Professional Documents
Culture Documents
August 2013
Hardware Release: R2 and R3
Software Release: i7.1
Document Revision A
Notice
This document contains information that is proprietary to Ceragon Networks Ltd. No part of this
publication may be reproduced, modified, or distributed without prior written authorization of
Ceragon Networks Ltd. This document is provided as is, without warranty of any kind.
Trademarks
Ceragon Networks, FibeAir and CeraView are trademarks of Ceragon Networks Ltd.,
registered in the United States and other countries.
Ceragon is a trademark of Ceragon Networks Ltd., registered in various countries.
CeraMap, PolyView, EncryptAir, ConfigAir, CeraMon, EtherAir, CeraBuild, CeraWeb,
and QuickAir, are trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice. Ceragon
Networks Ltd. shall not be liable for errors contained herein or for incidental or consequential
damage in connection with the furnishing, performance, or use of this document or equipment
supplied with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer could
void the users authority to operate the equipment and the warranty for such equipment.
Revision History
Rev Date Author Description Approved by Date
A July 31, 2013 Stanislav Elenkrich, Initial version for software Eran Shecter July 31, 2013
Jeffrey Fefer release i7.1
Table of Contents
1. Introduction ...................................................................................................... 5
1.1 IP-10G and IP-10E introduction ..................................................................................... 6
1.2 About this document ...................................................................................................... 7
1.3 New features and enhancements in version 7.1 ............................................................ 8
1.4 Hardware compatibility ................................................................................................... 8
1.5 Acronyms ....................................................................................................................... 9
1. Introduction
This New Software Version (NSV) release introduces release 7.1 of the IP-10
Series, Ceragon's High Capacity Wireless Network Solution for IP networks.
Please note that most of the material in this Features Description is also
available in the following documents:
FibeAir IP-10G and IP-10E User Guide, DOC-00034612
FibeAir IP-10G Product Description
FibeAir IP-10E Product Description
1.5 Acronyms
ABR Adaptive Bandwidth Recovery
ACM Adaptive Coding and Modulation
ACR Adaptive Clock Recovery
AES Advanced Encryption Standard
AIS Alarm Indication Signal
ATPC Automatic Tx Power Control
BBS Baseband Switching
BER Bit Error Ratio
BLSR Bidirectional Line Switch Ring
BPDU Bridge Protocol Data Units
BWA Broadband Wireless Access
CA Certificate Authority
CBS Committed Burst Size
CCDP Co-channel dual polarization
CFM Connectivity Fault Management
CIR Committed Information Rate
CLI Command Line Interface
CN Customer Network (Port)
CoS Class of Service
DA Destination Address
DSCP Differentiated Service Code Point
DST Daylight Saving Time
EBS Excess Burst Size
EFM Ethernet in the First Mile (Protocol)
EIR Excess Information Rate
EOW Engineering Order Wire
FD Frequency Diversity
FE Fast Ethernet
FTP (SFTP) File Transfer Protocol (Secured File Transfer Protocol)
GbE Gigabit Ethernet
GMT Greenwich mean time
HSB Hot-standby
Each nodal enclosure includes a backplane. The rear panel of an IP-10G or IP-
10E IDU includes an extra connector for connection to the backplane. The
following interfaces are implemented through the backplane:
TDM Cross-Connect (IP-10G only)
Multi-Radio
Protection
XPIC
IDUs are hot-swappable, and additional extension nodal enclosures and IDUs
can be added in the field as required, without affecting traffic.
IDUs in a nodal configuration are each assigned a slot ID indicating their
position: slot 1 is the lowest IDU and 6 is the highest.
In each nodal enclosure, IDUs may assume two different roles:
Main IDU: Centralizes management access to the system, and provides the
switching fabric for TDM trails. Unit number 1 (the lowest unit in a shelf)
is always a main unit. Unit number 2 is a main unit if configured as
protected 1+1 (in which case it protects IDU#1); otherwise it is an
extension unit.
Extension IDU: Provides radio and line interfaces for TDM trails. It is
accessed through the main unit.
A local craft terminal (CLI) is available in each IDU individually. However, with
the exception of the main unit, functionality is limited to local configurations.
Access to all other units is provided via the main units CLI. For remote
channels (WEB, telnet, NMS) this requires IP traffic to be directed to the main
unit.
This is not carried out by the internal network, and therefore Ethernet cables
must connect traffic from the extension units to the main unit. Use of each
channel is described below.
The IP address of the shelf is the address of the main unit in the shelf. For 1+1
units, the shelf will have two IP addresses (the addresses of each of the main
units) and the shelf should be managed via the active unit.
2.5 Licensing
The following licenses are available for an IP-10G or IP-10E system:
Capacity license: Limits the total amount of radio capacity available. This
limit applies for the sum of Ethernet and TDM traffic bandwidth. This
alarm is enforced by limiting the bandwidth of the radio script that can be
loaded. This license applies only if the TDM-only license (see below) is
disabled.
TDM-only license: Limits the number of TDM trails that can be mapped to
a radio. Enables minimal Ethernet traffic for network management only. If
this license is enabled, any radio script can be loaded, but the number of
trails is limited. This license is not relevant for the IP-10E.
Ethernet switch license: Enables the use of Managed switch and Metro
switch Ethernet applications.
ACM license: Enables the use of dynamic ACM radio scripts.
Synchronization unit license: Enables configuration of an external
source as a clock source for synchronous Ethernet output (provided that
the IDUs hardware supports synchronization). If this license is not
installed, the Ethernet clock source can only be a local (internal) clock.
Network resiliency license: Enables the following features for improving
network resiliency:
xSTP If Ring-Optimized RSTP or legacy RSTP is required, an L2
Switch license must also be purchased.
TDM trails protection (SNCP)
Only one Network Resiliency license is required for an east-west
configuration.
Note: For systems in which these features were enabled in
previous versions, the features will continue to be available
even if no resiliency alarm is purchased.
Asymmetrical scripts license: Enables loading and operating
asymmetrical radio scripts for links with asymmetrical upload/download
bandwidth.
Note: When using an asymmetrical script, the capacity license
only applies to the transmit rate.
Enhanced QoS: Enables the Enhanced QoS feature, which includes a larger
selection of classification criteria, color-awareness, up to 255 MEF 10.2-
compliant TrTCM policers that offer per service (VLAN+CoS) granularity,
WRED for improved congestion management, eight priority queues with
configurable buffer length, improved congestion management using WRED
protocols, enhanced counters, and other enhanced functionality.
A license is required per radio.
Enhanced Compression License: Enables the activation and operation of
Multi-Layer Header Compression.
Per-usage license: Enables unlimited usage of all features in the system,
and generates reports of current usage, used for usage-based billing. In
addition, the system will warn users when a chargeable feature is enabled.
Ceragon Proprietary and Confidential Page 17 of 190
FibeAir IP-10G and IP-10E Feature Description for i7.1
You can configure the system not to raise an alarm in case of under-voltage for
either power input. If the alarm is not disabled, a permanent alarm will exist
for a power input that is not in use.
To disable a power supply alarm:
1 In the Web EMS, select Configuration > General > Dual Power Supply.
The Dual Power Supply page opens.
3. Feature description
This section includes a review of all features that can be configured in the
system.
Both units must use the same Ethernet switching application (Smart Pipe,
Managed Switch, or Metro Switch)
Both units must use the same management type Out-of-Band or In-Band).
If this is not the case, the system raises a mate communication error alarm.
If the IDUs are using In-Band management, both IDUs must have the same
In-Band VLAN.
If the IDUs are using In-Band management, the In-Band VLAN must NOT
be used for traffic.
Different IP addresses (within the same subnet) should be configured for
both units.
Both IDUs must be set to 1+1 HSB.
Note that if the user wants to change the management type or the In-Band
VLAN in an existing 1+1 configuration, the change should first be made in the
standby IDU, then in the active IDU. If the change is made first in the active
IDU, this will cause communications to be lost.
These conditions are the minimum requirement for proper communications
to be established between the active and the standby units. However, a
configuration mismatch may occur even if these conditions exist. This will not
cause communications to be lost, but to ensure proper operation in the event
of a protection switch, the user should make sure the configuration is identical
at all times. See Copy-to-Mate on page 30.
e. If you are using Metro Switch, set its Ether Type to the same value
as the Active units Ether Type. Possible values are: 0x88a8,
0x8100, 0x9100 and 0x9200.
10. Configure the Standby IDU to the same Management Type as the
Active IDU (Out-of-Band or In-Band). If you use In-Band management,
configure a management VLAN ID (CQ20084). Connect a Protection
cable from the Protection interface of the Active IDU to the Protection
interface of the Standby IDU.
11. For the Standby IDU, set Protection Admin to: 1+1 HSB. At this
point, both IDUs should start communicating, transmitting their local
MAC address and IP address to each other.
12. To verify communication between the two IDUs, check on both IDUs
that there is no Mate Communication Failure alarm. If this alarm is
active on either IDU, installation of 1+1 HSB Protection has failed.
Disconnect the management cable from the new standby unit.
13. Use a Y Ethernet splitter cable or the Protection Panel to connect
both units management interfaces.
14. Verify that the new Standby IDU is set to Standby mode.
15. Connect all traffic, RFU and WSC cables to the new Standby IDU.
16. Check if there is a Configuration Mismatch alarm on either IDU. This
alarm indicates that the IDUs do not have an identical configuration.
To remedy this:
a. Enter a Copy to Mate command on the Active IDU. This copies the
configuration of the Active IDU to the Standby IDU.
b. Perform a Cold Reset on the Standby IDU. When the Standby IDU
comes back online, its configuration should be identical to that of
the Active IDU, and the Configuration Mismatch alarm should be
cleared on both IDUs.
17. Verify that there are no alarms on either IDU.
18. For the Active IDU, set Protection Lockout to: Off.
Scenario 3: Configuring 1+1 HSB Protection in a New Nodal System
1. Disconnect all cables from units (radio, traffic, wayside, and
protection), except for management cable.
2. Turn on the active IDU.
3. Connect a management cable to the management interface of the
Active IDU, or via terminal configure the IDU.
4. Perform the following configuration steps on the Active IDU:
a. Install the license (if necessary).
b. Upgrade the software (if necessary).
c. Configure radio related parameters: radio parameters, radio script,
etc.
d. Set security configurations: add users, SNMPv3, HTTPS, etc.
Copy-to-Mate
In order to synchronize the configurations of both local and mate units, a
"copy-to-mate" command must be issued by the user on the Active unit. The
copy-to-mate command is required whenever a "Configuration Mismatch"
alarm is raised.
When issuing a copy-to-mate command on the Active unit, all configuration
data and files are copied from the Active (local) unit to the Standby (mate)
unit, and a cold-reset is automatically performed on the Standby unit.
Once the configuration of the units has been synchronized, all radio
parameters are automatically copied from the Active unit to the Standby unit
upon any user configuration.
If the configuration is set via CLI, a write command must be used in order to
save the new configuration to the disk. Only if the configuration is saved can it
be copied to the mate IDU.
In the CLI, adding the argument showDiff to the copy-to-mate command
displays extra details about the progress of the process.
Mismatch Mechanism
This mechanism is responsible for detecting if there is a mismatch between
the configurations of the local and mate units. This mechanism is activated by
the system periodically and independently of other protection mechanisms, at
fixed intervals. It is activated asynchronously in both the Active and the
Standby units. Once the mismatch mechanism detects a configuration
mismatch, it raises a "Mate Configuration Mismatch" alarm. Once the Active
and Standby configurations are identical, the mechanism clears the "Mate
Configuration Mismatch" alarm.
In order to determine which parameters do not match between the units, the
user can use the CLI to query the details of the mismatch using the cfg-
mismatch-details command.
If the configuration is adjusting using the CLI, the user must enter a "write"
command in order to save the new configuration to the disk. The mismatch
mechanism only checks mismatches that have been saved to configuration
files.
The mismatch mechanism does not display the specific parameters that
caused the mismatch.
Note: It is important to enter a copy-to-mate command
whenever a "Mate Configuration Mismatch" alarm has been
raised, and to avoid configuring specific parameters in
attempting to clear this alarm.
external protection
interface
TDM
SLAVE
2+0
pair
(whole pair is active
or stand-by)
Switching
f1 modem matrix
V-Pol
TDM
MASTER Ethernet
Shelf 2
Switching
modem matrix
f2 TDM
H-Pol
Units exchanging SLAVE
protection data 2+0
(one is decision, one is pair
report) (whole pair is active
or stand-by)
Switching
f2 matrix
modem
V-Pol
TDM
MASTER
Ethernet
5. Insert the new Standby Master unit into Slot 1 of the Standby nodal
enclosure.
6. Turn on the power on the new Standby Master unit.
7. Connect the protection cable between the active master and the standby
master units.
8. For the new Standby Master unit, set Protection Admin to: 2+2 HSB.
9. On the Master unit, perform a Copy to Mate operation to ensure that both
IDUs remain synchronized.
10. Connect the RFU to the relevant Ethernet and PDH/SDH Y-cables/fibers.
Ethernet port 2
Ethernet port 1 (mirroring)
active
Ethernet port 2
Ethernet port 1 (mirroring)
Scenario Reaction
Failure in port1 in active Initiate protection switchover.
Failure in port1 in standby LAG protocol on the external switch recognizes the port
failure and uses the second LAG port (the one that is
connected to the active IP-10 unit). No protection switchover
is initiated.
Failure in the mirroring port Standby unit shuts down port1 to indicate failure to the
external switch. After resolving the failure, the standby unit
reopens port1 automatically. No protection switchover is
initiated.
coupler coupler
B -6d
-6d B
primary primary
secondary secondary
User Configuration Optical (SFP) GbE port Electrical GbE port Radio Port functionality
functionality - Single Pipe mode (10/100/1000) Managed/Metro
functionality - Single Switch mode
Pipe mode
Automatic State No mute is issued. No shutdown.
Propagation disabled.
Local LOF, Link-ID mismatch Mute the LOCAL port when one or Shut down the LOCAL port when one or more of the
(always enabled) more of the following events occurs: following events occurs:
1. Radio-LOF on the LOCAL unit. 1. Radio-LOF on the LOCAL unit.
2. Link ID mismatch on the LOCAL 2. Link ID mismatch on the LOCAL unit.
unit.
User Configuration Optical (SFP) GbE port Electrical GbE port Radio Port functionality
functionality - Single Pipe mode (10/100/1000) Managed/Metro
functionality - Single Switch mode
Pipe mode
Ethernet shutdown threshold Mute the LOCAL port when ACM Rx Shut down the LOCAL port when ACM Rx profile degrades
profile. profile degrades below a pre- below a pre-configured profile on the LOCAL unit.
configured profile on the LOCAL unit This capability is applicable only when ACM is enabled.
Local Excessive BER Mute the LOCAL port when an Shut down the LOCAL port when an Excessive BER alarm
Excessive BER alarm is raised on the is raised on the LOCAL unit
LOCAL unit
Local LOC Mute the LOCAL port when a GbE- No shutdown. N/A
LOC alarm is raised on the LOCAL Note1: Electrical-GbE
unit. cannot be muted. Electrical-
GbE LOC will not trigger
Shutdown, because it will not
be possible to enable the
port when the LOC alarm is
cleared
Remote Fault Mute the LOCAL port when one or Shut down the LOCAL port, Shut down the LOCAL port,
more of the following events is raised when one or more of the when one or more of the
on the REMOTE unit: following events is raised on following events is raised on
1. Radio-LOF (on remote). the REMOTE unit: the REMOTE unit:
2. Link-ID mismatch (on remote). 1. Radio-LOF (on remote). 1. Radio-LOF (on remote).
3. GbE-LOC alarm is raised (on 2. Link-ID mismatch (on 2. Link-ID mismatch (on
remote). remote). remote).
4. ACM Rx profile crossing threshold 3. ACM Rx profile crossing 3. ACM Rx profile crossing
(on remote), only if enabled on the threshold (on remote), only threshold (on remote), only
LOCAL. if enabled on the LOCAL. if enabled on the LOCAL.
5. Excessive BER (on remote), only 4. Excessive BER (on 4. Excessive BER (on
if enabled on the LOCAL. remote), only if enabled on remote), only if enabled on
the LOCAL. the LOCAL.
Note1: Electrical-GbE
cannot be muted. Electrical-
GbE LOC will not trigger
"Shut-down", because it will
not be possible to enable the
port when LOC alarm is
cleared
5 Policers
Shaper
Classifier (Ingress Queue
Marker Scheduler (Egress rate
(4 Queues) Rate Controller
limiting)
Limiting)
Note: The class map should have a unique name. Each class map
must have a unique name, even if the class maps belong to
different policers (CQ18150).
When a policer has been configured, it can be attached to a port:
1. From the navigation tree in the Web-Based EMS, select Configuration >
Ethernet Switch > QoS & Rate Limiting.
2. Press [+] to expand the port for rate limiting.
3. Under Ingress rate limit, set the policer name, and click Apply. If the
operation succeeds, the policer is attached to the port.
To detach a policer, click Detach.
When enhanced QoS is enabled, radio port egress traffic scheduling and
shaping are performed in the enhanced QoS module. Thus, the egress shaper
and scheduler on the radio port are degenerated in switch configuration:
The egress shaper must be disabled in the switch. Instead, egress shapers
per priority queue are available in the enhanced QoS module.
The egress scheduler in the switch is degenerated to all queues strict
mode. Instead, an enhanced scheduler based on the WFQ algorithm is
used in the enhanced QoS module. This configuration changes performed
automatically upon activating enhanced QoS.
Note: Enabling enhanced QoS will affect the traffic on the radio port.
CoS is a 3-bit value in range 0-7 that will be used for classification to priority
queues.
Color is a 1-bit value (Green/Yellow). Color will be used for Policing while
Green color stands for CIR and Yellow color stands for EIR.
Classification to CoS and Color can be based on the following criterions:
1st hierarchy: Based on destination MAC address or source/destination
UDP ports. The first classification hierarchy is used to identify and give
priority to network protocols. Layer2 protocols e.g. Spanning Tree or Slow
protocols can be classified based on a pre-defined destination MAC
address they use. Higher layers protocols e.g. NTP can be identified based
on UDP ports.
2nd hierarchy: Based on VLAN ID. The second hierarchy is used to classify
frames based on network services. Each service is assigned to a different
VLAN (as described later). Frames can be also prioritized based on in-band
management VLAN ID.
3rd hierarchy: Based on Priority bits. Possible options are VLAN 802.1p p-
bits, IP DSCP/TOS and/or MPLS experimental bits.
The classification is done in the listed order of cardinality. The classifier will
check the 1st hierarchy for a match, then 2nd hierarchy and eventually 3rd
hierarchy until a match found.
2. Each frame is assigned to a Service ID.
Note: Classification to Services is supported only on R3 hardware assemblies.
Classification to Services is based on a VLAN Id. Service ID will be used for
Policing and for classification to CoS. Each policer is monitored by statistics
counters.
3. Each CoS is mapped to one of the 8 available priority queues.
All the classification criteria are divided into three hierarchies according to
their cardinality from the most specific to the most general.
4. Each priority queue is given a priority.
Priorities vary from the highest 4th to the lowest 1st. Scheduling mechanism
will treat the priorities as strict. WFQ scheduling is done between the queues
of the same priority. For information on scheduling operation refer to
Enhanced QoS egress scheduling section.
congestion occurs). In this way, the overall aggregated load on the radio link
remains stable while the transmission rate of each individual flow continues
to fluctuate similarly. The following figure demonstrates the transmission rate
of two TCP flows and the aggregated load over time when WRED is enabled.
Each one of the 8 priority queues can be given a different weight. For each
queue, the user defines the WRED profile curve. This curve describes the
probability of randomly dropping frames as a function of queue occupancy.
Basically, as the queue occupancy grows, the probability of dropping each
incoming frame increases as well. As a consequence, statistically more TCP
flows will be restrained before traffic congestion occurs.
For each one of the priority queues, the WRED profile curve can be adjusted.
Yellow and Green frames can also be assigned different weights. Usually,
Green frames (committed rate) are preferred over Yellow frames (excessive
rate), as shown in the curve below.
Note: WRED can also be set to a tail drop curve. A tail drop curve
is useful for reducing the effective queue size, such as when
low latency must be guaranteed. In order to set the tail drop
curve to its maximum level, the drop percentage must be set
to zero.
CIR1 = 50Mbps
EIR1 = 100Mbps
Queue 1
Service 1 (Cos=0)
Priority = 1
CIR2 = 20Mbps
EIR2 = 30Mbps
Service 2 (CoS=1) Yellow WRED Green WRED
threshold = threshold =
20Kbits 450Kbits
CIR3 = 10Mbps
EIR3 = 100Mbps
Queue 8
Service 3 (CoS=7)
Priority = 4
CIR1 = 50Mbps
EIR1 = 100Mbps
Queue 1
Service 1 (Cos=0)
Priority = 1
WFQ = 7
CIR2 = 20Mbps
EIR2 = 30Mbps
Service 2 (CoS=1) Yellow WRED Green WRED
threshold = threshold =
20Kbits 450Kbits
CIR3 = 10Mbps
EIR3 = 100Mbps
Queue 8
The priorities are the same for all queues. WFQ weights are configured such
that the weights ratio is the ratio between CIR in each queue.
Queue1 has total CIR_q1=CIR1+CIR2 = 70Mbps.
Queue8 has total CIR_q8=CIR3 = 10Mbps
The ratio CIR_q1/CIR_q8 = WFQ_q1/WFQ_q8
When the total ingress traffic capacity is below the radio capacity, there is no
congestion and all the traffic passes. Whenever congestion occurs, both
queues will feel stress since they are at the same priority. Under congestion
conditions Yellow (EIR) frames will be disposed by the WRED mechanism. All
the available bandwidth will be allocated for the sake of the Green frames
(CIR).
If the total radio bandwidth is equal to 80Mbps, under congestion conditions it
will be divided according to WFQ weights: 70Mbps for Queue1 and 10Mbps
for Queue8 exactly as the defined CIR.
If the total radio capacity is 100Mbps, it is recommended to set the WFQ
weights as WFQ_q1 = 14 , WFQ_q8 = 4. Such a weights will guarantee under
congestion conditions 28.5Mbps to queue8 and 71.5Mbps to queue1. Each
queue gets its guaranteed CIR and the residual bandwidth goes to the high
priority queue.
When enabled, Frame Cut-Through applies to all high priority frames, i.e., all
frames that were classified to a CoS queue with 4th (highest) priority.
3 Verify that the Enhanced Traffic Manager admin field is set to Enabled.
4 In the Cut through admin field, select Enable to enable Frame Cut-
Through.
5 Click Apply.
The maximum frame length is 1632 bytes for all Ethernet traffic interfaces.
The WSC interface is limited to 1628 bytes.
Part Manufacturer
Number Item Description Name Manufacturer PN
AO-0049-0 XCVR,SFP,850nm,1.25Gb,MM,500M,W.DDM PHOTON PST120-51TP+
Wuhan Telecom.
AO-0049-0 XCVR,SFP,850nm,1.25Gb,MM,500M,W.DDM Devices (WTD) RTXM191-551
AO-0049-0 XCVR,SFP,850nm,1.25Gb,MM,500M,W.DDM CORETEK (*) CT-1250NSP-SB1L
AO-0049-0 XCVR,SFP,850nm,1.25Gb,MM,500M,W.DDM Fiberxon FTM-8012C-SLG
Part Manufacturer
Number Item Description Name Manufacturer PN
Wuhan Telecom.
AO-0037-0 XCVR,SFP,1310nm,1.25Gb,SM,10km Devices (WTD) RTXM191-401
AO-0037-0 XCVR,SFP,1310nm,1.25Gb,SM,10km CORETEK (*) CT-1250TSP-MB4L-A
AO-0037-0 XCVR,SFP,1310nm,1.25Gb,SM,10km Fiberxon FTM-3012C-SLG
AO-0037-0 XCVR,SFP,1310nm,1.25Gb,SM,10km AGILENT AFCT-5710PZ
* Electrically, these SFP modules work properly but they tend to get
mechanically stuck in the IP-10 cage.
Part
Number Item Description Manufacturer Name Manufacturer PN
ao-0072-0 XCVR,SFP S1.1 Wuhan Telecom. Devices (WTD) wtd-rtxm139-400
Counter Description
Undersize frames received Frames shorter than 64 bytes
Oversize frames received Frames longer than 1632 bytes
Jabber frames received Total frames received with a length of more than 1632 bytes, but with an
invalid FCS
Fragments frames received Total frames received with a length of less than 64 bytes, and an invalid FCS
Rx error frames received Total frames received with Phy-error
FCS frames received Total frames received with CRC error, not counted in "Fragments", "Jabber" or
"Rx error" counters
In Discard Frames Counts good frames that cannot be forwarded due to lack of buffer memory
In Filtered Frames Counts good frames that were filtered due to egress switch VLAN policy rules
Pause frames received Number of flow-control pause frames received
QoS can be used with Managed Switch. All Ethernet ports can be used for
traffic.
The aging time used by the MAC learning table can also be configured.
QoS can be used with Metro Switch. All Ethernet ports can be used for traffic.
Users can choose the Ethertype used to recognize S the-VLAN tag. Options are:
88A8
8100
9100
9200
The aging time used by the MAC learning table can also be configured.
Note: Single pipe is the default mode, and does not require a
license. Managed Switch and Metro Switch do require a
license.
Since some of the functionality is visible to users at the IDU level, the relevant
functionality is summarized as follows:
Each Ethernet traffic port has a service type configuration. This does not
affect the functionality of the traffic, but the correct configuration is
necessary at the element level in order for PolyView to configure the
services.
There are two possible values:
SAP (service access point) The port is the end-point of one or more
services.
SNP (service network point) The port is an intermediate port for one
or more services
This parameter is not relevant in Smart Pipe mode.
Every VLAN may be assigned to a service. Two parameters are added to
each VLAN:
evc-id
Syntax: string
Default: evcX where X is the VLAN number
This string must be unique (different string for each VLAN).
evc-description
Syntax: string
Default: evcX where X is the VLAN number
Events are raised and SNMP traps are sent every time a port changes its
STP role or state to any other role or state.
The event will contain the following text:
STP event - on port: <port>, root id: <root id>, Bridge role: <bridge
role>, Role: <Role>, State: <state>
A new command is available in order to configure a "bulk" of continuous
VLANs, instead of configuring the VLANs one by one.
Domain
Level
Customer Level 7 +
Provider Level
0 -
Customer Level MEP Provider Level MEP
MEP ID & Remote MEP IDs must be unique. A MEP ID should NOT be
reused for Remote MEP IDs on the same (specific) MAID.
CFM works according to the outer VLAN. In Managed Switch mode, the service
is identified by the 802.1Q VLAN, while in Metro Switch (Provider Bridge)
mode, the service is recognized only by the outer S-tag, which might
encapsulate an inner C-tag (CQ19849). This is illustrated in the following
example
Managed Switch 1 Metro Switch Metro Switch Managed Switch
C-tagged Radio
LTM
Access Trunk CN 2 PN PN CN Trunk Access
Discard
Untagged Stripping C-tag
4 untagged
LTR
LTR
3
The example above assumes that a switch (802.1Q bridge) trunk port is
connected to a Metro Switch CN port. MEP is defined on the leftmost access
port, and MIP, with the same level, is defined on the leftmost CN port. When an
LTM (Link-trace message) egresses the leftmost trunk port, it is tagged (step
1). This LTM ingresses the leftmost CN port, and reaches the CPU. The CPU
strips its VLAN (step 2), and generates an LTR (Link-trace Response) message
back to the CN port.
This LTR message does not carry any VLAN (step 3). Now when it ingresses
the leftmost trunk port, it is discarded (step 4). This example demonstrates
that a MIP issued on the CN port does not reply to LTM. In such scenarios, MIP
should be avoided on a CN port. CN ports are part of a provider domain. Thus,
MIP or MEP on these ports are part of the provider OAM domain, and should
be defined as such (CQ20006 / CQ20037).
Automatic link-trace timer is a trigger for an automatic link-trace process that
might take longer than the value to which the timer is configured, due to the
number of remote MEPs (each link-trace process takes around 12 seconds).
When automatic link-trace timer is set to a new value, the new cycle period
will take place only after the current cycle period is terminated
The maximum number of MEPs guaranteed to provide reliable indications is
50 per IDU.
Node Type B
Using two IP-10 IDUs, this node is connected to radios in both directions of the
ring (East and West). Each IDU supports the radio in one direction.
In this topology, Ring RSTP is enabled in one IDU. The other IDU operates in
Smart Pipe mode.
The IDUs are connected to each other using one of their Gigabit interfaces
(either optical or electrical). Other line interfaces are in Edge mode.
Note: If the IDU in Managed Switch mode loses power, its mate in
Smart Pipe mode will lose management access. As a result,
the entire node will lose management access. However, if
the IDU in Smart Pipe mode loses power, its mate in
Managed Switch mode will retain management access.
Radio
Radio
Network
Management WSC Mng Mng
Eth1 Eth2 Eth3 Eth4 Eth5 Eth6 Eth7 Eth8
Out-of-Band Management
Out-of-band management uses the Wayside Channel (WSC) for management
access to the IDUs in the network. An external switch using some form of STP
should be used in order to obtain resilient management access and resolve
management loops.
When out-of-band management is used, all IDUs must be configured to:
Out-of-Band
WSC Enabled
The following figure illustrates a ring with four nodes using out-of-band
management:
Resilient Out-of-Band
WSC Mng Mng
ring management Eth1 Eth2 Eth3 Eth4 Eth5 Eth6 Eth7 Eth8
Managed Switch
Radio
xSTP External
Switch, resolving
management loops. Radio
Network
Management Managed Switch
Single Pipe
4.2.11.7 Installation
This section describes two installation scenarios:
Scenario 1: Configuring Ring-Optimized RSTP from scratch.
Scenario 2: Replacing an IDU in a ring that uses Ring-Optimized RSTP.
Installation Scenario1: Node with no STP
1. Disconnect all Ethernet cables from the relevant IDU (except local management
if needed).
2. Insert the new IDU into its slot, and turn it ON.
3. Install licenses for L2 Switch and Network Resiliency in the IDU..
4. Configure the IDU, as explained in Ring RSTP configuration on page 76.
5. Connect one arm of the ring to the node (the radio for example, without a line).
6. Make sure the node understands its role in the network.
7. Connect the second arm of the ring. At this point, the ring should be re-
converged, and the alternate port should appear again.
8. Make sure the ring is converged properly, and all nodes are accessible.
Scenario2: Replacing an IDU in an RSTP ring
1. Identify the port in the network that is now shut down due to ring failure.
2. Identify whether the IDU that should be replaced is or is not a root.
3. Turn OFF the IDU with the port that is shut down.
4. Disconnect all Ethernet cables from the IDU that is to be replaced.
5. Remove the IDU.
6. Insert the new IDU into its slot, and turn it ON. Do not connect Ethernet cables to
new units (except local management if needed).
7. Install licenses for L2 Switch and Network Resiliency in the new unit.
8. Configure the new IDU according to the configuration of the previous IDU. It is
recommended to download a backup configuration.
If the IDU was not root, it is recommended to configure its Bridge Priority
to a higher value than the current root, to ensure that the new IDU will not
be root.
If the IDU was root, it is recommended to configure its Bridge Priority to a
lower value than the new root, to ensure that it will become root.
If the IDU was operating in Smart Pipe mode, its configuration is not
relevant for RSTP.
9. Connect one arm of the ring to the node (radio for example, without a line).
10. Make sure the node understands its role in the network.
11. Connect the second arm of the ring. At this point the ring should be re-
converged, and the alternate port should appear again.
12. Make sure the ring is converged properly, and all nodes are accessible.
In PN ports:
Spanning Tree type Destination Address Ingress Action
Bridge Group Address 01-80-C2-00-00-00 Add S-Vlan tag and multicast it to
all the ports
Provider Bridge Group Address 01-80-C2-00-00-08 Perform fast ring RSTP
CISCO PVST 01-00-0C-CC-CC-CD Add S-Vlan tag and multicast it to
all the ports
Sync Source
Radio Link
IP-10G Node
Ethernet Interface Signal Clock = Reference
IP-10G Node
Signal Clock = Reference Signal Clock = Reference
Sync Source
Radio Link
IP-10E Node
Ethernet Interface Signal Clock = Reference
Sync Source
IP-10E Node
Signal Clock = Reference Signal Clock = Reference
As a reference, the following are the possible quality values (from highest to
lowest):
In E1 systems:
AUTOMATIC (available only in interfaces for which SSM support is
implemented)
G.811
SSU-A
SSU-B
G.813/8262 - default
DO NOT USE
Failure (cannot be configured by user)
In DS1 systems
AUTOMATIC (available only in interfaces for which SSM support is
implemented)
PRC (G.811)
Stratum 2 (G.812 type II)
Transit Node (G.812 type V)
Stratum 3E (G.812 type III)
Stratum 3 (G.812 type IV)
SMC (G.813/8262) - default
UNKNOWN
DO NOT USE
Failure (cannot be configured by user)
PRC pipe regenerator mode makes use of the fact that the system is acting as a
simple link (so no distribution mechanism is necessary) in order to achieve
the following:
Improved frequency distribution performance:
PRC quality
No use of bandwidth for frequency distribution
Simplified configuration
4.4.1 PM measurements
The following PMs are measured (15 minute or 24 hour intervals):
Radio PMs
MSE PM:
Minimum MSE
Maximum MSE
Exceed MSE Threshold seconds
Radio MRMC
Minimum ACM profile
Maximum ACM profile
Minimum Bit-rate (Mbps)
Maximum Bit-rate (Mbps)
Minimum Number of TDM interfaces allocated to the radio
Maximum Number of TDM interfaces allocated to the radio
Radio Ethernet frame error rate
Frame error rate (%) measured on radio-Ethernet interface
Radio Ethernet Throughput (rate of data bits rate measured on radio-
Ethernet interface)
Peak throughput.
Average throughput
Exceed throughput threshold seconds
Radio Ethernet Capacity (overall Ethernet bits rate, data and overhead,
measured on radio-Ethernet interface):
Peak Capacity
Average Capacity
Exceed Capacity threshold seconds.
Note: Ethernet throughput and capacity PMs are measured by
accumulating the number of Ethernet octets every second, as
they are counted by the RMON counters. Injecting constant
data into the unit, trying to test whether these PMs give
constant value, shows that the values are not constant as
they were expected to be, but have a very low ripple. This
ripple is negligible, and does not affect the reliability of the
PM measurement (CQ17918).
Change (in Time left Add new Mark IDF Mark new IDF
seconds)
+7 473 No no --
+35 445 No Yes --
-7 487 No No --
-35 515 No Yes --
+490 890 Yes Yes No
+520 860 Yes Yes Yes
4.5.1 ACM
Feature available from version: i6.5ca
In 6.8 added minimum ACM profile and MRMC profile below threshold
alarm
Adaptive Mode. In this mode, the ACM engine is running, which means
that the radio adapts its profile according to the channel fading conditions.
When this mode is used, a maximum profile should be selected by the user,
which will limit the highest profile that can be used. For example, if the
user selects a maximum profile of 5, the system will not climb above the
profile 5, even if channel fading conditions allow it. From version i6.8, the
minimum profile can also be configured. See Minimum ACM profile on
page 95. In older software versions, The Minimum profile will always be
0 (QPSK) without any option to configure it. Adaptive mode requires a
valid ACM license.
In the case of XPIC/ACM scripts, all the required conditions for XPIC apply. For
details, see XPIC on page 99.
In the first scenario the user will plan the link according to a low class
channel mask, and when radio path conditions allow it, the link will increase
the modulation. This increase of modulation may require lowering the output
power (see table below), in order to decrease the non-linearity of the
transmitter for the higher constellations and in order for the transmitted
spectrum to stay within the licensed low class channel mask. The following
figure demonstrates the differences between a low class mask (e.g., class 2)
and a high class mask (e.g., class 5):
Limitations / Guidelines
Adaptive TX Power is available only with RFU-C, with SW version 2.01 or
above.
If an RFU other than RFU-C is used, Adaptive TX Power is be automatically
disabled, and the system will not be able to increase the power when the
profile decreases. The maximum power will be the power enabled for profile 7
(256QAM).
The feature is available only when ACM Adaptive Mode is configured. The user
must first enable Adaptive Mode in order to enable Adaptive TX Power when
configuring the radio script.
Reference class is ETSI terminology. Any FCC radio script (channel spacing:
10, 20, 30, 40, 50MHz) should be selected with the reference class = FCC
option (CQ20359).
IP-10 enables the configuration of any reference class, without regard to the
scripts configured channel spacing. In fact, the regulation standards
(ETSI/FCC) have limitations on which reference class to use for each specific
channel spacing. It is the users responsibility to configure the right reference
class according to the channel spacing (CQ20098).
threshold. The alarm is cleared when the current MRMC profile rises again
above the threshold.
The user can enable and disable generation of this alarm. The default is
disabled. The user can also set the MRMC profile threshold.
East Radio
Radio 16xE1
Disable
Enable 16xE1 (Active)
16xE1 spiltter
West 16xE1 spiltter
16xE1 Radio
Radio Disable
Enable 16xE1 (Stby)
Radio
16xE1 Radio 16xE1 Enable
16xE1 Disable 16xE1 (Active)
16xE1 spiltter
16xE1 spiltter
Protection 1+1
16xE1 Radio
16xE1 Radio Enable
16xE1 Disable 16xE1 (Stby)
In order to add IP-10 IDUs without using the radio interfaces, the radio can be
disabled just like any other interface.
In some cases, disabling a radio will affect other ports or behaviors; these
cases and the systems treatment of them are as follows:
A radio belonging to an Ethernet LAG group cannot be disabled. The user is
prompted to remove the Radio port from the LAG first.
A radio that has been disabled but is still operating pending a reset cannot
be added to a LAG group.
If a radio port is associated with any of the following, a warning is
displayed, but disabling is allowed after user confirmation:
MEP or MIP.
Ingress rate limit policer
Egress rate shaper
Non-edge port in xSTP
Link ID mismatch
Remote communication error
IF loopback
IF synthesizer unlock
RX AGC is not locked.
No Signal from RFU.
All auxiliary channels alarms (WSC, UC, EOW).
However, previous configuration of these features is retained and re-applied if
the radio is re-enabled.
4.5.5 XPIC
Feature available from version: i6.6.1
XPIC is a feature that enables two radio carriers to use the same frequency
with a polarity separation between them. Since they will never be completely
orthogonal, some signal cancelation is required.
In addition, XPIC includes an automatic recovery mechanism that ensures that
if one carrier fails, or a false signal is received, the mate carrier will not be
affected. This mechanism also ensures that when the failure is cleared, both
carriers will be operational.
The first action taken by the recovery mechanism is to cause the remote
transmitter of the faulty carrier to mute, thus eliminating the disturbing
signal and saving the working link.
Following this, the mechanism attempts at intervals to recover the failed
link. In order to do so, it takes the following actions:
The remote transmitter is un-muted for a brief period.
The recovery mechanism probes the link to find out if it has recovered.
If not, it again mutes the remote transmitter.
This action is repeated in exponentially larger intervals. This is meant
to quickly bring up both channels in case of a brief channel fade,
without seriously affecting the working link if the problem has been
caused by a hardware failure.
The number of recovery attempts is user-configurable
Note: Every such recovery attempt will cause a brief traffic hit in
the working link.
All the time intervals mentioned above (recovery attempt time, initial time
between attempts, multiplication factor for attempt time, number of retries)
can be configured by the user, but it is recommended to use the default values.
The XPIC recovery mechanism is enabled by default, but can be disabled by
the user.
Stand-by
Stand-by
From line From line
interfaces Mute interfaces
f2
To line To line
interfaces interfaces
(muted) (muted)
BP
BP
Active
Active
From line
f1 From line
interfaces
interfaces
To line
To line
interfaces
interfaces
Priority Title
1 User force
2 OOF
3 Rx uncor (In Error Detection)
4 MSE (Early Warning)
Priority Title
5 Manual switch
6 Revertive switch
Table Explanation
User force The user has the option to configure the system to lock on to
a certain radio regardless of its performance.
OOF (Out of Frame) When a radio OOF event is detected, it will switch
to the mate's data stream.
Rx uncor (uncorrected) An Rx uncor indication is an indication from
the Modem to the Mux signaling that there are more errors in the traffic
stream than it can correct. The purpose of this indication is to alert the
Mux to the fact that those errors are on their way, and that a hitless switch
is required in order to prevent the errors from entering the data stream
from the Mux onward.
MSE A continuous modem indication representing the quality of the
received signal. Each modem sends the MSE indication to its local and
mate's Mux, while the Mux monitors them both as switching criteria.
Manual switch The user has the option to request the system to perform
a hitless switch. If all higher priorities are clear, the system will comply.
Revertive mode - If all higher priorities are cleared, the system will return
the preferable radio following a configurable timeout.
carriers configured as 1+1 HSB. This allows the data flow to be unaffected in
the event of unwanted physical events affecting the radio channel, such as
fading.
Frequency diversity is implemented at the baseband level and thus requires
no special RFU connections or upgrades. Frequency diversity only is available
for IDUs which are inserted in a nodal configuration.
The figure below shows the traffic flow in a 1+1 frequency diversity
configuration. The blue lines represent data transmitted towards the radio.
The red lines represent data received from the radio.
Priority Title
1 User force
2 OOF
3 Rx uncor (In Error Detection)
4 MSE (Early Warning)
5 Manual switch
6 Revertive switch
Table Explanation
User force The user has the option to configure the system to lock on to
a certain radio regardless of its performance.
OOF (Out of Frame) When a radio OOF event is detected, the system will
switch to the mate's data stream.
Rx uncor (uncorrected) An Rx uncor indication is an indication from
the modem to the Mux signaling that there are more errors in the traffic
stream than it can correct. The purpose of this indication is to alert the
Mux to the fact that those errors are on their way, and that a hitless switch
is required in order to prevent the errors from entering the data stream
from the Mux onward.
MSE A continuous modem indication representing the quality of the
received signal. Each modem sends the MSE indication to its local and
mate's Mux, and the Mux monitors them both as switching criteria.
Manual switch The user has the option to request the system to perform
a hitless switch. If all higher priorities are clear, the system will comply.
Revertive mode - If all higher priorities are cleared, the system will return
the preferable radio following a configurable timeout
The two separate radio links can be implemented using XPIC or separate
frequencies.
This feature is available only for IDUs which are inserted in a nodal
configuration.
Multi-Radio cannot be used in tandem with the following features:
1+1 HSB
Space and frequency diversity
Eth x
MODEM MODEM
duplication
x Eth &
LVDS
Master
Eth 8
Traffic Eth 8
Traffic splitter MODEM MODEM combiner
LVDS
LVDS
At the transmitting side, outgoing traffic at Ethernet port 8 in the master IDU
is split between its own radio and that of the slave. Each radio transmits its
share of the data.
At the receiving side, the slave sends the data received to the master, which
combines it with the data received from its own radio link, recovering all the
data.
Data is distributed between the two links at the layer-1 level in an optimal
way. Therefore, the distribution is not dependent on the contents of the
Ethernet frames.
In addition, the distribution is proportional to the available bandwidth in
every link:
If both links have the same capacity, half the data will be sent through each
link.
In ACM conditions, the links could be in different modulations; in this case,
data will be distributed proportionally in order to maximize the available
bandwidth.
Links can also have different capacities because of different numbers of
TDM trails configured through the link; as before, Multi-Radio makes
maximum use of available capacity by distributing proportionally to the
available bandwidth.
Note: The Multi-Radio feature is applicable for Ethernet data only.
For TDM, each link remains separate, and users can decide
to configure trails to either radio (or both, by using SNCP or
ABR).
In order for Multi-Radio to work properly, the two radio links should use the
same radio script. Note that in the case of ACM, the links may still use different
modulations, but the same base script must still be configured in both links.
TDM
ETH ETH
M
TD
TDM TDM
TDM
ETH ETH
TDM
TDM
ETH
TDM
TDM
XC
Blue lines represent the Ethernet traffic flow, while green lines represent TDM
traffic flow. The active IDU holds the line interfaces for Ethernet traffic, the
line interfaces for TDM traffic, and the interface with the XC module. The
active IDU acts as a Multi-Radio master unit by distributing the Ethernet traffic
between its own radio channel and the radio channel of its mate. At the
receive side of the link, the active IDU combines the data from both radio
channels to create a single Ethernet stream. When a protection switch occurs,
the new active IDU also becomes the Multi-Radio main unit.
The following events will cause a protection switchover:
GbE line Loss of Carrier (LOC)
TDM interface Loss of Signal (LOS)
STM-1/OC-3 LOS
User manual switch
Note: Radio failure or BER in the radio channel will not cause a
protection switchover. Multi-Radio protects against radio
channel failure by blocking the defective radio.
Multi-Radio with line protection also supplies protection for the management
of the shelf. When activated in slots 1 and 2, the currently active IDU is also
responsible for the management of the shelf.
TDM traffic is protected by duplicating each TDM trail in both radio channels.
Note: TDM trails are not supported when Multi-Radio with line
protection is active in ACM adaptive mode.
Assuming a 1:3 capacity ratio between the uplink and downlink, the figure
above illustrates that the uplink is poorly utilized. Allocating symmetrical BW
results in a 66Mbps loss at each node and a 133Mbps loss in the aggregated
link, a total loss of 265Mbps.
Using the same spectrum resources with asymmetrical scripts provides 50%
additional capacity, as shown in the following figure.
Licensing
Multi-Layer Header Compression requires an Enhanced Compression license.
Switching to Enhanced Compression mode without a valid license will cause a
license violation and will initiate a license violation alarm.
Excluding rules
The learning lookup table is limited to256 entries in software release i6.9. To
optimize compression rates, it is important to avoid over-population of the
lookup table. The user has a powerful tool to optimize compression
performance by excluding the flows that should not be compressed.
The following excluding rules can be applied:
By MAC destination address (DA) 6 bytes DA
By MAC source address (SA) 6 bytes SA
By Ethertype -2 bytes
By VLAN 4 bytes (including VLAN Ethertype to identify S-VLAN from C-
VLAN, VLAN Id and VLAN P-bits).
Flow type 1 byte according to the following bitmask
Bit 6-7 (MSB) Bit 5 Bit 4 Bit 3 Bit 2 Bit 0-1 (LSB)
L2 PBB-TE MPLS L3 - IPv4 L3 - IPv6 L4
00 untag 0 no 0 no 0 no 0 no 00 no
10 reserved 1 - yes 1 - yes 1 - yes 1 yes 01 UDP
01 single tag 10 TCP
11 double tag 11 - GRE
4.6 Security
Security features are relevant to the following areas:
User access control: Allowing only authorized users to access the system.
Secure communication channels: End-to-end encrypted channels for
management.
Security log: A tool to analyze undesired or unauthorized changes in the
system security configuration.
Note: Security features can be configured by users with
administrator privileges, via the Web-Based EMS or the
CLI
3. Determine certificate file format: PEM (for PEM formatted file) or DER
(for DER formatted file).
4. Determine whether or not to include the CA certificate in the Web-
Based EMS configuration definitions. This is an optional configuration
and is recommended for adapting the Web-Based EMS to all browser
applications.
5. After setting the above configurations, go to the Security Configuration
page in the Web-Based EMS and click Download Certificate. You can
monitor the status of the download operation in the Web-Based EMS.
Possible status values are: ready, in-progress, success, and
failed.
6. It is recommended to refresh the Security Configuration page once
the certificate download operation is complete (CQ19554).
7. To apply the new certificate, the web server should be restarted. The
web server is automatically restarted when it is configured to HTTPS.
Step3: Activate HTTPS
The web interface protocol can be configured to be HTTP (default) or HTTPS
(cannot be both at the same time).
Note: For security reasons, this parameter is NOT copied by a
copy to mate operation. An unsecured unit should not be
able to override the security parameters of a secured unit
just by performing a copy to mate operation.
While switching to HTTPS mode, the following conditions must exist:
A WEB server certificate file must exist.
The certificates public key must be compatible with the IDUs private key.
If one of these conditions does not exist, the operation will return an
appropriate error indication.
To activate HTTPS, open the web browser and type the following URL:
https:\\<IP of target IDU>
The CSR file can be also created from the Web-Based EMS.
4.7.2.3 SNMP
IP-10 supports SNMPv1, SNMPv2c, and SNMPv3 traps. For more details,
seeSNMPv3 Traps on page 128.
IP-10 supports the following MIBs:
RFC-1213 (MIB II)
RMON MIB
Ceragon (proprietary) MIB.
For more information, see the MIB Reference Guide.
Access to all IDUs in the shelf is provided by making use of the community and
context fields in SNMPv1 and SNMPv2c/SNMPv3, respectively.
Whenever IP addresses are configured per slot, an SNMP master agent in the main
slot will forward to its sub-agents in extension slots all corresponding SNMP
messages. Each extension slot will reply and send SNMP traps with its own IP
address.
Note: SNMP management of each shelf can be accessed either by
community strings or by user-defined standalone IP
addresses. However, you cannot use both methods in a
single shelf.
The default behavior of the shelf is to use community strings to manage
extension slots. To enable SNMP IP forwarding, the user must set the shelf IP
address parameters to non-zero values.
Note: This feature is only intended for SNMP management. Web
and CLI management will always be accessed through a
single IP address of the main slot in the shelf.
Management ports are connected to the switch (bridge) and are configured to
"learning" mode.
In a nodal configuration, only the main units management ports are available.
1+0 Out-of-Band
Management via 1+0 back-to-back
WaySide Channel Out-of-Band Management
WSC
2 Management
Interface
Interfaces Agenda
Traffic Port
IP-10 Eth4 Eth5 Eth6 Eth7 Radio
Link Management Port
WaySide Port
1+0 Out-of-Band
Management Branch Protection Port
Cross Eth Cable
Straight Eth Cable
1+1 Out-of-Band
Management via 1+1 back-to-back Out-of-Band
WaySide Channel Management
WSC 3 Management WSC 2 Management WSC 2 Management
Prot. Interface Prot. Interface Prot.
Interfaces Interfaces Interface Interfaces
IP-10 prot Protected IP-10 prot IP-10 prot Eth4 Eth5 Eth6 Eth7 Protected
Eth4 Eth5 Eth6 Eth7 Eth4 Eth5 Eth6 Eth7 Radio Link
Radio Link
IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7
WSC 2 Management
Prot.
Interface Interfaces Agenda
Traffic Port
IP-10 prot Eth4 Eth5 Eth6 Eth7
Management Port
Protected
Radio Link WaySide Port
1+1 Out-of-Band
Management via 1+1 back-to-back Out-of-Band
WaySide Channel Management
WSC 3 Management WSC 2 Management WSC 2 Management
Prot. Interface Prot. Interface Prot.
Interfaces Interfaces Interface Interfaces
IP-10 prot Protected IP-10 prot IP-10 prot Eth4 Eth5 Eth6 Eth7 Protected
Eth4 Eth5 Eth6 Eth7 Eth4 Eth5 Eth6 Eth7
Radio Link Radio Link
IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7
WSC 2 Management
Prot.
Interface Interfaces Agenda
Traffic Port
IP-10 prot Eth4 Eth5 Eth6 Eth7
Protected Management Port
Radio Link
WaySide Port
Nodal Configuration
In a nodal configuration, it is sometimes necessary to use external equipment
in order to transport management to the main unit, as shown in the figure
below
Out-of-Band management in nodal configuration
MAIN
1+0 Cascading
1+0 In-Band
Management Out-of-
Management
Band
2 Management 1 Management 1 Management
Interfaces Interfaces Interfaces
Radio
Link
IP-10 Eth5 Eth6 Eth7 IP-10 Eth5 Eth6 Eth7 IP-10 Eth5 Eth6 Eth7
1 Management
Interfaces Agenda
Traffic Port
IP-10 Radio
Eth4 Eth5 Eth6 Eth7
Link Management Port
The local unit is the gateway for In-Band management. The remote unit is
managed via its traffic ports (the radio port, for example), so that no
management ports are needed.
External Protection (1+1) Link
It is important to follow these instructions carefully in order to avoid
management loss to the remote unit. It is mandatory to configure the same
management VLAN ID in all units that are part of the same management
domain.
In order to configure a protected link to In-Band management, or to change
the management VLAN ID, the following steps must be performed, in order
(CQ20523):
1. Configure the following units management VLAN ID in their order of
appearance (even if the unit is still configured to Out-of-Band
management):
Remote Standby
Remote Active
Local Standby
Local Active
2. If Metro Switch is used, the Ethertype of the bridge should first be
configured on the remote side of the link, then on the local side.
3. Configure all the units listed above to In-Band management. Again, this
configuration should be made to the units in the order they are listed
above.
IP10- prot Eth4 Eth5 Eth6 Eth7 IP10- prot Eth4 Eth5 Eth6 Eth7 IP10- prot Eth4 Eth5 Eth6 Eth7 Protected
Radio Link
IP10- prot Eth4 Eth5 Eth6 Eth7 IP10- prot Eth4 Eth5 Eth6 Eth7 IP10- prot Eth4 Eth5 Eth6 Eth7
1 Management
Prot.
Interfaces
Agenda
IP10- prot Eth4 Eth5 Eth6 Eth7 Traffic Port
Protected Management Port
Radio Link
WaySide Port
1+1 Branching IP10- prot Eth4 Eth5 Eth6 Eth7
Management Out-of- Protection Port
Band Cross Eth Cable
Straight Eth Cable
IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7
Protected
Radio Link
IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7
1 Management
Prot. Interfaces Agenda
Traffic Port
IP-10 prot Eth4 Eth5 Eth6 Eth7
Management Port
Protected
Radio Link
WaySide Port
Band
1+0 Cascading
1+0 In-Band Management In-Band.
Management Loops should be avoided !
2 Management 1 Management
Interfaces Interfaces Radio
Radio Link
Link
IP-10 Eth5 Eth6 Eth7 IP-10 Eth5 Eth6 Eth7 IP-10 Eth5 Eth6 Eth7
1 Management
1 Management Interfaces
Interfaces
Radio Agenda
IP-10 Eth4 Eth5 Eth6 Eth7
Link Traffic Port
1+0 Branching Management Port
In-Band Management.
Loops should be avioded ! WaySide Port
Protection Port
Cross Eth Cable
Straight Eth Cable
1+1 back-to-back
In-Band Management.
Loops should be avoided !
1+1 In-Band
Management
2 Management 1 Management 1 Management
Prot. Prot. Prot.
Interfaces Interfaces Interfaces
IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7 IP-10 prot Eth4 Eth5 Eth6 Eth7
1 Management
Prot.
Interfaces
Agenda
IP-10 prot Eth4 Eth5 Eth6 Eth7 Traffic Port
Protected Management Port
Radio Link
WaySide Port
IP-10 prot Eth4 Eth5 Eth6 Eth7
Protection Port
Cross Eth Cable
Straight Eth Cable
Nodal Configuration
In a nodal configuration, it is necessary to transport management traffic to the
main unit by using external Ethernet cables.
The following figures show a few examples of relevant topologies and how to
connect the cables in each topology.
3:1 (Aggregation 3 to 1)
3:1 (Aggregation 3 to 1)
Protection
Provider Network
Management Center
Managing device
IP-10G
Scenario B:
Router
Managing device
IP-10G
(b) Managing device is connected through L3 network and in the last segment passes through a L2
segment with limited MTU.
Download CLI script file to the IDU. It is recommended to first check the
FTP parameters, which are available in the Web-Based EMS Configuration
Management page. The FTP parameters can be set or get also via CLI:
Get protocol type: get /platform/idc-board/file-transfer-protocol
Get Host IP: get /platform/idc-board/host-ip
Get the host path: get /platform/idc-board/host-path
Get the user name get /platform/idc-board/user-name
Change user password: set /platform/idc-board> change-user-password
Download the CLI script file:
set /platform/idc-board/download-archive cli-script
The following events are intended to help the user control the configuration
procedure:
Operation Event Scenario Event text in Events Log
Downloading a CLI script is downloaded successfully CLI configuration script downloaded successfully
CLI Script
CLI script download has failed CLI configuration script download failed
Activating a CLI CLI script activated CLI Configuration script activated
Script
CLI script executed successfully CLI Configuration script executed successfully
CLI script executed with errors CLI Configuration script failed
example, require a password from the user, and therefore should not be
performed via a CLI script.
4.7.9 NTP
Feature available from version: i6.5ga
IP-10 supports NTP client. If the user enables this capability, in the user
should enter the IP address of the NTP server he or she wants the IP-10 to be
locked on.
The NTP client returns one of the following Sync statuses:
If locked, it returns the IP address of the server it is locked on.
Loca The NTP client is locked on the local elements real-time clock.
NA - The NTP client is not synchronized with any clock (valid only when
Admin is set to Disable).
The feature supports Time Offset and Daylight Savings Time.
Time Offset and Daylight Savings Time can be configured via the Unit
Information page of the Web-Based EMS, or via the following CLI command:
/management/mng-services/time-service>
The following table displays to which clock the various software interfaces are
disciplined to:
UTC - Universal Time Coordinated.
Time Offset Configured by the user indicating the time offset from the
UTC (Unit Information page in the Web-Based EMS).
DST Daylight Saving Time configured by the user (Unit Information page
in the Web-Based EMS).
Local Time Calculated by offsetting the UTC by the total offset (Time
Offset + DST).
i6.1 MIB PolyView 6.1 i6.1 WEB i6.2 MIB i6.2 WEB
PM No MIB UTC (GMT) Local Time Local Time Local Time
(was added only
in i6.2)
Current Alarm Table UTC (GMT) Local Time UTC (GMT) Local Time
Traps UTC (GMT) N/A UTC (GMT) N/A
PMGenTime (internal UTC (GMT) N/A UTC (GMT) N/A
Param)
InvGenTime UTC (GMT) N/A UTC (GMT) N/A
(internal Param)
When using NTP with 1+1 HSB protection, both the Active and the standby
units should be locked independently on the NTP server, and should report
their Sync status independently. Time and Date are not copied from the active
unit to the standby unit (CQ19584).
When using NTP in a nodal configuration, all units in the node (including
standby main units) are automatically synchronized to the active main units
clock.
Note: SNTP client is not supported. i6.2 NTP client should work
against SNTPv4 server, but this was not fully qualified
(CQ19806).
CPU and memory utilization are exposed to user. User can monitor utilization
from the CLI or SNMP. Generally in normal operation conditions utilization
information is useless. However, it may be helpful when analyzing equipment
failures.
SONET SONET
STM-1/OC-3 SDH, G.707
(proprietary) (standard)
VC number
TUG3 TUG2 TU TUG3 TUG2 TU TUG3 TUG2 TU
1 1 1 1 1 1 1 1 1 1
2 2 1 1 2 1 1 1 2 1
3 3 1 1 3 1 1 1 3 1
4 1 2 1 1 2 1 1 4 1
5 2 2 1 2 2 1 1 5 1
6 3 2 1 3 2 1 1 6 1
7 1 3 1 1 3 1 1 7 1
8 2 3 1 2 3 1 1 1 2
9 3 3 1 3 3 1 1 2 2
10 1 4 1 1 4 1 1 3 2
11 2 4 1 2 4 1 1 4 2
12 3 4 1 3 4 1 1 5 2
13 1 5 1 1 5 1 1 6 2
14 2 5 1 2 5 1 1 7 2
15 3 5 1 3 5 1 1 1 3
SONET SONET
STM-1/OC-3 SDH, G.707
(proprietary) (standard)
VC number
TUG3 TUG2 TU TUG3 TUG2 TU TUG3 TUG2 TU
16 1 6 1 1 6 1 1 2 3
17 2 6 1 2 6 1 1 3 3
18 3 6 1 3 6 1 1 4 3
19 1 7 1 1 7 1 1 5 3
20 2 7 1 2 7 1 1 6 3
21 3 7 1 3 7 1 1 7 3
22 1 1 2 1 1 2 1 1 4
23 2 1 2 2 1 2 1 2 4
24 3 1 2 3 1 2 1 3 4
25 1 2 2 1 2 2 1 4 4
26 2 2 2 2 2 2 1 5 4
27 3 2 2 3 2 2 1 6 4
28 1 3 2 1 3 2 1 7 4
29 2 3 2 2 3 2 2 1 1
30 3 3 2 3 3 2 2 2 1
31 1 4 2 1 4 2 2 3 1
32 2 4 2 2 4 2 2 4 1
33 3 4 2 3 4 2 2 5 1
34 1 5 2 1 5 2 2 6 1
35 2 5 2 2 5 2 2 7 1
36 3 5 2 3 5 2 2 1 2
37 1 6 2 1 6 2 2 2 2
38 2 6 2 2 6 2 2 3 2
39 3 6 2 3 6 2 2 4 2
40 1 7 2 1 7 2 2 5 2
41 2 7 2 2 7 2 2 6 2
42 3 7 2 3 7 2 2 7 2
43 1 1 3 1 1 3 2 1 3
44 2 1 3 2 1 3 2 2 3
45 3 1 3 3 1 3 2 3 3
46 1 2 3 1 2 3 2 4 3
SONET SONET
STM-1/OC-3 SDH, G.707
(proprietary) (standard)
VC number
TUG3 TUG2 TU TUG3 TUG2 TU TUG3 TUG2 TU
47 2 2 3 2 2 3 2 5 3
48 3 2 3 3 2 3 2 6 3
49 1 3 3 1 3 3 2 7 3
50 2 3 3 2 3 3 2 1 4
51 3 3 3 3 3 3 2 2 4
52 1 4 3 1 4 3 2 3 4
53 2 4 3 2 4 3 2 4 4
54 3 4 3 3 4 3 2 5 4
55 1 5 3 1 5 3 2 6 4
56 2 5 3 2 5 3 2 7 4
57 3 5 3 3 5 3 3 1 1
58 1 6 3 1 6 3 3 2 1
59 2 6 3 2 6 3 3 3 1
60 3 6 3 3 6 3 3 4 1
61 1 7 3 1 7 3 3 5 1
62 2 7 3 2 7 3 3 6 1
63 3 7 3 3 7 3 3 7 1
64 N/A N/A N/A 1 1 4 3 1 2
65 N/A N/A N/A 2 1 4 3 2 2
66 N/A N/A N/A 3 1 4 3 3 2
67 N/A N/A N/A 1 2 4 3 4 2
68 N/A N/A N/A 2 2 4 3 5 2
69 N/A N/A N/A 3 2 4 3 6 2
70 N/A N/A N/A 1 3 4 3 7 2
71 N/A N/A N/A 2 3 4 3 1 3
72 N/A N/A N/A 3 3 4 3 2 3
73 N/A N/A N/A 1 4 4 3 3 3
74 N/A N/A N/A 2 4 4 3 4 3
75 N/A N/A N/A 3 4 4 3 5 3
76 N/A N/A N/A 1 5 4 3 6 3
77 N/A N/A N/A 2 5 4 3 7 3
SONET SONET
STM-1/OC-3 SDH, G.707
(proprietary) (standard)
VC number
TUG3 TUG2 TU TUG3 TUG2 TU TUG3 TUG2 TU
78 N/A N/A N/A 3 5 4 3 1 4
79 N/A N/A N/A 1 6 4 3 2 4
80 N/A N/A N/A 2 6 4 3 3 4
81 N/A N/A N/A 3 6 4 3 4 4
82 N/A N/A N/A 1 7 4 3 5 4
83 N/A N/A N/A 2 7 4 3 6 4
84 N/A N/A N/A 3 7 4 3 7 4
The string transmitted as J2 trace identifier is the Trail ID defined for the TDM
trail mapped to the corresponding VC-11/12 interface.
No mismatch alarm is supported for J2 trace identifier.
Part
Number Item Description Manufacturer Name Manufacturer PN
XCVR,SFP S1.1 neo-photonics pt7320-31-1w
ao-0072-0 XCVR,SFP S1.1 Wuhan Telecom. Devices (WTD) wtd-rtxm139-400
XCVR,SFP S1.1 source photonics (ECI) SP-03-IR1-CDFH
* Electrically these SFP modules work properly but they tend to get
mechanically stuck in the IP-10s cage.
For this reason, any failure in the primary path will cause both sides to
revert to the normal mode of operation (sending traffic through both
paths). Traffic will return to the primary path after the failure
condition has been cleared (the mechanism is revertive).
In order to prevent jittering of the path and unnecessary traffic
switches in case of intermittent primary path failures, there is a
revertive timer. This timer determines the amount of time required
after no failure is detected in the primary path before ceasing traffic
transmission through the secondary path
Automatically freeing bandwidth whenever TDM traffic is not being sent:
Whenever valid TDM traffic is not available at the radio interface for
transmission, its bandwidth is automatically re-allocated for Ethernet
traffic.
This is relevant not only for ABR trails, but for all TDM traffic. In other
words, bandwidth is freed up whenever there is no information to
transmit. This may occur in the following circumstances:
A failure has occurred which interrupts TDM traffic in a certain
trail. This may take place in a radio link or an internal connection.
No valid TDM input (E1/DS1 signal) is received at the end-point.
AIS signal is detected at the input (if AIS detection feature is
enabled).
Selecting the incoming traffic normally as explained for SNCP trails.
The ABR mechanism is relevant only for the transmission. Reception is dealt
with in the same manner as normal SNCP trails.
For ABR trails, status is given for paths which are currently transmitting;
with no failure conditions; this means the primary path only.
PMs are collected as follows:
Primary is active No PM is counted on secondary.
Secondary is active (due to primary failure or force to standby) PM is
counted on primary and on secondary.
Line interfaces are enabled (if no trails are assigned to them, they are
disabled).
The trail is monitored in order to raise indications and measure PMs.
The switching fabric is located in the main unit. Therefore, a failure in this unit
will cause all TDM traffic to fail unless the main unit is protected.
Duplex
Auto-negotiation
Flow control
T-Cards IP address and subnet mask
Clock distribution and use of front panel clock interface
Configuring MDs
To add an MD:
1 Select Configuration > Pseudowire > SOAM > Maintenance Domain.
The Maintenance Domain page opens.
2 Click Add to add an MD. The Add Maintenance Domain window opens.
Configuring MAs
To add an MA:
1 Select Configuration > Pseudowire > SOAM > Maintenance
Association. The Maintenance Association page opens.
2 Click Add to add an MA. The Add Maintenance Association window opens.
3 In the MA ID field,
enter a unique ID from 1 to 128 to identify the MA.
4 In the Domain ID field, enter the ID of the MD to which you want to assign
the MA.
5 In the Assocation Name field, enter a name for the MA, for informational
purposes.
6 In the VLAN Type field, select the outer VLAN type assigned to the tunnel
to which the MA will be attached. This should be the same as the VLAN
Type for the service being monitored. Options are:
None
C-type
7 In the VLAN ID field, enter the VLAN assigned to the tunnel to which the
MA will be attached.
8 In the Local MEP field, enter a unique ID for the local MEP.
9 In the Remote MEP field, enter a unique ID for the remote MEP.
10 In the CCM Interval field, SELECT the interval at which the MA sends CCM
messages. Options are:
3.3 ms
10 ms
100 ms
1 second
10 seconds
1 minutes
10 minutes
11 In the CCM Admin field, select Enable to enable the MA to send CCM
messages. CCM must be enabled in order for the MA to serve its purpose as
the monitoring mechanism for TDM path protection.
12 In the CCM Priority field, enter a link trace message priority from 0 to 7
for the MA. This represents the p-bit associated with the MAs VLAN.
13 In the MA Admin field, select Enable to enable the MA.
14 Click Apply.
To delete an MA:
1 Select the MA in the Maintenance Association page.
2 Click Delete selected.
Note: You cannot delete an MA that has been assigned to a tunnel.
For MEF-8 tunnels, SOAM should be configured on both end points. For
UDP/IP tunnels, path protection takes place up to the level of the default
gateways.
Active Path
Layer 2
CCM Standby Path
IP-10G
Layer 2
Default Gateway 2 Router
CCM
In order to achieve path protection, different provisioning can be made for the
PSN tunnel (VLAN for MEF-8 services, or UDP/IP and VLAN encapsulation for
UDP/IP services) corresponding to each of the two data streams.
Pseudowire path protection uses SOAM (G.8031) to monitor the network
paths. Because SOAM is configured at the T-card, the T-card can determine the
status of the entire network path, up to and including the interfaces on the T-
card
To configure pseudowire path protection:
1 Configure a Maintenance Domain (MD). See Configuring MDs on page 165.
2 Configure Maintenance Associations (MAs). See Configuring MAs on
page 167.
3 Configure PSN Tunnels and Assign to them MAs. See Configuring
Pseudowire Encapsulation (Tunnels) on page 183.
4 Configure a TDM Tunnel Group. See Configuring Tunnel Groups on
page 185.
Pseudowire PMs
Standard pseudowire PM measurements are provided for each configured
service:
missing-packets counter
packets-reorder counter
misorder-dropped counter
malformed-packets counter
ES
SES
UAS
FC
RMON
The Ethernet port provides a number of RMON counters, which are not
identical to the IP-10G main bridge counters. For a list and description of
these counters, refer to the FibeAir IP-10G and IP-10E User Guide, DOC-
00034612.
tunnels. However, only the primary tunnel sends actual traffic. The PW T-Card
monitors both paths using the CCM messages, and determines when to
perform a switchover from the primary tunnel to the secondary tunnel.
You can configure up to 16 pseudowire services on the IP-10G. You can use a
mixture of MEF-8 and UDP/IP services. Before configuring pseudowire
services, you must configure one or more pseudowire profiles and tunnels. If
you are using CESoP, you must also configure one or more DS0 bundles.
Important Note: Once a profile, tunnel, or bundle has been assigned to a
service, you cannot modify that profile, tunnel, or bundle
until you first disable the service.
Pseudowire Configuration Flow
Pseudowire Pseudowire
Pseudowire Profile SOAM Tunnel Tunnel Group
Configuration Configuration Configuration Configuration
(Encapsulation) (Optional)
For SAToP
services
Pseudowire
Service
Configuration
You must connect the Eth interface on the PW T-Card to one of the Ethernet
ports on the IP-10G. Any electrical Ethernet port can be used, including either
GbE or Fast Ethernet ports. You can use any type of Ethernet cable.
The following Ethernet ports cannot be used for pseudowire:
Optical ports
Ports that belong to a LAG group
After connecting the Ethernet port to the PW T-Card, you must select the port
as the pseudowire interface port in the Ethernet Ports page:
1 Select Configuration > Interfaces > Ethernet Ports. The Ethernet Ports
page opens.
2 From the Pw interface port drop down list, select the Ethernet port you
are using as the pseudowire interface.
3 Click Apply. The selected port is highlighted in the main screen.
2 Click + next to the port you want to configure to display the port
configuration settings.
2 From the Front panel clock admin drop down list, select Enable if you
are using an external clock source such as a GPS or an E1 line from
external equipment. In this case, the external clock source must be
physically connected to the Sync interface on the PW T-Card.
3 From the Signal to system sync distribution reference drop down list,
select the clock source that will be transmitted towards the general IP-10G
synchronization mechanism. Options are:
None Select this if you do not want to transmit a clock source to the
general IP-10G synchronization mechanism (e.g., if you are using the
front panel for input only).
Front Panel Only available if Front panel clock admin is set to
Enable. Select this option to use the front panel as the timing source.
Clock Recovery System uses Adaptive Clock Recovery (ACR) for
synchronization.
4 From the Signal to front panel clock interface drop down list, select the
clock source the system transmits to the front panel. Options are:
None Select None if the timing is coming from the front panel.
Front Panel Select this option to use an external clock source.
Clock Recovery System uses Adaptive Clock Recovery (ACR) for
synchronization.
5 From the Front panel clock signal input drop down list, select the type of
signal to be input at the Sync port on the PW T-Card:
Sync A digital 2 MHz signal.
E1/DS1 A normal coded TDM signal.
6 From the Front panel clock signal output drop down list, select the type
of signal to be transmitted from the Sync port on the PW T-Card:
Sync A digital 2 MHz signal.
E1/DS1 - A normal coded TDM signal.
7 If Signal to front panel clock interface field is set to Clock Recovery,
then in the TDM port for front panel clock recovery reference field,
enter the TDM port that serves as the clock recovery reference.
8 If Signal to system sync distribution reference field is set to Clock
Recovery, then in the TDM port for system clock recovery reference
field, enter the TDM port that serves as the clock recovery reference.
9 Click Apply.
2 In the Add New Entry section, select a profile ID from the New profile ID
drop down list, and do one of the following:
Click Create new; or
To create a new profile based on an existing profile select an existing
profile from the Copy from profile drop down list and click Copy
existing.
The new profile appears in the Profiles Table.
3 Click + next to the new profile (or any profile you want to edit). The profile
is expanded.
4 In the Payload size field, enter the number of TDM frames per packet
(from 1 to 64). This number multiplied by the number of DS0 channels in a
specific bundle equals the size of the TDM payload, and does not include
the Ethernet header.
5 In the Jitter buffer depth field, enter the desired jitter buffer depth (from
1 to 32, in milliseconds). This is used to enable the network to
accommodate PSN-specific packet delay variation. The jitter buffer can be
increased if the network experiences a higher-than-normal level of jitter.
6 From the Use RTP header drop down list, select Yes if you want the
system to add RTP headers to Ethernet packets carrying pseudowire
traffic. The default value is No.
7 From the RTP timestamp mode drop down list, select from the following
RTP timestamp mode options:
Absolute
Differential
The default value is Absolute.
Note: This parameter is only relevant if you select Yes in the Use
RTP header drop down list.
8 In the RTP timestamp multiplication factor field, enter the number by
which the reference frequency is multiplied. This must be set to the same
value at both ends of the pseudowire service.
9 from the Payload suppression drop down list, select Enable or Disable
to enable or disable payload suppression. The default value is Disable.
10 In the Payload type field, enter a value between 96 and 127. This value is
used to distinguish between signaling and data types. The default value
is 96.
11 From the LOPS detection drop down list, select Enable or Disable to
enable or disable LOPS detection. The default value is Enable.
12 In the Consecutive Packets in Sync for LOP field, enter the number of
missing packets required in order for the system to indicate a loss of
packet state (1-10). The default value is 2.
13 In the Consecutive Missing Packets Out of Sync for LOP field, enter the
packets required in order for the system to go out of a loss of packet state
(1-10). The default value is 2.
14 In the Packet loss time window, field, enter the time (in milliseconds) the
system period (in seconds) the system uses to compute the average packet
loss rate in order to detect excessive packet loss (1-65535). The default
value is 3000.
15 In the Alarm threshold, field, enter the amount of time (in milliseconds)
the system waits after a fault condition exists before indicating an alarm
(1-65535). The default value is 2500.
16 In the Excessive packet loss threshold field enter the alarm threshold (in
percentage) for excessive packet loss (1-100). The default value is 5.
17 In the Clear alarm threshold field, enter the time (in milliseconds) the
system waits before clearing an alarm once the alarm condition has ended
(1-65535). The default value is 10000.
18 In the Missing packets for SES threshold field, enter the percentage of
missing packets detected within a one second window that will cause SES
to be counted.
19 In the CAS alarm pattern field, enter the CAS alarm pattern transmitted
on the E1 interface when packets overflow or underflow the jitter buffer.
20 Click Apply.
2 Click Add Entry to add a tunnel. The Add Entry window opens.
3 From the Tunnel ID drop down list, select a unique Tunnel ID from 1 to
128.
4 From the PSN type drop down list, select the encapsulation protocol for
the tunnel:
UDP/IP The tunnel uses UDP/IP encapsulation.
Ethernet The tunnel uses MEF-8 encapsulation.
5 From the VLAN type drop down list, select the VLAN type used by the
tunnel. Options are:
None
C type
S type
6 In the VLAN ID field, enter a VLAN ID for the tunnel.
7 In the VLAN p-bits field, enter a p-bit value. This value will be assigned to
frames transversing the tunnel.
8 For MEF-8 tunnels, enter the MAC address of the card at the other site of
the link in the Remote MAC address field. If the tunnel is set to have a MA,
the MAC address of the other side will be discovered by SOAM means and
that MAC address will be used no matter what MAC address was
configured. In this case, for the configuration 00:00:00:00:00:00 can be
used.
Note: If the card at the other side of the link is replaced, you will
have to re-configure the tunnel.
9 For UDP/IP tunnels, enter a destination IP address in the Destination IP
address field.
10 For UDP/IP tunnels, if the destination is on a different segment of the
network, enter a next hop IP address in the Next hop IP address field.
11 For UDP/IP tunnels, enter a ToS/DSCP value in the ToS-DSCP field.
2 Click Add Entry. The Add New Tunnel Group window opens.
3 From the Group ID drop down list, select a unique Tunnel Group ID from 1
to 64.
4 From the Primary tunnel drop down list, select the ID of the tunnel you
want to assign as the primary tunnel.
5 From the Secondary tunnel drop down list, select the ID of the tunnel you
want to assign as the secondary tunnel.
6 Click Apply.
To force a switchover of the active tunnel in a tunnel group:
1 Select the tunnel group in which you want to force the switchover by
checking the right column.
2 Click Switch selected to standby. A confirmation prompt appears.
3 Click OK. If the Primary tunnel was active, the Secondary tunnel becomes
active, and vice versa.
To delete a tunnel group:
1 Select the tunnel group you want to delete by checking the right column in
the Tunnel Groups page.
2 Click Delete selected.
Note: You cannot delete a tunnel groupthat has been assigned to a
service.
Add Service Window Normal Service Add Service Window Protected Service
3 From the Service ID drop down list, select a unique Service ID.
4 From the Pw type drop down list, select the pseudotype protocol you want
to use for the service:
E1 SAToP Service uses SAToP protocol.
CESoP Service uses CESoP protocol without CAS signaling.
CESoP with CAS Service uses CESoP protocol with CAS signaling.
5 From the Psn type drop down list, select the encapsulation type:
UDP/IP UDP/IP
Ethernet MEF-8
6 From the Port ID drop down list:
For SAToP services, select the TDM port to use with the service.
For CESoP services, this option is grayed out.
7 From the Bundle ID drop down list:
For SAToP services, this option is grayed out.
For CESoP services, select the DS0 bundle to use with the service.
8 From the Profile ID field, select the pseudowire profile to use with the
service.