm
The timeout determines how long to wait for a response from the TACACS+ server
until the connection attempt times out. When a connection attempt times out,
the device attempts to contact the next configured TACACS+ server.
To define the number of retries, enter the following command in root view:
root> platform security tacacs-plus set retry <1-5>
This sets the number of times the device will attempt to contact each server
before moving on to the next server on the list. The default value is 1.
To set the TACACS+ server attributes, enter one of the following commands,
depending on whether you want to configure the TACACS+ server’s IP address in
IPv4 or IPv6 format. You can configure up to four TACACS+ servers. When
authenticating a user, the device contacts attempts to contact the TACACS+
servers in the order of the Server IDs you assign to each server. If no response is
received from Server 1 within the user-defined timeout period, the device
attempts to contact Server 2, then Server 3, then Server 4. If no response is
received from any of the servers, the device performs user authentication locally.
Note: You cannot enter both an IPV4 and an IPV6 address. Whichever format
you enter, the other field must be left blank.
To determine the authentication type for TACACS+, enter the following command
in root view:
root> platform security tacacs-plus set authentication type
<ascii|pap|chap>
To display the current TACACS+ configuration and status for the device, enter the
following command in root view:
root>platform security tacacs-plus show
The following user information is displayed, for each currently connected remote
access user:
• User Name – The user name
• Access Channels – The permitted access channels.
• Number of Active Sessions – The number of currently open sessions.
• Security Func Group Read level – The Read access level in the Security
functional group: None, Regular or Advanced.
• Security Func Group Write level – The Write access level in the Security
functional group: None, Regular or Advanced.
• Management Func Group Read level – The Read access level in the
Management functional group: None, Regular or Advanced.
• Management Func Group Write level – The Write access level in the
Management functional group: None, Regular or Advanced.
• Radio Func Group Read level – The Read access level in the Radio functional
group: None, Regular or Advanced.
• Radio Func Group Write level – The Write access level in the Radio functional
group: None, Regular or Advanced.
• TDM Func Group Read level – The Read access level in the TDM functional
group: None, Regular or Advanced.
• TDM Func Group Write level – The Write access level in the TDM functional
group: None, Regular or Advanced.
• Eth Func Group Read level – The Read access level in the Eth functional
group: None, Regular or Advanced.
• Eth Func Group Write level – The Write access level in the Eth functional
group: None, Regular or Advanced.
• Sync Func Group Read level – The Read access level in the Sync functional
group: None, Regular or Advanced.
• Sync Func Group Write level – The Write access level in the Sync functional
group: None, Regular or Advanced.
To display the currently-configured SFTP parameters for CSR upload, enter the
following command in root view:
root> platform security csr-show-server-parameters
To generate and upload a CSR, enter the following command in root view:
root> platform security csr-generate-and-upload
To display the status of a pending CSR generation and upload operation, enter the
following command in root view:
root> platform security csr-generate-and-upload-show-status
server-ipv4 Dotted decimal Any valid IPv4 IP The IPv4 address of the PC or laptop
format. address. you are using as the SFTP server.
server-ipv6 Eight groups of Any valid IPv6 The IPv6 address of the PC or laptop
four address. you are using as the SFTP server.
hexadecimal
Note: Make sure you have installed a valid certificate in the IP-20 before
changing the web interface protocol to HTTPS. Failure to do this may
prevent users from accessing the Web EMS.
To change the protocol back to HTTP, enter the following command in root view:
root> platform security url-protocol-set url-protocol http
To install the RSA key, enter the following command in root view:
root> platform security rsa-install
server-ipv4 Dotted decimal Any valid IPv4 IP The IPv4 address of the PC or laptop you are
format. address. using as the SFTP server.
server-ipv6 Eight groups of Any valid IPv6 The IPv6 address of the PC or laptop you are
four address. using as the SFTP server.
hexadecimal
digits separated
by colons.
server-path Text String The directory path from which you are
downloading the RSA key. Enter the path
relative to the SFTP user's home directory,
not the absolute path. If the location is the
home directory, it should be populated with
"". If the location is a sub-folder under the
home directory, specify the folder name. If
the shared folder is "C:\", this parameter can
be populated with "".
filename Text String The RSA key file’s name in the SFTP server.
username Text String The user name for the SFTP session.
password Text String The password for the SFTP session. To
configure the SFTP settings without a
password, populate this parameter with “”..
Note: When you block telnet, any current telnet sessions are immediately
disconnected.
To display the FTP channel parameters for uploading the security log, enter the
following command in root view:
root> platform security file-transfer show configuration
To upload the security log to your FTP server, enter the following command in
root view:
root> platform security file-transfer operation set upload-
security-log
To display the progress of a current security log upload operation, enter the
following command in root view:
root> platform security file-transfer show operation
To display the result of the most recent current security log upload operation,
enter the following command in root view:
root> platform security file-transfer show status
The following commands configure an FTP channel for security log upload to IP
address 192.168.1.80, in the directory “current”, with file name
“security_log_Oct8.zip”, user name “anonymous”, and password “12345”, and
initiate the upload:
root> platform security file-transfer set server-path \current
file-name security_log_Oct8.zip ip-address 192.168.1.80
protocol ftp username anonymous password 12345
To display the FTP or SFTP parameters for configuration log export, enter the
following command in root view:
root> platform security configuration-log-upload-params show
To export the configuration log, enter the following command in root view:
root> platform security configuration-log upload
To display the status of a configuration log export operation, enter the following
command in root view
root> platform security configuration-log-upload-status show
Note: The path and fie name, together, cannot be more than:
If the IP address family is configured to be IPv4: 236 characters
If the IP address family is configured to be IPv6: 220 characters
The following commands configure an FTP channel for configuration log export to
IP address 192.168.1.99, in the directory “current”, with file name “cfg_log”, user
name “anonymous”, and password “12345.”
root> platform security configuration-log-upload-params set
path \file-name cfg_log ip-address 192.168.1.99 protocol ftp
username anonymous password 12345
The following command exports the configuration log to the external server
location:
root> platform security configuration-log upload
To display the current NETCONF configuration on the device, enter the following
command in root view:
root>platform security protocols-control netconf show-all
To display the most severe alarm currently raised in the unit, enter the following
command in root view:
root> platform status current-alarm show most-severe-alarm
module unit
To clear the event log, enter the following command in root view:
root> platform status event-log clear module unit
Note: You can save the event log to a CSV file from the Web EMS. See
Viewing and Saving the Event Log.
To display the attributes of a specific alarm, enter the following command in root
view:
root> platform status alarm-management show alarm-id <alarm-id>
attributes
alarm-id Number All valid alarm type IDs, Enter the unique Alarm ID that identifies
depending on system the alarm type.
configuration
severity- Variable indeterminate The severity of the alarm, as displayed to
level critical users.
major
minor
warning
additional- Text String 255 characters An additional text description of the alarm
text type.
The following command changes the severity level of alarm type 401 (Loss of
Carrier) to minor:
root> platform status alarm-management set alarm-id 401
severity-level minor
To restore the severity levels and descriptions of all alarm types to their default
values, enter the following command in root view:
root> platform status alarm-management set all default
alarm-id Number All valid alarm type Enter the unique Alarm ID that
IDs, depending on identifies the alarm type.
system configuration
The following command restores alarm type 401 (Loss of Carrier) to its default
severity level:
root> platform status alarm-management set alarm-id 401 restore
default
To disable the timeout for trap generation, enter the following command in root view:
root> platform status alarm-management alarm-stabilization-set
time 0
To display the current trap generation timeout, enter the following command in root
view:
root> platform status alarm-management alarm-stabilization-show
To display a list of all disabled alarms and events, and their attributes, enter the
following command in root view:
root> platform status alarm-management show all admin disable attributes
To display a list of all enabled alarms and events and their attributes, enter the
following command in root view:
root> platform status alarm-management show all admin enable attributes
To enable all alarms and events, enter the following command in root view:
root> platform status alarm-management set all admin default
To change the threshold for raising an undervoltage alarm, enter the following
command in root view:
root> platform management undervoltage set raise-threshold <0-100>
To change the threshold for clearing an undervoltage alarm, enter the following
command in root view:
root> platform management undervoltage set clear-threshold <0-100>
To change the threshold for raising an overvoltage alarm, enter the following
command in root view:
root> platform management overvoltage set raise-threshold <0-100>
To change the threshold for clearing an overvoltage alarm, enter the following
command in root view:
root> platform management overvoltage set clear-threshold <0-100>
You can display voltage PMs that indicate, per 15-minute and 24-hour periods:
• The number of seconds the unit was in an undervoltage state during the
measured period.
• The number of seconds the unit was in an overvoltage state during the
measured period.
• The lowest voltage during the measured period.
• The highest voltage during the measured period.
To display voltage PMs, enter the following command in root view:
root> platform management voltage pm show pm-interval-type
<all|15min|24hr>
For example:
To set the protocol for unit information file export, enter the following command
in root view.
root> platform unit-info channel set protocol <protocol>
To display the FTP or SFTP parameters for unit information file export, enter one
of the following commands in root view:
root> platform unit-info-file channel show
root> platform unit-info-file channel-ipv6 show
To create a unit information file based on the current state of the system, enter
the following command in root view:
root> platform unit-info-file create
To export the unit information file you just created, enter the following command
in root view:
root> platform unit-info-file export
To display the status of a unit information file export operation, enter the
following command in root view
root> platform unit-info-file status show
server-ipv4 Dotted decimal Any valid IPv4 The IPv4 address of the PC or laptop
format. address. you are using as the FTP or SFTP
server.
server-ipv6 Eight groups of Any valid IPv6 The IPv6 address of the PC or laptop
four address. you are using as the FTP or SFTP
hexadecimal server.
digits separated
by colons.
directory Text String The directory path to which you are
exporting the unit information file.
Enter the path relative to the FTP or
SFTP user's home directory, not the
absolute path. If the location is the
home directory, it should be left
empty. If the location is a sub-folder
under the home directory, specify the
folder name. If the shared folder is
"C:\", this parameter can be left empty
or populated with "//".
filename Text String The name you want to give the file you
are exporting.
Note: You must add the suffix .zip to
the file name. Otherwise, the file
import may fail. You can export the
file using any name, then add the
suffix .zip manually.
username Text String The user name for the FTP or SFTP
session.
password Text String The password for the FTP or SFTP
session. To configure the FTP or SFTP
settings without a password, simply
omit this parameter.
protocol Variable ftp The file transfer protocol.
sftp
The following commands configure an FTP or SFTP channel for configuration log
export to IP address 192.168.1.99, in the directory “current”, with file name
“cfg_log”, user name “anonymous”, and password “12345.”
root> platform security configuration-log-upload-params set
path \\ file-name cfg_log ip-address 192.168.1.99 protocol ftp
username anonymous password 12345
root> platform unit-info channel set protocol ftp
The following commands create a unit information file and export the file to the
external server location:
root> platform unit-info-file create
root> platform unit-info-file export
The following commands configures an FTP channel for unit information file
export to IP address 192.168.1.99, in the directory “current”, with file name
“version_8_backup.zip”, user name “anonymous”, and password “12345.”
root> platform unit-info channel server set ip-address
192.168.1.99 directory \current filename version_8_backup.zip
username anonymous password 12345
The following commands create a unit information file and export the file to the
external server location:
root> platform unit-info-file create
The logger-duration parameter is set in minutes. You can activate the logger on
one or (for IP-20C and IP-20C-HP) two radios in a single command. For example,
the following command activates the logger for 40 minutes on both carriers of an
IP-20C or IP-20C-HP device:
root> logger start logger-type radio logger-duration 40 slot1 2
port1 1 slot2 2 port2 2
To display whether the Radio Logger is currently active, enter the following
command in root view:
root> logger get status logger-type radio
For example, the following display indicates the Radio Logger has been set on
both carriers for 20 minutes, and that the Logger is set to run for an additional
1191 seconds:
root> logger get status logger-type radio
Logger status:
Logger duration(in minutes): 20
Logger time left(in seconds): 1191
Active instances list:
Slot 2 Port 1
Slot 2 Port 2
root>
To stop the Radio Logger manually, enter the following command in root view:
root> logger stop logger-type radio
To delete all data that has been saved by the Radio Logger, enter the following
command in root view:
root> logger delete logger files<logger-type>.
Important Note: Whenever you activate the Radio Logger, any previous Radio
Logger results are deleted.
To display the radio loopback timeout, enter the following command in radio
view:
radio[x/x]>radio loopbacks-timeout show
To configure the loopback duration time, go to interface view for the interface
and enter the following command:
eth type eth[x/x]> loopback set duration <loopback-duration>
You can select whether to swap DA and SA MAC addresses during the loopback.
Swapping addresses prevents Ethernet loops from occurring. It is recommended
to enable MAC address swapping if MSTP or LLDP is enabled.
To configure MAC address swapping, go to interface view for the interface and
enter the following command:
eth type eth[x/x]> loopback swap-mac-address admin <MAC_swap-
admin-state>
To view loopback status, go to interface view for the interface and enter the
following command:
eth type eth[x/x]> loopback status show
The following command sets the loopback duration time to 900 seconds:
eth type eth [1/2]> loopback set duration 900
The following command enables MAC address swapping during the loopback:
eth type eth [1/2]> loopback swap-mac-address admin enable
Note: Support for MDs with the MD format Character String is planned for
future release. In this release, the software enables you to configure
such MDs, but they have no functionality.
The following command creates MD 5, named TR-988 with maintenance level 5.
root> ethernet soam md create md-id 5 md-format none md-name
TR-988 md-level 5
To delete an MD, enter the following command in root view. Before deleting an
MD, you must delete any MA/MEG associated with the MD.
root> ethernet soam md delete md-id <md-id>
To display a list of MDs and their attributes, enter the following command in root
view:
root> ethernet soam md show
Note: In the current release, charString is the only available MEG name
format.
The following command creates MEG ID 1, named FR-10, with MEG level 4,
assigned to Ethernet service 20.
root> ethernet soam meg create meg-id 1 meg-fmt charString meg-
name FR-10 meg-level 4 service-id 20
To set the interval at which CCM messages are sent within the MEG, enter the
following command in root view:
root> ethernet soam meg ccm-interval set meg-id <meg-id> ccm <ccm>
The following command sets an interval of one second between CCM messages
for MEG 1.
root> ethernet soam meg ccm-interval set meg-id 1 ccm
interval1s
To determine whether MIPs are created on the MEG, enter the following
command in root view:
root> ethernet soam meg mip set meg-id <meg-id> mhf
<defMHFdefault|defMHFexplicit>
For example, the following command creates MIPs on any service point in the
MEG:
root> ethernet soam meg mip set meg-id 1 mhf defMHFdefault
Note: To can only delete a MEG if no MEPs or MIPs are attached to the MEP.
To display a list of all MEGs configured on the unit, enter the following command
in root view:
root> ethernet soam meg show
To display MEG attributes, including the number of MEPS, local MEPS, and MIPs
attached to the MEG, enter the following command in root view:
root> ethernet soam meg attributes show meg-id <meg-id>
To display a list of all MEPs that belong to a specific MEG, enter the following
command in root view:
root> ethernet soam meg mep show meg-id <meg-id>
To change a MEP from a local to a remote MEP, enter the following command in
root view:
root> ethernet soam mep delete meg-id <meg-id> mep-id <mep-id>
To display a list of local MEPs for a specific MEG, enter the following command in
root view:
root> ethernet soam meg local-mep show meg-id <meg-id>
For example:
To enable or disable the sending of CCM messages on a MEP, enter the following
command in root view:
root> ethernet soam mep ccm-enable set meg-id <meg-id> mep-id
<mep-id> enabled <ccm-enabled>
The following command assigns enables CCM messages for MEP 35 on MEG 2.
root> ethernet soam mep ccm-enable set meg-id 2 mep-id 35 enabled
true
To set a MEP’s CCM-LTM priority, enter the following command in root view:
root> ethernet soam mep ccm-ltm-prio set meg-id <meg-id> mep-id
<mep-id> ccm-ltm-priority <ccm-ltm-priority>
For example:
To display a list of remote MEPs (RMEPs) and their parameters per MEG and local
MEP, enter the following command in root view:
root> ethernet soam mep rmep list show meg-id <meg-id <meg-id>
mep-id <mep-id>
For example:
To display a list of remote MEPs (RMEPs) and their parameters per MEG and local
MEP, enter the following command in root view:
root> ethernet soam mep rmep show meg-id meg-id < meg-id <meg-
id> mep-id <mep-id> rmep-id <rmep-id>
For example:
MEG Parameters
MA ID The MA/MEG ID.
Format charString in the current release.
Name The MA/MEG name (43 characters).
Level The MEG Level (0-7).
Service The Service ID of the Ethernet service to which the MEG belongs.
CCM Interval The interval at which CCM messages are sent within the MEG.
Number of MEPs The number of MEPs that belong to the MEG.
Number of Local MEPs The number of local MEPs that belong to the MEG.
Number of MIPs The number of MIPs that belong to the MEG.
CCM and LTM Priority The p-bit included in CCMs sent by the MEP (0-7).
MEP MAC Address The MAC address of the service point associated with the MEP.
MEP Lowest priority fault The lowest defect priority that can trigger alarm generation. Defects
alarm with a lower priority will not trigger alarms.
MEP Alarm on time The amount of time that defects must be present before an alarm is
generated, in msec intervals (250-1000).
MEP Alarm Clear Time The amount of time that defects must be absent before an alarm is
cleared, msec intervals (250-1000).
Sequence errors CCM The number of out-of-sequence CCM messages received.
Frames
CCM Messages TX The number of transmitted CCM messages.
RMEP Parameters
MepId The MEP ID of the local MEP paired with the remote MEP.
Rmep Id The remote MEP ID.
operState The operational state of the remote MEP.
OKorFail Time The timestamp marked by the remote MEP indicating the most recent
CCM OK or failure it recorded. If none, this field indicates the amount
of time, in msec intervals, since SOAM was activated.
MAC The MAC Address of the interface on which the remote MEP is
located.
Rdi Displays the state of the RDI (Remote Defect Indicator) bit in the most
recent CCM received by the remote MEP:
• True – RDI was received in the last CCM.
• False – No RDI was received in the last CCM.
Port Status The Port Status TLV in the most recent CCM received from the remote
MEP.
Reserved for future use.
Interface Status The Interface Status TLV in the most recent CCM received from the
remote MEP. Indicates the operational status of the interface (Up or
Down).
Chassis ID Format Displays the address format of the remote chassis (in the current
release, MAC Address).
Chassis ID Displays the MAC Address of the remote chassis.
Mng Addr Domain Displays the BASE MAC address of the remote unit (the unit on which
the remote MEP resides).
For example:
To display the same information without the last RX error CCM and fault
messages, enter the following command in root view:
root> ethernet soam mep status general show meg-id <meg-id>
mep-id <mep-id> detailed no
The Last RX error CCM message field displays the frame of the last CCM that
contains an error received by the MEP.
The Last RX Xcon fault message field displays the frame of the last CCM that
contains a cross-connect error received by the MEP.
Note: A cross-connect error occurs when a CCM is received from a remote
MEP that has not been defined locally.
For example, the following command sets the loopback interval for MEP 25 on
MEG 1 to 5 seconds:
root> ethernet soam loopback interval set meg-id 1 mep-id 25
interval 5000
To set the loopback message frame size and data pattern, enter the following
command in root view:
root> ethernet soam loopback data set meg-id <meg-id> mep-id
<mep-id> size <size> pattern <pattern>
For example, the following command sets the loopback frame size to 128 and the
pattern to zero for MEP 25 on MEG 1 to 5 seconds:
root> ethernet soam loopback data set meg-id 1 mep-id 25 size
128 pattern zeroPattern
To set the loopback priority bit size and drop-enable parameters, enter the
following command in root view:
root> ethernet soam loopback prio set meg-id <meg-id> mep-id
<mep-id> prio <priority> drop <drop>
For example, the following command sets a priority bit size of 5 and enables
frame dropping for MEP 25 on MEG 1 to 5 seconds:
root> ethernet soam loopback prio set meg-id 1 mep-id 25 prio 5
drop true
To set the loopback destination by MAC address, set the number of loopback
messages to transmit and the interval between messages, and initiate the
loopback, enter the following command in root view:
root> ethernet soam loopback send meg-id <meg-id> mep-id <mep-
id> dest-mac-addr <dest-mac-addr> tx-num <tx-num> tx-interval
<interval>
For example, the following command initiates a loopback session with the
interface having MAC address 00:0A:25:38:09:4B. The session is configured to
send 100 loopback messages at six-second intervals.
root> ethernet soam loopback send meg-id 1 mep-id 25 dest-mac-
addr 00:0A:25:38:09:4B tx-num 100 tx-interval 6000
To set the loopback destination by MEP ID, set the number of loopback messages
to transmit and the interval between messages, and initiate the loopback, enter
the following command in root view:
root> ethernet soam loopback send meg-id <meg-id> mep-id <mep-
id> dest-mep-id <dest-mac-addr> tx-num <tx-num> tx-interval
<interval>
For example, the following command initiates a loopback session with the
interface having MAC address 00:0A:25:38:09:4B. The session is configured to
send 100 loopback messages at six-second intervals.
root> ethernet soam loopback send meg-id 1 mep-id 25 dest-mac-
addr 00:0A:25:38:09:4B tx-num 100 tx-interval 6000
Note: If you initiate the loopback via MEP ID, the loopback will only be
activated if CCMs have already been received from the MEP. For this
reason, it is recommended to initiate loopback via MAC address.
To display the loopback attributes of a MEP, enter the following command in root
view:
root> ethernet soam loopback config show meg-id <meg-id> mep-id
<mep-id>
For example:
meg-id Number 1-4294967295 The MEG ID of the MEG on which the loopback
is being configured or run.
mep-id Number 1-8191 The MEP ID of the MEP on which the loopback
is being configured or run.
interval Number 0-60000 The interval (in ms) between each loopback
message. Note that the granularity for this
parameter is 100 ms. If you enter a number that
is not in multiples of 100, the value will be
rounded off to the next higher multiple of 100.
Also, the lowest interval is 1000 ms (1 second).
If you enter a smaller value, it will be rounded
up to 1000 ms.
size Number 64-1518 The frame size for the loopback messages. Note
that for tagged frames, the frame size will be
slightly larger than the selected frame size.
pattern Variable zeroPattern The type of data pattern to be sent in an OAM
onesPattern PDU Data TLV.
dest-mep-id Number 1-8191 The MEP ID of the interface to which you want
to send the loopback.
tx-num Number 0-1024 The number of loopback messages to transmit.
If you enter 0, loopback will not be performed.
The following is a sample output for this command on MEG ID 127, MEP ID 1.
Once you are in CW mode, you can choose to transmit in a single tone or two
tones.
To transmit in a single tone, enter the following command in radio view:
radio[x/x] modem tx-source set mode one-tone freq-shift <freq-
shift>
Section IV
Maintenance
23. Maintenance
This section includes:
• Temperature Ranges
• Troubleshooting Tips
• IP-20C Connector Pin-outs
• IP-20C LEDs
• IP-20C-HP Connector Pin-outs
• IP-20C-HP LEDs
• IP-20S Connector Pin-outs
• IP-20S LEDs
• IP-20E Connector Pin-outs
• IP-20E LEDs
• IP-20V Connector Pin-outs
• IP-20V LEDs
• PoE Injector Pin-outs
23.2.2 XPIC
• For dual-polarization and XPIC links, if one of the polarizations has significantly
reduced performance, check to make sure the antenna’s rectangular interface
was replaced with a circular adaptor.
• For dual-polarization and XPIC links, the RSL should be similar for both
polarizations. For XPIC links, the XPI value should be similar for both
polarizations; the difference should not be more than 2 dB.
A four-port IP-20C hardware model is also available (2E2SX). This model includes
two electrical traffic ports in a single gland, in addition to two optical ports, for a
total of up to four available traffic ports. This model is interoperable with other IP-
20C hardware models, and supports MIMO and all other advanced IP-20C
features.
23.3.3 DC
The DC port is UL-60950 compliant, with a 2-pin connector.
23.5.3 DC
The DC port is UL-60950 compliant, with a 2-pin connector.
23.7.5 DC
The DC port is UL-60950 compliant, with a 2-pin connector.
23.13.3 DC
One or two DC ports, depending on the PoE Injector model:
Two models of the PoE Injector are available:
• PoE_Inj_AO_2DC_24V_48V – Includes two DC power ports with power input
ranges of ±(18-60)V each.
• PoE_Inj_AO – Includes one DC power port (DC Power Port #1), with a power
input range of ±(40-60)V.
These ports are UL-60950 compliant, with a 2-pin connector.
Section V: Appendices
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
10 radio-digital-loopback Alarm Equipment Framer digital loopback Warning User enabled framer Disable the framer digital
is enabled. digital loopback. loopback.
11 ntp-local Alarm Communications NTP locked on local Warning 1. No connection to 1. Check connection to
clock remote server. remote servers.
2. Remote server 2. Check remote server’s
quality does not status parameters in the
meet the minimum unit’s “NTP configuration
required to be panel”.
chosen by the NTP
algorithm.
15 ntp-locked Event Communications NTP locked on server Indeterminate
25 main-board-extreme- Alarm Unit Temperature is out Warning
temperature-alarm of system specified
limits.
26 main-board-low-voltage-alarm Alarm N/A Unit input voltage is too Warning 3. Power supply output 1. Check/replace the power
low. is too low. supply connected to the
4. Power cable to the RFU.
unit is defective.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
5. Threshold value is 2. Check/replace the power
not set correctly. cable connected to the
RFU.
3. Set the threshold
correctly.
27 main-board-high-voltage-alarm Alarm N/A Unit input voltage is too Warning 1. Power Supply output 1. Make sure the power
high. is too high. supply voltage is within
2. Threshold value not the specification range. 2)
set correctly. Adjust the threshold value.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
100 lag-degraded Alarm Equipment LAG is not fully Major 1. At least one interface 1. Check the physical
functional - LAG is not connected or connections.
Degraded. configured to admin 2. Verify that the Admin state
down. of all the LAG members is
2. If one of the up.
members is radio it 3. Verify the operational
might be in state of all radio members
operational state in the LAG.
down due to channel
fading
101 lag-down Alarm Equipment LAG operational state is Critical The LAG group is not 1. Check the physical
down operational. connections and
administrative status on
both sides of the link of all
interfaces that are
members of the LAG
Group.
2. Check the physical
connections of all
interfaces that are
members of the LAG
Group.
102 ethernet-loopback-active-alarm Alarm Equipment Loopback is active Major Ethernet loopback is Wait for expiration of the
active. loopback timeout, or manually
disable the loopback.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
103 port-mirroring-is-active Alarm Equipment Slot X port XX is Minor Mirroring is enabled by Disable mirroring.
mirrored to slot Y port user configuration.
YY
120 port-speed-mismatch-alarm Alarm Equipment Port speed mismatch Major System reset is required 1. Reset the system.
after the port speed was 2. Change the port speed
changed. back to the previous value.
150 auto-state-propagation- Alarm Communications Auto-state-propagation Major Failure of the Check adjacent local/remote
interface-down-alarm is triggered radio/remote radio radio interface for failure
interface which is conditions that cause
monitored for automatic automatic state propagation.
state propagation causes
automatic shutdown of
the controlled interface.
200 protection-communication- Alarm Equipment Protection Major 1. Mate unit is 1. Verify that the mate unit is
down-alarm communication is down absent/failure. up and running.
2. Protection cable is 2. Check the state of the
disconnected. protection cable
3. Unit failure. connection between the
units.
3. Reset the mate unit
4. Replace the mate unit
201 protection-lockout-alarm Alarm Equipment Protection in Lockout Major
State
202 protection-switch-command Event Equipment Protection switchover Major 1. Check the unit.
due to local failure
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2. Look for current alarms.
203 protection-mate-not-present- Alarm Equipment Mate does not exist Major Mate does not exist or 1. Verify that the mate unit is
alarm cable unplugged. up and running.
2. Verify that the protection
cable is properly
connected between the
units.
204 protection-hsb-insufficient- Alarm Equipment HSB insufficient Critical External Protection Remove External Protection or
alarm configuration configured together with 1+1 HSB configuration.
1+1 HSB.
205 protection-revertive-primary- Alarm Equipment Protection revertive warning Identical configuration Ensure one (and only one) unit
insufficient-alarm mode - insufficient for the revertive-primary is configured as the primary
configuration parameter. unit.
307 tdm-link-up Event Equipment TDM interface is up Warning
308 tdm-link-down Event Equipment TDM interface is down Warning
401 TrafficPhyLocAlarm Alarm Equipment Loss of Carrier Major 1. Cable disconnected. At both ends of the cable:
2. Defective cable. 1. Check the cable
3. External equipment connection.
failure. 2. Check the Admin state of
the port.
3. Replace the cable.
4. Check external equipment.
407 ethernet-link-up Event Equipment Ethernet interface is up Warning Ethernet interface is back Notification. Corrective action
to being operational. is not required.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
408 ethernet-link-down Event Equipment Ethernet interface is Warning 1. User commanded 1. Set the Ethernet interface
down the interface to admin State to Up.
admin down. 2. Reconnect the Ethernet
2. Ethernet cable is cable
disconnected. 3. Wait 30 seconds to allow
3. Ethernet card is the Ethernet card to
initializing. complete its init.
4. External equipment 4. Check external equipment.
failure.
601 radio-excessive-ber Alarm Communications Radio excessive BER Major 1. Fade in the link. 1. Check link performance via
2. Defective IF cable. the Web EMS Radio PM
and Statistics page and
3. Fault in RFU.
take corrective action
4. Fault in RMC (Radio accordingly..
Modem Card).
2. Check IF cable and replace
5. Interference on the if required.
link.
3. Replace RFU.
4. Replace RMC (Radio
Modem Card).
5. Remove source of
interference or change link
frequency.
602 remote-link-id-mismatch Alarm Equipment Link ID mismatch Major 1. Link ID is not the 1. Configure same Link ID for
same at both sides of both sides of link via Web
link.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2. Radio has synched EMS Radio Parameters
on the wrong peer page.
radio. 2. Check if the radio is
synched on the correct
peer radio (check: channel
frequency, antennae
direction).
603 radio-lof Alarm Communications Radio loss of frame Critical 1. Fade in the link. 1. Check link performance.
2. Defective IF cable. 2. Check IF cable and replace
3. Fault in RFU. if required.
4. Fault in RMC (Radio 3. Replace RFU.
Modem Card). 4. Replace RMC (Radio
5. Different radio Modem Card).
scripts at both ends 5. Make sure same script is
of the link. loaded at both ends of the
link.
604 radio-signal-degrade Alarm Communications Radio signal degrade Minor 1. Fade in the link. 1. Check link performance.
2. Defective IF cable. 2. Check IF cable and replace
3. Fault in RFU. if required.
4. Fault in RMC (Radio 3. Replace RFU.
Modem Card). 4. Replace RMC (Radio
Modem Card).
605 radio-link-up Event Equipment Radio interface is up Warning The radio interface is No action is required.
back to being
operational.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
606 radio-link-down Event Equipment Radio interface is down. Warning Radio interface is not 1. If required, set the radio
operational: interface admin State to
1. User configured the Up.
radio interface to 2. Check if there is a reason
admin Down. for LOF / Excessive BER
2. Loss of Frame (LOF) alarms.
alarm is raised. 3. Wait 30 seconds until the
3. Excessive BER alarm radio card finishes its init.
is raised.
4. Radio card has not
completed its init.
607 rfu-frequency-scanner-in- Alarm Equipment Frequency scanner in Warning The frequency scanner is If required, stop the frequency
process progress activated. scanner process.
801 corrupted-file-card-failure Alarm Equipment Corrupted inventory file Critical The inventory file is 1. Reset the card.
corrupted 2. Reinstall the software.
3. Replace the unit.
802 file-not-found Alarm Equipment Inventory file not found Warning The inventory file is 1. Reset the system.
missing 2. Reinstall the software.
3. Replace the unit
803 sfp-rx-power-level-low Alarm Equipment SFP port RX power level Warning 1. Remote SFP port Tx 1. Verify remote SFP Tx laser
is below the rx power laser power is too power is within range.
level low threshold low. 2. Check fiber type and
2. Fiber length is too length fit the installed SFP.
long or fiber type
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
doesn't fit the If not, replace it with an
installed SFP. appropriate one.
804 sfp-rx-power-level-high Alarm Equipment SFP port RX power level Warning Remote SFP Tx power is Add attenuator on Rx side.
is above the rx power too high.
level high threshold
805 sfp-tx-power-level-low Alarm Equipment SFP port TX power level Warning SFP transmit laser power Check laser Bias current. If it is
is below the tx power is too low too low, replace SFP.
level low threshold
806 sfp-tx-power-level-high Alarm Equipment SFP port TX power level Warning SFP laser Tx power is too Check laser Bias current and
is above the tx power high. laser temperature values. If
level high threshold either of them is too high,
replace SFP.
807 recovered-inventory-on-boot- Event Equipment Default Activation Key Critical Corrupted Inventory
event activated due to failure
808 recovered-inventory-on- Event Equipment Activation Key Critical Corrupted Inventory
running-event Configuration failed
901 demo-license-alarm Alarm Equipment Demo mode is active Warning Demo mode has been Disable demo mode from the
activated by the user Activation Key Configuration
page in the Web EMS.
902 license-demo-expired Event Equipment Demo mode is expired Warning
903 license-demo-start-by-user Event Processing Demo mode is started Warning
904 license-demo-stop-by-user Event Processing Demo mode is stopped Warning
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
905 license-load-fail Event Equipment Activation key loading Major
failure
906 license-load-successful Event Equipment Activation key loaded Warning
successfully
907 license-violation-alarm Alarm Equipment Activation key violation Critical The current configuration 1. Go to the "Activation Key
does not match the Overview" page in the
activation-key-enabled Web EMS to display a list
feature set. of features and their
48 hours after an activation key violation
"activation-key-violation" status.
alarm is raised, sanction 2. Install a new activation key
mode is activated in that enables all features
which all alarms except and capacities that you
the activation key require.
violation alarm are
cleared and no new
alarms are raised.
908 demo-license-about-to-expire- Alarm Equipment Demo mode is about to Major Demo mode allowed Disable demo mode and install
alarm expire period is about to end a new valid activation key in
within 10 days the “Activation Key
Configuration” page of the
Web EMS.
910 license-signature-failed-alarm Alarm Equipment Activation key signature Major Activation key validation Make sure that the activation
failure has failed due to invalid key matches the serial number
product serial number or of the unit.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
activation key does not
match.
911 license-violation-runtime- Event Equipment Activation key violation Major
counter-expired sanction is enforced
913 license-bad-xml-file-alarm Alarm Equipment Activation key Major Essential internal Reinstall software
components are missing activation key
or corrupted components are missing
or corrupted.
1002 radio-protection-configuration- Alarm Equipment Radio protection Major The configuration Apply a copy-to-mate
mismatch configuration mismatch between the radio command to copy the
protection members is configuration from the active
not aligned radio to the standby radio.
1006 radio-protection-switchover- Event Equipment Radio protection Warning Protection decision Check the system for local
event switchover - reason machine initiated failures. What checks? Check
switchover due to local Radio Parameters: Tx Level, Rx
failure or user command Level, Modem MSE.
1007 radio-protection-no-mate Alarm Equipment Radio protection no Major Radio protection function 1. Insert the radio module.
mate is missing radio module, 2. Replace a defective
module defected or existing radio module.
disabled
3. Make sure all radio
interfaces are enabled.
1008 radio-protection-remote-switch- Event Equipment Remote switchover Warning
request request was sent -
reason
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1009 radio-protection-lockout Alarm Equipment Radio protection Major The user has issued a Clear the lockout command
lockout command is on lockout command
1010 ethernet-protection-switchover Event Equipment Ethernet Interface Warning 1. LOC event on an 1. Check the system for local
Group protection Ethernet interface. failures.
switchover 2. Protection group 2. Check external equipment.
member was
disabled or pulled
out of the shelf.
1011 interface-protection-lockout Alarm Equipment Interface protection Major 1. The user has issued a 1. If required, clear the
lockout is on lockout command lockout.
1012 interface-protection-no-mate Alarm Equipment Interface protection no Major Interface protection 1. Insert the interface
mate: mate interface is function is missing an module.
missing or disabled interface module, 2. Replace a defective
module is defective or existing interface.
disabled.
3. Make sure all interfaces
are enabled.
1102 software-installation-status Event Processing Software installation Warning
status:
1105 software-new-version-installed Event Processing New version installed Warning A software version has
been installed but system
has not been reset.
1111 software-user-confirmation-for- Event Processing User approved Warning
version download of software
version file
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1112 software-download-status Event Processing Software download Warning
status:
1113 software-download-missing- Event Processing Missing SW Warning
components components:
1114 software-management- Event Processing Incomplete file set; Warning Software bundle is Get a complete software
incomplete-bundle missing components missing components. bundle
1150 backup-started Event Processing Configuration file Warning User command
backup generation
started
1151 backup-succeeded Event Processing Configuration file Warning Backup file creation
backup created finished successfully
1152 backup-failure Event Processing Failure in configuration Warning System failed in attempt
file backup generation to create backup
configuration file
1153 restore-succeeded Event Processing Configuration Warning Configuration restore
successfully restored finished successfully
from file backup
1154 restore-failure Event Processing Failure in configuration Warning System failed in attempt 1. Configuration file system
restoring from backup to restore configuration type mismatch
file from backup file 2. Invalid or corrupted
configuration file
1155 restore-canceled Event Processing Configuration restore Warning Restore operation Try again
operation cancelled cancelled because of user
command or execution of
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
another configuration
management operation
1156 file-transfer-issued Event Processing User issued command Warning User command
for transfer of
configuration file
1157 file-transfer-succeeded Event Processing Configuration file Warning Configuration file transfer
transfer successful successful
1158 file-transfer-failure Event Processing Configuration file Warning 1. Communications 1. Mark sure protocol details
transfer failure failure. are properly configured.
2. File not found in 2. Make sure file exists.
server
1159 file-transfer-in-progress Event Processing Configuration file Warning File transfer started
transfer in progress
1163 cli-script-activation-started Event Processing CLI configuration script Warning User command
activation started
1164 cli-script-activation-succeeded Event Processing CLI Configuration script Warning
executed successfully
1165 cli-script-activation-failure Event Processing CLI Configuration script Warning 1. Syntax Error. Verify script in the relevant
failed 2. Error returned by line, and run again.
system during Note that script may assume
runtime pre-existing configuration.
1166 unit-info-file-transfer-status- Event Processing Unit info file transfer Warning
changed status:
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1167 unit-info-file-creation-status- Event Processing Unit info file creation Warning
changed status:
1169 restore-started Event Processing Configuration restore Warning Restore operation started
operation started because of user
command
1201 file-missed Alarm Equipment Modem firmware file Critical Modem file is missing 1. Download software
not found package.
2. Reset the system.
1202 load-failed Alarm Equipment Modem firmware was Critical 1. Modem firmware file 1. Download software
not loaded successfully is corrupted. package.
2. System failure. 2. Reset the system.
1203 modem-wd-reset Event Equipment Modem watch-dog Warning
reset event
1301 fpga-file-currupt-alarm Alarm Equipment Radio MRMC script LUT Critical Damaged radio MRMC Download the specific radio
file is corrupted script LUT file MRMC script LUT file
1302 fpga-file-not-found-alarm Alarm Equipment Radio MRMC script LUT Critical Missing radio MRMC Download the specific radio
file is not found script LUT file MRMC script LUT file
1304 modem-script-file-corrupt- Alarm Equipment Radio MRMC script Critical Damaged radio MRMC Download the specific radio
alarm modem file is corrupted script modem file MRMC script modem file
1305 modem-script-file-not-found- Alarm Equipment Radio MRMC script Critical Missing radio MRMC Download the specific radio
alarm modem file is not found script modem file MRMC script modem file
1308 rfu-file-corrupt-alarm Alarm Equipment Radio MRMC file is Critical Damaged Radio MRMC Download the specific radio
corrupted script LUT file MRMC RFU file
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1309 rfu-file-not-found-alarm Alarm Equipment Radio MRMC RFU file is Major Missing radio MRMC RFU Download the specific radio
not found file MRMC RFU file
1312 script-loading-failed Alarm Equipment Radio errrror! Major Damaged hardware Replace the radio hardware
MRMC script loading module module
failed
1313 mrmc-profile-below-thresh1 Alarm Equipment MRMC RX profile below Major
threshold 1
1314 mrmc-profile-below-thresh2 Alarm Equipment MRMC RX profile below Critical
threshold 2
1401 incompatible-rfu-tx-calibration Alarm Equipment Incompatible RFU TX Major RFU calibration tables Upgrade IDU SW
calibration require SW upgrade
1501 remote-communication-failure Alarm Equipment Remote communication Critical Fade in the link Check the link performance
failure
1601 if-loopback Alarm Equipment IF loopback Warning User enabled IF loopback Disable IF loopback
1602 lock-detect Alarm Equipment IF synthesizer is Critical 1. Extreme 1. Check installation.
unlocked. temperature 2. Reset the RMC (Radio
condition. Modem Card) module.
2. HW failure. 3. Replace the RMC (Radio
Modem Card).
1610 rsl-degradation-threshold-out- Alarm Equipment Radio Receive Signal Warning RSL is very low due to: 1. Check for obstruction in
of-range Level is below the 1. Weather conditions, link path.
configured threshold obstruction in
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
antenna line of sight, 2. Check the antennae
antennae alignment. alignment and link
2. Configured threshold planning.
needs to be 3. Recalculate the Path Loss
adjusted.2. and set the threshold
accordingly.
4. Check link settings - Tx
Power and Tx Frequency.
5. Check for a hardware
problem.
1651 atpc-override Alarm Communications ATPC overridden: Tx Warning Actual transmitted signal Correct the transmission levels.
level has been equal to level has been at its The alarm will be cleared only
the Max Tx level for a maximum value for upon manual clearing.
longer time than longer than allowed. This
allowed is probably caused by a
configuration error or link
planning error.
1697 radio-unit-extreme- Alarm Equipment Radio unit extreme Warning 1. Installation 1. Correct the installation
temperature temperature conditions. conditions.
2. Defective RFU. 2. Verify that the product is
operating according to
specifications.
3. Replace the RFU.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1698 radio-unit-low-voltage Alarm Equipment Radio unit input voltage Warning 1. Power supply output 1. Check/replace the power
is too low is too low. supply connected to the
2. Power cable to RFU RFU.
is defective. 2. Check/replace the power
cable connected to the
RFU.
1699 radio-unit-high-voltage Alarm Equipment Radio unit input voltage Warning Power Supply output too 3. Check power supply.
is too high high.
1700 fw-download-failure Alarm Communications Radio unit not aligned Critical 1. FW alignment 1. Reinitiate the FW
to IDU interrupted, power download by disabling and
disruption, ODU then enabling the
cable malfunction. corresponding RFU port.
2. Damaged ODU. 2. Replace the ODU
1701 cable-open Alarm Equipment Cable open Major Cable is not connected to 1. Check cables and
radio card or RFU. connectors.
2. Replace Radio card.
3. Replace RFU.
1702 cable-short Alarm Equipment Cable short Major Physical short at the IF 1. Check cables and
cable connectors.
2. Replace Radio card.
3. Replace RFU.
1703 communication-failure Alarm Equipment RFU communication Warning 1. Defective IF cable. 1. Verify RFU software
failure 2. IF cable not download completed.
connected properly.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
3. Defective RMC 2. Check IF cable and
(Radio Modem Card). connector.
4. Defective RFU. 3. Verify that N-Type
5. RFU software connector inner pin is not
download in spliced.
progress. 4. Replace RMC.
5. Replace RFU.
For High Power RF Unit:
1. Check BMA connector on
OCB
2. Check BMA connector on
RFU.
1704 delay-calibration-failure-1 Alarm Equipment RFU delay calibration Warning Defective RFU 1. Reset the RMC (Radio
failure 1 Modem Card) / RFU.
2. Replace RFU.
1705 delay-calibration-failure-2 Alarm Equipment RFU delay calibration Warning Calibration cannot be Enter delay calibration value
failure 2 completed due to notch manually.
detection
1706 extreme-temp-cond Alarm Equipment RFU extreme Warning 1. Installation 1. Verify that the product is
temperature conditions. operating according to
2. Defective RFU. specifications.
2. Correct the installation
conditions.
3. Replace the RFU."
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1707 radio-unit-abc-incompatible-rfu Alarm Equipment RFU is incompatible Warning The RFU type does not Replace the RFU with an RFU
with ABC configuration support the type of type that supports the
Multi-Carrier ABC the configured Multi-Carrier ABC
user has configured. type.
1708 freq-set-automatically Event Equipment RFU frequency was set Warning Defective RFU 1. Check if problem repeats
automatically and if errors/alarms
reported.
2. Replace RFU.
1709 hardware-failure-1 Alarm Equipment RFU hardware failure 1 Critical Defective RFU. Replace RFU.
1710 hardware-failure-2 Alarm Equipment RFU hardware failure 2 Critical Defective RFU. Replace RFU.
1711 low-if-signal-to-rfu Alarm Equipment Low IF signal to RFU Major 1. IF cable connection. 1. Check IF cable connectors.
2. Defective RFU. 2. Verify that N-Type
3. Defective RMC connector inner pin is not
(Radio Modem Card). spliced.
3. Replace RMC (Radio
Modem Card).
4. Replace RFU.
1712 no-signal-from-rfu Alarm Equipment Low IF signal from RFU Warning Low RX IF signal (140 1. Check IF cable and
MHz) from RFU. connectors.
2. Verify that N-Type
connector inner pin is not
spliced.
3. Replace RMC (Radio
Modem Card).
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
4. Replace RFU.
1713 pa-extreme-temp-cond Alarm Equipment RFU PA extreme Warning 1. Installation 1. Check installation
temperature conditions. conditions.
2. Defective RFU. 2. Replace RFU.
1714 power-failure-12v Alarm Equipment RFU power failure (12v) Major 1. Defective IF 1. Replace IF
cable/connector. cable/connector.
2. Defective RFU. 2. Replace RFU.
3. Defective IDU. 3. Replace IDU.
1715 power-failure-1point5 Alarm Equipment RFU power failure (1.5v) Major 1. Defective IF 1. Replace IF
cable/connector. cable/connector.
2. Defective RFU. 2. Replace RFU.
3. Defective IDU. 3. Replace IDU.
1716 power-failure-24v Alarm Equipment RFU power failure (24v) Major 1. Defective IF 1. Replace IF
cable/connector. cable/connector.
2. Defective RFU. 2. Replace RFU.
3. Defective IDU. 3. Replace IDU.
1717 power-failure-6v Alarm Equipment RFU power failure (6v Major 1. Defective IF 1. Replace IF
pro) cable/connector. cable/connector.
2. Defective RFU. 2. Replace RFU.
3. Defective IDU. 3. Replace IDU.
1718 power-failure-6v-sw Alarm Equipment RFU power failure (6v Major 1. Defective IF 1. Replace IF
SW) cable/connector. cable/connector.
2. Defective RFU. 2. Replace RFU.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
3. Defective IDU. 3. Replace IDU.
1719 power-failure-minus-5v Alarm Equipment RFU power failure (-5v) Major 1. Defective IF 1. Replace IF
cable/connector. cable/connector.
2. Defective RFU. 2. Replace RFU.
3. Defective IDU. 3. Replace IDU.
1720 power-failure-vd Alarm Equipment RFU power failure (Vd) Major 1. Defective IF 1. Replace IF
cable/connector. cable/connector.
2. Defective RFU. 2. Replace RFU.
3. Defective IDU. 3. Replace IDU.
1721 reset-occurred Event Equipment RFU reset Major
1722 rfu-loopback-active Alarm Equipment RFU loopback is active Major User has activated RFU Disable RFU loopback.
loopback.
1723 rfu-mode-changed-to-combined Event Equipment RFU mode changed to Indeterminate
Combined
1724 rfu-mode-changed-to-diversity Event Equipment RFU mode changed to Indeterminate
Diversity
1725 rfu-mode-changed-to-main Event Equipment RFU mode changed to Indeterminate
Main
1726 rfu-power-supply-failure Alarm Equipment RFU power supply Major At least one of the RFU's 1. Check the RFU cable
failure power supply voltages is connection.
too low. 2. Replace the RFU.
1727 rx-level-out-of-range Alarm Equipment RFU RX level out of Warning RSL is very low, link is 1. Check antenna alignment
range down. & link planning.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2. Check link settings (TX
power, TX frequency).
3. Check antenna
connections.
4. Replace local/remote RFU.
1728 rx-level-path1-out-of-range Alarm Equipment RFU RX level path1 out Warning 1. Improper 1. Check that the fault is not
of range installation. due to rain/multi-path
2. Fading event. fading or lack of LOS.
3. Defective RFU. 2. Check link settings (TX
power, TX frequency).
3. Check antenna alignment.
4. Check antenna
connections.
5. Replace local/remote RFU.
1729 rx-level-path2-out-of-range Alarm Equipment RFU RX level path2 out Warning 1. Improper 1. Check that the fault is not
of range installation. due to rain/multi-path
2. Fading event. fading or lack of LOS.
3. Defective RFU. 2. Check link settings (TX
power, TX frequency).
3. Check antenna alignment.
4. Check antenna
connections.
5. Replace local/remote RFU.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1730 radio-unit-communication- Alarm Equipment Radio unit Critical 1. Defective RFU cable. 1. Check RFU power supply.
failure communication failure 2. RFU cable not 2. Check RFU cable and
connected properly. connectors.
3. Defective RIC (Radio 3. Replace RIC (Radio
Interface Card). Interface Card).
4. Defective RFU. 4. Replace RFU.
5. RFU initialization in
progress.
6. RFU powered off.
1731 power-supply-radio-unit-cable- Alarm Equipment Power supply cable Major Power is enabled but 1. Check RFU cable and
open open consumption is lower connectors.
than threshold. 2. If internal power supply is
not in use disable the
power supply.
1732 power-supply-radio-unit-cable- Alarm Equipment Power supply cable Major 1. Power is enabled but 1. Check RFU cable and
short short consumption connectors.
reached the 2. Disconnect and Re-
threshold. Connect the RFU cable.
2. Physical short at the 3. Extract the RIC-D and re-
ETH cable. insert it.
4. Restart the IDU.
5. Replace the RIC-D card or
the IP-20F IDU.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1733 synthesizer-unlocked Alarm Equipment RFU synthesizer Major At least one of the RFU 6. Replace RFU.
unlocked synthesizers is unlocked 7. In XPIC mode, replace
mate RFU as well.
1734 tx-level-out-of-range Alarm Equipment RFU TX level out of Minor Defective RFU (the RFU 1. Replace RFU.
range cannot transmit the 2. Intermediate solution -
requested TX power) reduce TX power.
1735 tx-mute Alarm Equipment RFU TX Mute Warning RFU Transmitter muted Unmute the RFU transmitter
by user
1736 unknown-rfu-type Alarm Equipment IDU SW does not Major IDC SW does not support Upgrade IDC SW
support this type of RFU the RFU
1737 card-extracted-from-slot Event Equipment Card was extracted from Warning Card was extracted from NA
slot slot
1738 card-failure Alarm Equipment Card is in Failure state Major Card is down as a result 1. Reset Card.
of card failure 2. Check if slot was disabled.
1739 card-fpga-fw-not-found Alarm Equipment FPGA Firmware file not Critical There is no FPGA file NA
found found on the Main Board
for the card on the slot
1740 card-fw-load-fail Alarm Equipment Download card Major Firmware download was 1. Reset Card.
firmware has failed unsuccessful. 2. Download software
package.
3. Try to insert another Card.
1741 card-inserted-to-slot Event Equipment Card was inserted to Warning Card was inserted to slot NA
slot
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1742 card-intermediate-channel- Alarm Equipment Card is in Major Card is down as a result 1. Reset Card.
failure interconnection failure of card interconnection 2. Check if the slot was
state failure disabled.
1743 card-missing Alarm Equipment Expected Card is missing Major 1. Card is missing. 1. Insert Expected Card.
in slot 2. Expected Card Type 2. Clear Expected Card Type.
configured on empty
slot.
1744 card-not-supported-for-slot Alarm Equipment This Card type is not Major The card is not on the 1. Reset.
supported in this slot Allowed Card Types list 2. Insert Card belongs to
for this slot. Allowed Card Types list.
1745 card-state-is-down Event Equipment Card operational state is Indeterminate Card state was change to NA
Down Down state
1746 card-state-is-up Event Equipment Card operational state is Indeterminate Card state was change to NA
Up Up state
1747 card-state-is-up-with-alarms Event Equipment Card operational state is Indeterminate Card state was change to NA
Up with Alarms Up state but with Alarms
indication
1748 card-unexpected Alarm Equipment Unexpected Card Type Minor Expected card type is 1. Insert Expected Card.
in slot different than the actual 2. Change Expected Card
card type Type.
1749 slot-disabled Event Equipment Slot was Disabled Indeterminate The user Disabled slot NA
1750 slot-enabled Event Equipment Slot was Enabled Indeterminate The user Enabled slot NA
1751 slot-reseted Event Equipment Card on slot was Reset Indeterminate The user Reset slot NA
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1752 fan-card-extraction-event Event Equipment FAN Card was extracted Warning FAN Card was extracted
from slot from slot
1753 fan-card-failure-event Event Equipment FAN failure Major
1754 fan-card-insertion-event Event Equipment FAN Card was inserted Warning FAN Card was inserted to
to slot slot
1755 fan-card-missing Alarm Equipment FAN Card is missing in Critical 1. FAN Card is missing. 1. Insert FAN Card.
slot 2. Slot enabled when 2. Disable slot.
empty.
17561 fan-extreme-temperature Alarm Equipment Extreme Temperature Major 1. Installation 1. Correct the installation
conditions. conditions.
2. Defective unit. 2. Verify that the product is
3. Defective fan. operating according to
specifications.
3. Replace the fan card.
4. Replace the unit.
1757 fan-failure Alarm Equipment FAN Card is in Failure Major FAN Card is in Failure Change FAN Card
state state
1758 pdc-card-extraction-event Event Equipment Power Supply was Warning Power Supply was Re-Insert the power supply
extracted from slot extracted from slot back into the slot.
1
This alarm is not relevant for IP-20 all-outdoor products.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1759 pdc-card-insertion-event Event Equipment Power Supply was Warning Power Supply was
inserted to slot inserted to slot.
1760 pdc-card-missing Alarm Equipment Power Supply is missing Major 1. Power Supply is Insert Power Supply.
in slot missing.
2. Slot enabled when
empty.
1761 pdc-over-voltage Alarm Equipment Over voltage Major 1. System power supply 1. Make sure the power
voltage is higher supply voltage is within
than allowed. the specification range.
2. Threshold value is 2. Check the value of the
too low. threshold.
1762 pdc-under-voltage Alarm Equipment Under voltage Major 1. System power supply 1. Make sure the power
voltage is lower than supply voltage is within
allowed. the specification range.
2. Threshold value is 2. Check the value of the
too high. threshold.
1763 TCC-fpga-fw-not-found Alarm Equipment The Main board Warning
firmware is not found
1764 TCC-fw-load-fail Alarm Equipment Download Main Board Major Firmware download was 1. Reset board.
firmware has failed unsuccessful. 2. Download software
package.
3. Try to insert another
board.
1765 tcc-powerup-reset-event Event Equipment Main Board was reset Warning
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1766 upload-software-failed Event Equipment RFU installation failure Warning 1. Unsupported RFU 1. Make sure RFU is
type. supported by SW version.
2. IDU-RFU 2. Check IDU-RFU cable.
communications 3. Replace RFU.
problem.
3. RFU failure.
1767 upload-software-started Event Equipment RFU installation in Warning User command
progress
1768 upload-software-succeeded- Event Equipment RFU installation Warning User command
event successfully completed
1769 unit-cold-reset-event Event Unit Performed Power Warning
up
1770 cable-lof-rfu Event Equipment Unit performing power- Major
up.
1771 cable-error-rfu Alarm Equipment RFU cable error. Major Errors in signal from IDU 1. Check the IF cable and
to XCVR. connectors.
2. Verify that the N-
Type/TNC connector inner
pin is not spliced.
3. Replace RMC.
4. Replace XCVR.
1772 xpic-data-los Alarm Equipment Radio XPIC sync loss Major Signaling between RMCs 1. Check that the RMCs are in
(Radio Modem Cards) for allowed slots.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
XPIC functionality has 2. Populate the RMCs in
failed different allowed location
in the chassis.
3. Replace RMC/s.
4. Replace chassis.
1773 early-warning Alarm Communications Radio early warning. Warning The estimated radio BER 5. Check link performance.
(Bit Error Rate) is above 6. Check IF cable, and replace
10E-12. if required.
7. Replace XCVR.
8. Replace RMC.
1774 sw-download-incompatible-rfu Alarm Equipment RFU software download Critical The hardware of the 1. Upgrade the XCVR
cannot be initiated. XCVR is OK, but is it software application via
running with METRO XPAND-IP and then
radio application. reinitiate software
download..
1775 hw-incompatible-rfu Alarm Equipment RFU software download Critical Wrong type of XCVR, the Replace the XCVR
is not possible. XCVR hardware is
METRO.
1776 pll-rmc Alarm Equipment RMC hardware failure. Major RMC hardware failure of Replace the RMC.
the clock distributor.
1777 rfu-mute-with-timeout Event Equipment RFU TX Mute with Warning RFU Transmitter muted Unmute the RFU transmitter or
timeout by user. wait for expiration of the
timeout.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1778 rfu-power-decreased-due-to-pa- Alarm Equipment RFU power decreased Major Defective RFU (the RFU 1. Replace RFU.
temp due to PA temperature cannot transmit the 2. Intermediate solution -
requested TX power). reduce TX power.
1780 mrmc-running-script-deleted Event Equipment MRMC running script is Warning New installed software 1. Make sure the required
deleted package does not include software package include
the running MRMC radio the running MRMC radio
script script.
2. Download and install the
correct software package.
1781 mrmc-running-script-updated Event Equipment MRMC running script is Warning New installed software Reset the radio carrier to
updated package does has an reacquire the new updated
updated version of the MRMC radio script
running MRMC radio
script
1782 radio-2_5gbps-mismatch- Alarm Equipment 2.5Gbps mismatch Warning The card cannot function Add the card to an ABC group,
configuration configuration outside of an ABC group or change the Slot Section to
in 2.5Gbps mode. 1Gbps.
1783 remote-fault-indication Alarm Communication Radio remote fault Minor
indication (RFI)
1790 np-hw-failure Alarm Equipment Hardware failure Critical An internal hardware Replace the card or unit which
failure has been detected reports hardware failure.
by the system.
1794 interface-not-functional-until- Alarm equipment Interface is not Warning Changes were made to Reset chassis
reset operational until chassis platform due to user
reset configuration
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
1800 t3-loc-alarm Alarm Equipment T3 sync interface Loss of Major 1. Cable disconnected. 1. Check the cable
Carrier 2. Defective cable. connection.
2. Disable the interface in the
Interface Manager.
1975 radio-fan-failure Alarm Equipment RFU fan failure Major 1. RFU fan is 1. Check fan cable
disconnected. connection to the RFU.
2. RFU fan HW failure. 2. Check/replace the fan.
3. RFU fan jammed. 3. Clear/clean the fan.
2001 pwe3-pwc-s-card-reset Alarm Equipment TDM-LIC has rebooted Major 1. Recent TDM-LIC card 1. Wait for card to reboot.
and is not in service reset; 2. Reset the TDM-LIC card.
now 2. System malfunction. 3. Replace card.
2002 pwe3-pwc-s-config-mismatch Alarm Equipment TDM-LIC configuration Major System malfunction. 1. Reset the TDM-LIC.
mismatch 2. Reset the Device.
3. Remove the TDM
Configuration and Re-
Configure it again.
2003 pwe3-pwc-s-front-panel-clock- Alarm Equipment Loss of Signal (LOS) on Major Cable is not properly 1. Reconnect cable.
los TDM-LIC's front panel connected. 2. Check line cables.
clock port
3. Check external equipment.
4. Reset the TDM-LIC.
2004 pwe3-pwc-s-host-pw-lic-comm- Alarm Equipment Communication with Minor System malfunction 1. Reset the TDM-LIC.
disrupt TDM-LIC is disrupted in 2. Replace card.
Host-Card direction
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2005 pwe3-pwc-s-hw-failure Alarm Equipment TDM-LIC hardware Major System malfunction 1. Reset the TDM-LIC.
failure 2. Replace card.
2006 pwe3-pwc-s-pw-lic-host-comm- Alarm Equipment No communication with Major TDM-LIC to Host 1. Reset the TDM-LIC.
disrupt TDM-LIC communication failure. 2. Reset the whole device.
3. Replace card.
2007 pwe3-pws-s-jitter-buffer- Alarm Equipment Jitter-buffer-overrun Major TDM service 1. Check TDM service
overrun alarm on TDM service synchronization failure. configuration across the
network.
2. Check the loop
timing/clock recovery
configuration.
2008 pwe3-pws-s-late-frame Alarm Equipment Late-frame alarm on Warning TDM service failure or Check TDM service
TDM service device synchronization configuration across the
problem. network.
2009 pwe3-pws-s-loss-of-frames Alarm Equipment Loss-of-frames alarm on Major Failure along the network Check network or configuration
TDM service path of TDM service for errors in the network
transport side of the service
2010 pwe3-pws-s-malformed-frames Alarm Equipment Malformed-frames Major 1. Payload size does not Check TDM service
alarm on TDM service correspond to the configuration
defined value.
2. Mismatch in PT value
in RTP header (if
used)
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2011 pwe3-pws-s-misconnection Alarm Equipment Misconnection alarm on Major Stray packets with wrong Check TDM service
TDM service RTP configurations are configuration
received and dropped.
2012 pwe3-tdm-port-s-ais Alarm Equipment Alarm Indication Signal Major 1. Cable is not properly 1. Check the cable
(AIS) on TDM-LIC TDM connected. connectivity at both local
port 2. External equipment and peer interfaces.
is faulty. 2. Check external equipment.
3. External equipment 3. Check configuration of the
is not properly external equipment.
configured.
2013 pwe3-tdm-port-s-lof Alarm Equipment Loss Of Frame (LOF) on Major 1. Line is not properly 1. Check the line interface
TDM-LIC TDM port connected. connectivity
2. External equipment 2. Correct the TDM
is faulty. configuration.
3. Configuration 3. Check the equipment that
problem. feeds the system
2014 pwe3-tdm-port-s-lomf Alarm Equipment Loss Of Multi-Frame Major 1. Line is not properly 1. Check the line interface
(LOMF) on TDM-LIC connected. connectivity
TDM port 2. External equipment 2. Correct the TDM
is faulty. configuration.
3. Configuration 3. Check the equipment that
problem. feeds the system
2015 pwe3-tdm-port-s-loopback- Alarm Equipment Loopback on TDM-LIC Warning Loopback enabled. Disable loopback.
alarm TDM port
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2016 pwe3-tdm-port-s-los Alarm Equipment Loss Of Signal (LOS) on Major 1. Cable is not properly 1. Check the cable
TDM-LIC TDM port connected. connectivity at both local
2. Cable is faulty; and peer interfaces.
3. External equipment 2. Check external equipment.
is faulty;
4. Defective TDM-LIC.
2017 pwe3-tdm-port-s-rai Alarm Equipment Remote Alarm Minor 1. Cable is not properly 1. Check the cable
Indication (RAI) on connected. connectivity at both local
TDM-LIC TDM port 2. External equipment and peer interfaces.
is faulty. 2. Check external equipment.
2018 pwe3-tdm-port-s-unexpected- Alarm Equipment E1/DS1 Unexpected Warning Line is connected to a 1. Enable relevant port.
signal-alarm signal on TDM-LIC TDM disabled port. 2. Disconnect cable from
port relevant port.
2021 pwe3-pwc-s-ssm-rx-changed Event Equipment SSM received pattern Warning No action is required.
change was discovered
2022 pwe3-stm1oc3-s-excessive-ber- Alarm Equipment Excessive BER on TDM- Major 1. Line is not properly 1. Reconnect line.
alarm LIC STM1/OC3 port connected. 2. Check line cables.
2. External equipment 3. Check external equipment.
is faulty.
4. Power cycle the TDM-LIC.
2023 pwe3-stm1oc3-s-lof-alarm Alarm Equipment Loss Of Frame (LOF) on Major 1. Cable is not properly 1. Check the cable
TDM-LIC STM1/OC3 connected. connectivity at both local
port 2. External equipment and peer interfaces.
is faulty. 2. Check external equipment.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
3. Wrong TDM 3. Reset the TDM-LIC.
configuration.
2024 pwe3-stm1oc3-s-loopback- Alarm Equipment Loopback on TDM-LIC Warning STM1/OC3 loopback Disable STM1/OC3 loopback.
alarm STM1/OC3 port enabled.
2025 pwe3-stm1oc3-s-los-alarm Alarm Equipment Loss Of Signal (LOS) on Critical 1. Cable is not properly 1. Reconnect cable.
TDM-LIC STM1/OC3 connected. 2. Check line cables.
port 2. External equipment 3. Check external equipment.
is faulty.
4. Reset the TDM-LIC.
3. Peer Equipment
Configuration
problem.
2026 pwe3-stm1oc3-s-mute-override- Alarm Equipment SFP is muted on TDM- Warning The SFP interface has Set the interface to mute OFF.
alarm LIC STM1/OC3 port been muted.
2027 pwe3-stm1oc3-s-sfp-absent- Alarm Equipment SFP absent in TDM-LIC Critical SFP is not inserted Insert the SFP.
alarm STM1/OC3 port properly.
2028 pwe3-stm1oc3-s-sfp-failure- Alarm Equipment SFP failure on TDM-LIC Critical 1. SFP is not inserted 1. Insert the SFP.
alarm STM1/OC3 port properly. 2. Replace the SFP.
2. Card is faulty. 3. Replace the card.
2029 pwe3-stm1oc3-s-sfp-tx-fail- Alarm Equipment SFP transmit failure on Critical 1. SFP is not inserted 1. Insert the SFP.
alarm TDM-LIC STM1/OC3 properly. 2. Replace the SFP.
port 2. Card is faulty. 3. Replace the card.
2030 pwe3-stm1oc3-s-signal- Alarm Equipment Signal Degrade on TDM- Minor 1. Line is not properly 1. Install SFP properly.
degrade-alarm LIC STM1/OC3 port connected. 2. Reconnect line.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2. SFP is not properly 3. Check line cables.
installed. 4. Check external equipment.
3. SFP is faulty. 5. Change Signal Degrade
4. External equipment Threshold.
is faulty
2031 pwe3-stm1oc3-s-slm-alarm Alarm Equipment J0 Trace Identifier Minor 1. J0 misconfiguration. 1. Make sure expected and
Mismatch on TDM-LIC 2. Line is not properly received J0 identifiers
STM1/OC3 port connected. match.
3. SFP is not properly 2. Connect line cables
installed. properly.
4. External equipment 3. Install SFP properly.
is faulty.
2032 pwe3-stm1oc3-s-ssm-rx- Event Equipment SSM pattern received Warning
changed on TDM-LIC STM1/OC3
port changed
2033 pwe3-vc12vt15-s-ais-alarm Alarm Equipment Alarm Indication Signal Minor 1. Cable is not properly 1. Check the cable
(AIS) on TDM-LIC connected. connectivity at both local
VC12/VT1.5 2. Local/Peer and peer interfaces.
Configuration is 2. Check/Correct the
incorrect. configuration at the
local/peer.
2034 pwe3-vc12vt15-s-excessive-ber- Alarm Equipment Excessive BER on TDM- Minor 1. Line is not properly 1. Check the line cables.
alarm LIC VC12/VT1.5 connected. 2. Fix the problem at the
2. External equipment peer.
is faulty.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
3. Change the Excessive BER
threshold.
2035 pwe3-vc12vt15-s-loopback- Alarm Equipment Loopback on TDM-LIC Warning Loopback enabled on Disable loopback on TDM-LIC
alarm VC12/VT1.5 TDM-LIC VC12/VC11. VC12/VC11.
2036 pwe3-vc12vt15-s-rcv-plm-alarm Alarm Equipment Payload Mismatch Path Minor Incorrect VC12/VC11 Check/Correct the
(PLM) received on TDM- configuration configuration at the local/peer.
LIC VC12/VT1.5
2037 pwe3-vc12vt15-s-rcv-rdi-alarm Alarm Equipment Remote Defect Minor 1. Alarm exists along 1. Fix the problem along the
Indication (RDI) received the Trail. trail.
on TDM-LIC VC12/VT1.5 2. Cable is not properly 2. Check the cable
connected. connectivity at both local
and peer interfaces.
2038 pwe3-vc12vt15-s-rcv-slm-alarm Alarm Equipment Signal Label Mismatch Minor 1. J2 misconfiguration. 1. Make sure expected and
(SLM) received on TDM- 2. Line is not properly receive J2 match
LIC VC12/VT1.5 connected. 2. Reconnect line.
3. External equipment 3. Check line cables.
is faulty. 4. Check external equipment.
5. Reset the TDM-LIC.
2039 pwe3-vc12vt15-s-signal- Alarm Equipment Signal Degrade on TDM- Minor 1. Line is not properly 1. Reconnect line.
degrade-alarm LIC VC12/VT1.5 connected. 2. Check line cables.
2. External equipment 3. Check external equipment.
is faulty.
4. Reset the TDM-LIC.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2040 pwe3-vc12vt15-s-unequipped- Alarm Equipment Unequipped on TDM-LIC Minor 1. Incorrect line is 1. Reconnect line.
alarm VC12/VT1.5 connected. 2. Check line cables.
2. External equipment 3. Check external equipment.
is faulty or
4. Reset the TDM-LIC.
misconfigured.
2041 pwe3-card-group-s-config- Alarm Equipment TDM-LIC card protection Major The configuration Apply a copy-to-mate
mismatch configuration mismatch between the TDM-LIC command to copy the
card protection members configuration from the
is not aligned required TDM-LIC to the other
one
2042 pwe3-card-group-s-lockout Alarm Equipment TDM-LIC card protection Minor The user has issued a Clear the lockout command
group lockout command lockout command
is on
2043 pwe3-card-group-s-no-mate Alarm Equipment A member of TDM-LIC Minor TDM-LIC card is not Install the missing TDM-LIC
card protection group is installed in the shelf card
missing
2044 pwe3-card-group-s-protection- Event Equipment TDM-LIC card protection Warning 1. LOS alarm on a STM1 1. Check line cables.
switch-evt switch over, priority interface of the 2. Enable the TDM-LIC card
TDM-LIC card protection group member
protection group or insert the missing card
member; into the shelf.
2. A TDM-LIC card
protection group
member was
disabled or pulled
out of the shelf
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2045 pwe3-vc12vt15-s-lop-alarm Alarm Equipment Loss Of Pointer (LOP) Minor 1. Timing not 1. Correct the timing
received on TDM-LIC configured correctly. configuration.
VC12/VT1.5 2. End-to-end timing is 2. Correct the end-to-end
not synchronized. timing problem.
3. External Equipment 3. Check the external
is faulty. equipment.
4. Network service 4. Fix the network service
connectivity problem.
problem. 5. Fix the interface and card
5. Lower layer problem. problem.
2046 pwe3-tunnel-groups-s- Event Equipment Path protection switch Minor 1. Failure along service 1. Check errors along primary
protection-switch on TDM service primary path. path
2. User command. 2. Check local service
configuration.
2047 pwe3-tunnel-groups-s- Event Equipment Path protection Minor Primary path has been -
revertive-switch revertive switch on TDM operational for the
service duration of the defined
WTR time
2100 STM-1-OC-3-IN-LOS Alarm Equipment Loss of Signal on Line Critical 1. Line is not properly 1. Reconnect line.
Interface (LOS) on STM- connected. 2. Check line cables.
1/OC-3 port. 2. External equipment 3. Check external equipment.
is faulty.
2101 STM-1-OC-3-IN-LOF Alarm Equipment Loss of Frame on Line Major 1. Line is not properly 1. Reconnect line.
Interface (LOF) on STM- connected. 2. Check line cables.
1/OC-3 port.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2. External equipment 3. Check external equipment.
is faulty.
2102 STM-1-OC-3-IN-MSAIS Alarm Equipment Alarm Indication Signal Minor 1. Line is not properly 1. Reconnect line.
on Line Interface (MS- connected. 2. Check line cables.
AIS/AIS-L) received. 2. External equipment 3. Check external equipment.
is faulty.
2103 STM-1-OC-3-IN-MSRDI Alarm Equipment Remote Defect Minor External equipment is 1. Reconnect line.
Indication on Line faulty. 2. Check line cables.
Interface (MS-RDI/RDI-
3. Check external equipment.
L) received.
2104 STM-1-OC-3-RX-LOS Alarm Equipment Loss of STM-1/OC-3 Major 1. All channels in Multi 1. Check link performance.
Frame on Radio Carrier ABC group 2. Check radio alarms for
Interface. are down. channel.
2. Incorrect 3. Check configuration.
configuration on
remote side.
2105 STM-1-OC-3-RX-MSAIS Alarm Equipment MS-AIS/AIS-L on Radio Minor 1. Remote STM-1/OC-3 Check remote equipment.
Interface detected. signal is missing
(LOS/LOF/MS-
AIS/AIS-L on remote
STM-1/OC-3
interface).
2. STM-1/OC-3
Channel removed
due to reduced
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
radio capacity on
remote side.
2106 STM-1-OC-3-RX-RDI Alarm Equipment MS-RDI/RDI-L on Radio Minor External equipment is Check remote equipment.
Interface detected. faulty.
2107 STM-1-OC-3-LOOPBACK Alarm Equipment STM-1/OC-3 Loopback Warning Looping. Remove looping.
2108 STM-1/OC-3-CHANNEL-1- Alarm Equipment STM-1/OC-3 Channel Warning 1. Reduced capacity. 1. Check link performance.
REMOVED Removed alarm (due to 2. Fading 2. Check radio alarms for
reduced radio capacity). channel.
2109 STM-1-OC-3-PBRS-INSERTION Alarm Equipment PRBS insertion. Warning PRBS insertion on STM- Remove PRBS insertion.
1/OC-3 card.
2110 STM-1-OC-3-SFP-NOT- Alarm Equipment SFP absent in STM- Critical 1. SFP is not properly 1. Install SFP properly.
DETECTED 1/OC-3 port. installed. 2. Replace the card.
2. SFP is faulty.
2111 STM-1-OC-3-SFP-TX-FAILURE Alarm Equipment SFP Transmit Failure on Critical 1. SFP is faulty. 1. Replace SFP or insert SFP if
STM-1/OC-3 port. it is not inserted correctly.
2. Replace the card.
2112 STM-1-OC-3-SFP-TX-MUTED Alarm Equipment SFP is muted on STM- Warning SFP is muted by Remove muting.
1/OC-3 port. configuration.
2113 STM-1/OC-3-CHANNEL-2- Alarm Equipment STM-1/OC-3 Channel Warning 1. Reduced capacity. 1. Check link performance.
REMOVED Removed alarm (due to 2. Fading. 2. Check radio alarms for
reduced radio capacity). channel.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2114 STM-1/OC-3-CHANNEL-3- Alarm Equipment STM-1/OC-3 Channel Warning 1. Reduced capacity. 1. Check link performance.
REMOVED Removed alarm (due to 2. Fading. 2. Check radio alarms for
reduced radio capacity). channel.
2115 STM-1/OC-3-CHANNEL-4- Alarm Equipment STM-1/OC-3 Channel Warning 1. Reduced capacity. 1. Check link performance.
REMOVED Removed alarm (due to 2. Fading. 2. Check radio alarms for
reduced radio capacity). channel.
2116 STM-1/OC-3-CHANNEL-5- Alarm Equipment STM-1/OC-3 Channel Warning 1. Reduced capacity. 1. Check link performance.
REMOVED Removed alarm (due to 2. Fading. 2. Check radio alarms for
reduced radio capacity). channel.
2117 STM-1/OC-3-CHANNEL-6- Alarm Equipment STM-1/OC-3 Channel Warning 1. Reduced capacity. 1. Check link performance.
REMOVED Removed alarm (due to 2. Fading. 2. Check radio alarms for
reduced radio capacity). channel.
2118 STM-1/OC-3-CHANNEL-7- Alarm Equipment STM-1/OC-3 Channel Warning 1. Reduced capacity. 1. Check link performance.
REMOVED Removed alarm (due to 2. Fading. 2. Check radio alarms for
reduced radio capacity). channel.
2119 STM-1/OC-3-CHANNEL-8- Alarm Equipment STM-1/OC-3 Channel Warning 1. Reduced capacity. 1. Check link performance.
REMOVED Removed alarm (due to 2. Fading. 2. Check radio alarms for
reduced radio capacity). channel.
2120 STM1-OC3-GROUP-ACTIVITY- Event Equipment STM-1/OC-3 Group Warning 1. LOS alarm on an 1. Check line cables.
CHANGED protection switchover STM-1/OC-3 2. Check external equipment.
interface.
2. STM1-OC3 Group
protection group
member was
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
disabled or pulled
out of the shelf.
2200 MC-ABC-Local-LOF Alarm Communications Multi Carrier ABC LOF. Critical All channels in Multi 1. Check link performance on
Carrier ABC group are all radio channels in Multi
down. Carrier ABC group.
2. Check radio alarms for
channels in Multi Carrier
ABC group.
3. Check configuration of
Multi Carrier ABC group.
2201 MC-ABC-local-cap-below Alarm Multi Carrier ABC Major 1. One of the radio 1. Check link performance on
bandwidth is below the channels in the Multi all radio channels in Multi
threshold Carrier ABC group Carrier ABC group
has a lower capacity 2. Check radio alarms for
than expected channels in Multi Carrier
2. Minimum bandwidth ABC group
threshold 3. Check configuration of
configuration is Multi Carrier ABC group
wrong Minimum bandwidth
threshold
2203 MC-ABC-Lvds-Error-Sl2 Alarm Equipment LVDS RX Error Slot 2. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2204 MC-ABC-Lvds-Error-Sl3 Alarm Equipment LVDS RX Error Slot 3. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
2205 MC-ABC-Lvds-Error-Sl4 Alarm Equipment LVDS RX Error Slot 4. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
2206 MC-ABC-Lvds-Error-Sl5 Alarm Equipment LVDS RX Error Slot 5. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
2207 MC-ABC-Lvds-Error-Sl6 Alarm Equipment LVDS RX Error Slot 6. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
2208 MC-ABC-Lvds-Error-Sl7 Alarm Equipment LVDS RX Error Slot 7. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
2209 MC-ABC-Lvds-Error-Sl8 Alarm Equipment LVDS RX Error Slot 8. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
2210 MC-ABC-Lvds-Error-Sl9 Alarm Equipment LVDS RX Error Slot 9. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2211 MC-ABC-Lvds-Error-Sl10 Alarm Equipment LVDS RX Error Slot 10. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
2212 MC-ABC-Lvds-Error-Sl12 Alarm Equipment LVDS RX Error Slot 12. Major Hardware failure 1. Replace RMC.
between RMC and TCC 2. Replace TCC.
cards.
3. Replace chassis.
2219 MC-ABC-Ch-Id-Mismatch-Ch1 Alarm Equipment Multi Carrier ABC Warning Configuration failure. Compare Channel ID
Channel Id Mismatch configuration with remote side.
Ch1.
2220 MC-ABC-Ch-Id-Mismatch-Ch2 Alarm Equipment Multi Carrier ABC Warning Configuration failure. Compare Channel ID
Channel Id Mismatch configuration with remote side.
Ch2.
2221 MC-ABC-Ch-Id-Mismatch-Ch3 Alarm Equipment Multi Carrier ABC Warning Configuration failure. Compare Channel ID
Channel Id Mismatch configuration with remote side.
Ch3.
2222 MC-ABC-Ch-Id-Mismatch-Ch4 Alarm Equipment Multi Carrier ABC Warning Configuration failure. Compare Channel ID
Channel Id Mismatch configuration with remote side.
Ch4.
2223 MC-ABC-Ch-Id-Mismatch-Ch5 Alarm Equipment Multi Carrier ABC Warning Configuration failure. Compare Channel ID
Channel Id Mismatch configuration with remote side.
Ch5.
2224 MC-ABC-Ch-Id-Mismatch-Ch6 Alarm Equipment Multi Carrier ABC Warning Configuration failure. Compare Channel ID
Channel Id Mismatch configuration with remote side.
Ch6.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2225 MC-ABC-Ch-Id-Mismatch-Ch7 Alarm Equipment Multi Carrier ABC Warning Configuration failure. Compare Channel ID
Channel Id Mismatch configuration with remote side.
Ch7.
2226 MC-ABC-Ch-Id-Mismatch-Ch8 Alarm Equipment Multi Carrier ABC Warning Configuration failure. Compare Channel ID
Channel Id Mismatch configuration with remote side.
Ch8.
2235 MC-ABC-Ch-Id-Disabled-Ch1 Alarm Equipment Multi Carrier ABC Warning Admin state for channel Enable admin state for
Channel Id Manual is down. channel.
Disabled Ch1.
2236 MC-ABC-Ch-Id-Disabled-Ch2 Alarm Equipment Multi Carrier ABC Warning Admin state for channel Enable admin state for
Channel Id Manual is down. channel.
Disabled Ch2.
2237 MC-ABC-Ch-Id-Disabled-Ch3 Alarm Equipment Multi Carrier ABC Warning Admin state for channel Enable admin state for
Channel Id Manual is down. channel.
Disabled Ch3.
2238 MC-ABC-Ch-Id-Disabled-Ch4 Alarm Equipment Multi Carrier ABC Warning Admin state for channel Enable admin state for
Channel Id Manual is down. channel.
Disabled Ch4.
2239 MC-ABC-Ch-Id-Disabled-Ch5 Alarm Equipment Multi Carrier ABC Warning Admin state for channel Enable admin state for
Channel Id Manual is down. channel.
Disabled Ch5.
2240 MC-ABC-Ch-Id-Disabled-Ch6 Alarm Equipment Multi Carrier ABC Warning Admin state for channel Enable admin state for
Channel Id Manual is down. channel.
Disabled Ch6.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2241 MC-ABC-Ch-Id-Disabled-Ch7 Alarm Equipment Multi Carrier ABC Warning Admin state for channel Enable admin state for
Channel Id Manual is down. channel.
Disabled Ch7.
2242 MC-ABC-Ch-Id-Disabled-Ch8 Alarm Equipment Multi Carrier ABC Warning Admin state for channel Enable admin state for
Channel Id Manual is down. channel.
Disabled Ch8.
2250 CRB-Group-Entity Alarm communications Enhanced Multi Carrier Critical All channels in Enhanced 1. Check link performance on
ABC LOF Multi Carrier ABC group all channels in Enhanced
are down Multi Carrier ABC group.
2. Check alarms for channels
in Enhanced Multi Carrier
ABC group.
3. Check configuration of
Enhanced Multi Carrier
ABC group.
2300 protection-configuration- Alarm Equipment Protection configuration Major The configuration Apply copy-to-mate command
mismatc mismatch! between the protected to copy the configuration from
devices is not aligned. the required device to the
other one.
2301 protection-copytomate-started Event Processing Copy to mate started Indeterminate The copy-to-mate This is a notification
command has just begun!
2302 protection-copytomate- Event Processing Copy to mate Indeterminate The copy-to-mate This is a notification
completed completed command was
completed.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
3000 chassis-reset-event Event Equipment Chassis was reset Warning User issued a command Wait until the reset cycle is
to reset the chassis. ended and the system is up
and running.
3001 10gbps-mode-front-panel-ports- Alarm Equipment Reset chassis to activate Warning Front panel Ethernet Reset chassis.
unavailable front panel Ethernet ports cannot work when
ports slot 12 is configured in
10Gbps mode.
3002 slot-mode-front-panel-ports- Alarm Equipment Front panel Ethernet Warning Front panel Ethernet port Configure the relevant capacity
not-functional port cannot function in cannot work in a mode mode to 1 Gbps mode.
current configured other than 1Gbps.
capacity mode
3003 abc-mode-not-functional Alarm Equipment Multi Carrier ABC group Warning Multi Carrier ABC group Configure the relevant capacity
is not functional in does not support the mode to 1 Gbps mode.
current configured configured capacity
capacity mode mode.
3004 abc-mode-not-functional-until- Alarm Equipment Multi Carrier ABC group Warning Multi Carrier ABC group Reset chassis.
reset is not functional in capacity mode is
current configured different than the
capacity mode until configured capacity
chassis is reset mode.
4000 hw-failure Alarm Equipment Card has one or more Critical One or more HW faults. Replace card.
HW failures
4001 slotsection-2_5gbps- Alarm Equipment Card cannot function in Warning The user set an expected Change the Slot Section to
compatibility 2.5Gbps mode. card that does not 1Gbps.
support 2.5Gbps.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
4002 slot-slotsection-10gbps-card- Alarm Equipment Card is not functional Warning Slot is not in 10Gbps Reset chassis.
not-functional until chassis is reset mode.
5000 failure-login-event Event Equipment User blocked due to Indeterminate User blocked due to The user should wait few
consecutive failure login consecutive failure login minutes until it account will be
unblock
5001 g8032-protection-switching- Alarm Processing ERPI is either in Minor Either link failure Fix the broken link in the ring
alarm protection state or happened in the ring or or release the force/manual
forced protection state force/manual command command.
is active.
5002 g8032-failure-of-protocol-pm- Alarm Processing More than a single RPL Warning RPL configuration is Reconfigure the RPL
alarm is configured in a ring wrong. configuration.
5003 lldp-topology-change Event Processing LLDP topology change Warning New neighbor None
5004 security-log-upload-started- Event Equipment Security log upload Indeterminate Security log upload
event started started
5005 security-log-upload-failed-event Event Equipment Security log upload Indeterminate Security log upload failed
failed
5006 security-log-upload-succeeded- Event Equipment Security log upload Indeterminate Security log upload
event succeeded succeeded
5010 force-mode-alarm Alarm Equipment System is in sync force Warning User command
mode state
5011 sync-quality-change-event Event Equipment The sync-source quality Major
level was changed
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
5012 system-clock-in-holdover-mode Alarm Equipment System Synchronization Critical Active Sync Source Fix the Sync Source Failure.
Reference in Holdover Failure and the clock unit Provide an alternative sync
Mode enters holdover mode source.
5013 sync-T0-quality-change-event Event Equipment System sync reference Major
T0 quality has changed
5014 sync-pipe-invalid-interface- Alarm Equipment The pipe interface clock- Major For interfaces of a Pipe, Set the outgoing clock source
clock-source source in signal- the outgoing clock source type to System Clock in the
interface table is not type must be "System Outgoing Clock Table via
system-clock Clock". Outgoing Clock view in the
Web EMS or the platform sync
interface config command in
the CLI.
5015 sync-pipe-missing-edge Alarm Equipment The pipe is missing an Major Pipe Regenerator Configure a second interface
edge interface contains less than 2 for the Pipe Regenerator.
interfaces.
5016 sync-pipe-interface-op-state- Alarm Equipment Pipe interface Major One or both of the 1. Check both interfaces of
down operational state is Regenerator Interfaces the pipe regenerator -
down status is down. admin and operational
statuses.
2. Check Ethernet cable
communication.
3. Make sure Radio Link is up.
5017 sync-pipe-invalid-pipe Alarm Equipment Pipe is invalid Major Pipe Regenerator 1. Fix the Pipe Regenerator
configuration is invalid or configuration.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
interface operational 2. Ensure both interfaces are
failure. operational.
5018 sync-1588-tc-not-operational Alarm Equipment 1588TC is not Major System Failure Reboot the unit
operational
5019 sync-1588-tc-not-calibrated Alarm Sync 1588TC over the radio is Major 1588TC over the radio is Check that the radio link
not calibrated enabled but could not be configuration have:
calibrated 1. TC enabled on both sides
2. Frequency lock UP on both
sides
3. TC downstream at one
side and upstream on the
other side
5020 sync-T3-remote-loopback Alarm Equipment T3 interface at loopback Warning T3 Interface is configured If required, disable the
mode in loopback. loopback.
5021 sync-T4-analog-loopback Alarm Equipment T4 interface at loopback Warning T4 Interface is configured If required, disable the
mode in loopback. loopback.
5022 security-rsa-key-download- Event Equipment Security rsa key Indeterminate Security rsa key
failed-event download failed download failed
5023 security-rsa-key-download- Event Equipment Security rsa key Indeterminate Security rsa key
started-event download started download started
5024 security-rsa-key-download- Event Equipment Security rsa key Indeterminate Security rsa key
succeeded-event download succeeded download succeeded
5025 security-rsa-key-install-failed- Event Equipment Security rsa key install Indeterminate Security rsa key install
event failed failed
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
5026 security-rsa-key-install-started- Event Equipment Security rsa key install Indeterminate Security rsa key install
event started started
5027 security-rsa-key-install- Event Equipment Security rsa key install Indeterminate Security rsa key
succeeded-event succeeded download succeeded
5030 soam-connectivity-failure Alarm Processing A connectivity failure in Minor Wrong link Check the link in the traffic
MA/MEG configurations. path
5031 soam-def-error-failure Alarm Processing Error CCM received Major 1. Invalid CCMs has 1. Check the links along the
been received. traffic path.
2. MEP Id does not 2. Check the configuration of
exist or a wrong the MEPs.
interval was received
in the CCM.
5032 soam-def-mac-failure Alarm Processing Remote mep MAC Minor Remote MEP’s associated Check remote Port Interface
status not up MAC is reporting an error status
status
5033 soam-def-rdi-failure Alarm Processing Mep Rdi received Minor Remote Defect indication 1. Check the SOAM
has been received from configurations.
remote MEP 2. Check that all local MEPs
are configured correctly
and enabled.
3. Check the service
connectivity.
5034 soam-remote-ccm-failure Alarm Processing Remote mep CCMs are Major The MEP is not 1. Check all the remote
not received receiving CCMs from at SOAM configurations.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
least one of the remote 2. Check that all remote
MEPs MEPs are configured
correctly and enabled.
3. Check the service
connectivity.
5035 soam-def-xcon-failure Alarm Processing Cross Connect CCM Major CCM from another MAID Check MA/MEG and MEP
received or lower MEG level have configurations
been received
5036 ptp-stream-state-change Event Processing 1588-BC port state Warning
changed
5037 ptp-bmca-update Event Processing 1588-BC BMCA has Warning
been updated.
5038 ptp-output-squelch Event Processing 1588-BC outputs are Warning
squelched.
5039 ptp-parent-data-set-change Event Processing 1588-BC parent dataset Warning
has changed.
5040 ptp-utc-offset-change Event Processing 1588-BC UTC offset Warning
value changed.
5041 ptp-leap-seconds-flag-change Event Processing 1588-BC one of the leap Warning
seconds flags have
changed.
5042 ptp-message-interval-change Event Processing 1588-BC message Warning
interval change
detected.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
5043 ptp-message-rate-announce Alarm Processing 1588-BC announce Major Misconfiguration of the Check the message rate
message rate is below peer system. configuration of the peer
expected. system.
5044 ptp-message-rate-sync Alarm Processing 1588-BC sync message Major Misconfiguration of the Check the message rate
rate is below expected. peer system. configuration of the peer
system.
5045 ptp-message-rate-delay-req Alarm Processing 1588-BC delay request Major Misconfiguration of the Check the message rate
message rate is below peer system. configuration of the peer
expected. system.
5046 ptp-no-syncE Alarm Processing 1588-BC performance is Critical Loss of system clock Restore the system clock
degraded due to loss of reference. synchronization to a PRC-
system clock reference. traceable source.
5047 soam-csf-rdi-alarm Alarm Processing Auto-state-propagation Major Remote system triggered Resolve the problem on the
indication received auto-state-propagation .remote system.
5048 lacp-port-out-of-sync-alarm Alarm Processing LACP port out of Major LACP port was not Resolve the problem on the
collecting-distributing selected by the remote system
aggregator or partner is
out of sync
5100 mkey-mismatch Alarm Equipment Master key mismatch Critical Master Key was not set Verify the Master Key.
cross over the link correctly.
5101 mkey-no-exist Alarm Equipment No Master Key set, Warning Crypto module has been Set the Master Key.
default value used enabled, but no Master
Key has been loaded.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
5102 general-encryption-failure Alarm Equipment Payload Encryption Critical 1. Radio LOF on Tx/Rx 4. Validate the MSE on both
failure direction. sides of the link.
2. The session key does 5. Validate the session key on
not match across the both sides of the link.
link. 6. Validate the AES admin
3. The AES admin setting on both sides of
setting does not the link.
match across the
link.
5104 kep-initiated Event Equipment Key Exchange Protocol Indeterminate
in progress, Traffic has
been blocked
5105 kep-remote-initiated Event Equipment Key Exchange Protocol Indeterminate
initiated by remote side
5107 bypass-self-test-alarm Alarm Equipment FIPS Bypass Self-Test Critical Disk failure
failed
5108 post-fail-alarm Alarm Equipment Power On Self-Test Critical System failure 1. Reboot the unit.
Failed 2. Check for faults.
3. Replace unit
5109 main-board-non-fips-alarm Alarm Equipment Main Board is not FIPS Critical Main Board used is not Use a FIPS-certified TCC.
certified FIPS certified
5110 radio-non-fips-alarm Alarm Equipment Radio card is not FIPS Major Radio Card used is not Use a FIPS-certified RMC.
certified FIPS certified
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
5111 aes-self-test-fail-alarm Alarm Equipment Radio crypto module fail Critical FIPS Radio Encryption Use different FIPS supported
Self-Test failed radio card
5112 hw-not-supported-alarm Alarm Equipment Radio Encryption not Major No Payload Encryption Insert suitable Activation Key
supported Activation Key inserted and reboot the unit
5113 prot-pre-shared-key-alarm Alarm Equipment Protection Pre-Shared- Major Protection Pre-shared Configure the Pre-shared key
Key has the default key was not configured to a different value than the
value default
5132 security-certificate-download- Event Security Security certificate Indeterminate Security certificate N/A
success-event download succeeded download succeeded
5133 security-certificate-download- Event Security Security certificate Indeterminate Security certificate N/A
failed-event download failed download failed
5134 security-certificate-download- Event Security Security certificate Indeterminate Security certificate N/A
started-event download started download started
5222 security-csr-upload-success- Event Security Security CSR upload Indeterminate Security csr upload N/A
event succeeded succeeded
5223 security-csr-upload-failed-event Event Security Security CSR upload Indeterminate Security csr upload failed N/A
failed
5224 security-csr-upload-started- Event Security Security CSR upload Indeterminate Security csr upload N/A
event started started
30007 Clock-source-sharing-failure- Event Equipment Clock source sharing Critical 1. Faulty coaxial cable 1. Try re-initiation of MIMO.
event failure between master and If still fails:
slave RFUs.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2. Hardware failure in 2. Replace faulty coaxial
Master RFU. cable and reset Master
3. Hardware failure in RFU.
Slave RFU. 3. Replace faulty RFU.
31000 Insufficient-conditions-for- Alarm Equipment Insufficient conditions Critical 1. Insufficient 1. Make sure all cables
MIMO-alarm for MIMO conditions for between master and slave
MIMO. are connected (4x4 MIMO
2. Hardware failure. only).
2. Replace faulty units and
check that cables are
plugged.
31003 Unsuitable-hardware-for- Alarm Communications Unsuitable hardware for Critical 1. Unsuitable hardware Make sure both RFUs are
MIMO-alarm MIMO for MIMO operation compatible for MIMO
requirements. operation.
2. Dual carrier RFUs
(2x2 and 4x4 MIMO).
3. RFUs with MIMO bus
interface (4x4
MIMO).
4. Clock source sharing
capability (4x4
MIMO).
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
31004 Unsuitable-software- Alarm Communications Unsuitable software Critical 1. Not all MIMO 1. Load same MIMO
configuration-for-MIMO-alarm configuration for MIMO carriers are set to compatible radio script to
same radio script or all MIMO carriers.
script is not 2. Set same TX and RX
compatible for frequency on all MIMO
MIMO. carriers.
2. Radio TX and RX 3. Disable XPIC, Multi radio
frequency is not and ATPC on all MIMO
identical on all carriers.
MIMO carriers.
3. XPIC or Multi radio
or ATPC features are
enabled.
31005 Clock-source-sharing-failure- Alarm Equipment Clock source sharing Critical 1. Faulty coaxial cable 1. Replace faulty coaxial
alarm cable unplugged between master and cable and reset Master
slave RFUs RFU.
2. Mate does not exist 2. Replace faulty RFU.
31100 AMCC-Incompatible-radio- Alarm Communications Radio script is Critical MRMC Script selected Set AFR Script in both Agg1 &
script-alarm incompatible to AMCC does not support AMCC Agg2 carriers
Group type/subtype
31101 AMCC-Inconsistent-MRMC- Alarm Communications Inconsistent MRMC Critical All members of a group Set the members to the
Script-alarm script between must be configured to appropriate MRMC script
members the same MRMC Script
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
31102 AMCC-Inconsistent-radio- Alarm Communications Inconsistent radio Critical Radio TX/RX frequency is Set same radio TX/RX
frequency-alarm frequency not identical on all AMCC frequency on all AMCC carriers
carriers
31103 AMCC-Failed-To-Load-Alarm Alarm Communications Agg 1 failed Bring-up Critical Agg1 did not complete Drop both Agg1 & Agg2 into
procedure Bring-up successfully single carrier mode (Pre-Init)
31104 AMCC-Invalid-ACM- Alarm Communications Invalid ACM Critical AMCC member have Set AMCC member to adaptive
Configuration-alarm configuration been set to fixed profile ACM profiles
31105 AMCC-Mimo-not-supported- Alarm Equipment AMCC/MIMO Critical 1. MIMO script is not 1. Align MIMO script on all
alarm insufficient condition – enabled on any radio radio members.
configuration is not member. 2. Align same frequency on
supported 2. Different TX/RX all radio members.
frequency. 3. Disable ATPC.
3. ATPC enabled. 4. Disable XPIC.
4. XPIC enabled. 5. Align ACM mode.
5. ACM mode 6. Disable Unit Redundancy.
(adaptive/Fixed) is
7. Replace unit.
not the same.
6. Unit Redundancy
enabled.
7. Platform not
supported.
31106 AMCC-Master-failure-alarm Alarm Equipment AMCC insufficient Critical Master unit failure. 1. Verify Master unit power.
condition – Master unit 2. Replace hardware.
failure.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
31107 AMCC-Slave-failure-alarm Alarm Equipment AMCC insufficient Critical Slave unit failure. 1. Verify Slave unit power.
condition – Slave unit 2. Replace hardware.
failure.
31108 AMCC-Data-Sharing-cable- Alarm Equipment AMCC insufficient Critical Data sharing cable 1. Verify Data sharing cable
disconnected-alarm condition – Data sharing failure. connected.
cable failure. 2. Replace Data sharing
cable.
31109 AMCC-Prot-port-cable- Alarm Equipment MIMO insufficient Critical Mate communication 1. Verify Mate
disconnected-alarm condition – Mate cable failure. communication cable
communication cable connected.
failure. 2. Replace Mate
communication cable.
31110 AMCC-Source-Sharing-cable- Alarm Equipment MIMO insufficient Critical Source sharing cable 1. Verify Source sharing cable
disconnected-alarm condition – Source failure. connected.
sharing cable failure. 2. Replace Source sharing
cable.
31111 AMCC-Master-Slave-config- Alarm Equipment MIMO insufficient Critical Master/Slave Align Master/Slave
mismatch-alarm condition - configuration mismatch configuration.
Master/Slave due to:
configuration mismatch 1. Different TX/RX
frequency.
2. Different MIMO
script ID.
3. Different ACM mode
(adaptive/Fixed).
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
31112 AMCC-Remote-failure-alarm Alarm Equipment AMCC insufficient Critical AMCC remote failure. Handle AMCC remote failure.
condition – Remote
failure
31113 AMCC-Asd-not-supported-alarm Alarm Radio AMCC/ASD insufficient Critical 1. ASD script is not 1. Align ASD script on all
condition - enabled on any radio radio members.
configuration is not member. 2. Align same frequency on
supported 2. Different TX/RX all radio members.
frequency. 3. Disable ATPC.
3. ATPC enabled. 4. Disable XPIC.
4. XPIC enabled. 5. Set ACM mode to adaptive
5. ACM mode is not on all radio members.
adaptive on any
6. Disable Unit Redundancy.
radio member.
7. Replace platform.
6. Unit Redundancy
enabled.
7. Platform not
supported.
31114 AMCC-SD-not-supported-alarm Alarm Radio AMCC/SD insufficient Critical 1. SD script is not 1. Align SD script on all radio
condition - enabled on any radio members.
configuration is not member. 2. Align same frequency on
supported 2. Different TX/RX all radio members.
frequency. 3. Disable ATPC.
3. ATPC enabled. 4. Disable XPIC.
4. XPIC enabled. 5. Align ACM mode.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
5. ACM mode 6. Replace RFU.
(adaptive/Fixed) is
not the same.
6. RFU not supported.
31115 AMCC-Data-Sharing-failure- alarm Radio AMCC insufficient Critical Units alignment failure. 1. Verify Source sharing cable
alarm condition - Units connected.
alignment failure. 2. Replace Source sharing
cable.
3. Verify Data sharing cable
connected.
4. Replace Data sharing
cable.
5. Verify using correct SFPs.
31118 AMCC-XPIC-not-supported- alarm Radio XPIC configuration is not Critical XPIC MRMC script is not Set XPIC MRMC script
alarm supported configured
31119 AMCC-XPIC-remote-failure- alarm Radio XPIC configuration Warning XPIC remote failure Handle XPIC remote failure
alarm failure in remote
32000 unit-mgr-undervoltage-alarm Alarm Equipment Under voltage Major System Power Voltage
lower than allowed.
32001 unit-mgr-overvoltage-alarm Alarm Equipment Over voltage Major System Power Voltage
higher than allowed.
Alarm ID Name Type Group Description Severity Probable Cause Corrective Action
2
32002 unit-mgr-extremeTemperature- Alarm Management System Temperature Major
alarm not in allowed range.
32003 unit-mgr-unit-reset-event Event Management Unit was reset. Warning User issued a command Wait until the reset cycle is
to reset the unit ended and the system is up
and running
33001 anti-theft-enabled-event Event Management Anti-Theft Procedures Indeterminate
have been enabled
33002 anti-theft-temporary-disabled- Event Management Anti-Theft Procedures Indeterminate
event have been temporary
disabled
33003 anti-theft-sanction-timer- Alarm Management Anti-Theft Sanction Critical Watchdog timer Return the equipment to the
countdown-alarm Mode 24 hours window countdown network
has been triggered
33004 anti-theft-sanction-mode- Alarm Management Anti-Theft Sanction Critical Equipment has been Return the equipment to the
entered-alarm Mode is Active stolen network
2
This alarm is not relevant for IP-20 all-outdoor products.
25. Abbreviations
The following table lists the abbreviations used in this guide.
BB Baseband
BBS Baseband Switching
BER Bit Error Rate
BLSR Bidirectional Line Switch Ring
BNM Bandwidth Notification Message
BPDU Bridge Protocol Data Units
DA Destination Address
DC Direct Current
DCB Diversity Circulator Block
DCC Data Communication Channel
DDM Digital Diagnostic Monitoring
DXC Digital Cross Connect
DSCP Differentiated Services Code Point
NE Network Element
NMS Network Management System
NTP Network Time Protocol
VC Virtual Container
VCO Voltage Controlled Oscillator
VCXO Voltage Controlled crystal Oscillator
VLSI Very Large Scale of Integration