Operation Manual
Operation Manual
Operation Manual
1 Command Mode ............................................................................ 1.1.2 Operator Authorities ....................................................................... 1.2 Security Features of the Command Line ................................................ 1.3 Operation Features of the Command Line ............................................. 1.3.1 Online Help .................................................................................... 1.3.2 Smart Interaction ............................................................................ 1.3.3 Intelligent Matching ........................................................................ 1.3.4 History Command .......................................................................... 1.3.5 Screen Clearance .......................................................................... 1.3.6 Telnet Terminal Services ............................................................... 1.4 Error Messages of the Command Line................................................... 1.5 Language Switchover of the Command Line ......................................... 1.6 Appointed Command Line Formats ........................................................ Chapter 2 Basic Configuration ....................................................................... 2.1 Configuration Procedures ....................................................................... 2.2 Introduction to Networking Application Examples .................................. 2.3 Configuring Basic Data........................................................................... 2.3.1 Tasks for Configuring Basic Data .................................................. 2.3.2 Configuring IP Address .................................................................. 2.3.3 Configuring the Device Information................................................ 2.3.4 Configuring the Board .................................................................... 2.3.5 Configuration Example ................................................................... 2.4 Configuring Interface Data ..................................................................... 2.4.1 Tasks for Configuring Interface Data ............................................. 2.4.2 Add MG Interface ........................................................................... 2.4.3 Configuring MG Registration Key .................................................. 2.4.4 Configuring MG Interface Data ...................................................... 2.4.5 Starting the MG Interface ............................................................... 2.4.6 Configuration Example ................................................................... 2.5 Configuring Access User Data ............................................................... 2.5.1 Introduction to Access Service ....................................................... 2.5.2 Configuring Ordinary User Service ................................................ 2.5.3 Configuring SPC Service ............................................................... 2.5.4 Configuration Example ................................................................... 2.6 Configuration Examples ......................................................................... 2.6.1 Configuring IP Address .................................................................. 2.6.2 Configuring Interface Data .............................................................
1-1 1-1 1-1 1-2 1-3 1-4 1-4 1-7 1-8 1-9 1-10 1-10 1-10 1-11 1-11 2-1 2-1 2-3 2-6 2-6 2-7 2-10 2-14 2-15 2-17 2-17 2-17 2-18 2-19 2-21 2-21 2-22 2-22 2-22 2-25 2-27 2-28 2-28 2-28
2.6.3 Configuring Access User Data ....................................................... 2.6.4 Saving the Configuration Data ....................................................... 2.6.5 Restarting the Device..................................................................... Chapter 3 Advanced Configuration ............................................................... 3.1 Configuring IAD Call Mode ..................................................................... 3.1.1 Introduction to Call Mode ............................................................... 3.1.2 Configuring Call Mode ................................................................... 3.1.3 Processing Call Collision and Call Waiting .................................... 3.1.4 Number Insertion ........................................................................... 3.2 Configuring Software Parameters .......................................................... 3.2.1 Configuring System Software Parameters ..................................... 3.2.2 Configuring MG Interface Software Parameters ............................ 3.3 Configuring Standby MGC ..................................................................... 3.4 Configuring Common Attributes of Access User .................................... 3.4.1 Configuring Ringing Mapping Record ............................................ 3.4.2 Configuring PSTN Port Attribute .................................................... 3.5 Configuring Parameters of Built-In LAN Switch ...................................... 3.5.1 Description of Built-In LAN Switch Port.......................................... 3.5.2 Configuring Precedence of Voice Packets Forwarding.................. 3.5.3 Other Configurations of LAN Switch .............................................. 3.6 Configuring Charging Machine ............................................................... 3.7 Configuring MGCP Parameters .............................................................. Chapter 4 Maintenance Operations ............................................................... 4.1 System Management ............................................................................. 4.1.1 Saving and Backing up the Data .................................................... 4.1.2 Rebooting the System .................................................................... 4.1.3 Showing the CPU Occupation Ratio .............................................. 4.1.4 Showing System Date and Time .................................................... 4.1.5 Showing Version Information ......................................................... 4.1.6 Controlling the Output of Information to Terminals ........................ 4.2 Access Service Management ................................................................. 4.2.1 Terminating and Starting the Access Service ................................ 4.2.2 Resetting the MG Port ................................................................... 4.2.3 Showing Port Status ...................................................................... 4.2.4 Showing MG User Data ................................................................. 4.2.5 Sending On-hook Signals to Console ............................................ 4.2.6 Testing Access User ...................................................................... 4.3 Operator Management ........................................................................... 4.3.1 Operation Task List ........................................................................
2-29 2-29 2-29 3-1 3-1 3-1 3-4 3-7 3-8 3-8 3-9 3-13 3-14 3-15 3-15 3-16 3-19 3-19 3-20 3-23 3-25 3-28 4-1 4-1 4-1 4-4 4-4 4-4 4-5 4-5 4-8 4-8 4-9 4-9 4-10 4-10 4-10 4-13 4-13
4.3.2 Adding/Deleting an Operator ......................................................... 4.3.3 Setting Operator Authority ............................................................. 4.3.4 Changing Operator Password ........................................................ 4.3.5 Setting Reenter Number for the Operator ...................................... 4.3.6 Setting Operator Appendix Information.......................................... 4.3.7 Showing Operator Information and Disconnecting an Operator .... 4.4 Log Management ................................................................................... 4.4.1 Log Management Task List............................................................ 4.4.2 Adding a Log Host ......................................................................... 4.4.3 Deleting a Log Host ....................................................................... 4.4.4 Activating a Log Host ..................................................................... 4.4.5 Deactivating a Log Host ................................................................. 4.4.6 Showing Operation Log Information .............................................. 4.4.7 Showing Operation Log List ........................................................... 4.4.8 Showing Log Host Configuration ................................................... 4.4.9 Setting the Information Output Control Switch of the Log Host ..... 4.4.10 Setting the Information Output Level of Log Host ........................ 4.4.11 Displaying the Information Output Control Switch of Log Host .... 4.4.12 Displaying the Information Output Control Level of Log Host ...... 4.5 Alarm Management ................................................................................ 4.5.1 Common Attributes of Alarms ........................................................ 4.5.2 Alarm Management Tasks ............................................................. 4.5.3 Displaying Alarm Records .............................................................. 4.5.4 Querying Alarm Contents............................................................... 4.5.5 Setting Alarm Levels ...................................................................... 4.5.6 Setting the Alarm Output to CLI Terminal ...................................... 4.5.7 Setting Alarm Statistics .................................................................. 4.5.8 Setting Alarm Threshold ................................................................ 4.5.9 Querying Alarm Statistics............................................................... 4.5.10 Clearing the Statistics .................................................................. 4.5.11 Querying the Basic Alarm Settings .............................................. 4.6 Testing Equipment ................................................................................. 4.7 Setting Alarm Thresholds ....................................................................... 4.7.1 Setting RTCP Thresholds .............................................................. 4.7.2 Setting Temperature Thresholds for Starting Fan and Generating Alarm .................................................................................... 4.8 Managing Patches .................................................................................. 4.8.1 Overview of Patches ...................................................................... 4.8.2 Steps of Operating Patches ........................................................... 4.9 Network Test Tools ................................................................................ 4.9.1 ping ................................................................................................
4-14 4-15 4-16 4-16 4-17 4-17 4-18 4-19 4-19 4-20 4-20 4-21 4-21 4-22 4-23 4-23 4-24 4-25 4-26 4-26 4-27 4-28 4-28 4-30 4-30 4-31 4-33 4-35 4-36 4-36 4-37 4-37 4-38 4-38 4-39 4-40 4-40 4-41 4-41 4-41
4.9.2 tracert ............................................................................................. 4.9.3 Sample Application ........................................................................ Chapter 5 Troubleshooting ............................................................................. 5.1 Common Fault-locating Means .............................................................. 5.1.1 Showing Important System Information ......................................... 5.1.2 Showing Alarms ............................................................................. 5.1.3 Catching Network Packets ............................................................. 5.2 IAD Port ID Error Leads to Call Failure. ................................................. 5.2.1 Symptom Description ..................................................................... 5.2.2 Causal Analysis ............................................................................. 5.2.3 Processing Procedure .................................................................... 5.2.4 Suggestion and Summary .............................................................. 5.3 There Is an Echo When Making PSTN Calls. ........................................ 5.3.1 Fault ............................................................................................... 5.3.2 Cause............................................................................................. 5.3.3 Processing Procedure .................................................................... 5.4 When IAD Subscriber Calls Subscribers of Other Local Carriers, Their Phone Sets Can Ring, but Call Cannot be Made. ............................... 5.4.1 Fault ............................................................................................... 5.4.2 Cause............................................................................................. 5.4.3 Processing Procedure .................................................................... 5.5 Monolog Occurs When IAD and OPENEYE Call Each Other. ............... 5.5.1 Fault ............................................................................................... 5.5.2 Cause............................................................................................. 5.5.3 Processing Procedure .................................................................... 5.6 Voice Quality Deteriorates When Photoelectric Transducer Network Port Is Set to Semi-Duplex. .......................................................................... 5.6.1 Fault ............................................................................................... 5.6.2 Cause............................................................................................. 5.6.3 Processing Procedure .................................................................... 5.6.4 Suggestion and Summary .............................................................. 5.7 IAD Echo ................................................................................................ 5.7.1 Fault ............................................................................................... 5.7.2 Cause............................................................................................. 5.7.3 Processing Procedure .................................................................... 5.8 Voice Is Too High or Too Low for IAD Subscribers in Conversation. ..... 5.8.1 Fault ............................................................................................... 5.8.2 Cause............................................................................................. 5.8.3 Processing Procedure .................................................................... Appendix A Command List (Functional) .......................................................
4-42 4-43 5-1 5-1 5-1 5-4 5-5 5-5 5-5 5-5 5-6 5-6 5-7 5-7 5-7 5-7 5-7 5-7 5-8 5-8 5-8 5-8 5-8 5-9 5-9 5-9 5-9 5-9 5-10 5-10 5-10 5-10 5-10 5-11 5-11 5-11 5-12 A-1
A.1 Operator Management ........................................................................... A.2 Switch Between Command Modes ........................................................ A.3 Terminal Services .................................................................................. A.4 Software Loading ................................................................................... A.5 IADMS Configuration ............................................................................. A.6 Log Server Management ....................................................................... A.7 Software Parameter Configuration......................................................... A.8 Board Configuration ............................................................................... A.9 Equipment Information ........................................................................... A.10 MG Interface Configuration .................................................................. A.11 Access User Configuration .................................................................. A.12 Configuration and Management of Built-in LAN Switch ....................... A.13 Equipment Test .................................................................................... A.14 SPC Configuration ............................................................................... A.15 MGCP Data Configuration ................................................................... A.16 H.248 Configuration ............................................................................. A.17 Alarm Management.............................................................................. A.18 Alarm Threshold Configuration ............................................................ A.19 Network Test Tools .............................................................................. A.20 Patch Management .............................................................................. A.21 Back up and Save Data ....................................................................... A.22 Information Output Control ................................................................... A.23 Billing Terminal Configuration .............................................................. Appendix B List of Commands (in Alphabetical Order) ............................... Appendix C Configuration with SoftSwitch Device ...................................... Appendix D List of Acronyms and Abbreviations ........................................
A-1 A-1 A-2 A-3 A-3 A-4 A-4 A-5 A-5 A-6 A-7 A-8 A-9 A-9 A-10 A-10 A-10 A-11 A-11 A-11 A-11 A-12 A-12 B-1 C-1 D-1
HUAWEI
Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel free to contact our local office or company headquarters.
Trademarks
TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium, M900/M1800, TELESIGHT, Quidview, Musa, Airbridge, Tellwin, Inmedia, VRP, DOPRA, iTELLIN, HUAWEI OptiX, C&C08 iNET, NETENGINE, OptiX, iSite, U-SYS, iMUSE, OpenEye, Lansway, SmartAX, infoX, TopEng are trademarks of Huawei Technologies Co., Ltd. All other trademarks mentioned in this manual are the property of their respective holders.
Notice
The information in this manual is subject to change without notice. Every effort has been made in the preparation of this manual to ensure accuracy of the contents, but all statements, information, and recommendations in this manual do not constitute the warranty of any kind, express or implied.
Related Manuals
The related manuals are listed in the following table. Manual U-SYS IAD132E(T) Integrated Access Device Operation Manual U-SYS IAD132E(T) Integrated Access Device System Description U-SYS IAD132E(T) Integrated Access Device Installation Manual Content It provides guides on the use of IAD132E(T) command line, data configuration, and maintenance operations. It provides an overall introduction to the IAD132E(T), including the functional structure, application and specifications. It provides guides on the installation of the IAD132E(T), including the hardware installation and software loading.
Organization
The manual describes the use of command line, procedures of data configuration and routine maintenance of the IAD132E(T), an important component in the Next Generation Network (NGN). The manual consists of 5 chapters and 4 appendixes. Chapter 1 Introduction to Command Line briefly introduces the basic operation and features of the command line in the IAD132E(T), which is a major method to manage the device. Chapter 2 Basic Configuration introduces the setup of configuration environment, data configuration procedures and typical configuration examples. Chapter 3 Advanced Configuration introduces what is IAD call mode and how to configure it. Chapter 4 Maintenance Operations introduces the maintenance operations like the query of system state and configuration information, as well as alarm management and network test tools. Chapter 5 Troubleshooting describes how to diagnose and solve the faults.
Appendix A List of Command (Functional) lists all the commands and their command modes according to different functions. Appendix B List of Command (Alphabetical) lists all the commands in alphabetical order. Appendix C Configuration with SoftSwitch Device provides the configuration items when the IAD132E(T) interoperates with the SoftSwitch device. Appendix D List of Acronyms and Abbreviations lists all the acronyms and abbreviations used in this manual.
Intended Audience
The manual is intended for the following readers: Engineering and maintenance persons Telecom administrators System engineers
Conventions
The manual uses the following conventions:
I. General conventions
Convention Arial Arial Narrow Boldface Courier New Description Normal paragraphs are in Arial. Warnings, Cautions, Notes and Tips are in Arial Narrow. Headings are in Boldface. Terminal Display is in Courier New.
Description Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected. Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected. Optional alternative items are grouped in square brackets and separated by vertical bars. Many or none can be selected.
V. Symbols
Eye-catching symbols are also used in the manual to highlight the points worthy of special attention during the operation. They are defined as follows:
Caution, Warning, Danger: Means reader be extremely careful during the operation. Note, Comment, Tip, Knowhow, Thought: Means a complementary description.
Table of Contents
Table of Contents
Chapter 1 Introduction to Command Line .................................................................................. 1-1 1.1 Command Modes and Operator Authorities ...................................................................... 1-1 1.1.1 Command Mode...................................................................................................... 1-1 1.1.2 Operator Authorities ................................................................................................ 1-2 1.2 Security Features of the Command Line ........................................................................... 1-3 1.3 Operation Features of the Command Line ........................................................................ 1-4 1.3.1 Online Help.............................................................................................................. 1-4 1.3.2 Smart Interaction ..................................................................................................... 1-7 1.3.3 Intelligent Matching ................................................................................................. 1-8 1.3.4 History Command ................................................................................................... 1-9 1.3.5 Screen Clearance.................................................................................................. 1-10 1.3.6 Telnet Terminal Services ...................................................................................... 1-10 1.4 Error Messages of the Command Line ............................................................................ 1-10 1.5 Language Switchover of the Command Line................................................................... 1-11 1.6 Appointed Command Line Formats ................................................................................. 1-11 Chapter 2 Basic Configuration..................................................................................................... 2-1 2.1 Configuration Procedures .................................................................................................. 2-1 2.2 Introduction to Networking Application Examples ............................................................. 2-3 2.3 Configuring Basic Data ...................................................................................................... 2-6 2.3.1 Tasks for Configuring Basic Data............................................................................ 2-6 2.3.2 Configuring IP Address ........................................................................................... 2-7 2.3.3 Configuring the Device Information....................................................................... 2-10 2.3.4 Configuring the Board ........................................................................................... 2-14 2.3.5 Configuration Example.......................................................................................... 2-15 2.4 Configuring Interface Data............................................................................................... 2-17 2.4.1 Tasks for Configuring Interface Data .................................................................... 2-17 2.4.2 Add MG Interface .................................................................................................. 2-17 2.4.3 Configuring MG Registration Key.......................................................................... 2-18 2.4.4 Configuring MG Interface Data ............................................................................. 2-19 2.4.5 Starting the MG Interface ...................................................................................... 2-21 2.4.6 Configuration Example.......................................................................................... 2-21 2.5 Configuring Access User Data......................................................................................... 2-22 2.5.1 Introduction to Access Service.............................................................................. 2-22 2.5.2 Configuring Ordinary User Service ....................................................................... 2-22 2.5.3 Configuring SPC Service ...................................................................................... 2-25 2.5.4 Configuration Example.......................................................................................... 2-27 2.6 Configuration Examples................................................................................................... 2-28
Table of Contents
2.6.1 Configuring IP Address ......................................................................................... 2-28 2.6.2 Configuring Interface Data .................................................................................... 2-28 2.6.3 Configuring Access User Data .............................................................................. 2-29 2.6.4 Saving the Configuration Data .............................................................................. 2-29 2.6.5 Restarting the Device............................................................................................ 2-29 Chapter 3 Advanced Configuration ............................................................................................. 3-1 3.1 Configuring IAD Call Mode ................................................................................................ 3-1 3.1.1 Introduction to Call Mode ........................................................................................ 3-1 3.1.2 Configuring Call Mode............................................................................................. 3-4 3.1.3 Processing Call Collision and Call Waiting ............................................................. 3-7 3.1.4 Number Insertion..................................................................................................... 3-8 3.2 Configuring Software Parameters...................................................................................... 3-8 3.2.1 Configuring System Software Parameters.............................................................. 3-9 3.2.2 Configuring MG Interface Software Parameters ................................................... 3-13 3.3 Configuring Standby MGC............................................................................................... 3-14 3.4 Configuring Common Attributes of Access User ............................................................. 3-15 3.4.1 Configuring Ringing Mapping Record ................................................................... 3-15 3.4.2 Configuring PSTN Port Attribute ........................................................................... 3-16 3.5 Configuring Parameters of Built-In LAN Switch............................................................... 3-19 3.5.1 Description of Built-In LAN Switch Port................................................................. 3-19 3.5.2 Configuring Precedence of Voice Packets Forwarding......................................... 3-20 3.5.3 Other Configurations of LAN Switch ..................................................................... 3-23 3.6 Configuring Charging Machine ........................................................................................ 3-25 3.7 Configuring MGCP Parameters ....................................................................................... 3-28 Chapter 4 Maintenance Operations ............................................................................................. 4-1 4.1 System Management......................................................................................................... 4-1 4.1.1 Saving and Backing up the Data............................................................................. 4-1 4.1.2 Rebooting the System............................................................................................. 4-4 4.1.3 Showing the CPU Occupation Ratio ....................................................................... 4-4 4.1.4 Showing System Date and Time............................................................................. 4-4 4.1.5 Showing Version Information .................................................................................. 4-5 4.1.6 Controlling the Output of Information to Terminals ................................................. 4-5 4.2 Access Service Management ............................................................................................ 4-8 4.2.1 Terminating and Starting the Access Service ......................................................... 4-8 4.2.2 Resetting the MG Port............................................................................................. 4-9 4.2.3 Showing Port Status................................................................................................ 4-9 4.2.4 Showing MG User Data ........................................................................................ 4-10 4.2.5 Sending On-hook Signals to Console ................................................................... 4-10 4.2.6 Testing Access User ............................................................................................. 4-10 4.3 Operator Management..................................................................................................... 4-13 4.3.1 Operation Task List ............................................................................................... 4-13 4.3.2 Adding/Deleting an Operator................................................................................. 4-14
ii
Table of Contents
4.3.3 Setting Operator Authority..................................................................................... 4-15 4.3.4 Changing Operator Password............................................................................... 4-16 4.3.5 Setting Reenter Number for the Operator............................................................. 4-16 4.3.6 Setting Operator Appendix Information................................................................. 4-17 4.3.7 Showing Operator Information and Disconnecting an Operator ........................... 4-17 4.4 Log Management ............................................................................................................. 4-18 4.4.1 Log Management Task List................................................................................... 4-19 4.4.2 Adding a Log Host................................................................................................. 4-19 4.4.3 Deleting a Log Host............................................................................................... 4-20 4.4.4 Activating a Log Host ............................................................................................ 4-20 4.4.5 Deactivating a Log Host ........................................................................................ 4-21 4.4.6 Showing Operation Log Information ..................................................................... 4-21 4.4.7 Showing Operation Log List .................................................................................. 4-22 4.4.8 Showing Log Host Configuration........................................................................... 4-23 4.4.9 Setting the Information Output Control Switch of the Log Host ............................ 4-23 4.4.10 Setting the Information Output Level of Log Host ............................................... 4-24 4.4.11 Displaying the Information Output Control Switch of Log Host........................... 4-25 4.4.12 Displaying the Information Output Control Level of Log Host............................. 4-26 4.5 Alarm Management ......................................................................................................... 4-26 4.5.1 Common Attributes of Alarms ............................................................................... 4-27 4.5.2 Alarm Management Tasks .................................................................................... 4-28 4.5.3 Displaying Alarm Records..................................................................................... 4-28 4.5.4 Querying Alarm Contents...................................................................................... 4-30 4.5.5 Setting Alarm Levels ............................................................................................. 4-30 4.5.6 Setting the Alarm Output to CLI Terminal ............................................................. 4-31 4.5.7 Setting Alarm Statistics ......................................................................................... 4-33 4.5.8 Setting Alarm Threshold........................................................................................ 4-35 4.5.9 Querying Alarm Statistics...................................................................................... 4-36 4.5.10 Clearing the Statistics ......................................................................................... 4-36 4.5.11 Querying the Basic Alarm Settings ..................................................................... 4-37 4.6 Testing Equipment........................................................................................................... 4-37 4.7 Setting Alarm Thresholds ................................................................................................ 4-38 4.7.1 Setting RTCP Thresholds ..................................................................................... 4-38 4.7.2 Setting Temperature Thresholds for Starting Fan and Generating Alarm ............ 4-39 4.8 Managing Patches ........................................................................................................... 4-40 4.8.1 Overview of Patches ............................................................................................. 4-40 4.8.2 Steps of Operating Patches .................................................................................. 4-41 4.9 Network Test Tools .......................................................................................................... 4-41 4.9.1 ping........................................................................................................................ 4-41 4.9.2 tracert .................................................................................................................... 4-42 4.9.3 Sample Application ............................................................................................... 4-43
iii
Table of Contents
Chapter 5 Troubleshooting .......................................................................................................... 5-1 5.1 Common Fault-locating Means.......................................................................................... 5-1 5.1.1 Showing Important System Information .................................................................. 5-1 5.1.2 Showing Alarms ...................................................................................................... 5-4 5.1.3 Catching Network Packets ...................................................................................... 5-5 5.2 IAD Port ID Error Leads to Call Failure.............................................................................. 5-5 5.2.1 Symptom Description .............................................................................................. 5-5 5.2.2 Causal Analysis....................................................................................................... 5-5 5.2.3 Processing Procedure............................................................................................. 5-6 5.2.4 Suggestion and Summary....................................................................................... 5-6 5.3 There Is an Echo When Making PSTN Calls..................................................................... 5-7 5.3.1 Fault ........................................................................................................................ 5-7 5.3.2 Cause ...................................................................................................................... 5-7 5.3.3 Processing Procedure............................................................................................. 5-7 5.4 When IAD Subscriber Calls Subscribers of Other Local Carriers, Their Phone Sets Can Ring, but Call Cannot be Made................................................................................................ 5-7 5.4.1 Fault ........................................................................................................................ 5-7 5.4.2 Cause ...................................................................................................................... 5-8 5.4.3 Processing Procedure............................................................................................. 5-8 5.5 Monolog Occurs When IAD and OPENEYE Call Each Other. .......................................... 5-8 5.5.1 Fault ........................................................................................................................ 5-8 5.5.2 Cause ...................................................................................................................... 5-8 5.5.3 Processing Procedure............................................................................................. 5-9 5.6 Voice Quality Deteriorates When Photoelectric Transducer Network Port Is Set to Semi-Duplex. ........................................................................................................................... 5-9 5.6.1 Fault ........................................................................................................................ 5-9 5.6.2 Cause ...................................................................................................................... 5-9 5.6.3 Processing Procedure............................................................................................. 5-9 5.6.4 Suggestion and Summary..................................................................................... 5-10 5.7 IAD Echo.......................................................................................................................... 5-10 5.7.1 Fault ...................................................................................................................... 5-10 5.7.2 Cause .................................................................................................................... 5-10 5.7.3 Processing Procedure........................................................................................... 5-10 5.8 Voice Is Too High or Too Low for IAD Subscribers in Conversation............................... 5-11 5.8.1 Fault ...................................................................................................................... 5-11 5.8.2 Cause .................................................................................................................... 5-11 5.8.3 Processing Procedure........................................................................................... 5-12 Appendix A Command List (Functional).....................................................................................A-1 A.1 Operator Management ......................................................................................................A-1 A.2 Switch Between Command Modes ...................................................................................A-1 A.3 Terminal Services..............................................................................................................A-2 A.4 Software Loading...............................................................................................................A-3
iv
Table of Contents
A.5 IADMS Configuration.........................................................................................................A-3 A.6 Log Server Management...................................................................................................A-4 A.7 Software Parameter Configuration ....................................................................................A-4 A.8 Board Configuration ..........................................................................................................A-5 A.9 Equipment Information ......................................................................................................A-5 A.10 MG Interface Configuration .............................................................................................A-6 A.11 Access User Configuration..............................................................................................A-7 A.12 Configuration and Management of Built-in LAN Switch ..................................................A-8 A.13 Equipment Test ...............................................................................................................A-9 A.14 SPC Configuration...........................................................................................................A-9 A.15 MGCP Data Configuration.............................................................................................A-10 A.16 H.248 Configuration ......................................................................................................A-10 A.17 Alarm Management .......................................................................................................A-10 A.18 Alarm Threshold Configuration......................................................................................A-11 A.19 Network Test Tools .......................................................................................................A-11 A.20 Patch Management .......................................................................................................A-11 A.21 Back up and Save Data.................................................................................................A-11 A.22 Information Output Control ............................................................................................A-12 A.23 Billing Terminal Configuration .......................................................................................A-12 Appendix B List of Commands (in Alphabetical Order) ............................................................B-1 Appendix C Configuration with SoftSwitch Device ...................................................................C-1 Appendix D List of Acronyms and Abbreviations .....................................................................D-1
Privilege
IAD2000#
Input disable to return to the user mode, input exit to disconnect the IAD132E(T) Input exit to return to the privilege mode Input exit to return to the privilege mode Input exit to return to the global config mode Input exit to return to the global config mode
Input equiptest in privilege mode Input configure terminal in privilege mode Input interface mg mgid in global config mode Input esl user in global config mode
MG interface
Esl user
1-1
Mode
Function
Prompt
Enter Input lanswitch in privilege mode Input lanswitch in global config mode Input vlan vlan-id in Lanswitch mode
Exit Input exit to return to the privilege mode Input config terminal to return to the global config mode Input exit to return to the lanswitch mode
Lanswitch
built-in
LAN
IAD2000(la nswitch)#
LanswitchVLAN
LAN
The command line prompt consists of two parts: Fixed character string + command mode identifier, in which the command mode identifier indicates the mode that the current command is in. For example: > means the user mode, # means the privilege mode. The fixed strings can be configured through the global configuration command hostname hostname. The privilege mode and global mode are compatible with the lower-authority modes: in the privilege mode, you can execute the commands of the user mode; while in the global config mode, you can execute the commands of the user mode and privilege mode. Figure 1-1 shows the relationship among different command modes.
vlan Lanswitch
h
Lanswitch-VLAN exit
s an
it ex
tc wi
exit
configure terminal
Global config
l es er us it
Esl user
ex
1-2
command modes. Meanwhile, in the same command mode, operators of different authorities may be able to execute different commands. For details, refer to Appendix A and Appendix B of this manual.
Note: There are two default administrators of the system, one is the super administrator named root, and the password is admin. The other is the administrator named system, and the password is login.
-------------------------------------------------------------------
1-3
2)
IAD2000>terminal hold 2 Please input password(<=15 chars): Confirm Password(<=15 chars): This terminal has already been hold! Terminal held, please input password(<=15 chars):
Caution: If a command line terminal will be left unattended for long, the operator should exit the command line, or lock the command line, in order to ensure security.
You can input ? after the command line prompt to obtain the help information for all the commands in this mode, as well as the commands in the lower modes:
IAD2000(config)#? --------------------------------------------Command Of Global Config Mode: --------------------------------------------alarm[3] banner board[5] call-conflict <Group>alarm command group Configure hostname and contact number <Group>board command group Call conflict
1-4
Set temperature threshold Command key words: test timeout parameter TOS configuration <Group>user command group
--------------------------------------------Command of Privilege Mode: --------------------------------------------alarm backup baudrate clock Alarm-related operation System software backup command Set serial baudrate Set clock
configure Change into global configuration mode show[7] user write <Group>show command group Disconnect a terminal user Backup now command
--------------------------------------------Command of User Mode: --------------------------------------------cls echo enable exit telnet Telnet to a host or disconnect a telnet user Clear screen Enable or disable echo function Change command mode into privileged mode Exit from current mode and enter prior mode or exit from terminal
terminal[3] <Group>terminal command group timeout tracert Enable or disable timeout function Trace route to destination
You can input ? after an incomplete command key word to obtain the help information of the commands that are available currently.
IAD2000#s? --------------------------------------------Command Of Privilege Mode: --------------------------------------------show[7] <Group>show command group ---------------------------------------------
1-5
show[55] <Group>show command group smart IAD2000#s Enable or disable smart function
You can input ? after a complete command key word to obtain a simple help and usage of parameters for current command.
IAD2000>show ? --------------------------------------------Command Of User Mode: --------------------------------------------alarm arp baudrate board temperature-limit Show device temperature(Celsius) threshold terminal tos trace user version Operation of Config terminal Show TOS configuration information of TRACE module Key Words: user defined ring Show version Query alarm correlative information Show device maintain network ARP parameter Show serial baudrate Show information of board
You can carry out the (no) help-mode command to display again the last line of command you have input, after you have obtained the online help information. If you carry out this command, the next line will automatically display the last line of input. By default, this function is enabled.
IAD2000>no help-mode Memory funtion of input is disabled. IAD2000>enable ? --------------------------------------------Command Of User Mode: --------------------------------------------<cr> Please press ENTER to execute command
IAD2000>
The display function is disabled, and the last line of input is not displayed.
IAD2000>help-mode Memory funtion of input is enabled. IAD2000>enable ? --------------------------------------------Command Of User Mode: ---------------------------------------------
1-6
IAD2000>enable
The display function is enabled, and the last line of input is displayed.
K E T YYYY-MM-D D P
The command line also provides no smart command to disable the smart interaction function. After you disable this function, the command you input will be executed directly. To enable the smart interaction, just execute smart. By default, the smart interaction function is enabled. For example, enter the global config mode from the privilege mode: When smart interaction is enabled
IAD2000#configure <cr> {terminal<k>}:terminal <cr>
1-7
Input configure and press <Enter>, the command line will display {terminal<k>}. When smart interaction is disabled
IAD2000#configure ^ %Incomplete command, and error detected at '^' marker. IAD2000#configure terminal<cr> IAD2000(config)# <cr>
Input configure and press <Enter>, the command line prompts error. You must input the complete command: configure terminal.
Note: The command smart can be used in user mode, privilege mode, global config mode, Lanswitch mode.
Input eg, there is no matching result on the command line, which means there is no command that starts with eg. The command to configure the call mode is call-mode. Enter call and press the <Spacebar>, and there is no matching.
IAD2000(config)#call- <Spacebar>
Use Help to query. It shows that conflict should be selected after call- is input.
IAD2000(config)#call-?
--------------------------------------------1-8
Command of Global Config Mode: --------------------------------------------call-conflict Call conflict call-mode match. IAD2000(config)#call-conflict call mode
After input call-c and press the <Spacebar>, the command line can automatically
Note: After you have used the arrow keys to show the command, you can press <Enter> to execute the history command. The history commands are valid only for current operator. If you log off, and then log in again, all the history commands will be cleared.
1-9
****************************************** Copyright(C) 2002-2004 by HUAWEI TECH CO., LTD Host name: Phone: User name (<=15 chars):
It shows the process of logging in another IAD132E(T) (whose IP address is 10.21.100.41) from an IAD132E(T).
1-10
Table 1-3 Common error messages in command line Error message Reason Such command is not found. Unrecognized command Such command key word is not found. Parameter type is incorrect. Parameter value is out of range. Incomplete command Too many parameters Ambiguous command Input command is incomplete. Too many parameters are inputted. The Input parameter is incorrect.
After you have input and executed the command, if the command is executed successfully, there will be no prompt message. If the command is not executed successfully, an error message will return.
Meaning Key words in a command line (the part in a command that remains unchanged and has to be input) are in boldface. Parameters in a command line (the part in a command that has to be replaced by actual values) are in italics. The part in a [ ] is optional in command configuration. Choose one option from two or multiple options. Choose one option or no options from two or multiple options. Choose several options from two or multiple options. Choose one options at least and all options at most. Choose several or no options from two or multiple options.
For example: The command to configure a semi-permanent connection (SPC) is as follows: spc add start slotid/portid end slotid/portid iad-spc channelnum [ name spcname ] The command line format has the following meaning: The parameter [ name spcname ] has a default value and hence is optional; all other parameters do not have a default value and have to be configured. start, end, iad-spc and name are key words; slotid/portid, channelnum and spcname are command line parameters. The command to modify an SPC is as follows: spc modify connectid {start slotid/portid | end slotid/portid | name spcname |local-port local-port | remote-ip remote-ip | remote-port remote-port }* The command line format has the following meaning: At least one parameter of those in {}* has to b configured. You can also configure several or all parameters.
1-12
2-1
IP address config Basic data confg Equipment information config Board config MG interface config Interface data config MG interface data config MG interface start
Note: The arrows in the above figure indicate that there are time sequences for configuring the data. After configuring a group of data, you can run the command show running-config in the privilege mode to check the correctness of the configured data. Some of the data are default settings provided by the system, and if you have changed them, the changed ones will be displayed. The configurations that are taking effect at the time being will not be displayed if they are the same with the system defaults.
The basic data configuration includes the equipment information configuration and board configuration. You must make the configurations in strict sequence. Configuration of the interface data includes the media gateway (MG) interface, MG interface data and the starting of the MG interface. You must make the configurations in strict sequence. The access user data configuration includes the ordinary access user service and semi-permanent connection service (SPC). These configurations can be made separately according to actual situation.
2-2
Caution: After the data configuration, you should use the command write in the previlige mode to save the data into the Flash, so that the data will not be lost in case of power failure or system reboot. When you use the command reboot to reset the system, if there is still unsaved data in the memory, or the saving is being made, the IAD132E(T) will give you a prompt, in order to ensure that all the configuration data is saved into the Flash.
Note: This section is only a general description on the configuration examples. The specific terms or details concerned will be further explained in relevant sections.
I. Networking
210.11.123.33/24 210.11.123.13/24 210.11.123.5/24
Loghost
R
NMS
R
DNS
R
SNTP
R
210.11.180.18/24
SoftSwitc h
210.11.123.56 / 24 210.11.252.20/24
IP network
MGCP
MGCP
210.11.252.19/24
IAD132E(T) (1)
PSTN network
210.11.101.6/24 IAD132E(T)
(2)
2-3
Note: The IAD132E(T) adopts inband network management mode, which means the management channel and service channel are the same on the managed device, and the maintenance information is provided to the NMS or the maintenance terminal through the service channel. At this time, both the management channel and service channel of the IAD132E(T) are connected to the outside through the service port.
Figure 2-3 and Figure 2-4 display the position of boards on the IAD132E(T) 1 and IAD132E(T) 2 respectively.
Slot0 CVP Slot1 ASI Slot2 ASI Slot3 FTIU
Slot0 CVP
Slot1 ASI
Slot3 VDU
Figure 2-4 Boards on the IAD132E(T) 2 Slot 3 can be configured with various kinds of boards. For the IAD132E(T) 1, the FTIU (100Base-T Fast Ethernet Electrical Interface Unit) board is configured as the Ethernet uplink interface. For IAD132E(T) 2, the ATU board is configured for connecting to IP network through the VDSL uplink interface, and connecting to PSTN through the ATI board.
Caution: The CVP is inside the IAD132E(T) and cannot be plugged/unplugged. And the CVP is in Slot 0 by default. Refer to U-SYS IAD132E(T) Integrated Access Device System Description for details about the boards in Figure 2-3 and Figure 2-4.
2-4
Ordinary access service provides access for subscribers on all the Plain Old Telephone Service (POTS) ports of the IAD132E(T) 1 and IAD132E(T) 2. I 2) SPC service
SPC service provides internal connection between port 15 on slot 1 and port 15 on slot 2 of the IAD132E(T) 1. It also provides semi-permanent IP connection between port 0 on slot 1 of the IAD132E(T) 1 and port 0 on slot 1 of the IAD132E(T) 2.
NMS DNS
210.11.123.33 / 24 210.11.123.13 / 24
SNTP
210.11.123.5 / 24
Table 2-2 MG interface data allocation table Item MG All the ports in slot 1 and 2 are grouped in the same MG, mgid=0, interface-name = aaln, domain-name = CN1.COM Encoding type Media Gateway Control Protocol Transport layer protocol Protocol port number
IAD132 E(T) 1
text
MGCP
UDP
2-5
Item
MG All the ports in slot 1 and 2 are grouped in the same MG, mgid=0, interface-name = aaln, domain-name = CN2.COM
Encoding type
IAD132 E(T) 2
Text
MGCP
UDP
Note: The configuration tasks are arranged from the very beginning of your configuration procedures.
Table 2-3 Tasks for configuring basic data Serial No. Operation ip address gateway-ip dhcp enable Command ip-address net-mask Remarks Configure fixed IP address: Configure the device to obtain IP address dynamically
Configure IP address
2-6
Serial No.
Command pppoe username password password pppoe { disable | enable } show pppoe banner incoming hostname phone dns domain-name name dns server first { second | third } sntp server {address server-ip | name server-name} sntp time-zone sign value usermane
Remarks Configure the PPP over Ethernet (PPPoE) function Configure the banner Configuring the domain name and IP address of DNS
sntp interval interval-seconds temperature-limit temperature-value temperature-value] eid eid iadms nmsaddress getcommunity setcommunity trapcommunity [ nmsTrapPort ] fan [alarm Set the temperature thresholds to start the fan and generate the over-heat alarm Configure the equipment Id of IAD in IADMS Configure IADMS ASI (Analog Subscriber Interface)this command is not used for configuring the boards
Add a board
2-7
Before you have obtained the IP address, you can use the default one of the IAD132E(T), which is: 192.168.100.1.
Caution: After you have set the IP address, you must restart the IAD132E(T) before the IP address can become valid. The IP address of the IAD132E(T) must be set correctly to ensure normal communications. You should not change the IP address when the IAD132E(T) is working normally.
2-8
Note: After you have enabled the DHCP client program on the IAD132E(T), you should restart the device to make the setting valid.
Table 2-4 Related commands Operation Set the IP address for the device Display the IP address of the device Enable/disable DHCP client Display DHCP state Configure PPPoE username and password Enable PPPoE Show PPPoE configuration Command ip address ip-address net-mask gateway-ip show ip address dhcp {enable| disable} show dhcp pppoe username password password usermane Mode Global config mode User mode Global config mode User mode Global config mode Global config mode User mode
2-9
ip-address, net-mask: IP address and mask of the IAD132E(T). gateway-ip: gateway IP address. username, password: PPPoE username and password are strings with 131 characters. The username and password set here are used for authentication on the Broadband Access Server (BAS), so they must be identical with that on the BAS.
After you run the command, log in again, and you will see the following:
****************************************** * * * IAD2000 Integrated Access Device * * *
****************************************** Copyright(C) 2002-2004 by HUAWEI TECH CO. LTD Host name: SZ-NY-CNC-IAD132E(T) Phone: 0755-26548888
Note: The parameter hostname provides identification for the IAD132E(T) device in a next generation network (NGN). This identification is generally configured according to the requirements of owner of the equipment. If there is no special requirement, the following naming rule is recommended for hostname: hostname = name of the office + MG type. While name of the office = country + city + location + operator name. In this example, the hostname SZ-NY-CNC-IAD132E(T) indicates an IAD132E(T) device of the operator CN in the location of NY (Nanyou) in Shenzhen, China.
2-10
After you have enabled the DNS client on the IAD132E(T), the device can access other devices through the domain name, apart from accessing through the IP address. The domain name here of the IAD132E(T) must be identical with that configured with the command if-mg attribute. Example: enable the DNS client on the IAD132E(T) 1, specify the domain name as tele.com, and the IP address of DNS as 210.11.123.13.
IAD2000(config)#dns domain-name tele.com IAD2000(config)#dns server 210.11.123.13
Enable SNTP client on the IAD132E(T) Global synchronization of time is necessary for the generation of logs and accounting records. You can enable SNTP client on the IAD132E(T) for this purpose. Example: enable SNTP client on the IAD132E(T) 1, specify the name of the SNTP server as SNTP-SVR, time zone as East 8, and synchronization interval as 60 seconds
IAD2000(config)#sntp server name sntp-svr.tele.com IAD2000(config)#sntp time-zone + 8 IAD2000(config)#sntp interval 60
Caution: If you want to specify the SNTP server with the name SNTP-SVR.TELE.COM, you should first enable the DNS client on the IAD132E(T), then configure the SNTP client. Otherwise, you can only use the IP address 210.11.123.5 to access the SNTP server. After you have enabled the SNTP client on the IAD132E(T), start time and end time of the log information and accounting information will be subject to the time provided by the SNTP server. In this case, the local time on the IAD132E(T) that is configured with the command clock set hh:mm:ss will not take effect.
Set serial port baud rate The baud rate of the IAD132E(T) serial port can be changed to adapt to different serial port rates of the maintenance terminal. Use the command baudrate baudrate-value in the privilege mode to set the baud rate. Example: set the serial port baud rate of the IAD132E (T) 1 as 115200 bps
IAD2000#baudrate 115200 current serial port baudrate: 115200
2-11
Note: The serial port baud rate of the IAD132E(T) should be set as identical with that of the maintenance terminal serial port. The default serial port baud rate of the IAD132E(T) is 9600 bps, and you are not recommended to change it. If you have changed the default baud rate, it will restore to 9600 bps after the device restarts. Only the root, Oper and Admin can change the serial port baud rate of the IAD132E(T).
Add an IADMS In a NGN, a huge amount of IADs are running, and it is very difficult for one NMS to manage all of them. So a hierarchical management mode is used, in which a certain number of IADs are managed directly by an IADMS, and multiple IADMSs are managed by the iManager N2000 NMS. An IADMS is a software system running on a workstation. While configuring the IAD132E(T) for accepting the universal management of IADMS, you must configure the eid (equipment ID) of the IAD132E(T) in IADMS, based on which the IADMS identifies the IAD132(T). The eid of the IAD132(T) must be identical with that on IADMS. After that, other information of the IADMS can be added. Example: In the global configuration mode, configure the eid of the IAD132E(T) as CN23.com.
IAD2000(config)#eid CN23.com
Adding the IADMS information by using the command iadms in the global mode, and the IP address of the IADMS workstation is 210.11.123.33:
IAD2000(config)#iadms 210.11.123.33 get set trap 162
Note: When adding an IADMS, you must ensure that the IP address of the IADMS is unique. The command iadms can be used both for adding an IADMS and modifying an IADMS. The character string of a community name is case-sensitive, which means the same character strings with different cases will be regarded as different community names.
2-12
Set the IP address for DNS server Delete the IP address for DNS server Set the address or name for SNTP server Delete SNTP server Set SNTP time zone Set SNTP time synchronization interval Set serial port baud rate Display serial port baud rate Configure IAD device id Add/modify an IADMS Set whether the IAD registers to IADMS when it starts. Display the IADMS information. Delete the configuration. IADMS
2-13
Network Management Protocol (SNMP), which is similar to user password. The IAD132E(T) shall decide whether to accept an NM request by comparing the GET/SET community name configured on itself and that configured on the IADMS. By default, the GET community name is public and the SET community name is private, and you can change the community names by yourself. nmsTrapPort: Trap port number used by the IADMS, which is 162 by default. enable/disable: Whether the IAD132E(T) is enabled or disabled to register to the IADMS when it starts up.
Note: After a board has been added, a fault alarm message will display, showing that the board is abnormal. You do not have to deal with this alarm. The ASI board can be configured automatically. When the IAD132E(T) is running, if you insert an ASI, the system can identify this board automatically, and configure the basic information for the board. In this case, you do not need to run the command board add to add the ASI. You can also run the command board add to add an ASI board when no ASI board is plugged in the slot. Boards of other types should be added with the command board add.
2-14
Command board set slotid { impedance impedance|hookup timevalue|ttx type|polarity-pulsewidth width|dcvalue index|dialtone index|busytoneindex|howtoneindex| ringcurrentindex } no board set slotid { impedance impedance|hookup timevalue|ttx type|polarity-pulsewidth width|dcvalue index|dialtone index|busytoneindex|howtoneindex| ringcurrentindex } board reset slotid reboot
Mode
Restore default attribute of a board Reset a board Reset the CVP (reboot the system)
Caution: The command reboot will reset the system, so you must use this command with caution.
Note: You can only delete a board that is in Fault state. A board that is in Normal state cannot be deleted. When displaying the board information, if you do not input any parameter, the general information of all the boards will be displayed. If you input the slot number, detailed information of the specific board will be displayed.
2-15
IAD132E(T) 2
IAD2000(config)#ip address 210.11.10.26 255.255.255.0
2)
IAD2000(config)#banner incoming SZ-NY-CNC-IAD132E(T) 0755-26548888 IAD2000(config)#dns domain-name tele.com IAD2000(config)#dns server 210.11.123.13 IAD2000(config)#sntp server name sntp-svr.tele.com IAD2000(config)#sntp time-zone + 8 IAD2000(config)#sntp interval 60 IAD2000(config)#eid CN1.com IAD2000(config)#iadms 210.11.123.33 get set trap 162 IAD2000(config)#iadms register enable IAD2000(lanswitch)#uplink 6
Note: The uplink command is used to configure the uplink network interface of the IAD 132E(T). For detail, refer to Chapter 3 Advanced Configuration.
IAD132E(T) 2
IAD2000(config)#banner incoming SZ-YK-CNC-IAD132E(T) 0755-26540123 IAD2000(config)#dns domain-name tele.com IAD2000(config)#dns server 210.11.123.13 IAD2000(config)#sntp server name sntp-svr.tele.com IAD2000(config)#sntp time-zone + 8 IAD2000(config)#sntp interval 60 IAD2000(config)#eid CN2.com IAD2000(config)#iadms 210.11.123.33 get set trap 162 IAD2000(config)#iadms register enable
The serial port baud rate takes the default setting of 9600 bps. 3) Show board configuration IAD132E(T) 1
IAD2000(config)#show spc -------------------------------------------------SlotID Type Status
2-16
--------------------------------------------------
IAD132E(T) 2
IAD2000(config)#show spc -------------------------------------------------SlotID 0 1 2 3 Type CVP ASI ATI VDU Status Normal Normal Normal Normal
--------------------------------------------------
3 4
Start MG interface
2)
If the MG interface with mgid as 6 already exists, enter the MG interface configuration mode.
IAD2000(config)#interface mg 6 IAD2000(config-if-mg-6)#
Note: When you use the command interface mg mgid, if the interface does not exist, the command will add such an MG interface, and enter the MG interface mode. If the MG interface already exists, you will enter the MG interface mode.
2-18
-----------------------------------------------------------------
2-19
Caution: Parameters port, mgcip and mgcport configured on the IAD132E(T) must be the same with those configured on the MGC. Appendix C lists the data correspondence when the IAD132E(T) interconnects with the SoftXSwitch device. Before configuring the interface data, configure IP address for the IAD132E(T). For detail, refer to Section Configuring IP Address.
2-20
Caution: After you have added an MG interface, or modified the MG interface data, you must reset this interface to validate the configuration. The purpose to reset the interface is to allow the MG to register again to the MGC. If you reset an MG interface, the services on the interface will be terminated, so you must use this command with caution. You can terminate the services on an MG interface by shutting down the interface.
2-21
IAD132E(T) 2
IAD2000(config)#interface mg 0 Are you sure to add MG interface? [Y|N]y IAD2000(config-if-mg-0)#
2)
IAD2000(config-if-mg-0)#if-mg attribute port 2427 protocol MGCP code text transfer UDP name CNC.COM mgcip 210.11.180.18 mgcport 2727
IAD132E(T) 2
IAD2000(config-if-mg-0)#if-mg attribute port 2427 protocol MGCP code text transfer UDP name CNC.COM mgcip 210.11.180.18 mgcport 2727
3)
IAD2000(config-if-mg-0)#reset
IAD132E(T) 2
IAD2000(config-if-mg-0)#reset
2-22
When adding a user, the data you configure can determine the following information: port number and slot number of the ASI corresponding to the added user, MG identifier, whether layered configuration is made, and terminal identifier terminalid (when no layered configuration is used). Example: Configure the access user for IAD132E(T) 1 Add access users to all the ports on slot 1 and slot 2 of the IAD132E(T) 1, and define the ports to be subject to the MG with mgid 0, no layered configuration, the terminalid corresponding to the ports starts from 0. According to the configuration on the MGC, set the VoIP telephone number as 88161728816203, internal number as 61726203, and support the leave word function.
IAD2000(config-esl-user)#mguser batadd startuser 1/0 enduser 2/15 0 nolayer 0 telno 0 priority 0 leaveword 6172
Note: After modifying the attributes of the internal numbers, you need to execute the command mguser modify to modify the internal number of the access user to meet the new attributes.
Configure access users of IAD132E(T) 2 Add access users to all the ports on slot 1 of the IAD132E(T) 2, and define the ports to be subject to the MG with mgid 0, no layered configuration, and the terminalid corresponding to the ports starts from 0. According to the configuration on the MGC, set the VoIP telephone number as 65410016541016, internal number as 10011016. And based on the numbers allocated by the exchange, set PSTN numbers as 89720018972016, and support the leave word function.
IAD2000(config-esl-user)#mguser batadd startuser 1/0 enduser 1/15 0 nolayer 0 telno 2215100 leaveword 1001
Narrowband mode
Narrowband mode
2-23
Narrowband mode
endservice { slotid/portid | mgid mgid terminalid batnum } startservice { slotid/portid | mgid mgid terminalid batnum } show mguser { slotid/portid | startuser slotid/portid enduser slotid/portid }
Note: The command startservice can restart the service of an individual access user, or restart the services of a batch of users on an MG, or the services of all the access users on an MG. The command endservice can terminate the service of an individual access user, or terminate the services of a batch of users on an MG, or the services of all the access users on an MG.
2-24
priorityflag: tag of priority level for the access users, ranging 04. This parameter is not used, so there is not need to configure it. leaveword: whether to support the leave word function of the access user. The value can be 0 or 1, indicating support and no support respectively. The configuration should be the same with that on the MGC. By default, this function is not supported. batnum: number of batch process.
Note: telno and leavewordflag are determined by the configuration on the MGC. pstntelno is determined by the configuration on the switch in PSTN. The configuration on IAD132E(T) is just a record to facilitate management and query. When batch-adding and batch-deleting the access users, terminalid, telno, pstnno and mgtelno will ascend by one on the basis of the startuser. Whether to be layered is determined by the configuration on the MGC, you can keep the configuration on the IAD132E(T) identical with that on the MGC.
I. Command Description
After the basic data has been configured, you can configure the SPC service. The configuration of the SPC service is irrelevant to the configuration state of MG interface data. Example: add an internal SPC between slot 1 port 15 and slot 2 port 15 of IAD132E(T) 1, the SPC occupies one voice channel, and the name of the SPC is spcin.
2-25
Add an IP SPC between slot port 0 of IAD132E(T) 1 and slot port 0 of IAD132E(T) 2, the Real-Time Transport Protocol (RTP) port number of IAD132E(T) 1 is 50000, that of IAD132E(T) 2 is 50120, and the name of the SPC is spcip. IAD132E(T) 1:
IAD2000(config)#spc add start 1/0 50000 210.11.101.6 50120 name spcip
IAD132E(T) 2:
IAD2000(config)#spc add start 1/0 50120 210.11.252.19 50000 name spcip
Modify an SPC Set the data signal processor (DSP) channel parameter of IP SPC Delete an SPC Release an SPC Establish an SPC Show the SPC information
Note: If an SPC is established successfully, the IAD132E(T) shall return the connection identifier connectid of this SPC. You can use the command show spc slot to show the index number and configuration information of an SPC. You can also use the command show spc {connectid connectid | from fromid } to query the detailed information of the connections start from a specific one, such as the connection id, connection state, connection type and the connection name. You can release and restore a semi-permanent connection dynamically. The command spc release can release a semi-permanent connection, while the command no spc release can restore a semi-permanent connection. Different from the delete command, the release command releases the connection without deleting the data.
2-26
Caution: If you delete an SPC, its configuration data will get lost. If you enter the fromid of an SPC without inputting the endid, all the SPCs after the fromid will be deleted. So you must use the spc delete command with caution. When adding an IP SPC, you must configure the DSP channel parameter for the SPC, and the configuration on both ends of the SPC must be the same. The configuration should contain DSP voice code type (dsp-voice-code), echo control enabler (dsp-ece), silence compression enabler (dsp-sce) and RTP packing time interval (dsp-rtppacket-interval). When configuring IP SPC between IAD132E(T) device A and device B, the local-port configured on device A must be identical with the remote-port on device B, while the remote-port configured on device A must be identical with local-port on device B.
IAD132E(T) 2
2-27
IAD2000(config-esl-user)#mguser batadd startuser 1/0 enduser 1/15 0 nolayer 0 telno 2215100 leaveword 1001
IAD132E(T) 2:
IAD2000(config)#spc add start 1/0 50120 210.11.252.19 50000 name spcip
Since the IAD132E(T) 1 uses FTIU board with slot 3 as the uplink interface, network port number 6 of slot 3 should be configured as the uplink interface.
IAD2000(lanswitch)#uplink 6
2-28
You can use the command show if-mg { all | attribute mgid } in the ordinary mode, or use the command show if-mg attribute in the MG interface mode, to display the MG interface data.
2-29
AT0 calls involve another networking mode for PSTN to interwork with NGN. Refer to Figure 3-1 for reference. PSTN is connected to the FXO port of any IAD132E(T) in the group of IAD132E(T)s through analog trunk cables. Thus, the subscriber of PSTN can send calls to and receive calls from subscribers in the whole group of IAD132E(T)s through the FXO port of this IAD132E(T). The difference between this networking mode and the trunk media gateway (TMG) is that TMG is connected with NGN and PSTN, while the IAD132E(T) is connected with NGN and PSTN through the analog trunk.
3-1
PSTN
FXO
IAD132E(T) group
Figure 3-1 Networking for AT0 calls The AT0 call flow is illustrated in Figure 3-2.
PSTN MGC
FXS
IP
FXO IAD132E(T) 1
Subscriber A
Figure 3-2 AT0 call flow When Subscriber A calls Subscriber B: (Subscriber A must be under the IAD132E(T)) Subscriber A picks up the phone, hears the dialing tone --> dials NGN number D (allocated by media gateway controller (MGC) and configured on the MGC) --> hears the dialing tone sent from PSTN --> dials Subscriber Bs number --> hears the ring back tone(Subscriber B picks up the phone) --> the call is established. When Subscriber B calls Subscriber A: Subscriber B picks up the phone, and hears the dialing tone --> dials PSTN number C (allocated by the exchange configured on the exchange) --> hears the dialing tone sent from NGN --> dials Subscriber As number --> hear the ring back tone(Subscriber A picks up the phone) --> the call is established. 2) Calls with and without convergence
The calls with and without convergence bring the interworking between the subscriber of this IAD132E(T) and the subscriber of PSTN. When the IP network fails, the IAD subscriber can make PSTN calls in these two call modes. Considering the actual
3-2
networking requirement and hardware configuration, you can configure PSTN calls either with or without convergence according to the quantity of FXO ports and FXS ports. If the number of configured FXO ports is less than the number of FXS ports, it is called the PSTN call with convergence; if the number of the configured FXO ports is equal to the number of FXS ports, it is called the PSTN call without convergence.
Softsw itch
NGN
TMG8010 PSTN
FXO
IAD132E(T)
LAN Sw itch
Figure 3-3 Networking for calls with and without convergence For the call without convergence, because the number of the configured FXO ports on IAD is equal to the number of FXS ports, two phone numbers (one VoIP number and one PSTN number) can be allocated to each access user of the IAD132E(T). Therefore, this application is called one phone set with two numbers. The flow of calls with and without convergence is illustrated in Figure 3-4.
PSTN
FXS
IAD132E(T) Subscriber B
FXO
PSTN number
Internal number
Subscriber A
Figure 3-4 Flow of calls with and without convergence When Subscriber A calls Subscriber B: Subscriber A picks up the phone, hears the dialing tone --> dials the prefix of the called number (allocated by the IAD132E(T)) --> hears the dialing tone sent from PSTN --> dials Subscriber Bs number --> hears the ring back tone(Subscriber B picks up the phone) --> the call is established. When Subscriber B calls Subscriber A:
3-3
If Subscriber A is a one-phone-two-number subscriber, Subscriber B needs only to dial Subscriber As PSTN number (allocated by the exchange and configured on the exchange). If Subscriber A is not a one-phone-two-number subscriber, the flow is as follows: Subscriber B picks up the phone, hears the dialing tone --> dials the PSTN number (to be allocated by the exchange on itself) --> hears the dialing tone sent from the IAD132E(T) --> dials Subscriber As inner number --> hears the ring back tone(Subscriber A picks up the phone) --> the call is established.
Change the call routing mode To change the call routing mode, clear the current routing mode, and then configure the new routing mode. Example: Change the default routing mode from internal routing mode to VoIP routing mode.
IAD2000(config)#no call-mode internal IAD2000(config)#call-mode voip default
Configure the attributes of the internal phone number By default, the attribute of internal telephone numbers is configured as: Prefix can be any number with the length of four digits. The internal call of the IAD132E(T) adopts the default configuration of internal telephone number. You can modify the prefix and length of the internal number according to actual needs. Example: Change the prefix of the IAD inner number to 99 and the length of it to 5 digits.
IAD2000(config)#inner-number prefix 99 length 5
Configure the PSTN call with convergence Example: The IAD132E(T) is connected to PSTN through the ATU board (providing four FXO ports). Configure the ASI board in slots 1 and 2 for accessing 32 voice users. The PSTN call mode with convergence is configured to communicate with the PSTN user, with the convergence ratio being 4:32 and the call prefix as 3.
IAD2000(config)#call-mode pstn convergent 3
Add access users to all the ports on slot 1 and slot 2 of the IAD132E(T), and define the ports to be subject to the MG with mgid 0, no layered configuration, and the terminalid corresponding to the ports starts from 0. Do the following setting according to the configuration on the MGC: Set the VoIP telephone numbers ranging from 2215100 to 2215131, and inner numbers ranging from 5100 to 5131, and support the voice message function.
IAD2000(config-esl-user)#mguser batadd startuser 1/0 enduser 2/15 0 nolayer 16 telno 2215116 leaveword 5100
Note: The IAD132E(T) internal phone numbers need to be configured only when the internal call mode or the PSTN call mode with convergence is configured.
3-5
Configure the PSTN call mode without convergence Example: Connect the IAD132E(T) to PSTN through the ATI board in slot 2 (providing 16 FXO ports), and configure slot 1 with the ASI board for accessing 16 voice users. Configure the system to the PSTN call mode without convergence, with the convergence ratio being 16:16 and the call prefix as 2.
IAD2000(config)#call-mode pstn non-convergent 2
Add access users to all the ports on slot 1 of the IAD132E(T), and define the ports to be subject to the MG with mgid 0, no layered configuration, and the terminalid corresponding to the ports starts from 0. According to the configuration on the MGC, set the VoIP telephone number as 65410016541016, internal number as 10011016. Based on the numbers allocated by the exchange, configure the PSTN numbers on IAD from 8972001 to 8972016, and support the voice message function.
IAD2000(config-esl-user)#mguser batadd startuser 1/0 enduser 1/15 0 nolayer 0 telno 2215100 leaveword 1001
For the IAD132E(T) with the one-phone-two-number function, the corresponding relation between FXO ports and FXS ports must also be configured.
IAD2000(config)#fxo-fxs start fxo 2/0 fxs 1/0 end fxo 2/15 fxs 1/15
Note: While configuring the corresponding relation between FXO ports and FXS ports with the command fxo-fxs, make sure that the number of FXO ports is the same as that of FXS ports.
Configure the AT0 call Example: The IAD132E(T) is connected to PSTN through the ATI board (providing the 16 FXO ports) in slot 2. Configure the mode as AT0 call mode.
IAD2000(config)#call-mode pstn at0
Add FXO ports to slot 2 of the IAD132E(T). Define the ports to be subject to the MG with mgid 0, adopt no layered configuration, and set the terminalid corresponding to the ports as start from 0. Do the following setting according to the configuration on the MGC: set the VoIP phone numbers ranging from 2215100 to 2215115, and inner numbers ranging from 5100 to 5115, and support the voice message function.
IAD2000(config-esl-user)#mguser batadd startuser 2/0 enduser 2/15 0 nolayer 16 telno 2215116 leaveword 5100
3-6
User mode
prefix: prefix. It is the number dialed by the user after off-hook in ordinary routing mode, ranging 12 digits, and is used for selecting call mode. ins-prefix: inserted number, ranging 110 digits. in-prefix: prefix of internal number, ranging 13 digits.
3-7
in the internal call mode or PSTN call mode. If so, when another user calls the access user, the corresponding announcement will be played. When the access user ends the internal call or PSTN call, the IAD sends the message to the softswitch that the user has resumed the service. Call waiting is a service realized by the IAD132E(T) in the PSTN call mode without convergence. When a PSTN subscriber calls a subscriber who is making a VoIP call under the control of the IAD132E(T) or an one-phone-two-number subscriber who is making an internal call, there will be call collision. In such case, the IAD132E(T) will send an incoming call prompt to the callee while the PSTN caller is listening to the normal ring back tone. When the callee hooks on, the IAD132E(T) plays the ringing tone again. The subscriber then picks up the phone to establish the call with the PSTN caller. Table 3-2 Related commands Operation Configure call collision Display the configuration of call collision Command call-conflict { start | stop } show call-conflict Mode Global config mode User mode
3-8
configuring the software parameters, so as to adjust to various application statuses. The software parameters of the IAD are classified into system software parameters and MG interface software parameters. The system software parameters can be configured to adjust the noise, echo, jitter, and loudness of voice, the transmission mode of Fax/Modem, and the type of the MGC which networks with the IAD.
This command can be used to adjust the volume, but the effect is not as prominent as adjusting the receive/send gain of the PSTN physical port. Example: The parameter 8 of the command mg system-parameter controls whether the echo cancellation (EC) switch of the IAD132E(T) is on. By default, the switch is on. It is recommended that the EC switches at both gateways be on, since this will bring EC at the IAD132E(T) and the PSTN sides into effect. The EC at the IAD132E(T) is controlled by the softswitch. If there is no command sent from the softswitch, the IAD132E(T) takes the default configuration of EC.
IAD2000(config)#mg system-parameter 8 1
Modify the echo return loss to 3 dB, the network level attenuation to 6 dB.
IAD2000(config)#ec set erl 2 yloss
Note: All the EC parameters have their default values. Normally the default values can be taken. The command no ec set can be used to bring all EC configurations to the default values.
Example: The voice jitter and information loss have much relevance to the delay jitter of the carrier network and the jitter buffer of the gateway. Currently, the value of jitter buffer is 100 ms by default. What deserves attention is that the adjustment of this parameter has double effects. To increase its value, the capability of jitter removal is enhanced, while
3-9
on the other hand the end-to-end delay is lengthened. Therefore, this parameter should be configured according to different network conditions. Example: Configure jitter buffer at all ports to 40 ms.
IAD2000(config)#mg system-parameter 5 40
Example: Configure the DSP to use A law for voice signal compression.
IAD2000(config)#system set aulaw 0 Modify DSP parameter must reboot the system, continue? [Y|N]:
Caution: You have to reboot the system to validate modification of the mode for voice signal compression.
Example: Configure the upper and lower limits for the access user to press hookflash to the local standards, for instance, Hong Kong standard (700 ms for the upper limit and 100 ms for the lower limit).
IAD2000(config)#mg system-parameter 2 700 IAD2000(config)#mg system-parameter 1 100
3-10
1: the lower limit for pressing hookflash, being 100 ms in both mainland China and Hong Kong. The default value is 100 ms. 2: the upper limit for pressing hookflash, being 300 ms in mainland China and 700 ms in Hong Kong. The default value is 300 ms. 3: the input gain of the DSP chip, used to adjust the volume. The more the gain is, the higher the volume will be, and conversely. It ranges 264, corresponding to -31 dB0 dB, and the default value is 48 dB. 4. the output gain of the DSP chip, used to adjust the volume. The more the gain is, the higher the volume will be. It ranges 264, corresponding to -31 dB 0 dB, and the default value is 64 dB. 5: the value of jitter buffer, used to adjust this value at all ports. If this value at a certain physical port is adjusted by the command pstnport attribute set, it is not subject to this parameter. When the network is in good condition, it is recommended to set this value to 40 ms. With such configuration, there is little delay in the voice channel and the call completion rate of the Fax and Modem is not affected. This enhances the quality of voice. When the network is in bad condition, it is recommended to set this value to 100 ms and set this value at the fax and modem ports to 60 ms separately. This value ranges 0 ms 150 ms and the default value is 60 ms. 6: the announcement playing mode for incoming call. If it is set to 0, the MGC plays the announcement; set to 1, the IAD does. The default value is 1. 7: the default coding mode of the DSP channel, ranging 020. The value of 0 indicates G.711; 4 G.723High; 8 G.711A; 18 G.729; 20 G.723Low. The default value is 8 (G.711A). 8: the default EC switch of the DSP channel, ranging 01. The value of 0 indicates the switch is off; 1 on. The default value is 1. 9: the default silence compression switch of the DSP channel. The value of 0 indicates the switch is off; 1 on. The default value is 1.
Note: The silence compression switch should be set to 0 when caller identification psent againation is supported.
10: the default interval for RTP packetization of the DSP channel, in unit of milliseconds. For G.711A/G.711/G.729, the value is 10 ms; for G.723, 30 ms. The default value is 20 ms. 11: to set whether the DSP channel needs the channel statistics information, ranging 01. The value of 0 indicates no; 1 yes. The default value is 1.
3-11
12: the transmission mode of the FAX. The value of 0 indicates transparent transmission mode; 1 transparent transmission mode with FAX related events reported; 2 T.38 V2; 3 T.38 V3; 4 T.38 transparent transmission mode. The default value is 2. 13: the transmission mode of dual tone multi frequency (DTMF)/MF signal on the RTP. Refer to Table 3-4 for the parameter values and their meanings. The default value is 0. Table 3-4 Parameter values of DTMF code transmission mode Value 0 Meaning Transparent transmission: The DTMF signal is packetized into RTP packets and transmitted. 2833 mode: The DTMF signal is transmitted in the RTP packets other than voice and message packets. The numbers can be sent and received normally even when the network is in bad condition. Outband transmission
1 2
14: the flag for playing the howler tone. The value of 0 indicates the howler tone is not played; and 1 played. The default value is 1. 15: the flag for an overseas version. The value of 0 indicates China; 1 Hong Kong; 2 Brazil; 3 Egypt; and others are reserved. The default value is 0. 16: the flag for system self-check. The value of 0 indicates no self-check; 1 resetting the ports optionally; 2 resetting all free ports. The default value is 1. 17: the duration set at the timer for the dialing tone, in unit of seconds. The default value is 20 seconds. 18: the duration set at the timer for the busy tone, in unit of seconds. The default value is 40 seconds. 19: the duration set at the timer for the howler tone, in unit of seconds. The value of 0, the default value, indicates no timeout. 20: the connection mode for card distribution. The value of 0 indicates the connection mode for card distribution is not supported; 1 indicates the non-standard connection mode for card distribution is supported; 2 indicates the standard connection mode for card distribution is supported. The default value is 1. 21: the control mode for polarity reversal at the port. The value of 0 indicates the MGC controls the polarity reversal mode; 1 indicates the IAD controls this mode. The default value is 0.
3-12
Note: When the IAD132E(T) is interworking with the ETG for usage in the IP AN (IP Access), this parameter must be set to 0, that is, the ETG controls the polarity reversal at the port. And in the narrowband mode, the command pstnport attribute set can be used to set the polarity reversal attributes. Refer to Configuring IAD Call Mode for details.
22: the maximum of speech paths supported by each DSP chip. The default value is 8. 23: the number of RFC2833 redundancy packets. The default value is 0. 24: the type of the MGC interworking with the IAD. It ranges 07, each of which represents one MGC type. The value of 0 indicates SoftX3000; 1 indicates the softswitch of Z; 2 of N; 3 of C; 4 of S; 5 of Sonus; 6 of ETG; 7 of Up Technologies. The default value is 0. 25: to set whether to check the port number of the remote UDP. The value of 0 indicates no; 1 yes. The default value is 1. 26: to set whether to send the UPD checksum. The value of 0 indicates no; 1 yes. The default value is 0. Value: the value of system parameter
Note: When the command show mg system-parameter is used to query the software parameters (system software parameters and MG interface software parameters), all parameters will be displayed if the name is not entered, and the specified parameter will be displayed if it is entered.
3-13
Table 3-5 Related commands Operation Configure MG interface software parameters Display MG interface software parameters Command mg interface-parameter mgid name value show mg interface-parameter Mode Global mode config
User mode
Example: Switch on the dual homing switch, configure the standby MGC and set its IP address to 210.11.180.19.
IAD2000(config)#mg interface-parameter 0 2 0 IAD2000(config)#interface mg 0 IAD2000(config-if-mg-0)#mg backup-mgc 210.11.180.19
Table 3-6 Related commands Operation Configure the standby MGC Delete the standby MGC Display the MGC Switch the MGC manually Command mg backup-mgc mgcip mgcip [ mgcport mgcport ] no mg backup-mgc [ mgcport mgcport ] show mgc mgc switch mgcip mgcip Mode MG interface mode MG interface mode MG interface mode MG interface mode
mgcip: the IP address or the domain name of the standby MGC. It must be consistent with that actually configured to the standby MGC. The domain name is a character string of 160 characters. mgcport: the port number of transmission layer protocol. With MGCP, only text coding is supported and the default port number is 2727.
Add the ringing mapping records to Hong Kong of mapping the ringing type parameter 22 of the MGC to the ringing tones of the IAD132E(T). Map the cadence ringing tone to the Hong Kong ringing tone type 2 and the initial ringing tone to type 18. With such configuration, when the MGC sends the ringing type parameter 22 to the IAD132E(T), the IADE(T) will adopt these two ringing tones.
IAD2000(config-if-mg-0)#mgringmode add 22 2 18
mgringmode delete [mgcpara ] mgringmode modify mgcpara [cadencering cadenc | initialring initialring ] show mgringmode attribute [mgcpara]
User mode
Note: The data packet that the MGC sends to the IAD132E(T) contains the ringing type parameter (whose value is the same as that of mgcpara), by which the IAD132E(T) searches in the table of ringing mapping records, finds the matching mgcpara and then gets the corresponding ringing types of cadencering and initialring.
Caution: When the IAD is set to control the polarity reversal charging signal, the subscriber polarity reversal parameter of the MGC must be set to no. Otherwise, there will be repeated charging.
If the IAD is set to control polarity reversal charging, the PSTN port has to be configured with polarity reversal charging as well as the system parameter 21 that controls the polarity reversal charging signal. To modify a system parameter, use the command mg system-parameter. Example: Configure the attributes of port 0 of slot 1. To set the gain type of the PSTN access user to 6 and to enable pulse dialing and polarity reversal charging at the PSTN port.
IAD2000(config-esl-user)#pstnport attribute set 1/0 6 enable reverse
Example: Set the IAD to control the polarity reversal signal, use the following command. To make this successful, it must be ensured that the polarity reversal switch on the MGC is off.
IAD2000(config)#mg system-parameter 21 1
II. Configuring the Send and Receive Gain at the PSTN Physical Port
Normally the volume of the talk can be greatly enhanced by adjusting the send and receive gain at the PSTN physical port of the IAD132E(T). As recommended in the Chinese national standards, the send and receive gain of the local network is 0/-3.5 (that is, high gain) and that of the toll network is 0/-7. In contrast, it is recommended in the foreign countries that the send and receive gain of
3-17
narrowband transmission is both 0/-7. Because the voice of the IAD132E(T) is sent and received by RTP packets, which can be regarded as a group trunk, similar to the PCM trunk, it is recommended to set the send and receive gain of the subscriber physical port of the IAD132E(T) to 0/-7 (that is, low gain). Example: Set the send and receive gain at port 0 of slot 1 to low gain.
IAD2000(config-esl-user)#pstnport attribute set 1/0 1 disable reverse
3-18
Parameter value 7 8 9 10 11 12 13 14 15 16 17
pulse-dial: to set whether to enable pulse dialing at the PSTN port. The two values are enable and disable, and the default value is disable. Pole: to set whether to support polarity reversal charging at the PSTN port. The two values are normal and reversal, and the default value is normal. V21TimerLen: the duration set at the timer, being 10 seconds by default. Once the PSTN port detects out the 2100-Hz polarity reversal signal, it will start a timer. If the timer does not detect out the V21 signal within the preset duration, it will regard the signal as a modem signal; otherwise, it will regard the signal as a FAX signal.
Ports 14, except the one used as an upstream port, can be used to access data subscribers. Installing the IAD132E(T) in a stack through an Ethernet port. Figure 3-5 shows the stack installation of multiple IAD132E(T). These IAD132E(T)s are stacked and then connected to the upstream equipment (normally a router or a switch in the IP network) through an Ethernet port. This saves the port resources for the upstream network equipment.
To upstream network equipment (1)
(4)
(2)
(5) (3)
(6)
Figure 3-5 Stack of the IAD132E(T) equipment In the above figure, the six IAD132E(T)s are installed in a stack. The (2), (3), and (4) are connected to the (1) directly, while the (5) and (6) are connected to the (1) indirectly. The services of all the six are transferred to the upstream network equipment through the Ethernet port of the (1). The IAD132E(T) supports multi-level stack.
3-20
and forward the voice packets without the VLAN Tag to the LAN Switch B through another interface (distag in the figure). In this way, the separation of voice and data packets is realized at the LAN Switch A. Due to the rather high precedence configured to voice packets, the LAN Switch A will discard some data packets and forward the voice packets to the LAN Switch C when the network is blocked.
IP netw ork
LAN Sw itch C
LAN Sw itch B
tag
IAD132E(T)
Figure 3-6 Networking diagram for separating voice packets On the IAD132E(T), only voice packets can be configured with VLAN Tag and precedence. This is due to the flow direction of packets in the IAD. In Figure 3-7, ports 1, 2, 3, 4, and 6 are the external ports provided by the LAN Switch chip. Port 1 is used for upstream transmission, and ports 2, 3, 4, and 6 are used to access subscribers. Port 5 is for internal use of the chip. The CPU achieves configuration of VLAN Tag and precedence to voice packets. The upstream voice stream is first coded at the DSP, then transformed into voice packets at the CPU, and finally transmitted to the IP network through port 1 of the LAN Switch chip. In contrast, the upstream data stream is accessed through ports 2, 3, 4, and 6, then transmitted to the IP network through port 1, without being processed at the CPU. Therefore, only voice packets can be configured with VLAN Tag and precedence.
3-21
Figure 3-7 Flow chart of voice/data stream at the LAN Switch chip
Note: When the VLAN Tag is used to separate voice and data packets, it must be ensured that the upper network equipment (a router or a LAN Switch) also supports VLAN Tag. When the VLAN Tag function is enabled, the current calls will be affected.
Example: Set ToS (Type of Service) of the voice packets to the highest reliability, and that of the other packets to the lowest cost.
IAD2000(config)#tos voice priority reliability IAD2000(config)#tos other priority mincost
3-22
Note: The configuration of ToS is similar to that of VLAN Tag. Whether the configuration is valid also depends on the upper IP equipment.
Table 3-10 Related commands Operation Enable the VLAN Tag function Configure the VLAN Tag and precedence Configure the priority of ToS Command tag { enable | disable } tag vlanid vlanid priority priority tos type priority priority Mode Global config mode Global config mode Global config mode
vlanid: the number of VLAN, ranging 04095. priority: the priority of VLAN, ranging 07. 0 has the highest priority. type: the type of the service packet, being voice or other.
Example: Any port on the front panel of the IAD132E(T) can be used as the port through which the IAD is connected to the IP network, without any other configuration. Slot 3 can be configured with boards FTIU, FSIU or FMIU to function as an upstream port. When voice packets are transmitted to the IP network through these boards, you have to use the command uplink to configure the upstream port. The number of the upstream port is fixed to 6.
IAD2000(lanswitch)#uplink 6
Example:
3-23
Set the baud rate at port 2 to the auto negotiation mode and that at port 3 to 10 Mbit/s.
IAD2000(lanswitch)#negotiation-auto 2 IAD2000(lanswitch)#speed 10 3
Note: Ports 14 of the IAD132E(T) are 10/100Base-TX Ethernet ports, supporting baud rates of both 10 Mbit/s and 100 Mbit/s. They can work in half-duplex, full-duplex and auto negotiation modes. They can also negotiate with other network equipment for the working mode and baud rate, and select the most appropriate automatically. The default working mode is the auto negotiation mode.
flow-control interface-num
3-24
Operation Cancel flow control to the Ethernet port Set the baud rate at the Ethernet port Set the baud rate at the Ethernet port to the auto negotiation mode Set priority to a port Remove priority of a port Set the monitoring port of the LAN Switch Cancel the configuration of the monitoring port at the LAN Switch Display the monitoring port at the LAN Switch Reset the LAN Switch Set an IAD port to be the upstream port Set a port not to be the upstream port Clear the port statistics information of the LAN Switch
Mode LAN Switch mode LAN Switch mode LAN Switch mode LAN Switch mode LAN Switch mode LAN Switch mode
negotiation-auto interface-num priority interface-num no priority interface-num monitor interface-num1 observing-port interface-num2 no monitor show monitor-port reset uplink interface-num no uplink interface-num clear
LAN Switch mode LAN Switch mode LAN Switch mode LAN Switch mode LAN Switch mode LAN Switch mode
Table 3-12 shows the configuration steps of the timer at the IAD132E(T). It is recommended to make these configurations in the sequence below. Table 3-12 Steps for the configuration of the IAD charging terminal Step 1 2 3 4 Operation Set the charging terminal to a charging machine, and allocate an index number Set the subscriber port with charging by a charging machine Turn on the charging machine Configure an NMS to the charging machine
Example: Set the IAD charging terminal to a charging machine and the index number of the charging terminal to 1.
IAD2000(config)#billing-terminal 1 jifeiqi
Example: Set the charging terminal for all ports to a charging machine with the index number 1.
IAD2000(config)#billing-terminal 1 all
JIFEIQI ENABLE
Send packet:0 ; Receive packet:0 Include mguser port:2 /0 |2 /1 |2 /2 |2 /3 |2 /4 |2 /5 |2 /6 |2 /7 |2 /8 |2 /9 |2 /10 |2 /11 |2 /12 |2 /13 |2 /14 |2 /15 |
--------------------------------------------------------------------
3-26
Table 3-13 Related commands Operation Set the charging terminal to a charging machine Configure a charging terminal to the subscriber port Enable/disable the charging terminal Delete a charging machine Set parameters of the charging terminal Set NMS parameters of the charging machine Delete the NMS of the charging machine Display the status of the charging machine Display the NMS status of the charging machine Loop test the charging terminal Command billing-terminal index jifeiqi billing-terminal index { slotid/portid | all } billing-terminal index {enable| disable } no billing-terminal index billing-terminal para { existed-call | newcall}* slotid/portid mode Global config mode Global config mode Global config mode Global config mode Global config mode Global config mode Global config mode User mode User mode Global config mode
billing-n ms ip udpport sign timer no billing-n ms show billing-terminal show billing-n ms billing-terminal loop-test
index: the index of the charging terminal, ranging 03. slotid/portid: the subscriber port number, in the format of slot number/port number. For instance, port 12 of slot 2 is presented as 2/12. The slot number ranges 13 and the port number ranges 015. existed-call: to set whether the current calls are cut off when the communication between the IAD and the charging machine is interrupted. The value of Cut indicates cutting off the current calls and Nocut indicates keeping the current calls uninterrupted. newcall: to set whether new calls can be established when the communication between the IAD and the charging machine is interrupted. The value of Recall indicates permitting new calls establishment and NoRecall indicates not. ip: the IP address of the charging machine NMS. udpport: the UDP protocol port number used by the charging machine NMS, ranging 20,00021,000. sign: the sign of the charging machine in the NMS, being a character string of 120 characters.
3-27
timer: the handshake duration of the IAD and the charging machine NMS, ranging 0 ms65,535 ms.
Table 3-14 Related commands Operation Command mgcp { AtMostOnceFlag AtMostOnceFlag | AtMostOnceTimer AtMostOnceTimer | MaxRetranTimer MaxRetranTimer | ProvRspDelay ProvRspDelay | ProvRspFlag ProvRspFlag | ProvRspTimer ProvRspTimer | RetranTimerSeedFlag RetranTimerSeedFlag | RetranTimerSeed RetranTimerSeed | RetranDisconnectThreshold RetranDisconnectThreshold | RetranSuspicionThreshold RetranSuspicionThreshold } Mode
User mode
AtMostOnceFlag: to set whether to enable the at_most_once function. This function means that when A receives a command, it execute it only once. In this way, such case can be avoided that A re-sends the packets to B when the response from B is being transmitted in the network, that is, a command is re-executed. The values can be TRUE or FALSE, and the default value is TRUE. AtMostOnceTimer: the duration set at the timer for the at_most_once function. B calculates the time from the point when it sends the response message. If it receives the sent again packets within the duration set for this parameter, it will discard them. The value cannot be larger than 60 seconds and the default value is 30 seconds. MaxRetranTimer: the maximum of retransmission time. If a command is sent, but no response is received, the command will be re-sent. The command will not be re-sent if no response is received within the duration set for this parameter. RetranTimerSeedFlag: to set whether to configure the retransmission algorithm initial seed value. The two choices are TRUE and FALSE. If it is set to TRUE, it indicates that the first retransmission duration is set to RetranTimerSeed; or else, it is fixed to 2 seconds.
3-28
RetranTimerSeed: the initial seed value of the retransmission algorithm. It cannot be larger than 30 seconds, and must work in coordination with the RetranTimerSeedFlag. RetranSuspicionThreshold: the retransmission suspicion threshold. It must be smaller than RetranDisconnectThreshold. If the times for re-sending a command exceeds this value, the system enters the suspicion status and checks the DNS address or tries other destination addresses. RetranDisconnectThreshold: the retransmission disconnect threshold. It must be larger than the RetranSuspicionThreshold. When a system enters the suspicion status, if the times for re-sending a command exceeds this value, the command will not be sent again again. ProvRspFlag: to set whether to send a temporary response. When A sends a command to B, if the command execution takes a long time, B will send a temporary response to A, confirming that it has received the command. This reduces the possibility for A to resend the command. The two values are TRUE and FALSE, and the default value is TRUE. ProvRspTimer: the duration set for the temporary response, from the point when B receives As command to the point when it sends the temporary response. This value cannot be larger than 5 seconds, and the default value is 2 seconds. ProvRspDelay: the duration set for the temporary response delay. When A receives the temporary response, it prolongs the MaxRetranTimer by a duration of ProvRspDelay. This value must be larger than 30 seconds, and the default value is 5 seconds.
Note: All the above parameters are optional. When a parameter is not checked, it means to adopt the default value. It is recommended to modify these parameters with caution. Either A or B can be MGC or IAD132E(T).
3-29
4-1
-------------------------------------------------------------------
2)
Execute the command data set autosave {on|off} to set the auto-save switch for the configuration data. If you select on, the data will be saved at the set time interval. If you select off, the system will not save the data automatically, and you should save the data by yourself. For example: turn on the auto-save switch.
IAD2000(config)#data set autosave on ------------------------------------------------------------------System autosave switch: on autosave interval: 3600 minutes
-------------------------------------------------------------------
3)
By default, auto-save is made once every 3600 minutes. You can use the command data set autosave interval time_value to set the time interval in minute for the saving. For example: set the auto-save time interval as 120 minutes.
IAD2000(config)#data set autosave interval 120 ------------------------------------------------------------------System autosave switch: on autosave interval: 120 minutes
-------------------------------------------------------------------
Caution: Too frequent saving of data will affect the system performance, so you are recommended to set the auto-save time interval to be longer than one hour.
Manual-save 1) Show the unsaved data percentage. You can use the command show data unsaved percent to show the percentage of unsaved configuration data. For example:
IAD2000> show data unsaved percent
4-2
------------------------------------------------------------------Now, the percentage of unsaved configuration data on slot 0 main control board is: 10% -------------------------------------------------------------------
If you have made new configuration, you can also save the data directly. 2) Save data manually
If there is unsaved data in the system, you can execute the command write in the privileged mode to save the data. When the write command is running, the data saving progress will be displayed.
Note: You can use the write command to save the configuration data immediately, no matter whether the auto-save function has been enabled or not.
4-3
For example: use TFTP to back up the database file through the network port to the PC with IP address of 10.11.116.25. 1) Make sure the PC that runs TFTP program is well connected with IAD132E(T).
If the default directory is not the expected one to store the backup file, click <Settings> to designate the directory, then click <OK> to confirm. Refer to U-SYS IAD132E(T) Integrated Access Device Installation Manual for the configuration method of TFTP. 2) 3) Input the following command on the command line terminal to back up the data: If the parameter you input is incorrect, or the TFTP connection is not normal, error prompts will appear, and you should check the reason according to the prompt. If everything goes alright, prompt message will appear after the backup is finished, In the backup process, you can execute the command show progress backup to display the progress.
4-4
IAD2000# clock set 17: 47: 18 2002-07-19 Date: Time: 2002-07-19 17:47:18
SLOT 0 CVP mainboard version information PCB BIOS version : AG11CVP.2 version : 303
SLOT 1 ATI interface board version information PCB Chip version : AG11ATI.1 REV.A version : 2
SLOT 2 ASIB interface board version information PCB Chip version : AG11ASI.2 REV.A version : 19
SLOT 3 ATU interface board version information PCB Chip version : AG11ATU.1 REV.0 version : 0
4-5
oprlog (system operation log information) debug (system debugging information) alarm (system alarm information) trace (tracing information) diagnose (diagnose information) stat (statistical information) other (other information) IAD132E(T) maintenance and management terminals include: command line terminal, network management station (NMS), log host and Web NMS. Information generated on IAD132E(T) is not sent to the various terminals directly. Instead, it is first sent to IAD132E(T) information center, which is a software component that runs on the CVP. This information center controls the output of information to the various terminals, like which type of information, and what level of the information, should a terminal receive. The control of information output to the terminals includes the setting of terminal output switch for the terminals, and the output information level.
4-6
Note: When setting the CLI information output switch and level, the Client ID, which can be obtained through command show client, should be input to show the CLI client end information of the operator, including the client ID, user name, IP address and logon time. Multiple types of information output switches can be set for the same terminal at the same time. There are two switches to control the output of alarm information to the CLI terminal. Switch 1: use the command infoswitch cli to set whether to report the alarm information to the CLI terminal. Switch 2: use the command (no) alarm output to set whether to report alarm information to the CLI terminal according to preset conditions. Refer to 4.5.6 for the use of switch 2.
For example: set not to send the system log to NMS SZ-ABC-WS_1, and send the alarm information, debugging information, diagnose information to the CLI terminal named bbb:
IAD2000(config)#infoswitch nms SZ-ABC-WS_1 syslog off IAD2000> show client -----------------------------------------------------------------Client ID Client Name IP Address Login Time
-----------------------------------------------------------------1 2 3 4 -aaa system bbb 0. 0. 0. 0 2003- 3-29 11:11:20 2003- 3-29 11:11:30 2003- 3-29 11:15:14
------------------------------------------------------------------
According to the Client Name, you can get the Client ID of "bbb", which is 4. Then set the information output switch according to the Client ID.
IAD2000(config)#infoswitch cli 4 alarm on debug on diagnose on
Note: Operator who maintains the system through the serial port has a fixed Client ID of 1, and the IP address displays as 0.0.0.0. In the example, the Client Name is ---, which means there is no login on the serial port at present. The naming method of NMS is similar with that of the IAD device.
4-7
Note: The information output switch must be turned on before the output level can take effect. A higher level means the information is more important. After you have set a level, all the information above this level will be output. The default output level is 0, which means all the information will be output. Levels of multiple types of information that is output to the same terminal can be set in one time.
For example: set the output level of syslog to NMS SZ-ABC-WS_1 as 3, and set the output levels of alarm, debugging and diagnosis information to CLI terminal with Clinet ID 3 to 1, 2 and 3 respectively.
IAD2000(config)# infolevel nms SZ-ABC-WS_1 syslog 3 IAD2000(config)# infolevel cli 3 alarm 1 debug 2 diagnose 3
Command endservice { slotid/portid | mgid mgid terminalid batnum } startservice { slotid/portid | mgid mgid terminalid batnum }
Caution: This command should be used with caution. If you reset the access port, the connected services will be interrupted.
4-9
The parameter ip is the IP address of the console. Example: Configure the IAD to send the on-hook signals to the IP console, of which the IP address is 192.20.129.2.
IAD2000(config)# console 192.20.129.2
4-10
The port is in busy status and the if the port is busy test it by force is not selected.
-------------------------------------------------------------A->ground AC voltage B->ground AC voltage A->B AC voltage (V) (V) (V) (V) (V) (V) (ohm) : : : : : : 0.443 0.443 0.000 -0.592 -0.590 -0.002
: > 10M
4-11
A->B polarity reversal resistance(ohm) A->ground capacitance B->ground capacitance A->B capacitance Conclusion : (uF) (uF) (uF)
--------------------------------------------------------------
In global config mode, you can use command loop-line-threshold set para-name para-value to set the parameters for external line test, while command loop-line-threshold restore to restore the default parameters of external line test.
4-12
---------------------------------------------------------Off-hook Dial tone Receiving pulse Receiving DTMF Ring back tone Busy tone Feeder Polarity reversal On-hook Ringing Stop ringing : : : : : : : : : : : Normal Normal Normal Normal Normal Normal Normal Normal Normal Normal Normal 44.058 34.794 25.435
----------------------------------------------------------
4-13
I. Operator attributes
User name: a unique character string in the system, which is printable, and ranges from 1 to 15 characters. Authority: administrator (Admin), operator (Oper) and ordinary (Exec). The Exec can only make simple queries, and execute some system commands. The Oper can configure the device, such as configuring the access service. The Admin can make all the configurations. A higher-authority operator can execute the commands of a lower level, while a lower-authority operator cannot execute the commands of a higher level. Password: a character string of 1 to 15 characters, and must be input correctly. Reenter number: an operator can log in from different terminals at the same time, and the number of this simultaneous login is decided by the reenter number, which ranges from 0 to 4. 0 means the operator cannot log in. Generally, 1 is recommended. Appendix information: a string of no more than 35 characters that contains the contact method of the operator, it can also be null.
4-14
Note: An operator cannot delete himself. The Admin system cannot be deleted. An operator who is logging in cannot be deleted. If you really need to delete this operator, you should first disconnect this operator. A higher-authority operator can use the command user disconnect to reject a logging in Telnet operator who has a lower authority. You can delete multiple operators at one time.
User's Level(1--3). 2
4-15
Note: The reenter number of an operator ranges from 0 to 4. When it is 0, the operator cannot log in the system.
4-16
-------------------------------------------------------------------
Showing client
4-17
Sometimes you may need to know from which terminal an operator has logged in, the IP address of the terminal, and the Client ID. In this case, you can execute the command show client. For example: show the information of an operator who has logged in:
IAD2000> show client -----------------------------------------------------------------Client ID Client Name IP Address Login Time
------------------------------------------------------------------
Operator who maintains the system through the serial port has a fixed Client ID of 1, and the IP address displays as 0.0.0.0. In the example, the Client Name is ---, which means there is no login on the serial port at present.
Note: A higher-authority operator can disconnect the lower-authority operators. Root and Admin cannot be disconnected through the command user disconnect. Operators logged in from serial port cannot be disconnected through the command user disconnect.
4-19
II. Parameters
ip: IP address of the log host, in dotted decimal notation. hostname: name of the log host, a string of no more than 32 characters.
Note: An added log host must be activated before log information can be reported to it. The names and IP addresses of the log hosts cannot repeat with each other. The naming method of log host is similar with that of the IAD device.
Note: You can delete a log host according to its IP address or host name. If the IP address of a log host has changed, or it is no longer in use, you should delete the log host.
4-20
Note: An added log host must be activated before log information can be reported to it. You can activate a log host according to its IP address or host name.
Note: A log host is able to be activated according to its IP address or host name. You can deactivate a log host that is not used for the time being.
Note: If a command string is long, you can use the command show log detailed to see the detailed display. If you use the command show log list, only the characters in the front part will be displayed, and the rest will be replaced with .
For example: display the detailed log record with index numbers 10 to 12:
IAD2000>show log detailed 10 12
4-21
II. Parameters
index1: start index number of the log record to be displayed. index2: end index number of the log record to be displayed, which cannot be smaller than index1: by default, only the log record corresponding to index1 will be displayed.
loghost add..04/27/2000 07:04:57 enable smart disable 04/02/2001 03:41:00 04/02/2001 03:41:02 04/02/2001 03:41:39
II. Parameters
all: shows the operation log information of all the operators username: name of the operator, of whom the operation log information will be displayed. date: time segment of the operation log to be displayed.
4-22
Note: You can display the log host information according to its IP address or host name. If you do not specify a log host, information of all the log hosts will display.
-----------------------------------------------------
II. Parameters
ip: IP address of the log host. hostname: name of the log host.
4.4.9 Setting the Information Output Control Switch of the Log Host
I. Syntax
On IAD132E(T), the information type switch must be turned on before the information of such type can be reported to the log host. Refer to 3.1.6 for detailed description on the control switch. In the global config mode, execute the following command to set the information output control switch for the log host.
4-23
infoswitch syslog {ip |hostname} {syslog value | oprlog value | debug value | alarm value | trace value | diagnose value | stat value | other value}
Note: This command is used to change the control switch that already exists on the log host. The modification can be made according to the information type, and you can modify multiple types of information in one time. When executing this command, related log host must be activated.
For example: set the information output control switch for the log host SZ-ABC-LOGHOST_1 as: diagnose information off, others on:
IAD2000(config)#infoswitch syslog SZ-ABC-LOGHOST_1 alarm on debug on
II. Parameters
ip: IP address of the log host hostname:name of the log host syslog: system log information type oprlog: operation log information type debug: debugging information type alarm: alarm information type trace: tracing information type diagnose: diagnose information type stat: statistics information type other: other information type value: value of the information output switch, which can be on or off. on means the information can be output, off means the informaitn cannot be output.
infolevel syslog {ip | hostname} {syslog value | oprlog value | debug value | alarm value | trace value | diagnose value | stat value | other value}
Note: When setting the information output control level for a log host, such log host must be activated. Related information type switch must be turned on before this setting can take effect. The information type value must be larger than or equal to the set value, so that the information can be reported to the log host. The setting can be made according to the information type, and you can make the setting on multiple types of information in one time.
For example: set the information output control level for the log host SZ-ABC-LOGHOST_1 as 0:
IAD2000(config)#infolevel syslog SZ-ABC-LOGHOST_1 syslog 0 alarm 0 debug 0 diagnose 0 oprlog 0 other 0 stat 0 trace 0
II. Parameters
value: level of the information, which ranges from 0 to 4 (0 is the lowest level, and 4 is the highest level). The information type value must be larger than or equal to the set value, so that the information can be reported to the log host.
4-25
OTHER_TYPE :on
Note: The level of information ranges from 0 to 4 (4 is the highest level). You can display the output control level of one or multiple types of information. If no information type has been specified, the information of all the types will display.
For example: show the output control level for alarm information and other information of log host SZ-ABC-LOGHOST_1:
IAD2000> show infolevel syslog SZ-ABC-LOGHOST_1 alarm The terminal info output level: ALARM_TYPE :0 OTHER_TYPE :0 other
4-26
Note: Alarms of the same type are identified by a unique alarm ID of four bytes, like 0x********. You can input the complete alarm ID like 0x********, or input it in decimal scale. The value of an alarm ID ranges from 38 to 1507589.
V. Alarm parameter
Alarm parameters help to locate the alarm, and are given in the reported alarm message. For example, an alarm concerning a board may have these parameters: slot number and port number.
4-27
4-28
The most direct method is to query the alarm according to its serial number. Each alarm record has a unique serial number (according to the time sequence when the alarm occurs), so you can get down to the specific alarm through its serial number. sn: serial number of the alarm, and the value range is [0, 4294967295].
4-29
You can query all the alarms that occurred in a certain period of time. datebegin: the displayed alarm starts on this date, the input should be yyyy-mm-dd. yyyy-mm-dd. timebegin: the displayed alarm starts at this time, the input should be hh-mm-ss. hh:mm:ss. dateend: the displayed alarm ends on this date, the input should be yyyy-mm-dd. yyyy-mm-dd. timeend: the displayed alarm ends at this time, the input should be yyyy-mm-dd. hh:mm:ss.
Note: IAD132E(T) stores five hundred alarm records. If you need to query the alarms that occurred even earlier, you can display them through the database on the NMS.
4-30
Caution: You must be careful when setting the alarm levels. Generally, the default settings are proper. If necessary, you can restore to the default settings after you have changed the setting.
Note: There are two switches that control the output of an alarm to the CLI terminal. Switch 1: use the command infoswitch cli to set whether to report the alarm information to the CLI terminal. Switch 2: use the command (no) alarm output to set whether to report the alarm information to CLI terminal according to preset conditions. To sum up, switch 1 controls the output of all the alarm information, while switch 2 controls conditional output of alarms. Refer to 4.1.6 for the use of switch 1.
4-31
Each alarm has an output tag that decides whether such alarm can be reported to the CLI, and the setting is actually made on this tag. The output tag of a restore alarm is the same with its original fault alarm. You can set the output tag according to alarm ID, alarm level or alarm type, or set to output all the alarms. The command is like this: (no) alarm output no is optional, and no alarm output means not to output a certain type of alarms to the CLI terminal. alarm output means to output a certain type of alarm to the terminal.
4-32
VI. Remarks
Your setting is effective to all the CLI terminals. That is, an alarm will be reported either to all of the CLI terminals, or none of the terminals. The output tag of a restore alarm is the same with its original fault alarm. This is implemented by the system automatically. That is, when you set the alarm output tag for a fault alarm, the system will set the same tag to its restore alarm. Similarly, when you set the output tag for a restore alarm, the system will set the same tag to its original fault alarm.
Caution: This alarm output shielding is invalid to NMS terminal, because the NMS provides even more filtering functions on the alarm output. The setting of alarm output does not have any effect on the generation of alarms. After the setting, any alarms generated will still be recorded, and can be queried through the history command. Different settings on the output tag may affect each other, and the last setting on the output tag will take effect. For example, if a major alarm belongs to the type of communication, and you have set not to output the major alarms, and then set to output the communication alarms. As a result, this alarm will be output to the CLI terminal.
4-33
no is optional, and no alarm statistics means not to make statistics on a certain type of alarm. alarm statistics means to make statistics on a certain type of alarm.
4-34
Caution: Different settings on the alarm statistics tag may affect each other, and the last setting on the statistics tag will take effect. For example, if a major alarm belongs to the type of communication, and you have set not to make statistics on the major alarms, and then set to make statistics on the communication alarms. As a result, this alarm will be included in the statistics. In actual application, the statistics tag on a fault alarm and its corresponding restore alarm can be different, since the concern on them are generally different. So, the setting of fault alarm statistics and restore alarm statistics are independent of each other. Alarm statistics for threshold alarms cannot be set.
4-35
Caution: In actual application, the statistics of a fault alarm and its corresponding restore alarm can be different, since the concerns on them are generally different. So, the settings of statistics thresholds for fault alarm and restore alarm are independent of each other. If you set the threshold as 0, no threshold alarm will be generated.
4-36
4-37
Operation Testing the function of sending accounting pulse of the port on ASI board. Displaying the status of all ports on ASI board. Testing the function of receiving pulse numbers by the ports on ASI board. External loopback test of the board. Testing the ringing of the external loopback of the board. Stopping the external loopback test. Displaying the version.
Command asiuserint { asi1sendttx12kc | asi1sendttx16kc | asi2sendttx12kc | asi2sendttx16kc | asi1nosendttx12kc | asi1nosendttx16kc | asi2nosendttx12kc | asi2nosendttx16kc } asiuserint {asi1portstatus| asi1portstatus } asiuserint asinodisplaynumber} {asidisplaynumber|
externlooptest { asi1ati2 | asi1atu | asi2ati1| asi2atu } externlooptest ringtest { asi1ati2 | asi1atu | asi2ati1| asi2atu } externlooptest stop getparam {asi1ver|asi2ver | ati1ver | ati2ver | atuver | version | boardid}
4-38
Alarmthreshold: Threshold of alarm RTCP packet, that is, an alarm is generated after the parameters delay, jitter and lost of how many RTCP packets in a row exceed the thresholds. The value range is 0 to 5, and the default value is one packet. If it is set to 0, it means no alarm is generated regardless of the network status; that is, the alarm and log function of RTCP is disenabled. Delay: Round-trip delay of the RTP channel. The value range is 50 to 1,000 milliseconds. The default value is 50 milliseconds. Jitter: Delay jitter of the RTP channel. The value range is 10 to 150 milliseconds. The default value is 20 milliseconds. Lost: Packet loss ratio of the RTP channel. The value range is (0 to 150)/1000. The default value is 50/1000. Timer: The time interval between sending RTCP packets. The value range is 5 to 20 seconds. The default value is five seconds. For example: Set the RTCP alarm thresholds as follows:
IAD2000(config)# rtcp_para alarmthreshold 2 lost 150 delay 100 jitter 100 timer 10
4.7.2 Setting Temperature Thresholds for Starting Fan and Generating Alarm
The IAD132E(T) is usually installed in areas with poor conditions such as corridors. To ensure normal operation, the internal temperature of the equipment must be controlled. An internal fan is installed in the IAD132E(T) to dissipate heat. Temperature thresholds can be set in data configuration. When the temperature exceeds the threshold, the internal fan automatically starts. If the temperature rises further and exceeds the alarm threshold, an alarm is generated. After the temperature drops below the threshold for starting the fan, the fan automatically stops operation.
4-39
Table 4-10 Commands related to RTCP alarm thresholds Operation Setting temperature threshold for starting fan and alarm temperature threshold Showing temperature threshold for starting fan and alarm temperature threshold Command temperature-limit fan temperature-value [alarm temperature-value ] show temperature-limit Global mode Mode configuration
temperature-value: Temperature value. The default value is 0 to 200. For example: Set the IAD132E(T) temperature threshold for starting the fan to 50C, and the alarm temperature threshold to 60C:
IAD2000(config)#temperature-limit fan 50 alarm 60 Start fan temperature threshold is: 50(.C) alarm temperature threshold is: 60(.C)
4-40
Note: The difference between Running status and Active status is that the patches in Running status can automatically recover to Running status after the system is rebooted, while those in Active status will become Deactive after rebooting. The Active status can be regarded as the trial running of the patch. Through the trial running you can check whether the expected functions are achieved. Only the patches passed the trial running test can be used normally.
The system provides the following commands for patching. Activating the patch: patch active Deactivating the patch: no patch active Running the patch normally: patch start Deleting the patch: patch remove Displaying the information of the patch: show patch
4.9.1 ping
ping command is used to check the status of network connection, and whether the destination host is reachable. The command is like this: ping hostip, and you can put in one or multiple parameters, as listed in Table 4-7. This command is executed in the user mode, and can be terminated by pressing <Ctrl+C>.
4-41
Table 4-11 Parameters used with the ping command Parameter -c -d -i -p -q -s -t -v Meanings Set the number of Internet Control Message Protocol (ICMP) ECHO_REQUEST packet to be sent. If it is set to 0, it means that the packets can be sent unlimited times. Set socket debugging function. Set to send the ECHO_REQUEST to the directly connected network without route selection. Set the filler octet for the sent ECHO_REQUEST packet. For example, -p 0xff means to fill the packet with 000000ff. Display only the statistics number instead of detailed information. Set the length of ECHO_REQUEST packet. Set the timeout second for ECHO_REQUEST reply. Display the received non ECHO_RESPONSE ICMP packets, by default, there is no display.
For example:
IAD2000>ping -c 100 210.11.180.18 Reply from 210.11.180.18 : byte=32 Reply from 210.11.180.18 : byte=32 Reply from 210.11.180.18 : byte=32 Reply from 210.11.180.18 : byte=32 time=2ms TTL=123 time=2ms time=2ms time=2ms TTL=123 TTL=123 TTL=123
4.9.2 tracert
tracert command is used to trace through which gateway devices a data packet passes on its way from the host to its destination. This command helps to check the network connection, and locate the fault. The command is like this: tracert hostip, and you can put in between one or multiple parameters, as listed in Table 4-8. This command is executed in the user mode, and can be terminated by pressing <Ctrl+C>. Table 4-12 Parameters used in command tracert Parameter -d -f -m Set the debugging print switch Set the minimum value of TTL Set the maximum value of TTL
4-42
Meanings
Parameter -q -w Set the number of tracert packets Set the timeout value
Meanings
The tracert process is like this: 1) 2) 3) 4) 5) A data packet with TTL as 1 is sent. An ICMP error message is returned from the first hop device (since TTL times out, the packet cannot be sent). A data packet with TTL as 2 is sent. TTL timeout message is returned from the second hop device. This process repeats until the packet is sent to the destination.
The purpose of doing so is to record the source address of each ICMP TTL timeout message, so that to obtain the route through which a data packet reaches its destination.
Maintenance terminal 1
LAN
Server
Workstation
Maintenance terminal 2
4-43
Telnet IAD132E(T) from terminal 2, execute the ping command to check the connection between IAD132E(T) and terminal 1: 1) 2) 3) Use the default parameters of ping command to ping terminal 1: No reply can be obtained for the ping command. Add a parameter c=10 in the ping command and send ten packets continuously to terminal 1 to check the packet loss rate:
IAD2000> ping -c 10 10.11.88.18
4)
Among the ten packets, only five of them get reply, and the packet loss rate is very high.
The possible reasons for this could be that the physical link between terminal 1 and IAD132E(T) is unstable, or the network is busy, or there is interference.
II. Application 2
Figure 4-2 shows the networking:
SoftSwitch
210.12.180.18/24
WAN
NMS
R
210.11.123.33/24
IAD132E(T) 210.11.22.19/24
Figure 4-2 Networking example 2 Telnet IAD132E(T), and execute the command tracert in the user mode to check the network connection between IAD132E(T) and the SoftSwitch:
IAD2000# tracert 210.12.180.18 Tracing route to 210.12.180.18 over a maximum of 30 hops: 1 2 3 1 ms 1 ms 1 ms <10 ms 2 ms 1 ms <10 ms 2 ms 1 ms 210.11.22.254 210.110.0.17 210.11.180.18
Trace complete.
4-44
From the above result, you can see which gateway devices the signal has passed through on its way from the source device IAD132E(T) to the destination SoftSwitch. This is very helpful in analyzing failures in the network.
4-45
Chapter 5 Troubleshooting
Chapter 5 Troubleshooting
This chapter first introduces common means of locating IAD faults so that you can master simple fault-locating methods. It then gives some examples on IAD faults for your reference.
SLOT 0 CVP mainboard version information PCB version : AG11CVP.2 : 303 : IAD2000V100R002B01D020
BIOS version Software version CPLD-A CPLD-B version : 100 version : 102
SLOT 1 ATI interface board version information PCB Chip version : AG11ATI.1 REV.A version : 2
SLOT 2 ASIB interface board version information PCB Chip version : AG11ASI.2 REV.A version : 19
SLOT 3 ATU interface board version information PCB Chip version : AG11ATU.1 REV.0 version : 0
5-1
Chapter 5 Troubleshooting
You can use the show if-mg attribute command to show the MG interface settings of the IAD132E(T) and check if the parameter settings are consistent with those of the MGC.
IAD2000#show if-mg attribute 0 ---------------------------------------------------------------MGID 0 Transmode UDP MGCport 2727 Protocol MGCP IADPort 2427 MGCIP/DomainName 172.21.1.1 Codetype text IADIP 172.21.100.53 DomainName iad53.com Interface state Interface normal InterfaceName aaln
------------------------------------------------------------------
-------------------------------------------------------------------2 / 2 / 2 / 2 / 2 / 2 / 2 / 2 / 2 / 2 / 0 1 2 3 4 5 6 7 8 9 FXS FXS FXS FXS FXS FXS FXS FXS FXS FXS FXS FXS FXS FXS FXS FXS Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Instant service Start service Start service Start service Start service Start service Start service Start service Start service Start service Start service Start service Start service Start service Start service Start service Start service
2 / 10 2 / 11 2 / 12 2 / 13 2 / 14 2 / 15
--------------------------------------------------------------------
5-2
Chapter 5 Troubleshooting
--------------------------------------------------
show ip route
show ip arp
length of packet sent (millisecond) 50000 code type 50000 code type 20 20 number
of bytes received 8 8 1959 number of bytes sent 256392 loopback delay (millisecond)
5-3
Chapter 5 Troubleshooting
0
jitter (millisecond) 0
The parameters displayed by this command have the following meanings: number of packets received (sent) = call duration (second) X 1000/length of packet received (sent) Code type: 0 means G.711u 4 means G.723 high 8 means G.711A 18 means G.729 20 means G.723Low Under good network conditions, jitters are usually less than 30 milliseconds (ms). After querying for multiple times, the difference between the number of packets received and that of packets sent is fixed.
Equipment startup
None.
5-4
Chapter 5 Troubleshooting
If multiple IAD132E(T) devices in the same area generate interface interruption alarms almost at the same time, the problem is usually caused by the bearer network. It is that normal each system startup is accompanied by an interface recovery alarm.
ALARM 2 recovery alarm important 0x00170105 communication category 2003-10-23 09:58:38 Alarm name: MG interface interruption recovery alarm MG interface identifier: 0
Chapter 5 Troubleshooting
Perform the following steps to troubleshoot the port error: 1) 2) Carry out the show mg ag all command on the ETG to check if the corresponding IAD has been successfully registered. Carry out the show port command on the IAD to check if the port and the corresponding subscriber phone set are normal. If they are not normal, it is usually caused by subscriber board faults. 3) If the IAD port is normal, carry out the show pstn-port command on the ETG to show the IAD port status. If the status is not normal, it is generally because the L3 address does not correspond or the subscriber data has not been configured. Different IADs may have different models and are produced by different manufacturers; therefore, their coding modes may be different. The port IDs of the IAD132E(T) starts with 0. The IP console must correspond to two user IDs, and the first port ID must be an even number.
5-6
Chapter 5 Troubleshooting
achieved through UserID. The process is as follows: Corresponding relations between UserID and L3 address are achieved through add user-v5-info-cfg; corresponding relations between UserID and IAD port ID aaln/X through table add user-endpoint-info-cfg. interface ID: Its format is aaln/X (X is an integer from 0 to 32). This parameter exists in the ETG and IAD. It corresponds to the subscriber port ID on the IAD. The port IDs of the IAD132E(T) starts with aaln/0.
5.3.2 Cause
Analysis of on-site packet capture result shows that, in the signaling delivered by the softswitch, both e:on and s:on are on. The packet is as follows: 2b: [131][14:09:15.190]Recieve From MGC:CRCX 12762 aaln/01@172.17.18.36 MGCP 1.0C: 1M: inactiveL: p:10, a:PCMA, b:64, e:on, s:onQ: loop,processR: G/ft(N),G/mt(N)S: X: 1200177206000C00 The softwitch of company S enabled echo cancellation (EC), and EC operates on the peer end; therefore, an echo is hear on the PSTN side.
5.4 When IAD Subscriber Calls Subscribers of Other Local Carriers, Their Phone Sets Can Ring, but Call Cannot be Made.
5.4.1 Fault
A carrier's networking consists of the SoftX3000 plus IAD and TMG8010. When an IAD user calls a user of other carriers, the call needs to go out through the TMG8010. In the
5-7
Chapter 5 Troubleshooting
local equipment room there are an IAD and TMG8010, which connect to the LAN Switch and router. The IAD can successfully calls a subscriber of other non-local carriers. If the subscriber calls a subscriber of other local carriers, the phone set of the callee can ring. However, when the callee hooks off, there is no tone, and neither side can communicate.
5.4.2 Cause
The call signaling flow of the IAD subscriber is IAD--SoftX3000--TMG8010other carriers. Analysis of the fault shows that the phone set of the callee can ring, which means that communication between IAD and SoftX3000 and that between TMG8010 and SoftX3000 are normal. The call flow of the IAD subscriber is IAD--TMG8010other carriers. Since calls from the IAD to a non-local TMG8010 is normal, communication between IAD and non-local TMG8010 is normal. Since calls from the IAD to other local carriers are abnormal, the problem should be that communication between IAD and local TMG8010 is abnormal. Check the IP address settings of the IAD and TMG, you can see that the IP address of the IAD is set to 10.14.96.103/26, while that of the TMG8010 is set to 10.14.96.101/29. The setting of the mask of the TMG8010 is too low, which leads to communication failures between TMG8010 and IAD.
5.5 Monolog Occurs When IAD and OPENEYE Call Each Other.
5.5.1 Fault
Monolog occurs when the IAD and OPENEYE directly call each other. The voice from the IAD side cannot be heard on the OPENEYE (SIP-based). After various models of IAD, including 101, 102 and 108, are tried, the problem remains. However, communication between IADs is normal, both IAD and OPENEYE are successfully registered, and their interaction with the softswtich is normal.
5.5.2 Cause
Since the IAD communicate with other IADs normally, IAD hardware faults can be ruled out. You can consider replacing the PC of the OPENEYE.
5-8
Chapter 5 Troubleshooting
5.6 Voice Quality Deteriorates When Photoelectric Transducer Network Port Is Set to Semi-Duplex.
5.6.1 Fault
Jitters occur in communication and voice cannot be heard clearly.
5.6.2 Cause
Since the IADs in other area are normal and several IADs in this office operate like this, it can be seen that this is a network fault.
5-9
Chapter 5 Troubleshooting
4)
Confirmation shows that mode of the photoelectric transducer is 10M semi-duplex. After it is modified to full-duplex, communication becomes normal.
5.7.2 Cause
This problem is generally caused by the following factors: on the IAD or TG, the echo cancellation parameter is disabled, the silence detection parameter is enabled, or the receiving/sending gain parameter is unreasonably set. The echo source is generally caused by the peer end. If the IAD subscriber hears the echo, you should adjust the echo cancellation and receiving/sending gain parameters on the TG/ETG. If the PSTN subscriber hears the echo, you should adjust the echo cancellation and receiving/sending gain parameters on the IAD side.
5-10
Chapter 5 Troubleshooting
5.8 Voice Is Too High or Too Low for IAD Subscribers in Conversation.
5.8.1 Fault
Voice is too high or too low for IAD subscribers.
5.8.2 Cause
Too high or too low voice is related to system gain. This problem can be solved by adjusting the sending gain of the peer end and the receiving end of the local end (including the DSP input/output gain of the voice pinch board and the receiving/sending gain of the subscriber physical port). The voice quality can be remarkably improved by adjusting the receiving/sending gain of the IAD subscriber physical port. By contrast, the voice quality can also be improved by adjusting the DSP input/output gain of the voice pinch board, but the effect is not
5-11
Chapter 5 Troubleshooting
remarkable. Adjusting the TG gain has an impact on the global office; therefore, it is not recommended.
5-12
Note: In the Command Mode column of the table, User stands for the ordinary user mode, Privilege for the previlige mode, Globe Config for the global configuration mode, MG Interface for the MG interface mode, Esl User for the narrowband mode, Equiptest for the equipment test mode, Lanswitch for the LAN Switch mode, and Lanswitch-VLAN for the LAN Switch VLAN mode. In the User Level colume of the table, Exec stands for the ordinary user, Oper for operator, Admin for the administrator, and root for the super administrator. For details, refer to Chapter 1 of this manual.
A-1
Command Function Enter the narrowband mode Exit current mode and enter the previous mode, or exit from the configuration environment Enter the Ethernet switch configuration mode Enter the monitor mode
A-2
Command Function Display host language information Display terminal type Display terminal user information Display the threshold for the terminal user exits the system for timeout Display trace module information Enable the smart interaction function Log in through Telnet connection Hold terminal Set the terminal timeout disconnection function Set terminal type-ANSI/VT100 Turn on the terminal timeout disconnection switch
Command Name show language show terminal type show terminal user show timeout show trace smart telnet terminal hold terminal timeout terminal type timeout terminal
Command Mode User User User User User User User User User User User
User Level Exec Exec Exec Exec Oper Exec Exec Exec Exec Exec Exec
A-3
Command Function Delete the IADMS configuration. Display IADMS information Show the information of Trap handshake with IADMS
A-4
Command Function Set fan temperature threshold and alarm threshold Set TOS of other media stream Set TOS for voice stream
Command Mode Global Config Global Config,MG Interface Global Config,MG Interface
A-5
Command Function Start remote packet capture function Stop remote packet capture Display MAC address maintenance port Display ARP entry Display CPU occupation ratio Display DHCP client status Display DNS configuration Display IP address configuration Display system IP address Display route configuration Display SNTP client configuration Display board version Configure synchronization interval Configure SNTP server Delete SNTP server Configure time zone Start the service of the
Command Name remote-listen no remote-listen show arp address show arp entry show cpu show dhcp show dns status show ip address show ip address show ip route config show sntp status show version sntp interval sntp server no sntp server sntp time-zone startservice
Command Mode Privilege Privilege User User User User Privilege Privilege User User Privilege User Global Config Global Config Global Config Global Config Privilege
User Level Exec Exec Exec Exec Exec Exec Oper Exec Exec Oper Oper Exec Oper Oper Oper Oper Oper
A-6
Command Function Manually switch MGC Change the attribute of a ring map Delete MG Interface Display all MG interfaces Display MG interface attribute Display interface software parameter Display system software parameter Display MG ring map attribute Shut down an MG interface Show registration key of MG interface Set registration key of MG interface
Command Name mgc switch mgringmode modify no interface mg show if-mg all: show if-mg attribute show mg interface-parameter show mg interface-parameter show attribute shutdown mg register-key show mg register-key mgringmode
Command Mode MG Interface MG Interface Global Config User User/MG Interface User User MG Interface MG Interface Global Config User
User Level Oper Oper Oper Exec Exec Exec Exec Oper Oper root root
A-7
Command Function Configure call conflict processing Configure call mode Configure the corresponding relations between FXO ports and FXS ports Clear the configuration for call mode Configure the attributes of internal number Display the setting for processing call conflict Display the configuration for call mode Display the corresponding relations between FXO ports and FXS ports Display the attributes of internal number
Command Name call-conflict call-mode fxo-fxs no call-mode inner-number show call-conflict show call-mode show fxo-fxs port show inner-number
Command Mode Global Config Global Config Global Config Global Config Global Config User User User User
User Level Oper Oper Oper Oper Oper Exec Exec Exec Exec
A-8
Command Function Display LAN Switch VLAN configuration Shut down the LAN Switch interface Set the LAN Switch interface speed Designate the LAN Switch ports into VLAN Set an uplink interface for IAD Enter the LAN Switch VLAN mode
A-9
show mgcptrace all show mgcptrace portno show mgcptrace telno trace mgcp mgallcmd trace mgcp phyport trace status
A-10
A-11
Command Function Back up the configuration file that is running currently Back up the start-up configuration file Display the backup progress Display the running configuration
Command Name backup running-config backup startup-config show progress backup show running-config
A-12
Command Function Configure billing terminal for user port Open/close billing terminal Delete a billing terminal Set parameter of billing terminal Set parameter of billing NMS Delete billing NMS Show billing terminal status Show NMS status of billing terminal Loop test of billing terminal
Command Mode Global Config Global Config Global Config Global Config Global Config Global Config User User Global Config
User Level Oper Oper Oper Oper Oper Oper Exec Exec Oper
billing-terminal index {enable| disable } no billing-terminal billing-terminal para billing-nms no billing-nms show billing-terminal show billing-nms billing-terminal loop-test
A-13
B-1
Command name clock set cls configure terminal D dhcp disable dhcp enable disable dns domain-name dns server duplex E ec set echo eid enable endservice equiptest esl user exit externlooptest F flow-control ftpserver fxo-fxs G getparam H h248stack help
Function description Set system clock Clearing the screen Entering the global configuration mode
Disable DHCP Enable DHCP Exiting the current mode and enter the user mode Configure DNS domain name Configure IP address of DNS Set LAN Switch interface duplex mode
Global Config Global Config Privilege Global Config Global Config Lanswitch
Configure echo control property Enable echo function Set equipment identifier of IAD on IADMS Entering the privilege mode End the service Enter the equipment test mode Enter the narrowband mode Exiting the current mode and entering the previous mode, or exiting from the configuration environment External line loopback test
Global Config User Global Config User Privilege Privilege Global Config Any mode Equiptest
Set LAN Switch interface flow control Set FTP server Configure corresponding relations between FXO port and FXS port
Equiptest
Exec
MG Interface User
Oper Exec
B-2
Command name help-mode history size hostname I iadms iadms handshake interval iadms handshake switch iadms register if-mg attribute infolevel cli infolevel nms infolevel syslog infolevel www infoswitch cli infoswitch nms infoswitch syslog infoswitch www inner-number interface mg ip address ip route J K L language lanswitch load packet loghost active loghost add
Function description Enable the input memory function Set the size of history command buffer Modify command line prompt
Configure IADMS Set Trap handshake interval of IAD and IADMS Set Trap handshake switch of IAD and IADMS Set IAD to register to IADMS when IAD starts Configure MG interface attribute Set the information output level for command line Set the information output level for NMS Set the information output level for log host Set the information output level for the Web NMS Set the information output switch for command line Set the information output switch for NMS Set the information output switch for Log host Set the information output switch for the Web NMS Configure internal telephone number attributes Add an MG interface (enter the MG interface mode) Configure system IP address Set static route
Global Config Global Config Global Config Global Config MG Interface Global Config Global Config Global Config Global Config Global Config Global Config Global Config Global Config Global Config Global Config Global Config Global Config
Oper Oper Oper Exec Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper
Change current language mode Enter the LAN Switch configuration mode Load packets Activate a log server configuration item Add a log server configuration item
B-3
Command name loghost delete looptest M mg backup-mgc mgc-switch mg interface-parameter mg system-parameter mg register-key mgcp mgcpstatresult clear mgringmode add mgringmode delete mgringmode modify mguser add mguser batadd mguser batdel mguser del mguser modify monitor monitor N negotiation-auto no alarm output no baudrate no billing-nms no billing-terminal no board serial no board set no call-mode no dns domain-name no dns server
Function description Delete a log server configuration item System loopback test command
Configure backup MGC Manually switch over MGC Configure interface software parameter Configure system software parameter Display MG interface registration key Set MGCP parameter Clear MGCP statistics result Add a ring map record Delete a ring map record Change the attribute of ring map Add an MG user Batch-add MG users Batch-delete MG users Delete an access user Modify an MG user Enter the monitor mode Set LAN Switch monitor interface
MG Interface MG Interface Global Config Global Config Global Config Global Config Global Config MG Interface MG Interface MG Interface Esl user Esl user Esl user Esl user Esl user Privilege Lanswitch
Oper Oper Oper Oper root Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper
Set auto-negotiation mode of LAN Switch interface Clear alarm output tag to CLI Restore serial port baudrate to default Delete billing terminal NMS Delete a billing terminal Delete board serial No. Restore default attribute of a board Clear call mode configurations Delete domain name configurations of DNS Delete address of DNS
Lanswitch Global Config Privilege Global Config Global Config Global Config Global Config Global Config Global Config Global Config
Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper
B-4
Command name no dsp prohibit no ec set no echo no flow-control no h248stack tr no help-mode no iadms no interface mg no ip route no loghost active no mg backup-mgc no monitor no priority no remote-listen no scroll no shutdown no smart no sntp server no spc release no switchport no terminal hold no terminal timeout no timeout no uplink no user apdinfo no user name no vlan O P patch active
Function description Unprohibit DSP Restore default property of echo control Disable the echo function Cancel flow control on LAN Switch port Shut down H.248 transaction reliability switch Disable the input memory function Delete the IADMS configuration. Delete MG Interface Delete a static route Deactivate a log server configuration item Delete backup MGC Cancel the setting of LAN Switch monitor interface Restore the priority of a network port to ordinary level Stop remote packet capture Enable screen manual-scroll function Open the LAN Switch port Disable the smart interaction function Delete SNTP server Initiate an SPC Delete LAN Switch port from VLAN Disable the terminal hold Disable the terminal timeout disconnection function Turn off the terminal timeout disconnection switch Cancel uplink interface settings Delete the operator appendix information Delete an operator Delete all the ports of a VLAN
Command mode Global Config Global Config User Lanswitch MG Interface User Global Config Global Config Global Config Global Config MG Interface Lanswitch Lanswitch Privilege User Lanswitch User Global Config Global Config Lanswitch-VLAN User User User Lanswitch Global Config Global Config Lanswitch
User level Oper Oper Exec Oper Oper Exec Oper Oper Oper Oper Oper Oper Oper Exec Exec Oper Exec Oper Oper Oper Exec Exec Exec Oper Oper Oper Oper
Activate a patch
Privilege
Admin
B-5
Command name patch deactive patch remove patch start ping power-range pppoe pppoe { disable | enable } priority pstnport attribute set pstnport attribute batset pstnport kc set Q R reboot regtest remote-listen reset reset rtcp_para S scroll show alarm content show alarm record show arp address show arp entry show baudrate show billing-nms show billing-terminal show board show board serial
Function description Deactivate a patch Delete a patch Initiate the running of a patch, so that it can auto-run after restart Test whether a device is reachable over the network Set voltage threshold Configure user name and password of PPPoE Enable PPPoE Set a LAN Switch port to high priority Configure PSTN port user attributes Process a batch of PSTN port user attributes Configure PSTN port KC attributes
Command mode Privilege Privilege Privilege User Global Config Global Config Global Config Lanswitch Esl user Esl user Esl user
User level Admin Admin Admin Exec Oper Oper Oper Oper Oper Oper Oper
Reboot the system Test register Start remote packet capture function Reset the gateway/board/port/MG interface Reset the LAN Switch Set RTCP threshold
Enable screen auto-scroll function Query the alarm contents Display history alarm record Display MAC address of the host maintenance port Display ARP entry Display serial port baudrate Show billing terminal NMS status Show billing terminal status Display board information Show board serial No.
User User User User User User User User User User
Exec Exec Exec Exec Exec Exec Exec Exec Exec Exec
B-6
Command name show call-conflict show call-mode show client show clock show cpu show data unsaved percent show dhcp show dns status show dsp-status show ec show enviroment show ftpserver show fxo-fxs port show h248stack show history show iadms show iadms handshake show if-mg all show if-mg attribute show infolevel cli show infolevel nms show infolevel syslog show infolevel www show infoswitch cli show infoswitch nms show infoswitch syslog show infoswitch www show interface show inner-number show ip address
Function description Query call conflict processing settings Query call mode configurations Display operator logins Display system clock Display CPU occupation ratio Display the saving progress Display DHCP client status Display DNS configuration Display system DSP information Display echo control configuration Display environmental parameters Display FTP server login information Query corresponding relations between FXO port and FXS port Display H.248 stack parameter Display history command Display IADMS information Show Trap handshake information with IADMS Display all MG interfaces Display MG interface attributes Display the information output level for CLI Display the information output level for NMS Display the information output level for log host Display the information output level for the Web NMS Display the information output switch for CLI Display the information output switch for NMS Display the information output switch for log host Display the information output switch for the Web NMS Display LAN Switch port state and attribute Query internal telephone number attributes Display system IP address
Command mode User User User User User User User Privilege User User User User User User User User User User User/MG Interface User User User User User User User User User User User
User level Exec Exec Exec Exec Exec Exec Exec Oper Exec Exec Exec Admin Exec Oper Exec Exec Exec Exec Exec Exec Exec Exec Exec Exec Exec Exec Exec Exec Exec Exec
B-7
Command name show ip route config show language show log detailed show log list show loghost list show lsw parameter show mg register-key show interface-parameter show system-parameter show mgc show mgcp para show mgcp ver show mgcpstatresult all show mgcpstatresult portno show mgcpstatresult telno show mgcptrace all show mgcptrace portno show mgcptrace telno show mgringmode attribute show mgringmode attribute show mguser show monitor-port show patch show power show port state show pppoe show progress backup show progress load show pstnport attribute mg mg
Function description Display route configuration Display language information Display detailed log Display log list Display the list of log server configuration Display global parameters of LAN Switch Display MG interface registration key Display interface software parameter Display system software parameter Show MGC Display MGCP parameter Display MGCP version Display MGCP statistics result according to telephone number Display MGCP statistics result according to telephone number Display MGCP statistics result according to telephone number Display MGCP trace information Display MGCP trace information Display MGCP trace information Display MG ringing mode mapping attributes Display ringing mode mapping attribute Display MG user information Display LAN Switch monitor interface Display CVP patch information Display voltage threshold Display MG port state Display PPPoE configurations Display the backup progress Display the loading progress Display PSTN port attributes
Command mode User User User User User User User User User MG Interface User User User User User User User User MG Interface User User/Esl user Lanswitch User Privilege user User User User Esl user
User level Oper Exec Exec Exec Exec Exec root Exec Exec Oper Exec Exec Exec Exec Exec Exec Exec Exec Oper Exec Exec Exec Exec Oper Exec Exec Exec Exec Oper
B-8
Command name show pstnport kc show rtcp_paraf show rtp stat show running-config show sntp status show spc show tag show temperature-limit show terminal timeout show terminal type show terminal user show tos show trace show user defined-ring show version show vlan shutdown shutdown smart sntp interval sntp server sntp time-zone spc add spc delete spc dsp-channel spc modify spc release speed startservice switchport system set aulaw
Function description Display PSTN port KC attributes Display RTCP threshold status Display RTP statistics Display the running configuration Display SNTP client configuration Display an SPC Display VLAN tag Display temperature threshold (Celsius) Display time limit for end users to exit system after time-out Display terminal type Display operator information Display time of service (TOS) configuration Display trace module information Display user-defined ringing mode Display board version Display LAN Switch VLAN configuration Shut down an MG interface Shut down the LAN Switch interface Enable the smart interaction function Configure synchronization interval Configure SNTP server Configure time zone Add an SPC Delete an SPC Set DSP channel attributes Modify an SPC Release an SPC Set the LAN Switch interface speed Start the service Designate the LAN Switch ports into VLAN Set DSP A/ law
Command mode Esl user User User Privilege Privilege User User User User User User User User User User User MG Interface Lanswitch User Global Config Global Config Global Config Global Config Global Config Global Config Global Config Global Config Lanswitch Privilege Lanswitch-VLAN Global Config
User level Oper Exec Exec Oper Oper Exec Exec Exec Exec Exec Exec Exec Oper Exec Exec Exec Oper Oper Exec Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper Oper
B-9
Command name sysselftest T tag disable tag enable tag vlanid telnet temperature-limit terminal hold terminal timeout terminal type test timeout tos other tos voice trace mgcp mgallcmd trace mgcp phyport trace status tracert U uplink user apdinfo user defined-ring modify user disconnect user level user name user password user reenter V vlan
Disable the VLAN tag Enable the VLAN tag Set VLAN tag Log in through Telnet connection Set fan temperature threshold and alarm threshold Hold terminal Set the terminal timeout disconnection function Set terminal type-ANSI/VT100 Test ASI board power supply, clock, serial port and fan Turn on the terminal timeout disconnection switch Set TOS of other media stream Set TOS for voice stream Trace all MGCP messages Trace MGCP messages of designated ports Set MGCP tracing status Trace the route to the destination
Global Config Global Config Global Config User Global Config User User User Equiptest User Global Config,MG Interface Global Config,MG Interface Privilege Privilege Privilege User
Oper Oper Oper Exec Oper Exec Exec Exec Exec Exec Oper Oper Oper Oper Oper Exec
Set uplink network port of IAD Modify the operator appendix information Modify user-defined ringing mode Disconnect a terminal operator Change the operator level Change the operator name Change the operator password Modify the operator reenter attempts number
Lanswitch Global Config Global Config Privilege Global Config Global Config Global Config Global Config
Lanswitch
Oper
B-10
Function description
Command mode
User level
Privilege
Oper
Note: In the Command mode colum, User refers to the user EXEC mode, Privilege to the privileged EXEC mode, Globe Config to the global configuraiton mode, MG Interface to the MG interface mode, Esl User to the narrowband mode, Equiptest to the equipment test mode, Lanswitch to the Lanswitch mode, and Lanswitch-VLAN to the Lanswitch VLAN mode. In the User level, Exec refers to the user EXEC mode, Oper to the operator, Admin to the administrator, and root to the super administrator. For details, refer to Chapter 1 Introduction to Command Line in this manual.
B-11
IAD132E(T) interface name (interface-name) IAD132E(T) access user port number (terminalid) No configuration is needed, and the mode configured on SoftSwitch is taken.
Note: Refer to Chapter 2 for details about the parameters configured on IAD132E(T).
C-1
D-1
Acronym MGCP NGN NMS PSTN RTP RTCP SCTP SNMP SNTP SPC TCP TFTP UDP VDU VDSL VLAN
Full Spelling Media Gateway Control Protocol Next Generation Network Network Management Station Public Switched Telephone Network Real-time Transport Protocol Real-time Transport Control Protocol Simple control transmission protocol; Simple Network Management Protocol Simple Network Time Protocol Semi-Permanent Connection Transfer Control Protocol; Trivial File Transfer Protocol User Datagram Protocol Very high rate DSL Interface Unit Very High Speed DSL Virtual Local Area Network
D-2